How DNS Works – Domain Name System Explained
1. What Is DNS and Why It Exists
The Domain Name System (DNS) is the internet's distributed directory service —
it translates human-readable hostnames like www.google.com into the numeric
IP addresses (like 142.250.183.14) that routers and computers use to
actually send traffic. Without DNS, every user would need to memorise IP addresses for
every website, service, or server they want to reach.
DNS is not a single server or a simple lookup table. It is a globally distributed, hierarchical, and highly redundant database — split across millions of servers worldwide, designed so that no single failure can bring it down, and so that the workload of billions of queries per day is spread efficiently.
| DNS Property | What It Means |
|---|---|
| Distributed | No single server holds all DNS data. Records are spread across millions of servers, each responsible for a portion of the namespace |
| Hierarchical | Organised as a tree: root → TLD → domain → subdomain. Each level delegates authority for its subtree to the next level down |
| Redundant | Every zone has multiple authoritative nameservers. The 13 root server "addresses" are served by hundreds of physical machines via anycast |
| Cached | Resolvers and clients cache responses for the TTL duration, dramatically reducing query volume and speeding up repeat lookups |
| UDP-based | DNS uses UDP port 53 for speed (no connection setup overhead). Falls back to TCP port 53 for large responses and zone transfers |
Related pages: How DHCP Works | DHCP Overview | DHCP Snooping | Common Port Numbers | NTP Synchronisation | IPv6 | Troubleshooting Methodology
2. The DNS Namespace — A Hierarchical Tree
DNS names are read right to left, from the most general to the most specific. Every fully qualified domain name (FQDN) ends with a dot (.) representing the root, though this trailing dot is usually omitted in everyday use.
. (Root — the top of the tree)
│
┌──────────────┼──────────────────────────┐
.com .org .net .uk ... (Top-Level Domains / TLDs)
│
┌───────┴───────┐
google.com cisco.com example.com ... (Second-Level Domains)
│
┌──┴──────────┐
www.google.com mail.google.com maps.google.com ... (Subdomains / Third-Level)
Reading "www.google.com.":
└── . (root, implied)
└── com (TLD — Top-Level Domain)
└── google (Second-Level Domain — registered by Google)
└── www (Subdomain / host — defined by Google's DNS)
Types of Top-Level Domains (TLDs)
| TLD Type | Examples | Description |
|---|---|---|
| Generic (gTLD) | .com, .org, .net, .edu, .gov, .mil | The original generic TLDs; .com is the largest with over 160 million domains |
| New gTLD | .app, .tech, .cloud, .bank, .shop | Introduced since 2012; over 1,200 new gTLDs now exist |
| Country Code (ccTLD) | .uk, .de, .jp, .au, .sa, .cn | Two-letter codes assigned to countries and territories by ISO 3166 |
| Infrastructure | .arpa | Reserved for internet infrastructure — notably in-addr.arpa for reverse DNS |
www.example.com. (note the trailing dot). A relative
name like webserver is completed using the DNS search domain configured on
the client — e.g., with search domain company.local, querying
webserver resolves to webserver.company.local.
3. The Four Types of DNS Servers
Every DNS query involves up to four different types of servers, each with a distinct role. Understanding these roles is fundamental to CCNA DNS knowledge.
| Server Type | Also Called | Role | Examples |
|---|---|---|---|
| DNS Resolver | Recursive resolver, recursive nameserver, DNS recursor | Receives queries from clients and performs the full resolution on their behalf — querying root, TLD, and authoritative servers as needed. Caches responses to serve future queries faster. | ISP DNS (assigned via DHCP), Google 8.8.8.8, Cloudflare 1.1.1.1, your office's DNS server |
| Root Nameserver | Root server | Knows the IP addresses of all TLD nameservers. Does not know the final IP of any domain — it only refers the resolver to the correct TLD server. There are 13 root server addresses (a.root-servers.net through m.root-servers.net), served by hundreds of physical machines globally via anycast. | a.root-servers.net (VeriSign), b.root-servers.net (ICANN), etc. |
| TLD Nameserver | TLD server | Manages a specific top-level domain (.com, .org, .net, .uk). Knows which authoritative nameservers are responsible for each domain registered under that TLD. Operated by domain registries (VeriSign for .com, PIR for .org, Nominet for .uk). | a.gtld-servers.net, b.gtld-servers.net (VeriSign, for .com/.net) |
| Authoritative Nameserver | Authoritative server, zone nameserver | Holds the actual DNS records for a specific domain. This is the definitive source
of truth for that domain. The authoritative server answers with the actual IP address,
MX records, etc. for the domain it manages. Responses from authoritative servers
carry the aa (Authoritative Answer) flag. |
ns1.example.com (operated by the domain owner or their DNS provider) |
4. Step-by-Step DNS Resolution — The Full Query Path
When you type www.example.com in a browser for the first time (nothing cached),
here is exactly what happens:
Your Browser / Application
│
│ 1. "I need the IP for www.example.com"
▼
Stub Resolver (OS)
│ 2. Check hosts file → no entry
│ 3. Check local DNS cache → not cached
│ 4. Forward to recursive resolver (e.g., 8.8.8.8)
▼
Recursive Resolver (8.8.8.8)
│ 5. Check resolver cache → not cached
│ 6. Ask root server: "Who handles .com?"
