Bv9ARM.ch03.html revision 990d0e893f5b70e735cdf990af66e9ec6e91fa78
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd - Copyright (C) 2004-2014 Internet Systems Consortium, Inc. ("ISC")
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd - Copyright (C) 2000-2003 Internet Software Consortium.
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd - Permission to use, copy, modify, and/or distribute this software for any
a3d2b657dd7ca66251b562b6a82c2335135b9172nd - purpose with or without fee is hereby granted, provided that the above
031b91a62d25106ae69d4693475c79618dd5e884fielding - copyright notice and this permission notice appear in all copies.
031b91a62d25106ae69d4693475c79618dd5e884fielding - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
031b91a62d25106ae69d4693475c79618dd5e884fielding - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
031b91a62d25106ae69d4693475c79618dd5e884fielding - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
031b91a62d25106ae69d4693475c79618dd5e884fielding - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
a3d2b657dd7ca66251b562b6a82c2335135b9172nd - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
a3d2b657dd7ca66251b562b6a82c2335135b9172nd - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
a3d2b657dd7ca66251b562b6a82c2335135b9172nd - PERFORMANCE OF THIS SOFTWARE.
a3d2b657dd7ca66251b562b6a82c2335135b9172nd<!-- $Id$ -->
a3d2b657dd7ca66251b562b6a82c2335135b9172nd<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
a3d2b657dd7ca66251b562b6a82c2335135b9172nd<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<link rel="start" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<link rel="prev" href="Bv9ARM.ch02.html" title="Chapter�2.�BIND Resource Requirements">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<link rel="next" href="Bv9ARM.ch04.html" title="Chapter�4.�Advanced DNS Features">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<tr><th colspan="3" align="center">Chapter�3.�Name Server Configuration</th></tr>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch04.html">Next</a>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<a name="Bv9ARM.ch03"></a>Chapter�3.�Name Server Configuration</h2></div></div></div>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect1"><a href="Bv9ARM.ch03.html#sample_configuration">Sample Configurations</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect2"><a href="Bv9ARM.ch03.html#id2567778">A Caching-only Name Server</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect2"><a href="Bv9ARM.ch03.html#id2567998">An Authoritative-only Name Server</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect1"><a href="Bv9ARM.ch03.html#id2568021">Load Balancing</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect1"><a href="Bv9ARM.ch03.html#id2568375">Name Server Operations</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect2"><a href="Bv9ARM.ch03.html#id2568380">Tools for Use With the Name Server Daemon</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<dt><span class="sect2"><a href="Bv9ARM.ch03.html#id2569449">Signals</a></span></dt>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd In this chapter we provide some suggested configurations along
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd with guidelines for their use. We suggest reasonable values for
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd certain option settings.
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<a name="sample_configuration"></a>Sample Configurations</h2></div></div></div>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<a name="id2567778"></a>A Caching-only Name Server</h3></div></div></div>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd The following sample configuration is appropriate for a caching-only
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd name server for use by clients internal to a corporation. All
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd from outside clients are refused using the <span><strong class="command">allow-query</strong></span>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd option. Alternatively, the same effect could be achieved using
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd firewall rules.
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// Two corporate subnets we wish to allow queries from.
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // Working directory
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd allow-query { corpnets; };
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// Provide a reverse mapping for the loopback
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// address 127.0.0.1
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd type master;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd notify no;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<a name="id2567998"></a>An Authoritative-only Name Server</h3></div></div></div>
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd This sample configuration is for an authoritative-only server
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd that is the master server for "<code class="filename">example.com</code>"
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd and a slave for the subdomain "<code class="filename">eng.example.com</code>".
