Centos7搭建主從DNS服務(wù)器的教程
1、準(zhǔn)備
例:兩臺192.168.11.10(主),192.168.11.11(從),域名www.test1.com
# 主從DNS服務(wù)器均需要安裝bind、bind-chroot、bind-utils yum -y install bind bind-utils bind-chroot # 如果防火墻開啟,配置防火墻,添加服務(wù)(防火墻已禁用則忽略) firewall-cmd --permanent --add-service=dns firewall-cmd --reload
2、主DNS服務(wù)器(192.168.11.10)配置
# 編輯配置文件 vim /etc/named.conf # 找到其中兩行 listen-on port 53 { 127.0.0.1; }; allow-query { localhost; }; # 修改為 listen-on port 53 { any; }; allow-query { any; };
3、配置正向解析
# 編輯文件/etc/named.rfc1912.zones,在末尾添加需要解析的域 zone "test1.com" IN { type master; file "data/test1.com.zone"; }; # 創(chuàng)建test1.com.zone解析域 vim /var/named/data/test1.com.zone $TTL 3H @ IN SOA test1.com. root ( 20180928 ; serial 1D ; refresh 1H ; retry 1W ; expire 3H ) ; minimum IN NS @ IN A 192.168.11.10 www IN A 192.168.11.10 ftp IN A 192.168.11.10 # 編輯/etc/resolv.conf,添加 search localdomain nameserver 192.168.11.10
4、重啟DNS服務(wù)器
# 重啟named systemctl restart named # 查看狀態(tài) systemctl status named
5、檢查解析是否成功
# ping命令驗證 ping -c 4 www.test1.com # 輸出如下即解析成功 PING www.test1.com (192.168.11.10) 56(84) bytes of data. 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=1 ttl=64 time=0.033 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=2 ttl=64 time=0.058 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=3 ttl=64 time=0.066 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=4 ttl=64 time=0.057 ms --- www.test1.com ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.033/0.053/0.066/0.014 ms # nslookup命令驗證 nslookup >www.test1.com # 輸出如下即解析成功 Server: 192.168.11.10 Address: 192.168.11.10#53 Name: www.test1.com Address: 192.168.11.10
6、配置反向解析
# 編輯文件/etc/named.rfc1912.zones,在末尾添加 vim etc/named.rfc1912.zones zone "11.168.192.in-addr.arpa" IN { type master; file "data/11.168.192.zone"; }; # 創(chuàng)建11.168.192.zone解析域 vim /var/named/data/11.168.192.zone $TTL 3H @ IN SOA web3.com. root ( 20180928; serial 1D ; refresh 1H ; retry 1W ; expire 3H ) ; minimum @ IN NS www.test1.com. 10 IN PTR www.test1.com. 10 IN PTR ftp.test1.com.
7、重啟DNS服務(wù)器
# 重啟named systemctl restart named # 查看狀態(tài) systemctl status named
8、檢查解析是否成功
# ping命令驗證 ping -c 4 192.168.11.10 # 輸出如下即解析成功 PING 192.168.11.10 (192.168.11.10) 56(84) bytes of data. 64 bytes from 192.168.11.10: icmp_seq=1 ttl=64 time=0.061 ms 64 bytes from 192.168.11.10: icmp_seq=2 ttl=64 time=0.058 ms 64 bytes from 192.168.11.10: icmp_seq=3 ttl=64 time=0.081 ms 64 bytes from 192.168.11.10: icmp_seq=4 ttl=64 time=0.060 ms --- 192.168.11.10 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.058/0.065/0.081/0.009 ms # nslookup命令驗證 nslookup 192.168.11.10 # 輸出如下即解析成功 Server: 192.168.11.10 Address: 192.168.11.10#53 10.11.168.192.in-addr.arpa name = ftp.test1.com. 10.11.168.192.in-addr.arpa name = www.test1.com.
