Router Guides
Grandstream configuration
3 min
overview if you have not yet registered for our filtering service, you can do so by visiting our registration page first, you need to change the dns settings of your device to do this, click on the network settings side menu and look for the wan item next, click the pen icon under operations for your chosen wan interface set the wan according to your desired connection mode like dhcp, static ip, or pppoe, and manually set the dns addresses enter 185 236 104 104 inside the primary dns ip field and 185 236 105 105 in the secondary dns ip field configure dynamic dns service to configure the dynamic dns service, open the external access menu and click on the ddns item then, configure the various fields exactly as follows service provider select dyndns org user name enter the specific username assigned to your dynamic network inside our dashboard do not use your main account email address password enter the specific password assigned to your dynamic network domain enter the exact domain checkip dyndns org interface select the specific interface on which you want to configure the dynamic dns service click on the save button to apply your changes it is absolutely not necessary to be registered with the dyndns org service our setup will still work perfectly since our servers automatically intercept and redirect the update requests to themselves deny dns changes by users finally, you can inhibit clients from using alternative dns servers to bypass the filter you need to create firewall rules to block all traffic on port 53 for both tcp and udp protocols, except for requests directed specifically to our cloud ips click on the firewall menu and then on the traffic rules item within the forwarding rules section, click on add to create your new rules following this exact priority order allow primary dns create a first rule to explicitly allow traffic directed to our primary filter dns, which is 185 236 104 104 allow secondary dns create a second rule to explicitly allow traffic directed to our secondary filter dns, which is 185 236 105 105 block all other dns finally, create a third rule to block all other dns traffic on port 53 it is crucial to place this block rule after the two allow rules to ensure your network can still resolve approved requests