實驗須知:node
192.168.1.11做爲實驗主機1,vim
192.168.1.12做爲實驗主機2緩存
1. 緩存服務器的配置bash
(1) 首先安裝bind服務器
(2) 在主配置文件/etc/named.conf註釋相應內容(如dnssec相關的)網絡
#yum install bind –y #service named start #ss–tnlp | grep :53 # cp /etc/named.conf{,.bak} #vim /etc/named.conf options{ listen-on port 53 { 127.0.0.1; 192.168.1.11;}; //listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file"/var/named/data/named_stats.txt"; memstatistics-file"/var/named/data/named_mem_stats.txt"; // allow-query { localhost; }; recursion yes; dnssec-enable no; dnssec-validation no; //dnssec-lookaside auto; /* Path to ISC DLV key */ // bindkeys-file"/etc/named.iscdlv.key"; // managed-keys-directory"/var/named/dynamic"; }; #service named restart [root@node1named]# ss -tnlp | grep 53 LISTEN 0 3 127.0.0.1:53 *:* users:(("named",4968,20)) ……
到這裏咱們的緩存服務器就配置完成了ide
2. 配置主DNS服務器(正向、反向)oop
方法:測試
(1) 在緩存服務器的基礎上,在主配置文件中/etc/named.rfc1912.zone添加區域zonespa
(2) 在/var/named/目錄中給定義的域添加區域解析庫文件
(1)正向區域的配置
具體實現步驟:
[root@node1 ~]# vim /etc/named.rfc1912.zones …… //添加區域: zone"tanjie.com." IN { type master; file "tanjie.com.zone"; }; [root@node1 ~]#cd /var/named/ [root@node1 named]# ls data dynamic named.ca named.empty named.localhost named.loopback slaves [root@node1 named]# vim tanjie.com.zone $TTL 1D @ IN SOA ns1.tanjie.com. admin.tanjie.com( 2015081501 2H 5M 3D 2D ) IN NS ns1 IN NS ns2 IN MX 10 mx1 IN MX 20 mx2 ns1 IN A 192.168.1.11 ns2 IN A 192.168.1.12 mx1 IN A 192.168.1.13 mx2 IN A 192.168.1.14 www IN CNAME ns1 ftp IN CNAME ns2 [root@node1named]# named-checkconf [root@node1 named]# named-checkzone"tanjie.com" /var/named/tanjie.com.zone zone tanjie.com/IN: loaded serial 2015081501 OK [root@node1 named]# chmod 640 tanjie.com.zone [root@node1 named]# chown :named tanjie.com.zone [root@node1 named]# service named restart [root@node1 named]# rndc reload
到這裏咱們的主DNS服務器正向區域的就配置好了,下面對其進行3個測試:
[root@node1named]# dig -t A ns1.tanjie.com @192.168.1.11 ………. ;; QUESTION SECTION: ;ns1.tanjie.com. IN A ;; ANSWER SECTION: ns1.tanjie.com. 86400 IN A 192.168.1.11 ……… [root@node1 named]# dig -t A ns2.tanjie.com@192.168.1.11 ……………… ;; QUESTION SECTION: ;ns2.tanjie.com. IN A ;; ANSWER SECTION: ns2.tanjie.com. 86400 IN A 192.168.1.12 ………………. [root@node1 named]# dig -t CNAME www.tanjie.com @192.168.1.11 ……………….. ;; QUESTION SECTION: ;www.tanjie.com. IN CNAME ;; ANSWER SECTION: www.tanjie.com. 86400 IN CNAME ns1.tanjie.com …………………
都測試成功了
(2)反向區域的配置
【注意:反向區域的名稱必定要網絡地址反寫.in-addr.arpa.】
具體實現步驟: [root@node1 named]# vim /etc/named.rfc1912.zones …..添加…… zone"1.168.192.in-addr.arpa." IN { type master; file "192.168.1.zone"; }; [root@node1 named]# cd /var/named/ [root@node1 named]# vim 192.168.1.zone $TTL 1D $ORIGIN 1.168.192.in-addr.arpa. @ IN SOA ns1.tanjie.com. admin.tanjie.com. ( 2015081511 5H 5M 4D 3D ) IN NS ns1.tanjie.com. IN NS ns2.tanjie.com. 11 IN PTR ns1.tanjie.com. 13 IN PTR stu.tanjie.com. 12 IN PTR www.tanjie.com. 12 IN PTR ns2.tanjie.com. [root@node1 named]# chmod 640 192.168.1.zone [root@node1 named]# chown :named 192.168.1.zone [root@node1 named]# named-checkconf [root@node1 named]# named-checkzone"1.168.192.in-addr.arpa." 192.168.1.zone zone 1.168.192.in-addr.arpa/IN: loaded serial2015081511 OK [root@node1 named]# rndc reload server reload successful 到此咱們的DNS服務器反向解析就配置好了,下面對配置完成的進行測試 [root@node1 named]# dig -x 192.168.1.13 @192.168.1.11 …………….. ;; QUESTION SECTION: ;13.1.168.192.in-addr.arpa. IN PTR ;; ANSWER SECTION: 13.1.168.192.in-addr.arpa. 86400 IN PTR stu.tanjie.com. ……………… [root@node1 named]# dig -x 192.168.1.13 @192.168.1.11 …………….. ;; QUESTION SECTION: ;13.1.168.192.in-addr.arpa. IN PTR ;; ANSWER SECTION: 13.1.168.192.in-addr.arpa. 86400 IN PTR stu.tanjie.com …………………….
