Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

What is and how to create PTR records in DNS server?

Posted on 2008-10-02
4
Medium Priority
?
523 Views
Last Modified: 2008-10-02
Hi,

1. This is related to PTR records in DNS Servers
2. My questions: i) Please FIRSTLY describe it with your own WORDINGS, ii) What is PTR records?(The function, the definition, examples, etc) , iii) How to create it?(give examples), iv) Should all DNS servers have to get this PTR records?
3. Thank you

Tjie
0
Comment
Question by:tjie
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 6

Assisted Solution

by:dathho
dathho earned 800 total points
ID: 22625569
0
 
LVL 6

Assisted Solution

by:dathho
dathho earned 800 total points
ID: 22625589
0
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 1200 total points
ID: 22625641
PTR is the pointer record used in reverse lookup zone..

http://www.networkclue.com/internet/DNS/DNS-records.aspx
0
 
LVL 18

Assisted Solution

by:sk_raja_raja
sk_raja_raja earned 1200 total points
ID: 22625645
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question