Why would you ever configure this explicitly rather than letting your
name server follow delegation from the com name
servers to the pixar.com name servers? Well,
imagine that you have a private connection to Pixar and you're
told to use a special set of name servers, reachable only from your
network, to resolve all pixar.com domain names.
Even though forwarding rules are specified in the
zone statement, they apply to all domain names
that endinthe domain name
specified. That is, regardless of whether the domain name
you're looking up, foo.bar.pixar.com, is
in the pixar.com zone, the rule applies to it
because it ends in pixar.com (or is in the
pixar.com domain, if you prefer).
There's another variety of forward zone, in a way the opposite
of the kind we just showed you. These allow you to specify which
queries don't get forwarded. Therefore, it
applies only to name servers with forwarders specified in the
options statement, which would normally apply to
all queries.
Wait a minute -- why would you need to disable forwarding in a
zone you're authoritative for? Wouldn't you just answer
the query and not use a forwarder?
Remember, the forwarding rules apply to queries for all domain names
that end in the domain name of the zone. So this forwarding rule
really applies only to queries for domain names in delegated
subdomains of movie.edu, like
fx.movie.edu. Without the forwarding rule, this
name server would have forwarded a query for
matrix.fx.movie.edu to the name servers at
192.249.249.3 and 192.249.249.1. With the forwarding rule, it instead
uses the subdomain's NS records from the movie.edu
zone and queries the fx.movie.edu
name servers directly.
Forward zones are enormously helpful in dealing with Internet
firewalls, as we'll see in the next chapter.