// // Do any local configuration here // // Consider adding the 1918 zones here, if they are not used in your // organization include "/etc/bind/zones.rfc1918"; // Set up an ACL named "bogusnets" that will block // RFC1918 space and some reserved space, which is // commonly used in spoofing attacks. acl bogus-nets { 0.0.0.0/8; 192.0.2.0/24; 224.0.0.0/3; 10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16; }; logging { channel query { file "/var/log/bind9/query.log" versions 2 size 10m; print-time yes; severity info; }; category queries { query; }; }; zone "40.131.185.in-addr.arpa" { type master; file "/etc/bind/db.185.131.40"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "41.131.185.in-addr.arpa" { type master; file "/etc/bind/db.185.131.41"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "commingeshautdebit.fr" { type master; file "/etc/bind/db.commingeshautdebit.fr"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "ipv4.commingeshautdebit.fr" { type master; file "/etc/bind/db.ipv4.commingeshautdebit.fr"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "0.0.0.0.0.a.0.a.3.0.a.2.ip6.arpa" { type master; file "/etc/bind/db.2a03:a0a0::"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "1.0.0.0.0.a.0.a.3.0.a.2.ip6.arpa" { type master; file "/etc/bind/db.2a03:a0a0:1::"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "0.0.0.0.0.a.0.a.3.0.a.2.ip6.arpa.upstream" { type master; file "/etc/bind/db.2a03:a0a0::upstream"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 }; zone "1.0.0.0.0.a.0.a.3.0.a.2.ip6.arpa.upstream" { type master; file "/etc/bind/db.2a03:a0a0:1::upstream"; allow-update { none; }; allow-transfer { 185.61.116.41; }; # ns1 };