|
|
You can configure the Network Registrar DNS server and zones by accepting the system defaults or changing them through the Network Registrar graphical user interface.
This chapter assumes that you have already installed your software by following the instructions in Getting Started with Network Registrar. This chapter describes the Network Registrar DNS server and zone configuration in more detail.
This chapter provides the following topics:
A zone is a point of delegation in the DNS tree. It contains all the names from a certain point downward, except those that have been further delegated to other zones. A zone delegation point has one or more name server records in the parent zone that should be matched by equivalent name server records at the root of the delegated zone.
The sample company, QuickExample, has registered the domain example.com. Its parent zone is com., and there is a name server record for example.com in the com zone as well as in the example.com zone (Figure 2-1).
Each zone has one primary server, which loads the zone's contents from a local configuration database. Each zone can also have any number of secondary servers, which load the zone contents by retrieving the data from the primary server (Figure 2-2).
You can add a zone for which you configure primary or secondary servers. When you configure a name server as the primary server for the zone, you can enter zone data at that time or you can choose to import zone data from an existing BIND data file.
Step 1 From the Server Manager window (Figure 4-10), select the DNS server that you want to configure as a primary server for the zone.
Step 2 Click the Add toolbar button to display the Add Zone dialog box.
Step 3 Enter the primary server's zone name.
Step 4 Click the Primary button.
Step 5 Click OK.
Step 6 From the Adding Primary DNS Zone dialog box, enter the appropriate information on the associated tab. The minimum information you must supply is SOA, Name Servers, and Hosts.
SOA tab---Configures the Start Of Authority record.
DHCP tab---Enables dynamic DNS updates and specifies the servers from which you will accept updates.
Subzones tab---Delegates subzones to other servers.
Step 7 Reload the DNS server.
Step 1 From the Server Manager window (Figure 4-10), select the DNS server to configure as a primary server for the zone.
Step 2 Click the Add toolbar button to display the Add Zone dialog box.
Step 3 Enter the zone's name.
Step 4 Click the Primary button.
Step 5 Type the name of the BIND file or use the Browse button to locate the BIND file.
Step 6 Click OK.
Step 7 Reload the DNS server.
Network Registrar imports the data and returns to the Server Manager. To view or edit the zone properties, select the zone from the Server Manager (Figure 4-10) and select Show Properties.
From the Server Manager (Figure 4-10), double-click the primary zone.
Network Registrar displays the zone's SOA record. For more information about the SOA Record tab, see the "Setting Start of Authority" section later in this chapter.
When you initially configure a domain, you should choose a primary name server, and at least one secondary server. The secondary server should be geographically removed from the primary server. It should not be on the same network as the primary server. If it is important that the outside world can always reach you, then you should configure several secondary servers to ensure that at least one of them will be able to supply information about the domain at all times.
If you want to reduce the load on the primary server as it answers queries from machines within its domain, you should configure another secondary server. Because the secondary server is preloaded with all the same zone data that the primary server has, it contains all the local data. The local queries are usually for local data.
Step 1 From the Server Manager window (Figure 4-10), select the DNS server to configure as a secondary server for the zone.
Step 2 Click the Add toolbar button to display the Add Zone dialog box.
Step 3 Enter the zone's name.
Step 4 Click the Secondary button.
Step 5 Click OK.
Step 6 Click the Secondary Zone Configuration tab in the Add Secondary DNS Zone dialog box, and enter the address of the primary server (from which the data will be transferred).
Step 7 Click the Zone Transfers tab, and select to enable or restrict zone transfers.
Step 8 Click OK.
Step 9 Reload the DNS server.
From the Server Manager window (Figure 4-10), double-click the secondary zone.
Network Registrar displays the primary name servers for zone transfers.
Step 1 From the Server Manager (Figure 4-10), select the secondary zone.
Step 2 Click the Remove toolbar button.
Step 3 Click Yes to remove the zone.
Step 4 Reload the DNS server.
