Installation guides
Installation and configuration
Allow/Denylists And Named Lists
"Named Lists" is the feature for Education, Hotspot, Office, and Enterprise billing plans. This feature comes in handy when you need to add the same list of domains to the different policies (filtering profiles). You can create or edit one named list and then apply it to any of your filtering policies. Named lists also increase the limit for the allow and deny lists in accordance with your billing plan. You can manage lists of allowed or blocked hosts and domains for all of your profiles or group of profiles.
Navigate to the "Allowlist" or "Denylist" tab to create a new named list.
Find the "Create list" button and enter the name of the new list into the "List name" box on the right and click "Create list". It will appear at the bottom of the page.
Click the Cogwheel button on the right, then click "Save" to add the newly created named list to the multiple policies (profiles).
The same steps work for the Denylist section.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.General Setup via OpenVPN
Some devices are not yet supported by the SafeDNS Agent or cannot have it installed for various reasons. In this case, you can configure the SafeDNS filtering via the third-party app OpenVPN.
⤵Download OpenVPN
OpenVPN creates a VPN connection using the SafeDNS Configuration file that contains all settings of chosen filtering policy.
OpenVPN does not change or hide your Public IP, as regular VPN services do, it only receives filtering rules from your dashboard.
Multiple devices can use the same filtering policy, but each device should use its own Configuration file.
Devices filtered via OpenVPN remain protected in any network.
The installation process is the same for all platforms: you need to download the Configuration file, install OpenVPN, and import the Configuration file.
Guides for the platforms supported by OpenVPN
Windows Filtering Setup via OpenVPN
Mac Filtering Setup via OpenVPN
Linux Filtering Setup via OpenVPN
iOS and Android Filtering Setup via OpenVPN
Schedule Setup
Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario. However, greater flexibility brings more complexity to the setup of a schedule.
Schedule logic: selected custom Policy (profile) is applied at the selected time; Default policy is applied at all other times.
This system allows a much more flexible schedule, that you can apply in advanced scenarios such as:
Turning off the internet on schedule, with the filtered internet at the other time. This option is often used by parents to limit kids during school hours.
Filtering of unproductive websites at the workplace, with unfiltered access during lunch break, and before and after the workday. This type of scheduling is suitable for use within organizations.
Filtered internet in the hours when the computer is used by a child, with different filtering rules in the hours when the computer is used by adults.
Schedule setup
To set the schedule, you must create an additional Policy (profile) for which the schedule will be enabled.
Log in to your SafeDNS Dashboard
Go to Settings > Policy
Enter the name of the policy (e.g. "Schedule"), and click "Create policy".
After creating a policy, you can start setting up the schedule.
Go to Settings > Schedule.
Select the newly created policy "Schedule" from the dropdown menu on the left.
Set the time at which the policy "Schedule" should be active. The rest of the time the Default policy will be active. The appearance and functionality of the Schedule depend on your service plan.
Switch on the Schedule is enabled on the right.
Click "Save".
After setting the schedule, you need to apply it to your network or individual computers.
If you use the SafeDNS Agent, you need to open Settings > Policy and set the "Schedule" policy as active.
If you use an unattended installation of the Agent for computers in a corporate network, you will need to reinstall it with the scheduling policy as the main policy parameter.
If your filtering is set up at the router/modem, proxy, or gateway, you need to bind your external (public) IP address to the custom "Schedule" policy.
Go to Settings > Devices
Navigate to your IP address/DynDNS and click on the edit icon on the right.
Change the Policy to the custom "Schedule" using the dropdown menu.
Click on the green checkmark on the right to apply changes.
After the settings are applied, the Schedule will be active.
You can have multiple policies with different schedules for different users and networks, but note that the switch will always be between the current policy and the "Default" policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Possible problems with the schedule
Scheduled settings switch at the wrong time
Make sure that you have the correct time zone applied. In the Dashboard, click on the Cogwheel icon in the top right corner, select the correct time zone and click "Save changes".
Please note that settings take 5-7 minutes to apply.
Because of the cache of DNS queries at the system level and in the browser, your computer can not immediately respond to the newly applied settings. To eliminate this, we recommend disabling automatic control of the browser cache.
The schedule is not working at all
Make sure that you have followed all steps above. If everything is done correctly and the problem persists, please contact our technical support.Block Page Setup
The block page is displayed when a user is trying to access a website blocked by the filtering rules. SafeDNS provides instruments to customize the block page. For example, you can add your logo and contact details on the block page, and an explanation why the website site is blocked.
Creating custom block page
To create a custom block page, do the following:
Log in to SafeDNS Dashboard.
Navigate to Settings > Advanced and scroll down to the block page section.
Click "Add new".
Enter the name of the new block page and choose its type from the dropdown menu. Click "Add".
Block page types
Standard block page - default SafeDNS block page.
Personal block page - simple block page with the customizable image and description.
HTML block page - block page with the HTML support.The following variables are supported:
$website - shows the address of a blocked website.
$domain - shows the domain part of the $website.
$reason - shows the reason of the block, supports language prefix.
$category - shows the filtering category(-ies) of the blocked $domain, supports language prefix.
You can add a language prefix to translate the $reason and $category variables (e.g $fr:reason, $ar:category).List of available languages: sq (Albanian), ar (Arabic), es (Spanish), sv (Swedish), tr (Turkish), it (Italian), en (English), ur (Urdu), pt_BR (Brazilian Portuguese), fr (French), de (German).
HTML blockpage example
Website Blocked
You have been denied access to this website. For further info please contact YOUR@EMAIL.COM
|
Please change the "//YOUR.WEBSITE/YOUR-LOGO.PNG" and "YOUR@EMAIL.COM" in the lines 25, 27, and 33 accordingly.
Hidden block page with the emulation of the website error - block page that imitates browser's website error.
Empty DNS answer, as if the blocked website does not exist - block page that imitates NXDOMAIN browser error.
The availability of a certain block page type depends on your billing plan.
You can always edit the block page type by clicking on the pencil icon to the right.
Applying custom block page
To create a custom block page, do the following:
Navigate to Settings > Policy.
Click on the pencil icon to the right from the filtering policy.
Select the custom block page from the dropdown menu.
Click on the green check mark to save the changes.
Please note that the SafeDNS TLS certificate should be installed on each end device where you want HTTPS pages to display correctly. Without the certificate, block page will be displayed for HTTP websites only.
SafeDNS Root CA certificate installation guide.NAT DNS Setup
This feature is not available for the Safe@Home plan.
Network Address Translation or NAT is frequently used in corporate networks. It allows network owners and administrators to:• decrease the number of static IPs• secure local networks• prevent unwanted external access to the local hosts• hide the entire internal network structure
NAT DNS is a SafeDNS service feature designed to apply different filtering policies to different networking hardware (routers, gateways, etc.) behind NAT with one public IP.
Your networking hardware should be set up according to the SafeDNS instructions.
NAT DNS setup
Enter the Dashboard > Settings. Assign the Public IP of a NAT device to one of the existing filtering policies under the “IP addresses / DynDNS” section. (to use NAT DNS you must have 2 or more policies).
Manually or via DHCP set up the target DNSes on the end devices (routers or gateways behind NAT).List of target DNS addresses:
195.46.39.101195.46.39.102195.46.39.103195.46.39.104195.46.39.105
In the Dashboard > Settings, scroll down to the bottom, and assign policies to the Target IPs (one IP = one policy). Click on the green checkmark to apply settings.
After that, all devices behind NAT will be filtered by the chosen policy.
You can view the stats for each Target IP by selecting its policy in the Stats tab.
This feature works only for networks behind NAT. If you use a proxy server, the NAT DNS filtering option will not work, because in proxy server’s settings will be applied instead.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Top-level Domains Blocking
If you want to block any top-level domain, just add it without a leading dot to your Denylist.
For example, if you want to block access to all websites in the RU domain zone, add ru to your Denylist.
Internationalized country code top-level domains should be added to the Denylist list in the IDN form: 中国 (Chinese IDN ccTLD), рф (Russian IDN ccTLD), etc.
A full list of top-level domains can be found on the IANA website and Wikipedia.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DSL/Wi-Fi routers
Router Setup
The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40
Router with Static IP address configuration
Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Router with Dynamic IP address configuration
In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a Dynamic DNS service.
Most modern routers provide their own DynDNS services. We recommend using them.
Here's an example of the DynDNS menu on the TP-Link router with the TP-Link service provider:
You only need to create a DynDNS record in the router interface. Then skip to Step 6 below.
If your router does not have its own DynDNS service provider, we recommend using third-party NO-IP DynDNS.
1. In the router setting, go to DynDNS/DDNS settings,
2. Check the DynDNS service available for your router. If available, we recommend using the No IP DynDNS service provider.
3. Go to the website noip.com and sign up.
4. In your No-IP account, create a hostname (any name you can think of).
5. Go back to your router and configure DDNS/DynDNS.
Select No-IP as "Service provider".
Type in the created hostname in the "Hostname" field.
Type in your No-IP account credentials as "Username" and "Password", and click "Save".
If everything is correct, DynDNS/DDNS settings will apply.
6. Go to SafeDNS Dashboard > Settings > Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
Once added, you will see it in the DynDNS section of the Dashboard.
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Configuring the filter using the DDclient.
In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic, you need to use third-party software - DDclient - on the PC connected to the network:
Set up DNS servers in your router:
2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Router Setup (IPv6)
The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 2001:67c:2778::3939 and 2001:67c:2778::3940
Go to the router’s settings page, click the "Advanced" tab, and choose IPv6 in the left menu. Choose "IPv6 setup" and type in SafeDNS IPv6 addresses.
Router with static IP address configuration
Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
We recommend to add the whole IPv6 router subnet - first 4 segments with /64 at the end. Example: 2600:1005:b062:61e4::/64 instead of 2600:1005:b062:61e4:1111:2222:3333:4444.
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Router with Dynamic IP address configuration
In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a Dynamic DNS service.
Most modern routers provide their own DynDNS services. We recommend using them.
Here's an example of the DynDNS menu on the TP-Link router with the TP-Link service provider:
You only need to create a DynDNS record in the router interface. Then skip to Step 6 below.
If your router does not have its own DynDNS service provider, we recommend using third-party NO-IP DynDNS.
1. In the router setting, go to DynDNS/DDNS settings.
2. Check the DynDNS service available for your router. If available, we recommend using the No-IP DynDNS service provider.
3. Go to the website noip.com and sign up.
4. In your No-IP account, create a hostname (any name you can think of).
5. Choose the IPv6 type and create the hostname. Make sure that the "IPv6 Address" field is containing your IPv6 address:
6. Go back to your router and configure DDNS/DynDNS
Select No-IP as "Service provider".
Type in the created hostname in the "Hostname" field.
Type in your No-IP account credentials as "Username" and "Password", and click "Save".
7. Go to SafeDNS Dashboard -> Settings -> Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
Once added, you will see it in the DynDNS section of the Dashboard.
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Configuring the filter using the DDclient
In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic, you need to use third-party software - DDclient - on the PC connected to the network:
1. Set up DNS servers in your router:
2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Keenetic Router Setup
SafeDNS service in Keenetic routers is implemented as an operating system component. You can add or remove this Internet Safety service from the system and turn it on or off completely, without affecting the parameters of the main Internet connection: SafeDNS will work behind any NAT and with a dynamic IP address.
It is not possible to run SafeDNS, Cloudflare DNS, and AdGuard DNS services at the same time. Only one of them can be used.
Before setting up the Internet safety service, register your home network devices according to the instruction Connected devices registration.
Setup
1. Select "SafeDNS" in the 'Service' field on the "Internet safety" page.
2. Enter your SafeDNS account's parameters by clicking "Log in" in the "SafeDNS account" section. If you do not have a SafeDNS account yet, click "Create account".
3. Enter your SafeDNS account e-mail/login and password.
4. Assign filtering policies in the "Assignment of protection policies to devices" section.
You can assign filtering policies to permanent home network devices (registered in Keenetic) and the default policy for all unregistered devices.
Your devices connected to the Keenetic router are now filtered with the assigned SafeDNS filtering policies.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Unifi/Ubiquiti Router Setup
How to set up SafeDNS on the Unifi – Ubiquiti environment.Start the Unifi Controller Application and wait for the load. Once it is loaded, start the browser.Open the Settings menu from the Dashboard:
Browse the Networks menu and select the option either Create New Network or Edit. It depends on the requirements, if you are creating a new setup, there might be no networks created – then you need to create a new network. If you are starting to use SafeDNS on the existing network – then select the Edit option:
The following configuration can be used as an example of your Local Network setup.
Set the following DHCP Name Server addresses: 195.46.39.39 and 195.46.39.40
After adding SafeDNS Name Servers, Press the Save button and wait for the provisioning process of the Unifi access points – it may take a while.
Router with Static IP address configuration
Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Router with Dynamic IP address configuration
In case you have a Dynamic IP address, you need to configure the DynDNS/DDNS on the router using a third-party Dynamic DNS service.
1. In the router setting, go to DynDNS/DDNS settings.
2. Check the DynDNS service available for your router. If available, we recommend using the No IP DynDNS service provider.
3. Go to the website noip.com and sign up.
4. In your No-IP account, create a hostname (any name you can think of).
5. Go back to your router and configure DDNS/DynDNS.
Select No-IP as "Service provider".
Type in the created hostname in the "Hostname" field.
Type in your No-IP account credentials as "Username" and "Password", and click "Save".
If everything is correct, DynDNS/DDNS settings will apply.
6. Go to SafeDNS Dashboard > Settings > Devices and copy your DynDNS hostname to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
Once added, you will see it in the DynDNS section of the Dashboard.
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Configuring the filter using the DDclient.
In rare cases when your router does not have a DynDNS/DDNS setting and your IP is Dynamic, you need to use third-party software - DDclient - on the PC connected to the network:
1. Set up DNS servers in your router:
2. Install DDclient on a PC connected to the network. Once DDclient is installed, all devices connected to the same network will be filtered by the same rules.Verizon Router Setup
The first step is to locate the network configuration on your router and set the SafeDNS server- 195.46.39.39 and 195.46.39.40To do that, click on the icon My Network and browse the Network Connection option:
My Network > Network Connections
Locate in the connection list the Broadband Connection with the status: Connected:
On the next screen locate the Settings button and press it:
Change the DNS server option by selecting the “Use the Following DNS Server Addresses”
Once the option is changed, the fields are activated where you can set the SafeDNS DNS servers:
195.46.39.39 and 195.46.39.40.
Mikrotik Router Setup
The first step is the same for both Static and Dynamic IP address configurations: change your router’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40To do that, open the configuration page of the Mikrotik router, and browse the following option:Menu > IP >DHCP Server > Networks
Select the “Network” used by the DHCP server and change/add the SafeDNS addresses - 195.46.39.39 and 195.46.39.40. Replace the DNS servers if there was configured any:
Router with Static IP address configuration
Go to SafeDNS Dashboard > Settings > Devices and copy your IP address to the "IP addresses / DynDNS" box, choose a policy, and click "Add".
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Router with Dynamic IP address configurationMikrotik Routers has the embedded feature of the Dynamic DNS setup named VPN Access.It can be activated easily from the router with no configuration needed on any DDNS service.
Open the main page of the router – the Quick Set Menu and scroll down to the VPN setup:
Activate the VPN access and set the VPN Password. Click the button Apply Configuration in order to save and activate the settings. Copy the VPN address to the clipboard.
Go to SafeDNS Dashboard > Settings > Devices paste the VPN address the "IP addresses / DynDNS" box, choose a policy, and click "Add".
