› Foros › PC › Software libre
options {
listen-on port 53 { 127.0.0.1; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { localhost; };
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
zone "localhost.localdomain" IN {
type master;
file "named.localhost";
allow-update { none; };
};
zone "localhost" IN {
type master;
file "named.localhost";
allow-update { none; };
};
zone "1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa" IN {
type master;
file "named.loopback";
allow-update { none; };
};
zone "1.0.0.127.in-addr.arpa" IN {
type master;
file "named.loopback";
allow-update { none; };
};
zone "0.in-addr.arpa" IN {
type master;
file "named.empty";
allow-update { none; };
};
# DHCP Server Configuration file.
# see /usr/share/doc/dhcp*/dhcpd.conf.sample
# see 'man 5 dhcpd.conf'
#
# subred midominio
subnet 192.168.2.0 netmask 255.255.255.0 {
range 192.168.2.15 192.168.2.255;
option domain-name-servers 192.168.2.10;
option domain-name "midominio.lan";
option routers 192.168.1.10;
option broadcast-address 192.168.2.255;
allow client-updates;
}
# Servidores
group {
}
include "/etc/rndc.key";
zone midominio.lan. {
primary 192.168.2.10;
key rndc-key;
}
options {
listen-on port 53 { 127.0.0.1; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { localhost; };
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
include "/etc/rndc.key";
zone "midomino.lan" {
type master;
file "/var/named/midominio.lan.hosts";
allow-update{ key rndc-key; };
};
$ttl 38400
ampliffica.lan. IN SOA Shark.ampliffica.lan. sistemas.ampliffica.com. (
1377792387
10800
3600
604800
38400 )
ampliffica.lan. IN NS Shark.ampliffica.lan.
Shark IN A 192.168.2.10
ns IN CNAME Shark
root@server1:/etc/bind# dig miempresa.com
; <<>> DiG 9.8.1P1 <<>> miempresa.com
;; global options: +cmd
;; Got answer:
;; >>HEADER<< opcode: QUERY, status:
NOERROR
, id: 29364
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1,
AUTHORITY: 1
, ADDITIONAL: 1
;; QUESTION SECTION:
;miempresa.com. IN A
;; ANSWER SECTION:
miempresa.com. 604800 IN A 192.168.1.6
;; AUTHORITY SECTION:
miempresa.com. 604800 IN NS server.miempresa.com.
;; ADDITIONAL SECTION:
server.miempresa.com. 604800 IN A 192.168.1.6
;; Query time: 4 msec
;; SERVER:
192.168.1.5
#53(192.168.1.5)
;; WHEN: Fri Nov 2 16:50:02 2012
;; MSG SIZE rcvd: 8
deberías de tener un fichero que en debian es dhcpd.leases que te dice las ip que ha prestado.
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> midominio.lan
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 51443
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
;; QUESTION SECTION:
;midominio.lan. IN A
;; ANSWER SECTION:
midominio.lan. 900 IN A 192.168.2.10
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Fri Aug 30 12:38:25 2013
;; MSG SIZE rcvd: 48
win7-vm IN A 192.168.2.15
$ttl 38400
2.168.192.in-addr.arpa. IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1377869768
10800
3600
604800
38400 )
2.168.192.in-addr.arpa. IN NS Shark.midominio.lan.
10 IN PTR Shark.midominio.lan
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
options {
listen-on port 53 { 127.0.0.1; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { localhost; };
recursion yes;
dnssec-enable no;
dnssec-validation no;
//dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
disable-empty-zone rfc1912;
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
//include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
include "/etc/rndc.key";
zone "midominio.lan" {
type master;
file "/var/named/midominio.lan.hosts";
allow-update{ key rndc-key; };
};
zone "2.168.192.in-addr.arpa" {
type master;
file "/var/named/192.168.2.rev";
};
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> -x 192.168.2.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 37634
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
;; WARNING: recursion requested but not available
;; QUESTION SECTION:
;10.2.168.192.in-addr.arpa. IN PTR
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Fri Aug 30 16:36:45 2013
;; MSG SIZE rcvd: 43
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
::1 localhost localhost.localdomain localhost6 localhost6.localdomain6
DEVICE=eth0
BOOTPROTO=static
DEFROUTE=yes
DNS1=192.168.2.10
BROADCAST=192.168.50.255
IPADDR=192.168.2.10
IPV4_FAILURE_FATAL0=yes
NETMASK=255.255.255.0
NETWORK=192.168.2.0
ONBOOT=yes
PERFIX=24
TYPE=Ethernet
PEERDNS=no
NETWORKING=yes
HOSTNAME=Shark.midominio.lan
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
options {
listen-on port 53 { 127.0.0.1; };
listen-on-v6 port 53 { ::1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { localhost; };
recursion yes;
dnssec-enable no;
dnssec-validation no;
//dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
disable-empty-zone rfc1912;
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
//include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
include "/etc/rndc.key";
zone "midominio.lan" {
type master;
file "/var/named/midominio.lan.hosts";
allow-update{ key rndc-key; };
};
zone "0.2.168.192.in-addr.arpa" {
type master;
file "/var/named/192.168.2.rev";
};
$ttl 38400
midominio.lan. IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1377792387
10800
3600
604800
38400 )
midominio.lan. IN NS Shark.midominio.lan.