9、配置從DNS服務(wù)器(192.168.11.11)
# 先修改主DNS服務(wù)器(192.168.11.10)的配置/etc/named.rfc1912.zones vim /etc/named.rfc1912.zones zone "test1.com" IN { type master; file "data/test1.com.zone"; allow-transfer {192.168.11.11;}; notify yes; also-notify {192.168.11.11;}; }; zone "11.168.192.in-addr.arpa" IN { type master; file "data/11.168.192.zone"; allow-transfer {192.168.11.11;}; notify yes; also-notify {192.168.11.11;}; };
10、配置從DNS服務(wù)器(192.168.11.11)正向解析
# 編輯named.conf文件 vim /etc/named.conf # 找到其中兩行 listen-on port 53 { 127.0.0.1; }; allow-query { localhost; }; # 修改為 listen-on port 53 { any; }; allow-query { any; }; # 編輯文件/etc/named.rfc1912.zones,在末尾添加需要解析的域 vim /etc/named.rfc1912.zones zone "test1.com" IN { type slave; file "data/test1.com.zone"; }; masters { 192.168.11.10; }; # 創(chuàng)建test1.com.zonek空文件 touch /var/named/data/test1.com.zone # 設(shè)置所有者 chown named:named test1.com.zone # 編輯/etc/resolv.conf,添加 vim /etc/resolv.conf search localdomain nameserver 192.168.11.11
11、重啟DNS服務(wù)器
# 重啟named systemctl restart named # 查看狀態(tài) systemctl status named
12、檢測解析是否成功
# ping命令驗證 ping -c 4 www.test1.com # 輸出如下即解析成功 PING www.test1.com (192.168.11.10) 56(84) bytes of data. 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=1 ttl=64 time=0.033 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=2 ttl=64 time=0.058 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=3 ttl=64 time=0.066 ms 64 bytes from ftp.test1.com (192.168.11.10): icmp_seq=4 ttl=64 time=0.057 ms --- www.test1.com ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.033/0.053/0.066/0.014 ms # nslookup命令驗證 nslookup >www.test1.com # 輸出如下即解析成功 Server: 192.168.11.11 Address: 192.168.11.11#53 Name: www.test1.com Address: 192.168.11.10
13、配置從DNS服務(wù)器(192.168.11.11)反向解析
# 在文件/etc/named.rfc1912.zones中添加 vim etc/named.rfc1912.zones zone "11.168.192.in-addr.arpa" IN { type master; file "data/11.168.192.zone"; masters { 192.168.11.10; }; }; # 創(chuàng)建空文件11.168.192.zone touch /var/named/data/11.168.192.zone # 設(shè)置所有者 chown named:named 11.168.192.zone
14、重啟DNS服務(wù)器
# 重啟named systemctl restart named # 查看狀態(tài) systemctl status named
15、查看文件/var/named/data/test1.com.zone和/var/named/data/11.168.192.zone是否有二進制數(shù)據(jù)
cat /var/named/data/test1.com.zone cat /var/named/data/11.168.192.zone
16、檢查解析是否成功
# ping命令驗證 ping -c 4 192.168.11.11 # 輸出如下即解析成功 PING 192.168.11.11 (192.168.11.11) 56(84) bytes of data. 64 bytes from 192.168.11.11: icmp_seq=1 ttl=64 time=0.061 ms 64 bytes from 192.168.11.11: icmp_seq=2 ttl=64 time=0.058 ms 64 bytes from 192.168.11.11: icmp_seq=3 ttl=64 time=0.081 ms 64 bytes from 192.168.11.11: icmp_seq=4 ttl=64 time=0.060 ms --- 192.168.11.11 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.058/0.065/0.081/0.009 ms # nslookup命令驗證 nslookup 192.168.11.11 # 輸出如下即解析成功 Server: 192.168.11.11 Address: 192.168.11.11#53 10.11.168.192.in-addr.arpa name = ftp.test1.com. 10.11.168.192.in-addr.arpa name = www.test1.com.
總結(jié)
以上所述是小編給大家介紹的Centos7搭建主從DNS服務(wù)器的教程,希望對大家有所幫助,如果大家有任何疑問請給我留言,小編會及時回復(fù)大家的。在此也非常感謝大家對腳本之家網(wǎng)站的支持!
如果你覺得本文對你有幫助,歡迎轉(zhuǎn)載,煩請注明出處,謝謝!
相關(guān)文章
Apache Shiro 使用手冊(一) Shiro架構(gòu)介紹
Apache Shiro是一個強大易用的Java安全框架,提供了認(rèn)證、授權(quán)、加密和會話管理等功能2014-06-06centos7修改網(wǎng)關(guān)和配置ip的方法示例
這篇文章主要介紹了centos7修改網(wǎng)關(guān)和配置ip的方法示例,文中通過示例代碼介紹的非常詳細(xì),對大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價值,需要的朋友們下面隨著小編來一起學(xué)習(xí)學(xué)習(xí)吧2019-08-08Linux上通過SSH掛載遠(yuǎn)程文件系統(tǒng)方法詳解
在本篇內(nèi)容里小編給大家整理了關(guān)于在Linux上通過SSH掛載遠(yuǎn)程文件系統(tǒng)的相關(guān)知識點,需要的朋友們跟著學(xué)習(xí)下。2019-03-03你知道一臺Linux服務(wù)器可以負(fù)載多少個連接嗎
這篇文章主要給大家介紹了關(guān)于一臺Linux服務(wù)器可以負(fù)載多少個連接的相關(guān)資料,文中通過示例代碼介紹的非常詳細(xì),對大家學(xué)習(xí)或者使用Linux服務(wù)器具有一定的參考學(xué)習(xí)價值,需要的朋友們下面來一起學(xué)習(xí)學(xué)習(xí)吧2019-09-09Linux UDP socket 設(shè)置為的非阻塞模式與阻塞模式區(qū)別
這篇文章主要介紹了Linux UDP socket 設(shè)置為的非阻塞模式與阻塞模式區(qū)別的相關(guān)資料,需要的朋友可以參考下2017-02-02