1. 配置正向解析
1.安裝bind
yum install bind bind-utils -y
2.配置/etc/named.conf,需要修改的地方
listen-on port 53 { 127.0.0.1; 192.168.42.135; }; allow-query { any; }; dnssec-enable no; dnssec-validation no;
3.添加一個區域(srayban.com)
vim /etc/named.rfc1912.zones zone "srayban.com" IN { type master; file "rayban.com.zone" };
4.創建區域文件rayban.com.zone
vim /var/named/rayban.com.zone $TTL 3600 $ORIGIN srayban.com. @ IN SOA ns1.srayban.com. dnsadmin.srayban.com. ( 2017052301 1H 10M 3D 1D ) IN NS ns1 IN MX 10 mx1 IN MX 20 mx2 ns1 IN A 192.168.42.151 ns2 IN A 192.168.42.152 www IN A 192.168.42.153 web IN CNAME www
5.修改權限
chmod o= srayban.com.zone chown :named srayban.com.zone
5.檢查語法
named-checkconf #檢查區域文件 named-checkzone "srayban.com" /var/named/srayban.com.zone zone srayban.com/IN: loaded serial 2017052301 OK
6.用dig命令測試
dig -t A www.srayban.com @192.168.42.150 ; <<>> DiG 9.9.4-RedHat-9.9.4-38.el7_3.3 <<>> -t A www.srayban.com @192.168.42.150 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 28861 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 3 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;www.srayban.com. IN A ;; ANSWER SECTION: www.srayban.com. 3600 IN A 192.168.42.153 ;; AUTHORITY SECTION: srayban.com. 3600 IN NS ns1.srayban.com. srayban.com. 3600 IN NS ns2.srayban.com. ;; ADDITIONAL SECTION: ns1.srayban.com. 3600 IN A 192.168.42.151 ns2.srayban.com. 3600 IN A 192.168.42.152 ;; Query time: 0 msec ;; SERVER: 192.168.42.150#53(192.168.42.150) ;; WHEN: Tue May 23 20:24:23 CST 2017 ;; MSG SIZE rcvd: 128
2. 配置反向解析
1.增加反向區域模塊
vim /etc/named.rfc1912.conf zone "42.168.192.in-addr.arpa" { type master; file "42.168.192.in-addr.arpa.zone" }
2.在/var/named/下,新增42.168.192.in-addr.arpa.zone文件
vim 42.168.192.in-addr.arpa.zone $TTL 3600 $ORIGIN 42.168.192.in-addr.arpa. @ IN SOA ns1.srayban.com. nsadmin.srayban.com. ( 2017052302 1H 10M 3D 12H ) IN NS ns1.srayban.com. 151 IN PTR ns1.srayban.com. 152 IN PTR ns2.srayban.com. 153 IN PTR www.srayban.com.
3.修改權限
chmod o= /var/named/42.168.192.in-addr.arpa.zone chown :named /var/named/42.168.192.in-addr.arpa.zone
4.檢查語法
named-checkconf named-checkzone "42.168.192.in-addr.arpa" /var/named/42.168.192.in-addr.arpa.z one zone 42.168.192.in-addr.arpa/IN: loaded serial 2017052302 OK
5.重載配置文件和區域數據文件
rndc reload
6.測試反向解析
dig -x 192.168.42.151 @192.168.42.150 ; <<>> DiG 9.9.4-RedHat-9.9.4-38.el7_3.3 <<>> -x 192.168.42.151 @192.168.42.150 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4195 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;151.42.168.192.in-addr.arpa. IN PTR ;; ANSWER SECTION: 151.42.168.192.in-addr.arpa. 3600 IN PTR ns1.srayban.com. ;; AUTHORITY SECTION: 42.168.192.in-addr.arpa. 3600 IN NS ns1.srayban.com. ;; ADDITIONAL SECTION: ns1.srayban.com. 3600 IN A 192.168.42.151 ;; Query time: 9 msec ;; SERVER: 192.168.42.150#53(192.168.42.150) ;; WHEN: Tue May 23 22:30:05 CST 2017 ;; MSG SIZE rcvd: 115
3. DNS集群部署配置
我們現在要部署一個1主3從的dns服務器
> #主服務器 > 192.168.42.150 > #從服務器 > 192.168.42.151 > 192.168.42.152 > 192.168.42.153
1.我們還是拿之前的配置的那臺作主服務器,因為我們需要改變之前的配置,配置如下
vim /var/named/srayban.com.zone $TTL 3600 $ORIGIN srayban.com. @ IN SOA ns1.srayban.com. dnsadmin.srayban.com. ( 2017052311 1H 10M 3D 1D ) IN NS ns1 IN NS ns2 IN NS ns3 IN NS ns4 ns1 IN A 192.168.42.150 ns2 IN A 192.168.42.151 ns3 IN A 192.168.42.152 ns4 IN A 192.168.42.153 bbs IN A 192.168.42.151 taom IN A 192.168.42.152 www IN A 192.168.42.153 web IN CNAME www
