CentOS8.4 Bind服务配置(DNS解析)

编程入门 行业动态 更新时间:2024-10-28 13:17:03

CentOS8.4 <a href=https://www.elefans.com/category/jswz/34/1769363.html style=Bind服务配置(DNS解析)"/>

CentOS8.4 Bind服务配置(DNS解析)

目录

Bind服务简介

基本操作

Bind服务主配置文件

配置参数

题一

正反向解析

开放查询和定义区域

定义并编辑区域配置文件

检查配置

修改网络配置

测试验证

题二

辅助DNS

从服务器

主服务器

测试验证

题三

DNS分离解析

关闭根域查询

定义分离解析域

定义区域配置文件

测试验证

易错点总结:


Bind服务简介

BIND(Berkeley Internet Name Daemon 伯克利互联网域名服务) 是一款全球互联网使用最广泛的能够提供安全可靠、快捷高效的域名解析的服务程序。

域名解析是用来方便用户记忆网站的一种服务,其原理是通过访问存储主机域名和IP地址信息的服务器并得到服务器的信息。

BIND的主程序是named,通过对named的各种操作来实现对服务器的控制,该程序调用的文件有:位于/etc/named.conf路径下的主配置文件,位于/etc/named.rfc1910.zones路径下的区域信息文件,位于/var/named目录下的区域配置文件

基本操作

[root@CentOS ~]# systemctl start named
启动
[root@CentOS ~]# systemctl status named
查询状态
[root@CentOS ~]# systemctl stop named
停止
[root@CentOS ~]# systemctl enable named
设置开机自启动
[root@CentOS ~]# systemctl restart named
重启[root@CentOS ~]# rpm -qa | grep bind        查询rpm格式的bind安装包在安装后会释放什么文件
bind-export-libs-9.11.26-3.el8.x86_64
bind-libs-9.11.26-3.el8.x86_64
pcp-pmda-bind2-5.2.5-4.el8.x86_64
bind-utils-9.11.26-3.el8.x86_64
keybinder3-0.3.2-4.el8.x86_64
python3-bind-9.11.26-3.el8.noarch
bind-chroot-9.11.26-3.el8.x86_64
bind-libs-lite-9.11.26-3.el8.x86_64
bind-license-9.11.26-3.el8.noarch
bind-9.11.26-3.el8.x86_64
rpcbind-1.2.5-8.el8.x86_64[root@CentOS ~]# netstat -alnp | grep named        查看bind服务启用了什么端口
tcp        0      0 192.168.110.128:53      0.0.0.0:*               LISTEN      51452/named         
tcp        0      0 127.0.0.1:53            0.0.0.0:*               LISTEN      51452/named         
tcp        0      0 127.0.0.1:953           0.0.0.0:*               LISTEN      51452/named         
tcp6       0      0 :::53                   :::*                    LISTEN      51452/named         
tcp6       0      0 ::1:953                 :::*                    LISTEN      51452/named         
udp        0      0 192.168.110.128:53      0.0.0.0:*                           51452/named         
udp        0      0 127.0.0.1:53            0.0.0.0:*                           51452/named         
udp6       0      0 :::53                   :::*                                51452/named         
unix  2      [ ]         STREAM     CONNECTED     354557   51452/named          
unix  2      [ ]         DGRAM                    354552   51452/named   

Bind服务主配置文件

位于/etc/named.conf路径下,默认配置如下

//
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//options {listen-on port 53 { 127.0.0.1; };listen-on-v6 port 53 { ::1; };directory 	"/var/named";dump-file 	"/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";secroots-file	"/var/named/data/named.secroots";recursing-file	"/var/named/data/named.recursing";allow-query     { localhost; };/* - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.- If you are building a RECURSIVE (caching) DNS server, you need to enable recursion. - If your recursive DNS server has a public IP address, you MUST enable access control to limit queries to your legitimate users. Failing to do so willcause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatlyreduce such attack surface */recursion yes;dnssec-enable yes;dnssec-validation yes;managed-keys-directory "/var/named/dynamic";pid-file "/run/named/named.pid";session-keyfile "/run/named/session.key";/*  */include "/etc/crypto-policies/back-ends/bind.config";
};logging {channel default_debug {file "data/named.run";severity dynamic;};
};zone "." IN {type hint;file "named.ca";
};include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";

