Prerequisites for Configuring DNS
To use DNS, you must have a DNS name server on your network.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Domain Name System (DNS) is a distributed database in which you can map host names to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated host name. The Cisco IOS XE software maintains a cache of host-name-to-address mappings for use by the connect , telnet , and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses.
To use DNS, you must have a DNS name server on your network.
If your network devices require connectivity with devices in networks for which you do not control name assignment, you can assign device names that uniquely identify your devices within the entire internetwork. The global naming scheme of the Internet, the DNS, accomplishes this task. This service is enabled by default. The following sections summarize DNS concepts and function:
Each unique IP address can have an associated host name. DNS uses a hierarchical scheme for establishing host names for network nodes. This allows local control of the segments of the network through a client-server scheme. The DNS system can locate a network device by translating the host name of the device into its associated IP address.
IP defines a naming scheme that allows a device to be identified by its location in the IP. This is a hierarchical naming scheme that provides for domains . On the Internet, a domain is a portion of the naming hierarchy tree that refers to general groupings of networks based on organization type or geography. Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco is a commercial organization that the IP identifies by a com domain name, so its domain name is cisco.com . A specific device in this domain, the File Transfer Protocol (FTP) system, for example, is identified as ftp.cisco.com .
To keep track of domain names, IP has defined the concept of a name server . Name servers are programs that have complete information about their namespace portion of the domain tree and may also contain pointers to other name servers that can be used to lead to information from any other part of the domain tree. Name servers know the parts of the domain tree for which they have complete information. A name server may also store information about other parts of the domain tree. To map domain names to IP addresses, you must first identify the host names, then specify a name server, and enable the DNS service.
To speed the process of converting names to addresses, the name server maintains a database, called a cache , of host-name-to-address mappings for use by the connect , telnet , and ping EXEC commands, and related Telnet support operations. The cache stores the results from previous responses. Upon receiving a client-issued DNS query, it will check this local storage to see if the answer is available locally.
Name resolvers are programs that extract information from name servers in response to client requests. Resolvers must be able to access at least one name server. The resolver either uses that name server's information to answer a query directly or pursues the query using referrals to other names servers. A resolver will typically be a system routine that is directly accessible to user programs. Therefore, no protocol is necessary between the resolver and the user program.
The domain namespace is divided into areas called zones that are points of delegation in the DNS tree. A zone contains all domains from a certain point downward, except those for which other zones are authoritative.
A name server is said to be an authority for the parts of the domain tree for which it has complete information. A zone usually has an authoritative name server, often more than one. An authoritative name server has been configured with host table information or has acquired host table information though a zone transfer (the action that occurs when a secondary DNS server starts up and updates itself from the primary server).
Within an organization, you can have many name servers, but Internet clients can query only those that the root name servers know. The other name servers answer internal queries only.
A name server handles client-issued queries to the DNS server for locally defined hosts within a particular zone as follows:
An authoritative name server responds to DNS user queries for a domain name that is under its zone of authority by using the permanent and cached entries in its own host table. If the query is for a domain name that is under its zone of authority but for which it does not have any configuration information, the authoritative name server simply replies that no such information exists..
A name server that is not configured as the authoritative name server responds to DNS user queries by using information that it has cached from previously received query responses. If no device is configured as the authoritative name server for a zone, queries to the DNS server for locally defined hosts will receive nonauthoritative responses.
Name servers answer DNS queries (forward incoming DNS queries or resolve internally generated DNS queries) according to the forwarding and lookup parameters configured for the specific domain.
An alternating sequence of DNS public key (DNSKEY) RR sets and Delegation Signer (DS) RR sets forms a chain of signed data, with each link in the chain vouching for the next. A DNSKEY RR is used to verify the signature covering a DS RR and allows the DS RR to be authenticated. The DS RR contains a hash of another DNSKEY RR and this new DNSKEY RR is authenticated by matching the hash in the DS RR.
