Wishlist 0 ¥0.00

配置 Hyper-v 的虚拟局域网

虚拟局域网 ( vlan ) 提供一种隔离网络流量的方式。 Vlan 在支持 802.1 q 的交换机和路由器中进行配置。 如果你配置了多个 Vlan 并且需要在它们之间进行通信,则需要将网络设备配置为允许。

你将需要以下内容来配置 Vlan:

  • 支持 802.1 q VLAN 标记的物理网络适配器和驱动程序。
  • 支持 802.1 q VLAN 标记的物理网络交换机。

在主机上,将虚拟交换机配置为允许物理交换机端口上的网络流量。 这适用于要在内部与虚拟机一起使用的 VLAN Id。 接下来,配置虚拟机以指定虚拟机将用于所有网络通信的 VLAN。

允许虚拟交换机使用 VLAN

  1. 打开 "Hyper-v - 管理器"。

  2. 从“操作” 菜单中,单击“虚拟交换机管理器” 。

  3. 在 " 虚拟交换机" 下,选择连接到支持 vlan 的物理网络适配器的虚拟交换机。

  4. 在右窗格中的 "VLAN ID" 下,选择 " 启用虚拟 LAN 标识 ",然后键入 VLAN ID 的数字。

    所有通过物理网络适配器连接到虚拟交换机的流量都将使用您设置的 VLAN ID 进行标记。

允许虚拟机使用 VLAN

  1. 打开 "Hyper-v - 管理器"。

  2. 在结果窗格中的 " 虚拟机" 下,选择相应的虚拟机,然后右键单击 " 设置"。

  3. 在 " 硬件" 下,选择设置有 VLAN 的虚拟交换机。

  4. 在右侧窗格中,选择 " 启用虚拟 LAN 标识",然后键入与为虚拟交换机指定的相同的 VLAN ID。

如果虚拟机需要使用更多 Vlan,请执行以下操作之一:

  • 将更多虚拟网络适配器连接到相应的虚拟交换机,并分配 VLAN Id。 请确保正确配置 IP 地址,并且要通过 VLAN 路由的流量也使用正确的 IP 地址。

  • 使用 Set - set-vmnetworkadaptervlan cmdlet 在 trunk 模式下配置虚拟网络适配器。

Windows – DNS服务器配置问题,PTR记录

我有一台使用 Windows Server 2003和Microsoft DNS Server的服务器.
我的DNS设置有问题
错误:没有反向DNS(PTR)条目. MX记录的问题是:
225.208.20.***.in-addr.arpa – >没有检测到反向(PTR)
您应该联系您的ISP并要求他为您的ips添加PTR记录

在反向搜索区域中,我在DOMAINNAME,MAIL.DOMAINNAME的此区域ptr记录中添加了一个新的区域.

但这不能解决我的问题,仍然在进入DNS网站我发现错误信息,因此我的一些电子邮件无法到达邮件服务器

如何为我的邮件服务器设置PTR记录?

 
反向查找记录将IP地址转换回名称.很多邮件服务器喜欢这样做,作为反垃圾邮件措施的一部分.

您需要请求您的电子邮件服务器所在的反向区域的权威方创建PTR记录.那可能是你的ISP.您在办公室的DNS服务器中无能为力 – 世界其他地方并未将该服务器用于DNS.当第三方邮件服务器发起反向查找请求时,该流量不会进入您的办公室 – 它将进入ISP DNS服务器.

我首先联系您的ISP支持.

(在上述所有情况中,我假设您不是反向DNS区域的权威方,但可能只是在某个随机ISP的点对点Internet连接结束时托管邮件服务器的人.)

Using Nslookup in Windows to List DNS Servers and Records

Nslookup (name server lookup) is a command-line tool that is used to diagnose and validate DNS servers and records, and to find name resolution problems in the DNS subsystem. The nslookup tool was originally developed as a part of the BIND package and ported to Windows by Microsoft. Nslookup is currently a built-in tool in all supported versions of Windows.