配置参数

全局配置参数作用
options {定义全局配置
listen-on port 53 { 127.0.0.1; };设置域名服务监听的IPv4与端口
listen-on-v6 port 53 { ::1; };设置域名服务监听的IPv6与端口
directory "/var/named";设置named程序从/var/named读取区域配置文件
dump-file "/var/named/data/cache_dump.db";设置服务器失效时将缓存数据存储到指定路径下的db文件
statistic-file "/var/named/data/named_stats.txt";设置服务器的统计文件,执行统计命令(rndc stats)时会将内存中的统计信息添加到该文件中
memstatistics-file "/var/named/named_mem_stats.txt";设置服务器输出的内存使用统计文件位置,当执行统计命令时会将内存使用信息追加到该文件中
allow-query { localhost; };设置允许访问的客户端IP地址,设为any表示任意主机
allow-transfer { none; };设置允许接收区域传输的辅助服务器
recursion yes;设置是否启用递归查询
forwarders { 192.168.0.30 };设置转发查询服务器的IP地址
forward only;设置是否在转发查询前进行本地查询,only表示只进行转发,first表示先进行本地查询,成功则显示结果,失败则转发给目标服务器
datasize 100M;设置DNS缓存的大小
dnssec-enable yes;设置启用DNSSEC验证器,解决DNS欺骗和缓存污染的一种安全机制
dnssec-validation yes;设置启用DNSSEC验证
dnssec-lookaside auto;设置为验证器提供另外一个能在网络区域的顶层验证DNS KEY的方法
dnssec-accept-expired yes;设置接收验证DNSSEC签名过期的信号,默认值no
dnssec-must-be-secure yes;设置验证等级,如果选yes,named只接收安全的回应,如果选no,允许接收不安全的回应
};
logging {};先咕了
局部配置参数作用
zone "." IN {};设置根(.)域的配置及信息
type hint;设置区域的类型
master主要区域,容纳所有的域名记录,在主要区域中可以增、删、改域名记录,数据以文本格式存放
slave辅助区域,从主要区域复制所有域名信息,不可对数据进行除读取外的任何操作
stub存根区域,从主要区域的区域配置文件复制SOA、NS、A等信息,不可对数据进行除读取外的任何操作
forward转发区域,客户端发出解析域名请求时,DNS服务器将解析请求转发到其他DNS服务器
hint根区域,从根服务器中解析域名
file "named.ca";设置区域文件的名称

题一

正反向解析

DNS服务器dns.tengyi192.168.89.129
WEB服务器www.tengyi192.168.89.241
FTP服务器ftp.tengyi192.168.89.242
MAIL服务器mail.tengyi192.168.89.243

DNS使用本机IP,可以ping通,可以解析域名

WEB作辅助DNS,可以ping通,可以解析域名

FTP、MAIL使用其他IP,无法ping通,可以解析域名


开放查询和定义区域

#修改主配置文件named.conf,开放监听端口,接受来自任意IP的查询请求[root@CentOS ~]# vim /etc/named.confoptions {listen-on port 53 { any; };
#       listen-on-v6 port 53 { ::1; };directory       "/var/named";dump-file       "/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";secroots-file   "/var/named/data/named.secroots";recursing-file  "/var/named/data/named.recursing";allow-query     { any; };#修改区域信息文件named.rfc1910.zones[root@CentOS ~]# vim /etc/named.rfc1910.zoneszone "tengyi" IN {type master;file "tengyi.zone";allow-update { none; };
};zone "89.168.192.in-addr.arpa" IN {type master;file "192.168.89.zone";allow-update { none; };
};