A DNS view is a set of parameters that specify how to handle a DNS query. A DNS view defines the following information:
Association with a VRF
Parameters for resolving internally generated DNS queries
Parameters for forwarding incoming DNS queries
Internal host table for answering queries or caching DNS responses
Note |
The maximum number of DNS views and view lists depends on the memory of Cisco device. Configuring a large number of DNS views and view lists uses more device memory, and configuring a large number of views in the view lists uses more device processor time. For optimum performance, configure views and view list members that are required to support your Split DNS query forwarding or query resolution needs. |
A DNS view is always associated with a VRF— the global VRF or a named VRF, so as to limit the view usage in handling DNS queries that arrive on an interface matching a particular VRF:
A DNS view that is associated with the global VRF can be used only to handle DNS queries that arrive on an interface in the global address space.
A DNS view that is associated with a named VRF can be used only to handle DNS queries that arrive on an interface that matches the VRF with which the view is associated.
Note |
Additional restrictions (described in DNS Views) can be placed on a view after it has been defined. Also, a single view can be referenced multiple times, with different restrictions added in each case. However, because the association of a DNS view with a VRF is specified in the DNS view definition, the VRF-specific view-use limitation is a characteristic of the DNS view definition itself and cannot be separated from the view. |
Domain lookup—Enabling or disabling of DNS lookup to resolve hostnames for internally generated queries.
Default domain name—Default domain to append to hostnames without a dot.
Domain search list—List of domain names to try for hostnames without a dot.
Domain name for multicast lookups—IP address to use for multicast address lookups.
Domain name servers—List of name servers to use to resolve domain names for internally generated queries.
Resolver source interface—Source interface to use to resolve domain names for internally generated queries.
Round-robin rotation of IP addresses—Enabling or disabling of the use of a different IP address associated with the domain name in cache each time hostnames are looked up.
The following parameters define how to forward incoming DNS queries:
Forwarding of queries—Enabling or disabling of forwarding of incoming DNS queries.
Forwarder addresses—List of IP addresses to use to forward incoming DNS queries.
Forwarder source interface—Source interface to use to forward incoming DNS queries.
Sometimes, when a source interface is configured on a device with the split DNS feature to forward DNS queries, the device does not forward the DNS queries through the configured interface. Hence, consider the following points while forwarding the DNS queries using the source interface:
DNS queries are forwarded to a broadcast address when a forwarding source interface is configured and the DNS forwarder is not configured.
The source IP address of the forwarded query should be set to the primary IP address of the interface configured, using the dns forwarding source-interface interface command. If no such configuration exists, then the source IP address of the forwarded DNS query will be the primary IP address of the outgoing interface. DNS forwarding should be done only when the source interface configured for the DNS forwarding is active.
The source IP address of the DNS query for the DNS resolver functionality is set using the domain resolver source-interface interface-type number command. If there is no DNS address configured, then queries will be broadcasted to the defined source interface. DNS resolving should be done only when the source interface configured for the DNS resolving is active. See "Specifying a Source Interface to Forward DNS Queries" for the configuration steps.
A DNS view list is an ordered list of DNS views in which additional usage restrictions can be specified for any individual member in the list. The scope of these optional usage restrictions is limited to a specific member of a specific DNS view list. When the device must respond to a DNS query, the Cisco IOS software uses a DNS view list to select the DNS view that will be used to handle a DNS query.
Note |
The maximum number of DNS views and view lists supported is not specifically limited but is dependent on the amount of memory on the Cisco device. Configuring a larger number of DNS views and view lists uses more device memory, and configuring a larger number of views in the view lists uses more device processor time. For optimum performance, configure no more views and view list members than needed to support your Split DNS query forwarding or query resolution needs. |
When a DNS view list is used to select a DNS view for handling a given DNS query, the Cisco IOS software checks each member of the view list--in the order specified by the list--and selects the first view list member whose restrictions permit the view to be used with the query that needs to be handled.
A DNS view list member can be configured with usage restrictions defined using access control lists (ACLs) that specify rules for selecting that view list member based on the query hostname or the query source host IP address. The two types of ACLs supported by the Split DNS view list definition are described in "DNS Name Groups".
Note |
Multiple DNS view lists can be defined so that, for example, a given DNS view can be associated with different restrictions in each list. Also, different DNS view lists can include different DNS views. |
When the device that is acting as the DNS caching name server needs to respond to a DNS query, the Cisco IOS software uses a DNS view list to determine which DNS view can be used to handle the query:
If the device is responding to an incoming query that arrives on an interface for which a DNS view list is configured, the interface-specific DNS view list is used.
