企業搭配本地域名,進行解析
2018年07月23日 09:31:46
閱讀數:2
搭建dns服務器,可以進行域名解析,這樣方便企業項目本地測試。
可以實現,輸入域名訪問本地服務器
一、安裝軟件
1、下載bind
yum -y install bind*
2、修改主配置文件
- cp /etc/named.conf /etc/named.conf.bak # 修改之前先備份一遍
- vi /etc/named.conf
修改為一下文件
- //
- //
- // named.conf
- //
- // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
- // server as a caching only nameserver (as a localhost DNS resolver only).
- //
- // See /usr/share/doc/bind*/sample/ for example named configuration files.
- //
10. // See the BIND Administrator's Reference Manual (ARM) for details about the
11. // configuration located in /usr/share/doc/bind-{version}/Bv9ARM.html
- 12.
13. options {
- 14. listen-on port 53 { any; }; //改此處
- 15. //listen-on-v6 port 53 { ::1; }; //改此處
- 16. directory "/var/named";
- 17. dump-file "/var/named/data/cache_dump.db";
- 18. statistics-file "/var/named/data/named_stats.txt";
- 19. memstatistics-file "/var/named/data/named_mem_stats.txt";
- 20. allow-query { any; }; //改此處
- 21.
- 22. /*
- 23. - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.
- 24. - If you are building a RECURSIVE (caching) DNS server, you need to enable
- 25. recursion.
- 26. - If your recursive DNS server has a public IP address, you MUST enable access
- 27. control to limit queries to your legitimate users. Failing to do so will
- 28. cause your server to become part of large scale DNS amplification
- 29. attacks. Implementing BCP38 within your network would greatly
- 30. reduce such attack surface
- 31. */
- 32. recursion yes;
- 33.
- 34. dnssec-enable yes;
- 35. dnssec-validation yes;
- 36.
- 37. /* Path to ISC DLV key */
- 38. bindkeys-file "/etc/named.iscdlv.key";
- 39.
- 40. managed-keys-directory "/var/named/dynamic";
- 41.
- 42. pid-file "/run/named/named.pid";
- 43. session-keyfile "/run/named/session.key";
44. };
- 45.
46. logging {
- 47. channel default_debug {
- 48. file "data/named.run";
- 49. severity dynamic;
- 50. };
51. };
- 52.
53. zone "." IN {
- 54. type hint;
- 55. file "named.ca";
56. };
- 57.
58. include "/etc/named.rfc1912.zones";
59. include "/etc/named.root.key";
3、自定義域名解析配置(比如我們要添加abc.com)
vi /etc/named.rfc1912.zones
- zone "abc.com" IN { // 定義要解析主域名
- type master;
- file "abc.com.zone"; // 具體相關解析的配置文件保存在 /var/named/abc.com.zone 文件中
- allow-update { none; };
- };
- //可以檢查一下配置是否正確,如果執行沒有返回提示則表示正常
- named-checkconf
4、自定義abc.com.zone文件
vi /var/named/abc.com.zone
- $TTL 1D
- @ IN SOA abc.com. rname.invalid. (
- 0 ; serial
- 1D ; refresh
- 1H ; retry
- 1W ; expire
- 3H ) ; minimum
- NS @
- A 127.0.0.1
- 10. AAAA ::1
11. www IN A 192.168.1.100
12. xd IN A 192.168.1.101
13. wcn IN A 192.168.1.102
14. tl IN A 192.168.1.103
15. * IN CNAME www
// 其中 ns.abc.com 代表當前dns服務器名稱。所以 ns.abc.com 一定要解析到自己本身
www IN A 192.168.1.100 // 代表 www.abc.com 解析到 192.168.1.100服務器上。其他的類似
//*通用 cname 使*指向www,這樣ajklnjkn.abc.com = www.abc.com
named-checkzone "abc.com" /var/named/abc.com.zone
5、修改權限
chown root:named /var/named/abc.com.zone
6、更改防火牆
- firewall-cmd --zone=public --add-port=53/tcp --permanent
- firewall-cmd --zone=public --add-port=53/udp --permanent
- firewall-cmd --zone=public --add-port=953/tcp --permanent
7、配置完成之后重啟服務
- service named restart
- //開機自啟
- systemctl enable named
8、測試
nslookup www.abc.com 服務器ip
