Choose your cart
Choose your cart
Receive up to $504 promo credit ($180 w/Welcome Unlimited, $360 w/ 5G Start, or $504 w/5G Do More, 5G Play More, 5G Get More or One Unlimited for iPhone plan (Welcome Unlimited and One Unlimited for iPhone plans can't be mixed w/other Unlimited plans; all lines on the account req'd on respective plans)) when you add a new smartphone line with your own 4G/5G smartphone on an eligible postpaid plan between 2/10/23 and 4/5/23. Promo credit applied over 36 months; promo credits end if eligibility requirements are no longer met.
$699.99 (128 GB only) device payment purchase or full retail purchase w/ new smartphone line on One Unlimited for iPhone (all lines on account req'd on plan), 5G Start, 5G Do More, 5G Play More or 5G Get More plan req'd. Less $699.99 promo credit applied over 36 mos.; promo credit ends if eligibility req’s are no longer met; 0% APR.
Just received and setup the latest Verzion wireless router, walking through all the options, turning off uPNP, etc.
However, I see no way to assert alternatIve DNS service, e.g. OpenDNS with this router and the manual only privides Prrimary/Secondary DNS settings for default disabled IPv6.
Does anyone know how specific IPv4 DNS Primary/Secondary IPs for the router (and therefore Clients) can be asserted- specifically for OpenDNS?
Solved! Go to Correct Answer
I have OpenDNS configured on the Quantum Gateway. It's easy.
Enjoy faster DNS lookups and/or web site filtering.
I have OpenDNS configured on the Quantum Gateway. It's easy.
Enjoy faster DNS lookups and/or web site filtering.
This works, but how can I force all traffic through the Gateway to use the Open DNS servers? I went to my iPad, asked it to use Goggle's DNS, instead of the routeur-provided DNS, and it worked, meaning that my iPad "escaped" Open DNS.
To do this, set the Firewall on the router to Custom. Then, you'll need to create rules which follow this methodology.
"Allow Port 53 TCP/UDP Outbound to OpenDNS IPs 208.67.220.220 and 208.67.222.222, Source Port Any, Source IP any"
"Deny Port 53 TCP/UDP Outbound to all IP addresses, Source Port Any, Source IP Any"
Although I don't have a FIOS G1100 or MI424WR handy to do a walk-through on this, the rule of thumb is to create your deny rule to precede the rule to only allow OpenDNS. Then, to test as you've done, the changes. Make sure that making queries against the router (192.168.1.1 or whatever you have it's IP set to) continue to work, and also be sure that you can query OpenDNS directly as well (eg: nslookup www.google.com 208.67.220.220). While queries sent to Google DNS for example (eg: nslookup www.google.com 8.8.8.8) time out.
Here's an example of some rules I have set up on Ubiquiti UniFi networks I manage. to restrict DNS traffic to OpenDNS only. I also have rules for IPv6 because these networks are on an IPv6 capable ISP and are IPv6 functional as well.
Thank you very much.
I didn't do all you said but it look like it is working, meaning that when I manualy set 8.8.8.8 as the DNS on my iPad, instead of "Automatic", my iPad doesn't access internet at all, whereas when I let the DNS as "Automatic", it accesses internet but gets blocked by Open DNS where it should.
On the routeur settings, I went to Firewall, Access Control, Add rule, and I created a rule that applies to any device or networked Computer, and which forces any TCP or UDP request, from any port, to go to port 53. It doesn't look like my router allows more "sophisticated" rules where I could specify OpenDNS address here.
Screenshots:
:
I also manualy forced my server to use Open DNS as DNS provider as per the post above. With that, when I do the nslookup queries as you suggest, I time out for 8.8.8.8 and also for 208.67.220.220, but not for my router's IP address. I seem to be able to access the internet fine.