If the server is listed as authoritative in any other zones, perform the following steps for each zone:
Step 1 From the Server Manager (Figure 4-10), select the zone in which this secondary server is listed as authoritative.
Step 2 Click Show Properties.
Step 3 In the DNS Zone Properties dialog box, click the Name Servers tab (Figure 2-10).
Step 4 Select and delete the name of the secondary zone you want to remove.
Step 5 Click OK.
Step 6 Reload the DNS server.
When you first install Network Registrar on a system connected to the Internet, it automatically is a caching-only server. It can pose and answer DNS queries about information that it has cached, but is not authoritative, because you have not yet configured any zones.
Step 1 From the Server Manager (Figure 4-10), select the DNS server that you want to designate as a caching-only server.
Step 2 Click the Show Properties toolbar button to display the DNS Server Properties dialog box.
Step 3 Click the Options tab (Figure 2-7) and verify that the default, Enable recursive queries check box is selected.
Step 4 Click OK.
Step 5 Reload the DNS server.
Caching-only servers are typically secondary zone servers that have no zones configured.
Use the DNS Server Properties dialog box (Figure 2-3) to specify server-wide parameters such as the server's name, its forwarding servers, its root name servers, and a number of advanced options.
The General tab in the DNS Server Properties dialog box displays the cluster name, which is the name of the cluster or host machine to which this server belongs. It also displays the version number, which is the software release number of the Network Registrar DNS server software (Figure 2-3).
Sites that must limit their network traffic for security reasons, because they pay by the packet, or because the network connection is a slow link, can designate one or more servers to be forwarders for the current server. These servers handle all off-site requests before the local server searches for the answer through the Internet. Over time the forwarders build up a rich cache of addresses that can satisfy most requests.
Forwarders are useful in the following situations:
You may want to restrict the name server even more by stopping it from even attempting to contact an off-site server. Select the Slave mode check box to make the server a slave server (Figure 2-4).
In the DNS Server Properties dialog box, click the Forwarders tab (Figure 2-4).
You can specify multiple forwarders. If the first forwarder does not respond after eight seconds, Network Registrar asks each remaining forwarder in sequence until it receives an answer or until it exhausts the list.
If the DNS server receives no answer, the next step depends on whether you have slave mode on or off.
Step 1 In the DNS Server Properties dialog box, click the Forwarders tab (Figure 2-4).
Step 2 Enter the address of the forwarder or forwarders.
Step 3 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Forwarders tab (Figure 2-4).
Step 2 Select and delete the address of the forwarder you want to remove.
Step 3 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Forwarders tab (Figure 2-4).
Step 2 Select the address of the forwarder you want to edit.
Step 3 Make changes to the address of the forwarder.
Step 4 Click OK.
The Root Name Servers tab of the DNS Server Properties dialog box contains a set of hints about root name servers (Figure 2-5). The root name servers know the addresses of the authoritative name servers for all the top-level domains. When you first start a newly installed Network Registrar DNS server, it uses these hints (sometimes called Root hints) as authorities to ask for the current root name servers.
When Network Registrar gets a response to this root-server query, it caches it just like other response records. Network Registrar uses these cached records as its root-server list. When the cached records expire, Network Registrar repeats the process. Because Network Registrar has a persistent cache, it does not need to requery this data when it restarts.
Because the configured servers are only hints, they do not need to be a complete set. You should periodically (every month to six months) look up the root servers to see if the information needs to be altered or augmented. The best way to look up the root servers is to ask one of them directly. You can do this by running either the nslookup or the dig command.
Step 1 In the DNS Server Properties dialog box, click the Root Name Servers tab (Figure 2-5).
Step 2 Enter the name and address you want to add.
Step 3 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Root Name Servers tab (Figure 2-5).
Step 2 Select the name and address you want to edit.
Step 3 Change the name or address.
Step 4 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Root Name Servers tab (Figure 2-5).
Step 2 Select and delete the name and address you want to remove.
Step 3 Click OK.
