Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Introduction
1.1 Scope of Document
1.2 Organization of This Document
1.3 Conventions Used in This Document
1.4 The Domain Name System (DNS)
1.4.1 DNS Fundamentals
1.4.2 Domains and Domain Names
1.4.3 Zones
1.4.4 Authoritative Name Servers
1.4.4.1 The Primary Master
1.4.4.2 Slave Servers
1.4.4.3 Stealth Servers
1.4.5 Caching Name Servers
1.4.5.1 Forwarding
1.4.6 Name Servers in Multiple Roles
BIND Resource Requirements
2.1 Hardware requirements
2.2 CPU Requirements
2.3 Memory Requirements
2.4 Name Server Intensive Environment Issues
2.5 Supported Operating Systems
Name Server Configuration
3.1 Sample Configurations
3.1.1 A Caching-only Name Server
3.1.2 An Authoritative-only Name Server
3.2 Load Balancing
3.3 Name Server Operations
3.3.1 Tools for Use With the Name Server Daemon
3.3.1.1 Diagnostic Tools
3.3.1.2 Administrative Tools
3.3.2 Signals
Advanced DNS Features
4.1 Notify
4.2 Dynamic Update
4.2.1 The journal file
4.3 Incremental Zone Transfers (IXFR)
4.4 Split DNS
4.4.1 Example split DNS setup
4.5.1.1 Automatic Generation
4.5.1.2 Manual Generation
4.5.2 Copying the Shared Secret to Both Machines
4.5.3 Informing the Servers of the Key’s Existence
4.5.4 Instructing the Server to Use the Key
4.5.5 TSIG Key Based Access Control
4.5.6 Errors
4.6 TKEY
4.7 SIG(0)
4.8 DNSSEC
4.8.1 Generating Keys
4.8.2 Signing the Zone
4.8.3 Configuring Servers
4.9 IPv6 Support in BIND 9
4.9.1 Address Lookups Using AAAA Records
4.9.2 Address to Name Lookups Using Nibble Format
The BIND 9 Lightweight Resolver
5.1 The Lightweight Resolver Library
5.2 Running a Resolver Daemon
BIND 9 Configuration Reference
6.1 Configuration File Elements
6.2 Configuration File Grammar
6.2.1 acl Statement Grammar
6.2.2 acl Statement Definition and Usage
6.2.3 controls Statement Grammar
6.2.4 controls Statement Definition and Usage
6.2.5 include Statement Grammar
6.2.6 include Statement Definition and Usage
6.2.7 key Statement Grammar
6.2.8 key Statement Definition and Usage
6.2.9 logging Statement Grammar
6.2.10 logging Statement Definition and Usage
6.2.10.1 The channel Phrase
6.2.10.2 The category Phrase
6.2.11 lwres Statement Grammar
6.2.12 lwres Statement Definition and Usage
6.2.13 masters Statement Grammar
6.2.14 masters Statement Definition and Usage
6.2.15 options Statement Grammar
6.2.16 options Statement Definition and Usage
6.2.16.1 Boolean Options
6.2.16.2 Forwarding
6.2.16.3 Dual-stack Servers
6.2.16.4 Access Control
6.2.16.5 Interfaces
6.2.16.6 Query Address
6.2.16.7 Zone Transfers
6.2.16.8 Bad UDP Port Lists
6.2.16.9 Operating System Resource Limits
6.2.16.10 Server Resource Limits
6.2.16.11 Periodic Task Intervals
6.2.16.12 Topology
6.2.16.13 The sortlist Statement
6.2.16.14 RRset Ordering
6.2.16.15 Tuning
6.2.16.16 Built-in server information zones
6.2.16.17 Built-in Empty Zones
6.2.16.18 Additional Section Caching
6.2.17 statistics-channels Statement Grammar
6.2.18 statistics-channels Statement Definition and Usage
6.2.19 server Statement Grammar
6.2.20 server Statement Definition and Usage
6.2.21 trusted-keys Statement Grammar
6.2.22 trusted-keys Statement Definition and Usage
6.2.23 view Statement Grammar
6.2.24 view Statement Definition and Usage
6.2.25 zone Statement Grammar
6.2.26 zone Statement Definition and Usage
6.2.26.1 Zone Types
6.2.26.2 Class
6.2.26.3 Zone Options
6.2.26.4 Dynamic Update Policies
6.3 Zone File
6.3.1 Types of Resource Records and When to Use Them
6.3.1.1 Resource Records
6.3.1.2 Textual expression of RRs
6.3.2 Discussion of MX Records
6.3.3 Setting TTLs
6.3.4 Inverse Mapping in IPv4
6.3.5 Other Zone File Directives
6.3.5.1 The $ORIGIN Directive
6.4.1 Statistics Counters
6.4.1.1 Name Server Statistics Counters
6.4.1.2 Zone Maintenance Statistics Counters
6.4.1.3 Resolver Statistics Counters
6.4.1.4 Compatibility withBIND8 Counters
BIND 9 Security Considerations
7.1 Access Control Lists
7.2 Chroot and Setuid
7.2.1 The chroot Environment
7.2.2 Using the setuid Function
7.3 Dynamic Update Security
Troubleshooting
8.1 Common Problems
8.1.1 It’s not working; how can I figure out what’s wrong?
8.2 Incrementing and Changing the Serial Number
8.3 Where Can I Get Help?
Appendices
A.1 Acknowledgments
A.1.1 A Brief History of the DNS and BIND
A.2 General DNS Reference Information
A.2.1 IPv6 addresses (AAAA)
A.3 Bibliography (and Suggested Reading)
A.3.1 Request for Comments (RFCs)
Standards
A.3.2 Internet Drafts
A.3.3 Other Documents About BIND
Manual pages
B.1 dig
B.2 host
B.3 dnssec-keygen
B.4 dnssec-signzone
B.5 named-checkconf
B.6 named-checkzone
B.7 named
B.8 rndc
B.9 rndc.conf
B.10 rndc-confgen
0 of .
Results for:
No results containing your search query
P. 1
BINDv9

BINDv9

Ratings: (0)|Views: 37 |Likes:
Published by Dan Knudson

More info:

Published by: Dan Knudson on Sep 15, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/15/2011

pdf

text

original

You're Reading a Free Preview
Pages 4 to 20 are not shown in this preview.
You're Reading a Free Preview
Pages 24 to 31 are not shown in this preview.
You're Reading a Free Preview
Pages 35 to 81 are not shown in this preview.
You're Reading a Free Preview
Pages 85 to 124 are not shown in this preview.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->