Once added, you will see it in the DynDNS section of the Dashboard.
You have successfully configured your router.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.OpenWRT Router Setup
If you have static IP or use a DynDNS service you can set up SafeDNS on your OpenWRT router just like any other router using this guide.
Only OpenWRT versions 17 or lower are supported.
Setup DDNS client. Select in menu System > Software.
2. Click Update lists.
3. Type luci-app-ddns in Download and install package and click OK.
4. Click Status in the menu to refresh the menu. New item Services and subitem Dynamic DNS will appear in the menu.
5. Fill out the form on page Dynamic DNS:
In Custom update-URL insert - https://[USERNAME]:[PASSWORD]@www.safedns.com/nic/update?hostname=[DOMAIN]
In Hostname type any unique name for your router
In Username type login for SafeDNS site, in Password type password for SafeDNS site.
Click Save & Apply
6. Enable and start DDNS service.
7. Select in menu System > Startup
8. Click the Disabled button for ddns service, then click Start.
9. Check the string appearing in the system log (Status > System log):
user.notice ddns-scripts-myddns: Update successful
10. Navigate to Network > Interfaces, WAN.
11. In Use custom DNS servers add 195.46.39.39 and 195.46.39.40. Click Save & Apply.
After that, you can continue configuring your filtering options in the SafeDNS Dashboard.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DD-WRT Router Setup
If you have static IP or use a DynDNS service, you can set up SafeDNS on your DD-WRT router just like any other router using this guide.
Alternatively, you can configure the SafeDNS filter on a DD-WRT router using its native firmware:
1. Go to the “Setup” tab > “Basic setup” > find the section “Network Address Server Settings” and set 195.46.39.39 and 195.46.39.40 as DNS servers.
Select the "Forced DNS Redirection" to force all DNS requests from the network to use SafeDNS servers, even if the end device has custom DNS servers.
2. In the "WAN Setup" section check the "Ignore WAN DNS" option.
3. Go to the DDNS tab.4. Select Custom for DDNS Service type.5. Type in www.safedns.com in the DYNDNS Server field.6. Type in your login (email) from the SafeDNS account in the User Name field.7. Type in your password in the Password field.8. Type in any name (hostname) in the Host field.9. Type in /nic/update?hostname= in the URL field.10. Save and apply settings.
If all settings are correct, you will see the successful update of your address in the DDNS Status block.
After that, you can continue configuring your filtering options in the SafeDNS Dashboard.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Huawei iMaster NCE Campus Setup
Prerequisites
Sign up for a Reseller account by contacting the SafeDNS Sales team (sales@safedns.com).
Create a sub-account for each tenant or group of tenants, implementing the multi-tenant capability of SafeDNS.
Configure the filtering rules for each tenant.
Receive the public Subscription API key from the SafeDNS manager.To read more about API methods, please check the Subscription API documentation.
Setup
Connect a SafeDNS account to iMaster NCE controller
Navigate to System > System Settings > Third-Party Service > DNS Interconnection Parameters.
Fill information in the following fields:
DNS IP-Address Main: 195.46.39.39
DNS IP-Address Secondary: 195.46.39.40
Account: sub-account to connect to SafeDNS
Public key: public Subscription API key
Activate URL-Filtering
Select a site in iMaster NCE controller, on which you want to use URL Filtering
Navigate to Provision > Physical Network > Site Configuration.
Select a site from the site drop-down list in the upper left corner.
Navigate to the Site Configuration tab.
Navigate to AP > Advanced.
Enable DHCP.
Set DHCP server parameters.
Enable Third-party URL Filtering.
(Optional) Update TLS certificate
A SafeDNS certificate is used for unidirectional authentication between iMaster NCE-Campus and a third-party SafeDNS server.This operation is involved in URL filtering by SafeDNS.
By default, the SafeDNS certificate is preinstalled on iMaster NCE-Campus.
Contact SafeDNS if you need an updated certificate.
Log in to iMaster NCE Campus as the system administrator.
Navigate to System > System Management > Certificate Management.
Select Service Certificate Management
Select CampusCfgService_SafeDNS.
Click on the Trust Certificate tab.
Click Import.
Set Certificate Format to DER.
Select the certificate file and click Submit.
Wait for 2 minutes.
Restart the CampusCfgService service for the certificate to apply:
Log in to the management panel.
Navigate to Product > System Monitoring > Service tab.
Search for CampusCfgService.
Select the service.
Click Stop.
Click Start.
Log in to the iMaster NCE Campus and check whether the certificate file is successfully uploaded to the following path: /opt/oss/NCECAMPUS/apps/CampusCfgService/controller/configuration/safedns
Multi-policy filtering on OpenWRT
OpenWRT Filtering Module Setup
The SafeDNS module for OpenWRT routers allows setting up the filtering on any router that supports OpenWRT firmware. Every end device on the network can be assigned with individual filtering settings.
Only OpenWRT version 21, and versions 17 or lower are supported.
If you are installing version 21, make sure to read the Uninstallation notes at the bottom
OpenWRT versions 17 and lower
OpenWRT versions 17 and lower
To make sure that your router has OpenWRT firmware, check the list of compatible OpenWRT routers.
1. Log in to the web interface of the router as administrator.
2. Go to System > Software
3. Choose the Configuration tab
4. Comment or remove the line option check_signature 1 to disable packet signature verification.
5. Add line
src/gz safedns http://mirror.safedns.com/openwrt/17/ar71xx/generic/packages
to the field "Custom feeds", as shown in the screenshot, where "ar71xx" – is your router architecture type. If you have another architecture please change it to the correct one:
6. Go to the Actions tab and click "Update lists"
Wait for the update process to finish.
7. Find the "safedns" package in the filter and click "install"
8. Refresh the page after this.
9. Go to Services > SafeDNS
10. Enter your SafeDNS credentials and log in to get the list of available filtering policies. In the "Default profile" field choose the filtering policy which will be applied as a default for all of your devices connected to the router.
11. You can also set a specific filtering policy for any device. To do this, click Add, choose the device, and select the filtering policy. Save the settings.
After that, you can continue configuring your filtering options in the SafeDNS Dashboard.
OpenWRT version 21
1. Log in to the web interface of the router as administrator.
2. Go to System > Software
3. Press the Configure opkg... button
4. Comment or remove the line option check_signature 1 to disable packet signature verification.
5. Add line
src/gz safedns http://mirror.safedns.com/openwrt/21/YOUR_ROUTER_ARCHITECTURE/custom
to the field "Custom feeds", as shown in the screenshot, where "YOUR_ROUTER_ARCHITECTURE" – is your router architecture type. If you have another architecture please change it to the correct one:
6. Go to the previous menu and press "Update lists"
Wait for the update process to finish.
7. Find the "luci-compat" package in the filter and click "install"
8. Find the "luci-app-safedns" package in the filter and click "install"
Refresh the page.
9. Go to Services > SafeDNS
10. Enter your SafeDNS credentials and log in to get the list of available filtering policies. In the "Default profile" field choose the filtering policy which will be applied as a default for all of your devices connected to the router.
11. You can also set a specific filtering policy for any device. To do this, click Add, choose the device, and select the filtering policy. Save the settings.
After that, you can continue configuring your filtering options in the SafeDNS Dashboard.
Version 21 uninstallation notes
This version of the module contains a bug, that doesn't set the DNS server port to the default value. You need to do it manually, otherwise, the Internet connection will not work.
1. Navigate to Network > DHCP and DNS > Advanced settings.
2. Scroll down to the DNS server port field and delete the "0". Leave the field empty and press the "Save & Apply" button.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Compatible OpenWRT Routers
Brand
Model
Version
3Com
3CRWER100-75
4G Systems
AccessCube (MeshCube)
7Links
PX-4885
8devices
Carambola 2
8devices
Carambola 1
A-Link
RRAP
ADI Engineering
Pronghorn SBC250
ALFA Network
AP120c
ALFA Network
Hornet-UB / AP121 / AP121U
ALFA Network
AP121
ALFA Network
N2
ALFA Network
N5
ALFA Network
W502U / R36
ALFA Network
AP96
ARC Flex
FreeStation 5
v1
Abicom International
Freedom CPE
Rev 05
Abicom International
Scorpion450
Rev 02
Accton
WR6202
Accton
MR320
1A
Actiontec
GT701
C, D
Actiontec
GT704WG
1A
Actiontec
MI424WR
A
Actiontec
MI424WR
C
Actiontec
MI424WR
D
Actiontec
GT784WNV
5A
Agestar
NSB3AS
Airlink
101AR670W
Airlink
101AR725W
Airlink
101AR430W
Alcatel-Sbell
RG100A-AA
Rev 0
Allnet
ALL0258N
Allnet
ALL0305
Allnet
ALL0256N
Allnet
ALL0239-3G
Allnet
ALL5003
Allnet
ALL0277
Allnet
ALL0258
Allnet
ALL5002
Allnet
ALL0315N
Alpha Networks
ASL-26555
Arcadyan / Astoria
ARV452CPW
Arcadyan / Astoria
ARV752DPW22 EasyBox 803A
Arcadyan / Astoria
ARV4518PWR
1
Arcadyan / Astoria
ARV4518PW
R01A
Arcadyan / Astoria
ARV4525PW
Arcadyan / Astoria
ARV7510PW22
Arcadyan / Astoria
ARV7518PW
Arcadyan / Astoria
ARV7519RW22 Livebox 2.1
Arcadyan / Astoria
VGV7510KW22 o2 Box 6431
Arcadyan / Astoria
ARV7510PW
Arduino.cc
Yun
Arduino.cc
Tian
Asia
RFAWM003
Asia
RFAWM002
Asmax
AR 1004g
1
Asus
RT-N12
B1
Asus
RT-N13U
1
Asus
RT-N15U
Asus
RT-N16
Asus
RT-N56U
v1
Asus
RT-N66U
B1, B2
Asus
WL-320gP
Asus
WL-500g Premium
v1
Asus
WL-500g Premium
v2
Asus
WL-550gE
Asus
RT-N10
1
Asus
RT-N13U B1
1
Asus
RT-N15
Asus
RT-G32
B1
Asus
RT-G32
C1
Asus
WL-HDD2.5
Asus
RT-N10+
1
Asus
RT-N12
D1
Asus
WL-500b
v1
Asus
RT-N14U
1
Asus
WL-330gE
Asus
WL-520gU
Asus
WL-600g
Asus
WL-500W
Asus
WL-500g Deluxe
Asus
WL-500g
Asus
RT-N10+D1
1
Asus
WL-320gE
Atmel
ATNGW100
Aztech
HW550-3G
BT
Home Hub 5
Type A
BT
Home Hub 2
Type A
BT
Home Hub 2
Type B
Barix
Barionet 1000
1
Belkin
F7C027
Belkin
F9K1115 v2 (AC 1750 DB)
v2
Belkin
F5D8235-4
v2
Belkin
F5D8235-4
v1
Buffalo
WZR-300HP
A0A3, B0A0, B0A1
Buffalo
WBMR-HP-G300H
Buffalo
WHR-G300N
v2
Buffalo
WHR-HP-GN
v1
Buffalo
WLAE-AG300N
v1
Buffalo
WLI-TX4-AG300N
v1
Buffalo
WZR-HP-AG300H
v1
Buffalo
WZR-HP-G300NH
v1
Buffalo
WZR-HP-G300NH2
A0A0, A0A1, A1A0, C1A0
Buffalo
WZR-1750DHP(D)
Buffalo
WZR-600DHP2
Buffalo
WZR-600DHP
Buffalo
WHR-G301N
v1
Buffalo
WBMR-G54
Buffalo
WLI-TX4-G54HP
Buffalo
WZR-HP-G450H
v1
Buffalo
WHR-HP-G300N
v1
Buffalo
WHR-HP-G54
Buffalo
WHR-G54S
v1, v2
Buffalo
WHR-G125
Buffalo
WMR-300
COMFAST
CF-E316N
v2
COMFAST
CF-WR800N
v1
Cisco
VEN401
Cobalt Networks
Qube 2
Cobalt Networks
Raq 2
Compex
WP54
6E
Compex
WP54g
6E
Compex
WP543
6.00E+03
Compex
WPJ558
6A06
Compex
WPJ344
6A06
Compex
WPJ531
7A03
Compex
WPE72NX
7A07
Compex
WPJ72Z
7B06
Compex
WP546HV
6B08
Compex
WP543AHV
6.00E+03
Compex
MMC543HV
6.00E+03
Compex
MMC543AHV
6.00E+03
Compex
WPJ342
7A05
Compex
WPE727A07
Comtrend
CT-5621
Comtrend
VR-3025un
Comtrend
AR-5387un
Comtrend
HG-536+
Comtrend
CT-5361
Comtrend
CT-536+
Comtrend
CT-6373
Comtrend
AR-5381u
Comtrend
VR-3025u
Comtrend
WAP-5813n
Comtrend
CT-5365
Creator
Ci40 (Marduk)
02KZ/5+
D-Link
DSL-524T
A1 (EU)
D-Link
DSL-584T
A1 (EU)
D-Link
DSL-2650U/BRU/D
D1, D2 (RU)
D-Link
DSL-2740B/1B
C2
D-Link
DSL-2740B/1B
C3
D-Link
DSL-G684T
A1 (EU)
D-Link
DVA-G3810BN/TL
A1
D-Link
DIR-615
H1
D-Link
DAP-1350
A1
D-Link
DIR-300
A1
D-Link
DIR-505
A1, A2
