正向解析,反向解析,主從,
主:主配置文件:
options {
listen-on port 53 { 127.0.0.1; 172.16.252.194; }; //監聽的端口,即哪些主機可以進行訪問
directory “/var/named”; //對應數據文件的目錄位置
dump-file “/var/named/data/cache_dump.db”;
statistics-file “/var/named/data/named_stats.txt”;
memstatistics-file “/var/named/data/named_mem_stats.txt”;
allow-query { any; }; //運行哪些主機請求查詢,這里選擇any運行所有;
recursion yes; //將自己視為客戶端的一種查詢方式
//forward only; //只轉發請求,不做解析,此時DNS服務器是一個緩沖服務器;
dnssec-enable no;
dnssec-validation no;
區域配置文件:
zone “iofunction.com” IN { //表示要解析的域名:正向解析時就是iofunction.com
type master; //該zone的類型,為主的,有{master|slave|hint|forward},除了根外默認為master
file “iofunction.com.zone”; //該zone的文件名稱
allow-transfer { 172.16.252.120; };
};
zone “16.172.in-addr.arpa” IN { //反向的時候有固定的格式:ip網段的網絡ID部分倒著寫,.in-addr.arpa
type master;
file “16.172.zone”;
allow-transfer { 172.16.252.120; };
};
正向解析文件:
[root@localhost named]# cat iofunction.com.zone
$TTL 3600 //保存時間
@ IN SOA ns1.iofunction.com. ioadmin.iofunction.com. ( //@就表示iofunction.com 域名,SOA開始驗證,
2017052305 //序列號,每次更改文件時,都要增加1,要不然從服務器不知道你是否有變化
2H //刷新時間
20M //重試時間
1W //過期時間
1D ) //否定答案的TTL值
@ IN NS ns1.iofunction.com. //NS就是服務器的縮寫,后面記錄的數據是DNS服務器的意思
@ IN NS ns2.iofunction.com.
ns1.iofunction.com. IN A 172.16.252.194 //對應DNS的地址,可以有多個,可做主從,多從,來緩解壓力
ns2.iofunction.com. IN A 172.16.252.120
www IN A 192.168.153.128 //www主機名+域名,域名會自動添加上去,A表示的是正向解析記錄,表示從網址解析成IP地址。
web IN A 192.168.152.129
study IN A 172.16.0.100
cname IN CNAME web //別名地址
ai IN A 1.1.1.1
反向解析文件:
[root@localhost named]# cat 16.172.zone
$TTL 3600
@ IN SOA ns1.iofunction.com. ioadmin.iofunction.com (
2017052301
1H
2H
1D
1D )
@ IN NS ns1.iofunction.com.
194.252 IN PTR ns1.iofunction.com. //PTR 有特定的格式,把ip地址反過來寫,會把反向的zone_name拿過來添加到后面。
100.0 IN PTR study.iofunction.com.
***切記,文件生成后,要記得將文件的權限設置成其他人沒有權限。屬組設為name組***
從服務器:
options {
listen-on port 53 { 127.0.0.1; 172.16.252.120; }; //監聽在自己的端口上
directory “/var/named”;
dump-file “/var/named/data/cache_dump.db”;
statistics-file “/var/named/data/named_stats.txt”;
memstatistics-file “/var/named/data/named_mem_stats.txt”;
allow-query { any; };
recursion yes;
dnssec-enable no;
dnssec-validation no;
zone “iofunction.com” IN {
type slave; //從服務器上只需要把類型改成slave
file “slaves/iofunction.com.zone”; //相對路徑,將同步后的文件放在哪,該目錄的權限和屬主屬組。
masters { 172.16.252.194; }; //主服務器的地址
};
zone “16.172.in-addr.arpa” IN {
type slave;
file “slaves/16.172.zone”;
masters { 172.16.252.194; };
};
1、要將服務器開啟:service named start
2、先在主服務器上測試能不能解析www.iofunction.com
dig -t A www.iofunction.com @172.16.252.194
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.62.rc1.el6 <<>> -t A www.iofunction.com @172.16.252.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9706
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2 //aa表示權威的DNS服務器那獲得的解析
;; QUESTION SECTION:
;www.iofunction.com. IN A
;; ANSWER SECTION:
www.iofunction.com. 3600 IN A 192.168.153.128 //正向解析成功
;; AUTHORITY SECTION:
iofunction.com. 3600 IN NS ns1.iofunction.com.
iofunction.com. 3600 IN NS ns2.iofunction.com.
;; ADDITIONAL SECTION:
ns1.iofunction.com. 3600 IN A 172.16.252.194
ns2.iofunction.com. 3600 IN A 172.16.252.120
;; Query time: 2 msec
;; SERVER: 172.16.252.194#53(172.16.252.194)
;; WHEN: Wed May 24 00:27:26 2017
;; MSG SIZE rcvd: 120
3、反向解析192.168.153.128
[root@localhost named]# dig -x 172.16.0.100 @172.16.252.194
;; QUESTION SECTION:
;100.0.16.172.in-addr.arpa. IN PTR
;; ANSWER SECTION:
100.0.16.172.in-addr.arpa. 3600 IN PTR study.iofunction.com. 解析成功了
;; AUTHORITY SECTION:
16.172.in-addr.arpa. 3600 IN NS ns1.iofunction.com.
4、在主服務器上添加一條A記錄
(1)vim iofunction.com
$TTL 3600
@ IN SOA ns1.iofunction.com. ioadmin.iofunction.com. (
2017052306 //序列號一定要改,要不然不會觸發更新,就會導致主從不一致
2H
20M
1W
1D )
@ IN NS ns1.iofunction.com.
@ IN NS ns2.iofunction.com.
ns1.iofunction.com. IN A 172.16.252.194
ns2.iofunction.com. IN A 172.16.252.120
www IN A 192.168.153.128
web IN A 192.168.152.129
study IN A 172.16.0.100
cname IN CNAME web
new IN A 10.10.10.10 //添加一條新記錄
(2)rndc reload //重讀一下配置文件,就會觸發更新。 rndc 953端口
tail /var/log/message 就可以看到傳輸的消息了
原創文章,作者:dance_man,如若轉載,請注明出處:http://www.www58058.com/76830