If the device is responding to an incoming query that arrives on an interface for which no specific DNS view list is configured, the default DNS view list is used.
If the device is responding to an internally generated query, no DNS view list is used to select a view; the global DNS view is used to handle the query.
The assignment of a DNS view list as the default or to an interface is described in "DNS View Groups".
The view list members are compared, each in turn, to the characteristics of the DNS query that the device is responding to:
If the query is from a different VRF than the view, the view cannot be used to address the query, so the view-selection process moves on to the next member of the view list.
The specification of additional view-use restrictions is an optional setting for any view list member.
If the query list does not specify additional restrictions on the view, the view will be used to address the query, so the view-selection process is finished.
If the view list does specify additional restrictions on the view, the query is compared to those restrictions:
If the query characteristics fail any view-use restriction, the view cannot be used to address the query, so the view-selection process moves on to the next member of the view list.
If the query characteristics pass all the view-use restrictions, the view will be used to address the query. The view-selection process is finished.
If the view-selection process reaches the end of the selected DNS view list without finding a view list member that can handle the query, the device discards the query.
The first DNS view list member that is found to have restrictions that match the query characteristics is used to handle the query.
The Split DNS feature supports two types of ACLs that can be used to restrict the use of a DNS view. A DNS name list or a standard IP ACL (or both) can be applied to a DNS view list member to specify view-use restrictions in addition to the VRF-specific restriction that is a part of the view definition itself.
Note |
In this context, the term “group” is used to refer to the specification of a DNS name list or a standard IP ACL as a usage restriction on a view list member. |
A DNS name list is a named set of hostname pattern-matching rules, with each rule specifying the type of action to be performed if a query hostname matches the text string pattern in the rule. In order for a query hostname to match a name list, the hostname must match a rule that explicitly permits a matching pattern but the hostname cannot match any rules that explicitly deny a matching pattern.
A standard IP ACL is a numbered or named set of host IP address-matching rules, with each rule specifying the type of action to be performed if an IP address matches the text string pattern in the rule. The Split DNS feature supports the use of a standard ACL as a view-use restriction based on the query source IP address. In order for a source IP address to match a name list, the IP address must match a rule that explicitly permits a matching pattern but the IP address cannot match any rules that explicitly deny a matching pattern.
The Split DNS feature provides two ways to specify the DNS view list that the Cisco IOS software is to use to select the DNS view that will be used to handle an incoming DNS query. For a query that arrives on an interface that is configured to use a particular DNS view list, the interface-specific DNS view list is used. Otherwise, the default DNS view list is used.
Note |
In this context, the term “group” refers to the specification of a DNS view list as an interface-specific DNS view list or the default view list for the device. |
A DNS view list can be attached to a device interface. When an incoming DNS query arrives on that interface, the Cisco IOS software uses that view list to select a DNS view to use to handle the query.
A DNS view list can be configured as the default DNS view list for the device. When an incoming DNS query arrives on an interface that is not configured to use a specific view list, the Cisco IOS software uses the default view list to select the DNS view to use to handle the query.
Perform this task to associate host names with IP addresses.
A name server is used to keep track of information associated with domain names. A name server can maintain a database of host name-to-address mappings. Each name can map to one or more IP addresses. In order to use this service to map domain names to IP addresses, you must specify a name server.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
||
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
||
Step 3 |
ip host name [tcp -port -number ] address1 [address2 ... address8 ] [mx ns srv ] Example:
|
Defines a static host name-to-address mapping in the host name cache.
|
||
Step 4 |
Do one of the following:
Example:
Example:
|
(Optional) Defines a default domain name that the Cisco IOS XE software will use to complete unqualified host names. or (Optional) Defines a list of default domain names to complete unqualified host names.
|
||
Step 5 |
ip name-server server-address1 [server-address2 ... server-address6 ] Example:
|
Specifies one or more hosts that supply name information.
|
||
Step 6 |
ip domain lookup Example:
|
(Optional) Enables DNS-based address translation.
|
The name lookup system can be statically configured using the commands described in this task. Some other functions in Cisco IOS XE, such as DHCP can dynamically modify the state of the name lookup system. Use the show hosts command to display the cached host names and the DNS configuration.