You only need to use the DNS Server Properties dialog box Exception tab (Figure 2-6) to handle your corporation's internal name resolution if you do not want the DNS servers to use the standard resolution method of querying the root name server for names outside its domain.
Use the Exception tab to handle your corporation's internal name resolution by explicitly listing the domains and name servers you want each DNS server to use for specific queries. By specifying the name servers you want DNS to use, Network Registrar can resolve names without resorting to querying the standard root name servers.
For example, the sample company, QuickExample, has four subsidiaries: red, blue, yellow, and green. Each of them has its own domain under the.com domain. When users at red.com want to use resources at blue.com, their DNS server knows that it is not authoritative for blue.com, and attempts to locate blue.com by asking the root name servers.
These queries cause unnecessary traffic, and in some cases fail because internal resources are often barred from external queries or sites that use private networks that cannot be located because their network addresses are not unique. The Network Registrar exception handling solves these problems.
To use exception handling, the administrator at red.com. lists all the domains that users might want to access, and at least one corresponding name server. In this case, the administrator would list the three other domains for the QuickExample company.
Now when a user at red.com wants to access a server at blue.com, the red DNS server queries the specified blue.com's name server instead of querying the root name server.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Click Add domain name.
Step 3 Click OK.
Step 4 Make the appropriate edits.
Step 5 Enter the address of a name server for that domain.
Step 6 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Select the domain name you want to edit.
Step 3 Click Edit domain name.
Step 4 Enter the domain name of the subsidiary you want to access.
Step 5 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Select the domain name you want to remove.
Step 3 Click Remove domain name.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Select the domain whose address you want to add.
Step 3 Click Add address.
Step 4 Enter the address.
Note that you can specify multiple addresses (name servers) for each exception domain.
Step 5 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Select the domain whose address you want to edit.
Step 3 Select the address you want to edit.
Step 4 Click Edit address.
Step 5 Change the address.
Step 6 Click OK.
Step 1 In the DNS Server Properties dialog box, click the Exception tab (Figure 2-6).
Step 2 Select the domain whose address you want to remove.
Step 3 Select the address you want to remove.
Step 4 Click Remove address.
Choose any of the options on the Options tab (Figure 2-7) by selecting the corresponding check box. These options apply to all the zones for the server you are configuring.
There are two types of queries: recursive and iterative or nonrecursive. DNS clients typically generate recursive queries. When the query is recursive, the name server asks other DNS servers for any nonauthoritative data not in its own cache. When the query is nonrecursive, the name server either answers the query if it is authoritative for the zone, or has the answer in its cache, or tells the client which name server to ask next.
A query may result in multiple resource records of the same type being returned. In order to compensate for the fact that most DNS clients start with (and most limit their use to) the first record in the list, you can enable round-robin. This operation causes the Network Registrar DNS server to rearrange the order of the records each time it is queried.
Because a master server for a zone does not know specifically which slaves transfer from it, Network Registrar notifies all registered name servers for the zone (name servers listed in the name server Resource Records) when the zone changes. The sole exception to this policy is that Network Registrar does not notify the server named in the SOA mname field (the primary master). For more information about NOTIFY, see RFC 1996.
Choose any of the options on the Advanced tab (Figure 2-8) by selecting the corresponding check box or entering the appropriate values. These options apply to all the zones for the server you are configuring.
The Prefetch glue records check box (Figure 2-8) tells Network Registrar to prefetch additional records that may be helpful when answering certain queries. Glue records are in this category, because most answers include network server records, and network server records cause the inclusion of A records. Selecting the Prefetch glue records option tells the server to find records it would not normally, so it can include them in answers to subsequent queries.
Relaxed Dynamic Update enables relaxation of the RFC 2136 restriction on the dynamic update zone name record. This feature allows the name to be any name within an authoritative zone.
To ensure a quick response to repeated requests for the same information, the DNS server maintains a cache of information it has learned from other DNS servers on behalf of its DNS clients. It also remembers negative information, such as "no such name" or "no such data," that it has learned in the same way. It is important to discard this information at some point to accommodate changes that may occur at the authoritative source. The positive information the server learns is always accompanied by a time-to-live parameter indicating how long it may be considered valid; negative information is not.
