From 1e84a8d9ca9849e72e1cbbd76d4eb604708c0f77 Mon Sep 17 00:00:00 2001 From: el-termikael <58733007+el-termikael@users.noreply.github.com> Date: Mon, 16 Dec 2024 10:33:27 +0000 Subject: [PATCH] automatically update translations --- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 38 ++++- .../current/miscellaneous/create-dns-stamp.md | 8 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/linked-ip.md | 15 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/mikrotik.md | 42 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 38 ++++- .../current/miscellaneous/create-dns-stamp.md | 22 ++- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 18 ++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 4 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 24 ++- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 2 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 20 ++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 20 ++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 12 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/adguard-home/getting-started.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 82 +++++----- .../connect-devices/mobile-and-desktop/ios.md | 74 ++++----- .../mobile-and-desktop/linux.md | 140 ++++++++++-------- .../mobile-and-desktop/macos.md | 44 +++--- .../mobile-and-desktop/windows.md | 32 ++-- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 16 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 46 +++--- .../connect-devices/routers/opnsense.md | 26 ++-- .../connect-devices/routers/routers.md | 14 +- .../connect-devices/routers/synology-nas.md | 24 +-- .../connect-devices/routers/unifi.md | 40 ++--- .../connect-devices/routers/universal.md | 34 ++--- .../connect-devices/routers/xiaomi.md | 26 ++-- .../private-dns/server-and-settings/access.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../current/private-dns/api/changelog.md | 24 +-- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 26 +++- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 20 ++- .../connect-devices/routers/asus.md | 41 +++-- .../connect-devices/routers/keenetic.md | 4 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/unifi.md | 2 +- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 12 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 46 ++++-- .../current/miscellaneous/create-dns-stamp.md | 8 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 16 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 10 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 20 ++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 4 +- .../current/general/dns-providers.md | 76 ++++++---- .../current/miscellaneous/create-dns-stamp.md | 14 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 18 ++- .../connect-devices/routers/asus.md | 7 +- .../connect-devices/routers/keenetic.md | 4 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../private-dns/server-and-settings/access.md | 2 +- .../server-and-settings/rate-limit.md | 7 +- .../current/adguard-home/getting-started.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/adguard-home/getting-started.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 8 +- .../current/dns-client/environment.md | 12 +- .../current/dns-client/overview.md | 2 +- .../current/general/dns-filtering-syntax.md | 2 +- .../current/general/dns-providers.md | 52 +++++-- .../current/miscellaneous/create-dns-stamp.md | 24 ++- .../miscellaneous/structured-dns-errors.md | 8 +- .../current/private-dns/api/changelog.md | 6 +- .../current/private-dns/api/reference.md | 6 +- .../game-consoles/nintendo-switch.md | 2 +- .../connect-devices/game-consoles/nintendo.md | 2 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 2 +- .../connect-devices/game-consoles/xbox-one.md | 2 +- .../mobile-and-desktop/android.md | 6 +- .../connect-devices/mobile-and-desktop/ios.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../mobile-and-desktop/macos.md | 2 +- .../mobile-and-desktop/windows.md | 2 +- .../other-options/dedicated-ip.md | 6 +- .../other-options/linked-ip.md | 26 +++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 2 +- .../connect-devices/routers/mikrotik.md | 46 +++--- .../connect-devices/routers/openwrt.md | 2 +- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../setting-up-filtering/blocklists.md | 2 +- .../solving-problems/icloud-private-relay.md | 2 +- .../statistics-and-log/query-log.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 4 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 24 ++- .../connect-devices/connect-devices.md | 4 +- .../game-consoles/nintendo-switch.md | 4 +- .../connect-devices/game-consoles/nintendo.md | 4 +- .../game-consoles/playstation.md | 4 +- .../connect-devices/game-consoles/steam.md | 4 +- .../connect-devices/game-consoles/xbox-one.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../connect-devices/mobile-and-desktop/ios.md | 4 +- .../mobile-and-desktop/linux.md | 34 ++++- .../mobile-and-desktop/macos.md | 4 +- .../mobile-and-desktop/windows.md | 4 +- .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 20 ++- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/fritzbox.md | 4 +- .../connect-devices/routers/keenetic.md | 8 +- .../connect-devices/routers/mikrotik.md | 48 +++--- .../connect-devices/routers/openwrt.md | 4 +- .../connect-devices/routers/opnsense.md | 4 +- .../connect-devices/routers/synology-nas.md | 2 +- .../connect-devices/routers/universal.md | 4 +- .../connect-devices/routers/xiaomi.md | 6 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- .../current/dns-client/configuration.md | 6 +- .../current/general/dns-providers.md | 44 ++++-- .../current/miscellaneous/create-dns-stamp.md | 4 +- .../mobile-and-desktop/android.md | 2 +- .../mobile-and-desktop/linux.md | 22 +++ .../other-options/dedicated-ip.md | 2 +- .../other-options/linked-ip.md | 14 +- .../connect-devices/routers/asus.md | 9 +- .../connect-devices/routers/keenetic.md | 6 +- .../connect-devices/routers/mikrotik.md | 44 +++--- .../connect-devices/routers/xiaomi.md | 2 +- .../server-and-settings/rate-limit.md | 5 +- .../server-and-settings.md | 2 +- 389 files changed, 2921 insertions(+), 1760 deletions(-) diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/cs/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 54d666895..2290359af 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ Objekt `cache` konfiguruje ukládání výsledků DNS dotazů do mezipaměti. Vy - `size`: Maximální velikost mezipaměti výsledků DNS jako velikost dat čitelných pro člověka. Musí být větší než nula, pokud je `enabled` nastaveno na `true`. - **Příklad:** `128 MB` + **Example:** `128MB` - `client_size`: Maximální velikost mezipaměti výsledků DNS pro každou nakonfigurovanou adresu nebo podsíť klienta jako velikost dat čitelná pro člověka. Musí být větší než nula, pokud je `enabled` nastaveno na `true`. - **Příklad:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ Objekt `bootstrap` konfiguruje překlad adres serverů [upstream](#dns-upstream) - `timeout`: Časový limit pro spouštěcí požadavky DNS jako doba trvání čitelná pro člověka. - **Příklad:** `2 s` + **Příklad:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/cs/docusaurus-plugin-content-docs/current/general/dns-providers.md index 20288f119..5b54125b5 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ Společný otevřený projekt na podporu, implementaci a nasazení [DNS Privacy] | DNS-over-TLS | Poskytovatel: `Surfnet`, Název hostitele: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` a IPv6: `2001:610:1:40ba:145:100:185:15` | [Přidat do AdGuardu](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Poskytovatel: `Surfnet`, Název hostitele: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` a IPv6: `2001:610:1:40ba:145:100:185:16` | [Přidat do AdGuardu](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) je DNS služba zaměřená na ochranu soukromí, která dává přednost bezpečnosti uživatelů a anonymitě. Podporuje standardní DNS i šifrované protokoly a zachovává přísnou zásadsu žádných záznamů aktivit. + +#### Standardní + +| Protokol | Adresa | | +| -------------------- | -------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| DNS, IPv4 | `162.55.52.228` | [Přidat do AdGuardu](adguard:add_dns_server?address=162.55.52.228&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Přidat do AdGuardu](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Přidat do AdGuardu](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Přidat do AdGuardu](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Ostatní servery DNS se zásadou 'bez záznamů' | Protokol | Adresa | | @@ -391,12 +406,13 @@ Tyto servery používají některé záznamy, samopodepsané certifikáty nebo n [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) je poskytovatel DNS šetrný k soukromí, který má dlouholeté zkušenosti s vývojem služeb pro překlad názvů domén a jehož cílem je poskytovat uživatelům rychlejší, přesnější a stabilnější služby rekurzivního překladu. -| Protokol | Adresa | | -| -------------- | --------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Přidat do AdGuardu](adguard:add_dns_server?address=119.29.29.29&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Přidat do AdGuardu](adguard:add_dns_server?address=2402:4e00::&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Přidat do AdGuardu](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protokol | Adresa | | +| -------------- | ------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Přidat do AdGuardu](adguard:add_dns_server?address=119.29.29.29&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Přidat do AdGuardu](adguard:add_dns_server?address=2402:4e00::&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Přidat do AdGuardu](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks hostuje DNS resolvery, které jsou schopné překládat ### momou! DNS -[momou! DNS](https://dns.momou.ch/) poskytuje DoH a DoT řešitelům tři úrovně filtrování +[momou! DNS](https://dns.momou.ch/) poskytuje DoH a DoT řešitelům tři úrovně filtrování #### Standardní @@ -1252,3 +1268,11 @@ Tyto servery neposkytují žádné blokování reklam, neuchovávají žádné z | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Přidat do AdGuardu](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Přidat do AdGuardu](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Přidat do AdGuardu](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) je DNS, který se zaměřuje na blokování reklam, ochranu soukromí a malwaru a má přísné zásady žádných záznamů aktivit. + +| Protokol | Adresa | | +| --------- | --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Přidat do AdGuardu](adguard:add_dns_server?address=23.176.184.32&name=), [Přidat do AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/cs/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 230a6169e..8d74659fb 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: Jak vytvořit vlastní razítko DNS pro zabezpečený DNS - -sidebar_position: 4 +title: Jak vytvořit vlastní razítko DNS pro zabezpečený DNS sidebar_position: 4 - - - Tento průvodce vám ukáže, jak vytvořit vlastní razítko DNS pro zabezpečený DNS. Zabezpečený DNS je služba, která zvyšuje bezpečnost a soukromí na internetu šifrováním dotazů DNS. Tím se zabrání tomu, aby vaše dotazy zachytily nebo zmanipulovaly zákeřné subjekty. @@ -14,11 +12,11 @@ Pokud však potřebujete další zabezpečení, jako jsou předvyřešené IP ad Razítka DNS jsou krátké řetězce, které obsahují všechny informace potřebné k připojení k zabezpečenému serveru DNS. Zjednodušují proces nastavení zabezpečeného DNS, protože uživatel nemusí všechny tyto údaje zadávat ručně. -Razítka DNS umožňují přizpůsobit nastavení zabezpečeného DNS nad rámec obvyklých adres URL. Umožňují zejména zadávat pevně zadané adresy serverů, používat hašování certifikátů atd. Díky těmto funkcím jsou razítka DNS robustnější a univerzálnější možností konfigurace nastavení zabezpečeného DNS. +Razítka DNS umožňují přizpůsobit nastavení zabezpečeného DNS nad rámec obvyklých adres URL. Umožňují zejména zadávat pevně zadané adresy serverů, používat hashování certifikátů atd. Díky těmto funkcím jsou razítka DNS robustnější a univerzálnější možností konfigurace nastavení zabezpečeného DNS. ## Výběr protokolu -Mezi typy zabezpečených DNS patří `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)` a `DNS-over-TLS (DoT)` a některé další. Výběr jednoho z těchto protokolů závisí na kontextu, ve kterém je budete používat. +Mezi typy zabezpečených DNS patří `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)` a některé další. Výběr jednoho z těchto protokolů závisí na kontextu, ve kterém je budete používat. ## Vytvoření razítka DNS diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index ac880258b..24acd730a 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ Pokud se zobrazí oznámení, že nejste připojeni k AdGuard DNS, je port, na k ::: +## Použití EDNS (Rozšířený DNS) + +EDNS rozšiřuje protokol DNS a umožňuje přenášet další data většími pakety UDP. V AdGuard DNS umožňuje předávání DeviceID v běžném DNS pomocí dalšího parametru. + +DeviceID, osmimístný hexadecimální identifikátor (např. `1a2b3c4d`), pomáhá spojit požadavky DNS s konkrétními zařízeními. U šifrovaného DNS je toto ID součástí domény (např. `1a2b3c4d.d.adguard-dns.com`). U nešifrovaného DNS je k přenosu tohoto identifikátoru vyžadován EDNS. + +AdGuard DNS používá EDNS k získání DeviceID vyhledáním čísla `65074`. Pokud taková možnost existuje, načte z ní DeviceID. K tomu můžete v terminálu použít příkaz `dig`: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Zde je `65074` ID možnosti a `3031323334353637` je její hodnota v hexadecimálním formátu (DeviceID: `01234567`). + +Vše je hotovo! Mělo by se zobrazit DeviceID. + +:::note + +Příkaz `dig` je pouze příkladem, k provedení této akce můžete použít libovolný software DNS s možností přidání voleb EDNS. + +::: + ## Použití běžného DNS Pokud nechcete používat další software pro konfiguraci DNS, můžete se rozhodnout pro nešifrovaný DNS. Máte dvě možnosti: použít propojené IP adresy nebo vyhrazené IP adresy: diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index caacf9fff..78e171ab7 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,8 +14,10 @@ Ne všechna zařízení podporují šifrované protokoly DNS. V takovém přípa ::: Někdy se může stát, že je IP adresa rezidenční sítě již používána, a pokud se k ní pokusíte připojit, AdGuard DNS připojení zabrání. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. + +V takovém případě se obraťte na podporu na adrese [support@adguard-dns.io](mailto:support@adguard-dns.io), kde vám pomohou se správným nastavením konfigurace. ## Jak nastavit propojenou IP @@ -25,6 +27,7 @@ Následující pokyny vysvětlují, jak se k zařízení připojit pomocí **pro 2. Přidejte nové zařízení nebo otevřete nastavení dříve připojeného zařízení. 3. Přejděte na _Použít adresy DNS serverů_. 4. Otevřete _Adresy běžného DNS serveru_ a připojte propojenou IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamický DNS: Proč je užitečný @@ -44,13 +47,21 @@ Takto nebudete muset ručně aktualizovat přidruženou IP adresu při každé j ## Dynamický DNS: Jak nastavit 1. Nejprve je třeba zkontrolovat, zda nastavení vašeho routeru podporuje DDNS: + - Přejděte do _Nastavení routeru_ → _Sítě_ - Vyhledejte sekci DDNS nebo _Dynamický DNS_ - - Přejděte na něj a ověřte, zda jsou nastavení skutečně podporována. _Jedná se pouze o příklad, jak to může vypadat. Může se lišit v závislosti na routeru_ ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Přejděte na něj a ověřte, zda jsou nastavení skutečně podporována. _Toto je pouze příklad, jak by to mohlo vypadat. Nastavení se mohou lišit v závislosti na vašem routeru_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Zaregistrujte svou doménu u oblíbené služby, jako je [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) nebo u jiného poskytovatele DDNS, který vám vyhovuje. + 3. Zadejte doménu do nastavení routeru a synchronizujte konfigurace. + 4. Přejděte do nastavení propojené IP a připojte adresu, poté přejděte na _Rozšířená nastavení_ a klikněte na _Konfigurace DDNS_. + 5. Zadejte doménu, kterou jste dříve zaregistrovali, a klikněte na tlačítko _Konfigurace DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Hotovo, úspěšně jste nastavili DDNS! diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index a5428dac5..d3e20c37e 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ V případě potřeby: Nainstalujte do počítače firmware [ASUS Merlin](https: 2. Zadejte uživatelské jméno správce (obvykle je to admin) a heslo routeru. 3. V postranním panelu _Pokročilá nastavení_ přejděte do části WAN. 4. V části _Nastavení DNS WAN_ nastavte _Připojit k DNS serveru automaticky_ na _Ne_. -5. Nastavte položky _Předávání místních dotazů_, povolte opětovné navázání DNS a _povolte DNSSEC_ na hodnotu _Ne_. +5. Nastavte položky _Přesměrování místních dotazů_, _Zapnout ochranu DNS Rebind_ a _Zapnout podporu DNSSEC_ na hodnotu _Ne_. 6. Změňte protokol ochrany soukromí DNS na DNS-over-TLS (DoT). 7. Zkontrolujte, zda je profil _DNS-over-TLS_ nastaven na hodnotu _Přísný_. 8. Přejděte dolů do sekce _Seznam serverů DNS-over-TLS_. Do pole _Adresa_ zadejte jednu z níže uvedených adres: @@ -32,11 +32,10 @@ V případě potřeby: Nainstalujte do počítače firmware [ASUS Merlin](https: 3. Otevřete _Pokročilá nastavení_ nebo _Pokročilé_. 4. Vyberte _WAN_ nebo _Internet_. 5. Otevřete _Nastavení DNS_ nebo _DNS_. -6. Vyberte _Ruční DNS_. Vyberte _Použít tyto DNS servery_ nebo _Zadat DNS server ručně_ a zadejte následující adresy DNS serverů: +6. Vyberte _Ruční nastavení_. Vyberte _Použít tyto DNS servery_ nebo _Zadat DNS server ručně_ a zadejte následující adresy DNS serverů: - IPv4: `94.140.14.49` a `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` a `2a10:50c0:0:0:0:0:dad:ff` 7. Uložte nastavení. 8. Propojte svou IP adresu (nebo vyhrazenou IP adresu, pokud máte předplatné Team). - -- [Vyhrazené IP adresy](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Propojené IP adresy](/private-dns/connect-devices/other-options/linked-ip.md) + - [Vyhrazené IP adresy](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Propojené IP adresy](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index d6b82df20..648643326 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -Routery MikroTik využívají open source operační systém RouterOS, který poskytuje služby směrování, bezdrátových sítí a firewallu pro domácí a malé kancelářské sítě. +Routery MikroTik využívají open-source operační systém RouterOS, který poskytuje služby směrování, bezdrátových sítí a firewallu pro domácí a malé kancelářské sítě. ## Konfigurace DNS-over-HTTPS @@ -28,33 +28,37 @@ Routery MikroTik využívají open source operační systém RouterOS, který po 4. Vytvořte záznam statického DNS: - V _Nastavení DNS_ klikněte na  _Statický_ - Klikněte na _Přidat nový_ - - Nastavte _Název_ na d.adguard-dns.com - - Nastavte _Typ_ na A + - Nastavte _Název_ na `d.adguard-dns.com` + - Nastavte _Typ_ na `A` - Nastavte _Adresu_ na `94.140.14.49` - - Nastavte _TTL_ na 1d 00:00:00 + - Nastavte _TTL_ na `1d 00:00:00` - Zopakujte postup a vytvořte identickou položku, ale s _Adresou_ nastavenou na `94.140.14.59` 5. Zakázání služby Peer DNS u klienta DHCP: - Přejděte na _IP_ → _DHCP Client_ - Dvakrát klikněte na klienta používaného pro připojení k internetu (obvykle na rozhraní WAN) - Zrušte zaškrtnutí políčka _Používat Peer DNS_ - Klikněte na _OK_ -6. Propojte svou IP. -7. Testování a ověřování: +6. Testování a ověřování: - Možná bude nutné restartovat router MikroTik, aby se všechny změny projevily - Vymažte mezipaměť DNS prohlížeče. Pomocí nástroje, jako je [https://www.dnsleaktest.com](https://www.dnsleaktest.com/), můžete zkontrolovat, zda jsou vaše požadavky DNS nyní směrovány skrze AdGuard -## Použijte panel správce routeru +## Můj router nepodporuje DNS-over-HTTPS -Pokud váš router Keenetic nepodporuje konfiguraci DNS-over-HTTPS nebo DNS-over-TLS, použijte tyto pokyny: +Pokud váš router MikroTik nepodporuje konfiguraci DNS-over-HTTPS, použijte tyto pokyny: -1. Otevřete panel správce routeru. Lze k němu přistupovat skrze adresy `192.168.1.1` nebo `192.168.0.1`. -2. Zadejte uživatelské jméno správce (obvykle je to admin) a heslo routeru. -3. Otevřete _Webfig_ → _IP_ → _DNS_. -4. Vyberte možnost _Servery_ a zadejte jednu z následujících adres DNS serveru. - - IPv4: `94.140.14.49` a `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` a `2a10:50c0:0:0:0:0:dad:ff` -5. Uložte nastavení. -6. Propojte svou IP adresu (nebo vyhrazenou IP adresu, pokud máte předplatné Team). - -- [Vyhrazené IP adresy](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Propojené IP adresy](/private-dns/connect-devices/other-options/linked-ip.md) +1. Přístup k routeru MikroTik: + - Otevřete webový prohlížeč a přejděte na IP adresu routeru (obvykle `192.168.88.1`) + - Případně můžete použít Winbox pro připojení k routeru MikroTik + - Zadejte uživatelské jméno a heslo správce +2. Konfigurace běžného DNS: + - Přejděte na _IP_ → _DNS_ + - V části _Servery_ přidejte následující servery AdGuard DNS: + - IPv4: `94.140.14.49` a `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` a `2a10:50c0:0:0:0:0:dad:ff` + - Dedikované adresy IPv6: Soukromý AdGuard DNS podporuje dedikované adresy IPv6. Chcete-li je najít, otevřete hlavní panel, klikněte na _Nastavení_ vedle vašeho zařízení → _Adresy běžných serverů DNS_ → _Dedikované adresy IPv6_. + - Klikněte na _OK_ +3. Zakázání služby Peer DNS u klienta DHCP: + - Přejděte na _IP_ → _DHCP Client_ + - Dvakrát klikněte na klienta používaného pro připojení k internetu (obvykle na rozhraní WAN) + - Zrušte zaškrtnutí políčka _Používat Peer DNS_ + - Klikněte na _OK_ diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index f12cc537f..fc6635bf8 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Routery Xiaomi mají mnoho výhod: Současně může uživatel k místní síti Wi-Fi připojit až 64 zařízení. +Routery Xiaomi mají mnoho výhod: stabilní a silný signál, zabezpečení sítě, vysoký výkon a inteligentní správu. Uživatelé mohou k místní síti Wi-Fi připojit až 64 zařízení. Bohužel nepodporuje šifrované DNS, ale je skvělý pro nastavení AdGuard DNS prostřednictvím propojené IP. diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index c86579208..b0a20bba7 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ Omezování rychlosti DNS obvykle funguje tak, že se nastaví prahové hodnoty Pokud máte předplacený tarif AdGuard DNS _Team_ nebo _Enterprise_, můžete požádat o vyšší limit. Postupujte podle následujících pokynů: 1. Přejděte na [Hlavní panel DNS](https://adguard-dns.io/dashboard/) → _Nastavení účtu_ → _Rychlostní limit_ + 2. Klepněte na _Požadavek na zvýšení limitu_, abyste kontaktovali náš tým zákaznické podpory a požádali o zvýšení limitu. Budete muset zadat svůj CIDR a limit, který chcete mít -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Váš požadavek bude přezkoumán během 1-3 pracovních dnů. O změnách vás budeme kontaktovat e-mailem +3. Váš požadavek bude přezkoumán během 1–3 pracovních dnů. O změnách vás budeme kontaktovat e-mailem diff --git a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 6685a0f5c..27353a710 100644 --- a/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/cs/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server a nastavení sidebar_position: 1 --- -## Co je to server a jak jej používat +## Co je server a jak jej používat Při nastavování Soukromého AdGuard DNS se setkáte s pojmem _servery_. diff --git a/i18n/da/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/da/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 8e285a389..ea0f59dd8 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ Se filen [`config.dist.yml`][dist] for et fuldstændigt eksempel på en [YAML][y - `size`: Den maksimale størrelse af DNS-resultatcachen som menneskelig læsbar datastørrelse. Den skal være større end nul, hvis `enabled` er `true`. - **Eks.:** `128 MB` + **Example:** `128MB` - `client_size`: Maks. størrelse på DNS-resultatcachen for hver opsat klients adresse eller undernetværk som menneskelig læsbar datastørrelse. Den skal være større end nul, hvis `enabled` er `true`. - **Eks.:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ Se filen [`config.dist.yml`][dist] for et fuldstændigt eksempel på en [YAML][y - 'timeout': Timeout