Shark IN A 192.168.2.10
ns IN CNAME Shark
win7-vm IN A 192.168.2.15
$ttl 38400
@ IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1377869768
10800
3600
604800
38400 )
NS Shark.midominiol.lan.
1 PTR localhost.
;2.168.192.in-addr.arpa. IN SOA Shark.midominio.lan. sistemas.midominio.com. (
; 1377869768
; 10800
; 3600
; 604800
; 38400 )
;2.168.192.in-addr.arpa. IN NS Shark.midominio.lan.
;10 IN PTR Shark.midominio.lan
#
# DHCP Server Configuration file.
# see /usr/share/doc/dhcp*/dhcpd.conf.sample
# see 'man 5 dhcpd.conf'
#
# subred midominio
subnet 192.168.2.0 netmask 255.255.255.0 {
authoritative;
range 192.168.2.15 192.168.2.255;
option domain-name-servers 192.168.2.10;
option domain-name "midominio.lan";
option routers 192.168.1.10;
option broadcast-address 192.168.2.255;
allow client-updates;
}
# Servidores
group {
}
include "/etc/rndc.key";
zone midominiol.lan. {
primary 192.168.2.10;
key rndc-key;
}
# zone 10.2.168.192.in-addr.arpa. {
# primary 192.168.2.10;
# key rndc-key;
#}
allow-query {localhost;};
allow-query {localhost;};
listen-on port 53 {192.168.2.10;};
$ORIGIN midominio.lan
$ttl 38400
@ IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1
10800
3600
604800
38400 )
IN NS Shark.midominio.lan.
Shark IN A 192.168.2.10
$ttl 38400
@ IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1
10800
3600
604800
38400 )
NS Shark.midominio.lan.
10 PTR localhost.
options {
listen-on port 53 { 127.0.0.1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query {localhost; };
allow-recursion {localhost; };
forward first;
forwarders {8.8.8.8;
8.8.4.4;};
recursion yes;
dnssec-enable no;
dnssec-validation no;
//dnssec-lookaside auto;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
disable-empty-zone rfc1912;
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
//include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
include "/etc/rndc.key";
zone "midominio.lan" {
type master;
file "/var/named/midominio.lan.hosts";
allow-update{ key rndc-key; };
allow-query{localhost;};
};
zone "0.2.168.192.in-addr.arpa" {
type master;
file "/var/named/192.168.2.rev";
};
pasteles escribió:He hecho lo que he comentado más arriba en este mismo mensaje y también he sacado a los win7 del dominio y los he añadido al equipo de trabajo, WORKGROUP. El resultado la hacer ping entre los clientes win7 ha sido satisfactorio, es decir, se han encontrado ambos poniendo el nombre del host, pero no han podido hacer ninguno de los 2 ping al server.
¿Significa esto que está bien configurado el servidor DNS?,¿Qué puedo seguir probando?
Para el caso inverso lo tengo tal que así:
Código: Seleccionar todo
$ttl 38400
@ IN SOA Shark.midominio.lan. sistemas.midominio.com. (
1
10800
3600
604800
38400 )
NS Shark.midominio.lan.