▼
Root Server (a.root-servers.net)
│ 7. "I don't know www.example.com, but .com is handled by:"
│ "a.gtld-servers.net, b.gtld-servers.net ..."
▼
Recursive Resolver
│ 8. Ask TLD server: "Who handles example.com?"
▼
TLD Nameserver (a.gtld-servers.net)
│ 9. "I don't know www.example.com, but example.com is handled by:"
│ "ns1.example.com (93.184.216.24)"
▼
Recursive Resolver
│ 10. Ask authoritative server: "What is www.example.com?"
▼
Authoritative Nameserver (ns1.example.com)
│ 11. "www.example.com has A record: 93.184.216.34 (TTL 3600)"
│ [Response includes aa flag — Authoritative Answer]
▼
Recursive Resolver
│ 12. Cache the answer (93.184.216.34, TTL 3600 seconds)
│ 13. Return answer to the client's stub resolver
▼
Stub Resolver (OS)
│ 14. Cache locally (for TTL duration)
│ 15. Return 93.184.216.34 to the browser
▼
Browser connects to 93.184.216.34 on port 443 (HTTPS)
This entire process — involving up to 8 network round-trips — typically completes in 50–300 milliseconds for an uncached query. Subsequent queries for the same name are served from cache in under 1 ms.
5. Recursive vs. Iterative Resolution
The two patterns of DNS resolution — recursive and iterative — describe who does the work of querying multiple servers.
| Aspect | Recursive Resolution | Iterative Resolution |
|---|---|---|
| Who queries multiple servers | The recursive resolver does all the work — queries root, TLD, authoritative on the client's behalf | The client queries each server itself — root gives a referral, client queries the referred server, which gives another referral, etc. |
| What the client receives | Final answer (IP address) — the resolver handles all intermediate steps | A referral at each step — the client must follow each referral itself |
| Where it's used | Client → Recursive Resolver communication. The client sets the Recursion Desired (RD) flag; the resolver sets Recursion Available (RA) in the response. | Recursive Resolver → Root/TLD/Authoritative communication. The resolver itself uses iterative queries when resolving on behalf of a client. |
| Complexity burden | On the recursive resolver — the client sends one query, gets one answer | On the querying party — must handle referrals and follow delegation chain |
dig www.example.com +trace,
which forces your system to perform iterative resolution from the root.
6. DNS Caching and Time to Live (TTL)
Caching is the mechanism that makes DNS scale to handle billions of queries per day. Every DNS response includes a TTL (Time to Live) value — the number of seconds that a resolver or client is allowed to cache and reuse that response without querying again.
DNS Response:
www.example.com. 3600 IN A 93.184.216.34
↑
TTL = 3600 seconds (1 hour)
This response can be served from cache
for up to 1 hour before re-querying
Caching Chain (each level caches independently):
┌──────────────────────────────────────────────────┐
│ Authoritative Server → Sets TTL (controls how │
│ long the record is cached)│
└──────────────────────────────────────────────────┘
↓ cached for TTL
┌──────────────────────────────────────────────────┐
│ Recursive Resolver → Caches and serves │
│ (8.8.8.8, ISP DNS) subsequent requests │
│ until TTL expires │
└──────────────────────────────────────────────────┘
↓ cached for remaining TTL
┌──────────────────────────────────────────────────┐
│ OS / Stub Resolver → Caches locally for │
│ (client machine) TTL duration │
└──────────────────────────────────────────────────┘
TTL Values and Their Implications
| TTL Range | Common Value | Use Case | Trade-off |
|---|---|---|---|
| Very short | 60–300 seconds | Records about to be changed; failover setups; CDN health checks | More DNS queries, higher load on authoritative server; changes propagate quickly |
| Short | 300–1800 seconds (5–30 min) | DNS migrations; before major changes; load-balanced records | Balance between propagation speed and server load |
| Standard | 3600 seconds (1 hour) | Normal A records, MX records for stable infrastructure | Good balance — changes take up to 1 hour to propagate globally |
| Long | 86400 seconds (24 hours) | Rarely-changing records — NS records, SOA records | Very low query volume; but changes take up to 24 hours to propagate everywhere |
| Very long | 604800 seconds (7 days) | NS records for extremely stable delegations | Minimal server load; changes can take a week to fully propagate |
7. DNS Record Types — Complete Reference
DNS records are the individual entries stored in a DNS zone. Each record type serves a specific purpose. Understanding them is essential for CCNA and real-world DNS work.
