Router Guides
Cisco configuration
4 min
overview if you have not yet registered for the service, you can do so by visiting our registration page connect to the control panel by entering the cisco ip address in the address bar of any browser then, log in by entering your administrative credentials configure the device dns first, you need to configure the dns of the device to do this, open the setup menu and then click on network look for the section called wan setting table and select the exact name of your wan interface click on the edit button to modify the interface parameters in the window that appears, enable the use the following dns server address item and then type the following cloud ips inside the dns server 1 and dns server 2 fields respectively dns server 1 185 236 104 104 dns server 2 185 236 105 105 click on the save button to save the changes configure dynamic dns service to configure the dynamic dns service, open the setup menu and then click on dynamic dns select the name of your wan interface again and click on edit configure the service exactly as follows service select dyndns org username enter the specific username assigned to your dynamic network inside our dashboard do not use your main registration email password enter the specific password assigned to your dynamic network host name enter the address ddns flashstart com finally, click save to make the changes active enable the dhcp server at this point, you can enable the dhcp server so that it automatically assigns network parameters, including our filtered dns, to the various internal devices open the dhcp menu and click on dhcp setup configure the service with your local network parameters and select use dns as below next to the dns server field to configure our cloud addresses then enter the following ips in the static dns fields static dns 1 185 236 104 104 static dns 2 185 236 105 105 finally, click save to activate the service alternatively, the dns settings of the various devices within the network can be changed manually one by one optional deny dns changes by users it is possible to increase security by denying users the ability to browse unfiltered by manually changing the dns on their local devices to do this, open the firewall menu and click on access rules then click on add to create a new rule at this point, we need to create rules to block all outbound traffic on port 53 for the dns service on both tcp and udp protocols, except for requests directed specifically to our cloud ips allow primary dns proceed as follows to create the first rule action choose allow service select the dns entry udp port 53 to 53 from the drop down menu log decide whether or not you want to display the log related to this rule source interface select the name of your internal lan interface source ip choose any destination ip select single and then enter the ip 185 236 104 104 in the field on the right it is also possible to select a specific ip range that will use this rule instead of applying it to the entire network click apply to save allow secondary dns now it is necessary to create another rule exactly similar to the previous one, except for the destination ip field address, which must be 185 236 105 105 block all other dns finally, it is necessary to create a drop rule to block all dns traffic directed to external ips other than our own proceed as follows action choose deny service select the dns entry udp port 53 to 53 from the drop down menu log decide whether or not you want to view the log related to this rule source interface select the name of your internal lan interface source ip choose any destination ip select any from the drop down menu then click save to apply the final changes