10 PTR localhost.
La solicitud de ping no puedo encontrar el host <nombre del host>. Compruebe el nombre y vuelva a intentarlo
192.168.2.10 Shark Shark.midominio.lan
domain midominio.lan
nameserver 192.168.2.10
192.168.2.10 shark.midominio.lan shark
127.0.0.1 localhost.localdomain localhost
::1 localhost6.localdomain6 localhost6
# Generated by NetworkManager
domain midominio
nameserver 192.168.2.10
$ttl 38400
midominio.lan. IN SOA shark.midominio. sistemas.midominio.lan. (
1378738848
10800
3600
604800
38400 )
midominio.lan. IN NS shark.midominio.
shark.midominio.lan. IN A 192.168.2.10
$ttl 38400
0.2.168.192.in-addr.arpa. IN SOA shark.midominio. sistemas.midominio.lan. (
1378739156
10800
3600
604800
38400 )
0.2.168.192.in-addr.arpa. IN NS shark.midominio.
10 PTR shark.
//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//
options {
listen-on port 53 { 127.0.0.1; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { any; };
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
disable-empty-zone rfc1912;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
//include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
zone "midominio.lan" {
type master;
file "/var/named/midominio.lan.hosts";
};
zone "0.2.168.192.in-addr.arpa" {
type master;
file "/var/named/192.168.2.0.rev";
};
DEVICE=eth0
BOOTPROTO=static
BROADCAST=192.168.2.255
IPADDR=192.168.2.10
NETMASK=255.255.255.0
NETWORK=192.168.2.0
TYPE=Ethernet
PREFIX=24
DNS1=192.168.2.10
DEFROUTE=yes
IPV4_FAILURE_FATAL=yes
IPV6INIT=no
ONBOOT=yes
PEERDNS=no
NETWORKING=yes
NETWORKING_IPV6=no
HOSTNAME=shark.midominio
GATEWAY=192.168.2.1
Sep 9 18:21:43 shark named[3935]: starting BIND 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 -u named -t /var/named/chroot
Sep 9 18:21:43 shark named[3935]: built with '--build=x86_64-redhat-linux-gnu' '--host=x86_64-redhat-linux-gnu' '--target=x86_64-redhat-linux-gnu' '--program-prefix=' '--prefix=/usr' '--exec-prefix=/usr' '--bindir=/usr/bin' '--sbindir=/usr/sbin' '--sysconfdir=/etc' '--datadir=/usr/share' '--includedir=/usr/include' '--libdir=/usr/lib64' '--libexecdir=/usr/libexec' '--sharedstatedir=/var/lib' '--mandir=/usr/share/man' '--infodir=/usr/share/info' '--with-libtool' '--localstatedir=/var' '--enable-threads' '--enable-ipv6' '--with-pic' '--disable-static' '--disable-openssl-version-check' '--with-dlz-ldap=yes' '--with-dlz-postgres=yes' '--with-dlz-mysql=yes' '--with-dlz-filesystem=yes' '--with-gssapi=yes' '--disable-isc-spnego' '--with-docbook-xsl=/usr/share/sgml/docbook/xsl-stylesheets' '--enable-fixed-rrset' 'build_alias=x86_64-redhat-linux-gnu' 'host_alias=x86_64-redhat-linux-gnu' 'target_alias=x86_64-redhat-linux-gnu' 'CFLAGS= -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector --param=ssp-buffer-size=4 -m64 -mtune=generic' 'CPPFLAGS= -DDIG_SIGCHASE'
Sep 9 18:21:43 shark named[3935]: ----------------------------------------------------
Sep 9 18:21:43 shark named[3935]: BIND 9 is maintained by Internet Systems Consortium,
Sep 9 18:21:43 shark named[3935]: Inc. (ISC), a non-profit 501(c)(3) public-benefit
Sep 9 18:21:43 shark named[3935]: corporation. Support and training for BIND 9 are
Sep 9 18:21:43 shark named[3935]: available at https://www.isc.org/support
Sep 9 18:21:43 shark named[3935]: ----------------------------------------------------
Sep 9 18:21:43 shark named[3935]: adjusted limit on open files from 4096 to 1048576
Sep 9 18:21:43 shark named[3935]: found 2 CPUs, using 2 worker threads
Sep 9 18:21:43 shark named[3935]: using up to 4096 sockets
Sep 9 18:21:43 shark named[3935]: loading configuration from '/etc/named.conf'
Sep 9 18:21:43 shark named[3935]: reading built-in trusted keys from file '/etc/named.iscdlv.key'
Sep 9 18:21:43 shark named[3935]: using default UDP/IPv4 port range: [1024, 65535]
Sep 9 18:21:43 shark named[3935]: using default UDP/IPv6 port range: [1024, 65535]
Sep 9 18:21:43 shark named[3935]: listening on IPv4 interface lo, 127.0.0.1#53
Sep 9 18:21:43 shark named[3935]: generating session key for dynamic DNS
Sep 9 18:21:43 shark named[3935]: sizing zone task pool based on 3 zones
Sep 9 18:21:43 shark named[3935]: using built-in DLV key for view _default
Sep 9 18:21:43 shark named[3935]: set up managed keys zone for view _default, file '/var/named/dynamic/managed-keys.bind'