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // Working directory
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // Do not allow access to cache
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd allow-query-cache { none; };
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // This is the default
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd allow-query { any; };
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // Do not provide recursive service
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd recursion no;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// Provide a reverse mapping for the loopback
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// address 127.0.0.1
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd type master;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd notify no;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// We are the master server for example.com
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd type master;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // IP addresses of slave servers allowed to
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd allow-transfer {
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd 192.168.4.14;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd 192.168.5.53;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd// We are a slave server for eng.example.com
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd type slave;
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd // IP address of eng.example.com master server
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd masters { 192.168.4.12; };
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<div class="titlepage"><div><div><h2 class="title" style="clear: both">
d78d735dbf7c5ce5ae545eecd8ee2c052224db77nd<a name="id2568021"></a>Load Balancing</h2></div></div></div>
The <span><strong class="command">dig</strong></span>, <span><strong class="command">host</strong></span>, and
<dt><span class="term"><a name="dig"></a><span><strong class="command">dig</strong></span></span></dt>
<div class="cmdsynopsis"><p><code class="command">dig</code> [@<em class="replaceable"><code>server</code></em>] <em class="replaceable"><code>domain</code></em> [<em class="replaceable"><code>query-type</code></em>] [<em class="replaceable"><code>query-class</code></em>] [+<em class="replaceable"><code>query-option</code></em>] [-<em class="replaceable"><code>dig-option</code></em>] [%<em class="replaceable"><code>comment</code></em>]</p></div>
<div class="cmdsynopsis"><p><code class="command">host</code> [-aCdlnrsTwv] [-c <em class="replaceable"><code>class</code></em>] [-N <em class="replaceable"><code>ndots</code></em>] [-t <em class="replaceable"><code>type</code></em>] [-W <em class="replaceable"><code>timeout</code></em>] [-R <em class="replaceable"><code>retries</code></em>] [-m <em class="replaceable"><code>flag</code></em>] [-4] [-6] <em class="replaceable"><code>hostname</code></em> [<em class="replaceable"><code>server</code></em>]</p></div>
<div class="cmdsynopsis"><p><code class="command">nslookup</code> [-option...] [[<em class="replaceable"><code>host-to-find</code></em>] | [- [server]]]</p></div>
<a name="named-checkconf"></a><span class="term"><span><strong class="command">named-checkconf</strong></span></span>
<div class="cmdsynopsis"><p><code class="command">named-checkconf</code> [-jvz] [-t <em class="replaceable"><code>directory</code></em>] [<em class="replaceable"><code>filename</code></em>]</p></div>
<a name="named-checkzone"></a><span class="term"><span><strong class="command">named-checkzone</strong></span></span>
<div class="cmdsynopsis"><p><code class="command">named-checkzone</code> [-djqvD] [-c <em class="replaceable"><code>class</code></em>] [-o <em class="replaceable"><code>output</code></em>] [-t <em class="replaceable"><code>directory</code></em>] [-w <em class="replaceable"><code>directory</code></em>] [-k <em class="replaceable"><code>(ignore|warn|fail)</code></em>] [-n <em class="replaceable"><code>(ignore|warn|fail)</code></em>] [-W <em class="replaceable"><code>(ignore|warn)</code></em>] <em class="replaceable"><code>zone</code></em> [<em class="replaceable"><code>filename</code></em>]</p></div>
<a name="named-compilezone"></a><span class="term"><span><strong class="command">named-compilezone</strong></span></span>
Since <acronym class="acronym">BIND</acronym> 9.2, <span><strong class="command">rndc</strong></span>
<div class="cmdsynopsis"><p><code class="command">rndc</code> [-c <em class="replaceable"><code>config</code></em>] [-s <em class="replaceable"><code>server</code></em>] [-p <em class="replaceable"><code>port</code></em>] [-y <em class="replaceable"><code>key</code></em>] <em class="replaceable"><code>command</code></em> [<em class="replaceable"><code>command</code></em>...]</p></div>
<p>See <a href="man.rndc.html" title="rndc"><span class="refentrytitle"><span class="application">rndc</span></span>(8)</a> for details of
<a href="Bv9ARM.ch06.html#controls_statement_definition_and_usage" title="controls Statement Definition and
Usage">the section called “<span><strong class="command">controls</strong></span> Statement Definition and
<span><strong class="command">key</strong></span>, <span><strong class="command">server</strong></span> and
<span><strong class="command">default-server</strong></span>, <span><strong class="command">default-key</strong></span>,
the name of a key as its argument, as defined by a <span><strong class="command">key</strong></span> statement.
<span><strong class="command">key</strong></span> statement in <code class="filename">named.conf</code>.
<span><strong class="command">algorithm</strong></span> and <span><strong class="command">secret</strong></span>.
has two clauses: <span><strong class="command">key</strong></span> and <span><strong class="command">port</strong></span>.