<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BIND DNS server configuration Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/bind-dns-server-configuration/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 02 Dec 2020 21:12:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>How To Install and Configure Master BIND DNS Server On Ubuntu 20.04</title>
		<link>https://www.osradar.com/how-to-install-and-configure-master-bind-dns-server-on-ubuntu-20-04/</link>
					<comments>https://www.osradar.com/how-to-install-and-configure-master-bind-dns-server-on-ubuntu-20-04/#respond</comments>
		
		<dc:creator><![CDATA[sabi]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 04:47:00 +0000</pubDate>
				<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[BIND DNS server configuration]]></category>
		<category><![CDATA[how to install bind dns server ubuntu 20.04]]></category>
		<category><![CDATA[how to tutorials]]></category>
		<category><![CDATA[master bind dns server]]></category>
		<category><![CDATA[ubuntu 20.04]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=25996</guid>

					<description><![CDATA[<p>Today we are going to learn that how to install and configure Master BIND DNS server on Ubuntu 20.04. As you all know that DNS provides the functionality of converting human readable domains to computer readable IP&#8217;s &#38; vice versa. So, it helps to translate the domain names. Here we&#8217;ll see that how we can [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-install-and-configure-master-bind-dns-server-on-ubuntu-20-04/">How To Install and Configure Master BIND DNS Server On Ubuntu 20.04</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today we are going to learn that <a href="https://www.osradar.com/?p=25996" target="_blank" rel="noreferrer noopener">how to install and configure Master BIND DNS server on Ubuntu 20.04</a>. As you all know that DNS provides the functionality of converting human readable domains to computer readable IP&#8217;s &amp; vice versa. So, it helps to translate the domain names. Here we&#8217;ll see that how we can install &amp; configure Master BIND DNS Server On Ubuntu 20.04.</p>



<p>Before proceeding towards the installation procedure, make sure your system has a static IP configured.</p>



<h2>Step 1: Update Your System</h2>



<p>Before installing any new package, make sure your system is up-to date.</p>



<pre class="wp-block-preformatted">sudo apt -y update</pre>



<h3>Step 2: Download &amp; Install the BIND DNS Server</h3>



<p>Run the below command to install the bind dns server and required packages.</p>



<pre class="wp-block-preformatted">sudo apt install -y bind9 bind9utils bind9-doc dnsutils</pre>



<h3>Step 3: Configure DNS Server</h3>



<p>Main configuration directory of DNS is located at <strong>/etc/bind</strong>.</p>



<p>Global DNS configuraiton file can be found at <strong>/etc/bind/named.conf</strong> that can&#8217;t be used for local DNS. For local DNS, <strong>/etc/bind/named.conf.local</strong> is used.</p>



<h4>Create Zones</h4>



<p>Edit the local DNS file with your favourite editor.</p>



<pre class="wp-block-preformatted">sudo nano /etc/bind/named.conf.local</pre>



<p>And then create forward &amp; reverse zones for your domain. Here I&#8217;ll create for <a href="http://osradar.com" target="_blank" rel="noreferrer noopener">osradar.com</a> as seen below:</p>



<pre class="wp-block-preformatted">zone "osradar.local" IN { // Domain name

type master; // Primary DNS

file "/etc/bind/forward.osradar.local.db"; // Forward lookup file

allow-update { none; }; // Since this is the primary DNS, it should be none.

};</pre>



<p>That was for the forward zone. Now, we&#8217;ll add for reverse zone.</p>



<pre class="wp-block-preformatted">zone "10.16.172.in-addr.arpa" IN { //Reverse lookup name, should match your network in reverse order

type master; // Primary DNS

file "/etc/bind/reverse.osradar.local.db"; //Reverse lookup file

allow-update { none; }; //Since this is the primary DNS, it should be none.