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 10.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 16.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 17.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 18.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 19.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 20.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 21.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 22.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 23.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 24.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 25.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 26.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 27.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 28.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 29.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 30.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 31.172.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 168.192.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 0.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 127.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 254.169.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 2.0.192.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 100.51.198.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 113.0.203.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 255.255.255.255.IN-ADDR.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: D.F.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 8.E.F.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 9.E.F.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: A.E.F.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: B.E.F.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: automatic empty zone: 8.B.D.0.1.0.0.2.IP6.ARPA
Sep 9 18:21:43 shark named[3935]: command channel listening on 127.0.0.1#953
Sep 9 18:21:43 shark named[3935]: command channel listening on ::1#953
Sep 9 18:21:43 shark named[3935]: zone 0.2.168.192.in-addr.arpa/IN: loaded serial 1378739156
Sep 9 18:21:43 shark named[3935]: zone midominio.lan/IN: loaded serial 1378738848
Sep 9 18:21:43 shark named[3935]: managed-keys-zone ./IN: loaded serial 3
Sep 9 18:21:43 shark named[3935]: running
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './DNSKEY/IN': 2001:500:2f::f#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './DNSKEY/IN': 2001:7fd::1#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './NS/IN': 2001:500:2f::f#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving 'dlv.isc.org/DNSKEY/IN': 2001:500:2f::f#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './NS/IN': 2001:7fd::1#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving 'dlv.isc.org/DNSKEY/IN': 2001:7fd::1#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './DNSKEY/IN': 2001:500:1::803f:235#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './DNSKEY/IN': 2001:dc3::35#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving 'dlv.isc.org/DNSKEY/IN': 2001:500:1::803f:235#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './NS/IN': 2001:500:1::803f:235#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving 'dlv.isc.org/DNSKEY/IN': 2001:dc3::35#53
Sep 9 18:21:44 shark named[3935]: error (network unreachable) resolving './NS/IN': 2001:dc3::35#53
Sep 9 18:21:47 shark named[3935]: error (network unreachable) resolving './DNSKEY/IN': 2001:503:ba3e::2:30#53
Sep 9 18:21:47 shark named[3935]: error (network unreachable) resolving 'dlv.isc.org/DNSKEY/IN': 2001:503:ba3e::2:30#53
Sep 9 18:21:47 shark named[3935]: error (network unreachable) resolving './NS/IN': 2001:503:ba3e::2:30#53
Lo que comentas de que en mis zonas no ves a los clientes agregados a mano, ¿es que tengo que por cada host que utilice mi servidor de nombres agregarlo a las zonas? ¿esto no se automáticamente con allow-update?
var/named/"midomonio.lan.hosts"
Código: Seleccionar todo
$ttl 38400
midominio.lan. IN SOA shark.midominio. sistemas.midominio.lan. (
1378738848
10800
3600
604800
38400 )
midominio.lan. IN NS shark.midominio.
shark.midominio.lan. IN A 192.168.2.10
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> midominio.lan
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54487
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;midominio.lan. IN A
;; AUTHORITY SECTION:
midominio.lan. 10800 IN SOA shark.midominio. sistemas.midominio.lan. 0 86400 3600 604800 10800
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Tue Sep 10 17:53:34 2013
;; MSG SIZE rcvd: 93
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> -x 192.168.2.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27092
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
;; QUESTION SECTION:
;10.2.168.192.in-addr.arpa. IN PTR
;; ANSWER SECTION:
10.2.168.192.in-addr.arpa. 38400 IN PTR shark.2.168.192.in-addr.arpa.
;; AUTHORITY SECTION:
2.168.192.in-addr.arpa. 38400 IN NS shark.midominio.lan.