The value in the Negative cache-time field (Figure 2-8) represents the length of time negative information will be considered valid. It should be a relatively short period in order to be responsive to the creation of new data at the authoritative source, yet long enough to serve some value to other clients looking for the same nonexistent information, or retries from a single client.
The default value is 600 seconds or 10 minutes.
The Max. cache TTL field (Figure 2-8) allows you to specify the maximum amount of time you want Network Registrar to retain cached information. Time to live (TTL) is the amount of time that any name server is allowed to cache data learned from other name servers. Each record that is added to the cache arrives with some TTL value. When the time-to-live period expires, the name server must discard the cached data and get new data from the authoritative name servers the next time information is queried. This parameter limits the lifetime of records in the cache whose TTL values are very large.
The Max. memory cache size field (Figure 2-8) allows you to specify how much memory space you want to reserve for the DNS name cache. The more memory allocated for the cache, the less frequently the server will access the disk cache. The default is 200 KB. One entry is approximately 100 bytes.
Clicking Flush now allows you to stop the disk cache file from growing, but the actual behavior depends on whether the DNS server is running or stopped.
If you click Flush now while the server is running, Network Registrar clears all expendable entries from the cache database file. Flushing the cache does not cause the file to shrink in size because of to the nature of the database, but does create free space within it. Because the memory cache is unaffected by this operation, recently in-use cache entries are not lost, and performance is not significantly affected.
If you click Flush now when the server is stopped, Network Registrar interprets the request to flush all entries, and removes the cache database file. Network Registrar will reinitialize the database when you restart the server.
To completely clear a cache that has grown too large, stop the server, and then click Flush now.
If you were experimenting with a new group of name servers, you might want to use nonstandard ports for answering requests and for asking for remote information. The local port and external port settings control which TCP and UDP port the server listens to for name resolution requests, and which port it connects to when making requests to other name servers.
The standard values are 53. In normal operation, if you change these values, the server will appear to be unavailable.
The Debug settings button lets you collect debug information about the DNS server. You should only need to set debug settings if you have been instructed by Technical Support.
Step 1 From the Server Manager (Figure 4-10), select the DNS server for which you want to set debug options.
Step 2 Click the Show Properties toolbar button.
Step 3 Click the Advanced tab on the DNS Server Properties dialog box (Figure 2-8).
Step 4 Click Debug settings.
Step 5 From the Debug Settings dialog box, click Enable Debug.
Step 6 Type in the category as supplied by Technical Support.
Step 7 Check the output destination:
MLOG is the recommended choice.
Step 8 Click OK.
You may need to rebuild the resource records indexes if you observe resource or host list data that appears inconsistent or if data appears to be missing.
Rebuilding the resource records should correct any inconsistencies.
Step 1 From the Server Manager window (Figure 4-10), select the DNS server whose Resource Record indexes you want to refresh.
Step 2 Click the Show Properties toolbar button.
Step 3 Click the Advanced tab of the DNS Server Properties dialog box (Figure 2-8).
Step 4 Click Debug settings.
Step 5 From the Rebuild Resource Records dialog box, choose to rebuild indexes for all zones now.
Step 6 Click OK.
Use the DNS Zone Properties dialog box (Figure 2-9) to add or delete hosts from a zone, specify the authoritative servers for the zone, configure zones for dynamic DNS update, and edit individual resource records.
The Start of Authority (SOA) record (Figure 2-9) designates the top of the zone in the DNS inverted-tree namespace. There must be only one SOA record per zone.
The Name field (Figure 2-9) displays the name of the zone you specified when you created the zone. You cannot edit this field.
The TTL field (Figure 2-9) allows you to specify the time to live in seconds for this record. Enter the value that is appropriate for the zone. For more information about TTLs, see the "Glossary" appendix.
