文章詳情頁
關(guān)于在Linux下如何搭建DNS服務(wù)器
瀏覽:137日期:2023-05-12 10:25:46
目錄
- 環(huán)境
- 安裝
- 修改配置文件
- 主配置文件
- 區(qū)域配置文件,添加正向解析配置
- 正向區(qū)域數(shù)據(jù)文件
- 啟動DNS服務(wù)
- 測試
環(huán)境
操作系統(tǒng):CentOS 7
IP地址:10.27.106.201
測試域名:aec.testuc.com
作用:主要提供解析aec.testuc.com域名的服務(wù)
安裝
yum -y install bind
修改配置文件
主配置文件
vim /etc/named.conf
主要修改以下兩個地方
listen-on port 53 { any; }; allow-query { any; };
// // named.conf // // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS // server as a caching only nameserver (as a localhost DNS resolver only). // // See /usr/share/doc/bind*/sample/ for example named configuration files. // // See the BIND Administrator"s Reference Manual (ARM) for details about the // configuration located in /usr/share/doc/bind-{version}/Bv9ARM.html options { listen-on port 53 { any; }; # listen-on port 53 { 127.0.0.1; }; listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; recursing-file "/var/named/data/named.recursing"; secroots-file "/var/named/data/named.secroots"; allow-query { any; }; # allow-query { localhost; }; /* - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion. - If you are building a RECURSIVE (caching) DNS server, you need to enable recursion. - If your recursive DNS server has a public IP address, you MUST enable access control to limit queries to your legitimate users. Failing to do so will cause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatly reduce such attack surface */ recursion yes; dnssec-enable yes; dnssec-validation yes; /* Path to ISC DLV key */ bindkeys-file "/etc/named.root.key"; managed-keys-directory "/var/named/dynamic"; pid-file "/run/named/named.pid"; session-keyfile "/run/named/session.key"; }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/etc/named.rfc1912.zones"; include "/etc/named.root.key";
區(qū)域配置文件,添加正向解析配置
vim /etc/named.rfc1912.zones
末尾添加如下配置:
zone "aec.starnetuc.com" IN { #正向解析為"aec.starnetuc.com" type master; #類型:主緩存為master file "aec.starnetuc.com.zone"; #指定區(qū)域數(shù)據(jù)文件為aec.starnetuc.com.zone allow-update { none; }; };
正向區(qū)域數(shù)據(jù)文件
拷貝其他區(qū)域數(shù)據(jù)文件,保留源文件的權(quán)限和屬主的屬性復制
cp -a /var/named/named.localhost /var/named/aec.starnetuc.com.zone
修改該文件,結(jié)果如下:
$TTL 1D #有效解析記錄的生成周期 @ IN SOA aec.starnetuc.com. root.aec.starnetuc.com. ( #@表示當前的DNS區(qū)域名表示這個域名 #SOA表示授權(quán)信息開啟 # 后面表示郵件地址因為@有特殊含義 所以使用.代替 0 ; serial #更新序列號,可以是10以內(nèi)的整數(shù) 1D ; refresh #刷新時間,重新下載地址數(shù)據(jù)的間隔 1H ; retry #重試延遲,下載失敗后的重試延遲 1W ; expire #失效時間,超過該時間仍無法下載則放棄 3H ) ; minimum #無效解析記錄的生存周期 IN NS aec.starnetuc.com. #記錄當前區(qū)域DNS服務(wù)器的名稱 IN MX 10 aec.starnetuc.com. #MX為郵件服務(wù)器 10表示優(yōu)先級 數(shù)字越大優(yōu)先級越低 IN A 10.27.106.214 #記錄正向解析域名對應(yīng)的IP,即將域名與IP綁捆
檢查配置是否正確
named-checkconf -z /etc/named.conf
僅檢查語法不檢查邏輯關(guān)系。當顯示的全為0時表示沒有語法錯誤
zone localhost.localdomain/IN: loaded serial 0 zone localhost/IN: loaded serial 0 zone 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa/IN: loaded serial 0 zone 1.0.0.127.in-addr.arpa/IN: loaded serial 0 zone 0.in-addr.arpa/IN: loaded serial 0 zone aec.starnetuc.com/IN: loaded serial 0
啟動DNS服務(wù)
啟動前,檢查防火墻、SELINUX安全模式是否是關(guān)閉或允許狀態(tài)
啟動
systemctl start named systemctl enable named
查看53號監(jiān)聽端口是否開啟
測試
將測試系統(tǒng)的DNS改為10.27.106.201,然后去
ping aec.starnetuc.com PING aec.starnetuc.com (10.27.106.214) 56(84) bytes of data. 64 bytes from 10.27.106.214 (10.27.106.214): icmp_seq=1 ttl=64 time=1024 ms 64 bytes from 10.27.106.214 (10.27.106.214): icmp_seq=2 ttl=64 time=4.31 ms 64 bytes from 10.27.106.214 (10.27.106.214): icmp_seq=3 ttl=64 time=5.53 ms
表明配置成功。
到此這篇關(guān)于關(guān)于在Linux下如何搭建DNS服務(wù)器的文章就介紹到這了,更多相關(guān)Linux搭建DNS服務(wù)器內(nèi)容請搜索以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持!
標簽:
Linux
排行榜