定义并编辑区域配置文件

#复制正向模板文件并编辑[root@CentOS ~]# cp -p /var/named/named.localhost /var/named/tengyi.zone
[root@CentOS ~]# vim /var/named/tengyi.zone$TTL 1D
@       IN SOA  dns.tengyi root.tengyi (0       ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.tengyi.
dns     IN      A       192.168.89.129
www     IN      A       192.168.89.241
ftp     IN      A       192.168.89.242
mail    IN      A       192.168.89.243#复制反向模板文件并编辑[root@CentOS ~]# cp -p /var/named/named.loopback /var/named/192.168.89.zone
[root@CentOS ~]# vim /var/named/192.168.89.zone$TTL 1D
@       IN SOA  89.168.192.in-addr.arpa root.tengyi (0       ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.tengyi.
129     IN      PTR     dns.tengyi
241     IN      PTR     www.tengyi
242     IN      PTR     ftp.tengyi
243     IN      PTR     mail.tengyi

检查配置

#检查主配置文件[root@CentOS ~]# named-checkconf –zzone localhost.localdomain/IN: loaded serial 0zone localhost/IN: loaded serial 0zone 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa/IN: loaded serial 0zone 1.0.0.127.in-addr.arpa/IN: loaded serial 0zone 0.in-addr.arpa/IN: loaded serial 0zone tengyi/IN: loaded serial 0zone 89.168.192.in-addr.arpa/IN: loaded serial 0#检查区域配置文件#正向
[root@CentOS ~]# named-checkzone tengyi /var/named/tengyi.zonezone tengyi/IN: loaded serial 0OK#反向
[root@CentOS ~]# named-checkzone 89.168.192.in-addr.arpa /var/named/192.168.89.zonezone 89.168.192.in-addr.arpa/IN: loaded serial 0OK

修改网络配置

#编辑网卡配置文件[root@CentOS ~]# vim /etc/sysconfig/network-scripts/ifcfg-ens33 TYPE=Ethernet
PROXY_METHOD=none
BROWSER_ONLY=no#BOOTPROTO=dhcp
BOOTPROTO=noneDEFROUTE=yes
IPV4_FAILURE_FATAL=no
IPV6INIT=yes
IPV6_AUTOCONF=yes
IPV6_DEFROUTE=yes
IPV6_FAILURE_FATAL=no
NAME=ens33
UUID=9cd45edd-4ec3-42e8-ba24-116fe6b22e92
DEVICE=ens33
ONBOOT=yes
IPADDR=192.168.89.129
GATEWAY=192.168.89.129
DNS1=192.168.89.129#重启网络[root@CentOS ~]# nmcli connection reload
[root@CentOS ~]# nmcli connection up ens33
连接已成功激活(D-Bus 活动路径:/org/freedesktop/NetworkManager/ActiveConnection/14)

测试验证

#正反向解析[root@CentOS ~]# nslookup> dns.tengyiServer:          192.168.89.129Address:       192.168.89.129#53Name:    dns.tengyiAddress: 192.168.89.129> www.tengyiServer:          192.168.89.129Address:       192.168.89.129#53Name:    www.tengyiAddress: 192.168.89.241> ftp.tengyiServer:          192.168.89.129Address:       192.168.89.129#53Name:    ftp.tengyiAddress: 192.168.89.242> mail.tengyiServer:          192.168.89.129Address:       192.168.89.129#53Name:    mail.tengyiAddress: 192.168.89.243> 192.168.89.129129.89.168.192.in-addr.arpa    name = dns.tengyi.89.168.192.in-addr.arpa.> 192.168.89.241241.89.168.192.in-addr.arpa    name = www.tengyi.89.168.192.in-addr.arpa.> 192.168.89.242242.89.168.192.in-addr.arpa    name = ftp.tengyi.89.168.192.in-addr.arpa.> 192.168.89.243243.89.168.192.in-addr.arpa    name = mail.tengyi.89.168.192.in-addr.arpa.#ping测试[root@CentOS ~]# ping dns.tengyiPING dns.tengyi (192.168.89.129) 56(84) bytes of data.64 bytes from dns.tengyi.89.168.192.in-addr.arpa (192.168.89.129): icmp_seq=1 ttl=64 time=0.016 ms64 bytes from dns.tengyi.89.168.192.in-addr.arpa (192.168.89.129): icmp_seq=2 ttl=64 time=0.038 ms^C--- dns.tengyi ping statistics ---2 packets transmitted, 2 received, 0% packet loss, time 50msrtt min/avg/max/mdev = 0.016/0.027/0.038/0.011 ms[root@CentOS ~]# ping www.tengyiPING www.tengyi (192.168.89.241) 56(84) bytes of data.^C--- www.tengyi ping statistics ---3 packets transmitted, 0 received, 100% packet loss, time 79ms

