Bv9ARM.ch01.html revision 9c6a5d1f22f972232d7a9fd5c5fa64f10bacbdff
794b79e6bbc3f5db1ea6ae154d739b9f1ef1a375Tinderbox User - Copyright (C) 2004-2009 Internet Systems Consortium, Inc. ("ISC")
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Copyright (C) 2000-2003 Internet Software Consortium.
4a14ce5ba00ab7bc55c99ffdcf59c7a4ab902721Automatic Updater - Permission to use, copy, modify, and distribute this software for any
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - purpose with or without fee is hereby granted, provided that the above
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - copyright notice and this permission notice appear in all copies.
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - PERFORMANCE OF THIS SOFTWARE.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<!-- $Id: Bv9ARM.ch01.html,v 1.45 2009/02/26 01:12:16 tbox Exp $ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<link rel="prev" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<link rel="next" href="Bv9ARM.ch02.html" title="Chapter�2.�BIND Resource Requirements">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<table width="100%" summary="Navigation header">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<tr><th colspan="3" align="center">Chapter�1.�Introduction</th></tr>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<a accesskey="p" href="Bv9ARM.html">Prev</a>�</td>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch02.html">Next</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h2 class="title">
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<a name="Bv9ARM.ch01"></a>Chapter�1.�Introduction</h2></div></div></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect1"><a href="Bv9ARM.ch01.html#id2563409">Scope of Document</a></span></dt>
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews<dt><span class="sect1"><a href="Bv9ARM.ch01.html#id2564388">Organization of This Document</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect1"><a href="Bv9ARM.ch01.html#id2564528">Conventions Used in This Document</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="sect1"><a href="Bv9ARM.ch01.html#id2564641">The Domain Name System (<acronym class="acronym">DNS</acronym>)</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2564662">DNS Fundamentals</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2564696">Domains and Domain Names</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2567170">Zones</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2567246">Authoritative Name Servers</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2567419">Caching Name Servers</a></span></dt>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<dt><span class="sect2"><a href="Bv9ARM.ch01.html#id2567549">Name Servers in Multiple Roles</a></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The Internet Domain Name System (<acronym class="acronym">DNS</acronym>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein consists of the syntax
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to specify the names of entities in the Internet in a hierarchical
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User manner, the rules used for delegating authority over names, and the
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User system implementation that actually maps names to Internet
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein addresses. <acronym class="acronym">DNS</acronym> data is maintained in a
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User group of distributed
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User hierarchical databases.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2563409"></a>Scope of Document</h2></div></div></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User The Berkeley Internet Name Domain
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein (<acronym class="acronym">BIND</acronym>) implements a
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User domain name server for a number of operating systems. This
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User document provides basic information about the installation and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein care of the Internet Systems Consortium (<acronym class="acronym">ISC</acronym>)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> version 9 software package for
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User system administrators.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User This version of the manual corresponds to BIND version 9.6.
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2564388"></a>Organization of This Document</h2></div></div></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User In this document, <span class="emphasis"><em>Chapter 1</em></span> introduces
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User the basic <acronym class="acronym">DNS</acronym> and <acronym class="acronym">BIND</acronym> concepts. <span class="emphasis"><em>Chapter 2</em></span>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User describes resource requirements for running <acronym class="acronym">BIND</acronym> in various
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein environments. Information in <span class="emphasis"><em>Chapter 3</em></span> is
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <span class="emphasis"><em>task-oriented</em></span> in its presentation and is
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User organized functionally, to aid in the process of installing the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <acronym class="acronym">BIND</acronym> 9 software. The task-oriented
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User section is followed by
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <span class="emphasis"><em>Chapter 4</em></span>, which contains more advanced
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein concepts that the system administrator may need for implementing
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User certain options. <span class="emphasis"><em>Chapter 5</em></span>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User describes the <acronym class="acronym">BIND</acronym> 9 lightweight
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein resolver. The contents of <span class="emphasis"><em>Chapter 6</em></span> are
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User organized as in a reference manual to aid in the ongoing
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User maintenance of the software. <span class="emphasis"><em>Chapter 7</em></span> addresses
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein security considerations, and
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <span class="emphasis"><em>Chapter 8</em></span> contains troubleshooting help. The
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User main body of the document is followed by several
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>appendices</em></span> which contain useful reference
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User information, such as a <span class="emphasis"><em>bibliography</em></span> and
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User historic information related to <acronym class="acronym">BIND</acronym>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and the Domain Name
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User<div class="titlepage"><div><div><h2 class="title" style="clear: both">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="id2564528"></a>Conventions Used in This Document</h2></div></div></div>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User In this document, we use the following general typographic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>To describe:</em></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="emphasis"><em>We use the style:</em></span>
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User a pathname, filename, URL, hostname,
61e1dc26d62c2a0059e3ca7efe2ad0f4a5b8df92Mark Andrews mailing list name, or new term or concept
2eeb74d1cf5355dd98f6d507a10086e16bb08c4bTinderbox User <strong class="userinput"><code>Fixed Width Bold</code></strong>
<a name="id2564641"></a>The Domain Name System (<acronym class="acronym">DNS</acronym>)</h2></div></div></div>
The data stored in the DNS is identified by <span class="emphasis"><em>domain names</em></span> that are organized as a tree according to
The data for each zone is stored in a <span class="emphasis"><em>name server</em></span>, which answers queries about the zone using the
form of <span class="emphasis"><em>resource records</em></span> (<acronym class="acronym">RR</acronym>s).
<a href="Bv9ARM.ch06.html#types_of_resource_records_and_when_to_use_them" title="Types of Resource Records and When to Use Them">the section called “Types of Resource Records and When to Use Them”</a>.
<a href="Bv9ARM.ch09.html#rfcs" title="Request for Comments (RFCs)">the section called “Request for Comments (RFCs)”</a>.
<span><strong class="command">dig</strong></span> (<a href="Bv9ARM.ch03.html#diagnostic_tools" title="Diagnostic Tools">the section called “Diagnostic Tools”</a>).
at the <span class="emphasis"><em>top level</em></span> or <span class="emphasis"><em>apex</em></span>
that can do it, and that server would query the Internet <acronym class="acronym">DNS</acronym> servers