1.配置DNS的正向解析
首先关闭SELinux,关闭防火墙
[root@server ~]# setenforce 0
[root@server ~]# systemctl stop firewalld
第一步:服务端操作,配置DNS主配置文件
options {
listen-on port 53 { any; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
secroots-file "/var/named/data/named.secroots";
recursing-file "/var/named/data/named.recursing";
allow-query { any; };
第二步:编辑区域配置文件,建议在原有模板上修改
zone "openlab.com" IN {
type master;
file "openlab.com.zone";
allow-update { none; };
};
第三步:编辑数据配置文件,建议拷贝一个模板在进行编写
[root@server named]# ls
data dynamic named.ca named.empty named.localhost named.loopback slaves
[root@server named]# cp -a named.localhost openlab.com.zone
$TTL 1D
openlab.com. IN SOA ns.openlab.com. andy.qq.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
openlab.com. IN NS ns.openlab.com.
ns.openlab.com. IN A 192.168.253.128
www.openlab.com. IN A 192.168.253.128
www1.openlab.com. IN CNAME www.openlab.com.
第四步:重启服务并在客户端测试
[root@node1 ~]# nslookup
> www.openlab.com
Server: 192.168.253.128
Address: 192.168.253.128#53
2.配置DNS的反向解析
第一步:服务端基于上例,继续往下做,编辑区域文件,还是选择一个模板进行修改
zone "253.168.192.in-addr.arpa" IN {
type master;
file "192.168.253.arpa";
allow-update { none; };
};
第二步:服务端操作,编辑数据配置文件,复制一份反向解析模版进行修改
[root@server named]# cp -a named.loopback 192.168.253.arpa
$TTL 1D
@ IN SOA ns.openlab.com. jenny.qq.com. (
0 ; serial
1D ; refresh
1H ; retry
1W ; expire
3H ) ; minimum
NS ns.openlab.com.
128 IN PTR ns.openlab.com.
128 IN PTR www.openlab.com.
第三步:重启服务,并且在客户端进行测试
[root@server named]# systemctl start named
[root@node1 ~]# nslookup
> 192.168.253.128
128.253.168.192.in-addr.arpa name = ns.openlab.com.
128.253.168.192.in-addr.arpa name = www.openlab.com.