Perform this task to disable DNS queries for ISO CLNS addresses.
If your device has both IP and ISO Connectionless Network Service (ISO CLNS) enabled and you want to use ISO CLNS network service access point (NSAP) addresses, you can use the DNS to query these addresses, as documented in RFC 1348. This feature is enabled by default.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
no ip domain lookup nsap Example:
|
Disables DNS queries for ISO CLNS addresses. |
Perform this task to verify your DNS configuration.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
ping host Example:
|
Diagnoses basic network connectivity.
|
Step 3 |
show hosts Example:
|
Displays the default domain name, the style of name lookup service, a list of name server hosts, and the cached list of host names and addresses.
|
Step 4 |
debug ip domain Example:
|
Enables DNS debugging and displays DNS debugging information.
|
Perform this task to define a DNS view. A DNS view definition can be used to respond to either an incoming DNS query or an internally generated DNS query.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
||
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
||
Step 3 |
ip dns view [vrf vrf-name ] {default | view-name } Example:
|
Defines a DNS view and enters DNS view configuration mode. |
||
Step 4 |
[no ] dns trust name Example:
|
(Optional) Enables or disables storage of trusted keys in a view and enters DNS view configuration mode. The dns trust key enables the DNS security feature. |
||
Step 5 |
[no ] domain lookup Example:
|
(Optional) Enables or disables DNS-based hostname-to-address translation for internally generated DNS queries handled using the DNS view.
|
||
Step 6 |
Do one of the following:
Example:
Example:
|
(Optional) Defines a default domain name to be used by this DNS view to complete unqualified hostnames when addressing DNS queries. or (Optional) Defines a list of domain names to be used by this DNS view to complete unqualified hostnames when addressing DNS queries.
|
||
Step 7 |
Do one of the following:
Example:
Example:
|
(Optional) Defines a list of name servers to be used by this DNS view to resolve internally generated DNS queries. The IP address of the name server can be an IPv4 or IPv6 address, and the IP address can be associated with a Virtual Private Network (VPN) routing and forwarding (VRF) instance. or (Optional) Defines an interface on which to acquire (through DHCP or PPP interaction on the interface) the IP address of a DNS server to add to the list of DNS name servers to be used by this DNS view to resolve internally generated DNS queries.
|
||
Step 8 |
domain multicast domain-name Example:
|
(Optional) Specifies the IP address to use for multicast lookups handled using the DNS view. |
||
Step 9 |
[no ] dns forwarding Example:
|
(Optional) Enables or disables forwarding of incoming DNS queries handled using the DNS view.
|
||
Step 10 |
dns forwarder [vrf vrf-name ] forwarder-ip-address Example:
|
Defines a list of name servers to be used by this DNS view to forward incoming DNS queries.
|
||
Step 11 |
dns forwarding source-interface interface Example:
|
Defines the interface on which to forward queries when this DNS view is used. |
||
Step 12 |
end Example:
|
Returns to privileged EXEC mode. |
Perform this task to verify the DNS configuration.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
show ip dns view [vrf vrf-name ] [default | view-name ] Example:
|
Displays information about a particular DNS view, a group of views (with the same view name or associated with the same VRF), or all configured DNS views. |
Step 3 |
show ip dns server [vrf vrf-name ] [default | view-name ] Example:
|
Displays information from name server cache. |
Step 4 |
clear ip dns servers |
Cleans up server from name server cache. |
Perform this task to define an ordered list of DNS views with optional, additional usage restrictions for each view list member. The device uses a DNS view list to select the DNS view that will be used to handle a DNS query.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
ip dns view-list view-list-name Example:
|
Defines a DNS view list and enters DNS view list configuration mode. |
Step 4 |
ip dns name-list [number ] [permit/deny ] [name ] Example:
|
Defines a DNS name list and enters DNS name list configuration mode. |
Step 5 |
view [vrf vrf-name ] {default | view-name } order-number Example:
|
Defines a DNS view list member and enters DNS view list member configuration mode. |
Step 6 |
restrict name-group name-list-number Example:
|
(Optional) Specifies that this DNS view list member cannot be used to respond to a DNS query unless the query hostname matches a permit clause in the specified DNS name list and none of the deny clauses.