for bootstrap DNS-forespørgsler som en menneskelig læsbar varighed. - **Eks.:** `2 s` + **Eks.:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/da/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/da/docusaurus-plugin-content-docs/current/general/dns-providers.md index 8dbdfa63c..5684403cb 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ Et åbent samarbejdsprojekt til fremme, implementering og udbredelse af [DNS-for | DNS-over-TLS | Udbyder: `Surfnet` Værtsnavn: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` og IPv6: `2001:610:1:40ba:145:100:185:15` | [Føj til AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Udbyder: `Surfnet` Værtsnavn: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` og IPv6: `2001:610:1:40ba:145:100:185:16` | [Føj til AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) er en fortrolighedsfokuseret DNS-tjeneste, der prioriterer brugersikkerhed og anonymitet. Den understøtter både standard DNS og krypterede protokoller, og opretholder samtidig en streng nul logning-politik. + +#### Standard + +| Protokol | Adresse | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Føj til AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Føj til AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Føj til AdGuard VPN](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Føj til AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Føj til AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Føj til AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Andre DNS-servere med nul logning-politik | Protokol | Adresse | | @@ -391,12 +406,13 @@ Disse servere bruger noget logning, selvsignerede certifikater eller ingen under [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) er en fortrolighedsvenlig DNS-udbyder med mange års erfaring inden for udvikling af domænenavnsopløsningstjenester, hvis formål er at give brugerne en hurtigere, mere præcis og stabil rekursiv opløsningstjeneste. -| Protokol | Adresse | | -| -------------- | --------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Føj til AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Føj til AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Føj til AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Føj til AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protokol | Adresse | | +| -------------- | ------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Føj til AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Føj til AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Føj til AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Føj til AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Føj til AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks hoster DNS-opløsere, som er i stand til at opløse båd ### momou! DNS -[momou! DNS](https://dns.momou.ch/) leverer DoH- og DoT-opløsere med tre filtreringsniveauer +[momou! DNS](https://dns.momou.ch/) leverer DoH- og DoT-opløsere med tre niveauer af filtrering #### Standard @@ -1252,3 +1268,11 @@ Disse servere tilbyder ingen adblocking, opbevarer ingen logfiler og har DNSSEC | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Føj til AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Føj til AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Føj til AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) er en DNS, med fokus på adblocking, fortrolighed, beskyttelse mod malware og med en striks nul logning-politik. + +| Protokol | Adresse | | +| --------- | --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Føj til AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Føj til AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/da/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/da/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 2d6e680a3..64d3396b7 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,24 +1,22 @@ - - - -title: Sådan opretter et eget DNS-stempel til Sikker DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - -Denne guide viser dig, hvordan et eget DNS-stempel til sikker DNS oprettes. Sikker DNS er en tjeneste, der forbedrer internetsikkerhed og fortrolighed ved at kryptere DNS-forespørgslerne. Dette forhindrer forespørgslerne i at blive opsnappet eller manipuleret af ondsindede aktører. +Denne guide viser, hvordan man opretter sit eget DNS-stempel til sikker DNS. Sikker DNS er en tjeneste, der forbedrer internetsikkerhed og fortrolighed ved at kryptere DNS-forespørgslerne. Dette forhindrer forespørgslerne i at blive opsnappet eller manipuleret af ondsindede aktører. -Sikker DNS bruger normalt `tls://`, `https://` eller `quic://` URL'er. Dette er tilstrækkeligt for de fleste brugere og er den anbefalede måde. +Sikker DNS bruger normalt `tls://`, `https://` eller `quic://` URL'er. Dette er for de fleste brugere tilstrækkeligt og er også den anbefalede måde. -Har man brug for yderligere sikkerhed, som f.eks. forudopløste server-IP'er og certifikat pinning med hash, kan man generere sit eget DNS-stempel. +Har man brug for yderligere sikkerhed, såsom præopløste server-IP'er og certifikat-pinning med hash, kan man generere sit eget DNS-stempel. ## Introduktion til DNS-stempler -DNS-stempler er korte strenge indeholdende alle de nødvendige oplysninger for at oprette forbindelse til en sikker DNS-server. De forenkler processen med at opsætte sikker DNS, da brugeren ikke behøver at angive alle disse data manuelt. +DNS-stempler er korte strenge indeholdende al nødvendig information for at oprette forbindelse til en sikker DNS-server. De forenkler processen med at opsætte sikker DNS, da brugeren ikke behøver at angive alle disse data manuelt. DNS-stempler muliggør tilpasning af Sikker DNS-indstillinger ud over de sædvanlige URL'er. De giver især mulighed for at angive faste (hard-koded) serveradresser, bruge certifikat-hashing mv. Disse funktioner gør DNS-stempler til en mere robust og alsidig mulighed til opsætning af Sikker DNS-indstillinger. ## Valg af protokol -Typer af Sikker DNS omfatter `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`og `DNS-over-TLS (DoT)` og en række andre. Valget af en af disse protokoller afhænger af brugskonteksten. +Typer af Sikker DNS omfatter `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`og `DNS-over-TLS (DoT)` og en række andre. Valget af en af disse protokoller afhænger af den aktuelle brugskontekst. ## Oprettelse af et DNS-stempel @@ -58,7 +56,7 @@ Typer af Sikker DNS omfatter `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`og `DN ### Indhentning af certifikat-hash -For at udfylde **hash'ene for serverens certifikat**-felt kan flg. kommando bruges, hvor ``, ``og `` erstattes med de korresponderende værdier for din DNS-server: +For at udfylde **hash'ene for serverens certifikatfelt** kan flg. kommando bruges, hvor man erstatter ``, `` og `` med de korresponderende værdier for sin DNS-server: ```bash echo | openssl s_client -connect : -servernavn 2>/dev/null | openssl x509 -outform der | openssl asn1parse -inform der -strparse 4 -noout -out - | openssl dgst -sha256 @@ -66,17 +64,17 @@ echo | openssl s_client -connect : -servernavn 2 :::caution -Resultatet af hash-kommandoen kan ændre sig over tid i takt med, at serverens certifikat opdateres. Holder DNS-stemplet derfor pludselig op holder op med at virke, skal certifikat-hash'en muligvis genberegnes og et nyt stempel genereres. Regelmæssig opdatering af DNS-stemplet vil medvirke til at sikre den fortsatte sikre drift af Sikker DNS-tjenesten. +Resultatet af hash-kommandoen kan ændre sig over tid i takt med, at servercertifikatet opdateres. Ophører DNS-stemplet derfor pludselig med at virke, skal certifikat-hash'en muligvis genberegnes og et nyt stempel genereres. Regelmæssig opdatering af DNS-stemplet vil medvirke til at sikre den fortsatte sikre drift af Sikker DNS-tjenesten. ::: ## Brug af DNS-stemplet -Du har nu dit eget DNS-stempel, som kan bruges til at opsætte Sikker DNS. Dette stempel kan angives i AdGuard og AdGuard VPN for forbedret internetfortrolighed og sikkerhed. +Man har nu sit eget DNS-stempel, som man kan bruge til at opsætte Sikker DNS. Dette stempel kan angives i AdGuard og AdGuard VPN for forbedret internetfortrolighed og -sikkerhed. ## Eksempel på oprettelse af et DNS-stempel -Lad os se på et eksempel på oprettelsen af et stempel til AdGuard DNS vha. DoT: +Lad os gennemgå et eksempel på oprettelsen af et stempel til AdGuard DNS vha. DoT: 1. Åbn [DNSCrypt Stamp Calculator](https://dnscrypt.info/stamps/). diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84ba0b094..cc559e0a1 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ Ses en notifikation om, at man ikke er forbundet til AdGuard DNS, er det mest sa ::: +## Brug EDNS (Udvidet DNS) + +EDNS udvider DNS-protokollen, hvilket muliggør større UDP-pakker til transport af yderligere data. I AdGuard DNS muliggør det at videregive DeviceID i almindelig DNS vha. en ekstra parameter. + +DeviceID, en otte-cifret hexadecimal identifikator (f.eks. `1a2b3c4d`), assisterer med at linke DNS-forespørgsler til specifikke enheder. Ved krypteret DNS, er denne ID en del af domænet (f.eks. `1a2b3c4d.d.adguard-dns.com`). Ved ukrypteret DNS, kræves EDNS for at overføre denne identifikator. + +AdGuard DNS bruger EDNS til at hente DeviceID ved at lede efter nummermuligheden `65074`. Hvis en sådan mulighed findes, læses DeviceID derfra. Til dette kan man bruge `dig`-kommandoen i terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Her er `65074` valgmuligheds-ID'en, og `3031323334353637` er dens værdi i hex format (DeviceID: `01234567`). + +Færdig! DeviceID skal vises. + +:::note + +`dig`-kommandoen er blot et eksempel, man kan bruge enhver DNS-software med evnen til at tilføje EDNS-muligheder for at udføre denne handling. + +::: + ## Brug almindelig DNS Foretrækker man ikke at bruge ekstra software til DNS-opsætning, kan der vælges ikke-krypteret DNS. Man har to valg: Brug linkede IP'er eller dedikerede IP'er: diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index a9d7b7760..c3d0dac87 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Har man et Team- eller Enterprise-abonnement, vil man modtage flere personlige d ## Hvorfor har man brug for en dedikeret IP? -Desværre tillader de tekniske specifikationer for den tilsluttede enhed ikke altid, at man kan opsætte en krypteret privat AdGuard DNS-server. I så tilfælde vil man skulle bruge standard ukrypteret DNS. Der er to måder at opsætte AdGuard DNS på: [Vha. linkede IP'er](/private-dns/connect-devices/other-options/linked-ip.md) og vha. dedikerede IP'er. +Desværre tillader de tekniske specifikationer for den tilsluttede enhed ikke altid, at man kan opsætte en krypteret Private AdGuard DNS-server. I så tilfælde vil man skulle bruge standard ukrypteret DNS. Der er to måder at opsætte AdGuard DNS på: [Vha. linkede IP'er](/private-dns/connect-devices/other-options/linked-ip.md) og vha. dedikerede IP'er. Dedikerede IP'er er generelt en mere stabil mulighed. Linket IP har nogle begrænsninger, såsom at kun private adresser er tilladt, udbyderen kan ændre IP'en, og man skal genlinke IP-adressen. Med dedikerede IP’er får man en IP-adresse, der er eksklusivt ens egen, og alle forespørgsler tælles for ens enhed. diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 68b96955c..0a5fb66ee 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ En **hjemme IP-adresse** tildeles en enhed, der er tilsluttet en privat ISP. Den ::: -Nogle gange kan en hjemme IP-adresse allerede være i brug, og forsøger man at tilslutte til den, vil AdGuard DNS forhindre forbindelsen. +Nogle gange kan en hjemme IP-adresse allerede være i brug, og forsøges den tilsluttet, forhindres dette af AdGuard DNS. + ![Linket IPv4-adresse \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -Sker dette, kontakt venligst supporten via [support@adguard-dns.io](mailto:support@adguard-dns.io), og de vil assistere med de korrekte opsætningsindstillinger. + +Sker dette, kontakt da supporten via [support@adguard-dns.io](mailto:support@adguard-dns.io), der så vil assistere med de korrekte opsætningsindstillinger. ## Sådan opsættes linket IP @@ -25,6 +27,7 @@ Den følgende vejledning forklarer, hvordan der forbindes til enheden via en **l 2. Tilføj en ny enhed, eller åbn indstillingerne for en tidligere tilsluttet enhed. 3. Gå til _Brug DNS-serveradresser_. 4. Åbn _Almindelige DNS-serveradresser_ og tilslut den linkede IP. + ![Linket IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamisk DNS: Hvorfor det er nyttigt @@ -44,14 +47,21 @@ På denne måde behøver man ikke manuelt at opdatere den tilknyttede IP-adresse ## Dynamisk DNS: Sådan opsættes det 1. Tjek først, om DDNS understøttes i routerindstillingerne: + - Gå til _Routerindstillinger_ → _Netværk_ - Find DDNS eller afsnittet _Dynamisk DNS_ - - Gå til dette og bekræft, at indstillingerne faktisk understøttes. _Dette er blot et eksempel på, hvordan det kan se ud. Det kan variere afhængigt af routeren_ - ![DDNS understøttet \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Gå til dette og bekræft, at indstillingerne faktisk understøttes. \*Dette er blot et eksempel på, hvordan det kan se ud, da indstillingerne kan variere fra router til router + + ![DDNS-understøttet \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Registrér domænet hos en populær tjeneste, såsom [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) eller en anden foretrukken DDNS-udbyder. + 3. Angiv domænet i routerindstillingerne og synk opsætningerne. + 4. Gå til Linket IP-indstillinger for at tilslutte adressen, gå derefter til _Avancerede indstillinger_ og klik på _Opsæt DDNS_. + 5. Angiv det domæne, man tidligere registrerede, og klik på _Opsæt DDNS_. + ![Opsæt DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Opsætningen af DDNS er hermed færdig! diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 6105b7a10..01e43f07b 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Om nødvendigt: Opsæt DNS-over-TLS på ASUS, installér på computeren [ASUS Me 2. Angiv routerens administratorbrugernavn (normalt admin) samt adgangskode. 3. Gå fra sidebjælken _Avancerede indstillinger_ til afsnittet _WAN_. 4. I afsnittet _WAN DNS-indstillinger_ sættes _Forbind til DNS-server automatisk_ til _Nej_. -5. Sæt _Videresend lokale forespørgsler_, _Aktivér DNS-genbinding_ og _Aktivér DNSSEC_ til _Nej_. +5. Sæt _Videresend lokale forespørgsler_, _Aktivér DNS-genbindingsbeskyttelse_ og _Aktivér DNSSEC_ til _Nej_. 6. Skift DNS-fortrolighedsprotokol til DNS-over-TLS (DoT). 7. Sørg for, at _DNS-over-TLS-profilen_ er sat til _Striks_. 8. Rul ned til afsnittet _DNS-over-TLS Serverliste_. Angiv i feltet _Adresse_ én af nedenstående adresser: @@ -32,11 +32,10 @@ Om nødvendigt: Opsæt DNS-over-TLS på ASUS, installér på computeren [ASUS Me 3. Åbn _Avancerede indstillinger_ eller _Avanceret_. 4. Vælg _WAN_ eller _Internet_. 5. Åbn _DNS-indstillinger_ eller _DNS_. -6. Vælg _Manuel DNS_. Vælg _Brug disse DNS-servere_ eller _Angiv DNS-server manuelt_, og angiv flg. DNS-serveradresser: +6. Vælg _Manuel indstilling_. Vælg _Brug disse DNS-servere_ eller _Angiv DNS-server manuelt_, og angiv flg. DNS-serveradresser: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Gem indstillingerne. 8. Tilslut IP'en (eller den dedikerede IP, hvis man har et Team-abonnement). - -- [Dedikerede IP'er](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linkede IP'er](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedikerede IP'er](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linkede IP'er](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 82603dbc5..47615293a 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routere er kendt for deres stabilitet og fleksible opsætninger, og der 5. Under _Værktøjer og tjenester_, vælg og installér DNS-over-HTTPS-proxy. 6. Gå til _Menu_ → _Netværksregler_ → _Internetsikkerhed_. 7. Gå til DNS-over-HTTPS-servere, og klik på Tilføj DNS-over-HTTPS server\*. -8. Angiv URL'en på den private AdGuard DNS-server i feltet `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Angiv URL'en på Private AdGuard DNS-serveren i feltet `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. 9. Klik på _Gem_. ## Opsæt DNS-over-TLS @@ -26,7 +26,7 @@ Keenetic routere er kendt for deres stabilitet og fleksible opsætninger, og der 5. Under _Værktøjer og tjenester_, vælg og installér DNS-over-HTTPS-proxy. 6. Gå til _Menu_ → _Netværksregler_ → _Internetsikkerhed_. 7. Gå til DNS-over-HTTPS-servere, og klik på Tilføj DNS-over-HTTPS server\*. -8. Angiv URL'en på den private AdGuard DNS-server i feltet `tls://*********.d.adguard-dns.com`. +8. Angiv URL'en på Private AdGuard DNS-serveren i feltet `tls://*********.d.adguard-dns.com`. 9. Klik på _Gem_. ## Brug routerens håndteringspanel diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 8f72eaf56..019ca6320 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routere bruger open-source RouterOS-operativsystemet, der leverer rutning, trådløst netværk og firewall-tjenester til hjemmenetværk og små kontorer. +MikroTik-routere bruger open-source operativsystemet RouterOS, der leverer rutning, trådløst netværk og firewall-tjenester til hjemmenetværk og mindre kontorer. ## Opsæt DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routere bruger open-source RouterOS-operativsystemet, der leverer rutni - `94.140.14.49` - `94.140.14.59` - Sæt _Tillad fjernforespørgsler_ til _Ja_ (dette er afgørende for, at DoH kan fungere) - - Angiv i feltet _Brug DoH-server_ URL'en til den private AdGuard DNS-server: `https://d.adguard-dns.com/dns-query/*******` + - Angiv i feltet _Brug DoH-server_ URL'en til Private AdGuard DNS-serveren: `https://d.adguard-dns.com/dns-query/*******` - Klik på _OK_ 4. Opret Statiske DNS-poster: - Klik i afsnittet _DNS-indstillinger_ på _Statisk_ - Klik på _Tilføj ny_ - - Sæt _Navn_ til d.adguard-dns.com - - Sæt _type_ til A + - Sæt _Navn_ til `d.adguard-dns.com` + - Sæt _Type_ til `A` - Sæt _Adresse_ til `94.140.14.49` - - Sæt _TTL_ til 1d 00:00:00 + - Sæt _TTL_ til `1d 00:00:00` - Gentag processen for at oprette en identisk post, men med _Adresse_ sat til `94.140.14.59` 5. Deaktivér Peer DNS på DHCP-klienten: - Gå til _IP_ → _DHCP-klient_ - Dobbeltklik klienten, der bruges til internetforbindelsen (normalt på WAN-grænsefladen) - Afmarkér _Anvend Peer DNS_ - Klik på _OK_ -6. Link IP'en. -7. Test og bekræft: +6. Test og bekræft: - MikroTik-routeren skal muligvis genstartes for at effektuere alle ændringer - Ryd webbrowserens DNS-cache. Der kan bruges et værktøj, såsom [https://www.dnsleaktest.com](https://www.dnsleaktest.com/), til at tjekke, om DNS-forespørgslerne nu rutes igennem AdGuard -## Brug routerens håndteringspanel +## Routeren understøtter ikke DNS-over-HTTPS -Brug denne vejledning, hvis Keenetic-routeren ikke understøtter opsætning af DNS-over-HTTPS eller DNS-over-TLS: +Brug denne vejledning, hvis MikroTik-routeren ikke understøtter opsætning af DNS-over-HTTPS: -1. Åbn routerens admin-panel. Den kan tilgås på `192.168.1.1` eller `192.168.0.1`. -2. Angiv routerens administratorbrugernavn (normalt admin) samt adgangskode. -3. Åbn _Webfig_ → _IP_ → _DNS_. -4. Vælg _Servere_ og angiv en af flg. DNS-serveradresser. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Gem indstillingerne. -6. Link IP'en (eller den dedikerede IP, hvis man har et Team-abonnement). - -- [Dedikerede IP'er](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linket IP'er](/private-dns/connect-devices/other-options/linked-ip.md) +1. Tilgå MikroTik-routeren: + - Åbn en webbrowser og gå til routerens IP-adresse (oftest `192.168.88.1`) + - Brug alternativt Winbox til at oprette forbindelse til MikroTik-routeren + - Angiv administratorbrugernavn og -adgangskode +2. Opsæt almindelig DNS: + - Gå til _IP_ → _DNS_ + - I afsnittet _Servere_, tilføj flg. AdGuard DNS-servere: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedikeret IPv6: Private AdGuard DNS understøtter dedikerede IPv6-adresser. For at finde dem, åbn Kontrolpanel, klik på _Indstillinger_ ved siden af enheden → _Almindelig DNS-serveradresser_ → _Dedikerede IPv6 adresser_. + - Klik på _OK_ +3. Deaktivér Peer DNS på DHCP-klienten: + - Gå til _IP_ → _DHCP-klient_ + - Dobbeltklik klienten, der bruges til internetforbindelsen (normalt på WAN-grænsefladen) + - Afmarkér _Anvend Peer DNS_ + - Klik på _OK_ diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 1632a82f0..4a0338e5d 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi-routere har mange fordele: Stabilt stærkt signal, netværkssikkerhed, stabil drift, intelligent håndtering. Brugeren kan ligeledes tilslutte op til 64 enheder til et lokalt Wi-Fi netværk. +Xiaomi-routere har mange fordele: Et stabilt, stærkt signal, netværkssikkerhed, robust ydeevne og intelligent håndtering. Brugere kan tilslutte op til 64 enheder til et lokalt Wi-Fi netværk. Desværre understøtter den ikke krypteret DNS, men den er fantastisk til opsætning af AdGuard DNS via linket IP. diff --git a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index dc0151ddf..f94fa2731 100644 --- a/i18n/da/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/da/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS-forespørgselskvote fungerer typisk ved at sætte grænser for antallet af f Abonnerer man på en AdGuard DNS _Team_ eller _Enterprise_ abonnementstype, kan man anmode om en højere forespørgselskvote. Følg vejledningen nedenfor for at gøre dette: 1. Gå til [DNS-kontrolpanel](https://adguard-dns.io/dashboard/) → _Konto indstillinger_ → _Forespørgselskvote_ + 2. Tryk på _Anmod om en forespørgselskvoteforøgelse_ for at kontakte vores supportteam og ansøge om forespørgselskvoteforøgelsen. Man skal angive sin CIDR samt den kvote, man ønsker -![Forespørgselskvote](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Forespørgselskvote](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Forespørgslen gennemgås inden for 1-3 arbejdsdage. Man vil blive kontakte vedr. ændringerne via e-mail +3. Forespørgslen gennemgås inden for 1–3 arbejdsdage. Information om ændringerne vil ske pr. e-mail diff --git a/i18n/de/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/de/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a257209f1..79cb72066 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ Das Objekt `cache` konfiguriert das Zwischenspeichern der Ergebnisse von DNS-Abf - `size`: Die maximale Größe des DNS-Ergebnis-Caches als für den Nutzer erfassbare Datengröße. Sie muss größer als Null sein, wenn `enabled` auf `true` steht. - **Beispiel:** `128 MB` + **Example:** `128MB` - `client_size`: Die maximale Größe des DNS-Ergebnis-Caches für die Adresse oder das Subnetz eines jeden konfigurierten Clients in Form von für den Nutzer erfassbaren Daten. Sie muss größer als Null sein, wenn `enabled` auf `true` steht. - **Beispiel:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ Das Objekt `bootstrap` konfiguriert die Auflösung von [upstream](#dns-upstream) - `timeout`: Die Zeitüberschreitung für Bootstrap-DNS-Anfragen in einer für den Nutzer erfassbaren Dauer. - **Beispiel:** `2 s` + **Beispiel:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/de/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/de/docusaurus-plugin-content-docs/current/general/dns-providers.md index bf096700a..97b81fb2c 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ Ein gemeinschaftliches offenes Projekt zur Förderung, Implementierung und Berei | DNS-over-TLS | Anbieter: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` und IPv6: `2001:610:1:40ba:145:100:185:15` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Anbieter: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` und IPv6: `2001:610:1:40ba:145:100:185:16` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protokoll | Adresse | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Andere DNS-Server mit No-Logging-Richtlinie | Protokoll | Adresse | | @@ -391,12 +406,13 @@ Diese Server verwenden einige Protokollierung, selbstsignierte Zertifikate oder [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) ist ein datenschutzfreundlicher DNS-Anbieter mit jahrelanger Erfahrung in der Entwicklung von Auflösungsdiensten für Domainnamen. Sein Ziel ist es, einen schnelleren, genaueren und stabileren rekursiven Auflösungsdienst zu bieten. -| Protokoll | Adresse | | -| -------------- | --------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=119.29.29.29&name=), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=2402:4e00::&name=), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protokoll | Adresse | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=119.29.29.29&name=), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=2402:4e00::&name=), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks hostet DNS-Resolver, die in der Lage sind, sowohl OpenNI ### momou! DNS -[momou! DNS](https://dns.momou.ch/) bietet DoH und DoT-Resolver mit drei Filterungsstufen +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ Diese Server sperren keine Werbung, führen keine Protokolle und DNSSEC ist akti ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) sperrt über 140.000 Werbe-, Werbe-Tracking, Malware und Phishing-Domains. Keine Protokollierung, kein ECS, DNSSEC-Validierung, kostenlos! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. Keine Protokollierung, kein ECS, DNSSEC-Validierung, kostenlos! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ Diese Server sperren keine Werbung, führen keine Protokolle und DNSSEC ist akti ### Seby DNS -[Seby DNS](https://dns.seby.io/) ist ein auf Datenschutz ausgerichteter DNS-Dienst, der von Sebastian Schmidt bereitgestellt wird. Keine Protokollierung, DNSSEC-Validierung. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ Diese Server sperren keine Werbung, führen keine Protokolle und DNSSEC ist akti ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) ist ein privater DNS-Server mit Sitz in Vietnam, der für den privaten und kleinen Gebrauch gedacht ist. Er bietet Werbeblocker, Schutz vor Malware/Phishing, Filter für nicht jugendfreie Inhalte und DNSSEC-Validierung. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. Er bietet Werbeblocker, Schutz vor Malware/Phishing, Filter für nicht jugendfreie Inhalte und DNSSEC-Validierung. | Protokoll | Adresse | | | -------------- | --------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ Diese Server sperren keine Werbung, führen keine Protokolle und DNSSEC ist akti | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Zu AdGuard hinzufügen](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Zu AdGuard VPN hinzufügen](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protokoll | Adresse | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/de/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/de/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index e2a6823ba..a0194f208 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,24 +1,22 @@ - - - -title: So erstellen Sie Ihren eigenen DNS-Stempel für Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - -Diese Anleitung zeigt Ihnen, wie Sie Ihren eigenen DNS-Stempel für Secure DNS erstellen. Secure DNS ist ein Dienst, der Ihre Internetsicherheit und Ihren Privatsphäre verbessert, indem er Ihre DNS-Anfragen verschlüsselt. Dadurch wird verhindert, dass Ihre Abfragen von böswilligen Akteuren abgefangen oder manipuliert werden. +This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. -Sicheres DNS verwendet in der Regel `tls://`, `https://`, oder `quic://` URLs. Dies ist für die meisten Benutzer ausreichend und wird empfohlen. +Secure DNS usually uses `tls://`, `https://`, or `quic://` URLs. This is sufficient for most users and is the recommended way. -Wenn Sie jedoch zusätzliche Sicherheit benötigen, wie z. B. vorab aufgelöste Server-IPs und Zertifikats-Pinning durch Hash, können Sie Ihren eigenen DNS-Stempel erzeugen. +However, if you need additional security, like pre-resolved server IPs and certificate pinning by hash, you may generate your own DNS stamp. ## Einführung in DNS-Stempel -DNS-Stempel sind kurze Zeichenfolgen, die alle Informationen enthalten, die für die Verbindung mit einem sicheren DNS-Server erforderlich sind. Sie vereinfachen die Einrichtung von Secure DNS, da der Benutzer nicht alle Daten manuell eingeben muss. +DNS stamps are short strings that contain all the information needed to connect to a secure DNS server. They simplify the process of setting up Secure DNS as the user does not need to manually enter all this data. -DNS-Stempel ermöglichen es Ihnen, die Secure DNS-Einstellungen über die üblichen URLs hinaus anzupassen. Sie ermöglichen insbesondere die Angabe von fest kodierten Serveradressen, die Verwendung von Zertifikathashing und so weiter. Diese Funktionen machen DNS-Stempel zu einer robusten und vielseitigen Option für die Konfiguration von Secure DNS-Einstellungen. +DNS stamps allow you to customize Secure DNS settings beyond the usual URLs. In particular, they allow you to specify hard-coded server addresses, use certificate hashing, and so on. These features make DNS stamps a more robust and versatile option for configuring Secure DNS settings. ## Auswahl des Protokolls -Zu den Arten von Secure DNS gehören `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)` und einige andere. Die Wahl eines dieser Protokolle hängt von dem Kontext ab, in dem Sie sie verwenden werden. +Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, and some others. Choosing one of these protocols depends on the context in which you'll be using them. ## Erstellen eines DNS-Stempels @@ -58,7 +56,7 @@ Zu den Arten von Secure DNS gehören `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ ### Abrufen des Zertifikats-Hashes -Um das Feld **Zertifikat-Hashes des Servers** auszufüllen, können Sie den folgenden Befehl verwenden, wobei Sie ``, `` und `` durch die entsprechenden Werte für Ihren DNS-Server ersetzen: +To fill in the **Hashes of the server's certificate** field, you can use the following command, replacing ``, ``, and `` with the corresponding values for your DNS server: ```bash echo | openssl s_client -connect : -servername 2>/dev/null | openssl x509 -outform der | openssl asn1parse -inform der -strparse 4 -noout -out - | openssl dgst -sha256 @@ -66,17 +64,17 @@ echo | openssl s_client -connect : -servername 2 :::caution -Das Ergebnis des Hash-Befehls kann sich im Laufe der Zeit ändern, wenn das Zertifikat des Servers aktualisiert wird. Wenn also Ihr DNS-Stempel plötzlich nicht mehr funktioniert, müssen Sie möglicherweise den Hash des Zertifikats neu berechnen und einen neuen Stempel erstellen. Die regelmäßige Aktualisierung Ihres DNS-Stempels trägt dazu bei, den sicheren Betrieb Ihres Secure DNS-Dienstes zu gewährleisten. +The result of the hash command may change over time as the server's certificate is updated. Therefore, if your DNS stamp suddenly stops working, you may need to recalculate the hash of the certificate and generate a new stamp. Regularly updating your DNS stamp will help ensure the continued secure operation of your Secure DNS service. ::: ## Verwendung des DNS-Stempels -Sie haben nun Ihren eigenen DNS-Stempel, den Sie zur Einrichtung von Secure DNS verwenden können. Dieser Stempel kann in AdGuard und AdGuard VPN eingegeben werden, um den Datenschutz und die Sicherheit im Internet zu verbessern. +You now have your own DNS stamp that you can use to set up Secure DNS. This stamp can be entered into AdGuard and AdGuard VPN for enhanced internet privacy and security. ## Beispiel für die Erstellung eines DNS-Stempels -Lassen Sie uns ein Beispiel für die Erstellung eines Stempels für AdGuard DNS mit DoT durchgehen: +Let's go through an example of creating a stamp for AdGuard DNS using DoT: 1. Öffnen Sie den [DNSCrypt Stamp Calculator](https://dnscrypt.info/stamps/) (DNSCrypt-Stempel-Rechner). diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 01c84b770..0d8416ae0 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ Hier finden Sie Anweisungen, wie Sie Ihr Gerät mit AdGuard DNS verbinden und me Für Geräte, die verschlüsselte DNS-Protokolle nicht nativ unterstützen, bieten wir drei weitere Optionen an: - [AdGuard DNS Client](/dns-client/overview.md) -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) Wenn Sie den Zugriff auf AdGuard DNS auf bestimmte Geräte beschränken möchten, verwenden Sie [DNS-over-HTTPS mit Authentifizierung](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index b77dcd681..eaa7977d9 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Konfigurieren Sie Ihre Spielkonsole so, dass sie einen Öffentlichen AdGuard DNS Es wäre vorzuziehen, eine verknüpfte IP zu verwenden (oder eine dedizierte IP, wenn Sie ein Team-Abonnement haben): -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 9f6e7ee6f..e8775c298 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Konfigurieren Sie Ihre Spielkonsole so, dass sie einen Öffentlichen AdGuard DNS Es wäre vorzuziehen, eine verknüpfte IP zu verwenden (oder eine dedizierte IP, wenn Sie ein Team-Abonnement haben): -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 1d085433c..113a16996 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Konfigurieren Sie Ihre Spielkonsole so, dass sie einen Öffentlichen AdGuard DNS Es wäre vorzuziehen, eine verknüpfte IP zu verwenden (oder eine dedizierte IP, wenn Sie ein Team-Abonnement haben): -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index 72853ca0e..bd6ef955f 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ Konfigurieren Sie Ihre Spielkonsole so, dass sie einen Öffentlichen AdGuard DNS Es wäre vorzuziehen, eine verknüpfte IP zu verwenden (oder eine dedizierte IP, wenn Sie ein Team-Abonnement haben): -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index f68b02846..1b9a46086 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Konfigurieren Sie Ihre Spielkonsole so, dass sie einen Öffentlichen AdGuard DNS Es wäre vorzuziehen, eine verknüpfte IP zu verwenden (oder eine dedizierte IP, wenn Sie ein Team-Abonnement haben): -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 1c7191781..697ec8c12 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Nicht alle VPN-Dienste unterstützen verschlüsseltes DNS. Unser VPN jedoch scho ![DNS-Server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Blättern Sie nach unten und tippen Sie auf _Benutzerdefinierten DNS-Server hinzufügen_. ![DNS-Server hinzufügen \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Kopieren Sie eine der folgenden DNS-Adressen und fügen Sie sie in das Feld _DNS-Serveradressen_ in der App ein. Wenn Sie nicht sicher sind, welche Sie verwenden sollen, wählen Sie DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. Wenn Sie nicht sicher sind, welche Sie verwenden sollen, wählen Sie DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Benutzerdefinierter DNS-Server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tippen Sie auf _Speichern und auswählen_. @@ -75,5 +75,5 @@ Sie können Ihren DNS-Server in den Geräteeinstellungen konfigurieren. Bitte be Wenn Sie keine zusätzliche Software für die DNS-Konfiguration verwenden möchten, können Sie sich für unverschlüsseltes DNS entscheiden. Sie haben zwei Optionen: Verknüpfte IPs oder dedizierte IPs verwenden. -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index 7b7593d78..c2a0abfbb 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ Wenn Sie ein VPN verwenden, wird das Konfigurationsprofil ignoriert. Wenn Sie keine zusätzliche Software für die DNS-Konfiguration verwenden möchten, können Sie sich für unverschlüsseltes DNS entscheiden. Sie haben zwei Möglichkeiten: Verknüpfte IPs oder dedizierte IPs zu verwenden. -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 9bec6f771..dbd03f459 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ Sie können Privates AdGuard DNS mithilfe AdGuard VPN CLI (Befehlszeilenschnitts 9. Schalten Sie den _Auto-Modus_ aus. 10. Klicken Sie auf _Übernehmen_. 11. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben): - - [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Manuell auf Debian konfigurieren (verknüpfte IP oder dedizierte IP erforderlich) @@ -61,8 +61,8 @@ Sie können Privates AdGuard DNS mithilfe AdGuard VPN CLI (Befehlszeilenschnitts 10. Drücken Sie _Eingabe_. 11. Schließen Sie das Terminal. 12. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben): - - [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## dnsmasq verwenden @@ -102,9 +102,31 @@ Wenn Sie eine Benachrichtigung sehen, dass Sie nicht mit AdGuard DNS verbunden s ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +Fertig! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Einfaches DNS verwenden Wenn Sie keine zusätzliche Software für die DNS-Konfiguration verwenden möchten, können Sie sich für unverschlüsseltes DNS entscheiden. Sie haben zwei Optionen: Verknüpfte IPs oder dedizierte IPs verwenden: -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 8322fbbd8..ab14f27c1 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ Fertig! Ihr Gerät ist erfolgreich mit AdGuard DNS verbunden. Wenn Sie keine zusätzliche Software für die DNS-Konfiguration verwenden möchten, können Sie sich für unverschlüsseltes DNS entscheiden. Sie haben zwei Optionen: Verknüpfte IPs oder dedizierte IPs verwenden. -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 7698cadf4..b6cc9f5ae 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ Weitere Details finden Sie in einem [anderen Artikel](/dns-client/overview/). Wenn Sie keine zusätzliche Software für die DNS-Konfiguration verwenden möchten, können Sie sich für unverschlüsseltes DNS entscheiden. Sie haben zwei Optionen: Verknüpfte IPs oder dedizierte IPs verwenden. -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 26101279a..b5f16a979 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Wenn Sie ein Team- oder Enterprise-Abonnement haben, erhalten Sie mehrere persö ## Warum benötigen Sie eine dedizierte IP? -Leider erlauben die technischen Spezifikationen des angeschlossenen Geräts möglicherweise nicht immer, einen verschlüsselten privaten AdGuard DNS-Server einzurichten. In diesem Fall müssen Sie standardmäßiges unverschlüsseltes DNS verwenden. Es gibt zwei Möglichkeiten, AdGuard DNS einzurichten: [verknüpfte IPs verwenden](/private-dns/connect-devices/other-options/linked-ip.md) und dedizierte IPs verwenden. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In diesem Fall müssen Sie standardmäßiges unverschlüsseltes DNS verwenden. Es gibt zwei Möglichkeiten, AdGuard DNS einzurichten: [verknüpfte IPs verwenden](/private-dns/connect-devices/other-options/linked-ip.md) und dedizierte IPs verwenden. Dedizierte IP-Adressen sind im Allgemeinen eine stabilere Option. Für verknüpfte IP-Adressen gelten einige Einschränkungen, z. B. sind nur Wohnadressen zulässig. Ihr Anbieter kann die IP-Adresse ändern und Sie müssen die IP-Adresse erneut verknüpfen. Mit dedizierten IPs erhalten Sie eine IP-Adresse, die ausschließlich Ihnen gehört, und alle Anfragen werden für Ihr Gerät gezählt. diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index a5aca9798..27a30ffe3 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ Eine **Wohnsitz-IP-Adresse** wird einem Gerät zugewiesen, das mit einem örtlic ::: -Manchmal könnte eine Wohnsitz-IP-Adresse bereits verwendet werden, und falls Sie versuchen, eine Verbindung herzustellen, wird AdGuard DNS die Verbindung verhindern. -![Verknüpfte IPv4-Adresse \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -Falls dies passiert, wenden Sie sich bitte an den Support unter [support@adguard-dns.io](mailto:support@adguard-dns.io), und sie werden Ihnen mit den richtigen Konfigurationseinstellungen weiterhelfen. +Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + +![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## So richten Sie eine verknüpfte IP ein @@ -25,6 +27,7 @@ Die folgenden Anweisungen erklären, wie Sie eine Verbindung zum Gerät über ei 2. Fügen Sie ein neues Gerät hinzu oder öffnen Sie die Einstellungen eines zuvor verbundenen Geräts. 3. Gehen Sie zu _DNS-Serveradressen verwenden_. 4. Öffnen Sie _Einfache DNS-Serveradressen_ und verbinden Sie die verknüpfte IP. + ![Verknüpfte IP-Adresse \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamisches DNS: Warum es nützlich ist @@ -44,14 +47,21 @@ Auf diese Weise müssen Sie die zugehörige IP-Adresse nicht jedes Mal manuell a ## Dynamisches DNS: So richten Sie es ein 1. Zuerst müssen Sie überprüfen, ob DDNS von Ihren Router-Einstellungen unterstützt wird: + - Öffnen Sie _Router-Einstellungen_ → _Netzwerk_ - Suchen Sie den Abschnitt DDNS oder _Dynamic DNS_ - - Wechseln Sie dorthin und überprüfen Sie, ob die Einstellungen tatsächlich unterstützt werden. _Dies ist nur ein Beispiel, wie es aussehen könnte. Dies kann je nach Router variieren_ - ![DDNS unterstützt \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Wechseln Sie dorthin und überprüfen Sie, ob die Einstellungen tatsächlich unterstützt werden. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Registrieren Sie Ihre Domain bei einem beliebten Service wie [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) oder einem anderen DDNS-Anbieter Ihrer Wahl. + 3. Geben Sie die Domain in die Router-Einstellungen ein und synchronisieren Sie die Konfigurationen. + 4. Gehen Sie zu den Einstellungen der Verknüpften IP, um die Adresse zu verbinden, navigieren Sie dann zu _Erweiterte Einstellungen_ und klicken Sie auf _DDNS konfigurieren_. + 5. Geben Sie die Domain ein, die Sie zuvor registriert haben, und klicken Sie auf _DDNS konfigurieren_. + ![DDNS konfigurieren \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Fertig! Sie haben DDNS erfolgreich eingerichtet! diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 84fae6f93..60abc9bfa 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Falls notwendig: Konfigurieren Sie DNS-over-TLS auf ASUS, installieren Sie die [ 2. Geben Sie den Benutzernamen des Administrators (in der Regel admin) und das Passwort des Routers ein. 3. Navigieren Sie in der Seitenleiste „Erweiterte Einstellungen“ zum Abschnitt „WAN“. 4. Setzen Sie im Abschnitt _WAN-DNS-Einstellungen_ die Option _Automatisch mit DNS-Server verbinden_ auf _Nein_. -5. Setzen Sie _Lokale Abfragen weiterleiten_, _DNS-Rebind aktivieren_ und _DNSSEC aktivieren_ auf _Nein_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Ändern Sie das DNS-Datenschutzprotokoll in „DNS-over-TLS (DoT)“. 7. Stellen Sie sicher, dass das _DNS-over-TLS-Profil_ auf _Streng_ eingestellt ist. 8. Blättern Sie nach unten zum Abschnitt _DNS-over-TLS-Serverliste_. Geben Sie im Feld _Adresse_ eine der folgenden Adressen ein: @@ -32,11 +32,10 @@ Falls notwendig: Konfigurieren Sie DNS-over-TLS auf ASUS, installieren Sie die [ 3. Öffnen Sie _Erweiterte Einstellungen_ oder _Erweitert_. 4. Wählen Sie _WAN_ oder _Internet_. 5. Öffnen Sie _DNS-Einstellungen_ oder _DNS_. -6. Wählen Sie _Manuelles DNS_. Wählen Sie _Diese DNS-Server verwenden_ oder _DNS-Server manuell angeben_ und geben Sie die folgenden DNS-Serveradressen ein: +6. Choose _Manual Setting_. Wählen Sie _Diese DNS-Server verwenden_ oder _DNS-Server manuell angeben_ und geben Sie die folgenden DNS-Serveradressen ein: - IPv4: `94.140.14.49` und `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` und `2a10:50c0:0:0:0:0:dad:ff` 7. Speichern Sie die Einstellungen. 8. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). - -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 18f6c57b8..9dcd85b87 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Verwenden Sie diese Anleitung, wenn Ihr FritzBox-Router keine DNS-over-TLS-Konfi 6. Speichern Sie die Einstellungen. 7. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index c0e4e1cbd..f55e24ccf 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic-Router sind bekannt für ihre Stabilität und flexible Konfigurationen 5. Wählen Sie unter _Dienstprogramme und Dienste_ den DNS-over-HTTPS-Proxy aus und installieren Sie ihn. 6. Wechseln Sie zu _Menü_ → _Netzwerkregeln_ → _Internetsicherheit_. 7. Navigieren Sie zu DNS-over-HTTPS-Servern und klicken Sie auf _DNS-over-HTTPS-Server hinzufügen_. -8. Geben Sie die URL des Private AdGuard DNS-Servers in das Feld `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` ein. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Klicken Sie auf _Speichern_. ## DNS-over-TLS konfigurieren @@ -26,7 +26,7 @@ Keenetic-Router sind bekannt für ihre Stabilität und flexible Konfigurationen 5. Wählen Sie unter _Dienstprogramme und Dienste_ den DNS-over-HTTPS-Proxy aus und installieren Sie ihn. 6. Wechseln Sie zu _Menü_ → _Netzwerkregeln_ → _Internetsicherheit_. 7. Navigieren Sie zu DNS-over-HTTPS-Servern und klicken Sie auf _DNS-over-HTTPS-Server hinzufügen_. -8. Geben Sie die URL des Privaten AdGuard DNS-Servers in das Feld `tls://*********.d.adguard-dns.com` ein. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Klicken Sie auf _Speichern_. ## Administrationsoberfläche Ihres Routers verwenden @@ -44,5 +44,5 @@ Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- 7. Speichern Sie die Einstellungen. 8. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 9cf63a3e6..e7ef35c10 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik-Router verwenden das Open-Source-Betriebssystem RouterOS, das Routing, drahtlose Netzwerke und Firewall-Dienste für Heim- und Kleinbüronetzwerke bereitstellt. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## DNS-over-HTTPS konfigurieren @@ -23,38 +23,42 @@ MikroTik-Router verwenden das Open-Source-Betriebssystem RouterOS, das Routing, - `94.140.14.49` - `94.140.14.59` - Setzen Sie _Allow Remote Requests_ auf _Yes_ (dies ist entscheidend für das Funktionieren von DNS-over-HTTPS) - - Geben Sie im Feld _DoH-Server verwenden_ die URL des privaten AdGuard DNS-Servers ein: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Klicken Sie auf _OK_ 4. Statische DNS-Einträge erstellen: - Klicken Sie in den _DNS-Einstellungen_ auf _Statisch_ - Klicken Sie auf _Hinzufügen_ - - Setzen Sie _Name_ auf d.adguard-dns.com - - Setzen Sie _Type_ auf A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Setzen Sie _Address_ auf `94.140.14.49` - - Setzen Sie _TTL_ auf 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Wiederholen Sie den Vorgang, um einen identischen Eintrag zu erstellen, aber mit _Address_ auf `94.140.14.59` gesetzt 5. Peer-DNS auf dem DHCP-Client deaktivieren: - Öffnen Sie _IP_ → _DHCP-Client_ - Doppelklicken Sie auf den Client, der für Ihre Internetverbindung verwendet wird (normalerweise auf der WAN-Schnittstelle) - Deaktivieren Sie _Peer DNS verwenden_ - Klicken Sie auf _OK_ -6. Ihre IP-Adresse verknüpfen. -7. Testen und überprüfen: - - Möglicherweise müssen Sie Ihren MikroTik-Router neu starten, damit alle Änderungen wirksam werden - - Leeren Sie den DNS-Cache Ihres Browsers. Sie können ein Tool wie [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) verwenden, um zu prüfen, ob Ihre DNS-Anfragen jetzt über AdGuard geleitet werden +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Administrationsoberfläche Ihres Routers verwenden +## My router does not support DNS-over-HTTPS -Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- oder DNS-over-TLS-Konfiguration unterstützt: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Öffnen Sie das Router-Admin-Panel. Es ist zugänglich unter `192.168.1.1` oder `192.168.0.1`. -2. Geben Sie den Benutzernamen des Administrators (in der Regel admin) und das Passwort des Routers ein. -3. Öffnen Sie _Webfig_ → _IP_ → _DNS_. -4. Wählen Sie _Server_ und geben Sie eine der folgenden DNS-Serveradressen ein. - - IPv4: `94.140.14.49` und `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` und `2a10:50c0:0:0:0:0:dad:ff` -5. Speichern Sie die Einstellungen. -6. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). - -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Aufrufen der MikroTik-Router-Einstellungen: + - Öffnen Sie Ihren Browser und rufen Sie die IP-Adresse Ihres Routers auf (normalerweise `192.168.88.1`) + - Sie können auch Winbox verwenden, um eine Verbindung zu Ihrem MikroTik-Router herzustellen + - Geben Sie den Benutzernamen und das Passwort des Administrators ein +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` und `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` und `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Peer-DNS auf dem DHCP-Client deaktivieren: + - Go to _IP_ → _DHCP Client_ + - Doppelklicken Sie auf den Client, der für Ihre Internetverbindung verwendet wird (normalerweise auf der WAN-Schnittstelle) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index 587b0348e..92ce32a34 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- 8. Speichern Sie die Einstellungen. 9. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index c21a77d0f..2c523ab72 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- 8. Optional können Sie DNSSEC aktivieren, um die Sicherheit zu erhöhen. 9. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index b2cd151c5..f52d57979 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- 7. Speichern Sie die Einstellungen. 8. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [Verknüpfte IPs](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index 1d724b0b9..a0e0f6753 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Hier sind einige allgemeine Anweisungen zur Einrichtung von Private AdGuard DNS 5. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 5db6b59e9..33fd16954 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi-Router haben viele Vorteile: Stabiles starkes Signal, Netzwerksicherheit, stabile Funktion, intelligente Verwaltung. Gleichzeitig kann man bis zu 64 Geräte mit dem lokalen WLAN verbinden. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Leider unterstützen diese Router kein verschlüsseltes DNS, eignen sich aber gut für die Einrichtung von AdGuard DNS über verknüpfte IPs. @@ -21,5 +21,5 @@ Verwenden Sie diese Anweisungen, wenn Ihr Keenetic-Router keine DNS-over-HTTPS- 6. Speichern Sie die Einstellungen. 7. Verknüpfen Sie Ihre IP-Adresse (oder Ihre dedizierte IP, falls Sie ein Team-Abonnement haben). -- [Dedizierte IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Verknüpfte IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 417d75933..eb0a6b818 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ Die DNS-Ratenbegrenzung funktioniert in der Regel, indem Schwellenwerte für die Wenn Sie das AdGuard DNS _Team_- oder _Enterprise_-plan abonniert haben, können Sie ein höheres Anfragelimit beantragen. Befolgen Sie dazu bitte die nachstehenden Anweisungen: 1. Wechseln Sie zu [DNS-Übersicht](https://adguard-dns.io/dashboard/) → _Einstellungen_ → _Anfragelimit_ + 2. Tippen Sie auf _Anfragen pro Sekunde erhöhen_, um unser Support-Team zu kontaktieren und die Erhöhung der Datenstrombegrenzung zu beantragen. Sie müssen Ihre CIDR und den gewünschten Grenzwert angeben -![Ratenbegrenzung](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Ihr Antrag wird innerhalb von 1-3 Arbeitstagen bearbeitet. Wir werden Sie per E-Mail über die Änderungen informieren +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index b322b5c39..80f2d2ec5 100644 --- a/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/de/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server und Einstellungen sidebar_position: 1 --- -## Was ein Server ist und wie man ihn benutzt +## What is a server and how to use it Wenn Sie Privates AdGuard DNS einrichten, werden Sie auf den Begriff _Server_ stoßen. diff --git a/i18n/es/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/es/docusaurus-plugin-content-docs/current/dns-client/configuration.md index b042de29e..11c1787dd 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/es/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/es/docusaurus-plugin-content-docs/current/general/dns-providers.md index 1397873b4..3acda66bb 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocolo | Dirección | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocolo | Dirección | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocolo | Dirección | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocolo | Dirección | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocolo | Dirección | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocolo | Dirección | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/es/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/es/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 8dc74cf08..a124b88ca 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ En esta sección encontrarás instrucciones sobre cómo conectar tu dispositivo Para dispositivos que no admiten nativamente protocolos DNS encriptados, ofrecemos tres otras opciones: - [Cliente AdGuard DNS](/dns-client/overview.md) -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) Si deseas restringir el acceso a AdGuard DNS a ciertos dispositivos, utiliza [DNS-over-HTTPS con autenticación](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 350dbf1aa..5caf04655 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Configura tu consola de juegos para usar un servidor DNS público de AdGuard o c Sería preferible usar IP vinculada (o IP dedicada si tienes una suscripción de Team): -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index ddfbd13f7..6d6e6cac5 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Configura tu consola de juegos para usar un servidor DNS público de AdGuard o c Sería preferible usar IP vinculada (o IP dedicada si tienes una suscripción de Team): -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index f732686a8..51d7ef6f5 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Configura tu consola de juegos para usar un servidor DNS público de AdGuard o c Sería preferible usar IP vinculada (o IP dedicada si tienes una suscripción de Team): -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index f04cb6975..ac1c50a27 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ Configura tu consola de juegos para usar un servidor DNS público de AdGuard o c Sería preferible usar IP vinculada (o IP dedicada si tienes una suscripción de Team): -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 9e3560041..bf9a211ac 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Configura tu consola de juegos para usar un servidor DNS público de AdGuard o c Sería preferible usar IP vinculada (o IP dedicada si tienes una suscripción de Team): -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index dffe38a2d..a25431756 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ No todos los servicios VPN soportan DNS cifrado. Sin embargo, nuestro VPN sí lo ![Servidor DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Desplázate hacia abajo y toca _Añadir un servidor DNS personalizado_. ![Añadir un servidor DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copia una de las siguientes direcciones DNS y pégala en el campo _Direcciones de servidores DNS_ en la aplicación. Si no estás seguro de cuál usar, selecciona DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. Si no estás seguro de cuál usar, selecciona DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Servidor DNS personalizado \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Toca _Guardar y seleccionar_. @@ -75,5 +75,5 @@ Puedes configurar tu servidor DNS en la configuración de tu dispositivo. Ten en Si prefieres no usar software adicional para la configuración de DNS, puedes optar por DNS no encriptado. Tienes dos opciones: usar IPs vinculadas o IPs dedicadas. -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index b7dc24296..dd968f4b0 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ Si estás usando un VPN, el perfil de configuración será ignorado. Si prefieres no usar software adicional para configurar DNS, puedes optar por DNS sin cifrado. Hay dos opciones: usar IPs vinculadas o IPs dedicadas. -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index b5435b6d7..935d6b870 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ Puedes configurar AdGuard DNS privado utilizando el AdGuard VPN CLI (interfaz de 9. Desactiva _Modo automático_. 10. Haz clic en _Aplicar_. 11. Vincula tu dirección IP (o tu IP dedicada si tienes una suscripción a Team): - - [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Configura manualmente en Debian (se requiere IP vinculada o IP dedicada) @@ -61,8 +61,8 @@ Puedes configurar AdGuard DNS privado utilizando el AdGuard VPN CLI (interfaz de 10. Presiona _Enter_. 11. Cierra el Terminal. 12. Vincula tu dirección IP (o tu IP dedicada si tienes una suscripción a Team): - - [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Usar dnsmasq @@ -102,9 +102,31 @@ Nota: Si ves una notificación que indica que no estás conectado a AdGuard DNS, ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +¡Todo listo! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Usar DNS simple Si prefieres no usar software adicional para la configuración de DNS, puedes optar por DNS no encriptado. Tienes dos opciones: usar IPs vinculadas o IPs dedicadas: -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index ebf45ee9f..d3d54bf0a 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ Si estás usando un VPN, el perfil de configuración será ignorado. Si prefieres no usar software adicional para la configuración de DNS, puedes optar por DNS no encriptado. Tienes dos opciones: usar IPs vinculadas o IPs dedicadas. -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 9a05fcd49..738b1ceb6 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ Más detalles se pueden encontrar en [otro artículo](/dns-client/overview/). Si prefieres no usar software adicional para la configuración de DNS, puedes optar por DNS no encriptado. Tienes dos opciones: usar IPs vinculadas o IPs dedicadas. -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index ca4f628ca..2712742df 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Si tienes una suscripción de Equipo o Empresa, recibirás varias direcciones IP ## ¿Por qué necesitas una IP dedicada? -Desafortunadamente, las especificaciones técnicas del dispositivo conectado pueden no permitirte configurar un servidor DNS privado AdGuard cifrado. En este caso, tendrás que usar DNS estándar no cifrado. Hay dos formas de configurar AdGuard DNS: [usando IPs enlazados](/private-dns/connect-devices/other-options/linked-ip.md) y usando IPs dedicados. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. En este caso, tendrás que usar DNS estándar no cifrado. Hay dos formas de configurar AdGuard DNS: [usando IPs enlazados](/private-dns/connect-devices/other-options/linked-ip.md) y usando IPs dedicados. Los IPs dedicados son generalmente una opción más estable. El IP enlazado tiene algunas limitaciones, como que solo se permiten direcciones residenciales, tu proveedor puede cambiar la IP y necesitarás enlazar la dirección IP nuevamente. Con los IPs dedicados, obtienes una dirección IP que es exclusivamente tuya, y todas las peticiones serán contadas para tu dispositivo. diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index bd43cde24..cb52ec971 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ Una **dirección IP residencial** es asignada a un dispositivo conectado a un IS ::: -A veces, una dirección IP residencial puede estar ya en uso, y si intentas conectarte a ella, AdGuard DNS evitará la conexión. -![Dirección IPv4 vinculada \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -Si eso sucede, comunícate con nuestro servicio de soporte vía [support@adguard-dns.io](mailto:support@adguard-dns.io), y te ayudarán con la configuración correcta. +Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + +![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## Cómo configurar la IP vinculada @@ -25,6 +27,7 @@ Las siguientes instrucciones explican cómo conectarse al dispositivo a través 2. Añade un nuevo dispositivo o abre la configuración de un dispositivo previamente conectado. 3. Ve a _Utilizar direcciones de servidor DNS_. 4. Abre _Direcciones de servidor DNS simple_ y conecta la IP vinculada. + ![IP vinculada \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## DNS dinámico: por qué es útil @@ -44,14 +47,21 @@ De esta manera, no tendrás que actualizar manualmente la dirección IP asociada ## DNS Dinámico: cómo configurarlo 1. Primero, debes comprobar si el DDNS es compatible con la configuración de tu router: + - Ve a _Configuraciones del router_ → _Red_ - Localiza la sección DDNS o _DNS dinámico_ - - Navega hasta él y verifica que la configuración es realmente compatible. _Este es solo un ejemplo de cómo podría verse. Puede variar dependiendo de tu router_ - ![DDNS soportado \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navega hasta él y verifica que la configuración es realmente compatible. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Registra tu dominio en un servicio popular como [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), o cualquier otro proveedor de DDNS que prefieras. + 3. Introduce el dominio en la configuración de tu router y sincroniza las configuraciones. + 4. Ve a la configuración de IP vinculada para conectar la dirección, luego navega a _Configuraciones avanzadas_ y haz clic en _Configurar DDNS_. + 5. Ingresa el dominio que registraste anteriormente y haz clic en _Configurar DDNS_. + ![Configurar DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) ¡Todo listo, has configurado DDNS con éxito! diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 4f2c21a11..7a23fa486 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Si es necesario: Configura DNS-over-TLS en ASUS, instala el [firmware ASUS Merli 2. Introduce el nombre de usuario del administrador (generalmente, es admin) y la contraseña del router. 3. En la barra lateral de _Configuración avanzada_, ve a la sección WAN. 4. En la sección _Configuración de DNS de WAN_, configura _Conectar al servidor DNS automáticamente_ en _No_. -5. Establece _Reenviar consultas locales_, _Habilitar DNS Rebind_ y _Habilitar DNSSEC_ en _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Cambia el Protocolo de Privacidad de DNS a DNS-over-TLS (DoT). 7. Asegúrate de que el _perfil de DNS-over-TLS_ está establecido en _estricto_. 8. Desplázate hacia abajo hasta la sección _Lista de Servidores DNS-over-TLS_. En el campo _Dirección_, introduce una de las direcciones a continuación: @@ -32,11 +32,10 @@ Si es necesario: Configura DNS-over-TLS en ASUS, instala el [firmware ASUS Merli 3. Abre _Configuración avanzada_ o _Avanzado_. 4. Selecciona _WAN_ o _Internet_. 5. Abre _Configuración de DNS_ o _DNS_. -6. Elige _DNS manual_. Selecciona _Usar estos servidores DNS_ o _Especificar servidor DNS manualmente_ e introduce las siguientes direcciones de servidor DNS: +6. Choose _Manual Setting_. Selecciona _Usar estos servidores DNS_ o _Especificar servidor DNS manualmente_ e introduce las siguientes direcciones de servidor DNS: - IPv4: `94.140.14.49` y `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` y `2a10:50c0:0:0:0:0:dad:ff` 7. Guarda la configuración. 8. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). - -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index b5b93463b..d5bba48e6 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Utiliza esta guía si tu router FritzBox no admite la configuración de DNS-over 6. Guarda la configuración. 7. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index b0ddca956..de93aeb92 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Los routers Keenetic son conocidos por su estabilidad y configuraciones flexible 5. En _Utilidades y servicios_, selecciona el proxy DNS-over-HTTPS e instálalo. 6. Ve a _Menú_ → _Reglas de red_ → _Seguridad en Internet_. 7. Navega hasta los servidores DNS-over-HTTPS y haz clic en _Añadir servidor DNS-over-HTTPS_. -8. Introduce la URL del servidor DNS privado de AdGuard en el campo `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Haz clic en _Guardar_. ## Configura DNS-over-TLS @@ -23,10 +23,10 @@ Los routers Keenetic son conocidos por su estabilidad y configuraciones flexible 2. Pulsa el botón de menú en la parte inferior de la pantalla y selecciona _Gestión_. 3. Abre _Configuración del sistema_. 4. Pulsa en _Opciones de componentes_ → _Opciones de componentes del sistema_. -5. En _Utilidades y servicios_, selecciona el proxy DNS-over-HTTPS e instálalo. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Ve a _Menú_ → _Reglas de red_ → _Seguridad en Internet_. -7. Navega hasta los servidores DNS-over-HTTPS y haz clic en _Añadir servidor DNS mediante HTTPS_. -8. Introduce la URL del servidor DNS privado de AdGuard en el campo `tls://*********.d.adguard-dns.com`. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Haz clic en _Guardar_. ## Utiliza el panel de administración del router @@ -44,5 +44,5 @@ Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS 7. Guarda la configuración. 8. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index c09f4307b..dc9086f9f 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -Los routers MikroTik utilizan el sistema operativo RouterOS de código abierto, que proporciona servicios de enrutamiento, redes inalámbricas y cortafuegos para redes domésticas y de pequeñas oficinas. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configurar DNS-over-HTTPS @@ -23,38 +23,42 @@ Los routers MikroTik utilizan el sistema operativo RouterOS de código abierto, - `94.140.14.49` - `94.140.14.59` - Establece _Permitir solicitudes remotas_ a _Sí_ (esto es crucial para que DoH funcione) - - En el campo _Usar servidor DoH_, ingresa la URL del servidor DNS privado de AdGuard: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Haz clic en _OK_ 4. Crear registros DNS estáticos: - En la _Configuración de DNS_, haz clic en _Estático_ - Haz clic en _Agregar Nuevo_ - - Establece _Nombre_ como d.adguard-dns.com - - Establece _Tipo_ como A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Establece _Dirección_ como `94.140.14.49` - - Establece _TTL_ como 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repite el proceso para crear una entrada idéntica, pero con _Dirección_ establecida en `94.140.14.59` 5. Desactiva Peer DNS en Cliente DHCP: - Ve a _IP_ → _Cliente DHCP_ - Haz doble clic en el cliente utilizado para tu Conexión a Internet (normalmente en la interfaz WAN) - Desmarca _Usar Peer DNS_ - Haz clic en _OK_ -6. Vincula tu IP. -7. Prueba y verifica: - - Es posible que tengas que reiniciar tu enrutador MikroTik para que todos los cambios surtan efecto - - Borra el caché DNS de tu navegador. Puedes usar una herramienta como [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) para comprobar si tus peticiones DNS ahora se enrutan a través de AdGuard +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Utiliza el panel de administración del router +## My router does not support DNS-over-HTTPS -Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS-over-HTTPS o DNS-over-TLS: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Abre el panel de administración del router. Se puede acceder en `192.168.1.1` o `192.168.0.1`. -2. Introduce el nombre de usuario del administrador (generalmente, es admin) y la contraseña del router. -3. Abre _Webfig_ → _IP_ → _DNS_. -4. Selecciona _Servidores_ e ingresa una de las siguientes direcciones de servidor DNS. - - IPv4: `94.140.14.49` y `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` y `2a10:50c0:0:0:0:0:dad:ff` -5. Guarda la configuración. -6. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). - -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +1. Accede a tu enrutador MikroTik: + - Abre tu navegador web y ve a la dirección IP de tu enrutador (generalmente `192.168.88.1`) + - Alternativamente, puedes usar Winbox para conectarte a tu enrutador MikroTik + - Ingresa tu nombre de usuario y contraseña de administrador +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` y `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` y `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Desactiva Peer DNS en Cliente DHCP: + - Go to _IP_ → _DHCP Client_ + - Haz doble clic en el cliente utilizado para tu Conexión a Internet (normalmente en la interfaz WAN) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index a321680f5..3e98d8505 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS 8. Guarda la configuración. 9. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index 2608ba8eb..dcb2b03f8 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS 8. Opcionalmente, puedes habilitar DNSSEC para mejorar la seguridad. 9. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 9d6b31613..597e422b3 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS 7. Guarda la configuración. 8. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [IPs vinculadas](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index c9091d30a..c905b9caa 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Aquí hay algunas instrucciones generales para configurar AdGuard DNS privado en 5. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 89566a953..a7ce2d2fe 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Los routers Xiaomi tienen muchas ventajas: señal fuerte estable, seguridad en la red, operación estable, gestión inteligente, al mismo tiempo, el usuario puede conectar hasta 64 dispositivos a la red local de Wi-Fi. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Desafortunadamente, no soporta DNS cifrado, pero es excelente para configurar AdGuard DNS a través de la IP vinculada. @@ -21,5 +21,5 @@ Usa estas instrucciones si tu router Keenetic no admite la configuración de DNS 6. Guarda la configuración. 7. Vincula tu IP (o tu IP dedicada si tienes una suscripción de equipo). -- [IP dedicadas](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP vinculadas](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 29d0e913e..655b678e9 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ La limitación de tasa de DNS típicamente funciona estableciendo umbrales en el Si está suscrito al plan _Team_ o _Enterprise_ de AdGuard DNS, puede hacer una Petición para un límite de tasa más alto. Para ello, sigue las instrucciones que aparecen a continuación: 1. Ve a [tablero de DNS](https://adguard-dns.io/dashboard/) → _Configuración de la cuenta_ → _Límite de tasa_ + 2. Toca _Petición de aumento de límite_ para contactar a nuestro equipo de atención al cliente y aplicar para el aumento del límite de tasa. Necesitarás proporcionar tu CIDR y el límite que deseas tener -![Límite de velocidad](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Tu petición será revisada en un plazo de 1 a 3 días laborables. Nos pondremos en contacto contigo sobre los cambios por correo electrónico +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 78b54c811..0d06878bd 100644 --- a/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/es/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Ajustes del servidor sidebar_position: 1 --- -## ¿Qué es un servidor y cómo usarlo? +## What is a server and how to use it Cuando configuras AdGuard DNS privado, encontrarás el término _servidores_. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/fi/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/fi/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/fi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/fi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/fr/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 7b0ad5cef..bc5bd9be4 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/fr/docusaurus-plugin-content-docs/current/general/dns-providers.md index 78ba1bd67..eabf91bea 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocole | Adresse | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocole | Adresse | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocole | Adresse | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocole | Adresse | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocole | Adresse | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocole | Adresse | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/fr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 185f6055f..285cff38d 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ Dans cette section, vous trouverez des instructions sur la façon de connecter v Pour les appareils qui ne prennent pas en charge nativement les protocoles DNS chiffrés, nous proposons trois autres options : - [Client DNS AdGuard](/dns-client/overview.md) -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) Si vous souhaitez restreindre l'accès à AdGuard DNS à certains appareils, utilisez [DNS-over-HTTPS avec authentification](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 0b7bc0d60..ecf201544 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Configurez votre console de jeux pour utiliser un serveur DNS AdGuard public ou Il serait préférable d'utiliser une IP liée (ou une IP dédiée si vous avez un abonnement Équipe) : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 751a7b374..ff9709da2 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Configurez votre console de jeux pour utiliser un serveur DNS AdGuard public ou Il serait préférable d'utiliser une IP liée (ou une IP dédiée si vous avez un abonnement Équipe) : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 1c1970219..8cbb9e33f 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Configurez votre console de jeux pour utiliser un serveur DNS AdGuard public ou Il serait préférable d'utiliser une IP liée (ou une IP dédiée si vous avez un abonnement Équipe) : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index c0b3b99e0..900effd57 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ Configurez votre console de jeux pour utiliser un serveur DNS AdGuard public ou Il serait préférable d'utiliser une IP liée (ou une IP dédiée si vous avez un abonnement Équipe) : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index e64fab417..bbdea7cf1 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Configurez votre console de jeux pour utiliser un serveur DNS AdGuard public ou Il serait préférable d'utiliser une IP liée (ou une IP dédiée si vous avez un abonnement Équipe) : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 93e3b4afd..a3b786ad6 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Tous les services VPN ne prennent pas en charge DNS chiffré. Cependant, notre V ![Serveur DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Faites défiler et appuyez sur _Ajouter un serveur DNS personnalisé_. ![Ajouter un serveur DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copiez l'une des adresses DNS suivantes et collez-la dans le champ _Adresses des serveurs DNS_ dans l'application. Si vous n'êtes pas sûr de laquelle utiliser, sélectionnez DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. Si vous n'êtes pas sûr de laquelle utiliser, sélectionnez DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Serveur DNS personnalisé \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Appuyez sur _Enregistrer et sélectionner_. @@ -75,5 +75,5 @@ Vous pouvez configurer votre serveur DNS dans les paramètres de votre appareil. Si vous préférez ne pas utiliser de logiciel supplémentaire pour la configuration DNS, vous pouvez opter pour le DNS non chiffré. Vous avez deux choix : utiliser des IP liées ou des IP dédiées. -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index 613b6586d..5fa0990a6 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ Si vous utilisez un VPN, le profil de configuration sera ignoré. Si vous préférez ne pas utiliser de logiciel supplémentaire pour configurer le DNS, vous pouvez opter pour un DNS non chiffré. Il existe deux options : utiliser des adresses IP liées ou des adresses IP dédiées. -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 973bc824d..037958012 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ Vous pouvez configurer le DNS privé AdGuard à l'aide de l'interface de ligne d 9. Désactivez le _Mode automatique_. 10. Cliquez sur _Appliquer_. 11. Liez votre adresse IP (ou votre IP dédiée si vous avez un abonnement Équipe) : - - [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Configuration manuelle sur Debian (IP liée ou IP dédiée requise) @@ -61,8 +61,8 @@ Vous pouvez configurer le DNS privé AdGuard à l'aide de l'interface de ligne d 10. Tapez _Entrée_. 11. Fermez le Terminal. 12. Liez votre adresse IP (ou votre IP dédiée si vous avez un abonnement Équipe) : - - [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Utilisation de dnsmasq @@ -102,9 +102,31 @@ Si vous voyez une notification indiquant que vous n'êtes pas connecté à AdGua ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +C'est fait ! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Utilisation du DNS simple Si vous préférez ne pas utiliser de logiciel supplémentaire pour la configuration DNS, vous pouvez opter pour le DNS non chiffré. Vous avez deux choix : utiliser des IP liées ou des IP dédiées : -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index d61dfb902..e972b7e53 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ C'est fait ! Votre dispositif est maintenant connecté à AdGuard DNS. Si vous préférez ne pas utiliser de logiciel supplémentaire pour la configuration DNS, vous pouvez opter pour le DNS non chiffré. Vous avez deux choix : utiliser des IP liées ou des IP dédiées. -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 87f23a675..6eb7f3278 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ Des détails supplémentaires peuvent être trouvés dans [un article différent Si vous préférez ne pas utiliser de logiciel supplémentaire pour la configuration DNS, vous pouvez opter pour le DNS non chiffré. Vous avez deux choix : utiliser des IP liées ou des IP dédiées. -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 4bcf3514f..ab1d93ed5 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Si vous avez un abonnement Équipe ou Entreprise, vous recevrez plusieurs adress ## Pourquoi avez-vous besoin d'une IP dédiée ? -Malheureusement, les spécifications techniques de l'appareil connecté ne permettent pas toujours de configurer un serveur DNS privé AdGuard chiffré. Dans ce cas, vous devrez utiliser un DNS standard non chiffré. Il existe deux manières de configurer AdGuard DNS : [en utilisant des IPs liées](/private-dns/connect-devices/other-options/linked-ip.md) et en utilisant des IPs dédiées. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. Dans ce cas, vous devrez utiliser un DNS standard non chiffré. Il existe deux manières de configurer AdGuard DNS : [en utilisant des IPs liées](/private-dns/connect-devices/other-options/linked-ip.md) et en utilisant des IPs dédiées. Les IPs dédiées sont généralement une option plus stable. Les IPs liées ont certaines limitations, comme le fait que seules les adresses résidentielles sont autorisées, votre fournisseur peut changer l'adresse IP, et vous devrez relier à nouveau l'adresse IP. Avec les IPs dédiées, vous obtenez une adresse IP qui vous appartient exclusivement, et toutes les requêtes seront comptées pour votre appareil. diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index bb919fef7..ac4761470 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index a7a4a4f68..0aaf11cef 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Si nécessaire : Configurez DNS-over-TLS sur ASUS, installez le [firmware ASUS M 2. Saisissez le nom d'utilisateur de l'administrateur (en général, c'est admin) et le mot de passe du routeur. 3. Dans la barre latérale _Paramètres avancés_, accédez à la section WAN. 4. Dans la section _Paramètres DNS WAN_, réglez le paramètre _Connexion automatique au serveur DNS_ sur _Non_. -5. Définissez _Transférer les requêtes locales_, _Activer DNS Rebind_, et _Activer DNSSEC_ sur _Non_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Modifiez le protocole de confidentialité DNS en DNS-over-TLS (DoT). 7. Assurez-vous que le _profil DNS-over-TLS_ est défini sur _Strict_. 8. Faites défiler jusqu'à la section _Liste des serveurs DNS-over-TLS_. Dans le champ _Adresse_, saisissez l'une des adresses ci-dessous : @@ -32,11 +32,10 @@ Si nécessaire : Configurez DNS-over-TLS sur ASUS, installez le [firmware ASUS M 3. Ouvrez _Paramètres avancés_ ou _Avancé_. 4. Sélectionnez _WAN_ ou _Internet_. 5. Ouvrez _Paramètres DNS_ ou _DNS_. -6. Choisissez _DNS Manuel_. Sélectionnez _Utiliser ces serveurs DNS_ ou _Spécifier le serveur DNS manuellement_ et saisissez les adresses des serveurs DNS suivantes : +6. Choose _Manual Setting_. Sélectionnez _Utiliser ces serveurs DNS_ ou _Spécifier le serveur DNS manuellement_ et saisissez les adresses des serveurs DNS suivantes : - IPv4 : `94.140.14.49` et `94.140.14.59` - IPv6 : `2a10:50c0:0:0:0:0:ded:ff` et `2a10:50c0:0:0:0:0:dad:ff` 7. Enregistrez les paramètres. 8. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). - -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index b6b337738..574105b96 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Utilisez ce guide si votre routeur FritzBox ne prend pas en charge la configurat 6. Enregistrez les paramètres. 7. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 808bb884f..7da205054 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Les routeurs Keenetic sont connus pour leur stabilité et leurs configurations f 5. Dans _Utilitaires et services_, sélectionnez le proxy DNS-over-HTTPS et installez-le. 6. Allez dans _Menu_ → _Règles de réseau_ → _Sécurité Internet_. 7. Naviguez jusqu'aux serveurs DNS-over-HTTPS et cliquez sur _Ajouter un serveur DNS-over-HTTPS_. -8. Saisissez l'URL du serveur DNS privé AdGuard dans le champ `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Cliquez sur _Enregistrer_. ## Configuration DNS-over-TLS @@ -26,7 +26,7 @@ Les routeurs Keenetic sont connus pour leur stabilité et leurs configurations f 5. Dans _Utilitaires et services_, sélectionnez le proxy DNS-over-HTTPS et installez-le. 6. Allez dans _Menu_ → _Règles de réseau_ → _Sécurité Internet_. 7. Naviguez jusqu'aux serveurs DNS-over-HTTPS et cliquez sur _Ajouter un serveur DNS-over-HTTPS_. -8. Saisissez l'URL du serveur DNS privé AdGuard dans le champ `tls://*********.d.adguard-dns.com`. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Cliquez sur _Enregistrer_. ## Utilisez le panneau d'administration de votre routeur @@ -44,5 +44,5 @@ Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la co 7. Enregistrez les paramètres. 8. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 9c90ee191..66ab32908 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -Les routeurs MikroTik utilisent le système d'exploitation open source RouterOS, qui fournit des services de routage, de mise en réseau sans fil et de Pare-feu pour les réseaux domestiques et de petits bureaux. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configurer DNS-over-HTTPS @@ -23,38 +23,42 @@ Les routeurs MikroTik utilisent le système d'exploitation open source RouterOS, - `94.140.14.49` - `94.140.14.59` - Réglez _Autoriser les requêtes à distance_ sur _Oui_ (ceci est crucial pour le fonctionnement du DoH) - - Dans le champ _Utiliser le serveur DoH_, saisissez l'URL du serveur DNS AdGuard privé : `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Cliquez sur _OK_ 4. Créez des enregistrements DNS statiques : - Dans les _Paramètres DNS_, cliquez sur _Statique_ - Cliquez sur _Ajouter Nouveau_ - - Définissez _Nom_ sur d.adguard-dns.com - - Réglez _Type_ sur A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Réglez _Adresse_ sur '94.140.14.49' - - Réglez _TTL_ sur 1j 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Répétez le processus pour créer une entrée identique mais avec _Adresse_ réglée sur `94.140.14.59` 5. Désactivez le Peer DNS sur le client DHCP : - Accédez à _IP_ → _DHCP Client_ - Double-cliquez sur le client utilisé pour votre connexion Internet (généralement sur l'interface WAN) - Décochez _Utiliser le DNS Peer_ - Cliquez sur _OK_ -6. Liez votre IP. -7. Test et vérification : - - Vous devrez peut-être redémarrer votre routeur MikroTik pour que toutes les modifications prennent effet - - Videz le cache DNS de votre navigateur. Vous pouvez utiliser un outil comme [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) pour vérifier si vos requêtes DNS sont maintenant routées via AdGuard +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Utilisez le panneau d'administration de votre routeur +## My router does not support DNS-over-HTTPS -Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la configuration DNS-over-HTTPS ou DNS-over-TLS : +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Ouvrez le panneau d'administration du routeur. On peut y accéder à `192.168.1.1` ou `192.168.0.1`. -2. Saisissez le nom d'utilisateur de l'administrateur (en général, c'est admin) et le mot de passe du routeur. -3. Ouvrez _Webfig_ → _IP_ → _DNS_. -4. Sélectionnez _Serveurs_ et saisissez l'une des adresses de serveur DNS suivantes. - - IPv4 : `94.140.14.49` et `94.140.14.59` - - IPv6 : `2a10:50c0:0:0:0:0:ded:ff` et `2a10:50c0:0:0:0:0:dad:ff` -5. Enregistrez les paramètres. -6. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). - -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +1. Accédez à votre routeur MikroTik : + - Ouvrez votre navigateur web et allez à l'adresse IP de votre routeur (généralement `192.168.88.1`) + - Sinon, vous pouvez utiliser Winbox pour vous connecter à votre routeur MikroTik + - Saisissez votre nom d'utilisateur et votre mot de passe administrateur +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4 : `94.140.14.49` et `94.140.14.59` + - IPv6 : `2a10:50c0:0:0:0:0:ded:ff` et `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Désactivez le Peer DNS sur le client DHCP : + - Go to _IP_ → _DHCP Client_ + - Double-cliquez sur le client utilisé pour votre connexion Internet (généralement sur l'interface WAN) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index a06c46d2b..9af53b372 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la co 8. Enregistrez les paramètres. 9. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index 1823597cd..827f93f7f 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la co 8. En option, vous pouvez activer DNSSEC pour une sécurité renforcée. 9. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 7159556ef..c781c53f4 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la co 7. Enregistrez les paramètres. 8. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [IPs liées](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index f460183fc..4f67c0bcc 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Voici quelques instructions générales pour configurer AdGuard DNS privé sur l 5. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 6fc08a7c0..b881b2991 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Les routeurs Xiaomi présentent de nombreux avantages : un signal fort et constant, la sécurité du réseau, un fonctionnement stable, une gestion intelligente, en même temps, l'utilisateur peut connecter jusqu'à 64 appareils au réseau Wi-Fi local. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Malheureusement, il ne prend pas en charge le DNS chiffré, mais il est excellent pour configurer AdGuard DNS via l'adresse IP liée. @@ -21,5 +21,5 @@ Utilisez ces instructions si votre routeur Keenetic ne prend pas en charge la co 6. Enregistrez les paramètres. 7. Liez votre IP (ou votre IP dédiée si vous avez un abonnement Équipe). -- [IP dédiées](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP liées](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 28f2b402e..647b6a3e8 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ La limitation de taux DNS fonctionne généralement en définissant des seuils s Si vous êtes abonné au plan AdGuard DNS _Team_ ou _Enterprise_, vous pouvez demander une limite de taux plus élevée. Pour ce faire, veuillez suivre les instructions ci-dessous : 1. Allez à [tableau de bord DNS](https://adguard-dns.io/dashboard/) → _Paramètres du compte_ → _Limite de requêtes_ + 2. Appuyez sur _Requête d'augmentation de limite_ pour contacter notre Équipe d'assistance et postuler pour l'augmentation de la limite de taux. Vous devez fournir votre CIDR et la limite que vous souhaitez avoir -![Limite de requêtes](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Votre requête sera examinée dans un délai de 1 à 3 jours ouvrables. Nous vous contacterons au sujet des changements par courriel +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index c192552f0..8322de043 100644 --- a/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/fr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Serveur et paramètres sidebar_position: 1 --- -## Qu'est-ce qu'un serveur et comment l'utiliser +## What is a server and how to use it Lorsque vous configurez AdGuard DNS privé, vous rencontrerez le terme _serveurs_. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md b/i18n/hr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md index 5ac32c043..b54292af1 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md @@ -156,7 +156,7 @@ To update AdGuard Home package without the need to use Web API run: This setup will automatically cover all devices connected to your home router, and you won’t need to configure each of them manually. -1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as http://192.168.0.1/ or http://192.168.1.1/. You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. +1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as or . You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. 2. Find the DHCP/DNS settings. Look for the DNS letters next to a field that allows two or three sets of numbers, each divided into four groups of one to three digits. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/hr/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/hr/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/hr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/hr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/it/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/it/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/it/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/it/docusaurus-plugin-content-docs/current/general/dns-providers.md index 5015d55f7..a7666be6c 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/it/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/it/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 616b694a5..1fb9e5b33 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ In questa sezione troverai istruzioni su come connettere il tuo dispositivo ad A Per i dispositivi che non supportano nativamente i protocolli DNS crittografati, offriamo tre altre opzioni: - [AdGuard DNS Client](/dns-client/overview.md) -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) Se desideri limitare l'accesso ad AdGuard DNS a determinati dispositivi, utilizza [DNS-over-HTTPS con autenticazione](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index e66628523..5520525ef 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Configura la tua console di gioco per utilizzare un server DNS AdGuard pubblico Sarebbe preferibile utilizzare un IP collegato (o un IP dedicato se hai un abbonamento Team): -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 69f0f6ace..2c1db9b48 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Configura la tua console di gioco per utilizzare un server DNS AdGuard pubblico Sarebbe preferibile utilizzare un IP collegato (o un IP dedicato se hai un abbonamento Team): -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 17531094a..2b3cea7c5 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Configura la tua console di gioco per utilizzare un server DNS AdGuard pubblico Sarebbe preferibile utilizzare un IP collegato (o un IP dedicato se hai un abbonamento Team): -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 8d99830e9..be434bf00 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Configura la tua console di gioco per utilizzare un server DNS AdGuard pubblico Sarebbe preferibile utilizzare un IP collegato (o un IP dedicato se hai un abbonamento Team): -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 5ec19265b..deb0f9080 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Non tutti i servizi VPN supportano DNS crittografati. Tuttavia, la nostra VPN lo ![Server DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scorri verso il basso e tocca _Aggiungi un server DNS personalizzato_. ![Aggiungi un server DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copia uno dei seguenti indirizzi DNS e incollalo nel campo _Indirizzi server DNS_ nell'app. Se non sei sicuro di quale utilizzare, seleziona DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. Se non sei sicuro di quale utilizzare, seleziona DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Server DNS personalizzato \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tocca _Salva e seleziona_. @@ -75,5 +75,5 @@ Puoi configurare il tuo server DNS nelle impostazioni del tuo dispositivo. Si pr Se preferisci non utilizzare software aggiuntivo per la configurazione DNS, puoi optare per DNS non crittografati. Hai due opzioni: utilizzare IP collegati o IP dedicati. -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index a2cbcfe71..929b80bc5 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ Se stai utilizzando una VPN, il profilo di configurazione verrà ignorato. Se preferisci non utilizzare software extra per configurare DNS, puoi optare per DNS non crittografato. Ci sono due opzioni: utilizzare IP collegati o IP dedicati. -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 4a4d8427d..4026a7d86 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ Puoi configurare AdGuard DNS privato utilizzando AdGuard VPN CLI (interfaccia a 9. Disattiva _Modalità automatica_. 10. Clicca su _Applica_. 11. Collega il tuo indirizzo IP (o il tuo IP dedicato se hai un abbonamento Team): - - [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Configura manualmente su Debian (richiesta IP collegato o IP dedicato) @@ -61,8 +61,8 @@ Puoi configurare AdGuard DNS privato utilizzando AdGuard VPN CLI (interfaccia a 10. Premi _Invio_. 11. Chiudi il Terminale. 12. Collega il tuo indirizzo IP (o il tuo IP dedicato se hai un abbonamento Team): - - [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Usa dnsmasq @@ -102,9 +102,31 @@ Se vedi una notifica che non sei connesso a AdGuard DNS, molto probabilmente la ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +Tutto fatto! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Usa DNS semplice Se preferisci non utilizzare software aggiuntivo per la configurazione DNS, puoi optare per DNS non crittografati. Hai due opzioni: utilizzare IP collegati o IP dedicati: -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 69818df51..767eed64c 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ Tutto fatto! Il tuo dispositivo è connesso correttamente a AdGuard DNS. Se preferisci non utilizzare software aggiuntivo per la configurazione DNS, puoi optare per DNS non crittografati. Hai due opzioni: utilizzare IP collegati o IP dedicati. -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index f927d5cbc..a9960b666 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ Maggiori dettagli possono essere trovati in [articolo diverso](/dns-client/overv Se preferisci non utilizzare software aggiuntivo per la configurazione DNS, puoi optare per DNS non crittografati. Hai due opzioni: utilizzare IP collegati o IP dedicati. -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 153481e81..3c00df74e 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Se hai un abbonamento Team o Azienda, riceverai diversi indirizzi IP dedicati pe ## Perché hai bisogno di un IP dedicato? -Sfortunatamente, le specifiche tecniche del dispositivo connesso potrebbero non consentirti sempre di configurare un server DNS privato AdGuard crittografato. In questo caso, dovrai utilizzare DNS standard non crittografato. Ci sono due modi per impostare AdGuard DNS: [utilizzando IP collegati](/private-dns/connect-devices/other-options/linked-ip.md) e utilizzando IP dedicati. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In questo caso, dovrai utilizzare DNS standard non crittografato. Ci sono due modi per impostare AdGuard DNS: [utilizzando IP collegati](/private-dns/connect-devices/other-options/linked-ip.md) e utilizzando IP dedicati. Gli IP dedicati sono generalmente un'opzione più stabile. L'IP collegato ha alcune limitazioni, come ad esempio sono consentiti solo indirizzi residenziali, il tuo fornitore può cambiare l'IP, e dovrai ricollegare l'indirizzo IP. Con gli IP dedicati, ottieni un indirizzo IP che è esclusivamente tuo, e tutte le richieste verranno conteggiate per il tuo dispositivo. diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index abab59773..523a8a6d5 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index f94fd72e8..6a9880598 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Se necessario: Configura DNS-over-TLS su ASUS, installa il [firmware ASUS Merlin 2. Inserisci il nome utente dell'amministratore (di solito è admin) e la password del router. 3. Nella barra laterale _Impostazioni avanzate_, vai alla sezione WAN. 4. Nella sezione _Impostazioni DNS WAN_, imposta _Connetti automaticamente al server DNS_ su _No_. -5. Imposta _Inoltra query locali_, _Attiva rebind DNS_ e _Attiva DNSSEC_ su _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Cambia il protocollo di privacy DNS in DNS-over-TLS (DoT). 