题二

辅助DNS

从服务器

#修改主配置文件[root@CentOS ~]# vim /etc/named.confoptions {listen-on port 53 { any; };
#       listen-on-v6 port 53 { ::1; };directory       "/var/named";dump-file       "/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";secroots-file   "/var/named/data/named.secroots";recursing-file  "/var/named/data/named.recursing";allow-query     { any; };#修改区域信息文件[root@CentOS ~]# vim /etc/named.rfc1910.zoneszone "tengyi" IN {type slave;file "slaves/tengyi.zone";masters { 192.168.89.129; };
};zone "89.168.192.in-addr.arpa" IN {type slave;file "slaves/192.168.89.zone";masters { 192.168.89.129; };
};#修改网卡配置[root@CentOS ~]# vim /etc/sysconfig/network-scripts/ifcfg-ens33TYPE=Ethernet
PROXY_METHOD=none
BROWSER_ONLY=no
BOOTPROTO=none
DEFROUTE=yes
IPV4_FAILURE_FATAL=no
IPV6INIT=yes
IPV6_AUTOCONF=yes
IPV6_DEFROUTE=yes
IPV6_FAILURE_FATAL=no
NAME=ens33
UUID=9cd45edd-4ec3-42e8-ba24-116fe6b22e92
DEVICE=ens33
ONBOOT=yes
IPADDR=192.168.89.241  #localhost
NETMASK=255.255.255.0
GATEWAY=192.168.89.129
DNS1=192.168.89.129

主服务器

#修改区域配置文件(正向)
[root@CentOS ~]# vim /var/named/tengyi.zone$TTL 1D
@       IN      SOA     dns.tengyi root.tengyi (01      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.tengyi.IN      NS      slave.tengyi.IN      A       192.168.89.129
dns     IN      A       192.168.89.129
slave   IN      A       192.168.89.241
www     IN      A       192.168.89.241
ftp     IN      A       192.168.89.242
mail    IN      A       192.168.89.243#修改区域配置文件(反向)
[root@CentOS ~]# vim /var/named/192.168.89.zone$TTL 1D
@       IN      SOA     dns.tengyi root.tengyi (01      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.tengyi.IN      NS      slave.tengyi.IN      PTR     dns.tengyi
129     IN      PTR     dns.tengyi
241     IN      PTR     slave.tengyi
241     IN      PTR     www.tengyi
242     IN      PTR     ftp.tengyi
243     IN      PTR     mail.tengyi

