1、反向配置DNS的操作:
1)、配置反向解析:
[root@localhost etc]# vim named.rfc1912.zones
zone “223.168.192.in-addr.arpa” IN {
type master;
file “dingning.com.zone.test”;
allow-update { none; };
};
:wq 保存退出
2)、配置方向区域文件:
[root@localhost named]# cp -p named.localhost dingning.com.zone.test
[root@localhost named]# vim dingning.com.zone.test
$TTL 1D
@ IN SOA dingning.com admin.dingning.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS dingning.com
A 192.168.223.131
200 IN PTR www.dingning.com.
:wq 保存退出
指定192.168.223.200这个IP地址作为反向解析的IP地址:
验证结果:
[root@localhost named]# nslookup 192.168.223.131
** server can’t find 131.223.168.192.in-addr.arpa.: NXDOMAIN
注:不适用指定IP找不到解析的域名;
[root@localhost named]# nslookup 192.168.223.200
200.223.168.192.in-addr.arpa name = www.dingning.com.