I've strengthened and extended the wording in various sections of [the DNS article|http://labs.hoffmanlabs.com/node/1436] in the areas described above; I've used your confusion as feedback to try to improve the text.
Like I mentioned in my first post, this Snow Leopard server that I want to run DNS on(heretoforth known as "mini" below) is behind a firewall (a DLink box) that is getting the dynamic IP address for the domain name (unifiedmediagroup.com) via DynDNS and then routing all traffic pointing to that domain to the "mini" box (which has an internal IP of 192.168.1.127).
You have DynDNS DNS servers involved and your own DNS server involved, and that's a conflict; you're trying to have two disjoint sources of DNS data, and both believe they're authoritative. Which means it's anyone's guess what's going to happen when the box requests a translation. And which means your host configuration is probably going to be cranky.
Pick DynDNS for your public domain information.
Pick your own DNS for your private DNS, and as a linkage out into the public.
This is what I describe, and why I keep coming back to that one-outward reference to the ISP DNS server. You have two (and disparate) DNS server references here.
The NIC on "mini" shows the following when I check the DNS server:
127.0.0.1
192.168.1.1 (this is the IP of the firewall from inside).
So your Mac Mini can get its own DNS with its own view of unifiedmediagroup.com via 127.0.0.1 and it can get a second and separate and disjoint and also authoritative view of unifiedmediagroup.com from your ISP DNS servers? That's going to be a problem.
That's what I had intended to reference with the: +The only references to your ISP DNS servers or to Google DNS or such will be as forwarding entries within your DNS server.+ You have two references here.
Put another way, get rid of 192.168.1.1 reference here. Get rid of the ISP DNS reference inside the D-Link box, too. You should refer only to 192.168.1.127 in both places. The only reference to your ISP DNS or to Google or otherwise should be in your own DNS server, or in any local client(s) you intend to completely bypass your own local DNS server.
In terms of your statement "You'll have references to your new DNS server entered in your DHCP server(s) (in an Airport Extreme, Time Capsule, Mac OS X Server DHCP Server box, or firewall/router), and also set within any static-configured NICs you might have.", I don't have a good sense of where/how to reference it on the DLink router, at least as it pertains to DNS, other than to tell it to forward all traffic on ports related to mail, web, etc to forward onto the "mini" box.
You're going to have to learn how to configure your D-Link gear. D-Link has a gazillion different boxes of varying capabilities and features and interfaces and vintages. I'd expect the ISP DNS Server entry on the main page, or on a DHCP-specific page within the box. How your particular D-Link works, you're going to have to figure out with a trip through the particular manual(s).
As a side-note here while you're looking at your DHCP server configuration within your D-Link box: make absolutely certain 192.168.1.127 is not in the pool of available addresses the DHCP server can issue.
In the near term, you probably don't want to be running your own public-facing DNS yet, which means you won't be allowing incoming DNS queries through your firewall, and your DNS server you're configuring won't be serving public requests. Leave that to DynDNS or to your ISP or whomever is hosting your public static IP, and leave the associated security and redundancy and reliability requirements to somebody else. Get yourself a public static IP address (and that's
not the 192.168.1.127 address discussed elsewhere; the whole 192.168.0.0/16 block is a private IP address block), and have that aimed at your own firewall, and have your firewall port-map that through to your internal IP address. To 192.168.1.127 or whatever host will be serving your public static IP address. Have your ISP or DNS provider serve up the translation from your public-facing address(es) to your public static IP address(es).