Cisco configuration
If you have not yet registered for the service you can do so by clicking on the following link: Register here. Connect to the control panel by entering the Cisco IP address in the address bar of any Browser. Then log in by entering your credentials. First you need to configure the DNS of the device. To do this, open the [Setup] menu and then click on [Network]. Look for the section called WAN Setting Table and select the name of your WAN interface. Click on the [Edit] button to edit the interface parameters.
In the window that appears, enable te Use the Following DNS Server Address item and then type inside the DNS Server 1 and DNS Server 2 fields, respectively, the following IPs: » 185.236.104.104 » 185.236.105.105 Click on the [Save] button to save the changes.
To configure Dynamic DNS service, open the [Setup] menu and then click on [Dynamic DNS]. Select the name of your WAN interface again and click on [Edit].
Configure the service as follows: » Service: Select DynDNS.org. » Username: Enter your registration email/username. » Password: Enter your password. » Host Name: Enter ddns.flashstart.com. Finally, click [Save] to make the changes.
At this point you can enable the DHCP Server so that it automatically assigns network parameters, including our DNS, to the various internal devices. Then open the [DHCP] menu and click on [DHCP Setup]. Configure the service with your network parameters and select Use DNS as Below, next to the DNS Server field, to configure our DNS. Then enter the following IPs in the Static DNS 1 and Static DNS 2 fields, respectively: » 185.236.104.104 » 185.236.105.105 Finally, click [Save] to activate the service.
Alternatively, the DNS of the various devices within the network can be changed manually.
It is possible to increase security by denying the user the ability to browse unfiltered, as a result of changing the DNS on their device. To do this, proceed as follows: Open the [Firewall] menu and click on [Access Rules]. Then click on [Add] to create a new rule.
At this point we need to create rules to block all traffic on port 53 (DNS Service), both TCP and UDP, except those directed to our IPs. Proceed as follows: » Action: Choose Allow. » Service: Select the DNS entry [UDP/53-53] from the drop-down menu. » Log: Decide whether or not you want to display the log related to this. » Source Interface: Select the name of your LAN (internal) interface. » Source IP: Choose ANY. PLEASE NOTE: It is also possible to select an IP range that will use this rule, instead of the entire network. » Destination IP: Select Single and then enter this IP 185.236.104.104 in the field on the right. Click [Apply] to save.
Now it is necessary to create another rule, similar to the previous one, except for the Destination IP field address, which must be 185.236.105.105. Finally, it is necessary to create another rule to block all DNS traffic directed to other IPs, other than our own. Therefore, proceed as follows: » Action: Choose Deny. » Service: Select the DNS entry [UDP/53-53] from the drop-down menu. » Log: Decide whether or not you want to view the log related to this rule. » Source Interface: Select the name of your LAN (internal) interface. » Source IP: Choose ANY. PLEASE NOTE: It is also possible to select an IP range that will use this rule, instead of the entire network. » Destination IP: Select ANY from the drop-down menu. Then click [Save] to apply the changes.
Other ways to ask: » How to configure the Cisco router. » Cisco router configuration. How to.