安装
[root@localhost ~]# yum -y install bind*
修改
[root@localhost ~]# cp /etc/named.conf /etc/named.conf.bak # 修改之前先备份一遍
[root@localhost ~]# vi /etc/named.conf
options {
listen-on port 53 { any; }; // 监听在主机的53端口上。any代表监听所有的主机
directory "/var/named"; // 如果此档案底下有规范到正反解的zone file 档名时,该档名预设应该放置在哪个目录底下
// 下面三项是服务的相关统计信息
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { any; }; // 谁可以对我的DNS服务器提出查询请求。any代表任何人
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
forwarders { // 指定上层DNS服务器
192.168.0.1;
};
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
自定义域名解析配置
[root@localhost ~]# vi /etc/named.rfc1912.zones # 比如我们要添加timiguo.com这个域的解析可以添加下面这一段
zone "timiguo.com" IN { // 定义要解析主域名
type master;
file "timiguo.com.zone"; // 具体相关解析的配置文件保存在 /var/named/timiguo.com.zone 文件中
};
自定义timiguo.com.zone文件
[root@ns named]# vi /var/named/timiguo.com.zone
全文如下:
$TTL 86400
@ IN SOA ns.timiguo.com. root (
1 ; serial
1D ; refresh
1H ; retry
1W ; expire
0 ) ; minimum
@ IN NS ns.timiguo.com.
ns IN A 192.168.0.100
www IN A 192.168.0.100
其中 ns.timiguo.com 代表当前dns服务器名称。所以 ns.timiguo.com 一定要解析到自己本身
chown root:named timiguo.com.zone # 这一步一定要做
如果我们要追加一个域的解析。比如google.com 则:
vi /etc/named.rfc1912.zones
// 添加下面这段
zone "google.com" IN {
type master;
file "google.com.zone";
};
[root@ns named]# cp -a yumaozdy.com.zone google.com.zone
[root@ns named]# vi google.com.zone
$TTL 86400
@ IN SOA ns.google.com. root (
1 ; serial
1D ; refresh
1H ; retry
1W ; expire
0 ) ; minimum
@ IN NS ns.google.com.
ns IN A 192.168.1.219
www IN A 192.168.1.11
重启
[root@dns_server named]# service named restart
修改防火墙规则
vi /etc/sysconfig/iptables
-A INPUT -m state --state NEW -m tcp -p tcp --dport 53 -j ACCEPT
-A INPUT -m state --state NEW -m udp -p udp --dport 53 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 953 -j ACCEPT
service iptables restart