The Contact email address field (Figure 2-9) allows you to specify the email address for the person responsible for the name server. Remember to use a period instead of an @ sign.
You can use an actual person's email name or use an alias such as hostmaster. In either case, it must be a valid email address for someone who can handle potential problems.
The Name of the primary server field (mname) (Figure 2-9) allows you to specify the name of the server you are configuring. You can specify the relative name and Network Registrar will add the rest of the domain specification, or you can use the fully qualified domain name that ends with a period.
Primary servers use serial numbers to indicate when their database has changed. Secondary servers check these serial numbers to determine whether they must update their zone data. You can only enter a serial number the first time you configure a zone. Thereafter, Network Registrar increments the serial number every time a change is made to the database.
Enter a positive integer in the Serial number field (Figure 2-9).
The secondary refresh time is how often a secondary name server checks the primary server for an update. A good value is from one hour to one day, depending on how often you expect to change zone data, and how quickly the secondary servers must the notice.
Specify the amount of time in seconds in the Secondary refresh time field (Figure 2-9).
If you are using NOTIFY, you can set the refresh time to a larger value without causing long delays between transfers, because NOTIFY forces the secondary servers to notice when the primary data changes. For more information about NOTIFY, see the "Enabling NOTIFY" section earlier in this chapter.
The secondary retry time is how often a secondary name server retries after a failure to update a zone. A good value would be an hour or less.
Specify the amount of time in seconds in the Secondary retry time field (Figure 2-9).
The secondary expire time is the longest amount of time that a secondary name server can claim authority for zone data when responding to queries when it has failed to update a zone. Set this field to a large number, that is long enough to survive extended failure of the primary server, such as a week or more.
Specify the amount of time in seconds in the Secondary expire time field (Figure 2-9).
The Minimum TTL field (Figure 2-9) allows you to specify the minimum TTL value to be used in all query operations that retrieve Resource Records from this zone. Whenever a Resource Record is sent in a response to a query (for which this server is authoritative), the TTL field is set to the maximum of the TTL field from the Resource Record and the minimum field specified here. Thus, the minimum value is a lower bound on the TTL field for all Resource Records in this zone. This value is also the zone default TTL for all records that you have configured with a TTL of "-".
A zone must have at least one name server. The name servers that you enter on the Name Servers tab (Figure 2-10) must match those specified in the parent domain's delegation for this zone. You can configure the servers to be authoritative for the zone as either primary or secondary servers.
The name servers you list on the Name Servers tab (Figure 2-10) should be the name-server resolvers that you want people outside your organization to query when requesting name resolution about names within the zone.
The TTL field shows the shortest time to live for all the Name Server records in the authoritative server list. If you change it, you change the TTL value for all the name server records in the authoritative server list.
In the DNS Zone Properties dialog box, click the Name Servers tab (Figure 2-10).
Step 1 In the DNS Zone Properties dialog box, click the Name Servers tab (Figure 2-10).
Step 2 Enter the name you want to add.
Step 3 Click OK.
Step 1 In the DNS Zone Properties dialog box, click the Name Servers tab (Figure 2-10).
Step 2 Select the name you want to change.
Step 3 Make the changes in the Name field.
Step 4 Click OK.
Step 1 In the DNS Zone Properties dialog box, click the Name Servers tab (Figure 2-10).
Step 2 Select and delete the name you want to remove.
Step 3 Click OK.
From the DNS Zone Properties dialog box (Figure 2-9) you can add, edit, or remove hosts from a specific zone on a DNS server. This dialog box lets you establish or change the permanent name-to-IP-address associations for the zone.
Using this dialog box is a convenient way of automatically adding hosts to reverse zones, and keeping the host information up-to-date as you add and remove hosts. For more information about reverse zones, see the "Inverse Name Servers" section in the "Configuring the DNS" chapter.
Step 1 From the Server Manager window (Figure 4-10), select the zone to which you want to add a host.
Step 2 Click the Show Properties toolbar button.
Step 3 In the DNS Zone Properties dialog box, click the Hosts tab (Figure 2-11).