|
Step 7 |
restrict source access-group acl-number Example:
|
(Optional) Specifies that this DNS view list member cannot be used to respond to a DNS query unless the source IP address of the DNS query matches the specified standard ACL.
|
Step 8 |
exit Example:
|
Exits DNS view list member configuration mode.
|
Step 9 |
end Example:
|
Returns to privileged EXEC mode. |
Step 10 |
show ip dns view-list view-list-name Example:
|
Displays information about a particular DNS view list or all configured DNS view lists. |
Step 11 |
show ip dns name-list number Example:
|
Displays information about a particular DNS name list or all configured DNS name lists. |
To provide for efficient management of the order of the members in a view list, each view list member definition includes the specification of the position of that member within the list. That is, the order of the members within a view list is defined by explicit specification of position values rather than by the order in which the individual members are added to the list. This enables you to perform either of the following tasks without having to remove all the view list members and then redefine the view list membership in the desired order:
Perform this optional task if you need to add another member to a DNS view list that is already in use.
For example, suppose the DNS view list named userlist5 is already defined and in use as a default view list or as an interface-specific view list. Assume that the list consists of the following members:
DNS view user1 with position number 10
DNS view user2 with position number 20
DNS view user3 with position number 30
If you need to add DNS view user4 as the second member of the list, add that view to the list with a position number value from 11 to 19. You do not need to remove the three existing members and then add all four members to the list in the desired order.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
show ip dns view-list view-list-name Example:
|
Displays information about a particular DNS view list or all configured DNS view lists. |
Step 3 |
configure terminal Example:
|
Enters global configuration mode. |
Step 4 |
ip dns view-list view-list-name Example:
|
Defines a DNS view list and enters DNS view list configuration mode. |
Step 5 |
view [vrf vrf-name ] {default | view-name } order-number Example:
|
Defines a DNS view list member and enters DNS view list member configuration mode. |
Step 6 |
end Example:
|
Returns to privileged EXEC mode. |
Step 7 |
show ip dns view-list view-list-name Example:
|
Displays information about a particular DNS view list or all configured DNS view lists. |
Perform this optional task if you need to change the order of the members of a DNS view list that is already in use.
For example, suppose the DNS view list named userlist5 is already defined and in use as a default view list or as an interface-specific view list. Assume that the list consists of the following members:
DNS view user1 with position number 10
DNS view user2 with position number 20
DNS view user3 with position number 30
If you want to move DNS view user1 to the end of the list, remove that view from the list and then add it back to the list with a position number value greater than 30. You do not need to remove the three existing members and then add the members back to the list in the desired order.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
show ip dns view-list view-list-name Example:
|
Displays information about a particular DNS view list or all configured DNS view lists. |
Step 3 |
configure terminal Example:
|
Enters global configuration mode. |
Step 4 |
ip dns view-list view-list-name Example:
|
Defines a DNS view list and enters DNS view list configuration mode. |
Step 5 |
no view [vrf vrf-name ] {default | view-name } order-number Example:
|
Removes a DNS view list member from the list. |
Step 6 |
view [vrf vrf-name ] {default | view-name } order-number Example:
|
Defines a DNS view list member and enters DNS view list member configuration mode. |
Step 7 |
end Example:
|
Returns to privileged EXEC mode. |
Step 8 |
show ip dns view-list view-list-name Example:
|
Displays information about a particular DNS view list or all configured DNS view lists. |
Perform this task to specify the default DNS view list for the device’s DNS server. The device uses the default DNS view list to select a DNS view to use to handle an incoming DNS query that arrives on an interface for which no interface-specific DNS view list has been defined.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
ip dns server view-group name-list-number Example:
|
Configures the default DNS view list for the device’s DNS server. |
Step 4 |
exit Example:
|
Exits global configuration mode. |
Step 5 |
show running-config Example:
|
Displays information about how DNS view lists are applied. The default DNS view list, if configured, is listed in the default DNS view information as the argument for the ip dns server view-group command. |
Perform this optional task if you need to specify a DNS view list for a particular device interface. The device uses that view list to select a DNS view to use to handle a DNS query that arrives on that interface.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
interface interface Example:
|
Configures an interface type and enter interface configuration mode so that the specific interface can be configured. |
Step 4 |
ip dns view-group view-list-name Example:
|
Configures the DNS view list for this interface on the device. |
Step 5 |
end Example:
|
Returns to privileged EXEC mode. |
Step 6 |
show running-config Example:
|
Displays information about how DNS view lists are applied. Any DNS view lists attached to interfaces are listed in the information for each individual interface, as the argument for the ip dns view-group command. |
Perform this optional task if you need to specify a source interface to forward the DNS queries.
