一、DNS正向解析[解析域名]
環境:
red hat linux 6.3
DNS-SERVER:192.168.122.1
DNS-CLIETNS:192.168.122.6
1.安轉與配置DNS服務器 【server】
#yum install bind bind-chroot bind-utils -y
#vim /etc/named.conf
..
listen-on port 53 { any; };
listen-on-v6 port 53 { :::; }; #注意::1是隻監聽localhost【本地】
...
allow-query { any; };
//include "/etc/named.root.key";
指定讀取規則:
#vim /etc/named.rfc1912.zones
...
zone "example.com" IN {
type master;
file "example.com.zone"; //這個是你的域文件的名稱
allow-update { none; };
};
啓動named
#/etc/init.d/named start
生成模板 (注意/var/named路徑只有在named正常啓動後纔會有)
#cp -p /var/named/named.localhost /var/named/example.com.zone
編寫規則
#vim /var/named/example.com.zone
$TTL 1D
@ IN SOA instructor.example.com. root.example.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS instructor.example.com
instructor.example.com A 192.168.122.1
server2.example.com A 192.168.122.2
server3.example.com A 192.168.122.3
server4 A 192.168.122.4
…
注:上面的server4是跟前面/etc/named.rfc1912.zones中寫zone "example.com" IN中的example.com合成一個域名—server4.example.com
2.測試: 【client】
#vim /etc/resolv.conf
; generated by /sbin/dhclient-script
nameserver 192.168.122.1
search example.com
#dig server4.example.com
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> server4.example.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49794
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;server4.example.com. IN A
;; AUTHORITY SECTION:
example.com. 10800 IN SOA instructor.example.com. root.example.com. 0 86400 3600 604800 10800
;; Query time: 0 msec
;; SERVER: 192.168.122.1#53(192.168.122.1)
;; WHEN: Tue Aug 19 11:55:22 2014
;; MSG SIZE rcvd: 89
二、DNS反向解析[對IP進行解析]
1.配置DNS服務器 【server】
#vim /etc/named.rfc1912.zones
...
zone "122.168.192.in-addr.arpa" IN {
type master;
file "westos.com.ptr";
//這裏指定了要讀的文件的名稱
allow-update { none; };
};
...
編寫westos.com.ptr文件:
#vim /var/named/westos.com.ptr
$TTL 1D
@ IN SOA xian.example.com. root.example.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS xian.example.com.
xian.example.com. A 192.168.122.2
2 PTR www.westos.com.
9 PTR www.westos.com.
三、DNS雙向解析
注:雙向解析不是說正反向解析,而是如正向解析時,內網和外網等不同網段的IP去訪問同一個域名的時候,進入了不同的域模塊。
1.配置DNS服務器 【server】
#vim /etc/namd.conf
//這裏必須屏蔽掉,不然啓動會有報錯
//zone "." IN {
// type hint;
// file "named.ca";
//};
#這個是本地訪問的時候訪問的文件
view localnet{
match-clients { localhost ;};
match-destinations { localhost; };
zone "westos.com" IN {
type master;
file "westos.com.zone";
allow-update { none; };
};
};
#這個是非本地訪問的文件
view internet{
match-clients { any ;};
match-destinations { any ; };
zone "westos.com" IN {
type master;
file "westos.com1.zone";
allow-update { none; };
};
#這個也必須屏蔽掉,不然啓動也會有報錯
//include "/etc/named.rfc1912.zones";
//include "/etc/named.root.key";
#vim /var/named/westos.com.zone
$TTL 1D
@ IN SOA xian.example.com. root.example.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS xian.example.com.
xian.example.com. A 192.168.122.1
www A 192.168.122.1
#vim /var/named/westos.com1.zone
$TTL 1D
@ IN SOA xian.example.com. root.example.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS xian.example.com.
xian.example.com. A 192.168.122.1
www A 192.168.122.6
本地(192.168.122.1)訪問:【server】
#dig www.westos.com
;; QUESTION SECTION:
;www.westos.com. IN A
;; ANSWER SECTION:
www.westos.com. 86400 IN A 192.168.122.1
客戶端(192.168.122.6)訪問: 【client】
#dig www.westos.com
;; QUESTION SECTION:
;www.westos.com. IN A
;; ANSWER SECTION:
www.westos.com. 86400 IN A 192.168.122.6
ANY QUSTIONS
Mail: [email protected]