| Record Type | Full Name | Purpose | Example |
|---|---|---|---|
| A | Address | Maps a hostname to an IPv4 address. The most fundamental DNS record — the first type queried by default. | www.example.com. 3600 IN A 93.184.216.34 |
| AAAA | IPv6 Address | Maps a hostname to an IPv6 address (128-bit). Queried automatically by IPv6-capable clients alongside A records. | www.example.com. 3600 IN AAAA 2606:2800:220:1:248:1893:25c8:1946 |
| CNAME | Canonical Name | Creates an alias pointing one hostname to another. The resolver follows the chain until it reaches an A/AAAA record. A CNAME cannot coexist with other record types for the same name (except RRSIG in DNSSEC). | www.example.com. IN CNAME example.com.→ Resolver then looks up example.com A record |
| MX | Mail Exchange | Specifies the mail server(s) responsible for receiving email for the domain. Each MX record has a priority (lower number = higher preference). The sending mail server tries lower priorities first, falls back to higher numbers. | example.com. IN MX 10 mail1.example.com.example.com. IN MX 20 mail2.example.com. |
| NS | Name Server | Lists the authoritative nameservers for a domain. These records appear both in the domain's own zone (authoritative NS) and at the parent TLD level (delegation NS). At least two NS records are required for redundancy. | example.com. IN NS ns1.example.com.example.com. IN NS ns2.example.com. |
| PTR | Pointer | Reverse DNS lookup — maps an IP address back to a hostname. PTR records live in
the special in-addr.arpa. (IPv4) or ip6.arpa. (IPv6)
zones. Used for email authentication, logging, and security tools. |
34.216.184.93.in-addr.arpa. IN PTR www.example.com.(Note: IP is reversed in the query name) |
| SOA | Start of Authority | Every DNS zone has exactly one SOA record. It contains zone metadata: the primary nameserver, responsible party email, zone serial number, and timing parameters (refresh, retry, expire, negative TTL). | example.com. IN SOA ns1.example.com. admin.example.com. ( 2024041544 ; Serial 7200 ; Refresh 3600 ; Retry 1209600 ; Expire 3600 ) ; Negative TTL |
| TXT | Text | Stores arbitrary text data. Used for email sender authentication (SPF, DKIM, DMARC), domain ownership verification (Google, Microsoft), and security policies. | SPF: example.com. IN TXT "v=spf1 mx -all"DMARC: _dmarc.example.com. IN TXT "v=DMARC1; p=reject" |
| SRV | Service Locator | Locates specific services by protocol. Contains priority, weight, port, and target hostname. Used by SIP (VoIP), XMPP (chat), Microsoft Active Directory (LDAP, Kerberos), and many other protocols. | _ldap._tcp.example.com. IN SRV 0 5 389 dc01.example.com.(Priority 0, Weight 5, Port 389, Target dc01.example.com) |
| CAA | Certification Authority Authorisation | Specifies which Certificate Authorities are authorised to issue SSL/TLS certificates for the domain. Prevents unauthorised certificate issuance. | example.com. IN CAA 0 issue "letsencrypt.org" |
| DNSKEY | DNS Key | DNSSEC public key. Used to verify digital signatures (RRSIG records) on DNS responses. Part of the DNSSEC chain of trust. | Contains ZSK (Zone Signing Key) and KSK (Key Signing Key) public keys |
8. DNS Zones — What They Are and How They Work
A DNS zone is an administrative unit — a contiguous portion of the DNS namespace that is managed as a single entity by a particular organisation or DNS server. A zone contains all the DNS records for that portion of the namespace and is stored in a zone file on the authoritative nameserver.