};</pre>



<p><strong>10.16.172.in-addr.arpa is the zone name of reverse DNS. (If network is 172.16.10.0, the name will be reversed as in 10.16.172).</strong></p>



<h3>Step 4: Configure Bind DNS Zone Lookup Files</h3>



<p>As described earlier, the zone lookup files have the DNS records of the forward &amp; reverse zones. So, we&#8217;ll configure them.</p>



<h5>For Forward Zone Lookup File</h5>



<p>Now, copy the sample forward zone lookup file to the file called <strong>forward.osradar.local.db</strong> located at <strong>/etc/bind </strong>directory.</p>



<pre class="wp-block-preformatted">sudo cp /etc/bind/db.local /etc/bind/forward.osradar.local.db</pre>



<p>Now, edit the above file.</p>



<pre class="wp-block-preformatted">sudo nano /etc/bind/forward.osradar.local.db</pre>



<pre class="wp-block-preformatted">$TTL 604800
@ IN SOA ns1.osradar.local. root.ns1.osradar.local. (
3 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;
;@ IN NS localhost.
;@ IN A 127.0.0.1
;@ IN AAAA ::1

;Name Server Information

@ IN NS ns1.osradar.local.

;IP address of Name Server

ns1 IN A 172.16.10.2

;Mail Exchanger

osradar.local. IN MX 10 mail.osradar.local.

;A – Record HostName To Ip Address

www IN A 172.16.10.3
mail IN A 172.16.10.4

;CNAME record

ftp IN CNAME www.osradar.local.</pre>



<h5>For Reverse Zone Lookup File</h5>



<p>Simply perform the above actions for reverse zone lookup file.</p>



<pre class="wp-block-preformatted">sudo cp /etc/bind/db.127 /etc/bind/reverse.osradar.local.db</pre>



<p>And then modify the content.</p>



<pre class="wp-block-preformatted">sudo nano /etc/bind/reverse.osradar.local.db</pre>



<pre class="wp-block-preformatted">;
; BIND reverse data file for local loopback interface
;
$TTL 604800
@ IN SOA osradar.local. root.osradar.local. (
1 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
;

;Name Server Information

@ IN NS ns1.osradar.local.
ns1 IN A 172.16.10.2

;Reverse lookup for Name Server

2 IN PTR ns1.osradar.local.

;PTR Record IP address to HostName

3 IN PTR www.osradar.local.
4 IN PTR mail.osradar.local.</pre>



<h3>Step 5: Verify Bind DNS Syntax</h3>



<p>Hit the given command to verify the syntax of bind DNS it&#8217;ll return to the shell if everything is ok.</p>



<pre class="wp-block-preformatted">sudo named-checkconf</pre>



<p>Fire the below commands to check the syntax for forward &amp; reverse zones respectively.</p>



<pre class="wp-block-preformatted">sudo named-checkzone osradar.local /etc/bind/forward.osradar.local.db
sudo named-checkzone 10.16.172.in-addr.arpa /etc/bind/reverse.osradar.local.db</pre>



<p>You&#8217;ll see the similar output respectively.</p>



<pre class="wp-block-preformatted">#####forward zone file
OK
#####reverse zone file
zone 10.16.172.in-addr.arpa/IN: loaded serial 1
OK</pre>



<p>Finally, restart &amp; enable BIND services.</p>



<pre class="wp-block-preformatted">sudo systemctl restart bind9<br>sudo systemctl enable bind9</pre>



<h3>Step 6: Test DNS Server On Ubuntu 20.04</h3>



<p>We can change the DNS server on any of client machine to our newly created server. Every OS has different DNS settings. In Ubuntu type</p>



<pre class="wp-block-preformatted">sudo echo "nameserver 172.16.10.2" &gt;&gt; /etc/resolv.conf</pre>



<p>Now, type <strong>dig</strong> command along with your domain name to test the DNS server.</p>



