Updating source code on a working bind server linux
allow-notify applies to slave zones only and defines a match list, for example, IP address(es) that are allowed to NOTIFY this server and implicitly update the zone in addition to those hosts defined in the masters option for the zone.
This compiles fine with the changes and I get no errors but after running // // // // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS // server as a caching only nameserver (as a localhost DNS resolver only). (I was also investigating this issue recently, and here's my conclusions): DLZ support in BIND9 looks more like a "patch". It's well documented, widely used and is easy to implement.This means that if the server does not know the answer, it will just tell the client (usually some kind of resolving DNS server) that it does not know the answer and give a reference to a server that may know more.Authoritative-only DNS servers are often a good configuration for high performance because they do not have the overhead of resolving recursive queries from clients.This avoids the peril of having a single point of failure for your DNS servers.Unlike caching or forwarding DNS servers or a multi-purpose DNS server, authoritative-only servers only respond to iterative queries for the zones that they are authoritative for.allow-update defines an address_match_list of hosts that are allowed to submit dynamic updates for master zones, and thus this statement enables Dynamic DNS.
The default in BIND 9 is to disallow updates from all hosts, that is, DDNS is disabled by default.
An important part of managing server configuration and infrastructure includes maintaining an easy way to look up network interfaces and IP addresses by name, by setting up a proper Domain Name System (DNS).
Using fully qualified domain names (FQDNs), instead of IP addresses, to specify network addresses eases the configuration of services and applications, and increases the maintainability of configuration files.
This provides a central way to manage your internal hostnames and private IP addresses, which is indispensable when your environment expands to more than a few hosts.
The Cent OS version of this tutorial can be found here.
This statement may be used in a zone, view or global options clause. IP address(es) that are allowed to transfer (copy) the zone information from the server (master or slave for the zone).