- Table of Contents
- 1. Introduction
- 1.1. Scope of Document
- 1.2. Organization of This Document
- 1.3. Conventions Used in This Document
- 1.4. The Domain Name System (DNS)
- 1.4.1. DNS Fundamentals
- 1.4.2. Domains and Domain Names
- 1.4.3. Zones
- 1.4.4. Authoritative Name Servers
- 1.4.5. Caching Name Servers
- 1.4.6. Name Servers in Multiple Roles
- 2. BIND Resource Requirements
- 3. Nameserver Configuration
- 3.1. Sample Configurations
- 3.2. Load Balancing
- 3.3. Notify
- 3.4. Nameserver Operations
- 3.4.1. Tools for Use With the Nameserver Daemon
- 3.4.2. Signals
- 4. Advanced Concepts
- 4.1. Dynamic Update
- 4.1.1. The journal file
- 4.2. Incremental Zone Transfers (IXFR)
- 4.3. Split DNS
- 4.4. TSIG
- 4.5. TKEY
- 4.6. SIG(0)
- 4.7. DNSSEC
- 4.7.1. Generating Keys
- 4.7.2. Creating a Keyset
- 4.7.3. Signing the Child's Keyset
- 4.7.4. Signing the Zone
- 4.7.5. Configuring Servers
- 4.8. IPv6 Support in BIND 9
- 5. The BIND 9 Lightweight Resolver
- 6. BIND 9 Configuration Reference
- 6.1. Configuration File Elements
- 6.1.1. Address Match Lists
- 6.1.2. Comment Syntax
- 6.2. Configuration File Grammar
- 6.2.1. acl Statement Grammar
- 6.2.2. acl Statement Definition and Usage
- 6.2.3. controls Statement Grammar
- 6.2.4. controls Statement Definition and Usage
- 6.2.5. include Statement Grammar
- 6.2.6. include Statement Definition and Usage
- 6.2.7. key Statement Grammar
- 6.2.8. key Statement Definition and Usage
- 6.2.9. logging Statement Grammar
- 6.2.10. logging Statement Definition and Usage
- 6.2.11. lwres Statement Grammar
- 6.2.12. lwres Statement Definition and Usage
- 6.2.13. options Statement Grammar
- 6.2.14. options Statement Definition and Usage
- 6.2.15. server Statement Grammar
- 6.2.16. server Statement Definition and Usage
- 6.2.17. trusted-keys Statement Grammar
- 6.2.18. trusted-keys Statement Definition and Usage
- 6.2.19. view Statement Grammar
- 6.2.20. view Statement Definition and Usage
- 6.2.21. zone Statement Grammar
- 6.2.22. zone Statement Definition and Usage
- 6.3. Zone File
- 7. BIND 9 Security Considerations
- 8. Troubleshooting
- A. Appendices
Next | ||
Introduction |