<pre class="wp-block-preformatted">root@ubuntu20:~# dig www.osradar.local

; &lt;&lt;&gt;&gt; DiG 9.16.1-Ubuntu &lt;&lt;&gt;&gt; www.osradar.local
;; global options: +cmd
;; Got answer:
;; WARNING: .local is reserved for Multicast DNS
;; You are currently testing what happens when an mDNS query is leaked to DNS
;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 65241
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: fabd20125b9ccbff010000005f8c7204e1387a993d58c22f (good)
;; QUESTION SECTION:
;www.osradar.local. IN A

;; ANSWER SECTION:
www.osradar.local. 604800 IN A 172.16.10.3

;; Query time: 4 msec
;; SERVER: 172.16.10.10#53(172.16.10.10)
;; WHEN: Sat Nov 28 16:49:08 UTC 2020
;; MSG SIZE rcvd: 100

</pre>



<p>And to test the reverse DNS, type</p>



<pre class="wp-block-preformatted">root@ubuntu:~# dig -x 172.16.10.3

; &lt;&lt;&gt;&gt; DiG 9.16.1-Ubuntu &lt;&lt;&gt;&gt; -x 172.16.10.3
;; global options: +cmd
;; Got answer:
;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 62529
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
; COOKIE: 7b8c9b8971f74afc010000005f8c72a8bdc5ebbdb4869578 (good)
;; QUESTION SECTION:
;3.10.16.172.in-addr.arpa. IN PTR

;; ANSWER SECTION:
3.10.16.172.in-addr.arpa. 604800 IN PTR www.osradar.local.

;; Query time: 0 msec
;; SERVER: 172.16.10.10#53(172.16.10.10)
;; WHEN: Sat Nov 28 16:51:52 UTC 2020
;; MSG SIZE rcvd: 122

</pre>



<p>So, you can see that both forward &amp; reverse DNS are working properly. Hence, this is how you can install &amp; Configure BIND DNS Server On Ubuntu 20.04</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-install-and-configure-master-bind-dns-server-on-ubuntu-20-04/">How To Install and Configure Master BIND DNS Server On Ubuntu 20.04</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-install-and-configure-master-bind-dns-server-on-ubuntu-20-04/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Configure Master / Slave BIND DNS Server on CentOS 8 / RHEL 8</title>
		<link>https://www.osradar.com/how-to-configure-master-slave-bind-dns-server-on-centos-8-rhel-8/</link>
					<comments>https://www.osradar.com/how-to-configure-master-slave-bind-dns-server-on-centos-8-rhel-8/#respond</comments>
		
		<dc:creator><![CDATA[sabi]]></dc:creator>
		<pubDate>Fri, 20 Dec 2019 12:35:25 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[BIND DNS server configuration]]></category>
		<category><![CDATA[Configure DNS Server on CentOS 8]]></category>
		<category><![CDATA[Master / Slave DNS server]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=16620</guid>

					<description><![CDATA[<p>Today we are going to cover the installation &#38; configuration of BIND DNS Server on CentOS / RHEL 8. DNS as you all know is used to name the all computers connected to the Internet. It assigns the address to every computer with a FQDN associated with it. It&#8217;s importance goes high due to the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-configure-master-slave-bind-dns-server-on-centos-8-rhel-8/">How To Configure Master / Slave BIND DNS Server on CentOS 8 / RHEL 8</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today we are going to cover the installation &amp; configuration of BIND DNS Server on CentOS / RHEL 8. DNS as you all know is used to name the all computers connected to the Internet. It assigns the address to every computer with a FQDN associated with it. It&#8217;s importance goes high due to the part of Application layer of the TCP / IP reference model. So , in this tutorial we are going to install an Authoritative BIND DNS Master &amp; Slave on CentOS 8 and also we&#8217;ll cover its configuration like adding PTR, A /AAAA records among others.</p>



<h2><strong>Step 1: Installing Bind DNS Server on CentOS 8 / RHEL 8</strong></h2>



<p>You can install the bind DNS server on CentOS / RHEL 8 by running the below command</p>



