Current File : //etc/named.conf,v
head	1.7;
access;
symbols;
locks
	root:1.7; strict;
comment	@# @;


1.7
date	2018.01.23.04.04.28;	author root;	state Exp;
branches;
next	1.6;

1.6
date	2017.11.09.04.06.29;	author root;	state Exp;
branches;
next	1.5;

1.5
date	2016.06.09.04.55.47;	author root;	state Exp;
branches;
next	1.4;

1.4
date	2016.01.06.04.14.15;	author root;	state Exp;
branches;
next	1.3;

1.3
date	2015.07.01.08.15.34;	author root;	state Exp;
branches;
next	1.2;

1.2
date	2015.06.26.19.28.50;	author root;	state Exp;
branches;
next	1.1;

1.1
date	2015.06.26.19.28.04;	author root;	state Exp;
branches;
next	;


desc
@@


1.7
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@include "/etc/rndc.key";

controls {
	inet 127.0.0.1 allow { localhost; } keys { "rndc-key"; };
};

options {
    /* make named use port 53 for the source of all queries, to allow
         * firewalls to block all ports except 53:
         */

    // query-source    port 53;
    
    recursion no;

    /* We no longer enable this by default as the dns posion exploit
        has forced many providers to open up their firewalls a bit */

    // Put files that named is allowed to write in the data/ directory:
    directory                "/var/named"; // the default
    pid-file                 "/var/run/named/named.pid";
    dump-file                "data/cache_dump.db";
    statistics-file          "data/named_stats.txt";
   /* memstatistics-file     "data/named_mem_stats.txt"; */
    allow-transfer    { "none"; };
};

logging {
/*      If you want to enable debugging, eg. using the 'rndc trace' command,
 *      named will try to write the 'named.run' file in the $directory (/var/named").
 *      By default, SELinux policy does not allow named to modify the /var/named" directory,
 *      so put the default debug log file in data/ :
 */
    channel default_debug {
            file "data/named.run";
            severity dynamic;
    };
};


// All BIND 9 zones are in a "view", which allow different zones to be served
// to different types of client addresses, and for options to be set for groups
// of zones.
//
// By default, if named.conf contains no "view" clauses, all zones are in the
// "default" view, which matches all clients.
//
// If named.conf contains any "view" clause, then all zones MUST be in a view;
// so it is recommended to start off using views to avoid having to restructure
// your configuration files in the future.

view "localhost_resolver" {
/* This view sets up named to be a localhost resolver ( caching only nameserver ).
 * If all you want is a caching-only nameserver, then you need only define this view:
 */
    match-clients         { 127.0.0.0/24; };
    match-destinations    { localhost; };
    recursion yes;

    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    /* these are zones that contain definitions for all the localhost
     * names and addresses, as recommended in RFC1912 - these names should
     * ONLY be served to localhost clients:
     */
    include "/var/named/named.rfc1912.zones";
};

view "internal" {
/* This view will contain zones you want to serve only to "internal" clients
   that connect via your directly attached LAN interfaces - "localnets" .
 */
    match-clients        { localnets; };
    match-destinations    { localnets; };
    recursion yes;

    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    // include "/var/named/named.rfc1912.zones";
    // you should not serve your rfc1912 names to non-localhost clients.

    // These are your "authoritative" internal zones, and would probably
    // also be included in the "localhost_resolver" view above :

zone "manage.berardocollection.com" {
	type master;
	file "/var/named/manage.berardocollection.com.db";
};




zone "berardo.org" {
	type master;
	file "/var/named/berardo.org.db";
};


zone "clipping.berardocollection.com" {
	type master;
	file "/var/named/clipping.berardocollection.com.db";
};


zone "berardocollection.com" {
	type master;
	file "/var/named/berardocollection.com.db";
};


zone "montepalace.com" {
	type master;
	file "/var/named/montepalace.com.db";
};


zone "acolb.com" {
	type master;
	file "/var/named/acolb.com.db";
};


zone "metalgest.pt" {
	type master;
	file "/var/named/metalgest.pt.db";
};


zone "berardo.tv" {
	type master;
	file "/var/named/berardo.tv.db";
};


zone "adc.com.pt" {
	type master;
	file "/var/named/adc.com.pt.db";
};




zone "museuberardo.pt" {
	type master;
	file "/var/named/museuberardo.pt.db";
};


zone "berardomuseu.com" {
	type master;
	file "/var/named/berardomuseu.com.db";
};


zone "berardomuseum.com" {
	type master;
	file "/var/named/berardomuseum.com.db";
};


zone "museuberardo.com" {
	type master;
	file "/var/named/museuberardo.com.db";
};


zone "museumberardo.com" {
	type master;
	file "/var/named/museumberardo.com.db";
};


zone "madbug.com" {
	type master;
	file "/var/named/madbug.com.db";
};


zone "oficina37.com" {
	type master;
	file "/var/named/oficina37.com.db";
};


zone "metalgest.com" {
	type master;
	file "/var/named/metalgest.com.db";
};