测试验证

#正向解析
[root@CentOS ~]# nslookup slave.tengyi
Server:		192.168.89.129
Address:	192.168.89.129#53Name:	slave.tengyi
Address: 192.168.89.241#反向解析
[root@CentOS ~]# nslookup 192.168.89.241
241.89.168.192.in-addr.arpa	name = www.tengyi.89.168.192.in-addr.arpa.
241.89.168.192.in-addr.arpa	name = slave.tengyi.89.168.192.in-addr.arpa.#ping测试
[root@CentOS ~]# ping slave.tengyi
PING slave.tengyi (192.168.89.241) 56(84) bytes of data.
64 bytes from www.tengyi.89.168.192.in-addr.arpa (192.168.89.241): icmp_seq=1 ttl=64 time=0.332 ms
64 bytes from www.tengyi.89.168.192.in-addr.arpa (192.168.89.241): icmp_seq=2 ttl=64 time=30.9 ms
64 bytes from www.tengyi.89.168.192.in-addr.arpa (192.168.89.241): icmp_seq=3 ttl=64 time=28.9 ms
64 bytes from www.tengyi.89.168.192.in-addr.arpa (192.168.89.241): icmp_seq=4 ttl=64 time=0.376 ms
^C
--- slave.tengyi ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3005ms
rtt min/avg/max/mdev = 0.332/15.145/30.943/14.809 ms

题三

DNS分离解析

客户端网段功能
英国192.168.110.0/24访问shabby域名时解析英属域名文件
法国192.168.220.0/24访问shabby域名时解析法属域名文件

 

关闭根域查询

#修改主配置文件,将根域信息注释掉[root@CentOS ~]# vim /etc/named.conf //
// named.conf
//
// Provided by Red Hat bind package to configure the ISC BIND named(8) DNS
// server as a caching only nameserver (as a localhost DNS resolver only).
//
// See /usr/share/doc/bind*/sample/ for example named configuration files.
//options {listen-on port 53 { any; };
#	listen-on-v6 port 53 { ::1; };directory 	"/var/named";dump-file 	"/var/named/data/cache_dump.db";statistics-file "/var/named/data/named_stats.txt";memstatistics-file "/var/named/data/named_mem_stats.txt";secroots-file	"/var/named/data/named.secroots";recursing-file	"/var/named/data/named.recursing";allow-query     { any; };/* - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion.- If you are building a RECURSIVE (caching) DNS server, you need to enable recursion. - If your recursive DNS server has a public IP address, you MUST enable access control to limit queries to your legitimate users. Failing to do so willcause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatlyreduce such attack surface */recursion yes;dnssec-enable yes;dnssec-validation yes;managed-keys-directory "/var/named/dynamic";pid-file "/run/named/named.pid";session-keyfile "/run/named/session.key";/*  */include "/etc/crypto-policies/back-ends/bind.config";
};logging {channel default_debug {file "data/named.run";severity dynamic;};
};
/*
zone "." IN {        根域信息type hint;file "named.ca";
};
*/
include "/etc/named.rfc1912.zones";
include "/etc/named.root.key";

定义分离解析域

#清空原区域信息文件的内容,写入如下配置
[root@CentOS ~]# vim /etc/named.rfc1912.zones acl "britain" { 192.168.110.0/24; };
acl "france"  { 192.168.220.0/24; };view "britain" {match-clients { "britain"; };zone "shabby" IN {type master;file "shabby.britain";};zone "110.168.192.in-addr.arpa" IN {type master;file "192.168.110.britain";};
};view "france" {match-clients { "france"; };zone "shabby" IN {type master;file "shabby.france";};zone "220.168.192.in-addr.arpa" IN {type master;file "192.168.220.france";};
};

定义区域配置文件

#正向
#英国
[root@CentOS ~]# vim /var/named/shabby.britain $TTL 1D
@       IN SOA  shabby. root.shabby. (0      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.shabby.
dns     IN      A       192.168.110.101
www     IN      A       192.168.110.102#法国
[root@CentOS ~]# vim /var/named/shabby.france $TTL 1D
@       IN SOA  shabby. root.shabby. (0      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.shabby.
dns     IN      A       192.168.220.191
www     IN      A       192.168.220.201#反向
#英国
[root@CentOS ~]# vim /var/named/192.168.110.britain $TTL 1D
@       IN SOA  110.168.192.in-addr.arpa. root.shabby. (0      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.shabby.
101     IN      PTR     dns.shabby.
102     IN      PTR     www.shabby.#法国
[root@CentOS ~]# vim /var/named/192.168.220.france $TTL 1D
@       IN SOA  220.168.192.in-addr.arpa. root.shabby. (0      ; serial1D      ; refresh1H      ; retry1W      ; expire3H )    ; minimumIN      NS      dns.shabby.
191     IN      PTR     dns.shabby.
201     IN      PTR     www.shabby.