D-Link
DSL-2750B
D1
D-Link
DIR-615
I3
D-Link
DIR-615
I1
D-Link
DIR-615
C1, C2
D-Link
DSL-2740B/1B
F1
D-Link
DIR-320
B1
D-Link
DIR-615
D1
D-Link
DSL-G624T
A1 (EU)
D-Link
DIR-300
B1, B2, B3
D-Link
DIR-300
B5, B6, B7
D-Link
DIR-601
A1
D-Link
DIR-835
A1
D-Link
DCS-930L/DCS-932L
B1
D-Link
DGL-5500
rev A1
D-Link
DIR-601
B1
D-Link
DIR-615
E2, E3
D-Link
DIR-320
A1
D-Link
DIR-860L
B1
D-Link
DIR-600
A1
D-Link
DIR-600
B1
D-Link
DIR-600
B2
D-Link
DIR-615
D3, D4
D-Link
DWL-2100AP
A2
D-Link
DIR-615
E1
D-Link
DIR-885L
A1
D-Link
DIR-810L
B1
D-Link
DIR-645
A1
D-Link
DIR-825
B1, B2
D-Link
DIR-825
C1
D-Link
DIR-615
E4
D-Link
DNS-120
A2
D-Link
DSL-2640U
B2
D-Link
DIR-620
D1
D-Link
DSL-504T
C3
D-Link
DIR-620
A1
D-Link
DSL-2740U
C2
D-Link
DIR-320
A2
D-Link
2750B
T1
D-Link
DIR-600
B5E
D-Link
DSL-2640B
B2
Davolink
DV-201AMR
Devolo
dlan pro wireless 500 plus
Devolo
dLAN pro 1200+ WiFi ac
Dovado
Tiny AC
Dragino
MS12
EasyLink
M-150
EasyLink
M-mini
Edimax
BR-6104K / BR-6104KP
A
Edimax
BR-6475nD
A
Edimax
PS-1208MFg
Embedded Wireless
Dorin Platform
Rev 1.2
EnGenius
ESR6650
EnGenius
ECB1750
v1
EnGenius
ESR1750
v1.1.0
EnGenius
ESR-9753
EnGenius
EPG5000
v1.0.0
Evaluation boards / unbranded boards
A5-V11
Evaluation boards / unbranded boards
XDX-RN502J
Evaluation boards / unbranded boards
Atheros PB44
Fon
Fonera+
FON2201
Fon
Fonera 2.0n
FON2303A
Fon
Fonera 2.0g
FON2202
Fon
La Fonera
FON2100, FON2200
Freecom
FSG-3
GL.iNet
AR300
v3
GL.iNet
AR150
GL.iNet
6408A
v1.0
GL.iNet
GL-MT750
GL.iNet
GL-MT300A
v1.3
GL.iNet
GL-MT300N
V1
GL.iNet
6416A
v1.0
GL.iNet
GL-M9331 Core (Domino Core)
Gainstrong
MiniBox
v1.0
Gainstrong
Oolite
v1.0
Gateway
7001
a+g
Gateway
7001
g
Gateway
Micro Server
QXXXX
Gateworks
Avila GW2342
Gateworks
Avila GW2348-2
Gateworks
Avila GW2348-4
Gateworks
Avila GW2355
Gateworks
Avila GW2357
Gateworks
Cambria GW2350
Gateworks
Cambria GW2358-4
Gateworks
Laguna GW2380
Gateworks
Laguna GW2382
Gateworks
Laguna GW2387
Gateworks
Laguna GW2388
Gateworks
Laguna GW2391
Gateworks
Ventana GW5100
Gateworks
Ventana GW5200
Gateworks
Ventana GW5220
Gateworks
Ventana GW5300
Gateworks
Ventana GW5310
Gateworks
Ventana GW5400
Gateworks
Ventana GW5410
Gateworks
Ventana GW5510
Gateworks
Ventana GW5520
Gateworks
Avila GW2347
HAME
MPR-A2
v1
HAME
MPR-A1
Hi-Link
HLK-RM04
v1
Hi-Link
HLK-RM04
v2
HiWiFi
HC6361
HiWiFi/Gee
HC5861
HiWiFi/Gee
HC5761
HiWiFi/Gee
HC5661
HooToo
HT-TM02 (TripMate Nano)
v1.5
HooToo
HT-TM01 (TripMate)
HooToo
HT-TM04 (TripMate Elite)
Huawei
HG622
Huawei
HG655d
Huawei
HG520v
Huawei
HG553
Huawei
HG556a
A, B
Huawei
HG556a
C
Huawei
HG655b
Intellidesign
Hyrax PCP-100
A
Iomega
iConnect
JCG
JHR-N825R
JCG
JHR-N805R
JCG
JHR-N926R
Kingston
MLW221
Kingston
MLWG2
Lemaker
Banana Pro
Lenovo
Y1
v1
Lenovo
Y1S
v1
Linksprite
pcDuino V3
Linksys
E1000
2.0, 2.1
Linksys
EA3500
Linksys
EA6300
v1
Linksys
WAG354G
Linksys
WAG354G
v2
Linksys
WRT54GS
1.0, 1.1, 2.0
Linksys
WRT320N
v1
Linksys
WRT400N
1
Linksys
WRT600N
1.1
Linksys
WRT1900AC
v2 (cobra)
Linksys
WRTU54G-TM
Linksys
AG241
v1
Linksys
AG241
v2
Linksys
AG241
v2b
Linksys
E3000
1
Linksys
E3200
1
Linksys
WRT160NL
1.0 (CUR01), 1.6 (CUR06)
Linksys
WRT1200AC
v1 (caiman), v2 (caiman)
Linksys
WRT1900AC
v1 (mamba)
Linksys
E1700
Linksys
E1000
1
Linksys
E2000
1
Linksys
E4200
1
Linksys
E4200
v2
Linksys
E900
1
Linksys
EA4500
v1
Linksys
NSLU2
Linksys
WAG54G
v1.1
Linksys
WRT150N
v1
Linksys
WRT310N
v2
Linksys
WRT350N v2
2.0, 2.1
Linksys
WRT54G
2.0, 2.2, 3.0
Linksys
WRT54G-TM
1
Linksys
WRT54G3GV2(-VF)
1
Linksys
WRT54G
1
Linksys
WRT54G
1.1
Linksys
WRT610N
2
Linksys
WRT610N
v1.0
Linksys
WRT54G
3.1
Linksys
WAG54G
v2
Linksys
WAG54G
v3
Linksys
E1200
v2
Linksys
WRTSL54GS
1.0, 1.1
Linksys
WRT54G
4
Linksys
WRT54GL
1.0, 1.1
Linksys
WRT54GS
3
Linksys
WRT1900ACS
v1 (shelby), v2 (shelby)
Linksys
E2500
v1
MQMakerWiTi Board
v2.0
MeLE
M9
MediaTek
LinkIt Smart 7688
Medion
MD86587
v1
Meraki
Z1
Meraki
Mini
Meraki
MR16
Meraki
MR12
Meraki
MR24
Meraki
MX60
Meraki
MX60W
Mercury
MW4530R
v1
Mercury
MW150R
v8
MikroTik
RB951G-2HnD
MikroTik
RB750GL
MikroTik
RB750UP
MikroTik
RB493G
MikroTik
RB450G
MikroTik
RB435G
MikroTik
RB450
MikroTik
RB532
MikroTik
RB411
MikroTik
RB411AH
MikroTik
RB411U
MikroTik
RB433
MikroTik
RB433AH
MikroTik
RB493
MikroTik
RB532A
MikroTik
RB951Ui-2HnD
MikroTik
RB433UAH
MikroTik
RB411UAHR
MikroTik
RB750Gr3
Multilaser
RE027
v1
NetComm
NB6 RTA1320
Rev1
NetComm
NB6PLUS4W
Rev1
Netgear
DG834G
v3
Netgear
DG834G
v4
Netgear
DG834GT
Netgear
DGN3500
Netgear
DGN3500B
Netgear
DGND3700
v1
Netgear
EX2700
Netgear
R6100
Netgear
R7000
Netgear
R7500
Netgear
WAG302
v1
Netgear
WG302
v1
Netgear
WG302
v2
Netgear
WNDAP360
1
Netgear
WNDR3400
v1
Netgear
WNDR3400
v2
Netgear
WNDR3700
v3
Netgear
WNR854T
Netgear
WNR2200
v3
Netgear
WNR3500L
v1
Netgear
WPN824N
Netgear
R6250
Netgear
R8000
Netgear
D7800
Netgear
DG834G
v1, v2
Netgear
DGND3800B
Netgear
R6300
v2
Netgear
WNDR3300
v1
Netgear
WNDR37AV
v1
Netgear
WNCE2001
Netgear
WNDR3400
v3
Netgear
WNDR3700
v4
Netgear
WNDR4000
Netgear
WNDR4300
v1
Netgear
WNR834B
v2
Netgear
WNR1000
v3
Netgear
WNR2000
v1
Netgear
WNR2000
v3
Netgear
WNR2000
v4
Netgear
WNDR3700
v2
Netgear
DGN2200
v1
Netgear
WGT634U
Netgear
WNR2000
v2
Netgear
WNDR3800
v1
Netgear
WNR612
v2
Netgear
WNDR3700
v1
Netgear
WAG302
v2
Netgear
WNR1000
v2
Netgear
WPN824N NA
Netgear
R7900
Netgear
WNDR3800
1CHNAS
Netgear
DM200
v1
Netis
WF-2881
Netis
M1200AC
Nexx
WT1520
Nexx
WT3020A
Nexx
WT3020AD
Nexx
WT3020F
Nexx
WT3020H
NuCom
R5010UN
v2
OMYlink
OMY-G1
OlimexOlimex A20-OLinuXino-MICRO
Olimex
iMX233-OLinuXino-MINI-WiFi
Olimex
iMX233-OLinuXino-MINI
Olimex
iMX233-OLinuXino-NANO
Olimex
iMX233-OLinuXino-MICRO
Olimex
iMX233-OLinuXino-MAXI
Olimex
Olimex A13-OLinuXino-WIFI
Olimex
Olimex A10-OLinuXino-LIME
Olimex
RT5350F-OLinuXino-EVB
Rev. A
Olimex
A20-OLinuXino-LIME
On Networks
N150R
Open-Mesh
MR900
v1
Open-Mesh
OM2P
OpenEmbed
SOM9331
v1
Option
Globesurfer III
PC Engines
ALIX 2d2
PC Engines
ALIX 2d5
PC Engines
ALIX 2d13
PC Engines
ALIX 3d1
PC Engines
ALIX 3d2
PC Engines
ALIX 3d3
PC Engines
ALIX 6f2
PC Engines
WRAP
PC Engines
ALIX 1c
PC Engines
ALIX 1d
PC Engines
ALIX 2d0
PC Engines
ALIX 2d1
PC Engines
ALIX 2d3
PC Engines
ALIX 2d4
Pacific Networks
RT150M
v1
Petatel
PSR-680W
Pirelli
AliceGate AGPF
Pirelli
FastWeb DRG A226M
Planex
MZK-W300NH
Planex
MZK-W04NU
Planex
DB-WRT01
Pogoplug
Pogoplug V2
POGO-E02
Pogoplug
Pogoplug Mobile
POGO-V4-A1-01
Pogoplug
Pogoplug V4
POGO-V4-A3-01
Poray
Poray PRP-X5/X6
QEMU (i386)
qemu-system-i386
0.12.5
QEMU (malta)
qemu-system-mips(el)
0.12.5
QEMU (realview)
qemu-system-arm
0.12.5
QEMU (x86_64)
qemu-system-x86_64
>2.0
Qi hardware
Ben.Nanonote
Qihoo hardware
C301
Raspberry Pi Foundation
Raspberry Pi
B+
Raspberry Pi Foundation
Raspberry Pi
A
Raspberry Pi Foundation
Raspberry Pi
B
Raspberry Pi Foundation
Raspberry Pi 2
B
RavPower
RP-WD02
Redwave
RW2458N / AeroMAX 5
Rosewill
RNX-N150RT
Rosewill
RNX-N300RT
Rosewill
RNX-N360RT
SFR (Société Française de Radiotéléphonie)
Neufbox4 (NB4)
SFR (Société Française de Radiotéléphonie)
Neufbox6 (NB6)
SMC
SMCWBR11S-3GN
SMC
SMC7908ISP-A
STORYLiNK
SAP-G3200U3
Sagem
F@ST2604
Sagem
F@ST2704
V2
Sagem
F@ST2404
Sagem
F@ST2504n
v.6
Seagate
DockStar
Seagate
NasRaq
Sercomm
IP1006RR
v2
SimpleTech
SimpleShare
Sitecom
WL-341
v3 001
Sitecom
WL-351
v1 002
Skyline
SL-R7205
SolidRun
ClearFog Prov
2.1
Sparklan
WCR-150GN
Synopsys
AXS101 Software Development Platform
1.1
Synopsys
AXS103 Software Development Platform
1.1
T-Com / Telekom
Speedport W 303V Typ B
T-Com / Telekom
Speedport W 701V
T-Com / Telekom
Speedport W 500V
TP-Link
TL-WDR4900
2.0 (CN)
TP-Link
TL-WDR3320
2
TP-Link
TL-CPE210
v1
TP-Link
TL-WA801ND
v2
TP-Link
TL-WA830RE
v1
TP-Link
TL-WA830RE
v2
TP-Link
TL-WA850RE
v1
TP-Link
TL-WA860RE
v1 (EU)
TP-Link
TL-WR703N
v1
TP-Link
TL-MR10U
v1
TP-Link
TL-MR12U
1
TP-Link
TL-WR710N
1.1 (EU)
TP-Link
TL-MR3220
V2
TP-Link
TL-MR11U
1
TP-Link
TL-MR13U
1
TP-Link
TL-WR740N
v4.20, v4.21, v4.22, v4.25, v4.26, v4.27, v4.28
TP-Link
TL-WR743ND
2
TP-Link
TL-WR941ND
v5
TP-Link
TL-WR1041N
v2
TP-Link
TL-WR1043ND
v3.x
TP-Link
TL-MR3420
v1, v1.1, v1.2, v1.3
TP-Link
TL-WR841N(D)
v10
TP-Link
TL-WR841N(D)
5
TP-Link
TL-WR720N
v4 (CN)
TP-Link
TL-WR841N(D
)7
TP-Link
TL-WR841N(D)
8
TP-Link
TL-WR841N(D)
9
TP-Link
TL-WR841N(D)
1, 1.5
TP-Link
TL-WA901ND
v1
TP-Link
TL-WA901ND
v2
TP-Link
TL-WA901ND
v3
TP-Link
TL-WA750RE
v1
TP-Link
TL-WDR3500
1
TP-Link
Archer C50
v1
TP-Link
TL-WR743ND
1, 1.1
TP-Link
TL-MR3220
1
TP-Link
TL-WA701ND
v1-v1.1
TP-Link
TL-MR3020
v1
TP-Link
TD-W8970
v1, v1.2
TP-Link
TL-WR720N
v3 (CN)14.07tl-wr720n
TP-Link
TL-WR710N
2.0 (EU)
TP-Link
TL-WA701ND
2
TP-Link
TL-MR3040
v1
TP-Link
TL-CPE510
v1
TP-Link
TL-WR710N
1.2 (EU)
TP-Link
TL-WR710N
2.1 (EU)
TP-Link
TL-WR1043ND
v1.x
TP-Link
TL-WR1041ND
v2
TP-Link
TD-W8960N
v1
TP-Link
TL-WR940N
1
TP-Link
TL-WDR4300
1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7
TP-Link
TL-WDR4900
1.0, 1.3
TP-Link
TL-MR3040
v2
TP-Link
TL-WDR4310
1
TP-Link
TL-WDR6500
v2
TP-Link
TL-MR3420
v2, v2.1, v2.2, v2.3, v2.4
TP-Link
TL-WR941ND
v6
TP-Link
TL-WR740N
v5 (EU)
TP-Link
TL-WR841N(D)
3
TP-Link
TL-WA730RE
v1
TP-Link
TL-WR741ND
1, 1.8
TP-Link
TL-WR741ND
v5
TP-Link
TL-WR1043ND
v2.x
TP-Link
TL-WA5210G
v1
TP-Link
TL-WA7510N
v1
TP-Link
TL-WR2543ND
v1.0
TP-Link
TL-WR841N(D)
v11
TP-Link
TL-WR741ND
v4.x
TP-Link
TL-WR740N
v6
TP-Link
TL-WR810N
1.1 (EU)
TP-Link
TL-WR810N
1.0 (US)
TP-Link
TD-W8968
v3
TP-Link
Archer C7R WDR7500
3.0 (CN)
TP-Link
TL-WR710N
1.0 (US)
TP-Link
TL-WR740N
v4.23, v4.24
TP-Link
TL-WR740N
1
TP-Link
TL-WR740N
v3
TP-Link
TL-WR842ND
v2
TP-Link
TL-WR842ND
v1
TP-Link
TL-WR941ND
v3.2
TP-Link
TL-WR941ND
v2
TP-Link
TL-WR941ND
v3
TP-Link
TL-WR941ND
v4
TP-Link
Archer C20i AC750
v1
TP-Link
Archer C5 AC1200
1.2
TP-Link
Archer C7 AC1750
1.0, 1.1
TP-Link
Archer C7 AC1750
2
TP-Link
TL-WR740N
2.1(BR)
TP-Link
TL-WDR3600
1.1, 1.2, 1.3, 1.4, 1.5
TP-Link
Archer C20
v1
Telsey
Alice W-Gate
Telsey
CPVA502+
Telsey
CPVA502+W
Telsey
CPA-ZNTE60T
Teltonika
RUT5XX
Teltonika
RUT500
Tenda
W306R
v2.0
Trendnet
TEW-712BR
1
Trendnet
TEW-691GR
1.0R
Trendnet
TEW-673GRU
1.0R
Trendnet
TEW-823DRU
v1.0R
Trendnet
TEW-692GR
1.0R
Trendnet
TEW-732BR
1.0R
Trendnet
TEW-652BRP
1.0R, 1.1R
Trendnet
TEW-632BRP
1.0R, 1.1R
Turris CZ.NIC
Turris
Omnia
US Robotics
USR9108
A
Ubiquiti
AirGrid M5
Ubiquiti
AirRouter
Ubiquiti
Bullet M
Ubiquiti
EdgeRouter Lite
Ubiquiti
LiteStation 2
Ubiquiti
NanoStation 5
Ubiquiti
NanoStation Loco5
Ubiquiti
NanoStation Loco M2
Ubiquiti
PicoStation 2
Ubiquiti
RouterStation
Ubiquiti
RouterStation Pro
Ubiquiti
UniFi APi
Ubiquiti
NanoStation Loco2
Ubiquiti
NanoStation M5 xw
Ubiquiti
NanoStation M5 xm
Ubiquiti
AirGateway
Ubiquiti
AirGrid M2
Ubiquiti
PicoStation 5
Ubiquiti
LiteStation 5
Ubiquiti
NanoStation M2
Ubiquiti
NanoStation 2
Ubiquiti
PicoStation M2HP
Upvel
UR-336UN
VMware
VMware x86 virtual machine
2015 latest
WIZnet
WizFi630A
WRTnode
WRTnode
1
Wallys
DR344-NAS27
Western Digital
My Net Wi-Fi Range Extender
Western Digital
My Net N600
Western Digital
My Net N750
Widemac
SL-R7205
Xiaomi
MiWiFi Mini
R1CM
Xiaomi
MiWiFi Nano
ZBT
WR8305RT
ZBT
WA-05
ZBT
WG3526
ZBT
WE526 (WE1626)
ZBT
WG2626
3
ZLMnet
F8
v1.3
ZTE
ZXDSL 531B(II)
ZTE
ZXHN H108N
v1
Zcomax
ZCN-1523H-2-8
H/W:0.4
Zcomax
ZCN-1523H-5-16
H/W:0.2
ZyXEL
NBG-419N
1
ZyXEL
NBG6616
A00
ZyXEL
P-2812HNU-F1
ZyXEL
WAP3205
v11
ZyXEL
NBG6716
A01
ZyXEL
P-2812HNU-F3
ZyXEL
P-870HW-51a
v2
ZyXEL
Keenetic
v1
ZyXEL
NSA310
1b
jjPlus
JA76PF2
unbranded
VoCore
v1.0
Windows OS
SafeDNS Agent for Windows Setup
Video tutorial #1: SafeDNS Agent Installation
Video tutorial #2: SafeDNS Agent Settings and Features
What is Agent created for
The Agent software is designed to automatically launch and manage the SafeDNS web filtering service on Windows-based computers. The Agent should be installed on the PC when you have a private (local) or a dynamic public address, or you want to have a separate web filtering policy for each Windows-based computer within your network.