Step 4 Click Add.
Step 5 In the Add Host dialog box, enter the required host name and addresses, optional aliases, MX records, and whether you want to have Network Registrar automatically generate reverse mapping records.
Step 6 Click OK to add this host, or click Apply to continue adding hosts.
After you click OK, Network Registrar returns to the DNS Zone Properties dialog box and displays the new host or hosts.
Step 1 From the Server Manager (Figure 4-10), select the zone that contains the host you want to edit.
Step 2 Click the Show Properties toolbar button.
Step 3 In the DNS Zone Properties dialog box, click the Hosts tab (Figure 2-11).
Step 4 Select the host name you want to edit.
Step 5 Click Edit.
Step 6 In the Edit Hosts dialog box, make the necessary changes to the host name, address, alias, or MX record.
Step 7 Click OK to make the changes effective and return to the DNS Zone Properties dialog box.
When you edit a host, the Generate reverse mapping records check box is selected if there is a reverse zone for any of the addresses associated with that host. In other words, if some addresses have corresponding reverse zones and others do not, the check box is selected.
If you click OK, Network Registrar displays a warning dialog box for each of the addresses that do not have a corresponding reverse zone. This is a normal result. Clicking OK to close these warning dialog boxes is not harmful and results in Network Registrar generating reverse mapping records only for those addresses for which corresponding reverse zones exist.
Step 1 From the Server Manager window (Figure 4-10), select the zone that contains the host you want to remove.
Step 2 Click the Show Properties toolbar button.
Step 3 In the DNS Zone Properties dialog box, click the Hosts tab (Figure 2-11).
Step 4 Select the host name you want to remove.
Step 5 Click Remove.
Network Registrar updates the host list to show the current hosts.
There are two type of DNS servers: Primary name server and secondary server.
Use the options on the Zone Transfers tab (Figure 2-12) to allow zone transfers to any server that requests zone data; restrict the servers you will allow to perform zone transfers; or prevent all zone transfers.
Use the Restrict zone transfers option for security reasons or to reduce the load on the primary name server in order to restrict the servers you will allow to request a copy of the zone data.
Step 1 In the DNS Zone Properties dialog box, click the Zone Transfers tab (Figure 2-12).
Step 2 Click Restrict zone transfers to the following addresses.
Step 3 Type the addresses of the servers that you have allowed to perform zone transfers.
You can use network numbers, such as 192.168.1.0, or host addresses, such as 192.168.1.100.
Step 4 Click OK.
Using DHCP and dynamic DNS update, a host is automatically configured for network access whenever it attaches to the IP network. The host can be located and accessed using its permanent, unique DNS host name. Mobile hosts, for example, can move freely around on a network without end-user or administrator intervention.
Step 1 In the DNS Zone Properties dialog box, click the DHCP tab (Figure 2-13).
Step 2 Select the Enable dynamic DNS updates check box.
Step 3 Specify the address of the DHCP servers from which DNS allows updates to this zone.
If you do not list a DHCP server, the update does not occur. You must do this for both the forward and reverse zones.
Step 4 Configure each DHCP server with the address of the appropriate DNS server.
Enter information about subzones in the Subzones tab (Figure 2-14).
Establish subzone delegation by performing the following tasks:
After you have decided to divide the zone into subzones, you must create names for them. You should involve the people responsible for the subzone in the naming, and you should try to maintain a consistent naming scheme that makes sense to people outside your organization.
The following are some suggestions for how to avoid naming problems:
In choosing a name, keep in mind how often people must remember the name, and how often they will use the name. Select a name that is easy to remember and easy to spell.
After you have chosen a name for the subzone, you must specify the hosts that will serve as the subzone's name servers. The information you specify here is what the parent domain's name servers will use when they are queried about the subzone. If you want to ensure that the subzone is always reachable, you should specify two name servers.
The addresses that are required are ones that could not be learned without knowing the address, for example, any subzone's name servers whose names are in or below the subzone.