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
ip dns view [vrf vrf-name ] {default | view-name } Example:
|
Creates the DNS view of the specified name associated with the specified VRF instance and then enters DNS view configuration mode. |
Step 4 |
domain resolver source-interface interface-type number Example:
|
Sets the source IP address of the DNS queries for the DNS resolver functionality. |
Step 5 |
end Example:
|
(Optional) Returns to privileged EXEC mode. |
The following example establishes a domain list with several alternate domain names:
ip domain list csi.com
ip domain list telecomprog.edu
ip domain list merit.edu
The following example configures the host-name-to-address mapping process. IP DNS-based translation is specified, the addresses of the name servers are specified, and the default domain name is given.
! IP DNS-based host name-to-address translation is enabled
ip domain lookup
! Specifies hosts 192.168.1.111 and 192.168.1.2 as name servers
ip name-server 192.168.1.111 192.168.1.2
! Defines cisco.com as the default domain name the device uses to complete
! Set the name for unqualified host names
ip domain name cisco.com
The following example shows the ip dns servers.
show ip dns server
IP VRF TTL(s) RTT(ms) RTO(ms) EDNS DNSSEC RECURSION
-----------------------------------------------------------------------------
2::1 red 628 1451 1451 Yes Yes Yes
172.168.10.1 875 1787 1787 Yes Yes Yes
2.2.2.1 red 606 1447 1447 Yes Yes Yes
1::1 207 300 300 Yes Yes Yes
1.1.1.1 179 242 242 Yes Yes Yes
The following example shows how to define two DNS view lists, userlist1 and userlist2. Both view lists comprise the same three DNS views:
DNS view user1 that is associated with the usergroup10 VRF
DNS view user2 that is associated with the usergroup20 VRF
DNS view user3 that is associated with the usergroup30 VRF
Both view lists contain the same DNS views, specified in the same order:
ip dns view-list userlist15
view vrf usergroup100 user1 10
restrict name-group 121
exit
view vrf usergroup200 user2 20
restrict name-group 122
exit
view vrf usergroup300 user3 30
restrict name-group 123
exit
!
exit
ip dns view-list userlist16
view vrf usergroup100 user1 10
restrict name-group 121
restrict source access-group 71
exit
view vrf usergroup200 user2 20
restrict name-group 122
restrict source access-group 72
exit
view vrf usergroup300 user3 30
restrict name-group 123
restrict source access-group 73
exit
exit
The two DNS view lists differ, though, in the usage restrictions placed on their respective view list members. DNS view list userlist15 places only query hostname restrictions on its members while view list userlist16 restricts each of its members on the basis of the query hostname and the query source IP address:
Because the members of userlist15 are restricted only based on the VRF from which the query originates, userlist15 is typical of a view list that can be used to select a DNS view for handling DNS requests from internal clients.
Because the members of userlist16 are restricted not only by the query VRF and query hostname but also by the query source IP address, userlist16 is typical of a view list that can be used to select a DNS view for handling DNS requests from external clients.
Related Topic | Document Title |
---|---|
Master Command List |
|
IP Addressing Services Command Reference |
Standard/RFC | Title |
---|---|
RFC 1348 |
DNS NSAP Resource Records |
MIB | MIBs Link |
---|---|
No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Description | Link |
---|---|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Configuration Information |
---|---|---|
Configuring DNS |
Cisco IOS XE Release 2.1 |
The Domain Name System (DNS) is a distributed database in which you can map host names to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated host name. The Cisco IOS XE software maintains a cache of host name-to-address mappings. This cache speeds the process of converting names to addresses. |
Cisco IOS XE Release 3.13S |
The following commands were introduced or modified: debug ip domain , debug ip domain replies . |
|
Cisco IOS XE Release 3.16S |
The following commands were introduced or modified: dns trust , clear ip dns servers . |