Attention! If you want to configure the SafeDNS web filtering service for the entire network, you can find information about the available settings in the Instructions section of our website.
Agent Installation
Log into your SafeDNS account using your email/login and password.If you have already downloaded the Agent, skip to Step 3.
Navigate to Help > Tools and click on the "Download Agent" button under "Agent for Windows".
Make sure your current Windows user account has Administrator rights. Run the SafeDNS-Agent-Setup.exe file and install the Agent on your computer following the program prompts.If you see a Windows SmartScreen alert, click More options > Run anyway to start the installation.
After the successful installation, the Agent will be launched automatically.
Agent Unattended Installation
You can install the Agent in an unattended automatic way. This allows you to automatically install and launch the service, manage the filtering policies and collect web traffic statistics on several individual computers within your network. Learn how to install the Agent in unattended mode.
Getting Started with Agent
Log in to the Agent using your SafeDNS email/login and password.If you forgot your password, click "Forgot my password".
After successful login, the Home page of the program will be shown.This page contains:
Current status of the filtering service in the center.
Active filtering policy at the top.
On/Off filtering slider button at the bottom.
You can temporarily shut down the filtering by clicking on the slider button at the bottom of the window. You will be asked for a password if the settings are password protected.
Content Filtering Settings
To set up your filtering rules go to the Content filtering settings section.
Please note that settings take 5-7 minutes to apply.In some cases, you will need to clear the cache of your browser.
If you have more than one filtering policy, you can select the needed one at the top of the window (paid plans only). Click on the Plus button to proceed to the Policy section where you can create a new policy.
In the Categories tab, you can see a full list of content categories of your current filtering policy. In this tab, you can block or allow any of them. The red cross indicates blocked categories and the green checkmark indicates allowed categories. You can also block or allow an entire group of categories by clicking on the group name. The gray cross near a group name means that some categories are blocked and some of them are allowed.
In the Exceptions tab, you can create Allow/Denylists for individual websites (domains). Domains in Denylist will always be blocked even if the category of these domains is allowed. Domains in Allowlist will always be accessible even if the category of these domains is blocked.To block a group of subdomains, add the main domain (e.g. google.com) to the Denylist and all subdomains on this domain will be blocked (drive.google.com, translate.google.com, photos.google.com, etc).
You can also create Named Allow/Denylists and apply them to one or several different policies (this option is available in Dashboard only). Learn more about how to create named lists.
For the correct performance of your Internet Service Provider’s local resources such as media archives, online TV services, or your company’s local resources such as file share servers, printers, etc., add a local domain and IP address of this domain in the Aliases tab.
You can manage additional settings such as Force Safe Search, Force Restricted Mode for YouTube, and Use the Allowlist only in the Additional settings tab.
All domains which are not added to the Allowlist will be blocked when Use the Allow List only option is active.
Creating Additional Filtering Policies
The Default filtering policy cannot be deleted.You can also create additional policies (paid plans only) and use them to apply different filtering policies for:
a different user accounts on the same PC,
different PCs with the SafeDNS Agent installed.
To create a new filtering policy follow these steps:1. Go to the Policy Section on the Settings page.
2. Type the name of the new policy in the Create policy field. After that, click the Plus button on the right to create a policy.
Now you can change settings for a new filtering policy in Settings > Content filtering. You can use the Cogwheel icon near the policy’s name, to open the Content filtering settings of this policy.
To delete a policy, press the Cross icon near the policy’s name.
You can set up one of your policies as active in the Active policies dropdown menu.
Binding Local Users to the Filtering Policies
If you have several filtering policies, you can bind local users on your PC to these policies. The selected policy will be applied to the selected Windows user after they log into the system.
To bind a user to a filtering policy, go to the Local user tab in the Policy section. Check the Bind local users to the policies box to activate binding.
Choose the necessary Windows user in the User dropdown menu. Then select the preferred policy from the Policy dropdown menu and press the Plus icon.
To unbind a Windows user from a policy, press the Cross icon near the user’s name.
To turn off local users’ binding, uncheck the Bind, local users, to the policies box.
Filtering Schedule
Additional policies can be used for a filtering Schedule. It allows you to apply different settings or limit web access at certain time periods in a single day. Schedule configuration is available in the Dashboard on the SafeDNS website only. Learn how to set up a filtering schedule.
Password Protection
Actions such as changing settings, Agent uninstall, filtering suspension, and policy changing, are by default protected by your password.
Password protection can be deactivated in Settings > Common settings. To turn off password protection, uncheck Protect settings with the password box. We recommend it only if you're the sole user of your computer. You can also manage additional settings, such as show agent icon in the system tray, and Automatically check for updates.
Agent's Tray Icon Options
You can use Agent’s tray icon to stop filtering or change the active policy.Right-click on it and choose the necessary action.
You can temporarily switch the filtering off for 10 minutes, 30 minutes, 1 hour, and until start or reboot.
You can also change the active filtering policy from the tray icon.
If your settings are password-protected, you will be asked to enter the password.
To hide Agent's icon in the system tray uncheck the Show Agent icon in the system tray box in Settings > Common settings.
If You Have Issues
If you have issues with the SafeDNS service or the Agent, feel free to contact our technical support. You can find our contacts on the Help page in the Agent. The Get support button will redirect you to the support form on the SafeDNS website. The Check for updates button allows you to automatically download the most recent version of the SafeDNS Agent.
If SafeDNS Support asks you to send a system report, you can get it in the Agent. To get the report click the System information button on the Help page. This operation can take a few minutes. After that, copy the report and send it to the Support team via the feedback form.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.SafeDNS Agent for Windows Setup (beta)
What is Agent created for
The Agent software is designed to automatically launch and manage the SafeDNS web filtering service on Windows-based computers. The Agent should be installed on the PC when you have a private (local) or a dynamic public address, or you want to have a separate web filtering policy for each Windows-based computer within your network.
Attention! If you want to configure the SafeDNS web filtering service for the entire network, you can find information about the available settings in the Instructions section of our website.
Agent Installation
Log into your SafeDNS account using your email/login and password.If you have already downloaded the Agent, skip to "Getting Started with Agent".
Navigate to Main, scroll down, and click the "beta release" button under "Windows".
Make sure your current Windows user account has Administrator rights. Run the SafeDNS-Agent-Setup.exe file and install the Agent on your computer.
You will see the warning about SafeDNS Certificate installation, please click Next.
Agent Unattended Installation
You can install the Agent in an unattended automatic way. This allows you to automatically install and launch the service, manage the filtering policies, and collect web traffic statistics on several individual computers within your network. Learn how to install the Agent in unattended mode.
Getting Started with Agent
1. Log in to the Agent using your SafeDNS email/login and password.If you forgot your password, click this link to reset your password: https://www.safedns.com/auth/forgot
2. Set up the security PIN that will be used later to restrict access to the Agent.
3. Enter the PIN once again to sign in to the Agent.
Agent overview
1. In the main window of the Agent you can view your account information, current IP address, your Billing Plan, and the Subscription expiration date.All filtering rules changes can be made in the SafeDNS Dashboard.
Use the Policy menu to view and change the current filtering Policy.
Filtering can be stopped in Agent using the "Filtering enabled" button at the right top corner of the app.
Please note that settings take 5-7 minutes to apply.In some cases, you will need to clear the cache of your browser.
2. The system information menu shows brief information about the Agent, current filtering policies, and network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button.
3. The Debug menu displays the results of the diagnostic commands required for troubleshooting. To send the debug information to SafeDNS, click the "Send report" button.
Additional settings
To ensure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll to the bottom.
If you see the record with the Device name and your IP address, it means that the filtering is working.
After that, you can adjust the filtering Policy according to your needs. You can select categories to block in the SafeDNS Dashboard under the Categories tab.
Don't forget to click the "Save changes" button.
The setup is finished!A blocked website will display an error message that the Access is closed.
If the filtering doesn't work according to your policy settings, clear the cache of your browser using this guide.
Please note, that settings take 5-7 minutes to applyStats and filtering status update hourly
Uninstallation
To uninstall the Agent please quit it first.
Then click Start, type Control Panel, and open it.
Select Category in View by dropdown menu.
All settings in the Control Panel will be divided into categories. Click Uninstall a program.
Find SafeDNS Agent in the list of all programs, click it once, and click Uninstall
Click Yes in appeared window of deletion confirmation
If the User Account Control window appears and asks "Do you want to allow this app to make changes to your device?', then click Yes
Click OK and the SafeDNS agent will be successfully uninstalled. Windows Filtering Setup via OpenVPN
Please note, that this filtering option works via the third-party app OpenVPN. If you encounter any issues, please contact our Technical Support.
1. Open the SafeDNS Dashboard and navigate to Settings > Devices.
2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add.
Choose a filtering policy before adding a VPN connection, if needed.
3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon.
Multiple devices can use the same filtering policy, but each device should use its own VPN certificate.
You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy.
4. Download OpenVPN.
5. Install OpenVPN from the downloaded file.
6. Follow the on-screen instructions to finish the installation process.
7. Dismiss the warning window if it appears.
8. Import the Certificate to the OpenVPN application by right-clicking on the application in the System Tray, then Import > Import file.
Alternatively, you can copy/move the Certificate into the folderC:\Program Files\OpenVPN\config.
The Certificate has the following name format: safedns-123456.ovpn
9. Start the OpenVPN app by double-clicking on its icon in the system tray, or from the Start menu.
OpenVPN icon in the system tray
10. Wait until the VPN connection is established.
Your Windows device is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 11 DNS Setup
Step-by-step guide
1. From the Taskbar panel, right-click on the Wi-Fi (or LAN) icon and select Network and Internet settings:
2. Select Advanced network settings.
3. Scroll down and select More network adapter options
4. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes.
5. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select Internet Protocol Version 4, and click on Properties.
5. Select the option Use the following DNS server addresses, and enter the following SafeDNS addresses:
Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40
6. Click the OK button to save your settings, and Close the network properties window.
7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP-address or DynDNS" box. Click "Add".
You have successfully configured the SafeDNS for Windows 11.
Troubleshooting
Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean it using the following steps:
1. Press "Start"
2. Search for "cmd" and open the suggested application
3. Enter and run the following command in the opened window ipconfig /flushdns
Learn more about how to clear DNS cache.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 10 DNS Setup
Video tutorial
Watch this video tutorial to learn how to deploy SafeDNS on a Windows-based PC with static IP without the installation of any software
Step-by-step guide
1. From the Taskbar pane, right-click on the Wi-Fi (or LAN) icon and select Open Network and Sharing Center:
2. Select Change adapter settings.
3. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes.
4. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select Internet Protocol Version 4, and click on Properties.
5. Select the option Use the following DNS server addresses, enter the following SafeDNS addresses:
Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40
6. Click the OK button to save your settings, and Close the network properties window.
7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP-address or DynDNS" box. Click "Add".
You have successfully configured the SafeDNS for Windows 10.
Troubleshooting
Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean it using the following steps:
1. Press "Start"
2. Search for "cmd" and open the suggested application
3. Enter and run the following command in the opened window ipconfig /flushdns
Learn more about how to clear DNS cache.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Windows 7 DNS Setup
Step-by-step guide
1. From the Taskbar pane, right-click on the Wi-Fi (or LAN) icon and select Open Network and Sharing Center:
2. Select Change adapter settings.
3. Right-click on the current internet connection, and select Properties. If the system shows the security notification, click Yes.
4. We recommend disabling Internet Protocol Version 6. This will simplify the installation process and will have no effect on the quality of your internet connection. After that, select Internet Protocol Version 4, and click on Properties.
5. Select the option Use the following DNS server addresses, enter the following SafeDNS addresses:
Preferred DNS server: 195.46.39.39Alternate DNS server: 195.46.39.40
6. Click the OK button to save your settings, and Close the network properties window.
7. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add".
You have successfully configured the SafeDNS service for Windows 7.
Troubleshooting
Please note that Windows may still be using the addresses saved in the local DNS cache. It is recommended to clean the cache by following these steps:
1. Press "Start"
2. Search for "cmd" and open the suggested application
3. Enter and run the following command in the opened window ipconfig /flushdns
Learn more about how to clear DNS cache.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mac OS
SafeDNS Agent for macOS Setup
Installation requirements: macOS 12 (Monterey) or higher.
Getting started
Log in to your SafeDNS account with your registration email and password.
Navigate to the Getting Started widget on the main page of the Dashboard and select the macOS button.
Click on the download link below and wait for the Agent to download.
Alternatively, you can use the direct link to download the Agent from the SafeDNS website - SafeDNS macOS Agent.
Installation
1. After downloading, open the Downloads directory and double-click on the downloaded package to start the installation process.
2. If you see a message before installing that says “macOS can’t verify the developer of AgentSafeDNS.pkg…”, please hold the Control button, right-click on AgentSafeDNS.pkg, and click Open in the opened context menu.
3. In the appeared dialogue, click Open and follow the instructions of the installer. During the installation process you will be asked to enter the administrator password.
First launch
1. After installation, launch the SafeDNS Agent from the Launchpad.The Agent will be accessible by clicking on the icon in the system tray after the launch.
2. Enter your SafeDNS account credentials in the opened window. If you don’t have an account yet, please choose a suitable plan and register using the registration page.
3. Set up the security PIN that will be used later to restrict access to the Agent.
4. Enter the PIN once again to sign in to the Agent.
Agent overview
1. In the main window of the Agent you can view your account information, current IP address, your Billing Plan, and the Subscription expiration date.All filtering rules changes can be made in the SafeDNS Dashboard.
Use the Policy menu to view and change the current filtering Policy.
2. The system information menu shows brief information about the Agent, current filtering policies, and network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button.
3. The Debug menu displays the results of the diagnostic commands that are required in case of troubleshooting. To send the debug information to SafeDNS, click the "Send report" button.
Additional settings
To make sure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll to the bottom.
If you see the record with the Device name and your IP address, it means that the filtering is working.
After that, you can adjust the filtering Policy according to your needs. You can select categories to block in the SafeDNS Dashboard under the Categories tab.
Don't forget to click the "Save changes" button.
The setup is finished!A blocked website will display an error message that the Access is closed.
If the filtering doesn't work according to your policy settings, clear the cache of your browser using this guide.
!Please note, that settings take 5-7 minutes to apply.!Stats and filtering status update hourly.
Uninstallation
To uninstall the Agent please quit it first.
Then find SafeDNS Agent in the Applications folder:
Open the folder AgentSafeDNS and run the packet "Uninstall-AgentSafeDNS".After that, enter the administrator password in the Terminal window, and the Agent will be deleted.
Mac Filtering Setup via OpenVPN
Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support.
1. Open the SafeDNS Dashboard and navigate to Settings > Devices.
2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add.
Choose a filtering policy before adding a VPN connection, if needed.
3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon.
Multiple devices can use the same filtering policy, but each device should use its own VPN certificate.
You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy.
4. Download the OpenVPN client from the Tunnelblick website
5. Open the disk image from the Downloads folder and double-click the Tunnelblick.app icon.
6. Follow the on-screen instructions.
7. Run Tunnelblick.app from the Applications folder.
8. Add the downloaded SafeDNS Certificate file to the "Configurations" menu and click "Connect".
9. Wait until the VPN connection is established.
Your Mac is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mac DNS Setup
1. Navigate to the Mac OS "System Preferences".
2. Click on the "Network" in the "Internet & Wireless" section of the opened window.
3. Choose an active connection from the list and click the "Advanced" button.
4. Select the "DNS" tab, add SafeDNS servers 195.46.39.39 and 195.46.39.40, and click "OK".
5. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add".
Your Mac is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Linux OS
SafeDNS Agent for Linux Setup
Installation requirements: Debian 9, Ubuntu 18–22, PopOS, CentOS 7.Requires the following billing plans: Safe@Home, Safe@Office, Family, Pro, Pro+
Getting Started
1. Log in to your SafeDNS account with your registration email and password.
2. Navigate to the Getting Started tab on the main page of the Dashboard and select the Linux button. Choose and download the needed package: .rpm or .deb.
.rpm package
Use the following command for the installation from the Terminal app:
sudo rpm -Uvh /home/user/Downloads/safedns-agent-1.3.1-x86_64.rpm
Please note, that the path to the file and/or package name might be different.
.deb package
For experienced users. You can use this command to install from the Terminal app:
sudo dpkg -i /home/user/Downloads/safedns-agent-1.3.1-x86_64.deb
Please note, that the path to the file and/or package name might be different.
1. Open the “Downloads” folder:
2. Run the downloaded file and install the Agent. Enter the Admin password if prompted.
3. You will see the following window once the installation finishes:
Agent Setup
1. Restart your system. The Agent icon will appear in the system tray.
2. Open the Agent by clicking on the icon in the system tray.
!On Debian 9, click on the black line in the bottom right corner, if the tray icon is hidden.
3. Enter your SafeDNS account credentials in the opened window.
4. Set up the security PIN that will be used later to restrict access to the Agent:
5. Enter the PIN once again to sign in to the Agent:
Agent Overview
The main window of the Agent. Here you can view your account information, current IP address, your Billing Plan, and Subscription expiration date.
Use the Policy menu to view and change the current filtering Policy.
The system information menu shows brief information about the Agent, current filtering policies, and the network interfaces. The information in this menu can be copied to the clipboard by clicking the "Copy to clipboard" button.
The Debug menu displays the results of the diagnostic commands that are required in case of troubleshooting. To send the debug information to SafeDNS, click the "Send report" button.
Additional settings
To ensure the Agent was installed correctly, please navigate to the "Settings" tab in the SafeDNS Dashboard and scroll down to the bottom.
If you see the record with the Device name and your IP address, it means that the filtering is working.
After that, you can adjust the filtering Policy according to your needs. You can select categories to block here.Don't forget to click the "Save changes" button.
The setup is complete!
A blocked website will display an error message that the Access is closed:
If the filtering doesn't work according to your policy settings, clear the cache of your browser.
Please note, that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Uninstallation
For the .rpm package, use the following command:
sudo rpm -e agentsafedns
For the .deb package, use the following command:
sudo apt-get remove agentsafedns
Enter "y" if prompted to confirm the Agent removal.Linux Filtering Setup via OpenVPN
Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support.
1. Open the SafeDNS Dashboard and navigate to Settings > Devices.
2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add.
Choose a filtering policy before adding a VPN connection, if needed.
3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Press the "Cloud download" icon.
Multiple devices can use the same filtering policy, but each device should use its own VPN certificate.
You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy.
Some Linux distributions have the OpenVPN application pre-installed. In this case, skip to Step 5.
4. Install the OpenVPN application on your device with the following command:
sudo apt install openvpn
5. Enter the administrator account password and approve the installation if prompted.
6. Copy the downloaded Certificate to /etc/openvpn
7. Start OpenVPN with the following command:
sudo openvpn –config /etc/openvpn/safedns-123456.ovpn
8. Enter the administrator account password if prompted. If the connection is established correctly, you will see the following notification:
Your Linux device is now filtered with the SafeDNS filtering policy.
You can check the OpenVPN connection with the ifconfig command. OpenVPN interface has the name tun:
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Linux DNS Setup
The first step is the same for both Static and Dynamic IP address configurations: change your system’s DNS servers to SafeDNS addresses - 195.46.39.39 and 195.46.39.40
If you configure the network through NetworkManager, it will be sufficient to add SafeDNS servers there.
1. Open the settings of the current Network Interface.
2. Add SafeDNS servers: 195.46.39.39 and 195.46.39.40.
Please note, that servers should be separated by a comma.
Otherwise, you need to find out which application is used for the network settings and add SafeDNS servers there.
Static IP address
Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add".
Your Linux device is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Dynamic IP address
Install and configure ddclient.
ddclient package is shipped with most Linux distributions.
If your Linux distribution doesn’t have ddclient, you can download it from GitHub.
After ddclient is installed, you need to insert the next configuration in its config file (/etc/ddclient.conf or /etc/ddclient/ddclient.conf):
daemon=300syslog=yesssl=yesprotocol=dyndns2server=www.safedns.comuse=webweb=http://www.safedns.com/nic/myip# Replace with your email and password for www.safedns.comlogin=you@yourmail.compassword=your_password# Enter any name for your device.# If you have several computers with dynamic IPs their names must differ.laptop
Reboot your device and start ddclient.
If the similar string is shown in the system logs (/var/log/syslog, /var/log/daemon.log or /var/log/messages), ddclient is successfully configured:
Aug 14 12:49:13 laptop ddclient[4105]: SUCCESS: updating laptop: good: IP address set to 18.26.28.10
Your Linux device is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mobile & tablet
SafeDNS App for Android Setup
SafeDNS Agent is an application that allows you to use SafeDNS filtering on mobile devices running Android.
Supported Android versions: 5 or higher.Supported devices: Samsung, Pixel, Lenovo
⤵SafeDNS Agent - App on Google Play
Alternative .apk installation file download: https://safedns.com/downloads/safedns-2_1_6_3-debug.apk
Getting started
1. Install the app from Google Play, and run the SafeDNS Agent app.
2. Press the "Get started" button.
3. Press "Sign in" if you already have a SafeDNS account, and go to Step 5.
Otherwise, press "Register".
4. Fill in the required fields and press "Register".
5. Enter your SafeDNS account email (or username) and password, and press "Sign in".
6. Create and confirm a PIN code for quick access to the application.
7. Press "Download certificate" to install the SafeDNS root certificate. This step is necessary for the correct display of the block page on HTTPS sites.
Please note that the filtering still works without the installed certificate.
8. Press "Activate now" and "Activate device admin" to enable the feature that prevents unauthorized users from deleting the application and disabling filtering on the device.
9. Press "Allow now", then find the SafeDNS app in the suggested list and set the permission switch to ON.
10. Press "Allow now", then find the SafeDNS app in the suggested list and set the permission switch to ON.
11. Press "Allow now", then tap "Ok" to allow SafeDNS Agent to create a VPN connection.
12. Press "Go to website" to visit the SafeDNS Dashboard and set up the filtering.
If the filtering is already configured, swipe this screen to the left and press "Got it" to complete the installation.
App settings
If you want to change the filtering settings after installing the application, open the SafeDNS Agent application and enter your PIN code.
You will be taken to the main screen of the application. Here you can disable filtering using the slider, change the filtering policy (after installation, the Default policy is applied), or go to the SafeDNS Dashboard. To go to the Dashboard, press on the three bars in the upper left corner and pick "Filtering settings".
In your Dashboard, you can configure filtering categories, manage exceptions in Allow/Deny lists, and much more.
After setting up the filtering, check its operation by trying to access one of the sites you blocked. If you see the block page instead of the site, everything is configured correctly.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Android DNS Setup
Please note, that the Android user interface varies depending on the device model.
1. Open the "Settings" app and navigate to the Wi-Fi menu.
2. Press on arrow icon of your current Wi-Fi connection.
3. In the Network Details press on the "IP settings – DHCP".
4. Select the Static option and add the following addresses to DNS1 and DNS2 fields: 195.46.39.39 and 195.46.39.40
Once the addresses are added, press the checkmark icon to save the settings.
5. Navigate to the SafeDNS Dashboard > Settings and copy your IP address in the "Enter an IP address or DynDNS" box. Click "Add".
Your Android device is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Mobile Devices Filtering Setup
Please note, that this filtering option works via the third-party app OpenVPN.If you encounter any issues, please contact our Technical Support.
iPhone and iPad
1. Open the SafeDNS Dashboard and navigate to Settings > Devices.
2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add.
Choose a filtering policy before adding a VPN connection, if needed.
3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Click the "Letter" icon to send the configuration file to your SafeDNS account email.
Multiple devices can use the same filtering policy, but each device should use its own VPN certificate.
You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy.
4. Install the OpenVPN client from the App Store (the app is free of charge).
5. Open the received email on your mobile device and press on the Certificate. Choose a Certificate to open with the OpenVPN app.
6. Press the green plus icon to add the OpenVPN certificate.
7. Activate the "Connection" switch to establish the VPN connection.
Your device is now filtered with the SafeDNS filtering policy.
Android Devices
1. Open the SafeDNS Dashboard and navigate to Settings > Devices.
2. Scroll down to the VPN section, enter any name for a new VPN connection, and click Add.
Choose a filtering policy before adding a VPN connection, if needed.
3. Upon creating the connection, two icons will appear in the "Certificate" column. One is for downloading the Certificate, and the other is for sending it by email. Open your SafeDNS Dashboard on your mobile device, and press the "Cloud download" icon.Alternatively, you can click the "Letter" icon to send the configuration file to your SafeDNS account email.
Multiple devices can use the same filtering policy, but each device should use its own VPN certificate.
You can also change the filtering policy of the created VPN connection by clicking on the pencil icon to the right. Please note, that you don't need to redownload your VPN certificate on your mobile device if you change its filtering policy.
4. Install the OpenVPN app from Google Play (the app is free of charge).
5. Open the installed app and import the downloaded Certificate using the Android File Manager.If you sent the certificate to your e-mail in step 3, open the attached file with OpenVPN Connect.
6. Press "Connect" after the Certificate is imported.
Your device is now filtered with the SafeDNS filtering policy.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Network Analyzer Guide
This guide shows how to troubleshoot the internet issues on iOS and Android devices using Network Analyzer.
Installation
To run the diagnostics, please download and install the Network Analyzer app from the Google Play:https://play.google.com/store/apps/details?id=net.techet.netanalyzerlite.an
Or from the App Store:https://apps.apple.com/us/app/network-analyzer/id562315041
How to use the app
Once the Application installed, please run it and open the Tools tab:
Select the Query type: DNS and the Settings: TXT.
Set the query address: black.safedns.com and press the Start button.
This is an example of the correct response:
The first underlined part shows the public IP address of your network.
The second underlined part shows the ID of your filtering policy that can also be found here - https://www.safedns.com/cabinet/policy/
Troubleshooting
If you haven't added the IP address to the SafeDNS Dashboard, the second underlined number will show “0”.
If the response contains the status message only, it usually means that DNS servers are not configured on your router or your device.
Advanced
How To Check The Filtering Status
Since our filter is DNS-based, the best way to check the filtering is the nslookup command. Here you will find the checking methods for different platforms.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.
Windows
Take a look at the video guide.
Open the "Start" menu
Type "cmd"
Select the suggested application - Command Prompt
Enter and run the command nslookup -q=txt black.safedns.com or nslookup -q=txt black.safedns.com 127.0.0.1 if you are using the SafeDNS Agent
To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939
Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 01, it means that the filtering is active.
If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly.
If you see the results similar to screenshot 02, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings.
Linux
Navigate to "Menu"
Run the "Terminal" app
Enter and run the command host -t txt black.safedns.com
To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939
Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 03, it means that the filtering is active.
If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly.
If you see the results similar to screenshot 04, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings.
Mac
Launch "Spotlight" with ⌘ + SPACE or by clicking on the magnifying glass in your menu
Search for and launch the "Terminal" app
Enter and run the command host -t txt black.safedns.com
To check via IPv6 (if it was set up), use the command nslookup -q=txt black.safedns.com 2001:67c:2778::3939
Correct results should show your external IP address ("ip"), policy ID ("p"), and also SafeDNS Agent ID ("t") in case it is installed. If you see the results similar to screenshot 05, it means that the filtering is active.
If the "p":0, check if the IP address in the Dashboard > Settings > Devices is added correctly.
If you see the results similar to screenshot 06, it means that the filtering is not configured, and the primary and secondary DNS servers on your device or router are set up incorrectly. Please check your DNS settings.
