root@firewall:/usr/local/etc/namedb # cat master/0.0.10-in-addr-arpa.db$TTL 86400@ IN SOA ns.myzone.com. mail.opnsense.localdomain. ( 2204051619 21600 3600 3542400 3600 )NS ns2 PTR ns.myzone.com50 PTR test.myzone.comns A 10.0.0.2
NS ns
NS ns.my.forward.zone.com.
dig -x 10.0.0.50
Quote from: scuffe82 on April 11, 2022, 07:26:54 pmroot@firewall:/usr/local/etc/namedb # cat master/0.0.10-in-addr-arpa.db$TTL 86400@ IN SOA ns.myzone.com. mail.opnsense.localdomain. ( 2204051619 21600 3600 3542400 3600 )NS ns2 PTR ns.myzone.com50 PTR test.myzone.comns A 10.0.0.2$TTL 86400@ IN SOA ns.myzone.com. mail.opnsense.localdomain. ( 2204051619 21600 3600 3542400 3600 )NS ns.myzone.com.2 PTR ns.myzone.com.50 PTR test.myzone.com.ns A 10.0.0.2Needs a trailing dot and there's no need for A records in a reverse lookup zone.
That's because you have this:Code: [Select]NS nsin your zone. That should readCode: [Select]NS ns.my.forward.zone.com.Otherwise it's looking for ns.0.0.10.in-addr.arpa, which does not exist.Honestly I do not even remember the syntax of nslookup, can you really just throw an IP address at the tool and get a reverse lookup? Otherwise you might want to try:Code: [Select]dig -x 10.0.0.50