[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
A records abbreviating
adding programmatically
adding with nsupdate command
anti-spam tests
delegating subdomains
DHCP servers
disabling glue fetching
Domain Controllers
domain names
2nd
dynamic updates
filtering host tables
hosts
2nd
3rd
mail servers
2nd
moving name servers
name resolution
pointing to URLs
pointing to web servers
2nd
RDATA subfields
returning answer example
2nd
reverse-mapping zones
root name servers
2nd
round robins
sortlists
2nd
stub zones
TTLs
2nd
underscores
web browsers
wildcard domain names
A6 records
2nd
AAAA records
2nd
3rd
4th
ACLs (access control lists) allow substatement
BIND 9
localhost or localnets
naming considerations
options statement and
queries
responses dependent on addresses
slaves with multiple views
zone transfers
Active Directory
additional-from-auth substatement
2nd
address keyword
addresses looking up
regional registries
sorting multiple
zzsort
[See also email address IP addresses][See also email address IP addresses] AirNav (Airport Information)
Airport Information (AirNav)
aliases "template" zone data files and
adding
2nd
CNAME record dictum
domain names
2nd
listen-on substatement and
reverse-mapping
2nd
shell aliases
2nd
SMTP mail servers and
virtual mail addresses
without explicit records
allow substatement
allow-query substatement blackhole substatement and
configuring caching name server
restricting queries
2nd
3rd
allow-recursion options substatement
2nd
allow-transfer substatement options statement
promoting slaves
zone transfers
2nd
allow-update substatement cautions
promoting slaves
security
zone statement
2nd
3rd
allow-update-forwarding zone substatement
also-notify substatement BIND 8
NOTIFY messages
promoting slaves
zone statement
angle brackets (<\\>)
anonymous FTP
answers dependent on IP addresses
order of
2nd
anti-spam tests
2nd
Apache Software Foundation
APNIC registry
arguments multiple domain names
restarting name servers
2nd
ARIN registry
asterisk (*)
2nd
at sign (@)
2nd
3rd
attacks denial of service attacks
2nd
illegal domain names
spoofing attacks
2nd
3rd
authoritative name servers configuring caching servers
configuring slaves
2nd
controlling multiple processes
dialup connections
2nd
dividing named.conf file
full reloads and
functional domain names
measuring queries
2nd
moving
2nd
multiple zones
2nd
named.conf file
NS records and
2nd
null forwarders list and
points of failure
protecting from spoofing
queryperf and
setting up
2nd
stealth slaves
2nd
timeouts
updating delegation
zone transfers and
zone transfers using dig
2nd
zzsort
[See also primary master name servers slave name servers][See also primary master name servers slave name servers] authoritative name service
authorization allow-update substatement
identifying levels of
migrating domain names
for transfer process
axfr method (Net\:\:DNS)
|