How to Clear DNS Cache
DNS cache refers to the temporary storage of information about previous DNS lookups on a router, machine's OS, or web browser.Keeping a local copy of a DNS lookup allows your router, OS, or browser to quickly retrieve it and thus a domain can be resolved to its corresponding IP much more efficiently.
However, sometimes it can cause a problem when the new filtering settings conflict with the information saved in the cache. Usually, the problem resolves after clearing the cache on a browser level.
Browser level
Chrome, Edge, Opera, Firefox, and many others
Press Ctrl + Shift + Delete simultaneously on the keyboard to open the appropriate window. Select "Cache" and click "Clear".Please note, that you don't need to delete cookies and saved passwords.
Alternatively, you can use the browser's Settings menu, search for the "cache" setting, and select the suggested option.
Safari
Click on Safari on the top menu bar.
Click Preferences.
Click the Privacy tab.
Click Manage Website Data...
Click Remove All.
Click Remove Now.
Go to the Safari menu on the top menu bar.
Select Quit to close Safari and save your changes.
iOS, iPadOS
Safari browser:1. Go to Settings (the app with the gear icon).2. Scroll down until you see Safari. Tap it.3. Press Clear History and Website Data.4. Press Clear History and Data again in the warning notification.
Chrome browser:
1. On your iPhone or iPad, open the Chrome app.2. At the bottom, press More ...3. Press History > Clear browsing data.4. Select Cookies, Site Data and Cached Images and Files.5. Press Clear browsing data.
Android
Long press on the app in the app menu.
Select App info in the pop-up window.
Press Storage usage in the app's info page.
Press Clear cache.
System level
Windows
Open the Start menu and type cmd.
Right-click on the suggested Command Prompt app and choose the Run as administrator option.
Type ipconfig /flushdns inside the terminal window.
Press Enter.
Mac
Search for the Terminal in the applications list or press CMD+Space.
Enter the following command:sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder
Press Enter.
If prompted, type your administrator account password.
Press Enter again to submit your password.
Linux
Search for the Terminal in the applications list or press Ctrl+Alt+T.
Enter the following command:sudo systemd-resolve --flush-caches
Press Enter.
If prompted, type your administrator account password.
Press Enter again to submit your password.
iOS, iPadOS, Android
Turn Airplane mode on
Reboot device
Turn Airplane mode off
Router level
Reboot the router using the router's interface.
Alternatively, turn the router off by pressing its power button, wait for 15 seconds, and turn the router back on.How to troubleshoot access to domains using Network Tools
This guide shows how to troubleshoot the issue when a domain is loading partially or some additional services from the main domain are not accessible.
Prerequisites:
Browser with the support of the Developers Tools. All popular modern browsers have this feature.
How to troubleshoot:
Start the browser and press F12, or go to Menu > Tools > Browser Tools > Web Developer Tools.
Path to the Developer Tools might be different in various browser
Navigate to the Network Tab. The list below shows all the items from the page that were loaded or blocked.The list will be empty if the Network tab is opened after the page is loaded. In this case, refresh the page.
The HTTP status can have different values, including:
200 (OK) — the access was not blocked and the item has been loaded.
451 — Unavailable for Legal Reasons.
Blocked icon — the access was forbidden and the item had not been loaded.
Using these statuses, you can identify the blocked domain.
Example:
The access to facebook.com is not blocked, and the Facebook logo has been loaded.However, all other data on the page was not loaded, because it is located on the blocked fbcdn.net domain.
To unblock this domain, please check its category here: https://www.safedns.com/check/After that, navigate to the SafeDNS Dashboard and unblock that category.
If you want to keep the category blocked, you can add this domain to Allowlist instead.How to check domain category
You can always check your domain category here.
Agent Unattended Installation
New Agent, versions 1.4.1+ (Windows only)
Installation
To initialize the unattended installation, run the installer with /verysilent switch in the command line.
You can use the additional keys:
/login=< login > /password=< password > /pin=< pin code > to specify your login, password, and pin code.Pin-code can be any 4-digit number that will be used instead of a password to access the Agent interface. It can be different for different devices.It is mandatory to use the /login, /password, and /pin keys together. If only one of the keys is used, login, password, and pin will be requested via GUI at the first launch.Example: /verysilent /login=email@email.com /password=StrongPass /pin=1234
Keys from the old Agent will be added in the subsequent releases.
Uninstallation
To initialize the unattended uninstallation, run the uninstaller with /verysilent switch in the command line.
Old Agent, versions 2.6.0.0 – 3.4.1.5
To initialize the unattended installation, run the installer with /S switch in the command line (S must be uppercase).
You can use the additional keys:
/login=< login > and /pass=< password > to specify your login and password.Example: safedns-agent-setup /S /login=email@email.com /pass=qwertyIt is mandatory to use the /login and /pass keys together. If only one of the keys is used, both login and password will be requested via GUI at the first launch.
/prof=< profile > to specify the filtering policy.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /prof=My policyIf the key is not used or the wrong policy is specified, a new policy will be created.
/conn=< interface > to specify the network interface which needs to be protected.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /conn=Wi-Fi
/pall to protect all network interfaces.If both /conn and /pall are used, then only the former takes action. If neither key is used, only the default network interface will be protected.
/dupd turns off automatic checks for the new versions of the Agent.
/darun disables automatic startup of the SafeDNS Agent GUI when the system starts (no icon will be shown in the system tray). This switch does not affect the SafeDNS Agent system service.
/D=< path > to specify the installation directory (D must be uppercase). It must be the last option used in the command line and must not contain any quotation marks, even if the path contains whitespace characters.Example: safedns-agent-setup /S /login=email@email.com /pass=qwerty /D=c:\program files (x86)\SafeDNS AgentOnly absolute paths are supported.
/nogui disables installation of the graphical user interface (GUI). When you use the key, all components will be installed, except for the dns-agent.exe file. You must specify the login and password with this key
Don't enclose options containing whitespace characters in quotation marks (i.e. /prof=My policy).
Old Agent, special version for Active Directory
This version supports all commands above and one additional key:
/DNS=< IP address > to specify the DNS forwarder.Example: safedns-agent-catserver-setup /S /login=email@email.com /pass=qwerty /DNS=192.168.0.1
SafeDNS and Active Directory
This guide explains how to set up the SafeDNS service in the Active Directory environment both with the SafeDNS Agent and in the Dashboard.
Installation of the Special Version of SafeDNS Agent
We've built the Special Version of the SafeDNS Agent, that can be used in the AD environment and networks with any local non-public DNS records.
Overall, it is the same version of the usual Agent with the same set of features. The only difference is that it works with your local DNS server or AD server directly, and not with the SafeDNS servers. Therefore, all non-public DNS/AD resources will be available by default, without any additional action.
⤵Download the Special Version of the Agent.
Manual Setup in the Dashboard
Another way to gain access to AD resources is to use special options available on Office/Enterprise plans.
You must add SafeDNS DNS-servers addresses - 195.46.39.39 and 195.46.39.40 - to the DNS forwarder on your Primary Domain Controller (and secondary, if applicable), so all devices in a filtered network receive SafeDNS IP addresses as the DNS. After this you need to add your external IP address to the dashboard.
Navigate to Dashboard -> Settings -> Devices and add your external IP in the section "IP addresses/DynDNS".
Grant access to local resources.
1. Navigate to Dashboard -> Settings -> Advanced -> Active Directory.
2. Enter and add your AD domain in the form.
3. Enter and add the name of the PDC (Primary Domain Controller) and its IP address in the local network.
4. Add secondary domain controllers, if applicable. You can change the PDC by clicking on the pencil icon on the right.
5. Set aliases for all required local resources in the Aliases table below. Enter the name of a local resource and its local IP address.
6. Wait about 5-7 minutes until all local resources become accessible.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.Web Filtering Bypass Prevention
Common recommendations:
Block the Proxies & Anonymizers category.
Block the Firefox/Chrome Secure DNS feature in the VPN and Proxy section of AppBlocker.
Make sure that all of your users have restricted operating system rights. If a user has no administrator rights, it will be impossible for them to delete the SafeDNS Agent, install any VPN/proxy, change the "hosts" file, or change the DNS server in the network settings.
Prohibit access to any other DNS. If devices connect to the internet via a gateway or router, prohibit access to all DNS servers, except the SafeDNS public DNS servers. We recommend excluding the 195.46.39.0/24 network as well, as this is a whole SafeDNS network. If you are using a caching server in your corporate network, exclude its address instead.
Prohibit access to HTTP proxies. To do that, restrict packet transfer to all IP addresses by TCP and UDP protocols on ports 3128 and 8080 in the firewall settings of your router.
Prohibit access to DNS over TLS. To do that, restrict packet transfer to all IP addresses, except SafeDNS network 195.46.39.0/24, on TCP port 853.
Disable IPv6 protocol. Even though SafeDNS does support IPv6 addresses, we generally recommend disabling this protocol on your router or in the network settings of your device. Please note, that this will not have any effect on the quality of your internet connection.
Recommendations for system administrators:
Set up DNS requests rerouting to the SafeDNS public DNS server or to the caching server of your corporate network.
Prohibit access to any external proxy servers.
Restrict direct access to any website via its IP address.
Restrict connection to unknown external VPN servers.
Restrict running any unknown application.
Restrict using any unknown hardware.
DD Client Setup
This guide explains how to install ddclient software in the case when you have a Dynamic IP address and your router does not have a Dynamic DNS feature.
Before you start
Redirect your DNS requests to our DNS server as described in:
- Windows 7 DNS setup guide (Steps 1-6).- Windows 10 DNS setup guide (Steps 1-6).
Install and configure DDclient software
Install DDclient (download link).
Click "Next" until your reach the "Select Dynamic DNS server" window (see screenshot above).
Enter any preferred name in the "Client hostname" field.
Enter www.safedns.com in the "Dynamic DNS server".
Select HTTPS in the "Connection".
Select dyndns2 in the "Dynamic DNS protocol".
Enter your SafeDNS account login in the "Dynamic DNS username".
Enter your SafeDNS password in the "Dynamic DNS password".
Continue clicking "Next" until the setup process is finished.
After the installation
Check if the IP address is successfully bound to service in the ddclient.log file. There should be a line like this:
SUCCESS: updating my computer name: good: IP address set to 18.26.28.10
On Windows 10 you can find the log file here:
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\ddclient.log
On Windows 7:
C:\windows\ServiceProfiles\NetworkService\AppData\Local\ddclient.log
C:\windows\ServiceProfiles\LocalService\AppData\Local\ddclient.log
C:\Users\username\AppData\Local\ddclient.log
On Windows XP:
C:\Documents and Settings\LocalService\Local Settings\Application Data\ddclient.log
C:\Documents and Settings\NetworkService\Local Settings\Application Data\ddclient.log
C:\Documents and Settings\username\Local Settings\Application Data\ddclient.log
If the log file is correct, the DD Client table in Dashboard > Settings > Devices (link) will be updated automatically.
Please note that settings take 5-7 minutes to apply.Stats and filtering status update every 10 minutes.DNS-over-TLS Setup
The goal of the DNS-over-TLS protocol is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data via man-in-the-middle attacks. With DoT, the content and response of the DNS query are encrypted.
Using this feature the SafeDNS service can identify users by their public IP address only. This feature does not work with the SafeDNS Agent or the SafeDNS VPN solution.
Before you start, please open your SafeDNS Dashboard > Settings > Devices. Enter your public IP address in the "Enter an IP address or DynDNS" field and click the "Add" button.
Windows 10
1. Download and install a Stubby .msi package.
2. Run the Windows Command Prompt as administrator:
3. Go to the Stubby directory using the Command Prompt and open stubby.yml configuration file with Notepad:
4. Set settings following the example below:
resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONE tls_query_padding_blocksize: 128edns_client_subnet_private: 0idle_timeout: 100000listen_addresses: - 127.0.0.1@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com" tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg=
5. Run the following command to replace the default DNS server with a local Stubby:
PowerShell -ExecutionPolicy bypass -file "C:\Program Files\Stubby\stubby_setdns_windows.ps1"
6. Run the stubby.bat file
7. Check the filtering.
Linux (Ubuntu)
1. Install the Stubby package from a repository:
$ sudo apt install stubby
2. Set the configuration file /etc/stubby/stubby.yml as follows:
resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: - GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONEtls_query_padding_blocksize: 128edns_client_subnet_private : 0idle_timeout: 100000listen_addresses: - 127.0.0.2@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com" tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg=
3. Change DNS in /etc/resolv.conf file to 127.0.0.2:
nameserver 127.0.0.2
4. Start the filtering service
service stubby start
5. Check the filtering.
MacOS
1. Download and install the Stubby Manager package.
If you get a security alert, click on "Open Anyway" in the security settings.
2. Launch a Stubby Manager app after installation and click the "Advanced" button.
3. Set the configuration file as follows:
resolution_type: GETDNS_RESOLUTION_STUBdns_transport_list: - GETDNS_TRANSPORT_TLStls_authentication: GETDNS_AUTHENTICATION_NONEtls_query_padding_blocksize: 128edns_client_subnet_private : 0idle_timeout: 100000listen_addresses: - 127.0.0.1@53round_robin_upstreams: 1upstream_recursive_servers:- address_data: 195.46.39.41tls_auth_name: "dns-s.safedns.com" tls_pubkey_pinset:- digest: "sha256"value: kbv1ODr8gP7FV9/h2lp5t3sP4TdYZEwqUYj0mk0IBzg=
4. Apply the settings and click "Start".
5. Open "Network Properties" and set 127.0.0.1 as the DNS server.
6. Check the filtering.SafeDNS Root Certificate For HTTPS Pages
About the certificate
Root certificate or SSL certificate is the main part of the website security. SSL certificate is required for the correct operation of sites with a secure (HTTPS) connection. If you have issues with displaying the SafeDNS block page (your internet browser shows a message "Unable to access the site"), you need to download a SafeDNS certificate and configure it to use in your browser.
Please note that the certificate should be installed on each end device where you want HTTPS pages to display correctly.
⤵Download SafeDNS certificate
If the browser starts installing the certificate after you click on the button, cancel it, right-click on the button and choose "Save as…"
Windows (Chrome, Edge, Opera browsers)
For Mozilla Firefox, see the next section.
1. Open the Start menu, type in 'Control Panel', and open the suggested app.
2. Open Internet Options.
3. Navigate to the Content tab and click Certificates.
4. Navigate to the Trusted Root Certification Authorities tab, and click Import.
5. Click Next in Certificate Import Wizard.
6. Click Browse and select a downloaded SafeDNS certificate file.
7. Make sure that the certificate is placed in the store Trusted Root Certification Authorities.
8. Close the window by clicking on Finish.
9. Click on Yes when Security Warning appears.
10. Close Certificate Import Wizard by clicking OK.
Mozilla Firefox (all platforms)
1. Click on the Menu button in the top right corner of the browser and select Settings.
2. Choose Privacy & Security in the left menu, scroll to the bottom of the page, and click View Certificates.
3. Select the Authorities tab and click Import.
4. Select the downloaded SafeDNS Certificate, tick the box Trust this CA to identify websites, and click OK.
Mac OSX
1. Press the hotkey CTRL + SPACE and type 'Keychain' in the Spotlight search. Open the Keychain Access application.
2. Navigate to Login > System.
3. Drag and drop the downloaded SafeDNS certificate on the right side of the Keychain Access application where the rest of the certificates are stored.