2.從服務器安裝bind(3臺都得安裝)
yum install bind bind-utils -y
3.配置從服務器的named.conf,配置如下:
vim /etc/namd.conf #listen-on port 53 { 127.0.0.1; }; 注釋這行 allow-query { any; }; dnssec-enable no; dnssec-validation no;
4.配置區域文件named.rfc1912.zones,新增內容如下:
vim /etc/named.rfc1912.zones zone "srayban.com" IN { type slave; file "slaves/srayban.com.zone"; masters { 192.168.42.150; }; };
5.其他兩臺從服務器,做一樣的配置即可
6.檢查配置,啟動named
named-checkconf systemctl start named.service
7.在每臺機上測試
dig -t A www.srayban.com @192.168.42.151 dig -t A www.srayban.com @192.168.42.152 dig -t A www.srayban.com @192.168.42.153
都能得到正確結果
; <<>> DiG 9.9.4-RedHat-9.9.4-38.el7_3.3 <<>> -t A web.srayban.com @192.168.42.151 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 55117 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 5 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;web.srayban.com. IN A ;; ANSWER SECTION: web.srayban.com. 3600 IN CNAME www.srayban.com. www.srayban.com. 3600 IN A 192.168.42.153 ;; AUTHORITY SECTION: srayban.com. 3600 IN NS ns3.srayban.com. srayban.com. 3600 IN NS ns2.srayban.com. srayban.com. 3600 IN NS ns1.srayban.com. srayban.com. 3600 IN NS ns4.srayban.com. ;; ADDITIONAL SECTION: ns1.srayban.com. 3600 IN A 192.168.42.150 ns2.srayban.com. 3600 IN A 192.168.42.151 ns3.srayban.com. 3600 IN A 192.168.42.152 ns4.srayban.com. 3600 IN A 192.168.42.153 ;; Query time: 2 msec ;; SERVER: 192.168.42.151#53(192.168.42.151) ;; WHEN: Wed May 24 13:54:06 CST 2017 ;; MSG SIZE rcvd: 214
4. 子域授權
1.在主域數據庫文件配置 ,增加子域部分
$TTL 3600 $ORIGIN srayban.com. @ IN SOA ns1.srayban.com. dnsadmin.srayban.com. ( 2017052313 ###更改版本號 1H 10M 3D 1D ) IN NS ns1 IN NS ns2 IN NS ns3 IN NS ns4 blog IN NS ns4.blog #####增加blog子域,定義二級域為blog.srayban.com ns1 IN A 192.168.42.150 ns2 IN A 192.168.42.151 ns3 IN A 192.168.42.152 ns4 IN A 192.168.42.153 bbs IN A 192.168.42.151 taom IN A 192.168.42.152 www IN A 192.168.42.153 web IN CNAME www ns4.blog IN A 192.168.42.153 #####做一下A記錄,定義二級域的NS服務器地址
2.在named.rfc1912.zones添加子域區域
vim /etc/named.rfc1912.zones zone "blog.srayban.com" IN { type master; file "blog.srayban.com.zone"; };
3.創建子域區域配置文件
vim /var/named/blog.srayban.com.zone $TTL 3600 $ORIGIN blog.srayban.com. @ IN SOA blog.srayban.com dnsadmin.srayban.com. ( 2017021201 ###更改版本號 1D 30M 1D 1D ) IN NS ns4 ns4 IN A 192.168.42.153 www IN A 192.168.42.153
4.修改權限
chmod o= blog.srayban.com.zone chown :named blog.srayban.com.zone
5.測試子域是否配置成功
named-checkconf named-checkzone "blog.srayban.com." /var/named/blog.srayban.com.zone
6.驗證是否成功
dig -t A www.blog.srayban.com @192.168.42.150 ; <<>> DiG 9.9.4-RedHat-9.9.4-38.el7_3.3 <<>> -t A www.blog.srayban.com @192.168.42.150 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60741 ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 2 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;www.blog.srayban.com. IN A ;; ANSWER SECTION: www.blog.srayban.com. 3600 IN A 192.168.42.153 ;; AUTHORITY SECTION: blog.srayban.com. 3600 IN NS ns4.blog.srayban.com. ;; ADDITIONAL SECTION: ns4.blog.srayban.com. 3600 IN A 192.168.42.153 ;; Query time: 1 msec ;; SERVER: 192.168.42.150#53(192.168.42.150) ;; WHEN: Wed May 24 17:01:21 CST 2017 ;; MSG SIZE rcvd: 99
原創文章,作者:srayban,如若轉載,請注明出處:http://www.www58058.com/76833
主要介紹了linux 下named服務的正向解析,反向解析,named有關集群配置及子域授權,內容寫的很詳盡,排版非常好,加油!