Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: C
- C developing, for resolvers: Developing with the Resolver Library Routines
- C-style and C++-style comments: Setting Up a BIND Configuration File
- cache directive: The db.root file
- cache file: The Root Hints Data
- cached data, TTL for: Time to Live
- caching: Caching
-
- cleaning interval for: Cleaning interval
- configuring TTL limits and: TTLs
- corrupted, troubleshooting: Can't Get Rid of Old Data
- forwarders and: Forwarding
- missing cache data: Missing Root Hints Data
- negative: The Resolver Search Algorithm and Negative Caching (BIND 8)
- caching-only name servers: Caching-Only Servers
-
- benefits of: Caching-Only Servers
- registering name servers and: Registering Name Servers
- Campbell, Nigel: Capacity Planning
- cannot set resource limits message: Common Syslog Messages
- canonical domain name: The Domain Name System tutorial
-
- mail exchangers and: The MX Algorithm
- canonical name records (see CNAME records)
- canonicalization: Address and Alias Records
-
- filter for: Updating .rhosts, hosts.equiv, etc.
- sendmail program and: Electronic Mail
- capacity planning: Capacity Planning
- carriage return, treatment of: Compatibility
- case sensitivity: Character Case
-
- zone data files and: The Zone Data Files
- categories: Logging in BIND 8 and 9
-
- Category Details
- default: Logging in BIND 8 and 9
- chain of trust: The Chain of Trust
- channels: Logging in BIND 8 and 9
-
- Channel Details
- configuring: Logging in BIND 8 and 9
- Chaosnet class: Resource Records
- character strings, resource record data and: Data Format
- check-names directive: check-names (4.9.4+)
- check_soa program
-
- example in C: Sample Program: check_soa
- example in Perl: Perl Version of check_soa
- child processes: Using Signals
- children (see parenting subdomains)
- choosing
-
- domain names: Choosing a Domain Name
- registrars: Choosing a registrar
- subdomains: Where in the World Do I Fit?
- third-level domains: Back in the U.S.A.
- top-level domains: Where in the World Do I Fit?
- chroot command: Running BIND with Least Privilege
- CIDR (classless inter-domain routing): Checking That Your Network Is Registered
- cities, domains named after: Back in the U.S.A.
- class A and B networks, subnetting: Class A and B networks
- class C networks, subnetting: Class C networks
- CLASS fields (zone data files): Classes
- class w: The MX Algorithm
- classes: Resource Records
-
- Classes
- class option (nslookup): Option Settings
- no root name servers for class message: Common Syslog Messages
- classless interdomain routing (CIDR): Checking That Your Network Is Registered
- cleaning interval: Cleaning interval
- clients (see resolvers)
- closest known name servers: Recursion
- cname category: BIND 8 categories
- CNAME message: Common Syslog Messages
- CNAME records: Address and Alias Records
-
- Electronic Mail
- Using CNAME Records
- Types
- chaining: CNAMEs Pointing to CNAMEs
- deleting: Removing Parent Aliases
- Looked for PTR, Found CNAME message and: Resolver Reports "Looked for PTR, Found CNAME"
- multiple: Multiple CNAME Records
-
- round robin load distribution and: Multiple CNAMEs
- order of in zone data files: The Zone Data Files
- query statistics for: BIND 4.9 and 8 statistics
- transitioning to subdomains and: Managing the Transition to Subdomains
- using: Using CNAME Records
-
- A records instead of: Address and Alias Records
- com domain: Top-Level Domains
- command-line debugging: Debugging Command-Line Option
- command-line options used with h2n utility: Generating Zone Data Files from the Host Table
- commands, understood by rndc (list): rndc and controls (BIND 9)
- commands understood by ndc (list): ndc and controls (BIND 8)
- comments
-
- in BIND configuration file: Setting Up a BIND Configuration File
- C-style and C++ style: Setting Up a BIND Configuration File
- in resolv.conf file: Comments
- in zone data files: Comments
- Compaq (see Tru64 Unix)
- compatibility, between resolvers and name servers: Compatibility
- compiling BIND: Compiling and Installing BIND on Linux
- compressing domain names: Domain Name Compression
- conditions for checking sources of host information, specifying: Sun's Solaris 2.x
- config category: BIND 8 categories
- configuration syntax in different versions of BIND: Getting BIND
- configuring
-
- channels: Logging in BIND 8 and 9
- dialup connections: Dialup Connections
- hosts: Configuring Hosts
-
- consequences of: Minimizing Pain and Suffering
- vendor-specific resolver configurations: Vendor -Specific Options
- incremental zone transfers, for BIND 9: BIND 9 IXFR Configuration
- IPv6 transport: Configuring the IPv6 Transport
- resolvers: The Resolver
-
- sample configurations for: Sample Resolver Configurations
- TSIG: Configuring TSIG
- TTL limits: TTLs
- connectivity: What's a Mail Exchanger, Again?
-
- Slave Name Server Can't Load Zone Data
- choosing hosts and: Where Do I Put My Name Servers?
- dialup connections: Dialup Connections
- loss of: Loss of Network Connectivity
- outages and: Longer Outages (Days)
- parenting and: Parenting
- contrib/named-bootconf: Setting Up a BIND Configuration File
- control channels, using instead of signals: Controlling the Name Server
- control messages
-
- changing debugging level with: Changing the Debugging Level with Control Messages
- configuring name servers to listen for: ndc and controls (BIND 8)
- control session, command for ending: ndc and controls (BIND 8)
- control statement: Organizing Your Files
- controls statements
-
- ndc and: ndc and controls (BIND 8)
- rndc and: rndc and controls (BIND 9)
- core size limit, changing: Changing the core size limit
- counter, designing for incrementing serial numbers: SOA Serial Numbers
- counties, domains named after: Back in the U.S.A.
- countries, domains named after: Top-Level Domains
- counts, table of: BIND 4.9 and 8 statistics
- CPU utilization: Capacity Planning
- creating
-
- subdomains: How to Become a Parent: Creating Subdomains
- views: Views
- credibility measures: How to Read a Database Dump
- critical severity: Logging in BIND 8 and 9
- cryptographic checksums (see one-way hash functions)
- cryptography, public key (see public key cryptography)
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z