DNS Server : Creating Non Authoritative DNS Server

Creating Non Authoritative  DNS Server is very simple task. Below are the steps to create the server.
1. First check activity on Port No. 53. DNS Server uses Port No. 53
# lsof -i :53
2. If nothing is acting on Port 53, then there are no DNS element active on the server. Now you need to install DNS Server.
# yum install bind bind-chroot bind-utils -y
Package bind is DNS Server. bind-chroot is required for security of DNS Server and bind-utils contains some tools required by DNS Server.
# systemctl enable named.service
# systemctl start named.service
# lsof -i :53
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
named 543 named 20u IPv4 174093 0t0 TCP localhost:domain (LISTEN)
named 543 named 21u IPv6 174095 0t0 TCP localhost6:domain (LISTEN)
named 543 named 512u IPv4 174092 0t0 UDP localhost:domain
named 543 named 513u IPv4 174092 0t0 UDP localhost:domain
named 543 named 514u IPv6 174094 0t0 UDP localhost6:domain
named 543 named 515u IPv6 174094 0t0 UDP localhost6:domain
It shows that only localhost is listening Port 53 and not your lan interface. By default, the DNS Server listens Port 53 for 127.0.0.1
We have to activate Port for our lan interface 10.0.0.5. We have to edit the configuration file.
DNS Server has two main configuration files.
1. /etc/named.conf      :  Main file containing basic configuration
2.  /etc/named.rfc1912.zones   :  This file contains domain names for which the present DNS Server is acting as Authoritative  DNS Server.
3. We have to edit first file /etc/named.conf . Make following changes in the file.
Place comment mark on following three lines.
// listen-on port 53 { 127.0.0.1; };
// listen-on-v6 port 53 { ::1; };
// allow-query { localhost; };
Save the file and restart the DNS Server.
4. # systemctl restart named.service
5. Check activity on Port No. 53 using lsof command.
[root@station5 ~]# lsof -i :53
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
named 660 named 20u IPv4 174928 0t0 TCP localhost:domain (LISTEN)
named 660 named 21u IPv4 174930 0t0 TCP station5.example.com:domain (LISTEN)
named 660 named 512u IPv4 174927 0t0 UDP localhost:domain
named 660 named 513u IPv4 174927 0t0 UDP localhost:domain
named 660 named 514u IPv4 174929 0t0 UDP station5.example.com:domain
named 660 named 515u IPv4 174929 0t0 UDP station5.example.com:domain
[root@station5 ~]#
6. You can also check with telnet command as below.
[root@station5 ~]# telnet 127.0.0.1 53
Trying 127.0.0.1…
Connected to 127.0.0.1.
Escape character is ‘^]’.
^]
telnet> quit
Connection closed.

[root@station5 ~]#
telnet 10.0.0.5 53
Trying 10.0.0.5…
Connected to 10.0.0.5.
Escape character is ‘^]’.
^]
telnet> quit
Connection closed.
[root@station5 ~]#
It is working now. So it is time to test the DNS Server as below using nslookup command.
[root@station5 ~]# nslookup magnumnet.in 10.0.0.5
Server: 10.0.0.5
Address: 10.0.0.5#53

Non-authoritative answer:
Name: magnumnet.in
Address: 216.157.85.11
[root@station5 ~]#

Alternatively you can check the DNS Server, using host command as below.
# host -t SOA yahoo.com
# host -t NS yahoo.com
# host -t A yahoo.com
# host -t MX yahoo.com
# host -t CNAME www.yahoo.com
# host -t TXT yahoo.com
# host -t SRV yahoo.com
Good ! You have successfully created Non Authoritative  DNS Server !!