[iyunv@server named]# vim /etc/named.conf
zone "yangbb123.com." IN {
type master;
file "yangbb123.com.zone";
};
zone "1.168.192.in-addr.arpa" IN {
type master;
file "192.168.1.zone";
}; #添加此两个zone
编辑正向解析配置文件:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
[iyunv@server named]# vim /var/named/yangbb123.com.zone
$TTL 1D
@ IN SOA ns1.yangbb123.com. admin.yangbb123.com. (
2015092604 #序列号
2H #刷新时间
5M #重试时间
2D #过期时间
1D #否认最小TTL时间
)
@ IN NS ns1
@ IN NS ns2
@ IN MX 10 mail
ns1 IN A 192.168.1.121
ns2 IN A 192.168.1.122
www IN A 192.168.1.121
www IN A 192.168.1.122
mail IN A 192.168.1.121
ftp IN A 192.168.1.121
web IN CNAME www
编辑反向解析配置文件:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
[iyunv@server named]# vim 192.168.1.zone
$TTL 1D
@ IN SOA ns1.yangbb123.com. admin.yangbb123.com.(
2015092601
2H
5M
2D
1D
)
@ IN NS ns1.yangbb123.com.
@ IN NS ns2.yangbb123.com.
121 IN PTR ns1.yangbb123.com.
122 IN PTR ns2.yangbb123.com.
121 IN PTR www.yangbb123.com.
121 IN PTR mmai.yangbb123.com
121 IN PTR ftp.yangbb123.com.
查看两个配置文件的权限是否为640以及属主:属组--root:named
通过命令来检查是否有语法错误:
1
2
3
4
5
[iyunv@server named]# named-checkconf #检查主配置文件
[iyunv@server named]# named-checkzone yangbb123.com yangbb123.com.zone #检查区域文件语法
zone yangbb123.com/IN: tech.yangbb123.com/NS 'dns.tech.yangbb123.com' (out of zone) has no addresses records (A or AAAA)
zone yangbb123.com/IN: loaded serial 2015092604
OK
没有问题,就重启服务 services named restart
dig [-t type] name [@SERVER] [query options]
查询选项:
+[no]trace:跟踪解析过程
+[no]recurse:进行递归解析
1
2
3
4
5
6
7
8
9
10
11
12
13
14
[iyunv@server named]# dig -t NS yangbb123.com @192.168.1.121 #DNS的解析
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.4 <<>> -t NS yangbb123.com @192.168.1.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6725
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2
;; QUESTION SECTION:
;yangbb123.com. IN NS
;; ANSWER SECTION:
yangbb123.com. 86400 IN NS ns2.yangbb123.com.
yangbb123.com. 86400 IN NS ns1.yangbb123.com.
;; ADDITIONAL SECTION:
ns1.yangbb123.com. 86400 IN A 192.168.1.121
ns2.yangbb123.com. 86400 IN A 192.168.1.122
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
[iyunv@server named]# dig -x 192.168.1.121 @192.168.1.121 #反向解析正常
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.37.rc1.el6_7.4 <<>> -x 192.168.1.121 @192.168.1.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50583
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 2, ADDITIONAL: 2
;; QUESTION SECTION:
;121.1.168.192.in-addr.arpa. IN PTR
;; ANSWER SECTION:
121.1.168.192.in-addr.arpa. 86400 IN PTR ns1.yangbb123.com.
121.1.168.192.in-addr.arpa. 86400 IN PTR www.yangbb123.com.
121.1.168.192.in-addr.arpa. 86400 IN PTR mmai.yangbb123.com.1.168.192.in-addr.arpa.
121.1.168.192.in-addr.arpa. 86400 IN PTR ftp.yangbb123.com.
;; AUTHORITY SECTION:
1.168.192.in-addr.arpa. 86400 IN NS ns1.yangbb123.com.
1.168.192.in-addr.arpa. 86400 IN NS ns2.yangbb123.com.