Section 7.1. Introduction
Section 7.2. Concealing a Name Server's Version
Section 7.3. Configuring a Name Server to Work with a Firewall (or Vice Versa)
Section 7.4. Setting Up a Hidden Primary Master Name Server
Section 7.5. Setting Up a Stealth Slave Name Server
Section 7.6. Configuring an Authoritative-Only Name Server
Section 7.7. Configuring a Caching-Only Name Server
Section 7.8. Running a Name Server in a chroot( ) Jail
Section 7.9. Running the Name Server as a User Other than Root
Section 7.10. Defining a TSIG Key
Section 7.11. Securing Zone Transfers
Section 7.12. Restricting the Queries a Name Server Answers
Section 7.13. Preventing a Name Server from Querying a Particular Remote Name Server
Section 7.14. Preventing a Name Server from Responding to DNS Traffic from Certain Networks
Section 7.15. Protecting a Name Server from Spoofing