 

How to Use Nslookup to Check DNS Records?

Using the nslookup utility, you can determine the IP address of any server by its DNS name, perform the reverse DNS lookup, and get information about the various DNS records for a specific domain name.

When running, Nslookup sends queries to the DNS server that is specified in your network connection settings. This address is considered the default (preferred) DNS server. The user can specify the address of any other available DNS server. As a result, all subsequent DNS requests will be sent to it.

 

You can view or change your preferred and alternative DNS server IP addresses in the network connection properties.

nslookup list dns servers

Or you can get your DNS server setting from the CLI prompt using the ipconfig command:

ipconfig /all

list all dns servers in domain

You can use the nslookup tool in interactive or non-interactive mode.

 
 

To run a DNS query using nslookup tool in non-interactive mode, open a Command prompt, and run the command:

Nslookup theitbros.com

nslookup dns server list

In this example, we requested the IP address of theitbros.com domain. The nslookup utility queries the DNS server (it is specified in the Server line) and it returned that this name matches the IP address 37.1.214.145 (A and AAAA records are shown by default).

This response indicates that your DNS server is available, works properly, and processes requests for resolving DNS names.

If you received such an answer:

Server: dns1.contoso.com

Address: хх.хх.хх.хх

*** dns1.contoso.com can’t find theitbros.com: Non-existent domain

 
 

This means that no entries were found for this domain name on the DNS server.

If your DNS server is unavailable or not responding, you will receive a DNS request timed out error.

find all dns servers on network

In this case, check if you have specified the correct DNS server address and whether there is a problem with the network connection from the IS provider.

The Non-authoritative answer means that the DNS server that executed the request is not the owner of the theitbros.com zone (there are no records about this domain in its database) and to perform name resolution a recursive query to another DNS server was used.

You can enable and disable the recursive nslookup mode using the commands (by default, recursive DNS queries are enabled):

set recurse

set norecurse

You can access an authoritative DNS server by specifying its address directly in the parameters of the nslookup utility. For example, to resolve a name on the authoritative DNS server (that contains this domain) use the command:

Nslookup theitbros.com ns1.theitbros.com

When you run nslookup without parameters, the utility switches to the interactive mode. In this mode, you can execute various commands. A complete list of available internal commands of the nslookup utility can be displayed by typing a question.

 
 

Tip. Note that nslookup commands are case sensitive.

find all dns servers on domain

To close the interactive nslookup session, type exit and press Enter.

To find the DNS servers that are responsible for a specific domain (Name Server authoritative servers), run the following commands:

set query=ns

theitbros.com

nslookup list all records

You can perform reverse lookups (get DNS name by IP address). Just type the IP address in the nslookup interactive prompt and press Enter.

nslookup show dns server

Using Nslookup to Get Different DNS Record Types

The default nslookup resource records type is A and AAAA, but you can use different types of resource records:

 
 
  • A
  • ANY
  • CNAME
  • GID
  • HINFO:
  • MB
  • MG
  • MINF
  • MR
  • MX
  • NS
  • PTR
  • SOA
  • TXT
  • UID
  • UINFO
  • WKS

You can set specific record types to lookup using the nslookup parameter:

-type=<record_type>

For example, to list all mail servers configured for a specific domain (MX, Mail eXchange records), run the command:

nslookup -type=mx theitbros.com

find dns servers on network

Non-authoritative answer:

theitbros.com   MX preference = 10, mail exchanger = mail.theitbros.com

theitbros.com   MX preference = 20, mail exchanger = mail.theitbros.com

mail.theitbros.com      internet address = 37.1.214.145

mail.theitbros.com      internet address = 37.1.214.145

 
 

As you can see, this domain has 2 MX records with priorities 10 and 20 (the lower the number, the higher the priority of the MX address). If you don’t see MX records, they probably just aren’t configured for that domain.

