184
— Matches any IP address on any network to which the local system is connected.
•
localnets
— Matches no IP addresses.
•
none
When used in conjunction with other statements (such as the
can be very useful in preventing the misuse of a BIND nameserver.
The following example defines two access control lists and uses an
they are treated by the nameserver:
acl black-hats {
10.0.2.0/24;
192.168.0.0/24;
};
acl red-hats {
10.0.1.0/24;
};
options {
blackhole { black-hats; };
allow-query { red-hats; };
allow-recursion { red-hats; };
}
This example contains two access control lists,
list are denied access to the nameserver, while hosts in the
black-hats
normal access.
12.2.1.2.
Statement
include
The
statement allows files to be included in a
include
uration data (such as
An
statement takes the following form:
include
include
" file-name "
In this statement,
file-name
12.2.1.3.
Statement
options
The
statement defines global server configuration options and sets defaults for other state-
options
ments. It can be used to specify the location of the
allowed, and much more.
The
statement takes the following form:
options
options {
option ;
[ option ; ...]
};
In this statement, the
The following are commonly used options:
) can be placed in a separate file with restrictive permissions.
keys
is replaced with an absolute path to a file.
directives are replaced with a valid option.
option
Chapter 12. Berkeley Internet Name Domain (BIND)
options
black-hats
named.conf
working directory, the types of queries
named
statement),
acl
statement to define how
options
and
. Hosts in the
red-hats
list are given
red-hats
file. This way sensitive config-
statements
Need help?
Do you have a question about the ENTERPRISE LINUX 3 and is the answer not in the manual?