BIND 9 DNS no Debian Squeeze/Wheezy e Ubuntu 12/13 (Compativel com Active Directory no Windows Server)
Dica publicada em Linux / Introdução
BIND 9 DNS no Debian Squeeze/Wheezy e Ubuntu 12/13 (Compativel com Active Directory no Windows Server)
Depois de muita procura, tentativas e erros, acertei na configuração do servidor DNS BIND 9 compatível com Active Directory no Windows Server 2008 R2/2003 R2.
# vi /etc/hosts
Instalação do BIND:
# apt-get install bind9 dnsutils bind9-doc
# vi /var/lib/bind/adzonas/DomainDNSZones.dominio.local
# vi /var/lib/bind/adzonas/ForestDNSZones.dominio.local
# vi /var/lib/bind/adzonas/_msdcs.dominio.local
# vi /var/lib/bind/adzonas/_sites.dominio.local
# vi /var/lib/bind/adzonas/_tcp.dominio.local
# vi /var/lib/bind/adzonas/_udp.dominio.local
# chown bind -R /var/lib/bind/adzonas
# chown bind -R /var/lib/bind
Agora, vamos reinicializar o BIND com o comando:
# /etc/init.d/bind9 restart
Verifique no arquivo de log "/var/log/syslog", se ocorreu algum problema:
# tail -f -n 30 /var/log/syslog | grep named
É isso aí pessoal... Qualquer dúvida é só postar aí.
Abraços!!!!
Configurações iniciais e instalação do BIND 9
Configurando o arquivo hosts. Edite o arquivo "/etc/hosts" e deixe-o como abaixo:# vi /etc/hosts
127.0.0.1 localhost
127.0.1.1 ns1.dominio.local ns1
192.168.0.2 ns1.dominio.local ns1
127.0.1.1 ns1.dominio.local ns1
192.168.0.2 ns1.dominio.local ns1
Instalação do BIND:
# apt-get install bind9 dnsutils bind9-doc
Configurando as zonas
Zonas necessárias para o Active Directory. Edite o arquivo "named.conf.local":
acl "WinAD" { 10.1.1.0/24; # Sua Rede
};
zone "dominio.local" {
type master;
file "/var/lib/bind/dominio.local.hosts";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "0.1.10.in-addr.arpa" {
type master;
notify no;
file "/var/lib/bind/10.1.0.rev";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_msdcs.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_msdcs.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_tcp.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_tcp.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_udp.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_udp.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_sites.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_sites.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "ForestDNSZones.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/ForestDNSZones.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "DomainDNSZones.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/DomainDNSZones.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
};
zone "dominio.local" {
type master;
file "/var/lib/bind/dominio.local.hosts";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "0.1.10.in-addr.arpa" {
type master;
notify no;
file "/var/lib/bind/10.1.0.rev";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_msdcs.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_msdcs.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_tcp.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_tcp.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_udp.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_udp.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "_sites.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/_sites.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "ForestDNSZones.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/ForestDNSZones.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
zone "DomainDNSZones.dominio.local" {
check-names ignore;
type master;
file "/var/lib/bind/adzonas/DomainDNSZones.dominio.local";
allow-update {WinAD;};
allow-query {WinAD;};
allow-transfer {WinAD;};
};
Escrevendo o arquivo de zonas
Criar e editar os seguintes arquivos:# vi /var/lib/bind/adzonas/DomainDNSZones.dominio.local
$TTL 3D
DomainDNSZones.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
DomainDNSZones.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
# vi /var/lib/bind/adzonas/ForestDNSZones.dominio.local
$TTL 3D
ForestDNSZones.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
ForestDNSZones.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
# vi /var/lib/bind/adzonas/_msdcs.dominio.local
$TTL 3D
_msdcs.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
_msdcs.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
# vi /var/lib/bind/adzonas/_sites.dominio.local
$TTL 3D
_sites.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
_sites.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
# vi /var/lib/bind/adzonas/_tcp.dominio.local
$TTL 3D
_tcp.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
_tcp.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
# vi /var/lib/bind/adzonas/_udp.dominio.local
$TTL 3D
_udp.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
_udp.dominio.local. IN SOA ns1.dominio.local. root.ns1.dominio.local. (
2009050301;Serial
43200;Refresh
900;Retry
2419200;Expire
3600);Negative Cache TTL
@ IN NS ns1.dominio.local.
Setando as permissões nos diretórios e verificando os logs
Permissões para os diretórios:# chown bind -R /var/lib/bind/adzonas
# chown bind -R /var/lib/bind
Agora, vamos reinicializar o BIND com o comando:
# /etc/init.d/bind9 restart
Verifique no arquivo de log "/var/log/syslog", se ocorreu algum problema:
# tail -f -n 30 /var/log/syslog | grep named
É isso aí pessoal... Qualquer dúvida é só postar aí.
Abraços!!!!