7. Assicurati che il _profilo DNS-over-TLS_ sia impostato su _Strict_. 8. Scorri in basso alla sezione _DNS-over-TLS Servers List_. Nel campo _Indirizzo_, inserisci uno degli indirizzi qui sotto: @@ -32,11 +32,10 @@ Se necessario: Configura DNS-over-TLS su ASUS, installa il [firmware ASUS Merlin 3. Apri _Impostazioni avanzate_ o _Avanzate_. 4. Seleziona _WAN_ o _Internet_. 5. Apri _Impostazioni DNS_ o _DNS_. -6. Scegli _Manuale DNS_. Seleziona _Usa questi server DNS_ oppure _Specifica manualmente il server DNS_ e inserisci i seguenti indirizzi server: +6. Choose _Manual Setting_. Seleziona _Usa questi server DNS_ oppure _Specifica manualmente il server DNS_ e inserisci i seguenti indirizzi server: - IPv4: `94.140.14.49` e `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` 7. Salva le impostazioni. 8. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). - -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 08d4d75d3..ecf1ecc25 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Usa questa guida se il tuo router FritzBox non supporta la configurazione di DNS 6. Salva le impostazioni. 7. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index b70bc3f89..a0fb5c5a9 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ I router Keenetic sono noti per la loro stabilità e configurazioni flessibili, 5. In _Utilità e servizi_, seleziona il proxy DNS-over-HTTPS e installalo. 6. Vai a _Menu_ → _Regole di rete_ → _Sicurezza in Internet_. 7. Spostati sui server DNS-over-HTTPS e fai clic su _Aggiungi server DNS-over-HTTPS_. -8. Inserisci l'URL del server DNS privato AdGuard nel campo `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Clicca _Salva_. ## Configura DNS-over-TLS @@ -26,7 +26,7 @@ I router Keenetic sono noti per la loro stabilità e configurazioni flessibili, 5. In _Utilità e servizi_, seleziona il proxy DNS-over-HTTPS e installalo. 6. Vai a _Menu_ → _Regole di rete_ → _Sicurezza in Internet_. 7. Spostati sui server DNS-over-HTTPS e fai clic su _Aggiungi server DNS-over-HTTPS_. -8. Inserisci l'URL del server DNS privato AdGuard nel campo `tls://*********.d.adguard-dns.com`. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Clicca _Salva_. ## Utilizza il pannello di amministrazione del tuo router @@ -44,5 +44,5 @@ Utilizza queste istruzioni se il tuo router Keenetic non supporta la configurazi 7. Salva le impostazioni. 8. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 0533e66eb..6aa6a4259 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -I router MikroTik utilizzano il sistema operativo open source RouterOS, che fornisce routing, reti wireless e servizi di firewall per reti domestiche e di piccoli uffici. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configurazione di DNS-over-HTTPS @@ -23,38 +23,42 @@ I router MikroTik utilizzano il sistema operativo open source RouterOS, che forn - `94.140.14.49` - `94.140.14.59` - Imposta _Consenti richieste remote_ su _Sì_ (questo è cruciale per il funzionamento del DoH) - - Nel campo _Usa il server DoH_, inserisci l'URL del server DNS privato AdGuard: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Clicca _OK_ 4. Crea record DNS statici: - Nelle _Impostazioni DNS_, clicca _Statico_ - Clicca su _Aggiungi nuovo_ - - Imposta _Nome_ su d.adguard-dns.com - - Imposta _Tipo_ su A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Imposta _Indirizzo_ su `94.140.14.49` - - Imposta _TTL_ su 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Ripeti il processo per creare una voce identica ma con _Indirizzo_ impostato su `94.140.14.59` 5. Disabilita il Peer DNS sul client DHCP: - Vai a _IP_ → _DHCP Client_ - Fai doppio clic sul client usato per la connessione a Internet (solitamente sull'interfaccia WAN) - Deseleziona _Usa DNS peer_ - Clicca _OK_ -6. Collega il tuo IP. -7. Testa e verifica: - - Potrebbe essere necessario riavviare il router MikroTik affinché tutte le modifiche abbiano effetto - - Svuota la cache DNS del tuo browser. Puoi utilizzare uno strumento come [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) per verificare se le tue richieste DNS sono ora instradate tramite AdGuard +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Utilizza il pannello di amministrazione del tuo router +## My router does not support DNS-over-HTTPS -Utilizza queste istruzioni se il tuo router Keenetic non supporta la configurazione DNS-over-HTTPS o DNS-over-TLS: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Apri il pannello di amministrazione del router. Può essere accessibile a `192.168.1.1` o `192.168.0.1`. -2. Inserisci il nome utente dell'amministratore (di solito è admin) e la password del router. -3. Apri _Webfig_ → _IP_ → _DNS_. -4. Seleziona _Server_ e inserisci uno dei seguenti indirizzi di server DNS. - - IPv4: `94.140.14.49` e `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` -5. Salva le impostazioni. -6. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). - -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +1. Accedi al tuo router MikroTik: + - Apri il tuo browser web e vai all'indirizzo IP del tuo router (di solito `192.168.88.1`) + - In alternativa, puoi usare Winbox per connetterti al tuo router MikroTik + - Inserisci il nome utente e la password dell'amministratore +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` e `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disabilita il Peer DNS sul client DHCP: + - Go to _IP_ → _DHCP Client_ + - Fai doppio clic sul client usato per la connessione a Internet (solitamente sull'interfaccia WAN) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index 86e4e9556..c8a906aa9 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Utilizza queste istruzioni se il tuo router Keenetic non supporta la configurazi 8. Facoltativamente, puoi abilitare DNSSEC per maggiore sicurezza. 9. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 6177be6ac..911fd45bd 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Utilizza queste istruzioni se il tuo router Keenetic non supporta la configurazi 7. Salva le impostazioni. 8. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [IP collegati](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index 18913e5c4..32f663484 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Ecco alcune istruzioni generali per impostare AdGuard DNS privato sui router. Pu 5. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 891f21482..3f88f7654 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -I router Xiaomi hanno molti vantaggi: segnale forte e stabile, sicurezza della rete, funzionamento stabile, gestione intelligente, allo stesso tempo, l'utente può collegare fino a 64 dispositivi alla rete Wi-Fi locale. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Sfortunatamente, non supporta DNS crittografati, ma è ottimo per impostare AdGuard DNS tramite IP collegato. @@ -21,5 +21,5 @@ Utilizza queste istruzioni se il tuo router Keenetic non supporta la configurazi 6. Salva le impostazioni. 7. Collega il tuo IP (o il tuo IP dedicato se hai un abbonamento Team). -- [IP dedicate](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IP collegate](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index f38c759d8..3646d438d 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ La limitazione delle richieste DNS funziona tipicamente impostando soglie sul nu Se sei sottoscritto al piano _Team_ o _Azienda_ di AdGuard DNS, puoi fare una Richiesta di un limite di velocità più alto. Per fare ciò, segui le istruzioni qui sotto: 1. Vai al [cruscotto DNS](https://adguard-dns.io/dashboard/) → _Impostazioni account_ → _Limite di velocità_ + 2. Tocca _Richiesta di aumento del limite_ per contattare il nostro Supporto clienti e applica per l'aumento del limite di velocità. È necessario fornire il proprio CIDR e il limite che si desidera avere -![Limite delle richieste](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. La tua richiesta sarà esaminata entro 1-3 giorni lavorativi. Ti contatteremo per le modifiche via e-mail +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 9824f6bf3..cf2076b50 100644 --- a/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/it/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server e impostazioni sidebar_position: 1 --- -## Che cos'è un server e come utilizzarlo +## What is a server and how to use it Quando configuri il DNS privato di AdGuard, incontrerai il termine _server_. diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/ja/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/ja/docusaurus-plugin-content-docs/current/general/dns-providers.md index 470a43e62..8f2bd5d24 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| プロトコル | アドレス | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | プロトコル | アドレス | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| プロトコル | アドレス | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| プロトコル | アドレス | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | プロトコル | アドレス | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| プロトコル | アドレス | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/ja/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 758069875..d17ba596d 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ toc_max_heading_level: 3 暗号化されたDNSプロトコルをネイティブにサポートしていないデバイスには、以下の3つのオプションを提供しております: - [AdGuard DNS Client](/dns-client/overview.md) -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) AdGuard DNS へのアクセスを特定のデバイスに対して制限したい場合は、[認証付きDNS-over-HTTPS](/private-dns/connect-devices/other-options/doh-authentication.md)を使用してください。 diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 70fa9bf2c..dfb7ac1e4 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ sidebar_position: 3 リンクされたIP(チームプランをご利用の場合は専用IP)を使用するのがおすすめです: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 7d19d3e3d..6b3564362 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ sidebar_position: 2 リンクされたIP(チームプランをご利用の場合は専用IP)を使用するのがおすすめです: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index b1c8d5764..7b63beb03 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ sidebar_position: 4 リンクされたIP(チームプランをご利用の場合は専用IP)を使用するのがおすすめです: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index 9903d3922..078b7e6d9 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ sidebar_position: 5 リンクされたIP(チームプランをご利用の場合は専用IP)を使用するのがおすすめです: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 2799e64fd..110de71fd 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ sidebar_position: 6 リンクされたIP(チームプランをご利用の場合は専用IP)を使用するのがおすすめです: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 57b3ad152..53273cf8f 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -3,77 +3,77 @@ title: Android sidebar_position: 2 --- -To connect an Android device to AdGuard DNS, first add it to _Dashboard_: +Android デバイスを AdGuard DNS に接続するには、まずはデバイスを「ダッシュボード」に追加します: -1. Go to _Dashboard_ and click _Connect new device_. -2. In the drop-down menu _Device type_, select Android. -3. Name the device. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 +2. 「_デバイスタイプ_」というドロップダウンメニューで「Android」を選択します。 +3. デバイスに名前を付けます。 ![Connecting device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/choose_android.png) -## Use AdGuard Ad Blocker (paid option) +## AdGuard 広告ブロッカーアプリを使用する(有料オプション) -The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your Android device. You can choose from various encryption protocols. Along with DNS filtering, you also get an excellent ad blocker that works across your entire system. +AdGuardアプリでは、暗号化されたDNSを使用できるため、Androidデバイスで AdGuard DNS を設定するのに最適です。 様々な暗号化プロトコルから選択することができます。 DNSフィルタリングに加えて、システム全体で機能する優れた広告ブロッカーも手に入っちゃいます。 -1. Install [the AdGuard app](https://adguard.com/adguard-android/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the app. -3. Tap the shield icon in the menu bar at the bottom of the screen. +1. AdGuard DNS に接続したいデバイスに[AdGuardアプリ](https://adguard.com/adguard-android/overview.html)をインストールします。 +2. アプリを開きます。 +3. 画面下部メニューバーの左から2番目にある盾のアイコンをタップします。 ![Shield icon \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step3.png) -4. Tap _DNS protection_. +4. 「_DNS通信を保護_」をタップします。 ![DNS protection \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step4.png) -5. Select _DNS server_. +5. 「_DNSサーバー_」を選択します。 ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step5.png) -6. Scroll down to _Custom servers_ and tap _Add DNS server_. +6. 「_カスタムサーバー_」までスクロールダウンし、「+ DNSサーバーを追加する」をタップします。 ![Add DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _Server adresses_ field in the app. If you are not sure which one to use, select _DNS-over-HTTPS_. +7. 以下のDNSアドレスをコピーして、「サーバーアドレス」欄に貼り付けます。 どれを使用すべきかわからない場合は、「_DNS-over-HTTPS_」アドレスを選択してください。 ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step7_2.png) -8. Tap _Add_. -9. The DNS server you’ve added will appear at the bottom of the _Custom servers_ list. To select it, tap its name or the radio button next to it. +8. 「_追加_」をタップします。 +9. 追加したDNSサーバーは、「カスタムサーバー」リストの一番下に現れます。 サーバーを選択するには、その名前やその隣にあるラジオボタンをタップします。 ![Select DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step_9.png) -10. Tap _Save and select_. +10. 「_保存して選択する_」をタップします。 ![Save and select \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_ab/android_step10.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use AdGuard VPN +## AdGuard VPN を使用する -Not all VPN services support encrypted DNS. However, our VPN does, so if you need both a VPN and a private DNS, AdGuard VPN is your go-to option. +VPNサービスの中には、暗号化DNSをサポートしていないものもあります。 しかし、AdGuard VPN は対応しているので、VPNとプライベートDNSの両方が必要な場合、AdGuard VPN がベストチョイスになります。 -1. Install [the AdGuard VPN app](https://adguard-vpn.com/android/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the app. -3. In the menu bar at the bottom of the screen, tap the gear icon. +1. AdGuard DNS に接続したいデバイスに [AdGuard VPN アプリ](https://adguard-vpn.com/android/overview.html)をインストールします。 +2. アプリを開きます。 +3. 画面下部のメニューバーで、設定⚙アイコンをタップします。 ![Gear icon \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step3.png) -4. Open _App settings_. +4. 「一般設定」を開きます。 ![App settings \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step4.png) -5. Select _DNS server_. +5. 「_DNSサーバー_」を選択します。 ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) -6. Scroll down and tap _Add a custom DNS server_. +6. 下にスクロールダウンして、「+ カスタムDNSサーバーを追加する」をクリックします。 ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. どれを使用すべきかわからない場合は、「_DNS-over-HTTPS_」アドレスを選択してください。 ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) -8. Tap _Save and select_. +8. 「_保存して選択する_」をタップします。 ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step8.png) -9. The DNS server you’ve added will appear at the bottom of the _Custom DNS servers_ list. +9. 追加したDNSサーバーは、「カスタムDNSサーバー」リストの一番下に現れます。 -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Configure Private DNS manually +## プライベート DNS を手動で設定する -You can configure your DNS server in your device settings. Please note that Android devices only support DNS-over-TLS protocol. +デバイスの設定でDNSサーバーを手動で設定することもできます。 ※Android デバイスは DNS-over-TLS プロトコルのみをサポートしていることに注意してください。 -1. Go to _Settings_ → _Wi-Fi & Internet_ (or _Network and Internet_, depending on your OS version). +1. 端末の「設定」→「ネットワークとインターネット」(OSバージョン・端末によっては、「Wi-Fiとインターネット」や「接続」など)を開きます。 ![Settings \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_manual/manual_step1.png) -2. Select _Advanced_ and tap _Private DNS_. +2. (環境によっては「詳細設定」を押してから)「_プライベート DNS_」をタップします。 ![Private DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_manual/manual_step2.png) -3. Select the _Private DNS provider hostname_ option and enter the address of your personal server: `{Your_Device_ID}.d.adguard-dns.com`. -4. Tap _Save_. - ![Private DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_manual/manual_step4.png) - All done! Your device is successfully connected to AdGuard DNS. +3. 「プライベート DNS プロバイダのホスト名」というオプションを選択し、あなたのパーソナルDNSサーバーのアドレスを入力します: `{Your_Device_ID}.d.adguard-dns.com` +4. 「保存」をタップします。 + ![プライベート DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_manual/manual_step4.png) + 完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Configure plain DNS +## プレーンDNSを構成する -If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. +DNS設定に余分なソフトウェアを使いたくない場合は、暗号化されていないDNSを設定することができます。 リンクされた IP または 専用 IP を使用するという次の2つの選択肢があります: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index 506891d29..fbc06aca2 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -3,80 +3,80 @@ title: iOS sidebar_position: 3 --- -To connect an iOS device to AdGuard DNS, first add it to _Dashboard_: +iOSデバイスを AdGuard DNS に接続するには、まずはデバイスを「ダッシュボード」に追加します: -1. Go to _Dashboard_ and click _Connect new device_. -2. In the drop-down menu _Device type_, select iOS. -3. Name the device. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 +2. 「_デバイスタイプ_」というドロップダウンメニューで「iOS」を選択します。 +3. デバイスに名前を付けます。 ![Connecting device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/choose_ios.png) -## Use AdGuard Ad Blocker (paid option) +## AdGuard 広告ブロッカーアプリを使用する(有料オプション) -The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your iOS device. You can choose from various encryption protocols. Along with DNS filtering, you also get an excellent ad blocker that works across your entire system. +AdGuardアプリでは、暗号化されたDNSを使用できるため、iOSデバイスで AdGuard DNS を設定するのに最適です。 様々な暗号化プロトコルから選択することができます。 DNSフィルタリングに加えて、システム全体で機能する優れた広告ブロッカーも手に入っちゃうことがメリットです。 -1. Install the [AdGuard app](https://adguard.com/adguard-ios/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the AdGuard app. -3. Select the _Protection_ tab in the bottom menu. +1. AdGuard DNS に接続したいデバイスに [AdGuard アプリ](https://adguard.com/adguard-ios/overview.html)をインストールします。 +2. AdGuard アプリを開きます。 +3. 下部メニューで盾アイコン(左から2番目)を選択します。 ![Shield icon \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step3.jpg) -4. Make sure that _DNS protection_ is toggled on and then tap it. Choose _DNS server_. +4. 「DNS通信を保護」がオンになっていることを確認し、タップします。 「_DNSサーバー_」を選択します。 ![DNS protection \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step4.jpg) ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step4_2.jpg) -5. Scroll down to the bottom and tap _Add a custom DNS server_. +5. 一番下にスクロールダウンして、「+ カスタムDNSサーバーを追加する」をクリックします。 ![Add DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step5.jpg) -6. Copy one of the following DNS addresses and paste it into the _DNS server adress_ field in the app. If you are not sure which one to prefer, choose DNS-over-HTTPS. +6. 以下のDNSアドレスから一つを選んでコピーして、「DNSサーバーアドレス」欄に貼り付けます。 どれを使用すべきかわからない場合は、「_DNS-over-HTTPS_」アドレスをお使いください。 ![Copy server address \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step6_1.png) ![Paste server address \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step6_2.jpg) -7. Tap _Save And Select_. +7. 「_保存して選択する_」をタップします。 ![Save And Select \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step7.jpg) -8. Your freshly created server should appear at the bottom of the list. +8. 追加したばかりのサーバーはリストの一番下に表示されるはずです。 ![Custom server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_ab/ios_step8.jpg) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use AdGuard VPN +## AdGuard VPN を使用する -Not all VPN services support encrypted DNS. However, our VPN does, so if you need both a VPN and a private DNS, AdGuard VPN is your go-to option. +VPNサービスの中には、暗号化DNSをサポートしていないものもあります。 しかし、AdGuard VPN は対応しているので、VPNとプライベートDNSの両方が必要な場合、AdGuard VPN がベストチョイスになります。 -1. Install the [AdGuard VPN app](https://adguard-vpn.com/ios/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the AdGuard VPN app. -3. Tap the gear icon in the bottom right corner of the screen. +1. AdGuard DNS に接続したいデバイスへ [AdGuard VPN アプリ](https://adguard-vpn.com/ios/overview.html)をインストールします。 +2. AdGuard VPN アプリを開きます。 +3. 画面右下の⚙️アイコンをタップします。 ![Gear icon \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step3.jpg) -4. Open _General_. +4. 「_一般設定_」を開きます。 ![General settings \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step4.jpg) -5. Select _DNS server_. +5. 「_DNSサーバー_」を選択します。 ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step5.png) -6. Scroll down to _Add custom DNS server_. +6. 「カスタムDNSサーバーを追加する」までスクロールダウンします。 ![Add server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS server addresses_ text field. If you are not sure which one to prefer, select _DNS-over-HTTPS_. +7. 以下のDNSアドレスから一つを選んでコピーして、「DNSサーバーアドレス」欄に貼り付けます。 どれを使用すべきかわからない場合は、「_DNS-over-HTTPS_」アドレスを選択してください。 ![DoH server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step7_2.jpg) -8. Tap _Save_. +8. 「保存」をタップします。 ![Save server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step8.jpg) -9. Your freshly created server should appear under _Custom DNS servers_. +9. これで、新しく追加したサーバーが「_カスタムDNSサーバー_」の下に現れるはずです。 ![Custom servers \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_vpn/ios_step9.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use a configuration profile +## 構成プロファイルを使用する -An iOS device profile, also referred to as a "configuration profile" by Apple, is a certificate-signed XML file that you can manually install on your iOS device or deploy using an MDM solution. It also allows you to configure Private AdGuard DNS on your device. +iOSデバイスプロファイルは、Appleによって「構成プロファイル」とも呼ばれ、あなたが手動でiOSデバイスにインストールしたり、MDMソリューションを使用してデプロイできる証明書に署名されたXMLファイルです。 これにより、デバイス上でプライベート AdGuard DNS を設定できます。 -:::note Important +:::note 【重要】 -If you are using a VPN, the configuration profile will be ignored. +VPNを使用している場合、構成プロファイルは無視されます。 ::: -1. [Download](https://dns.website.agrd.dev/public_api/v1/settings/e7b499cc-94c0-4448-8404-88d11f4f51a2/doh_mobileconfig.xml) profile. -2. Open settings. -3. Tap _Profile Downloaded_. +1. [プロファイルをダウンロード](https://dns.website.agrd.dev/public_api/v1/settings/e7b499cc-94c0-4448-8404-88d11f4f51a2/doh_mobileconfig.xml)します。 +2. iOSの「設定」を開きます。 +3. 「ダウンロード済みプロファイル」をタップします。 ![Profile Downloaded \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_manual/manual_step3.png) -4. Tap _Install_ and follow the onscreen instructions. +4. 「インストール」をタップして、画面上の手順を行います。 ![Install \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_manual/manual_step4.png) -## Configure plain DNS +## プレーンDNSを構成する -If you prefer not to use extra software to configure DNS, you can opt for unencrypted DNS. There are two options: using linked IPs or dedicated IPs. +DNS設定に余分なソフトウェアを使いたくない場合は、暗号化されていないDNSを使うことができます。 リンクされた IP または 専用 IP を使用するという2つの選択肢があります: - [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) - [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 4b710a2e2..e287cba57 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -3,70 +3,70 @@ title: Linux sidebar_position: 6 --- -To connect a Linux device to AdGuard DNS, first add it to _Dashboard_: +Linuxデバイスを AdGuard DNS に接続するには、まずはデバイスを「ダッシュボード」に追加します: -1. Go to _Dashboard_ and click _Connect new device_. -2. In the drop-down menu _Device type_, select Linux. -3. Name the device. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 +2. 「_デバイスタイプ_」というドロップダウンメニューで「Linux」を選択します。 +3. デバイスに名前を付けます。 ![Connecting device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/choose_linux.png) -## Use AdGuard DNS Client +## AdGuard DNS Client を使用する -AdGuard DNS Client is a cross-platform console utility that allows you to use encrypted DNS protocols to access AdGuard DNS. +AdGuard DNS Client は、暗号化されたDNSプロトコルを使用してAdGuard DNSにアクセスできるクロスプラットフォームのコンソールユーティリティです。 -You can learn more about this in the [related article](/dns-client/overview/). +詳しくは、[関連記事](/dns-client/overview/)をご覧ください。 -## Use AdGuard VPN CLI +## AdGuard VPN for Linux(AdGuard VPN CLI)を使用する -You can set up Private AdGuard DNS using the AdGuard VPN CLI (command-line interface). To get started with AdGuard VPN CLI, you’ll need to use Terminal. +AdGuard VPN for Linux (コマンドラインインターフェイス版AdGuard VPN) を使用してプライベート AdGuard DNS を設定することができます。 AdGuard VPN CLI を使用開始するには、Terminal を使用する必要があります。 -1. Install AdGuard VPN CLI by following [these instructions](https://adguard-vpn.com/kb/adguard-vpn-for-linux/installation/). -2. Go to [Settings](https://adguard-vpn.com/kb/adguard-vpn-for-linux/settings/). -3. To set a specific DNS server, use the command: `adguardvpn-cli config set-dns `, where `` is your private server’s address. -4. Activate the DNS settings by entering `adguardvpn-cli config set-system-dns on`. +1. [こちらの手順](https://adguard-vpn.com/kb/adguard-vpn-for-linux/installation/)に従って、AdGuard VPN CLI をインストールします。 +2. [設定](https://adguard-vpn.com/kb/adguard-vpn-for-linux/settings/)に移動します。 +3. 