/* sample configuration file for BIND 8.1 or later * should be installed as /etc/named.conf * * Author: Florian La Roche */ # # overall options of the server # options { version "None of your business"; directory "/var/lib/named"; statistics-file "/var/log/named.stats"; # the default is to fail, if the master file is not correct # check-names master warn; # pid-file "/var/run/named.pid"; # datasize default; # stacksize default; # coresize default; # files unlimited; recursion yes; # multiple-cnames no; // if yes, then a name my have more // than one CNAME RR. This use // is non-standard and is not // recommended, but it is available // because previous releases supported // it and it was used by large sites // for load balancing. # the default is to ask the forwarders and if they fail # try to find the answer yourself, this will only ask the forwarders forward only; # statistics-interval 60; # list of DNS servers to ask #forward first; forwarders { # t-online 212.185.252.136; # local DNS server stuttgart 62.225.251.16; 194.25.2.129; 194.25.2.130; 194.25.2.131; 194.25.2.132; # change 8.6.2004 217.237.151.161; # stuttgart 217.237.150.141; # alb donau kreis und ulm 217.237.151.97; # muenchen # root server (temporariliy) # 192.36.148.17; }; # the default is to listen on port 53 on all available interfaces # you can also give a detailed list: #listen-on { 192.168.0.0/24; }; ### listen-on port 53 { 192.168.0.0/24; 127.0.0.1; }; # every two days heartbeat-interval 2880; ### listen-on-v6 { none; }; }; # # do not be verbose about these problems... # logging { category lame-servers { null; }; # category queries { default_syslog; }; }; # # predefined access control lists (acl): # "any" allows all hosts # "none" denies all hosts # "localhost" allows the IP adresses of all interfaces of the system # "localnets" allows any host on a network of the local interfaces # # defining an additional ACL: #acl can_download { 192.168.0.17; 192.168.0.18; }; acl trusted { 192.168.0.0/16; localhost; }; #acl bogus { 0.0.0.0/8; // Null address # 1.0.0.0/8; // IANA reserved, popular fakes # 2.0.0.0/8; 192.0.2.0/24; // Test address # 224.0.0.0/3; // multicast address # 10.0.0.0/8; 172.16.0.0/12; // Enterprise addresses #}; #allow-query { trusted; }; #allow-recursion { trusted; }; #allow-transfer { none; }; #backhole { bogus; }; // no answer at all # # The server statement defines the characteristics to be associated with # a remote name server. # # Marking a server as bogus will prevent queries to that server. #server 192.168.0.128 { bogus yes; } # If the other name server has also BIND 8.1 or newer installed, you # can allow compacter zone transfers with this statement. #server 192.168.0.128 { transfer-format many-answers; } zone "." IN { type hint; file "root.hint"; }; zone "0.0.127.in-addr.arpa" IN { type master; file "127.0.0.zone"; check-names fail; allow-update { none; }; }; # # my master zone # zone "framp.local" { notify no; type master; file "framp.local.zone"; }; # local subnet zone "0.168.192.in-addr.arpa" { notify no; type master; file "192.168.0.zone"; }; # wlan subnet zone "3.168.192.in-addr.arpa" { notify no; type master; file "192.168.3.zone"; }; zone "50.168.192.in-addr.arpa" { notify no; type master; file "192.168.50.zone"; }; # # a slave zone # #zone "isc.org" IN { # type slave; # file "slave/db.isc.org"; # masters { 192.168.0.128; }; #};