測試成功!!!
(3)泛域名解析配置
[root@node1 named]#vim tanjie.com.zone ……添加一項……….. * IN A 192.168.1.10 [root@node1 named]# rndcreload server reloadsuccessful 下面對配置的進行測試 [root@node1 named]# dig -tA SS.tanjie.com @192.168.1.11 ; <<>> DiG9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t A SS.tanjie.com@192.168.1.11 ;; global options: +cmd ;; Got answer: ;;->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26642 ;; flags: qr aa rd ra;QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2 ;; QUESTION SECTION: ;SS.tanjie.com. IN A ;; ANSWER SECTION: SS.tanjie.com. 86400 IN A 192.168.1.10 ………
測試成功!!!
3. 定義DNS主從複製(這裏從服務器地址爲192.168.1.12,主服務器爲192.168.1.11)
方法:
(1) 主服務器區域解析庫文件中必須有1條NS記錄指向從服務器
(2) 從服務器只須要定義區域,無需定義區域解析庫文件。同步之後解析庫文件放在/var/named/slaves/目錄下,
定義從區域的方法: zone "ZONE_NAME" IN { typeslave; masters{ MASTER_IP; }; file"slaves/ZONE_NAME.zone"; };
(1) 定義正向區域主從複製
具體步驟:
1. 在主服務器192.168.1.11的區域解析庫文件中已經有一條NS記錄指向192.168.1.12了,因此就先不定義了
2.下面在從服務器192.168.1.12中安裝bind並定義區域
#yum install bind -y #vim /etc/named.conf options { listen-on port 53 { 127.0.0.1;192.168.12; }; // listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file"/var/named/data/named_stats.txt"; memstatistics-file"/var/named/data/named_mem_stats.txt"; // allow-query { localhost; }; recursion yes; dnssec-enable no; dnssec-validation no; // dnssec-lookaside auto; /* Path to ISC DLV key */ // bindkeys-file"/etc/named.iscdlv.key"; // managed-keys-directory"/var/named/dynamic"; }; #service namedrestart #ss -tnl 檢查53號端口 #ss -unl 檢查53號端口 [root@node2 ~]# vim/etc/named.rfc1912.zones [root@node2 ~]#named-checkconf [root@node2 ~]#rndc reload server reloadsuccessful
到這裏正向主從複製就定義完成了,下面對定義好了進行檢驗:
[root@node2 ~]#cd /var/named/ data/ dynamic/ named.ca named.empty named.localhost named.loopback slaves/ [root@node2 ~]#cd /var/named/slaves/ [root@node2slaves]# ls tanjie.com.zone
能夠發現slaves目錄下多了個區域文件tanjie.com.zone
,就是從主服務器裏面傳送過來的
(2) 定義反向區域主從複製
1. 首先保證主服務器192.168.1.11的反向解析文件的NS記錄有1條指向192.168.1.12。
[root@node1 named]# vim/var/named/192.168.1.zone …………………. IN NS ns1.tanjie.com. IN NS ns2.tanjie.com. 11 IN PTR ns1.tanjie.com. 13 IN PTR stu.tanjie.com. 12 IN PTR www.tanjie.com. 12 IN PTR ns2.tanjie.com.
2. 在從服務器192.168.1.12中配置文件添加區域
[root@node2 slaves]# vim/etc/named.rfc1912.zones …….添加一個區域………….. zone"1.168.192.in-addr.arpa." IN { type slave; masters { 192.168.1.11; }; file "slaves/192.168.1.zone"; }; [root@node2 slaves]#named-checkconf [root@node2 slaves]# rndcreload server reload successful 配置完成,進行後續檢驗: [root@node2 slaves]# ls 192.168.1.zone tanjie.com.zone
發現多了個192.168.1.zone,是從主服務器中同步過來的。