- 论坛徽章:
- 0
|
服务器IP是 192.168.1.2 正向可以解析,反向出现错误:
nslookup
> 127.0.0.1
Server: 192.168.1.2
Address: 192.168.1.2#53
1.0.0.127.in-addr.arpa name = localhost.
> localhost
Server: 192.168.1.2
Address: 192.168.1.2#53
Name: localhost
Address: 127.0.0.1
> 192.168.1.2
Server: 192.168.1.2
Address: 192.168.1.2#53
** server can't find 2.1.168.192.in-addr.arpa.: NXDOMAIN
> www.cts.net
Server: 192.168.1.2
Address: 192.168.1.2#53
Name: www.cts.net
Address: 192.168.1.2
> ap.cts.net
Server: 192.168.1.2
Address: 192.168.1.2#53
Name: ap.cts.net
Address: 192.168.1.2
>
usr/sbin/named-checkzone zone /var/named/192.168.1.zone
zone zone/IN: loaded serial 199022700
OK
在IE输入域名和IP都可以正常访问
这是我的配置文件:
1.
/etc/resolv.conf
nameserver 192.168.1.2
nameserver 202.96.134.33
nameserver 202.96.128.86
www.cts.net
vhost1.cts.net
ap.cts.net
cts.net
2.
/etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
192.168.1.2 www.cts.net
192.168.1.2 ap.cts.net
192.168.1.2 vhost1.cts.net
192.168.1.2 cts.net
3.
named.rfc1912.zones
zone "localhost.localdomain" IN {
type master;
file "named.localhost";
allow-update { none; };
};
zone "localhost" IN {
type master;
file "named.localhost";
allow-update { none; };
};
zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" IN {
type master;
file "named.loopback";
allow-update { none; };
};
zone "1.0.0.127.in-addr.arpa" IN {
type master;
file "named.loopback";
allow-update { none; };
};
zone "0.in-addr.arpa" IN {
type master;
file "named.empty";
allow-update { none; };
};
zone "cts.net" IN {
type master;
file "cts.net.zone";
allow-update { none; };
};
zone "1.168.192.in-addr.arpa" IN {
type master;
file "192.168.1.zone";
allow-update { none; };
};
4.
named.conf
options {
listen-on port 53 { any; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { any; };
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
5.
cts.net.zone
$TTL 86400
@ IN SOA cts.net. root.cts.net. (
42 ; serial
3H ; refresh
15M ; retry
1W ; expire
1D ) ; minimum
IN NS ap.cts.net.
ap IN A 192.168.1.2
vhost1 IN A 192.168.1.2
www IN A 192.168.1.2
6.
192.168.1.zone
$TTL 86400
@ IN SOA 1.168.192.in-addr.arpa. root.cts.net. (
199022700 ; Serial
28800 ; Refresh
14400 ; Retry
360000 ; Expire
86400 ) ; Minimum
IN NS ap.cts.net.
1 IN A 192.168.1.2
1 IN AAAA ::1
1 IN PTR ap.cts.net.
1 IN PTR vhost1.cts.net
1 IN PTR www.cts.net
防火墙配置
sudo iptables -L -n
Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
Chain FORWARD (policy ACCEPT)
target prot opt source destination
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:53
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp spt:80 |
|