Question

In: Computer Science

Creating and Configuring DNS Zones and Records give the reference also

Creating and Configuring DNS Zones and Records

give the reference also

Solutions

Expert Solution

INTRODUCTION

DNS zone is a plain text file that is stored on a DNS server that contain all records for each and every domain given zone. DNS records is used for a particular domain and DNS zone is used for the host. Zone file can accumulate more than 44 different record files , It always start with SOA record.

HOW TO CREATE AND CONFIGURING DNS ZONES AND RECORDS.

There are some steps given below to create DNS Zones and record :

1. we have to open the manager server.

2. Then Click on DNS server.

3. We have to do right click on your server then click on DNS manager.

4. We have to go inside of the DNS manager, Extend your server. extend forward lookup zones.

5. We will have to do right click on your zone and then choose the type of record you that you want to create.

CONFIGURATION

1. You have to go global load balance then Zone tool.

2. Then click ZOne tab.

3. Click on Add to display configure editor window.

4. You have to complete the configured.

Table figure:   DNS zone configuration

Settings Guidelines Name Configuration name. Valid characters are A-Z, a-z, 0-9, _, and -. No spaces. You reference the name in the global DNS policy configuration. After you initially save the configuration, you cannot edit the name. Type Master—The configuration contains the “master” copy of data for the zone and is the authoritative server for it. Forward—The configuration allows you to apply DNS forwarding on a per-domain basis, overriding the forwarding settings in the “general” configuration. FQDN Generate—The zone and its resource record is generated from the global load balancing framework. Domain Name The domain name must end with a period. For example: example.com. Forward Options Forward First—The DNS server queries the forwarder before doing its own DNS lookup. Only—Only query the forwarder. Do not perform a DNS lookup. Note: The internal server caches the results it learns from the forwarders, which optimizes subsequent lookups. Forwarders Select a remote server configuration object. Master Options TTL The $TTL directive at the top of the zone file (before the SOA) gives a default TTL for every RR without a specific TTL set. The default is 86,400. The valid range is 0 to 2,147,483,647. Negative TTL The last field in the SOA—the negative caching TTL. This informs other servers how long to cache no-such-domain (NXDOMAIN) responses from you. The default is 3600 seconds. The valid range is 0 to 2,147,483,647. Responsible Mail Username of the person responsible for this zone, such as hostmaster.example.com.. Note: Format is mailbox-name.domain.com. (remember the trailing dot). The format uses a dot, not the @ sign used in email addresses because @ has other uses in the zone file. Email, however, is sent to [email protected]. Primary Server Name Sets the server name in the SOA record. Primary Server Address The IP address of the primary server. DNSSEC Enable/disable DNSSEC. DNSSEC Algorithm Only RSASHA1 is supported. KSK Filename It is generated by the system if DNSSEC is enabled for the zone. To regenerate the KSK, disable DNSSEC and then re-enable DNSSEC. KSK Type characters for a string key. The file is generated by the system if DNSSEC is enabled for the zone. ZSK Filename It is generated by the system if DNSSEC is enabled for the zone. To regenerate the ZSK, disable DNSSEC and then re-enable DNSSEC. ZSK Type characters for a string key. The file is generated by the system if DNSSEC is enabled for the zone. DSSET Filename The file is generated by the system if DNSSEC is enabled for the zone. The file generated by the zone configuration editor is the one you give to any parent zone or the registrar of your domain. The convention is dsset-<domain>, for example dsset-example.com. DSSET It is generated by the system if DNSSEC is enabled for the zone. DSSET List Select a DSSET configuration object. See Configuring the DSSET list. FQDN Record FQDN Record table Displays a summary of all DNS RR for the zone, including generated and manually configured RR. A/AAAA Record Hostname The hostname part of the FQDN, such as www. Note: You can specify the @ symbol to denote the zone root. The value substituted for @ is the preceding $ORIGIN directive. Type IPv4 IPv6 Weight Assigns relative preference among members—higher values are more preferred and are assigned connections more frequently. The default is 1. The valid range is 1-255. Address Specify the IP address of the virtual server. Method Weighted Round Robin is the only method supported. CNAME Record Alias An alias name to another true or canonical domain name (the target). For instance, www.example.com is an alias for example.com. Target The true or canonical domain name. For instance, example.com. NS Record Domain Name The domain for which the name server has authoritative answers, such as example.com. Hostname The hostname part of the FQDN, such as ns. Type IPv4 IPv6 Address Specify the IP address of the name server. MX Record Hostname The hostname part of the FQDN for a mail exchange server, such as mail. Priority Preference given to this RR among others at the same owner. Lower values have greater priority. Type IPv4 IPv6 Address Specify the IP address. TXT Record Name Hostname. TXT records are name-value pairs that contain human readable information about a host. The most common use for TXT records is to store SPF records. Text Comma-separated list of name=value pairs. An example SPF record has the following form: v=spf1 +mx a:colo.example.com/28 -all If you complete the entry from the the Web UI, do not put the string in quotes. (If you complete the entry from the CLI, you do put the string in quotes.) SRV Record Host Name The host name part of the FQDN, e.g., www. Priority A priority assigned to the target host: the lower the value, the higher the priority. Weight A relative weight assigned to a record among records of the same priority: the greater the value, the more weight it carries. Port The TCP or UDP port on which the service is provided. Target Name The canonical name of the machine providing the service.