Whenever a name server for a subzone changes its name or IP address, its administrator must inform its parent domain so that the parent can change the name server and glue records for the subzone. If the subzone's administrator neglects to inform its parent, the glue records will be invalid.
The common symptom of an invalid glue record is the inability of a host to access a host in a different domain by its domain name while being able to access that host by its IP address.
If the name server is in the parent domain, add an name server record. If the name server is within the subzone's parent (delegating), you must add an name server record and a glue A record so that the domain can find the name server.
Step 1 From the Server Manager window (Figure 4-10), select the zone that you want to subdelegate and click Show Properties.
Step 2 From the DNS Zone Properties dialog box, click the Subzones tab (Figure 2-14).
Step 3 Enter the name of the subzone, for example, enter north.american.com if the zone name is american.com.
Step 4 Click Edit Name Servers.
Step 5 From the Name Servers dialog box, enter the fully qualified domain name (FQDN) of the name servers for this subzone.
Step 6 If the name server is with the subzone, click Glue Records.
Step 7 From the Glue Records dialog box, enter the IP addresses for the name servers listed in step 5.
Step 8 Click OK.
To see the delegation records for the subzone you have created, go to the Resource Records tab and look for the name server record for the subzone and the A record for the glue record.
Step 1 From the Server Manager window (Figure 4-10), select the zone that contains the delegation you want to edit and choose Properties.
Step 2 From the DNS Zone Properties dialog box, click the Subzones tab (Figure 2-14).
Step 3 From the Subzones list, select the delegation you want to edit.
Step 4 Click Edit Name Servers.
Step 5 From the Name Servers dialog box, make any changes.
Step 6 Click OK or click Glue Records.
Step 7 From the Glue Records dialog box, make any changes.
Step 8 Click OK.
To see the changes you have made, click the Resource Records tab.
Step 1 From the Server Manager window (Figure 4-10), select the zone that contains the delegation you want to delete and choose Properties.
Step 2 From the DNS Zone Properties dialog box, click the Subzones tab (Figure 2-14).
Step 3 Select the delegation you want to delete.
Step 4 Click Delete.
Step 5 Click OK to return to the Server Manager window.
Although most of the additions or changes to the host records should be made through the Hosts tab, you can use the Resource Records tab (Figure 2-15) to make specific changes to records by type.
For more information about the different types of Resource Records, see the "Resource Records" appendix.
Step 1 From the Server Manager window (Figure 4-10), select the zone you want to edit.
Step 2 Click the Show Properties toolbar button.
Step 3 From the DNS Zone Properties dialog box, click the Resource Records tab (Figure 2-15).
Step 4 Click in the Name field to select the zone record you want to edit.
Step 5 Click Edit.
Step 6 Enter the changes in the Edit Resource Record dialog box.
Step 7 Click OK.
Step 1 From the Server Manager window (Figure 4-10), select the zone to which you want to add records.
Step 2 Click the Show Properties toolbar button.
Step 3 From the DNS Zone Properties dialog box, click the Resource Records tab (Figure 2-15).
Step 4 Click Add.
Step 5 Click the appropriate Resource Record tab: Generic, A, MX, CNAME, NS, or PTR.
Step 6 Enter the appropriate information.
Step 7 Click Apply to continue to add resource records, or click OK to finish.
Step 1 From the Server Manager window (Figure 4-10), select the zone whose records you want to remove.
Step 2 Click the Show Properties toolbar button.
Step 3 From the DNS Zone Properties dialog box, click the Resource Records tab (Figure 2-15).
Step 4 Click in the Name field to select the zone record you want to remove.
Step 5 Click Remove.
Step 1 From the Server Manager window (Figure 4-10), select the zone whose records you want to display.
Step 2 Click the Show Properties toolbar button.
Step 3 From the DNS Zone Properties dialog box, click the Resource Record tab (Figure 2-15).
Step 4 Select the record type you want to display.
Step 5 Click Filter.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Jul 13 11:22:46 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.