Zone vs. Domain
The terms "zone" and "domain" are often confused. A domain is a subtree of the DNS
namespace (e.g., example.com and everything under it). A zone is the portion
of that domain that a particular nameserver is authoritative for — it may or may not
cover the entire domain. If example.com delegates
east.example.com to a different nameserver, the example.com
zone ends at that delegation boundary, and east.example.com becomes its
own separate zone.
example.com zone (on ns1.example.com):
┌──────────────────────────────────────────────────────┐
│ example.com. SOA, NS, A, MX, TXT │
│ www.example.com. A record │
│ mail.example.com. A record │
│ east.example.com. NS → ns1.east.example.com. │ ← Delegation
└──────────────────────────────────────────────────────┘
east.example.com zone (on ns1.east.example.com — different server):
┌──────────────────────────────────────────────────────┐
│ east.example.com. SOA, NS │
│ web.east.example.com. A record │
│ db.east.example.com. A record │
└──────────────────────────────────────────────────────┘
Primary and Secondary Zones
| Zone Type | Description | Notes |
|---|---|---|
| Primary Zone | The master copy — all changes (adds, modifies, deletes) to zone records are made here. The SOA record's MNAME field identifies the primary server. | Can be stored as a flat text zone file or in a directory-integrated database (Active Directory DNS) |
| Secondary Zone | A read-only replica of a primary zone. Receives updates from the primary via zone transfer (AXFR for full, IXFR for incremental changes). | Provides redundancy and load distribution; checks the SOA serial number to determine if an update is needed |
| Stub Zone | Contains only NS records for a zone (no full copy of records). Used to improve name resolution performance within an organisation. | More lightweight than a secondary zone; useful for directing queries to the correct authoritative servers |
| Forward Zone | Standard zone mapping names to IPs (A, CNAME, MX records). | The most common zone type |
| Reverse Zone | Maps IPs back to hostnames (PTR records). Named using reversed IP octets with .in-addr.arpa suffix for IPv4. | e.g., the reverse zone for 192.168.1.0/24 is 1.168.192.in-addr.arpa |
9. DNS Delegation — How Authority Is Passed Down
Delegation is the mechanism by which a parent zone transfers authority for a subtree to a child zone's nameservers. This is how the DNS hierarchy actually works in practice — each level trusts the next level down to manage its own portion.
How google.com was delegated:
Step 1: ICANN manages the root (.) zone
→ Root zone contains NS records for all TLDs:
com. IN NS a.gtld-servers.net. (delegates .com to VeriSign)
Step 2: VeriSign manages the .com TLD zone
→ .com zone contains NS records for each registered domain:
google.com. IN NS ns1.google.com. (delegates google.com to Google)
google.com. IN NS ns2.google.com.
Step 3: Google manages the google.com zone
→ google.com zone contains actual records:
www.google.com. IN A 142.250.183.14
mail.google.com. IN MX 10 gmail-smtp-in.l.google.com.
Glue Records:
When a delegation's NS records point to hostnames within the same zone
being delegated (e.g., ns1.google.com is inside google.com), the parent
zone MUST include the A record for the NS hostname — these are "glue records."
Without them, you'd need to resolve google.com to find out where ns1.google.com
is — a circular dependency!
10. DNS and DHCP — How Clients Get Their DNS Server
Most devices on a network learn their DNS server address automatically via DHCP Option 6. When a DHCP server assigns an IP address, it also sends the DNS server address(es) in the same response — no manual configuration needed.
DHCP ACK packet — what the server sends to the client: ┌─────────────────────────────────────────────────────┐ │ Your IP address: 192.168.1.15 │ │ Subnet mask: 255.255.255.0 (Option 1) │ │ Default gateway: 192.168.1.1 (Option 3) │ │ DNS servers: 8.8.8.8 (Option 6) │ │ 1.1.1.1 │ │ Domain name: company.local (Option 15) │ │ Lease time: 86400 seconds (Option 51) │ └─────────────────────────────────────────────────────┘ After receiving this, the client: → Sets its DNS server to 8.8.8.8 and 1.1.1.1 → Appends "company.local" when resolving short hostnames → Sends all DNS queries to 8.8.8.8 (8.8.8.8 handles full recursive resolution)
See: How DHCP Works | DHCP Overview | DHCP Server Configuration Lab
11. DNSSEC — DNS Security Extensions
Traditional DNS has no authentication — a resolver has no way to verify that the response it receives genuinely came from the authoritative server and wasn't tampered with in transit. DNSSEC (DNS Security Extensions) adds digital signatures to DNS records, allowing resolvers to cryptographically verify that responses are authentic and unmodified.