HOPE YOU UNDERSTAND IT


Related Solutions

how to Creating and Configuring DNS Zones and Records. provide the reference APA
how to Creating and Configuring DNS Zones and Records. provide the reference APA
how to Installing and Configuring DNS Servers give the reference also
how to Installing and Configuring DNS Servers give the reference also
Capture DNS records in wireshark You can capture DNS records by executing a nslookup command You...
Capture DNS records in wireshark You can capture DNS records by executing a nslookup command You must report which packets represent your DNS query and its DNS response Capture DHCP records in wireshark The easiest way to capture DHCP records in wireshark is to Start wireshark capture Execute the following command ipconfig /renew You must report which packets represent a DHCP query and a DHCP response. show the steps with the step by step images.
implementing ipv4 and ipv6 addressing give the reference also
implementing ipv4 and ipv6 addressing give the reference also
Complete Critical Thinking Activity 3: Configuring Zones. You have an Active Directory forest named csmtech.local and...
Complete Critical Thinking Activity 3: Configuring Zones. You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and csmsales.local. You want the DNS servers in each domain to be able to handle DNS queries from client computers for any of the other domains. DNS servers in the csmtech.local and csmpub.local domains should be authoritative for their own domains and the csmsales.local domain. However, DNS servers in csmsales. local should be authoritative only...
Discussion: 1. Drones are not only used in foreign combat zones. They are also being used...
Discussion: 1. Drones are not only used in foreign combat zones. They are also being used domestically by law enforcement agencies, for example, in the surveillance of criminals under a legally obtained warrant. But the possibility exists of monitoring areas in which there is no suspicion of crime but where the government wishes to obtain information. (Forest fires is a noncontroversial use, as is use on the border to monitor the movement of illegal drugs.) Drones can be equipped with...
Discuss the use of network management tools which have a relation with the DNS. (Give at...
Discuss the use of network management tools which have a relation with the DNS. (Give at least one tool which is not listed in the textbook and discuss its output)
Give three different techniques that an attacker can use to make a victim send DNS requests...
Give three different techniques that an attacker can use to make a victim send DNS requests to domains chosen by the attacker.
Name four organelles of the cell and give their basic structure and function. give reference
Name four organelles of the cell and give their basic structure and function. give reference
Increasingly patients are creating and maintaining personal health records (PHRs) with data from a variety of...
Increasingly patients are creating and maintaining personal health records (PHRs) with data from a variety of healthcare providers as well as data they have generated about their health. What provisions should be included in a model privacy and security policy that patients might use in making decisions related to their privacy and the security of their PHRs?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT