DNS服务器主从复制,子域授权
主服务器:10.120.123.13
从服务器:10.120.123.250
子服务器:10.120.123.251
从服务器的主配置文件:/etc/named.conf
options { Listen-on port 53 { 10.120.123.250; }; //定义监听的端口以及监听ip //Listen-on-v6 port 53 { ::1; }; //关闭IPv6 查询 directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; recursing-file "/var/named/data/named.recursing"; secroots-file "/var/named/data/named.secroots"; allow-query { any; }; recursion yes; //允许递归 dnssec-enable no; //关闭DNS安全相关 dnssec-valIDation no; //关闭DNS安全相关 bindkeys-file "/etc/named.iscdlv.key"; managed-keys-directory "/var/named/dynamic"; pID-file "/run/named/named.pID"; session-keyfile "/run/named/session.key";};logging { //日志相关的配置 channel default_deBUG { file "data/named.run"; severity dynamic; };};zone "." IN { //定义根区域 type hint; file "named.ca";};include "/etc/named.rfc1912.zones";include "/etc/named.root.key";
从服务器定义区域解析库文件:/etc/named.rfc1912.zones
zone "test.com" IN { type slave; //定义服务类型slave file "slaves/test.com.zone"; masters { 10.120.123.13; }; //定义主服务器地址 masterfile-format text; //定义格式,解决服务器区域文件乱码};zone "123.120.10.in-addr.arpa" IN { type slave; //定义服务类型slave file "slaves/10.120.123.zone"; masters { 10.120.123.13; }; //定义主服务器地址 masterfile-format text; //定义格式,解决服务器区域文件乱码};
主服务器区域解析库文件(/var/named/test.com.zone): 增加NS记录
$TTL 3600$ORIGIN test.com.@ IN SOA ns1.test.com. dnsadmin.test.com. ( 2019010818 1H 10M 3D 1D ) IN NS ns1 IN NS ns2 //从服务器 IN MX 10 mx1 IN MX 20 mx2ns1 IN A 10.120.123.13ns2 IN A 10.120.123.250 //从服务器mx1 IN A 10.120.123.252mx2 IN A 10.120.123.253www IN A 10.120.123.254web IN Cname wwwops IN NS ns1.ops //子域授权ns1.ops IN A 10.120.123.251$TTL 3600$ORIGIN 123.120.10.in-addr.arpa.@ IN SOA ns1.test.com. nsadmin.test.com. ( 2019010802 1H 10M 3D 12H ) IN NS ns1.test.com. IN NS ns2.test.com. //从服务器13 IN PTR ns1.test.com.250 IN PTR ns2.test.com. //从服务器252 IN PTR mx1.test.com.253 IN PTR mx2.test.com.254 IN PTR www.test.com.
子域区域解析库文件(/var/named/ops.test.com.zone)
$TTL 3600 $ORIGIN ops.test.com.@ IN SOA ns1.ops.test.com. nsadmin.ops.test.com. ( 2019022401 1H 10M 1D 2H ) IN NS ns1ns1 IN A 10.120.123.251www IN A 10.120.123.251
主服务器重载主配置
rndc reload
从服务器开启服务
systemctl restart named.service
从服务器测试
完全区域传送dig -t axfr test.com @10.120.123.13正向解析dig -t A www.test.com @10.120.123.250反向解析dig -x 10.120.123.13 @10.120.123.250
子域测试
dig www.ops.test.com @10.120.123.13 //主dig www.ops.test.com @10.120.123.250 //从dig www.ops.test.com @10.120.123.251 //子总结
以上是内存溢出为你收集整理的Linux 基础知识(十)DNS服务器主从复制,子域授权全部内容,希望文章能够帮你解决Linux 基础知识(十)DNS服务器主从复制,子域授权所遇到的程序开发问题。
如果觉得内存溢出网站内容还不错,欢迎将内存溢出网站推荐给程序员好友。
欢迎分享,转载请注明来源:内存溢出
评论列表(0条)