How DNSSEC Works
- The zone owner generates a Zone Signing Key (ZSK) and a Key Signing Key (KSK) keypair.
- Every record set in the zone is digitally signed with the ZSK, producing RRSIG records.
- The KSK signs the ZSK (stored as a DNSKEY record), and the parent zone stores a hash of the KSK as a DS (Delegation Signer) record.
- Resolvers with DNSSEC validation enabled follow this chain of trust from the root down to the zone, verifying signatures at each level.
- If any signature fails to verify, the resolver returns SERVFAIL — protecting clients from spoofed responses.
Key DNSSEC Record Types
| Record | Purpose |
|---|---|
| DNSKEY | Stores the public signing keys (ZSK and KSK) for the zone |
| RRSIG | Digital signature covering a specific record set — proves the records are genuine and unmodified |
| DS | Delegation Signer — hash of a zone's KSK stored in the parent zone, creating the chain of trust between parent and child |
| NSEC / NSEC3 | Authenticated denial of existence — proves a name does NOT exist, preventing spoofed NXDOMAIN responses |
dig shows ad in the
flags, it means the response is DNSSEC-validated (Authenticated Data). When querying
a DNSSEC-signed domain, use dig example.com +dnssec to see RRSIG records.
If validation fails, you get SERVFAIL instead of the answer.
12. DNS Threats and Attacks
Because DNS is fundamental to all internet communication, it is a frequent target for attacks. Understanding these threats is important for network security and CCNA exam preparation.
| Attack | How It Works | Defence |
|---|---|---|
| DNS Cache Poisoning | Attacker injects a forged DNS response into a resolver's cache — associating a legitimate domain with a malicious IP. All clients using that resolver are redirected to the attacker's server until the TTL expires. | DNSSEC (cryptographic validation), source port randomisation, transaction ID randomisation (all implemented in modern resolvers) |
| DNS Spoofing | Attacker intercepts a DNS query and sends a fake response before the real server replies — same result as cache poisoning but without cache persistence. | DNSSEC; DNS over TLS (DoT) or DNS over HTTPS (DoH) to encrypt queries |
| DNS Amplification DDoS | Attacker sends small DNS queries with the victim's IP as the source (spoofed) to open resolvers. DNS responses (up to 70x larger than the query) flood the victim. Open resolvers amplify the attack massively. | Disable open recursion on authoritative servers (restrict to authorised clients only); implement BCP 38 anti-spoofing at network edge; rate limiting |
| DNS Tunnelling | Attacker encodes data in DNS queries and responses to exfiltrate data or establish a command-and-control channel through firewalls that allow DNS traffic. | DNS traffic analysis; anomaly detection for unusually large TXT record queries; DNS firewall / RPZ (Response Policy Zone) |
| NXDOMAIN Hijacking | ISP or malicious resolver returns a valid IP (usually a search/ad page) for domains that should return NXDOMAIN. Prevents users from discovering misconfigured or non-existent domains. | Use a trusted, non-hijacking resolver (Cloudflare 1.1.1.1, Quad9 9.9.9.9);
test with dig nonexistent-domain.xyz |
| DNS Flood / DoS | High-volume flood of DNS queries overwhelms the nameserver, making it unavailable for legitimate queries. | Anycast deployment of DNS infrastructure; rate limiting; DDoS mitigation services (Cloudflare, Akamai) |
13. DNS Query Flow — What Happens Inside Your OS
Before a DNS query even leaves your computer, the OS performs several local checks. Understanding this resolution order helps diagnose why a hostname might resolve to an unexpected address.