<pre class="wp-block-verse">$ dnf -y install bind bind-utils vim<br>CentOS-8 - AppStream                                   1.3 kB/s | 4.3 kB     00:03    <br>CentOS-8 - Base                                        1.2 kB/s | 3.9 kB     00:03    <br>CentOS-8 - Extras                                      467  B/s | 1.5 kB     00:03    <br>Dependencies resolved</pre>



<p>Make sure to keep SELinux in Enforcing mode.</p>



<pre class="wp-block-verse">$ getenforce</pre>



<h3><strong>Step 2: Configure BIND DNS Authoritative Server on CentOS 8 / RHEL 8</strong></h3>



<p>Now you can configure the BIND DNS Authoritative server by opening the configuration file. You can find out the config file in the <strong>/etc/named.conf.</strong> </p>



<p>In my case I&#8217;ll add the following settings to my DNS, you can set up as you required.</p>



<ul><li><strong>osradar.com</strong> Zone (Domain Name)</li><li><strong>192.168.109.0</strong> Managed subnet</li><li><strong>192.168.109.75</strong> IP of slave server</li><li><strong>192.168.109.59</strong> IP of the master server</li></ul>



<p>Edit the <strong>/etc/named.conf</strong> file by running below command and apply the settings.</p>



<pre class="wp-block-verse">$ sudo vim /etc/named.conf<br> //<br> // named.conf<br> //<br> // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS<br> // server as a caching only nameserver (as a localhost DNS resolver only).<br> //<br> // See /usr/share/doc/bind*/sample/ for example named configuration files.<br> //<br> options {<br>          listen-on port 53 { any; }; ## Listen on any since it is an authoritative DNS Publicly available. <br>          listen-on-v6 port 53 { any; }; ## You can also set the same for IPv6<br>          directory       "/var/named";<br>          dump-file       "/var/named/data/cache_dump.db";<br>          statistics-file "/var/named/data/named_stats.txt";<br>          memstatistics-file "/var/named/data/named_mem_stats.txt";<br>          secroots-file   "/var/named/data/named.secroots";<br>          recursing-file  "/var/named/data/named.recursing";<br>  ## Since this will be an authoritative Nameserver, allow query from any host <br>         allow-query     { any; };          <br>         allow-transfer  {192.168.109.75; };     <br> /*<br> If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.                    - If you are building a RECURSIVE (caching) DNS server, you need to enable recursion.       - If your recursive DNS server has a public IP address, you MUST enable access       control to limit queries to your legitimate users. Failing to do so will cause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatly reduce such attack surface.<br> */     <br>    recursion no; ## Following Advice from above.     <br>    dnssec-enable yes;     <br>    dnssec-validation yes;     <br>    managed-keys-directory "/var/named/dynamic";     <br>    pid-file "/run/named/named.pid";     <br>    session-keyfile "/run/named/session.key";      <br> /* <a href="https://fedoraproject.org/wiki/Changes/CryptoPolicy">https://fedoraproject.org/wiki/Changes/CryptoPolicy</a> */     include "/etc/crypto-policies/back-ends/bind.config";<br> };<br> logging {<br>          channel default_debug {<br>                  file "data/named.run";<br>                  severity dynamic;<br>          };<br> };<br> zone "." IN {<br>          type hint;<br>          file "named.ca";<br> };<br> include "/etc/named.rfc1912.zones";<br> include "/etc/named.root.key";<br> Set your ZONE details as shown below for different domains. Set the forward and reverse details. You can set the names of files as you like<br> zone "<a href="https://osradar.com">osradar.com</a>" IN {<br>         type master;<br>         file "osradar.forward";<br>         allow-update { none; };<br> };<br> Make sure you follow the rule for reverse zone (109.168.192.in-addr.arpa). [If your IP is 192.168.10.10, It will be 10.168.192.in-addr.arpa]<br> zone "109.168.192.in-addr.arpa" IN {<br>         type master;<br>         file "osradar.reverse";<br>         allow-update { none; };<br> };</pre>



<p>Make sure that your IP is Public one as this is an Authoritative DNS Server.</p>