测试验证

Windows客户端连接验证
条件: 仅启用192.168.110网段的网卡连接并将网卡的首选dns服务器设为linux虚拟机的IP同时虚拟机IP更换为192.168.110.128英国D:\>nslookup dns.shabby
服务器:  UnKnown
Address:  192.168.110.128名称:    dns.shabby
Address:  192.168.110.101D:\>nslookup www.shabby
服务器:  UnKnown
Address:  192.168.110.128名称:    www.shabby
Address:  192.168.110.102D:\>nslookup 192.168.110.101
服务器:  UnKnown
Address:  192.168.110.128名称:    dns.shabby
Address:  192.168.110.101D:\>nslookup 192.168.110.102
服务器:  UnKnown
Address:  192.168.110.128名称:    www.shabby
Address:  192.168.110.102条件: 仅启用192.168.220网段的网卡连接并将网卡的首选dns服务器设为linux虚拟机的IP同时将虚拟机IP更换为192.168.220.128法国D:\>nslookup dns.shabby
服务器:  UnKnown
Address:  192.168.220.128名称:    dns.shabby
Address:  192.168.220.191D:\>nslookup www.shabby
服务器:  UnKnown
Address:  192.168.220.128名称:    www.shabby
Address:  192.168.220.201D:\>nslookup 192.168.220.191
服务器:  UnKnown
Address:  192.168.220.128名称:    dns.shabby
Address:  192.168.220.191D:\>nslookup 192.168.220.201
服务器:  UnKnown
Address:  192.168.220.128名称:    www.shabby
Address:  192.168.220.201


 

易错点总结:

  • 缺点

"IN      NS      dns.tengyi."

这一行后面域名要加上点(就是cn后面的那个“.”),不加会报错(这里举正反向文件为例):

[root@CentOS ~]# named-checkzone tengyi /var/named/tengyi.zone 
zone tengyi/IN: NS 'dns.tengyi.tengyi' has no address records (A or AAAA)
zone tengyi/IN: not loaded due to errors.
[root@CentOS ~]# named-checkzone 89.168.192.in-addr.arpa /var/named/192.168.89.zone 
zone 89.168.192.in-addr.arpa/IN: NS 'dns.tengyi.89.168.192.in-addr.arpa' has no address records (A or AAAA)
zone 89.168.192.in-addr.arpa/IN: not loaded due to errors.

  • 缺分号

named.conf和named.rfc1912.zones里的语句每一句结束都应该加上“;”

[root@CentOS ~]# named-checkconf -z
/etc/named.conf:31: missing ';' before 'recursion'

严重一点:

[root@CentOS ~]# named-checkconf -z
/etc/named.conf:13: missing ';' before 'directory'
/etc/named.conf:14: missing ';' before 'dump-file'
/etc/named.conf:15: missing ';' before 'statistics-file'
/etc/named.conf:16: missing ';' before 'memstatistics-file'
/etc/named.conf:17: missing ';' before 'secroots-file'
/etc/named.conf:18: missing ';' before 'recursing-file'
/etc/named.conf:19: missing ';' before 'allow-query'
/etc/named.conf:31: missing ';' before 'recursion'

  • 服务器与客户端的网络连接状况

[root@CentOS ~]# ping dns.tengyi
ping: dns.tengyi: 未知的名称或服务

确保服务没有被SELinux拦截,确保防火墙已允许该服务的数据传输,确保客户端与服务器的网络连接正常

更多推荐

CentOS8.4 Bind服务配置(DNS解析)

本文发布于:2024-02-12 00:14:29,感谢您对本站的认可!
本文链接:https://www.elefans.com/category/jswz/34/1684522.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:Bind   DNS

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!