;; ADDITIONAL SECTION:
shark.midominio.lan. 38400 IN A 192.168.2.10
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Tue Sep 10 17:53:48 2013
;; MSG SIZE rcvd: 113
192.168.2.10 shark.midominio.lan shark
127.0.0.1 localhost.localdomain localhost
::1 localhost6.localdomain6 localhost6
domain midominio.lan
nameserver 192.168.2.10
search midominio.lan
options {
listen-on port 53 { 192.168.2.10; };
directory "/var/named";
dump-file "/var/named/data/cache_dump.db";
statistics-file "/var/named/data/named_stats.txt";
memstatistics-file "/var/named/data/named_mem_stats.txt";
allow-query { any; };
recursion yes;
dnssec-enable yes;
dnssec-validation yes;
dnssec-lookaside auto;
disable-empty-zone rfc1912;
/* Path to ISC DLV key */
bindkeys-file "/etc/named.iscdlv.key";
managed-keys-directory "/var/named/dynamic";
};
logging {
channel default_debug {
file "data/named.run";
severity dynamic;
};
};
zone "." IN {
type hint;
file "named.ca";
};
//include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";
zone "midominio.lan" {
type master;
file "/var/named/midominio.lan.hosts";
allow-update {any;};
};
zone "2.168.192.in-addr.arpa" {
type master;
file "/var/named/192.168.2.0.rev";
allow-update{any;};
};
$ttl 38400
@ IN SOA shark.midominio. sistemas.midominio.lan. (
0 ;Serial
1D ;Refresh
1H ;Retry
1W ;Expire
3H ) ;Minimum
IN NS shark.midominio.lan.
shark IN A 192.168.2.10
ism-dev IN A 192.168.2.15
$ttl 38400
@ IN SOA shark.midominio. sistemas.midominio.lan. (
1 ;serial
1D ;refresh
1H ;retry
1W ;expire
3H ) ;minimum
IN NS shark.midominio.lan.
10 IN PTR shark
15 IN PTR ism-dev
automatic empty zone: 10.IN-ADDR.ARPA
automatic empty zone: 16.172.IN-ADDR.ARPA
automatic empty zone: 17.172.IN-ADDR.ARPA
automatic empty zone: 18.172.IN-ADDR.ARPA
automatic empty zone: 19.172.IN-ADDR.ARPA
automatic empty zone: 20.172.IN-ADDR.ARPA
automatic empty zone: 21.172.IN-ADDR.ARPA
automatic empty zone: 22.172.IN-ADDR.ARPA
automatic empty zone: 23.172.IN-ADDR.ARPA
automatic empty zone: 24.172.IN-ADDR.ARPA
automatic empty zone: 25.172.IN-ADDR.ARPA
automatic empty zone: 26.172.IN-ADDR.ARPA
automatic empty zone: 27.172.IN-ADDR.ARPA
automatic empty zone: 28.172.IN-ADDR.ARPA
automatic empty zone: 29.172.IN-ADDR.ARPA
automatic empty zone: 30.172.IN-ADDR.ARPA
automatic empty zone: 31.172.IN-ADDR.ARPA
automatic empty zone: 168.192.IN-ADDR.ARPA
automatic empty zone: 0.IN-ADDR.ARPA
automatic empty zone: 127.IN-ADDR.ARPA
automatic empty zone: 254.169.IN-ADDR.ARPA
automatic empty zone: 2.0.192.IN-ADDR.ARPA
automatic empty zone: 100.51.198.IN-ADDR.ARPA
automatic empty zone: 113.0.203.IN-ADDR.ARPA
automatic empty zone: 255.255.255.255.IN-ADDR.ARPA
automatic empty zone: 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
automatic empty zone: 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.IP6.ARPA
automatic empty zone: D.F.IP6.ARPA
automatic empty zone: 8.E.F.IP6.ARPA
automatic empty zone: 9.E.F.IP6.ARPA
automatic empty zone: A.E.F.IP6.ARPA
automatic empty zone: B.E.F.IP6.ARPA
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 715
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;midominio.lan. IN A
;; AUTHORITY SECTION:
midominio.lan. 10800 IN SOA shark.midominio. sistemas.midominio.lan. 1 86400 3600 604800 10800
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:19:49 2013
;; MSG SIZE rcvd: 93
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> shark.midominio.lan
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 50203
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;shark.midominio.lan. IN A
;; ANSWER SECTION:
shark.midominio.lan. 38400 IN A 192.168.2.10
;; AUTHORITY SECTION:
midominio.lan. 38400 IN NS shark.midominio.lan.