<h3><strong>Step 3: Creating Zone Files</strong></h3>



<p>After finishing configuring in named.conf you will have to create the Zone files &amp; place all the records that you would wish to add such as A/AAAA, MX,PTR &amp; others.<br>Create the zone files in the <strong>/var/named/</strong> directory.</p>



<pre class="wp-block-verse">$ sudo vim /var/named/osradar.com.forward<br><br><br> $TTL 86400<br>  @   IN  SOA     <a href="https://osradar.com">dns1.osradar.com.</a> <a href="https://osradar.com">root.osradar.com</a>. (<br>  # You can use any numerical values for serial number but it is recommended to use [YYYYMMDDnn]<br>          2019112201  ;Serial<br>          3600        ;Refresh<br>          1800        ;Retry<br>          604800      ;Expire<br>          86400       ;Minimum TTL<br> )<br>          # Set your Name Servers here<br>          IN  NS      <a href="https://osradar.com">dns1.osradar.com</a>.<br>          IN  NS      <a href="http://https;//osradar.com">dns2.osradar.com</a>.<br>          # define Name Server's IP address<br>          IN  A       192.168.109.59<br>          # Set your Mail Exchanger (MX) Server here<br>          IN  MX 10   <a href="https://osradar.com">dns1.osradar.com</a>.<br> Set each IP address of a hostname. Sample A records.<br> dns1     IN  A       192.168.109.59<br> dns2     IN  A       192.168.109.75<br> mail1    IN  A       192.168.109.78</pre>



<p>Now create the corresponding reverse records for the same domain we had defined in the named.conf file.</p>



<pre class="wp-block-verse">$ sudo vim /var/named/osradar.reverse<br><br><br> $TTL 86400<br>  @   IN  SOA     <a href="https://osradar.com">dns1.osradar.com</a>. <a href="https://osradar.com">root.osradar.com</a>. (<br>          2019112201  ;Serial<br>          3600        ;Refresh<br>          1800        ;Retry<br>          604800      ;Expire<br>          86400       ;Minimum TTL<br>  )<br>          # Set Name Server<br>          IN  NS      <a href="https://osradar.com">dns1.osradar.com</a>.<br> Set each IP address of a hostname. Sample PTR records.<br> 88      IN  PTR     <a href="https://osradar.com">dns1.osradar.com</a>.<br> 94      IN  PTR     <a href="https://osradar.com">dns2.osradar.com</a>.<br> 97      IN  PTR     <a href="https://osradar.com">mail1.osradar.com</a>.</pre>



<h3><strong>Step 4: Alter DNS Settings on Master Server</strong></h3>



<p>Now make our new DNS Server as the default Name Server. Edit the file <strong>/etc/resolv.conf</strong> &amp; add the below lines into it.</p>



<pre class="wp-block-verse">$ sudo vim /etc/resolv.conf  <br> nameserver 192.168.109.59</pre>



<p><strong>Note</strong>: Replace the IP Address with your one.</p>



<h3><strong>Step 5: Firewall </strong></h3>



<p>Allow dns service on the firewall</p>



<p>Run the below lines to allow dns service on the firewall</p>



<pre class="wp-block-verse">sudo firewall-cmd --add-service=dns --permanent<br>sudo firewall-cmd --reload</pre>



<p>Make sure you&#8217;ve done the correct configuration. Double check the configuration by typing</p>



<pre class="wp-block-verse">sudo named-checkconf</pre>



<p>Start and Enable bind services</p>



<pre class="wp-block-verse">sudo systemctl start named<br>sudo systemctl enable named</pre>



<p>So far, we&#8217;ve configured our Master BIND DNS server. Let&#8217;s move toward our Slave server.</p>



<h3><strong>Step 6: Configuring Slave DNS Server </strong></h3>



<p>Run the below command on Slave server to install bind &amp; bind utils.</p>



<pre class="wp-block-verse">sudo dnf -y install bind bind-utils vim</pre>



<p>Now edit the file <strong>/etc/named.conf</strong> and edit it accordingly to configure the slave server.</p>