Application requests resolution of "webserver.company.com"
│
▼
┌─────────────────────────────────────────────────────┐
│ Step 1: Check hosts file │
│ C:\Windows\System32\drivers\etc\hosts (Windows) │
│ /etc/hosts (Linux/macOS) │
│ If found → return immediately (bypasses all DNS) │
└─────────────────────────────────────────────────────┘
│ Not in hosts file
▼
┌─────────────────────────────────────────────────────┐
│ Step 2: Check local DNS resolver cache │
│ (Windows: ipconfig /displaydns to view) │
│ (Linux: resolvectl statistics) │
│ If cached and TTL not expired → return from cache │
└─────────────────────────────────────────────────────┘
│ Not cached (or expired)
▼
┌─────────────────────────────────────────────────────┐
│ Step 3: Send DNS query to configured DNS server │
│ (from DHCP Option 6 or manual configuration) │
│ UDP port 53 → DNS server IP │
└─────────────────────────────────────────────────────┘
│ If DNS server is unreachable
▼
┌─────────────────────────────────────────────────────┐
│ Step 4: Try secondary/alternate DNS server │
└─────────────────────────────────────────────────────┘
│ If all servers fail
▼
┌─────────────────────────────────────────────────────┐
│ Step 5: mDNS (Multicast DNS) for .local names │
│ (Windows: LLMNR; Linux/macOS: Avahi/mDNS) │
│ Broadcasts on local subnet for .local resolution │
└─────────────────────────────────────────────────────┘
│ If no response from any source
▼
Name resolution fails → application error
14. Common DNS Misconceptions
-
"DNS changes propagate instantly."
DNS changes do not propagate — they expire. When you update a DNS record, the old cached entry persists on resolvers worldwide until its TTL runs out. If your A record has a 24-hour TTL, it could take up to 24 hours before all resolvers serve the new value. This is why lowering the TTL before a planned change is best practice. -
"There are only 13 DNS root servers."
There are 13 root server names (a.root-servers.net through m.root-servers.net) and 13 corresponding IP addresses. However, each of these is served by many physical machines using anycast routing — in 2025 there are over 1,700 physical root server instances worldwide. The "13" refers to the number of distinct IP addresses in the root zone file. -
"Your ISP's DNS server is the authoritative server for the websites you visit."
Your ISP's DNS is a recursive resolver — it queries other servers on your behalf and caches the results. It is not authoritative for any websites. The authoritative servers for a domain are operated by the domain owner or their DNS hosting provider (Cloudflare, AWS Route 53, GoDaddy DNS, etc.). -
"DNS uses TCP."
DNS primarily uses UDP port 53 for its speed advantage (no connection setup). It falls back to TCP port 53 when responses are large (over 512 bytes, or over the EDNS0 limit), for zone transfers (AXFR), and when thetc(Truncated) flag is set in a UDP response. -
"A CNAME can point to an IP address."
A CNAME must point to another hostname, never directly to an IP address. The resolver follows the CNAME chain until it reaches an A or AAAA record. Also, a CNAME cannot be created at the zone apex (e.g., you cannot CNAME example.com itself — only subdomains like www.example.com can be CNAMEs). -
"Lower MX priority number means lower importance."
The opposite: a lower MX number = higher preference. Mail senders always try the lowest-numbered MX server first and only fall back to higher numbers if the preferred server is unreachable.
15. Key Points & Exam Tips
- DNS translates hostnames to IP addresses — uses UDP port 53 (TCP for large responses and zone transfers).
- DNS is hierarchical: Root (.) → TLD (.com, .org) → Domain (example.com) → Subdomain (www.example.com). Names read right-to-left from general to specific.
- Four server types: Recursive resolver (does the work for clients), Root server (knows TLD servers), TLD server (knows authoritative NS for each domain), Authoritative server (holds actual zone records).
- Recursive resolution: client asks resolver once, gets final answer. Iterative resolution: resolver queries root, TLD, authoritative in sequence — this is what the resolver does internally on the client's behalf.
- TTL: how long a resolver can cache a DNS response. Lower TTL = faster propagation of changes but more queries. Higher TTL = less load but slower updates.
- A record: hostname → IPv4. AAAA: hostname → IPv6. MX: mail servers (lower number = higher priority). CNAME: alias → another hostname. PTR: IP → hostname (reverse DNS). NS: authoritative nameservers. SOA: zone metadata. TXT: text (SPF/DKIM/verification).
- Hosts file is checked before DNS — entries in it always override DNS.
- DNS zone: administrative unit holding DNS records for a domain portion. Primary zone (master copy) vs secondary zone (read-only replica via zone transfer).
- Glue records: A records for NS servers that are within their own zone — required to break circular DNS dependency during delegation.
- DNSSEC: adds cryptographic signatures to DNS records (DNSKEY, RRSIG, DS).
adflag in dig = Authenticated Data (DNSSEC validated). - DNS cache poisoning — forged entries in resolver cache. DNSSEC prevents this. DNS amplification — DDoS using open resolvers. DNS tunnelling — data exfil via DNS.
Related pages: How DHCP Works | DHCP Overview | DHCP Snooping | Common Port Numbers | NTP Synchronisation | IPv6 | Troubleshooting Methodology