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:19:42 2013
;; MSG SIZE rcvd: 68
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> -x 192.168.2.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9244
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
;; QUESTION SECTION:
;10.2.168.192.in-addr.arpa. IN PTR
;; ANSWER SECTION:
10.2.168.192.in-addr.arpa. 38400 IN PTR shark.2.168.192.in-addr.arpa.
;; AUTHORITY SECTION:
2.168.192.in-addr.arpa. 38400 IN NS shark.midominio.lan.
;; ADDITIONAL SECTION:
shark.midominio.lan. 38400 IN A 192.168.2.10
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:20:11 2013
;; MSG SIZE rcvd: 113
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> -x 192.168.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17398
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.168.192.in-addr.arpa. IN PTR
;; AUTHORITY SECTION:
2.168.192.in-addr.arpa. 10800 IN SOA shark.midominio. sistemas.midominio.lan. 1 86400 3600 604800 10800
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:20:02 2013
;; MSG SIZE rcvd: 115
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> ism-dev.midominio.lan
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 33613
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
;; QUESTION SECTION:
;ism-dev.midominio.lan. IN A
;; ANSWER SECTION:
ism-dev.midominio.lan. 38400 IN A 192.168.2.15
;; AUTHORITY SECTION:
midominio.lan. 38400 IN NS shark.midominio.lan.
;; ADDITIONAL SECTION:
shark.midominio.lan. 38400 IN A 192.168.2.10
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:52:16 2013
;; MSG SIZE rcvd: 92
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> -x 192.168.2.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13916
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
;; QUESTION SECTION:
;15.2.168.192.in-addr.arpa. IN PTR
;; ANSWER SECTION:
15.2.168.192.in-addr.arpa. 38400 IN PTR ism-dev.2.168.192.in-addr.arpa.
;; AUTHORITY SECTION:
2.168.192.in-addr.arpa. 38400 IN NS shark.midominio.lan.
;; ADDITIONAL SECTION:
shark.midominio.lan. 38400 IN A 192.168.2.10
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:52:09 2013
;; MSG SIZE rcvd: 115
/var/named/midominio.lan.jnl: create: permission denied
Por cierto al al configurar bind con dhcp, ya en windows me entra dentro del dominio midominio.lan, y puedo hacer ping con solo con shark, si el nombre del domio.
Mensaje por pasteles 10 Sep 2013 22:07
Con la configuración no se a que te refieres, ¿las de las VM? las tengo en modo brigde.
Si es el de la red de centos, mañana te paso los ficheros de configuración de la red
Bueno si ejecuto: dig midominio.lan ns, si obtengo respuesta.
He estado haciendo diversos dig y he obtenido diferentes respuestas.
dig midominio.lan
Código: Seleccionar todo
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 715
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;midominio.lan. IN A
;; AUTHORITY SECTION:
midominio.lan. 10800 IN SOA shark.midominio. sistemas.midominio.lan. 1 86400 3600 604800 10800
;; Query time: 0 msec
;; SERVER: 192.168.2.10#53(192.168.2.10)
;; WHEN: Wed Sep 11 11:19:49 2013
#
# DHCP Server Configuration file.
# see /usr/share/doc/dhcp*/dhcpd.conf.sample
# see 'man 5 dhcpd.conf'
#
#Parametros globales. Los parámetros empiezan con la palaba clave, options
#Indica el servidor DNS
option domain-name-servers 192.168.2.10;
#Indica el nombre del dominio
option domain-name "midominio.lan";
#Especifica la IP de broadcast
option broadcast-address 192.168.2.255;
#Máscara de la red
option subnet-mask 255.255.255.0;
#IP del rputer
# option routers 10.0.2.1;
#Activa el dinamic dns
ddns-updates on;
#Indica el método de actualización DNS automática con los valores de la IP asignados por DHCP
ddns-update-style interim;
#Nombre del dominio
ddns-domainname "midominio.lan";
#Resolución de nombres inversa
ddns-rev-domainname "in-addr.arpa";
authoritative;
ignore client-updates;
subnet 192.168.2.0 netmask 255.255.255.0 {
range 192.168.2.50 192.168.2.255;
}
# Sistemas
group {
# Servidor DNS
host shark {
hardware ethernet XX:XX:XX:XX:XX:XX;
fixed-address 192.168.2.10;
}
}
include "/etc/rndc.key";
#Zona midominio.lan
zone midominio.lan. {
primary 192.168.2.10;
key rndc-key;
}
#Zona inversa
zone 2.168.192.in-addr.arpa. {
primary 192.168.2.10;
key rndc-key;
}