<pre class="wp-block-verse">$ sudo vim /etc/named.conf<br> //<br> // named.conf<br> // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS<br> // server as a caching only nameserver (as a localhost DNS resolver only).<br> // See /usr/share/doc/bind*/sample/ for example named configuration files.<br> // See the BIND Administrator's Reference Manual (ARM) for details about the<br> // configuration located in /usr/share/doc/bind-{version}/Bv9ARM.html<br> options {<br>          listen-on port 53 { any; };<br>          listen-on-v6 port 53 { any; };<br>          directory       "/var/named";<br>          dump-file       "/var/named/data/cache_dump.db";<br>          statistics-file "/var/named/data/named_stats.txt";<br>          memstatistics-file "/var/named/data/named_mem_stats.txt";<br>          recursing-file  "/var/named/data/named.recursing";<br>          secroots-file   "/var/named/data/named.secroots";<br>          allow-query     { any; }; ## Allows hosts to query Slave DNS<br>          allow-transfer { none; }; ## Disable zone transfer<br> <code>      /*        - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.       - If you are building a RECURSIVE (caching) DNS server, you need to enable          recursion.       - If your recursive DNS server has a public IP address, you MUST enable access          control to limit queries to your legitimate users. Failing to do so will         cause your server to become part of large scale DNS amplification          attacks. Implementing BCP38 within your network would greatly         reduce such attack surface       */</code><br> Since this is a slave, lets allow recursion.<br> <code>recursion yes;      dnssec-enable yes;      dnssec-validation yes;</code><br> /* Path to ISC DLV key */<br>      bindkeys-file "/etc/named.root.key";<br>     managed-keys-directory "/var/named/dynamic";     <br>     pid-file "/run/named/named.pid";     <br>     session-keyfile "/run/named/session.key";<br> };<br> logging {<br>          channel default_debug {<br>                  file "data/named.run";<br>                  severity dynamic;<br>          };<br> };<br> zone "." IN {<br>          type hint;<br>          file "named.ca";<br> };<br> include "/etc/named.rfc1912.zones";<br> include "/etc/named.root.key";<br> Let us create zone definitions for both forward and reverse dns lookups.<br> The files will be created automatically on the slave.<br> zone "<a href="https://osradar.com">osradar.com</a>" IN {<br>          type slave;<br>          file "slaves/osradar.forward";<br>          masters { 192.168.109.59; }; ## Master server it is receiving DNS Records from<br> };<br> zone  "109.168.192.in-addr.arpa" IN {<br>          type slave;<br>          file "slaves/osradar.reverse";<br>          masters { 192.168.109.59; }; ## Master server it is receiving DNS Records from<br> };</pre>



<h3><strong>Step 7: Alter DNS Settings on Slave Server</strong></h3>



<p>Open the file <strong>/etc/resolv.conf </strong>&amp; add the IP of slave </p>



<pre class="wp-block-verse">$ sudo vim /etc/resolv.conf<br>
nameserver 192.168.109.59<br>
nameserver 192.168.109.75</pre>



<p>Now double check the configurations &amp; start and enable bind services</p>



<pre class="wp-block-verse">sudo named-checkconf<br>sudo systemctl start named<br>sudo systemctl enable named</pre>



<p>Check that zone files have transferred from the master.</p>



<pre class="wp-block-verse">$ ll /var/named/slaves/<br>
total 12<br>
-rw-r--r-- 1 named named 480 Dec 14 14:16 osradar.forward<br>
-rw-r--r-- 1 named named 492 Dec 14 14:45 osradar.reverse</pre>



<p>Congratulations! You have successfully Configured Master / Slave Server on CentOS 8.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-configure-master-slave-bind-dns-server-on-centos-8-rhel-8/">How To Configure Master / Slave BIND DNS Server on CentOS 8 / RHEL 8</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-configure-master-slave-bind-dns-server-on-centos-8-rhel-8/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