To list all DNS records in the domain zone, run the command:

nslookup -type=any theitbros.com

list all dns records for a domain nslookup

Non-authoritative answer:

theitbros.com   internet address = 37.1.214.145

theitbros.com   nameserver = ns2.theitbros.com

theitbros.com   nameserver = ns1.theitbros.com

theitbros.com   MX preference = 10, mail exchanger = mail.theitbros.com

 
 

theitbros.com   MX preference = 20, mail exchanger = mail.theitbros.com

ns2.theitbros.com       internet address = 74.80.224.189

ns1.theitbros.com       internet address = 37.1.214.145

mail.theitbros.com      internet address = 37.1.214.145

mail.theitbros.com      internet address = 37.1.214.145

To get the SOA record (Start of Authority – start DNS zone record, which contains information about the domain zone, its administrator’s address, serial number, etc.), use the option -type=soa:

nslookup -type=soa theitbros.com

theitbros.com

primary name server = pdns1.registrar-servers.com

 
 

responsible mail addr = hostmaster.registrar-servers.com

serial = 1601449549

refresh = 43200 (12 hours)

retry = 3600 (1 hour)

expire = 604800 (7 days)

default TTL = 3601 (1 hour 1 sec)

pdns1.registrar-servers.com internet address = 156.154.130.200

pdns1.registrar-servers.com AAAA IPv6 address = 2610:a1:1022::200

 
 

nslookup nameservers

  • primary name server;
  • responsible mail addr — domain administrator email address (This email address is being protected from spambots. You need JavaScript enabled to view it.). Since the @ symbol in the zone description has its own meaning, it is replaced by a dot in this field);
  • serial — the serial number of the zone file, used to record changes. The following format is usually used: YYYYMMDDHH;
  • refresh — the period of time (in seconds) after which the secondary DNS server will send a request to the primary one to check if the serial number has changed;
  • retry — specifies the interval for reconnecting to the primary DNS server if for some reason it was unable to respond to the request;
  • expire — specifies how long the DNS cache is kept by the secondary DNS server, after which it will be considered expired;
  • default TTL — “Time to Live” seconds. Refers to how long your DNS settings must be cached before they are automatically refreshed.

If you want to list the TXT records of a domain (for example, when viewing SPF settings), run the command:

nslookup -type=TXT theitbros.com

The debug option allows you to get additional information contained in the headers of client DNS requests and server responses (lifetime, flags, record types, etc.):

set debug

how to find all dns servers in domain

You can view the current values for all specified nslookup options with the command:

> set all

Default Server: ns1.theitbros.com

Address: 192.168.1.11

 
 

Set options:

nodebug

defname

search

recurse

nod2

novc

noignoretc

 
 

port=53

type=A+AAAA

class=IN

timeout=2

retry=1

root=A.ROOT-SERVERS.NET.

domain=xxx

MSxfr

 
 

IXFRversion=1

srchlist=xxx

list dns servers in domain

By default, DNS servers listen on UDP port 53, but you can specify a different port number if necessary using the -port option:

nslookup port 56 theitbros.com

or interactively:

set port = 56

You can change the interval to wait for a response from the DNS server. This is usually necessary on slow or unstable network links. By default, if no response comes within 5 seconds, the request is repeated, increasing the waiting time by two times. But you can manually set this value in seconds using the -timeout option:

nslookup -timeout=10 theitbros.com

So, in this article, we covered the basics of working with the nslookup command on Windows.

If the directory is removed from IIS, but remains in AD, you must first remove the directory from AD using the Remove-XXXVirtualDirectory cmdlet (where XXX is the name of the directory: ECP, OWA, etc.).

 
 

get all dns servers in domain

If the directory is still in IIS but is not present in the Active Directory configuration, you must remove it from the IIS configuration. To do this, we need the Metabase Explorer tool from the IIS 6 Resource Kit (requires Net Framework 3.5 Feature).