zone "coleccaoberardo.com" {
	type master;
	file "/var/named/coleccaoberardo.com.db";
};


zone "bernardocollection.com" {
	type master;
	file "/var/named/bernardocollection.com.db";
};


zone "beradocollection.com" {
	type master;
	file "/var/named/beradocollection.com.db";
};


zone "37r.oficina37com" {
	type master;
	file "/var/named/37r.oficina37com.db";
};


zone "ptisp.vm01.berardocollection.com" {
	type master;
	file "/var/named/ptisp.vm01.berardocollection.com.db";
};


zone "montepalacemadeira.com" {
	type master;
	file "/var/named/montepalacemadeira.com.db";
};


zone "montepalacemadeira.pt" {
	type master;
	file "/var/named/montepalacemadeira.pt.db";
};


zone "montpalacemadeira.com" {
	type master;
	file "/var/named/montpalacemadeira.com.db";
};

};

view    "external" {
/* This view will contain zones you want to serve only to "external" clients
 * that have addresses that are not on your directly attached LAN interface subnets:
 */
    recursion no;
    additional-from-cache no;
    // you'd probably want to deny recursion to external clients, so you don't
    // end up providing free DNS service to all takers

    // all views must contain the root hints zone:
    zone "." IN {
        type hint;
        file "/var/named/named.ca";
    };

    // These are your "authoritative" external zones, and would probably
    // contain entries for just your web and mail servers:

    // BEGIN external zone entries


zone "manage.berardocollection.com" {
	type master;
	file "/var/named/manage.berardocollection.com.db";
};




zone "berardo.org" {
	type master;
	file "/var/named/berardo.org.db";
};


zone "clipping.berardocollection.com" {
	type master;
	file "/var/named/clipping.berardocollection.com.db";
};


zone "berardocollection.com" {
	type master;
	file "/var/named/berardocollection.com.db";
};


zone "montepalace.com" {
	type master;
	file "/var/named/montepalace.com.db";
};


zone "acolb.com" {
	type master;
	file "/var/named/acolb.com.db";
};


zone "metalgest.pt" {
	type master;
	file "/var/named/metalgest.pt.db";
};


zone "berardo.tv" {
	type master;
	file "/var/named/berardo.tv.db";
};


zone "adc.com.pt" {
	type master;
	file "/var/named/adc.com.pt.db";
};




zone "museuberardo.pt" {
	type master;
	file "/var/named/museuberardo.pt.db";
};


zone "berardomuseu.com" {
	type master;
	file "/var/named/berardomuseu.com.db";
};


zone "berardomuseum.com" {
	type master;
	file "/var/named/berardomuseum.com.db";
};


zone "museuberardo.com" {
	type master;
	file "/var/named/museuberardo.com.db";
};


zone "museumberardo.com" {
	type master;
	file "/var/named/museumberardo.com.db";
};


zone "madbug.com" {
	type master;
	file "/var/named/madbug.com.db";
};


zone "oficina37.com" {
	type master;
	file "/var/named/oficina37.com.db";
};


zone "metalgest.com" {
	type master;
	file "/var/named/metalgest.com.db";
};


zone "coleccaoberardo.com" {
	type master;
	file "/var/named/coleccaoberardo.com.db";
};


zone "bernardocollection.com" {
	type master;
	file "/var/named/bernardocollection.com.db";
};


zone "beradocollection.com" {
	type master;
	file "/var/named/beradocollection.com.db";
};


zone "37r.oficina37com" {
	type master;
	file "/var/named/37r.oficina37com.db";
};


zone "ptisp.vm01.berardocollection.com" {
	type master;
	file "/var/named/ptisp.vm01.berardocollection.com.db";
};


zone "montepalacemadeira.com" {
	type master;
	file "/var/named/montepalacemadeira.com.db";
};


zone "montepalacemadeira.pt" {
	type master;
	file "/var/named/montepalacemadeira.pt.db";
};


zone "montpalacemadeira.com" {
	type master;
	file "/var/named/montpalacemadeira.com.db";
};

};
@


1.6
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@d226 18
d400 18
@


1.5
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@a146 4
zone "sintramodernart.com" {
	type master;
	file "/var/named/sintramodernart.com.db";
};
a304 4
zone "sintramodernart.com" {
	type master;
	file "/var/named/sintramodernart.com.db";
};
@


1.4
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@a96 4
zone "metaforos.com" {
	type master;
	file "/var/named/metaforos.com.db";
};
a258 4
zone "metaforos.com" {
	type master;
	file "/var/named/metaforos.com.db";
};
@


1.3
log
@"Modified by /usr/local/cpanel/scripts/fixnamedviews Initial checkin editviewdirective: external"
@
text
@d228 6
d392 6
@


1.2
log
@"Modified by /usr/local/cpanel/scripts/fixrndc Initial checkin from /usr/local/cpanel/scripts/fixrndc"
@
text
@d90 138
d249 138
@


1.1
log
@"Modified by /usr/local/cpanel/scripts/rebuilddnsconfig rebuilddnsconfig END"
@
text
@d1 6
@