4. Double-click on the SafeDNS certificate and select Properties certificate. In the opened window, choose when to use this certificate, and select 'Always trust'. Close the window.
5. Make sure that the SafeDNS certificate is marked as trusted for this account in the Keychain Access application.
iPhone and iPad
1. Download the SafeDNS certificate.
2. Allow the website to open Settings.
3. Tap Install.
4. Tap on Install in the system warning window.
5. Tap Install in the confirmation window.
6. Tap Done.
7. Navigate to Settings > General > About > Certificate Trust Settings8. Enable full trust for the SafeDNS Root CA certificate
Android
Menu items and the system interface might be different on your device.
1. Open the Settings app.
2. Start typing "certificate" in the search box.
3. Choose the option related to the certificate installation, a new window will open.
4. Choose "Install certificates from storage".
5. Press "CA certificate".
6. Follow the on-screen instructions to install the certificate.
Chromebooks and Google Workspace
In case the .crt certificate is not accepted, export it as a .pem file and import it into Workspace Admin.
Troubleshooting
If you don't see the block page on HTTPS pages after the certificate installation, or there is a browser warning about an invalid certificate, please, try reinstalling the certificate.
If the issue remains, ⤵contact our technical support teamMore
SafeDNS Global Anycast Network
SafeDNS Global Anycast Network consists of servers located throughout the world to ensure a fast and reliable DNS resolving from any point worldwide.
List of SafeDNS Categories
ID
Category
Description
2
Unknown websites
All uncategorized websites. Most of them are technical domains that are parts of many websites. They are not categorized intentionally in some cases.We generally recommend blocking Unknown websites only when you need access to certain websites.
3
Malware
Sites spreading malware
4
Phishing & Typosquatting
Sites deceiving internet users (e.g. fake pages, scams, fraud)
5
Online Ads
Advertising systems and banner networks
6
Drugs
Sites advertising or selling drugs
7
Tasteless
Sites containing excessive amounts of tasteless language or unmoderated forums
8
Academic Fraud
Sites with plagiarism, academic fraud, etc.
9
Parked Domains
Sites without any content that are temporarily placed at the domain registrar; are often used for virus propagation
10
Hate & Discrimination
Sites spreading the propaganda of aggression, racism, terrorism
11
Proxies & Anonymizers
Sites containing ways to bypass content filters
12
Botnets & C2C
Malicious websites
13
Adult Sites
Adult content, mostly about sex but without pornography
14
Alcohol & Tobacco
Sites selling or containing information about alcohol and tobacco
15
Dating
Dating websites
16
Pornography & Sexuality
Sites containing pornography in any form
17
Astrology
Occult and astrology sites
18
Gambling
Casinos, lotteries, and other gambling systems
19
Child Sexual Abuse (IWF)
Sites containing child sexual abuse images, criminally obscene adult and child sexual abuse content from a list compiled by Internet Watch Foundation/IWF (UK)
20
Torrents & P2P
Torrent trackers and peer-to-peer networks
21
File Storage
File-sharing sites, file archives
22
Movies & Video
Online movies and videos
23
Music & Radio
Internet radio and music archives
24
Photo Sharing
Archives of photos, photo galleries
26
Chats & Messengers
Online chats and instant messengers, messaging systems servers
27
Forums
Web forums
28
Games
Computer and videogames websites
29
Social Networks
Social networking services (e.g. Facebook)
30
Entertainment
Entertainment portals; cafes and restaurants; sites with information about leisure
31
German Youth Protection
Sites considered unsafe by the Federal Department for media harmful to young persons (BPjM, Germany)
32
Automobile
Sites about cars and other types of transport
33
Blogs
Systems of mass hosting, personal websites, blogs
34
Corporate Sites
Sites of commercial organizations
35
E-commerce
Online shops
36
Education
Websites of educational institutions, educational portals
37
Finances
Sites of banks and other financial institutions
38
Government
Official government sites
39
Health & Fitness
Sites of hospitals, medical centers, and health care organizations; health portals
40
Humor
Humorous and entertaining sites, often tasteless
41
Jobs & Career
Job portals
42
Weapons
Websites about weapons and army
43
Politics, Society, and Law
Political news; political parties and organizations; legal organizations; laws
44
News & Media
News agencies, media sites
45
Non-profit
Sites of non-profit organizations
46
Portals
Common portals
47
Religious
Sites of religious and anti-religious organizations
48
Search Engines
Google, Bing, DuckDuckGo, etc.
49
Computers & Internet
Sites about IT, software, internet, and computers
50
Sports
Sites about sports or sports organizations
51
Science & Technology
Scientific organizations sites; science news
52
Travel
Sites about tourism and travel
53
Home & Family
Sites about home, family, and hobbies
54
Shopping
Sites with shopping unrelated to online stores
55
Arts
Museums, art portals, and galleries
56
Webmail
Webmail systems
57
Real Estate
Sites with information about sales and purchases of the real estate
58
Classifieds
Classifieds
59
Business
Sites about businesses and economics
60
Kids
Sites for children
63
Trackers & Analytics
Web analytics systems, including user tracking
65
Child Sexual Abuse (Arachnid)
Sites containing child sexual abuse material from a list compiled by the Canadian Centre for Child Protection (CAN) as part of its Project Arachnid
66
Cryptojacking
Sites illegally mining cryptocurrencies
67
Online Libraries
Sites of online libraries
70
DGA
DGAs are algorithms detected in various malware families, which are used to periodically generate a large number of domain names that can be used as a default with their management and control servers.
71
Ransomware
Sites spreading ransomware
72
Generative AI
Sites of well-known AI services, chatbots, and text/picture generators
100
Contentless Domains
These sites may lack any meaningful or legitimate content, making their purpose unclear or unreliable, and due to their dubious nature, they pose potential risks to users
List of AppBlocker apps
Category
Description
CyberSecurity
Shodan
Search engine that lets users search for various types of servers connected to the internet using a variety of filters.
Zscaler
Standalone cloud proxy, that monitors your organization's traffic enabling you to set policies for blocking transactions.
Tor
Software for enabling anonymous communication.
Ecosystem Applications
WeChat
Chinese instant messaging, social media, and mobile payment app developed by Tencent.
Apple
Apple Inc. online services.
Cisco
Cisco Systems Inc. online services.
Google
Google online services.
Microsoft
Microsoft Corporation online services.
Entertainment
YouTube
Online video sharing and social media platform.
Amazon Prime Video
Video on-demand, streaming and rental service of Amazon.
Disney+
Video on-demand, streaming service of The Walt Disney Company.
Netflix
Streaming service and production company.
File Sharing
4shared
File-sharing website.
BitTorrent Client
BitTorrent client used for uploading and downloading files via the BitTorrent protocol.
Box
Cloud based file hosting and collaboration tool.
Dropbox
Cloud based file hosting service.
FASTdrive
UK-based cloud storage.
FileFactory
Online file storage service.
Leechers Paradise
Service that provides downloads from various file hostings.
NZB.su
Usenet file downloader.
MediaFire
Online file hosting and cloud storage.
OpenTrackr
BitTorrent peer tracker software.
qBittorrent Client
Cross-platform free and open-source BitTorrent client.
ShareFile
Content collaboration, file sharing and sync software.
Syncthing
Peer-to-peer file synchronization application.
Syncplicity
File share and synchronization service.
The Pirate Bay
Online index of digital content of entertainment media and software.
torrent.eu.org
BitTorrent tracker.
Xender
File transfer application.
uTorrent Client
BitTorrent client used for uploading and downloading files via the BitTorrent protocol.
Zer0day Tracker
BitTorrent tracker.
Financial
Ethermine
Cryptocurrency mining pool.
Flypool BEAM
Cryptocurrency mining pool.
Flypool Ravencoin
Cryptocurrency mining pool.
Flypool Ycash
Cryptocurrency mining pool.
Flypool Zcash
Cryptocurrency mining pool.
Games
Xbox network
Online multiplayer gaming and digital media delivery service created and operated by Microsoft.
Sony PlayStation Network
Digital media entertainment service provided by Sony Interactive Entertainment.
Nintendo network
Nintendo's online services.
GOG
Digital distribution platform for video games and films.
Steam
Video game digital distribution service and storefront.
Fortnite
Online video game.
Epic Games Store
Digital video game storefront.
PUBG-mobile
Mail
GMX
Email service provided by Global Mail eXchange.
ProtonMail
End-to-end encrypted email service.
Hushmail
Encrypted web-based email service.
SendGrid
Customer communication platform for transactional and marketing email.
Thunderbird
Email client by the Mozilla Foundation.
Yahoo Mail
Email service by Yahoo, Inc.
Messaging
Slack
Messaging program for the office and personal use.
Skype
Telecommunications application.
Discord
VoIP, instant messaging and digital distribution platform.
Disqus
Blog comment hosting service.
ICQ
Cross-platform instant messaging and VoIP client.
Kakao Talk
Mobile messaging app for smartphones by Kakao Corporation.
KIK
Instant messaging mobile app.
Pushover
Push notification service on smartphones and computers.
Rocket.Chat
Enterprise communication and collaboration platform.
Signal
Encrypted instant messaging service.
Tencent QQ
Chinese instant messaging service and web portal.
Zalo
Vietnamese messaging service.
Viber
Japanese VoIP and instant messaging service.
Facebook messenger
Instant messaging app and platform by Meta.
Telegram
Cloud-based instant messaging service.
WhatsApp
Instant messaging and VoIP service by Meta.
Portal
Baidu
Chinese search engine and online services.
Daum
South Korean web portal.
Hao123
Chinese online listings portal.
Mail.Ru
Russian web portal.
So 360
Chinese search engine.
Sogou
Chinese search engine.
Sohu
Chinese web portal.
TouTiao
Chinese news and information content platform.
Yahoo
Web services provider.
Remote Desktop
RemotePC
Remote access and remote control software application.
AnyDesk
Remote desktop application.
TeamViewer
Remote access and remote control computer software.
BeyondTrust
Identity management / access management, and remote access software.
VNC
Remote access software.
Zoho Assist
Indian web-based business tools.
Chrome Remote Desktop
Remote desktop software tool by Google.
Splashtop
Remote desktop software and remote support software.
Webex
Web conferencing, videoconferencing, and unified communications service.
GoTo (Logmein)
Cloud-based remote work tools.
ISL light
Remote support software.
Social networks
Snapchat
Instant messaging app and multimedia services.
Instagram
Photo and video sharing social networking service by Meta.
Facebook
Online social media and social networking service by Meta.
Twitter
Microblogging and social networking service.
TikTok
Chinese video hosting service.
Pinterest
Image sharing and social media service.
LinkedIn
Business and employment-oriented online service.
Technology
GitLab
DevOps software package service.
GitHub
Software development and version control service.
Sourceforge
Software control and management service.
VoIP/Conferencing
3CX
VoIP software.
Houseparty
Group video chatting app.
LINE
Instant communications application.
Blue Jeans Network
Cloud-based video conferencing service.
Jive Communications
Online conferencing service.
RingCentral
Cloud-based communication and collaboration services.
Telehop
Voice services, and VoIP.
Twilio
Communication tools for making and receiving phone calls, sending and receiving text messages.
VoIP.ms
Communication services.
Voyant
Cloud-based telecommunication services.
Zoom Video
Videotelephony software.
Google Voice
Telephone service by Google.
Microsoft Teams
Business communication platform by Microsoft.
FreeConferenceCall
Online conference call services.
Ooma
Phone service provider for business and home.
VPN And Proxy
CyberGhost VPN
Online traffic encryption service.
Hide.me VPN
VPN service.
Hola VPN
Peer-to-peer VPN service.
NordVPN
VPN service.
Surfshark
VPN service.
Avast SecureLine VPN
VPN service.
Wireshark Guide
This guide shows how to troubleshoot the issues when an application or a domain, and Stats are not working properly.
Installation
Please download and install Wireshark. Choose x32 version, if you don't know the architecture of your operating system:https://www.wireshark.org/download.html
According to Wireshark requirements, you will need to install either WinPcap or Npcap capture driver. Please select the option most suitable for you.
How to use the app
Once Wireshark is installed, the system should be restarted.
Please run the Wireshark application with the administrator rights. During the first run you will be prompted to select the source interface. Please select one of the network adapters:Adapter for loopback traffic capture – if you are using SafeDNS Agent.Wi-Fi or Local Area Connection – if the settings are configured on the network level.
Configure the capture protocol by typing the dns in the Display Filter field and press the Enter button.
This step will filter all network requests to show DNS requests only.
Start the application that requires troubleshooting.
The screen of Wireshark shows the list of the hostname addresses, their corresponding IP addresses, and additional service information.
In the example above, the domain csi.gstatic.com was resolved to the IP address 195.46.39.13 - SafeDNS BlockPage address.This means that the domain csi.gstatic.com is currently blocked either because its category is blocked or because it is on the Denylist.
Please note, that SafeDNS BlockPages can use the following addresses:195.46.39.1, 195.46.39.2, 195.46.39.3, 195.46.39.11, 195.46.39.12, and 195.46.39.13.
How to solve the issue?
Please look up for the category of the domain with the SafeDNS online tool: https://www.safedns.com/check-website
After that, check if this category is not blocked in your SafeDNS Dashboard or is not on the Denylist.
Using Wireshark to capture DNS requests is usually enough to solve any issues related to DNS web filtering. However, you can also try advanced Wireshark features - network packet capture, packet analyzer, and USB traffic capture.
DNSQuerySniffer Guide
This guide shows how to troubleshoot the issues when an application or a domain, and Stats are not working properly.
Installation
Please download and install DNSQuerySniffer. Choose x32 version, if you don't know the architecture of your operating system:https://www.nirsoft.net/utils/dns_query_sniffer.html
According to the DNSQuerySniffer requirements, you will need to install either WinPcap capture driver or Microsoft network Monitor Driver. Please find below links to these drivers:http://www.winpcap.org/install/default.htmhttp://www.microsoft.com/downloads/details.aspx?FamilyID=983b941d-06cb-4658-b7f6-3088333d062f&displaylang=en
How to use the app
Once installed, please run the DNSQuerySniffer with the administrator rights. During the first run, you will be prompted to select the driver for the capture method and the source interface. Please select Raw Sockets method and choose one of the following network adapters:127.0.0.0 – if you are using SafeDNS Agent.192.168.X.X or 10.X.X.X – if the settings are configured on the network level.
Start the application that requires troubleshooting.
The screen of the DNSQuerySniffer shows the list of the hostname addresses, their corresponding IP addresses, and additional service information.
In the example below, the domain csi.gstatic.com was resolved to the IP address 195.46.39.13 - SafeDNS BlockPage address.This means that the domain csi.gstatic.com is currently blocked either because its category is blocked or because it is on the Denylist.
Please note, that SafeDNS BlockPages can the following addresses:195.46.39.1, 195.46.39.2, 195.46.39.3, 195.46.39.11, 195.46.39.12, and 195.46.39.13.
How to solve the issue?
Please look up for the category of the domain with the SafeDNS online tool: https://www.safedns.com/check-website
After that, check if this category is not blocked in your SafeDNS Dashboard or is not on the Denylist.Resellers
White Labeling - SafeDNS
This guide will describe how to deploy a white-labeled edition of SafeDNS service for your customers.
Prerequisites
To deploy a white-labeled version of the SafeDNS service you should prepare the following images and send them to your Account Manager.:
logo for login page (size 270x150, png with transparency)
logo for dashboard pages (size 540x108, png)
logo for a favicon (size 40x40, png with transparency)
After becoming a white-labeled reseller you will be able to define custom text and links to show your customers on the welcome screen (first page of the dashboard).
