Advanced Search
Search Results
295 total results found
Starlink Router and Network Setup
Starlink provides internet access with unique networking characteristics, including dynamic IP addresses for all users and CGNAT (Carrier-Grade NAT) for most customers. Some Starlink plans offer a dedicated (but still dynamic) public IP. This guide covers met...
Windows DNS Setup
Video tutorial Watch this video tutorial to learn how to deploy SafeDNS on a Windows-based PC with a static IP without the installation of any software. This video tutorial was recorded for Windows 10. Navigate to the section below for a specific ...
Encrypted DNS Setup (DoH/DoT)
This guide explains how to set up DNS-over-HTTPS (DoH) / DNS-over-TLS (DoT) links using the Encrypted DNS section of the SafeDNS Dashboard and how to enable DoH/DoT in the SafeDNS Agent. Creating DoH/DoT link Please note that DoH/DoT links with the filte...
REST API Guide
This API is currently in beta. New API methods will be added soon. Version 0.1 beta.If you are viewing the REST API guide as a PDF file, you can always check for the latest version here: Introduction The SafeDNS REST API allows you to automate interaction...
General Questions and Service Basics
What are SafeDNS cloud solutions? SafeDNS cloud solutions comprise a comprehensive suite of web filtering and security services designed for deployment across a wide range of infrastructures. These solutions include dedicated documentation for all existing cl...
Installation and Setup Compatibility
How do I install SafeDNS on my router? To install SafeDNS on your router, you need to log into your SafeDNS Dashboard and add the public IP address or DynDNS to the IP/DynDNS table. After that, you can proceed with the router setup. For most standard routers ...
Policy Management and Filtering Features
How can I block all subdomains of a specific domain? To block all subdomains of a certain domain, you should add the specific record to your Denylist. You must add the domain without the leading WWW to ensure the block is effective. For instance, if your goal...
Security and Advanced Configurations
How can I set up Encrypted DNS (DNS-over-HTTPS or DNS-over-TLS)? SafeDNS provides a dedicated guide for configuring Encrypted DNS, specifically covering DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT). This setup allows users to establish secure links using the E...
Troubleshooting and Diagnostics
How can I determine the filtering status of my device or network? The most effective way to verify the filtering status is through the nslookup command. Because the SafeDNS service is DNS-based, using this diagnostic command allows you to see which DNS server...
Enterprise and Business Setup
How do I deploy SafeDNS within an Active Directory environment? Administrators must complete the SafeDNS AD Agent environment configuration, which involves preparing and installing the agent within the network. This setup is designed to work alongside local r...
How to enable two-factor authentication (2FA)
Enabling 2FA To enable two-factor authentication, do the following: 1. Navigate to https://www.safedns.com/dashboard/account/ 2. Scroll down to the Two-Factor Authentication (2FA) panel 3. Choose the preferred method for authentication. We recommend usi...
2. Product Deployment options within the Company's Network
Depending on the client's network topology, there can be numerous deployment schemes. Below are examples of typical solutions. For ISPs This deployment option is used in large networks where end users are behind NAT in relation to the client's main equipment...
3. User Identification
To apply various filtering policies and to separate statistics by requests, it is necessary to identify the end user. In the on-premises solution, user identification is achieved through one of the following methods: IP IP/subnet IP:port IP:[port]-[port]...
4. Components
Our solution consists of the following components: DNS Proxy Module: Receives DNS requests and returns responses in the form of IP addresses. Internal Database: Stores information about all users and filtering policies. RestAPI: Used to update the Datab...
5. Product Setup and Interaction
Custom Local Deployment All setup, maintenance, and support are handled exclusively by SafeDNS specialists, which clearly defines the areas of responsibility between SafeDNS and the client. The client provides the hardware (a server with x64 architecture) acc...
6. Working with Statistics
Binary logs are stored on the SafeDNS Security server. Our solution includes a module that parses these logs and exports them to an external DBMS for further analysis and report generation. Currently, there is a connector for exporting logs to the ClickHouse D...
7. System Requirements for the Product
The minimum system requirements for a server running the SafeDNS Security module are as follows:DNS proxy CPU requirements: Intel 12+ Gen, Intel Xeon Silver/Gold, or similar performance AMD Ryzen/Epyc For handling up to 1,000 queries per second: CPU: ...
8. Rest API
ll interaction with SafeDNS Shield is performed via a REST API, which typically responds on port 8080 from the same IP address that handles user requests. By default, the API only responds to requests from whitelisted IP addresses specified during the server d...