Solo disponible en BuenasTareas
  • Páginas : 7 (1659 palabras )
  • Descarga(s) : 0
  • Publicado : 6 de mayo de 2011
Leer documento completo
Vista previa del texto
Following is a list of elements used throughout the BIND configuration file documentation:

The name of an address_match_list as defined by the acl statement.

A list of one or more ip_addr, ip_prefix, key_id, or acl_name elements, see the section called “Address Match Lists”.

A named list of one or more ip_addr with optional key_idand/or ip_port. A masters_list may include other masters_lists.

A quoted string which will be used as a DNS name, for example "my.test.domain".

One to four integers valued 0 through 255 separated by dots (`.'), such as 123, 45.67 or

An IPv4 address with exactly four elements in dotted_decimal notation.

An IPv6address, such as 2001:db8::1234. IPv6 scoped addresses that have ambiguity on their scope zones must be disambiguated by an appropriate zone ID with the percent character (`%') as delimiter. It is strongly recommended to use string zone names rather than numeric identifiers, in order to be robust against system configuration changes. However, since there is no standard mapping for such names andidentifier values, currently only interface names as link identifiers are supported, assuming one-to-one mapping between interfaces and links. For example, a link-local address fe80::1 on the link attached to the interface ne0 can be specified as fe80::1%ne0. Note that on most systems link-local addresses always have the ambiguity, and need to be disambiguated.

An ip4_addr orip6_addr.

An IP port number. number is limited to 0 through 65535, with values below 1024 typically restricted to use by processes running as root. In some cases, an asterisk (`*') character can be used as a placeholder to select a random high-numbered port.

An IP network specified as an ip_addr, followed by a slash (`/') and then the number of bits in the netmask.Trailing zeros in a ip_addr may omitted. For example, 127/8 is the network with netmask and is network with netmask

A domain_name representing the name of a shared key, to be used for transaction security.

A list of one or more key_ids, separated by semicolons and ending with a semicolon.

Anon-negative 32-bit integer (i.e., a number between 0 and 4294967295, inclusive). Its acceptable value might further be limited by the context in which it is used.

A quoted string which will be used as a pathname, such as zones/master/my.test.domain.

A number, the word unlimited, or the word default.

An unlimited size_spec requests unlimited use, or the maximumavailable amount. A default size_spec uses the limit that was in force when the server was started.

A number can optionally be followed by a scaling factor: K or k for kilobytes, M or m for megabytes, and G or g for gigabytes, which scale by 1024, 1024*1024, and 1024*1024*1024 respectively.

The value must be representable as a 64-bit unsigned integer (0 to 18446744073709551615, inclusive).Using unlimited is the best way to safely set a really large number.

Either yes or no. The words true and false are also accepted, as are the numbers 1 and 0.

One of yes, no, notify, notify-passive, refresh or passive. When used in a zone, notify-passive, refresh, and passive are restricted to slave and stub zones.

Address Match Lists
Syntaxaddress_match_list = address_match_list_element ;
[ address_match_list_element; ... ]
address_match_list_element = [ ! ] (ip_address [/length] |
key key_id | acl_name | { address_match_list } )

Definition and Usage
Address match lists are primarily used to determine access control for various server operations. They are also used in the listen-on and sortlist statements. The elements which...
tracking img