Examples
This page introduces some examples of operations in which the Managed DNS Service and your DNS servers (BIND, NSD, etc.) are linked.
Examples of Primary Server Settings
The following examples use your server as the primary name server and a Managed DNS Server as a secondary name server. Settings that are not directly related to the use of this service are omitted. Configure the settings according to your environment.
Refer to "Operating a Managed DNS Server as a Secondary Name Server" for more information on settings on the side of this service.
In the case of BIND
// TSIG key // Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples // Not required unless TSIG is used key "xxx.xxxx.d-53.net." { algorithm hmac-sha256; secret "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx="; }; // NOTIFY send destination // Delete the "Key name" when TSIG is not used masters dpf-notify { 210.130.1.35 key xxx.xxxx.d-53.net.; 210.130.1.43 key xxx.xxxx.d-53.net.; 210.130.1.48 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:35 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:43 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:48 key xxx.xxxx.d-53.net.; }; // Set access permission from the DNS Platform Service side // When TSIG is used; Reference https://kb.isc.org/docs/aa-00723 acl dpf { ! { ! { 210.130.1.32/27; 2001:240:bb81::2:0/112; }; any; }; key xxx.xxxx.d-53.net.; }; // When TSIG is not used //acl dpf { // 210.130.1.32/27; 2001:240:bb81::2:0/112; //}; // Repeat as many times as the number of zones shown below zone "example.jp" { type master; file "example.jp.zone"; // NOTIFY notify explicit; also-notify { dpf-notify; }; // Zone transfer allow-transfer { dpf; }; };
In the case of NSD
# TSIG key # Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples # Not required unless TSIG is used key: name: "xxx.xxxx.d-53.net." algorithm: sha256 secret: "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=" # Zone setting template # When TSIG is not used, replace the key name with "NOKEY" pattern: name: "dpf-primary" zonefile: "%s.zone" # NOTIFY send destination notify: 210.130.1.35 xxx.xxxx.d-53.net. notify: 210.130.1.43 xxx.xxxx.d-53.net. notify: 210.130.1.48 xxx.xxxx.d-53.net. notify: 2001:240:bb81::2:35 xxx.xxxx.d-53.net. notify: 2001:240:bb81::2:43 xxx.xxxx.d-53.net. notify: 2001:240:bb81::2:48 xxx.xxxx.d-53.net. # Zone transfer permission provide-xfr: 210.130.1.32/27 xxx.xxxx.d-53.net. provide-xfr: 2001:240:bb81::2:0/112 xxx.xxxx.d-53.net. # Repeat as many times as the number of zones shown below zone: name: "example.jp" include-pattern: "dpf-primary"
In the case of Knot
# TSIG key # Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples # Not required unless TSIG is used key: - id: xxx.xxxx.d-53.net. algorithm: hmac-sha256 secret: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx= # NOTIFY send destination remote: - id: dpf-notify address: [ 210.130.1.35, 210.130.1.43, 210.130.1.48 ] address: [ 2001:240:bb81::2:35, 2001:240:bb81::2:43, 2001:240:bb81::2:48 ] key: xxx.xxxx.d-53.net. # Not required unless TSIG is used # Zone transfer permission acl: - id: dpf-transfer address: 210.130.1.32/27 address: 2001:240:bb81::2:0/112 key: xxx.xxxx.d-53.net. # Not required unless TSIG is used action: transfer # Zone setting template template: - id: dpf-primary notify: dpf-notify acl: dpf-transfer # Repeat as many times as the number of zones shown below zone: - domain: example.jp template: dpf-primary
Examples of Secondary Server Settings
The following examples use a Managed DNS Server as the primary name server and your server as a secondary name server. Settings that are not directly related to the use of this service are omitted. Configure the settings according to your environment.
Refer to "Operating a Managed DNS Server as the Primary Name Server" for more information on settings on the side of this service.
In the case of BIND
// TSIG key // Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples // Not required unless TSIG is used key "xxx.xxxx.d-53.net." { algorithm hmac-sha256; secret "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx="; }; // Primary server setting // Delete the "Key name" when TSIG is not used masters dpf-primary { 210.130.1.36 key xxx.xxxx.d-53.net.; 210.130.1.44 key xxx.xxxx.d-53.net.; 210.130.1.49 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:36 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:44 key xxx.xxxx.d-53.net.; 2001:240:bb81::2:49 key xxx.xxxx.d-53.net.; }; // Set access permission from the DNS Platform Service side // When TSIG is used; Reference https://kb.isc.org/docs/aa-00723 acl dpf { ! { ! { 210.130.1.32/27; 2001:240:bb81::2:0/112; }; any; }; key xxx.xxxx.d-53.net.; }; // When TSIG is not used //acl dpf { // 210.130.1.32/27; 2001:240:bb81::2:0/112; //}; // Repeat as many times as the number of zones shown below zone "example.jp" { type slave; file "example.jp.zone"; // Primary server setting masters { dpf-primary; }; // NOTIFY permission allow-notify { dpf; }; };
In the case of NSD
# TSIG key # Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples # Not required unless TSIG is used key: name: "xxx.xxxx.d-53.net." algorithm: sha256 secret: "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=" # Zone setting template # When TSIG is not used, replace the key name with "NOKEY" pattern: name: "dpf-secondary" zonefile: "%s.zone" # Primary server setting request-xfr: 210.130.1.36 xxx.xxxx.d-53.net. request-xfr: 210.130.1.44 xxx.xxxx.d-53.net. request-xfr: 210.130.1.49 xxx.xxxx.d-53.net. request-xfr: 2001:240:bb81::2:36 xxx.xxxx.d-53.net. request-xfr: 2001:240:bb81::2:44 xxx.xxxx.d-53.net. request-xfr: 2001:240:bb81::2:49 xxx.xxxx.d-53.net. # NOTIFY permission allow-notify: 210.130.1.32/27 xxx.xxxx.d-53.net. allow-notify: 2001:240:bb81::2:0/112 xxx.xxxx.d-53.net. # Repeat as many times as the number of zones shown below zone: name: "example.jp" include-pattern: "dpf-secondary"
In the case of Knot
# TSIG key # Paste the contents displayed in Dashboard → Service Management → TSIG Key Management → Examples # Not required unless TSIG is used key: - id: xxx.xxxx.d-53.net. algorithm: hmac-sha256 secret: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx= # Primary server setting remote: - id: dpf-primary address: [ 210.130.1.36, 210.130.1.44, 210.130.1.49 ] address: [ 2001:240:bb81::2:36, 2001:240:bb81::2:44, 2001:240:bb81::2:49 ] key: xxx.xxxx.d-53.net. # Not required unless TSIG is used # NOTIFY permission acl: - id: dpf-notify address: 210.130.1.32/27 address: 2001:240:bb81::2:0/112 key: xxx.xxxx.d-53.net. # Not required unless TSIG is used action: notify # Zone setting template template: - id: dpf-secondary master: dpf-primary acl: dpf-notify # Repeat as many times as the number of zones shown below zone: - domain: example.jp template: dpf-secondary