Also please send to your Account Manager information on the name and IP address of the host where your user's dashboard will be accessed by your customers. e.g. control.yourdomain.com
Then you should complete the following tasks on your side:
Get an SSL certificate for your domain (yourdomain.com in your case) or a single host (control.yourdomain.com). If you will use the certificate for the domain then it should be a wildcarded certificate.
Set Nginx or Apache server that will proxy requests to our dashboard (host https://resellers.safedns.com) from your host control.yourdomain.com.
We offer such variants to provide full white labeling, not like others where only the entry portal has your URL.
Example of Nginx config file
server {
listen 80;
listen 443 ssl;
root /var/www/html;
ssl_certificate /etc/ssl/private/control.yourdomain.com.combined.pem;
ssl_certificate_key /etc/ssl/private/control.yourdomain.com.key;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
server_name control.yourdomain.com;
if ( $request_uri ~ ^(/downloads/|/nic/) ) { break; }
if ( $scheme = "http" ) { rewrite ^/(.*)$
https://control.yourdomain.com/$1 permanent; }
location / {
proxy_set_header X-Forwarded-Host "control.yourdomain.com";
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_pass https://resellers.safedns.com;
}
}
Example of Apache configuration
Install apache2:
sudo apt-get install apache2
Connect needed modules:
sudo a2enmod proxy remoteip
Tune configuration file for Apache Web Server:
Example of Apache config file:
ServerAdmin serveradmin@control.yourdomain.com
Redirect permanent / https://control.yourdomain.com/
ServerName control.yourdomain.com
SSLEngine on
SSLCertificateKeyFile /etc/ssl/private/control.yourdomain.com.key
SSLCertificateFile /etc/ssl/private/control.yourdomain.com.combined.pem
ServerAdmin serveradmin@control.yourdomain.com
SSLProxyEngine On
SSLProtocol -all +TLSv1 +TLSv1.1 +TLSv1.2
ProxyPass
/ https://resellers.safedns.com/
ProxyPassReverse / https://resellers.safedns.com/
RemoteIPHeader X-Real-IP
RemoteIPHeader X-Forwarded-For
Restart Apache Web Server:
sudo service apache2 restart
We'll identify requests from your users by the combination of X-Forwarded-Host header and IP address of your host and will show a white-labeled edition for your users.
Screenshots of the white-labeled version
Login screen:
Main page of the Dashboard:
Customization page:
Further customization
Additionally, we offer customization of the dashboard so you can change the dashboard appearance for your users.
You can change:
Brand data - company name, contact emails
Styles – change color scheme and icons
Favicon – change favicon logo
Dashboard logo – change the dashboard logo
Main page content – change the main page content, links to instruction, text, images, etc.
Footer content – change the information section at the bottom of the dashboard
Links to social networks – add your social media to stay in touch with your customers
Logo on the login page – change the logo on the main login page of the White-Labeled portal
For sending emails from your domain, connect your email in the “Brand data” section of the “Settings” tab on the SafeDNS dashboard. Then, send your SMTP hostname to SafeDNS support team (support@safedns.com). Set up email sending without authentication from mail.safedns.com IP address in your mail server.
Also branding of SafeDNS Agent is available for an additional fee.
Please contact your Account Manager to get further information and pricing.OpenDNS and Cisco Umbrella migration
OpenDNS to SafeDNS migration
In this guide, we will tell you how to migrate from OpenDNS to SafeDNS while keeping all settings and preferences.The guide includes an example of router setup, filtering policy settings migration, and categories migration.
1. Set up the router
Change the DNS servers in your router to 195.46.39.39 and 195.46.39.40.Please note, that your router's interface might be different from the one in the picture.
2. Add public IP address
Add the public IP address of your network to the SafeDNS Dashboard > Settings > Devices. For your convenience, it is always shown at the top of the page, under "Your IP address". This setting is similar to the OpenDNS's Network Settings section.
OpenDNS
SafeDNSJust copy your public IP address, paste it into the IP address field, and click "Add".
SafeDNS also supports Dynamic IP addresses, DynDNS hostnames, and IPv6.More information about router setup can be found here: https://docs.safedns.com/books/installation-guides/page/router-setupIPv6 router setup: https://docs.safedns.com/books/installation-guides/page/router-setup-ipv6
3. Create a custom filtering policy
If you need more than one filtering policy, you can always create a new one in the SafeDNS Dashboard > Settings > Policy tab.
Each filtering policy has its settings for the Advanced Settings, filtering Categories, AppBlocker, and Allow/Denylists.
4. Apply filtering categories
OpenDNS security settings are built into the SafeDNS filtering Categories.
For example, Malware/Botnet protection, and Phishing Attacks options of OpenDNS are identical to SafeDNS Botnets, Phishing & Typosquatting, and Malware categories.These categories are already blocked by default in the SafeDNS Dashboard > Categories tab.
The "Allowlist only" feature blocks access to any domain not listed on the Allowlist (see below).
SafeDNS also has the "Unknown Sites" category for the new non-categorized domains.
Transfer settings from the Web Content Filtering tab of OpenDNS to more than 65+ SafeDNS Categories.
OpenDNS
SafeDNS
Here is a transfer list of content filtering categories of OpenDNS vs SafeDNS.
OpenDNS category
SafeDNS primary category
SafeDNS additional category
Academic Fraud
Academic Fraud
Adult Themes
Adult Sites
Adware
Online Ads
Alcohol
Alcohol & Tobacco
Anime/Manga/Webcomic
Adult Sites
Auctions
Trackers & Analytics
Automotive
Automotive
Blogs
Blogs
Business Services
Business
Corporate Sites
Chat
Chats & Messengers
Classifieds
Classifieds
Dating
Dating
Drugs
Drugs
E-commerce/Shopping
E-commerce
Shopping
Educational Institutions
Education
File Storage
File Storage
Financial Institutions
Finances
Forums/Message boards
Forums
Gambling
Gambling
Games
Games
German Youth Protection
German Youth Protection
Child Sexual Abuse (IWF)
Government
Government
Hate/Discrimination
Hate & Discrimination
Health and Fitness
Health & Fitness
Humor
Humor
Instant Messaging
Chats and messengers
Jobs/Employment
Jobs & Career
Lingerie/Bikini
Adult Sites
Movies
Movies & Video
Music
Music & Radio
News/Media
News & Media
Non-Profits
Non-profit
Nudity
Adult Sites
P2P/File sharing
Torrents & P2P
Parked Domains
Parked Domains
Photo Sharing
Photo Sharing
Podcasts
Music & Radio
Politics
Politics
Pornography
Pornography & Sexuality
Portals
Portals
Proxy/Anonymizer
Proxies & Anonymizers
Radio
Music & Radio
Religious
Religious
Research/Reference
Science & Technology
Search Engines
Search Engines
Sexuality
Pornography and sexuality
Social Networking
Social Networks
Software/Technology
Computers & Internet
Science & Technology
Sports
Sports
Tasteless
Tasteless
Television
Movies & Video
Tobacco
Alcohol & Tobacco
Travel
Travel
Video Sharing
Movies & Video
File Storage
Visual Search Engines
Search Engines
Weapons
Weapons
Web Spam
Botnets
Phishing & Typosquatting
Webmail
Webmail
5. Set up Allow/Denylists
You can always allow or block custom domains using Allow/Denylist.Simply enter a domain you want to allow or deny to the list and click "Add". You can also add domains in bulk using the "Edit as list" button.
More information about Allow/Denylists and Named lists can be found here.
6. Explore additional features
Advanced settings
Here you can enable Safe Search for Google and Bing, force the Restricted mode for Youtube, create a custom Blockpage, set up the filtering in the Active Directory environment, and redirect domains to different IP addresses with the Aliases.
Schedule
Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario.
AppBlocker
Here you can block individual applications or ecosystems. It is similar to Categories - just select the app you need to block and press "Save changes".
7. Download the SafeDNS Agent app
Our service can also be set up on the individual devices.SafeDNS Agent is available for Windows, Linux, and Android systems. iOS and macOS agents are coming soon.
More information about the Agent can be found here:Windows - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-windows-setupLinux - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-linux-setupAndroid - https://docs.safedns.com/books/installation-guides/page/safedns-app-for-android-setupUnsupported mobile devices (yet) - https://docs.safedns.com/books/installation-guides/page/mobile-devices-filtering-setup
Support
If you have any questions about the migration to SafeDNS, please contact our support team via online chat or by email at support@safedns.comCisco Umbrella to SafeDNS migration
In this guide, we will tell you how to migrate from Cisco Umbrella to SafeDNS while keeping all settings and preferences.The guide includes an example of router setup, filtering policy settings migration, and categories migration.
1. Set up the router
Change the DNS servers in your router to 195.46.39.39 and 195.46.39.40.Please note, that your router's interface might be different from the one in the picture.
2. Add public IP address
Add the public IP address of your network to the SafeDNS Dashboard > Settings > Devices. For your convenience, it is always shown at the top of the page, under "Your IP address". This setting is similar to the Cisco Umbrella's Networks section.
Cisco Umbrella
SafeDNSJust copy your public IP address, paste it into the IP address field, and click "Add".
SafeDNS also supports Dynamic IP addresses, DynDNS hostnames, and IPv6.More information about router setup can be found here: https://docs.safedns.com/books/installation-guides/page/router-setupIPv6 router setup: https://docs.safedns.com/books/installation-guides/page/router-setup-ipv6
3. Create a custom filtering policy
If you need more than one filtering policy, you can always create a new one in the SafeDNS Dashboard > Settings > Policy tab.
Each filtering policy has its settings for the Advanced Settings, filtering Categories, AppBlocker, and Allow/Denylists.
4. Apply filtering categories
Cisco Umbrella security settings are built into the SafeDNS filtering Categories.
For example, Malware/Botnet protection, and Phishing Attacks options of Cisco Umbrella are identical to SafeDNS Botnets, Phishing & Typosquatting, and Malware categories.These categories are already blocked by default in the SafeDNS Dashboard > Categories tab.
The "Allowlist only" feature blocks access to any domain not listed on the Allowlist (see below).
SafeDNS also has the "Unknown Sites" category for the new non-categorized domains.
Transfer settings from the DNS Policies page of Cisco Umbrella to SafeDNS Categories.
Cisco Umbrella
SafeDNS
Here is a transfer list of content filtering categories of Cisco Umbrella vs SafeDNS.
Cisco Umbrella category
SafeDNS primary category
SafeDNS additional category
Adult
Adult Sites
Advertisements
Online Ads
Alcohol
Alcohol & Tobacco
Animals and Pets
Blogs
Arts
Arts
Astrology
Astrology
Auctions
Business
E-commerce
Business and Industry
Business
E-commerce
Cannabis
Drugs
Chat and Instant Messaging
Chats & Messengers
Cheating and Plagiarism
Academic Fraud
Cloud and Data Centers
Computers & Internet
Computer Security
Security section
Computers and Internet
Computers & Internet
Conventions, Conferences, and Trade Shows
Business
Cryptocurrency
E-commerce
Cryptojacking
Dating
Dating
Digital Postcards
Computers & Internet
Entertainment
Dining and Drinking
Alcohol & Tobacco
DIY Projects
Blogs
E-commerce
DoH and DoT
Computers & Internet
Dynamic and Residential
Computers & Internet
Education
Education
Entertainment
Entertainment
Extreme
Adult Sites
Hate & Discrimination
Fashion
Shopping
File Transfer Services
File Storage
Filter Avoidance
VPN, Proxies, and Anonymizers
Finance
Finance
Freeware and Shareware
Computers & Internet
Gambling
Gambling
Games
Games
Government and Law
Politics, Society, and Law
Government
Hacking
Phishing & Typosquatting
Malware and Ransomware
Hate Speech
Hate & Discrimination
Health and Medicine
Health & Fitness
Humor
Humor
Hunting
Weapons
Illegal Activities
Illegal Activity section
Illegal Downloads
Torrents & P2P
Illegal Drugs
Drugs
Infrastructure and Content Delivery Networks
Computers & Internet
Internet of Things
Computers & Internet
Internet Telephony
Computers & Internet
AppBlocker's VoIP
Job Search
Jobs & Career
Lingerie and Swimsuits
Adult Sites
Shopping
Lotteries
Gambling
Military
Weapons
Mobile Phones
Computers & Internet
Science & Technology
Museums
Arts
Nature and Conservation
Blogs
News
News & Media
Non-governmental Organizations
Business
Non-profit
Non-sexual Nudity
Adult Sites
Not Actionable
Contentless Domains
Online Communities
Forums
Social Networks
Online Document Sharing and Collaboration
File Storage
Online Meetings
Chats & Messengers
Online Storage and Backup
File Storage
Online Trading
Finance
E-commerce
Organizational Email
Webmail
Paranormal
Astrology
Parked Domains
Parked Domains
Peer File Transfer
File Storage
Personal Sites
Blogs
Personal VPN
VPN, Proxies, and Anonymizers
Photo Search and Images
Photo Sharing
Politics
Politics, Society, and Law
Pornography
Pornography & Sexuality
Private IP Addresses as Host
Computers & Internet
Professional Networking
Computers & Internet
Real Estate
Real Estate
Recipes and Food
Health & Fitness
Reference
Computers & Internet
Regional Restricted Sites (Germany)
German Youth Protection
Religion
Religious
SaaS and B2B
Corporate sites
Business
Safe for Kids
Kids, Home & Family
Education
Science and Technology
Science & Technology
Search Engines and Portals
Search Engines, Portals
Sex Education
Adult sites
Education
Shopping
Shopping
Social Networking
Social Networks
Social Science
Science & Technology
Society and Culture
Politics, Society & Law
Software Updates
Computers & Internet
Sports and Recreation
Sports
Streaming Audio
Music & Radio
Streaming Video
Movies & Video
Terrorism and Violent Extremism
Hate & Discrimination
Tobacco
Alcohol & Tobacco
Transportation
Automotive
Travel
Travel
URL Shorteners
Computers & Internet
Weapons
Weapons
Web Cache and Archives
Computers & Internet
Web Hosting
Computers & Internet
Web Page Translation
Computers & Internet
Web-based Email
Webmail
5. Set up Allow/Denylists
You can always allow or block custom domains using Allow/Denylist.Simply enter a domain you want to allow or deny to the list and click "Add". You can also add domains in bulk using the "Edit as list" button.
More information about Allow/Denylists and Named lists can be found here.
6. Explore additional features
Advanced settings
Here you can enable Safe Search for Google and Bing, force the Restricted mode for Youtube, create a custom Blockpage, set up the filtering in the Active Directory environment, and redirect domains to different IP addresses with the Aliases.
Schedule
Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario.
AppBlocker
Here you can block individual applications or ecosystems. It is similar to Categories - just select the app you need to block and press "Save changes".
7. Download the SafeDNS Agent app
Our service can also be set up on the individual devices.SafeDNS Agent is available for Windows, Linux, and Android systems. iOS and macOS agents are coming soon.
More information about the Agent can be found here:Windows - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-windows-setupLinux - https://docs.safedns.com/books/installation-guides/page/safedns-agent-for-linux-setupAndroid - https://docs.safedns.com/books/installation-guides/page/safedns-app-for-android-setupUnsupported mobile devices (yet) - https://docs.safedns.com/books/installation-guides/page/mobile-devices-filtering-setup
Support
If you have any questions about the migration to SafeDNS, please contact our support team via online chat or by email at support@safedns.com