Solved

Setup named in RH71?

Posted on 2001-09-12
2
183 Views
Last Modified: 2010-03-17
Who can give me some config file of named-9 in RH71.
- named.conf
- zone file
- rev. lookup file
I feel the named-9.1.0-10 is very hard to config.
0
Comment
Question by:kennycpu
2 Comments
 
LVL 5

Expert Comment

by:matt023
ID: 6481272
www.isc.org has some good documentation on it.
0
 
LVL 16

Accepted Solution

by:
The--Captain earned 50 total points
ID: 6481803
My bind 9.1 config looks something like:




/etc/named.conf

options {
#
# a caching only nameserver config
#
        directory "/var/named";
        listen-on { 192.168.20.1; };
        listen-on { 65.6.5.4; };
        listen-on { 127.0.0.1; };
};

zone "." {
        type hint;
        file "named.ca";
};

zone "0.0.127.in-addr.arpa" {
        type master;
        file "named.local";
};

zone "example.com" {
        type master;
        file "db.example.com";
};






/var/named/named.local

$TTL    600
@       86400   IN      SOA     localhost. root.localhost.  (
                                      1997022700 ; Serial
                                      28800      ; Refresh
                                      14400      ; Retry
                                      3600000    ; Expire
                                      86400 )    ; Minimum
              IN      NS      localhost.

1       IN      PTR     localhost.






/var/named/db.example.com

$TTL    600
@       86400   IN      SOA     example.com. root.example.com.  (
                                      2001042101 ; Serial
                                      28800      ; Refresh
                                      14400      ; Retry
                                      3600000    ; Expire
                                      86400 )    ; Minimum

                IN      NS      hal.example.com.
@               IN      A       65.6.5.4
                IN      MX      1 65.6.5.3
hal             IN      A       65.6.5.3





Let me know if you need more examples.

Cheers,
-Jon

0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now