Launch IIS Metabase Explorer, go to Exchange > LM > W3SVC > 1 > ROOT. Delete the directory you want by right-clicking on it and choosing Delete.

list all dns servers

Restart IIS:

iisreset /force

Now attempt to create the virtual directory again using the New-EcpVirtualDirectory, New-OwaVirtualDirectory, or New-WebApplication cmdlets

How to Create Reverse DNS Lookup Zones and PTR Record on Windows DNS Server?

A Reverse DNS Lookup zone is a special DNS zone type, which is needed to perform a reverse DNS server query and to resolve the host or domain name by its IP using a PTR record. The IP addresses in the reverse lookup zone are stored in a special reverse format. For example, the IP address of the node 111.222.000.003 in the reverse zone will be stored as 003.000.222.111.in-addr.arpa.
The in-addr.arpa zone is required to resolve the host name by its IP using a PTR record.

 

The PTR record is the reverse version of the A record. I.e. the A record associates a domain name with an IP address, and a PTR record associates an IP address with a canonical host name. These two DNS records are independent of each other. For example, the host mail.theitbros.com may be associated with the IP address 217.1.1.x, and the IP address 217.1.1.x point to a completely different host name.

Typically, the PTR records are used for spam protection. When receiving a letter, most email SMTP servers perform a reverse DNS lookup to verify the sender’s server hostname by its IP address. For example, when receiving an e-mail from a third-party server, the SMTP mail server can check the PTR record for the IP address of the sender server from which the email was received. If the name in the PTR record doesn’t match the name of the sending server from which the email message was received, the receiving server drops the email session from such a server (this is one of the many spam checks performed).

You can check the PTR records using the nslookup or dig command.
For example, check the PTR record in the reverse zone for the IP address 37.1.214.xxx:

nslookup 37.1.214.xxx

You should get something like this:

Server:  dns.google
Address:  8.8.8.8
Name:   mail.theitbros.com
Address:  37.1.214.xxx

In this case, the PTR record for IP 37.1.214.xxx points on mail.theitbros.com

Linux users can use the following command to verify PTR records:

 
 
dig -x 37.1.214.xxx

Lets’ look on how to create a reverse DNS zone and PTR record in the DNS server on Windows Server 2016/2012 R2:

  1. Open the DNS Management Console (dnsmgmt.msc);
  2. Expand your DNS server node, right-click on “Reverse Lookup Zones” and select “New Zone”;
    reverse dns lookup
  3. In the zone creation wizard, specify the type of the new zone—Primary Zone;
    reverse dns check
  4. Specify that you want to replicate this zone to all controllers in your domain;
    reverse name lookup
  5. Select IPv4 Reverse Lookup Zone type (usually) or IPv6;
  6. Specify the IP subnet for the zone. In this example, we will add a reverse zone for the subnet 10.1.1.0/24;
    reverse ip address lookup
  7. Next, specify whether to allow dynamic zone update. As a rule, you need to choose “Allow only secure dynamic updates (recommended for Active Directory)”;
  8. Click Next > Next > Finish.

Now your new reverse DNS zone has appeared in the Reverse Lookup Zones section and you can create a PTR record.

  1. Right-click your new reverse lookup zone and select “New Pointer (PTR)”;
    reverse dns record
  2. Specify the IP address and host name. As you can see, the FQDN of the host in reverse zone is looks like 24.1.1.10.in-addr.arpa.
    nslookup reverse dns

Now you can check this PTR records in DNS:

nslookup 10.1.1.24

reverse nslookup

About Us

Since 1996, our company has been focusing on domain name registration, web hosting, server hosting, website construction, e-commerce and other Internet services, and constantly practicing the concept of "providing enterprise-level solutions and providing personalized service support". As a Dell Authorized Solution Provider, we also provide hardware product solutions associated with the company's services.
 

Contact Us

Address: No. 2, Jingwu Road, Zhengzhou City, Henan Province

Phone: 0086-371-63520088 

QQ:76257322

Website: 800188.com

E-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.