特定の DNS サーバーを設定するには、 `adguardvpn-cli config set-dns ` というコマンドを使用します。(ここで、`` はあなたのプライベートサーバーのアドレスです。) +4. adguardvpn-cli config set-system-dns on\` と入力して DNS 設定を有効にします。 -## Configure manually on Ubuntu (linked IP or dedicated IP required) +## Ubuntu で手動で設定する(リンクされたIPまたは専用IPが必要) -1. Click _System_ → _Preferences_ → _Network Connections_. -2. Select the _Wireless_ tab, then choose the network you’re connected to. -3. Click _Edit_ → _IPv4_. -4. Change the listed DNS addresses to the following addresses: +1. System(システム)→Preferences(環境設定)→Network Connections(ネットワーク接続)をクリックします。 +2. 「Wireless」(無線・ワイヤレス)タブを選択し、現在接続しているWi-Fiネットワークを選択します。 +3. Edit(編集) → IPv4 をクリックします。 +4. そこにあるDNSアドレスを以下のものに変更します: - `94.140.14.49` - `94.140.14.59` -5. Turn off _Auto mode_. -6. Click _Apply_. -7. Go to _IPv6_. -8. Change the listed DNS addresses to the following addresses: +5. Auto mode(自動モード)をオフにします。 +6. 「Apply」(適用)をクリックします。 +7. 「IPv6」に移動します。 +8. そこにあるDNSアドレスを以下のものに変更します: - `2a10:50c0:0:0:0:0:ded:ff` - `2a10:50c0:0:0:0:0:dad:ff` -9. Turn off _Auto mode_. -10. Click _Apply_. -11. Link your IP address (or your dedicated IP if you have a Team subscription): - - [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) - -## Configure manually on Debian (linked IP or dedicated IP required) - -1. Open the Terminal. -2. In the command line, type: `su`. -3. Enter your `admin` password. -4. In the command line, type: `nano /etc/resolv.conf`. -5. Change the listed DNS addresses to the following: - - IPv4: `94.140.14.49 and 94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff and 2a10:50c0:0:0:0:0:dad:ff` -6. Press _Ctrl + O_ to save the document. -7. Press _Enter_. -8. Press _Ctrl + X_ to save the document. -9. In the command line, type: `/etc/init.d/networking restart`. -10. Press _Enter_. -11. Close the Terminal. -12. Link your IP address (or your dedicated IP if you have a Team subscription): - - [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) - -## Use dnsmasq - -1. Install dnsmasq using the following commands: +9. Auto mode(自動モード)をオフにします。 +10. 「Apply」(適用)をクリックします。 +11. IPアドレス(チームプランをご利用の場合は専用IP)をリンクします。 + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + +## Debian で手動で設定する(リンクされたIPまたは専用IPが必要) + +1. Terminalを開きます。 +2. コマンドラインで、`su`と入力します。 +3. お使いの `admin` パスワードを入力します。 +4. コマンドラインで次のように入力します: `nano /etc/resolv.conf` +5. そこにあるDNSアドレスを以下のものに変更します: + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +6. Ctrl + O キーを押して、ドキュメントを保存します。 +7. Enterキーを押します。 +8. ドキュメントを保存するには Ctrl + X を押します。 +9. コマンドラインで次のように入力します: `/etc/init.d/networking restart` +10. Enterキーを押します。 +11. Terminalを閉じます。 +12. IPアドレス(チームプランをご利用の場合は専用IP)をリンクします。 + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + +## dnsmasq を使用する + +1. 以下のコマンドを使用して dnsmasq をインストールします: `sudo apt updatesudo` @@ -74,7 +74,7 @@ You can set up Private AdGuard DNS using the AdGuard VPN CLI (command-line inter `dnsmasqsudo nano /etc/dnsmasq.conf` -2. Use the following commands in dnsmasq.conf: +2. dnsmasq.confでこのコマンドを使用します: `no-resolv` @@ -90,21 +90,43 @@ You can set up Private AdGuard DNS using the AdGuard VPN CLI (command-line inter `add-cpe-id={Your_Device_ID}` -3. Restart the dnsmasq service: +3. dnsmasq サービスを再起動します: `sudo service dnsmasq restart` -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -:::note Important +:::note 【重要】 -If you see a notification that you are not connected to AdGuard DNS, most likely the port on which dnsmasq is running is occupied by other services. Use [these instructions](https://github.com/AdguardTeam/AdGuardHome/wiki/FAQ#bindinuse) to solve the problem. +※AdGuard DNS に接続されていないという通知が表示された場合、 dnsmasq の実行に使用されているポートが他のサービスによって占有されている可能性が高いです。 問題を解決するには、[こちらの手順](https://github.com/AdguardTeam/AdGuardHome/wiki/FAQ#bindinuse)をご利用しください。 ::: -## Use plain DNS +## EDNS(Extended DNS)を使用する -If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: +EDNSはDNSプロトコルを拡張し、より大きなUDPパケットで追加データを伝送できるようにしました。 これにより、AdGuard DNSでは、追加パラメータを使用してプレーンDNSでDeviceIDを渡すことができるようになっています。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +DeviceIDは8桁の16進数の識別子(例: `1a2b3c4d`)で、DNSリクエストを特定のデバイスに結びつけるのに役立ちます。 暗号化DNSの場合、このIDはドメインの一部となります(例:`1a2b3c4d.d.adguard-dns.com`)。 暗号化されていないDNSでは、この識別子を転送するためにEDNSが必要です。 + +AdGuard DNS はEDNSを使用して、オプション番号`65074`を検索してDeviceIDを取得します。 そのようなオプションが存在する場合は、そこから DeviceID を読み取ります。 For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +ここで、`65074` はオプション ID であり、`3031323334353637` はその 16 進形式の値です (DeviceID: `01234567`)。 + +完了です! DeviceIDを表示する必要があります。 + +:::note + +`dig` コマンドは単なる例であり、このアクションを実行するには、EDNS オプションを追加できるものであれば、任意のDNSソフトウェアを使用できます。 + +::: + +## プレーンDNSを使う + +DNS設定に余分なソフトウェアを使いたくない場合は、暗号化されていないDNSを選ぶことができます。 リンクされた IP または 専用 IP を使用するという次の2つの選択肢があります: + +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 15a8f60f6..70425e1d0 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -5,17 +5,17 @@ sidebar_position: 4 To connect a macOS device to AdGuard DNS, first add it to _Dashboard_: -1. Go to _Dashboard_ and click _Connect new device_. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 2. In the drop-down menu _Device type_, select Mac. -3. Name the device. +3. デバイスに名前を付けます。 ![Connecting\_device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/choose_mac.png) -## Use AdGuard Ad Blocker (paid option) +## AdGuard 広告ブロッカーアプリを使用する(有料オプション) -The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your macOS device. You can choose from various encryption protocols. Along with DNS filtering, you also get an excellent ad blocker that works across your entire system. +The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your macOS device. 様々な暗号化プロトコルから選択することができます。 DNSフィルタリングに加えて、システム全体で機能する優れた広告ブロッカーも手に入っちゃうことがメリットです。 1. [Install the app](https://adguard.com/adguard-mac/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the app. +2. アプリを開きます。 3. Click the icon in the top right corner. ![Protection icon \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step3.png) 4. Select _Preferences..._. @@ -26,7 +26,7 @@ The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdG ![DNS protection \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step6.png) 7. Click _+_ in the bottom left corner. ![Click + \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step7.png) -8. Copy one of the following DNS addresses and paste it into the _DNS servers_ field in the app. If you are not sure which one to prefer, select _DNS-over-HTTPS_. +8. Copy one of the following DNS addresses and paste it into the _DNS servers_ field in the app. どれを使用すべきかわからない場合は、「_DNS-over-HTTPS_」アドレスを選択してください。 ![DoH server \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step8_1.png) ![Create server \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step8_2.png) 9. Click _Save and Choose_. @@ -34,31 +34,31 @@ The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdG 10. Your newly created server should appear at the bottom of the list. ![Providers \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_ab/mac_step10.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use AdGuard VPN +## AdGuard VPN を使用する -Not all VPN services support encrypted DNS. However, our VPN does, so if you need both a VPN and a private DNS, AdGuard VPN is your go-to option. +VPNサービスの中には、暗号化DNSをサポートしていないものもあります。 しかし、AdGuard VPN は対応しているので、VPNとプライベートDNSの両方が必要な場合、AdGuard VPN がベストチョイスになります。 1. Install the [AdGuard VPN app](https://adguard-vpn.com/mac/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the AdGuard VPN app. +2. AdGuard VPN アプリを開きます。 3. Open _Settings_ → _App settings_ → _DNS servers_ → _Add Custom Server_. ![Add custom server \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_vpn/mac_step3.png) -4. Copy one of the following DNS addresses and paste it into the _DNS server addresses_ text field. If you are not sure which one to prefer, select DNS-over-HTTPS. +4. 以下のDNSアドレスから一つを選んでコピーして、「DNSサーバーアドレス」欄に貼り付けます。 If you are not sure which one to prefer, select DNS-over-HTTPS. ![DNS servers \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_vpn/mac_step4.png) 5. Click _Save and select_. -6. The DNS server you’ve added will appear at the bottom of the _Custom DNS servers_ list. +6. 追加したDNSサーバーは、「カスタムDNSサーバー」リストの一番下に現れます。 ![Custom DNS servers \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_vpn/mac_step6.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use a configuration profile +## 構成プロファイルを使用する -A macOS device profile, also referred to as a "configuration profile" by Apple, is a certificate-signed XML file that you can manually install on your device or deploy using an MDM solution. It also allows you to configure Private AdGuard DNS on your device. +A macOS device profile, also referred to as a "configuration profile" by Apple, is a certificate-signed XML file that you can manually install on your device or deploy using an MDM solution. これにより、デバイス上でプライベート AdGuard DNS を設定できます。 -:::note Important +:::note 【重要】 -If you are using a VPN, the configuration profile will be ignored. +VPNを使用している場合、構成プロファイルは無視されます。 ::: @@ -71,11 +71,11 @@ If you are using a VPN, the configuration profile will be ignored. ![Install \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/mac_profile/mac_step4.png) 5. Enter the admin password and click _OK_. -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Configure plain DNS +## プレーンDNSを構成する -If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. +DNS設定に余分なソフトウェアを使いたくない場合は、暗号化されていないDNSを選ぶことができます。 リンクされた IP または 専用 IP を使用するという次の2つの選択肢があります: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 188fadecd..6ab16a015 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -3,19 +3,19 @@ title: Windows sidebar_position: 5 --- -To connect an iOS device to AdGuard DNS, first add it to _Dashboard_: +iOSデバイスを AdGuard DNS に接続するには、まずはデバイスを「ダッシュボード」に追加します: -1. Go to _Dashboard_ and click _Connect new device_. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 2. In the drop-down menu _Device type_, select Windows. -3. Name the device. +3. デバイスに名前を付けます。 ![Connecting\_device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_ab/choose_windows.png) -## Use AdGuard Ad Blocker (paid option) +## AdGuard 広告ブロッカーアプリを使用する(有料オプション) -The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your Windows device. You can choose from various encryption protocols. Along with DNS filtering, you also get an excellent ad blocker that works across your entire system. +The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdGuard DNS on your Windows device. 様々な暗号化プロトコルから選択することができます。 DNSフィルタリングに加えて、システム全体で機能する優れた広告ブロッカーも手に入っちゃうことがメリットです。 1. [Install the app](https://adguard.com/adguard-windows/overview.html) on the device you want to connect to AdGuard DNS. -2. Open the app. +2. アプリを開きます。 3. Click _Settings_ at the top of the app's home screen. ![Settings \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_ab/windows_step3.png) 4. Select the _DNS Protection_ tab from the menu on the left. @@ -29,14 +29,14 @@ The AdGuard app lets you use encrypted DNS, making it perfect for setting up AdG ![Create server \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_ab/windows_step7_2.png) 8. Click _Save and select_. ![Save and select \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_ab/windows_step8.png) -9. The DNS server you’ve added will appear at the bottom of the _Custom DNS servers_ list. +9. 追加したDNSサーバーは、「カスタムDNSサーバー」リストの一番下に現れます。 ![Custom DNS servers \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_ab/windows_step9.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use AdGuard VPN +## AdGuard VPN を使用する -Not all VPN services support encrypted DNS. However, our VPN does, so if you need both a VPN and a private DNS, AdGuard VPN is your go-to option. +VPNサービスの中には、暗号化DNSをサポートしていないものもあります。 しかし、AdGuard VPN は対応しているので、VPNとプライベートDNSの両方が必要な場合、AdGuard VPN がベストチョイスになります。 1. Install AdGuard VPN. 2. Open the app and click _Settings_. @@ -52,17 +52,17 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee 7. Click _Save and select_. ![Save and select \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/windows_vpn/windows_step8.png) -All done! Your device is successfully connected to AdGuard DNS. +完了です! これで、お使いのデバイスは正常に AdGuard DNS に接続されました。 -## Use AdGuard DNS Client +## AdGuard DNS Client を使用する AdGuard DNS Client is a versatile, cross-platform console tool that allows you to connect to AdGuard DNS using encrypted DNS protocols. More details can be found in [different article](/dns-client/overview/). -## Configure plain DNS +## プレーンDNSを構成する -If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. +DNS設定に余分なソフトウェアを使いたくない場合は、暗号化されていないDNSを選ぶことができます。 リンクされた IP または 専用 IP を使用するという次の2つの選択肢があります: -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..c16068d99 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! @@ -85,7 +95,7 @@ On macOS and Linux, the easiest way is to use `cron`: - This job will run every 5 minutes 3. Save crontab. -:::note Important +:::note 【重要】 - Make sure you have `curl` installed on macOS and Linux. - Remember to copy the address from the settings and replace the `ServerID` and `UniqueKey`. diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 382c3c1e5..30578f5fa 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ sidebar_position: 3 2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 3. 「_詳細設定_」サイドバーで、「WAN」セクションに移動します。 4. _WAN DNS 設定セクション_で、「_DNS サーバーに自動的に接続_」を「_いいえ_」に設定します。 -5. [_ローカルクエリの転送_]、[_DNS リバインドの有効化_]、および [_DNSSECの有効化_] をすべて「いいえ」に設定します。 +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. 「_DNSプライバシープロトコル_」を「_DNS-over-TLS(DoT)_」に変更します。 7. _DNS-over-TLSプロファイル_が_Strict_に設定されていることを確認してください。 8. 「_DNS-over-TLSサーバーのリスト_」セクションまでスクロールダウンします。 「_アドレス_」フィールドに、以下のいずれかのアドレスを入力します: @@ -32,11 +32,10 @@ sidebar_position: 3 3. 「_詳細設定_」または「_詳細_」を開きます。 4. 「_WAN_」または「_インターネット_」を選択します。 5. 「_DNS設定_」または「_DNS_」を開きます。 -6. 「_手動DNS_」を選択します。 「_これらの DNS サーバーを使用する_」または 「_DNS サーバーを手動で指定する_」を選択し、以下の DNS サーバーアドレスを入力します: +6. Choose _Manual Setting_. 「_これらの DNS サーバーを使用する_」または 「_DNS サーバーを手動で指定する_」を選択し、以下の DNS サーバーアドレスを入力します: - IPv4: `94.140.14.49` と `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` 7. 設定を保存します。 8. IP(チームプランをご利用の場合は専用IP)をリンクします。 - -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 3941e06c7..252fd21b0 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ FritzBoxルーターがDNS-over-TLS設定をサポートしていない場合は 6. 設定を保存します。 7. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 2532d9d24..7e799e9a0 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keeneticルーターは、安定性と柔軟に設定できることで知られ 5. 「_ユーティリティとサービス_」で、 %value% プロキシを選択してインストールします。 6. 「_メニュー_」→「_ネットワークルール_」→「イ_ンターネットの安全性_」に進みます。 7. 「DNS-over-HTTPSサーバー」に移動し、「_DNS-over-HTTPSサーバーを追加_」をクリックします。 -8. `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` フィールドにプライベート AdGuard DNS サーバーの URL を入力します。 +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. [_保存_] をクリックします。 ## DNS-over-TLS を構成して接続する @@ -26,7 +26,7 @@ Keeneticルーターは、安定性と柔軟に設定できることで知られ 5. 「_ユーティリティとサービス_」で、 %value% プロキシを選択してインストールします。 6. 「_メニュー_」→「_ネットワークルール_」→「イ_ンターネットの安全性_」に進みます。 7. 「DNS-over-HTTPSサーバー」に移動し、「_DNS-over-HTTPSサーバーを追加_」をクリックします。 -8. `tls://*********.d.adguard-dns.com` フィールドにプライベート AdGuard DNS サーバーの URL を入力します。 +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. [_保存_] をクリックします。 ## ルーターの管理画面を使って接続する @@ -44,5 +44,5 @@ KeeneticルーターがDNS-over-HTTPSやDNS-over-TLS設定をサポートして 7. 設定を保存します。 8. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 7f880b520..f8f4e7acc 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTikルーターは、オープンソースのRouterOSオペレーティングシステムを使用しており、家庭や小規模オフィスのネットワーク向けにルーティング、ワイヤレスネットワーク、ファイアウォールサービスを提供しています。 +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## DNS-over-HTTPS を設定する @@ -23,38 +23,42 @@ MikroTikルーターは、オープンソースのRouterOSオペレーティン - `94.140.14.49` - `94.140.14.59` - _Allow Remote Requests_ を _Yes_ に設定します(これは DoH が機能するために重要です)。 - - _Use DoH server_ フィールドに、プライベートAdGuard DNSサーバーのURLを入力します: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - 「_OK_」をクリックします。 4. 静的DNSレコードを作成する: - 「_DNS Settings_」で「_Static_」をクリックします。 - _Add New_をクリックします。 - - _Name_を d.adguard-dns.com に設定します。 - - _Type_を A に設定します。 + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - _Address_を`94.140.14.49`に設定します。 - - _TTL_を 1d 00:00:00 に設定します。 + - Set _TTL_ to `1d 00:00:00` - このプロセスを繰り返して、同一のエントリを作成します。ただし、今度は _Address_ を `94.140.14.59` にしてください。 5. DHCP クライアントで Peer DNS を無効にする: - _IP_ → _DHCP Client_ へ進みます。 - インターネット接続に使用されているクライアント(通常はWANインターフェース上)をダブルクリックします。 - _Use Peer DNS_ のチェックを外します。 - 「_OK_」をクリックします。 -6. お使いのIPをリンクします。 -7. テストして動作を確認する: - - すべての変更内容を適用させるには、MikroTikルーターを再起動する必要がある場合があります。 - - ブラウザの DNS キャッシュをクリアします。 [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) のようなツールを使用して、DNSリクエストがAdGuard経由でルーティングされているかどうかを確認できます。 +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## ルーターの管理画面を使って接続する +## My router does not support DNS-over-HTTPS -MikrotikルーターがDNS-over-HTTPSやDNS-over-TLS設定をサポートしていない場合は、以下のガイドをご利用ください: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. ルーターの管理画面を開きます。 (管理画面は、`192.168.1.1` または `192.168.0.1` でアクセスできます。) -2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 -3. 「_Webfig_」→「_IP_」→「_DNS_」を開きます。 -4. _Servers_ を選択し、以下のDNSサーバーアドレスのいずれかを入力します: - - IPv4: `94.140.14.49` と `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` -5. 設定を保存します。 -6. IP(チームプランをご利用の場合は専用IP)をリンクします。 - -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +1. お使いのMikroTikルーターにアクセスする: + - ウェブブラウザを開き、ルーターのIPアドレス(通常は `192.168.88.1`)にアクセスします。 + - (または、Winboxを使用してMikroTikルーターに接続することもできます。) + - 管理者のユーザー名とパスワードを入力します。 +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. DHCP クライアントで Peer DNS を無効にする: + - Go to _IP_ → _DHCP Client_ + - インターネット接続に使用されているクライアント(通常はWANインターフェース上)をダブルクリックします。 + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index cbe2d74c3..72e0e9d19 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -7,14 +7,14 @@ OpenWRTルーターは、オープンソースでLinuxベースのオペレー ## DNS-over-HTTPS を設定する -- **Command-line instructions**. Install the required packages. DNS encryption should be enabled automatically. +- **コマンドライン指示**。 必要なパッケージをインストールします。 DNS暗号化は自動的に有効になるはずです。 ```# Install packages 1. opkg update 2. opkg install https-dns-proxy ``` -- **Web interface**. If you want to manage the settings using web interface, install the necessary packages. +- **ウェブインターフェース**。 ウェブインターフェースを使用して設定を管理したい場合は、必要なパッケージをインストールしてください。 ```# Install packages 1. opkg update @@ -22,9 +22,9 @@ OpenWRTルーターは、オープンソースでLinuxベースのオペレー 3. /etc/init.d/rpcd restart ``` -Navigate to _LuCI_ → _Services_ → _HTTPS DNS Proxy_ to configure the https-dns-proxy. +「LuCI」→「Services(サービス)」→「HTTPS DNS Proxy」に移動して、https-dns-proxyを構成します。 -- **Configure DoH provider**. https-dns-proxy is configured with Google DNS and Cloudflare DNS by default. You need to change it to AdGuard DoH. Specify several resolvers to improve fault tolerance. +- **DoHプロバイダーを設定します**。 https-dns-proxyは、デフォルトで Google DNS と Cloudflare DNS で構成されています。 それを AdGuard DoH に変更する必要があります。 故障耐性を向上させるために、いくつかのリゾルバーを指定しておきます。 ```# Configure DoH provider 1. while uci -q delete https-dns-proxy.@https-dns-proxy[0]; do :; done @@ -39,16 +39,16 @@ Navigate to _LuCI_ → _Services_ → _HTTPS DNS Proxy_ to configure the https-d ## DNS-over-TLS を構成して接続する -- **Command-line instructions**. [Disable](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#disabling_dns_role) Dnsmasq DNS role or remove it completely optionally [replacing](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#replacing_dnsmasq_with_odhcpd_and_unbound) its DHCP role with odhcpd. +- **コマンドライン指示**。 Dnsmasq DNSの役割を[無効にする](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#disabling_dns_role)か、完全に削除して、任意オプションとしてそのDHCPの役割をodhcpdで[置き換えます](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#replacing_dnsmasq_with_odhcpd_and_unbound)。 ```# Install packages 1. opkg update 2. opkg install unbound-daemon ca-certificates ``` -LAN clients and the local system should use Unbound as a primary resolver assuming that Dnsmasq is disabled. +LANクライアントとローカルシステムは、Dnsmasqが無効になっていると仮定して、プライマリリゾルバとして「Unbound」を使用するはずです。 -- **Web interface**. If you want to manage the settings using web interface, install the necessary packages. +- **ウェブインターフェース**。 ウェブインターフェースを使用して設定を管理したい場合は、必要なパッケージをインストールしてください。 ```# Install packages 1. opkg update @@ -56,9 +56,9 @@ LAN clients and the local system should use Unbound as a primary resolver assumi 3. /etc/init.d/rpcd restart ``` -Navigate to _LuCI_ → _Services_ → _Recursive DNS_ to configure Unbound. +「LuCI」 → 「サービス 」→ 「再帰 DNS」 に移動して、「Unbound」 を構成します。 -- **Configure AdGuard DNS-over-TLS**. +- **AdGuard DNS-over-TLS を構成して接続します**。 ```1. uci add unbound zone 2. uci set unbound.@zone[-1].enabled="1" @@ -75,21 +75,21 @@ Navigate to _LuCI_ → _Services_ → _Recursive DNS_ to configure Unbound. 13. /etc/init.d/unbound restart ``` -## Use your router admin panel +## ルーターの管理画面を使って接続する -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +OpenW RT ルーターが DNS-over-HTTPS または DNS-over-TLS の設定をサポートしていない場合は、これらの手順を使用してください: 1. ルーターの管理画面を開きます。 (管理画面は、`192.168.1.1` または `192.168.0.1` でアクセスできます。) 2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 -3. Open _Network_ → _Interfaces_. -4. Select your Wi-Fi network or wired connection. -5. Scroll down to IPv4 address or IPv6 address, depending on the IP version you want to configure. -6. Under _Use custom DNS servers_, enter the IP addresses of the DNS servers you want to use. You can enter multiple DNS servers, separated by spaces or commas: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -7. Optionally, you can enable DNS forwarding if you want the router to act as a DNS forwarder for devices on your network. -8. Save the settings. -9. Link your IP (or your dedicated IP if you have a Team subscription). - -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +3. 「ネットワーク」→「インターフェース」を開きます。 +4. お使いのWi-Fiネットワークまたは有線接続を選択します。 +5. 設定したいIPバージョンに応じて、IPv4アドレスまたはIPv6アドレスまでスクロールダウンします。 +6. 「_カスタムDNSサーバーを使用_」の下で、使用したいDNSサーバーのIPアドレスを入力します。 複数のDNSサーバーを、スペースまたはカンマで区切って入力できます: + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +7. ルーターをネットワーク上のデバイスのDNSフォワーダとして動作させたい場合は、追加でDNSフォワーディングを有効にできます。 +8. 設定を保存します。 +9. IP(チームプランをご利用の場合は専用IP)をリンクします。 + +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index d1beaf9b7..b5c64fe81 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -3,23 +3,23 @@ title: OPNSense sidebar_position: 8 --- -OPNSense firmware is often used to configure wireless access points, DHCP servers, DNS servers, allowing you to configure AdGuard DNS directly on the device. +OPNSenseファームウェアは、無線アクセスポイント、DHCPサーバー、DNSサーバーの設定によく使用され、デバイス上で直接AdGuard DNSを設定することができます。 -## Use your router admin panel +## ルーターの管理画面を使って接続する -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +OPNSense ルーターが DNS-over-HTTPS または DNS-over-TLS の設定をサポートしていない場合は、これらの手順を使用してください: 1. ルーターの管理画面を開きます。 (管理画面は、`192.168.1.1` または `192.168.0.1` でアクセスできます。) 2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 -3. Click _Services_ in the top menu, then select _DHCP Server_ from the drop-down menu. -4. On the _DHCP Server_ page, select the interface that you want to configure the DNS settings for (e.g., LAN, WLAN). -5. Scroll down to _DNS Servers_. +3. トップメニューの「サービス」をクリックし、ドロップダウンメニューから「DHCPサーバー」を選択します。 +4. 「DHCPサーバー」ページで、どのインターフェース(LAN、WLANなど)に対してDNS設定を行いたいかを選択します。 +5. 「DNS サーバー」までスクロールダウンします。 6. 「_手動DNS_」を選択します。 「_これらの DNS サーバーを使用する_」または 「_DNS サーバーを手動で指定する_」を選択し、以下の DNS サーバーアドレスを入力します: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -7. Save the settings. -8. Optionally, you can enable DNSSEC for enhanced security. -9. Link your IP (or your dedicated IP if you have a Team subscription). + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +7. 設定を保存します。 +8. オプションとして、セキュリティを強化するためにDNSSECを有効にすることができます。 +9. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/routers.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/routers.md index b7304537e..c9ecb1a9b 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/routers.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/routers.md @@ -1,20 +1,20 @@ --- -title: Routers +title: ルーター sidebar_position: 1 toc_min_heading_level: 2 toc_max_heading_level: 3 --- -First you need to add your router to the AdGuard DNS interface: +最初に、ルーターをAdGuard DNSインターフェイスに追加する必要があります: -1. Go to _Dashboard_ and click _Connect new device_. -2. In the drop-down menu _Device type_, select Router. -3. Select router brand and name the device. +1. _ダッシュボード_に移動し、「_新しいデバイスを接続_」をクリックします。 +2. ドロップダウンメニューの「_デバイスタイプ_」からルーターを選択します。 +3. ルーターブランドを選択し、デバイスに名前を付けます。 ![Connecting device \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/choose_router.png) -Below are instructions for different router models. Please select the one you need: +以下は、各ルーターモデルのためのガイドです。 必要なものをお選びください: -- [Universal instructions](/private-dns/connect-devices/routers/universal.md) +- [ユニバーサルガイド](/private-dns/connect-devices/routers/universal.md) - [Asus](/private-dns/connect-devices/routers/asus.md) - [FritzBox](/private-dns/connect-devices/routers/fritzbox.md) - [Keenetic](/private-dns/connect-devices/routers/keenetic.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 776346765..2de64da79 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -3,22 +3,22 @@ title: Synology NAS sidebar_position: 9 --- -Synology NAS routers are incredibly easy to use and can be combined into a single mesh network. You can manage your network remotely anytime, anywhere. You can also configure AdGuard DNS directly on the router. +Synology NAS ルーターは驚くほど簡単に使用でき、1 つのメッシュ ネットワークにまとめることができます。 いつでもどこでもリモートでネットワークを管理できます。 ルーターで直接AdGuard DNSを設定することもできます。 -## Use your router admin panel +## ルーターの管理画面を使って接続する -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Synology NASルーターがDNS-over-TLSや DNS-over-HTTPS設定をサポートしていない場合は、以下のガイドをご利用ください: 1. ルーターの管理画面を開きます。 (管理画面は、`192.168.1.1` または `192.168.0.1` でアクセスできます。) 2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 -3. Open _Control Panel_ or _Network_. -4. Select _Network Interface_ or _Network Settings_. -5. Select your Wi-Fi network or wired connection. +3. 「コントロールパネル」または「ネットワーク」を開きます。 +4. 「ネットワークインターフェース」または「ネットワーク設定」を選択します。 +5. お使いのWi-Fiネットワークまたは有線接続を選択します。 6. 「_手動DNS_」を選択します。 「_これらの DNS サーバーを使用する_」または 「_DNS サーバーを手動で指定する_」を選択し、以下の DNS サーバーアドレスを入力します: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -7. Save the settings. -8. Link your IP (or your dedicated IP if you have a Team subscription). + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +7. 設定を保存します。 +8. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [リンクされたIP](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md index e41035812..85fc55f27 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md @@ -3,27 +3,27 @@ title: UniFi sidebar_position: 10 --- -The UiFi router (commonly known as Ubiquiti's UniFi series) has a number of advantages that make it particularly suitable for home, business, and enterprise environments. Unfortunately, it does not support encrypted DNS, but it is great for setting up AdGuard DNS via linked IP. +UiFiルーター(一般的にはUbiquitiのUniFiシリーズとして知られています)には、家庭、ビジネス、エンタープライズ環境に適した多くの利点があります。 残念ながら、暗号化された DNS をサポートしていませんが、リンクされた IP を介して AdGuard DNS を設定するには最適です。 -## Use your router admin panel +## ルーターの管理画面を使って接続する -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +UniFiルーターがDNS-over-TLSや DNS-over-HTTPS設定をサポートしていない場合は、以下のガイドをご利用ください: -1. Log in to the Ubiquiti UniFi controller. -2. Go to _Settings_ → _Networks_. -3. Click _Edit Network_ → _WAN_. -4. Proceed to _Common Settings_ → _DNS Server_ and enter the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Click _Save_. -6. Return to _Network_. -7. Choose _Edit Network_ → _LAN_. -8. Find _DHCP Name Server_ and select _Manual_. -9. Enter your gateway address in the _DNS Server 1_ field. Alternatively, you can enter the AdGuard DNS server addresses in _DNS Server 1_ and _DNS Server 2_ fields: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -10. Save the settings. -11. Link your IP (or your dedicated IP if you have a Team subscription). +1. Ubiquiti UniFi コントローラにログインします。 +2. Settings → Networks にに移動します。 +3. 「Edit Network」→「WAN」をクリックします。 +4. 「Common Settings」→「DNS Server」に進み、以下のDNSサーバーアドレスを入力します。 + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +5. [_保存_] をクリックします。 +6. 「ネットワーク」に戻ります。 +7. Edit Network → LAN を選択します。 +8. DHCP Name Server を見つけ、Manual を選択します。 +9. DNS Server 1 フィールドにゲートウェイアドレスを入力します。 または、_DNS Server 1_ および _DNS Server 2_ フィールドに AdGuard DNS サーバー アドレスを入力することもできます: + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +10. 設定を保存します。 +11. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [Dedicated IPs](private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](private-dns/connect-devices/other-options/linked-ip.md) +- [専用IP](private-dns/connect-devices/other-options/dedicated-ip.md) +- [リンクされたIP](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index 877084c87..ac6e8bf84 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -1,32 +1,32 @@ --- -title: Universal instructions +title: 一般的な手順 sidebar_position: 2 --- -Here are some general instructions for setting up Private AdGuard DNS on routers. You can refer to this guide if you can't find your specific router in the main list. Please note that the configuration details provided here are approximate and may differ from the settings on your particular model. +ここでは、ルーターでプライベート AdGuard DNS を設定するための一般的な手順を紹介しております。 一覧で特定のルーター専用の手順が見つからない場合は、このガイドをお使いください。 ※ここに記載されている設定内容はおおよそのものであり、特定モデルの設定項目とは多少異なる場合があることにご注意ください。 -## Use your router admin panel +## ルーターの管理画面を使って接続する -1. Open the preferences for your router. Usually you can access them from your browser. Depending on the model of your router, try entering one the following addresses: - - Linksys and Asus routers typically use: [http://192.168.1.1](http://192.168.1.1/) - - Netgear routers typically use: [http://192.168.0.1](http://192.168.0.1/) or [http://192.168.1.1](http://192.168.1.1/) D-Link routers typically use [http://192.168.0.1](http://192.168.0.1/) - - Ubiquiti routers typically use: [http://unifi.ubnt.com](http://unifi.ubnt.com/) +1. ルーターの設定を開きます。 ルーターの設定は通常、ブラウザからアクセスできます。 ルーターのモデルに応じて、以下のアドレスのいずれかを入力してみてください: + - Linksys および Asus ルーターは通常、[http://192.168.1.1](http://192.168.1.1/) を使用しています。 + - Netgear ルーターは通常、[http://192.168.0.1](http://192.168.0.1/) または [http://192.168.1.1](http://192.168.1.1/) を使用しています。D-Link ルーターは通常、[http://192.168.0.1](http://192.168.0.1/) を使用しています。 + - Ubiquiti ルーターは通常、[http://unifi.ubnt.com](http://unifi.ubnt.com/) を使用しています。 -2. Enter the router's password. +2. ルーターのパスワードを入力します。 - :::note Important + :::note 重要 - If the password is unknown, you can often reset it by pressing a button on the router; it will also reset the router to its factory settings. Some models have a dedicated management application, which should already be installed on your computer. + パスワードが不明な場合、ルーターのボタンを押すことでリセットできることが多く、これによりルーターは工場出荷時の設定にリセットされます。 一部のモデルには専用の管理アプリがあり、その場合、アプリはすでにお使いのコンピュータにインストールされているはずです。 ::: -3. Find where DNS settings are located in the router's admin console. Change the listed DNS addresses to the following addresses: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` +3. ルーターの管理コンソールでDNS設定を見つけます。 そこにあるDNSアドレスを以下のものに変更します: + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` -4. Save the settings. +4. 設定を保存します。 -5. Link your IP (or your dedicated IP if you have a Team subscription). +5. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 4e87745c4..1392e92fd 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,23 +3,23 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. -Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. +残念ながら、暗号化された DNS をサポートしていませんが、リンクされた IP を介して AdGuard DNS を設定するには最適です。 -## Use your router admin panel +## ルーターの管理画面を使って接続する -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +UniFiルーターがDNS-over-TLSや DNS-over-HTTPS設定をサポートしていない場合は、以下のガイドをご利用ください: -1. ルーターの管理画面を開きます。 It can be accessed at `192.168.31.1` or the IP address of your router. +1. ルーターの管理画面を開きます。 (`192.168.31.1` またはルーターの IP アドレスでアクセスできます。) 2. 管理者ユーザー名(通常は「admin」)とルーターパスワードを入力します。 -3. Open _Advanced Settings_ or _Advanced_, depending on your router model. -4. Open _Network_ or _Internet_ and look for DNS or DNS Settings. +3. ルーターのモデルによって、「詳細設定」または「詳細」を開きます。 +4. 「ネットワーク」または「インターネット」を開き、「DNS」または「DNS設定」を探します。 5. 「_手動DNS_」を選択します。 「_これらの DNS サーバーを使用する_」または 「_DNS サーバーを手動で指定する_」を選択し、以下の DNS サーバーアドレスを入力します: - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -6. Save the settings. -7. Link your IP (or your dedicated IP if you have a Team subscription). + - IPv4: `94.140.14.49` と `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` と `2a10:50c0:0:0:0:0:dad:ff` +6. 設定を保存します。 +7. IP(チームプランをご利用の場合は専用IP)をリンクします。 -- [専用IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [リンクされたIP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md index fe4ec8e63..133f34b58 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md @@ -17,7 +17,7 @@ This setting allows you to specify which clients can use your DNS server. It has Here you can list the clients that are not allowed to use your DNS server. You can block access to all clients and use only selected ones. To do this, add two addresses to the disallowed clients: `0.0.0.0/0` and `::/0`. Then, in the _Allowed clients_ field, specify the addresses that can access your server. -:::note Important +:::note 【重要】 Before applying the access settings, make sure you're not blocking your own IP address. If you do, you won't be able to access the network. If that happens, just disconnect from the DNS server, go to the access settings, and adjust the configurations accordingly. diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/ja/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/ko/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/ko/docusaurus-plugin-content-docs/current/general/dns-providers.md index f7e13fe9a..65bed11ce 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| 프로토콜 | 주소 | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | 프로토콜 | 주소 | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| 프로토콜 | 주소 | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| 프로토콜 | 주소 | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | 프로토콜 | 주소 | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| 프로토콜 | 주소 | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/ko/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md index b66dfe39a..3764e4283 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md @@ -18,17 +18,17 @@ toc_max_heading_level: 3 - 자동 기기 연결 기능이 추가되었습니다. - `auto_connect_devices_enabled`는 특정 링크 유형을 통해 기기의 자동 연결을 주장할 수 있는 DNS 서버 섹션의 새로운 설정입니다. - - New field in Device — `auto_device`, indicating that the device is automatically connected -- Replaced `int` with `long` for `queries` in CategoryQueriesStats, for `used` in AccountLimits, and for `blocked` and `queries` in QueriesStats + - 'auto_device\` - 기기가 자동으로 연결되었음을 나타내는 기기 섹션의 새 필드입니다. +- CategoryQueriesStats에서 'queries'의 'int'를 'long'으로, AccountLimits에서 `used`를, QueriesStats에서 `blocked`과 `queries`를 대체했습니다. ## v1.8 **2024년 4월 20일에 출시됨** - 인증이 있는 DNS-over-HTTPS 지원이 추가되었습니다. - - New operation — reset DNS-over-HTTPS password for device - - New device setting — `detect_doh_auth_only`. Disables all DNS connection methods except DNS-over-HTTPS with authentication - - New field in DeviceDNSAddresses — `dns_over_https_with_auth_url`. 인증이 있는 DNS-over-HTTPS를 사용할 때 연결에 사용할 URL을 나타냅니다. + - 새로운 작업 — 기기의 DNS-over-HTTPS 비밀번호를 초기화합니다. + - `detect_doh_auth_only` — 새로운 기기 설정입니다. 인증이 있는 DNS-over-HTTPS를 제외한 모든 DNS 연결 방법을 비활성화합니다. + - `dns_over_https_with_auth_url` — DeviceDNSAddresses에 새 필드입니다. 인증이 있는 DNS-over-HTTPS를 사용할 때 연결에 사용할 URL을 나타냅니다. ## v1.7 @@ -67,8 +67,8 @@ toc_max_heading_level: 3 - 제한에 도달했을 때를 나타내는 새로운 오류 코드 `FIELD_REACHED_LIMIT`가 추가되었습니다: - - For the total number of `blocked_clients` and `blocked_domain_rules` in access settings - - For `rules` in custom user rules settings + - 접근 설정에서 `blocked_clients` 및 `blocked_domain_rules`의 총 수 + - 사용자 정의 사용자 규칙 설정의 `rules` ## v1.5 @@ -78,7 +78,7 @@ toc_max_heading_level: 3 ### 안전한 브라우징 설정 모델이 변경되었습니다. -From: +변경 전: ```json { @@ -86,7 +86,7 @@ From: } ``` -To: +변경 후: ```json { @@ -100,7 +100,7 @@ To: ### 서버 설정 저장 모델이 변경되었습니다. -From: +변경 전: ```json { @@ -110,7 +110,7 @@ From: } ``` -to: +변경 후: ```json { @@ -136,7 +136,7 @@ to: **2022년 12월 13일에 출시됨** -- Added method to get account limits +- 계정 한도를 확인하는 방법이 추가되었습니다. ## v1.2 diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 9f09fd13c..8bfc71c7a 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ AdGuard 앱을 사용하면 암호화된 DNS를 사용할 수 있어 Android 기 ![DNS 서버 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. 아래로 스크롤하여 **사용자 정의 DNS 서버 추가**를 탭합니다. ![DNS 서버 추가 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. 다음 DNS 주소 중 하나를 복사하여 앱의 **DNS 서버 주소** 필드에 붙여넣습니다. 어떤 것을 사용할지 확실하지 않다면 **DNS-over-HTTPS**를 선택합니다. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. 어떤 것을 사용할지 확실하지 않다면 **DNS-over-HTTPS**를 선택합니다. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![사용자 정의 DNS 서버 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. **저장 및 선택**을 탭합니다. diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 6cb0f6219..3765ecc87 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -62,7 +62,7 @@ AdGuard VPN CLI(명령줄 인터페이스)를 사용하여 사설 AdGuard DNS를 11. _Enter_를 누릅니다. 12. IP 주소(또는 Team을 구독하는 경우 전용 IP)를 연결합니다. - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [연결된 IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## dnsmasq를 사용합니다. @@ -102,9 +102,31 @@ AdGuard DNS에 연결되지 않았다는 알림이 표시되면, 대부분 dnsma ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +기기가 DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## 일반 DNS 사용 DNS 구성을 위한 추가 소프트웨어를 사용하고 싶지 않다면 암호화가 해제된 DNS를 선택할 수 있습니다. 연결된 IP 또는 전용 IP를 사용하는 두 가지 선택 사항이 있습니다: - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [연결된 IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index a829d3212..a640bf3d1 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ sidebar_position: 2 ## 전용 IP가 필요한 이유는 무엇인가요? -안타깝게도 연결된 기기의 기술 사양이 항상 암호화된 사설 AdGuard DNS 서버를 설정할 수 없도록 허용되지는 않을 수 있습니다. 이 경우, 일반 암호화되지 않은 DNS를 사용해야 합니다. AdGuard DNS를 설정하려면 [연결된 IP](/private-dns/connect-devices/other-options/linked-ip.md) 또는 전용 IP를 사용할 수 있습니다. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. 이 경우, 일반 암호화되지 않은 DNS를 사용해야 합니다. AdGuard DNS를 설정하려면 [연결된 IP](/private-dns/connect-devices/other-options/linked-ip.md) 또는 전용 IP를 사용할 수 있습니다. 전용 IP는 일반적으로 더 안정적인 옵션입니다. 연결된 IP에는 몇 가지 제한 사항이 있어서 거주지 주소만 허용되며, 제공자가 IP를 변경할 수 있고 IP 주소를 다시 연결해야 합니다. 전용 IP를 사용하면 본인만 사용할 수 있는 IP 주소가 제공되며 모든 요청이 해당 기기에서 계산됩니다. diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index c7a566ada..a25501216 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ sidebar_position: 3 ::: -때때로 주거용 IP 주소가 이미 사용 중일 수 있으며, 이 주소에 연결을 시도하면 AdGuard DNS가 연결을 차단합니다. -![연결된 IPv4 주소 \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -이 경우 지원팀([support@adguard-dns.io](mailto:support@adguard-dns.io))으로 문의하시면 올바른 구성 설정을 도와드릴 것입니다. +Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + +![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## 연결 IP 설정 방법 @@ -25,6 +27,7 @@ sidebar_position: 3 2. 새 기기를 추가하거나 이전에 연결된 기기의 설정을 엽니다. 3. **DNS 서버 주소 사용**으로 이동합니다. 4. **일반 DNS 서버 주소**를 열고 연결된 IP를 연결합니다. + ![연결된 IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## 동적 DNS @@ -44,14 +47,21 @@ DDNS(동적 DNS)는 IP 주소가 변경될 때마다 DNS 레코드를 자동으 ## 동적 DNS: 설정 방법 1. 라우터 설정에서 DDNS가 지원되는지 확인해야 합니다. + - **라우터 설정** → **네트워크**로 이동합니다. - DDNS 또는 **동적 DNS** 섹션을 찾습니다. - - 해당 페이지로 이동하여 설정이 실제로 지원되는지 확인합니다. _이것은 어떤 모습일 수 있는지에 대한 예시일 뿐입니다. 라우터에 따라 다를 수 있습니다_ - ![DDNS 지원 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - 해당 페이지로 이동하여 설정이 실제로 지원되는지 확인합니다. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) 등 인기 있는 서비스 또는 선호하는 기타 DDNS 공급업체에 도메인을 등록합니다. + 3. 라우터 설정에 도메인을 입력하고 구성을 동기화합니다. + 4. 연결된 IP 설정으로 이동하여 주소를 연결한 다음 **고급 설정**으로 이동하여 **DDNS 구성**을 클릭합니다. + 5. 이전에 등록한 도메인을 입력하고 **DDNS 구성**을 클릭합니다. + ![DDNS 설정 \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) DDNS를 성공적으로 설정했습니다! diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 393afa40d..109c6a828 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -5,38 +5,37 @@ sidebar_position: 3 ## DNS-over-TLS 설정 -These are general instructions for configuring Private AdGuard DNS for Asus routers. +다음은 Asus 라우터에 대해 사설 AdGuard DNS를 환경 설정하는 일반 모드 설명서입니다. -The configuration information in these instructions is taken from a specific router model, so it may differ from the interface of an individual device. +이 도움말의 구성 정보는 특정 라우터 모델에서 가져온 것이므로 개별 기기의 인터페이스와 다를 수 있습니다. -If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware](https://www.asuswrt-merlin.net/download) suitable for your router version on your computer. +필요한 경우: ASUS에서 DNS-over-TLS를 구성하고, 컴퓨터에 라우터 버전에 적합한 [ASUS Merlin 펌웨어](https://www.asuswrt-merlin.net/download)를 설치합니다. -1. Log in to your Asus router admin panel.  [http://router.asus.com](http://router.asus.com/),  [http://192.168.1.1](http://192.168.1.1/),  [http://192.168.0.1](http://192.168.0.1/) 또는  [http://192.168.2.1](http://192.168.2.1/)을 통해 액세스할 수 있습니다. -2. Enter the administrator username (usually, it’s admin) and router password. -3. In the _Advanced Settings_ sidebar, navigate to the WAN section. -4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. -6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). -7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. -8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: +1. Asus 라우터 관리자 패널에 로그인합니다.  [http://router.asus.com](http://router.asus.com/),  [http://192.168.1.1](http://192.168.1.1/),  [http://192.168.0.1](http://192.168.0.1/) 또는  [http://192.168.2.1](http://192.168.2.1/)을 통해 액세스할 수 있습니다. +2. 관리자 사용자 이름(일반적으로 admin)과 라우터 비밀번호를 입력합니다. +3. **고급 설정** 사이드바에서 WAN 섹션으로 이동합니다. +4. **WAN DNS 설정** 섹션에서 **DNS 서버 자동으로 연결**을 **아니요**로 설정합니다. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. +6. DNS 개인정보 보호 프로토콜을 DNS-over-TLS(DoT)로 변경합니다. +7. **DNS-over-TLS 프로필**이 **Strict**로 설정되어 있는지 확인합니다. +8. **DNS-over-TLS 서버 목록** 섹션까지 아래로 스크롤합니다. **주소** 필드에 아래 주소 중 하나를 입력합니다. - `94.140.14.49` 및 `94.140.14.59` -9. For _TLS Port_, enter 853. -10. In the _TLS Hostname_ field, enter the Private AdGuard DNS server address: +9. **TLS 포트**의 경우, 853을 입력합니다. +10. **TLS 호스트 이름** 필드에 사설 AdGuard DNS 서버 주소를 입력합니다. - `{Your_Device_ID}.d.adguard-dns.com` -11. Scroll to the bottom of the page and click _Apply_. +11. 페이지 아래로 스크롤한 뒤 **적용**을 클릭합니다. ## 라우터 관리 패널 사용 -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Advanced Settings_ or _Advanced_. +1. 라우터 관리자 패널을 엽니다. 192.168.1.1`또는`192.168.0.1\`에서 접속할 수 있습니다. +2. 관리자 사용자 이름(일반적으로 admin)과 라우터 비밀번호를 입력합니다. +3. **고급 설정** 또는 **고급**을 엽니다. 4. **WAN** 또는 **인터넷**을 선택합니다. 5. **DNS 설정** 또는 **DNS**를 엽니다. -6. **수동 DNS**를 선택합니다. **이 DNS 서버 사용** 또는 **수동으로 DNS 서버 지정**을 선택하고 다음 DNS 서버 주소를 입력합니다: +6. Choose _Manual Setting_. **이 DNS 서버 사용** 또는 **수동으로 DNS 서버 지정**을 선택하고 다음 DNS 서버 주소를 입력합니다: - IPv4: `94.140.14.49` 및 `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` 및 `2a10:50c0:0:0:0:0:dad:ff` 7. 설정을 저장합니다. 8. IP(또는 팀 구독이 있는 경우 전용 IP)를 연결합니다. - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [연결된 IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index bab0880a3..517177f88 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic 라우터는 안정성과 유연한 환경 설정으로 잘 알려져 5. **유틸리티 및 서비스**에서 DNS-over-HTTPS 프록시를 선택하고 설치합니다. 6. **메뉴** → **네트워크 규칙** → **인터넷 보안**으로 이동합니다. 7. DNS-over-HTTPS 서버로 이동하여 **DNS-over-HTTPS 서버 추가**를 클릭합니다. -8. `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` 필드에 사설 AdGuard DNS 서버의 URL을 입력합니다. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. **저장**을 클릭합니다. ## DNS-over-TLS 설정 @@ -26,7 +26,7 @@ Keenetic 라우터는 안정성과 유연한 환경 설정으로 잘 알려져 5. **유틸리티 및 서비스**에서 DNS-over-HTTPS 프록시를 선택하고 설치합니다. 6. **메뉴** → **네트워크 규칙** → **인터넷 보안**으로 이동합니다. 7. DNS-over-HTTPS 서버로 이동하여 **DNS-over-HTTPS 서버 추가**를 클릭합니다. -8. `tls://*********.d.adguard-dns.com` 필드에 사설 AdGuard DNS 서버의 URL을 입력합니다. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. **저장**을 클릭합니다. ## 라우터 관리 패널 사용 diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 8060e09d3..566a40fdd 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik 라우터는 가정 및 소규모 사무실 네트워크에 라우팅, 무선 네트워킹 및 방화벽 서비스를 제공하는 오픈 소스 RouterOS 운영 체제를 사용합니다. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## DNS-over-HTTPS 설정 @@ -23,38 +23,42 @@ MikroTik 라우터는 가정 및 소규모 사무실 네트워크에 라우팅, - `94.140.14.49` - `94.140.14.59` - **원격 요청 허용**을 **예**로 설정합니다(DoH가 작동하려면 이 설정이 필수입니다). - - **DoH 서버 사용** 필드에 사설 AdGuard DNS 서버의 URL을 입력합니다: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - **확인**을 클릭합니다. 4. 정적 DNS 레코드를 만듭니다. -  **DNS 설정**에서 **정적**을 클릭합니다. - **새로 추가**를 클릭합니다. - - **이름**을 d.adguard-dns.com으로 설정합니다. - - **유형**을 A로 설정합니다. + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - **주소**를 `94.140.14.49`로 설정합니다. - - **TTL**을 1d 00:00:00로 설정합니다. + - Set _TTL_ to `1d 00:00:00` - 이 과정을 반복하여 동일한 항목을 생성하되, **주소**를 `94.140.14.59`로 설정합니다. 5. DHCP 클라이언트에서 Peer DNS를 비활성화합니다. - **IP** → **DHCP 클라이언트**로 이동합니다. - 인터넷 연결에 사용되는 클라이언트(일반적으로 WAN 인터페이스에서)를 두 번 클릭합니다. - **Peer DNS 사용**을 선택 취소합니다. - **확인**을 클릭합니다. -6. IP를 연결합니다. -7. 테스트하고 확인합니다. - - 모든 변경 사항을 적용하려면 MikroTik 라우터를 재부팅해야 할 수 있습니다. - - 브라우저의 DNS 캐시를 지웁니다. [https://www.dnsleaktest.com](https://www.dnsleaktest.com/)와 같은 도구를 사용하여 DNS 요청이 AdGuard를 통해 라우팅되는지 확인할 수 있습니다. +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## 라우터 관리 패널 사용 +## My router does not support DNS-over-HTTPS -Keenetic 라우터가 DNS-over-HTTPS 또는 DNS-over-TLS 구성을 지원하지 않는 경우, 이 지침을 따르세요. +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. 라우터 관리자 패널을 엽니다. 192.168.1.1`또는`192.168.0.1\`에서 접속할 수 있습니다. -2. 관리자 사용자 아이디(일반적으로 admin)와 라우터 비밀번호를 입력합니다. -3. **Webfig** → **IP** → **DNS**를 엽니다. -4. **서버**를 선택하고 다음 DNS 서버 주소 중 하나를 입력합니다. - - IPv4: `94.140.14.49` 및 `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` 및 `2a10:50c0:0:0:0:0:dad:ff` -5. 설정을 저장합니다. -6. IP(또는 팀 구독이 있는 경우 전용 IP)를 연결합니다. - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [연결된 IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. MikroTik 라우터 설정으로 이동합니다. + - 웹브라우저를 열고 라우터의 IP 주소(일반적으로 `192.168.88.1`)로 이동합니다. + - 또는 Winbox를 사용하여 MikroTik 라우터에 연결할 수 있습니다. + - 관리자 사용자 아이디와 비밀번호를 입력합니다. +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` 및 `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` 및 `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. DHCP 클라이언트에서 Peer DNS를 비활성화합니다. + - Go to _IP_ → _DHCP Client_ + - 인터넷 연결에 사용되는 클라이언트(일반적으로 WAN 인터페이스에서)를 두 번 클릭합니다. + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md index 52bb0f9c2..27b80909f 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/unifi.md @@ -3,7 +3,7 @@ title: UniFi sidebar_position: 10 --- -The UiFi router (commonly known as Ubiquiti's UniFi series) has a number of advantages that make it particularly suitable for home, business, and enterprise environments. Unfortunately, it does not support encrypted DNS, but it is great for setting up AdGuard DNS via linked IP. +The UiFi router (commonly known as Ubiquiti's UniFi series) has a number of advantages that make it particularly suitable for home, business, and enterprise environments. 안타깝게도 암호화된 DNS는 지원하지 않지만 연결된 IP를 통해 AdGuard DNS를 설정하는 데는 매우 유용합니다. ## 라우터 관리 패널 사용 diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 9c3135140..71c208d58 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi 라우터는 안정적이고 강력한 신호, 네트워크 보안, 안정적인 작동, 지능형 관리와 같은 많은 장점을 가지고 있으며 동시에 사용자는 최대 64 개의 기기를 로컬 Wi-Fi 네트워크에 연결할 수 있습니다. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. 안타깝게도 암호화된 DNS는 지원하지 않지만 연결된 IP를 통해 AdGuard DNS를 설정하는 데는 매우 유용합니다. diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index ee5d1c251..93d2333a6 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS 요청 한도는 일반적으로 클라이언트(IP 주소)가 주어진 기 AdGuard DNS **엔터프라이즈** 또는 **팀** 요금제에 가입한 경우, 요청 한도 증가를 요청할 수 있습니다. 아래 지침을 따르세요. 1. [DNS 대시보드](https://adguard-dns.io/dashboard/) → **계정 설정** → **요청 한도**으로 이동합니다. + 2. **요청 한도 증가**를 클릭하여 지원팀에 문의하고 요청 한도 증가를 신청하세요. CIDR과 원하는 한도를 제공해야 합니다. -![요청 한도](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. 요청은 영업일 기준 1~3일 이내에 검토됩니다. 변경 사항에 대해 이메일로 연락드리겠습니다. +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index deceb8cde..af89a751d 100644 --- a/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/ko/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,11 +3,11 @@ title: 서버 및 설정 sidebar_position: 1 --- -## 서버란 무엇이며 어떻게 사용하나요? +## What is a server and how to use it -When you set up Private AdGuard DNS, you'll encounter the term _servers_. +사설 AdGuard DNS를 설정할 때 **서버**라는 용어가 표시됩니다. -A server acts as the “profile” that you connect your devices to. +서버는 기기를 연결하는 '프로필' 역할을 합니다. 서버에는 사용자에게 맞춤화할 수 있는 환경 설정이 포함되어 있습니다. @@ -17,11 +17,11 @@ A server acts as the “profile” that you connect your devices to. - 모든 요청을 허용하는 서버 - 성인용 콘텐츠와 특정 서비스를 차단하는 서버 -- A server that blocks adult content only during specific hours you choose +- 특정 시간 동안만 성인용 콘텐츠를 차단하는 서버 -For more information on traffic filtering and blocking rules, check out the article [“How to set up filtering in AdGuard DNS”](/private-dns/setting-up-filtering/blocklists.md). +트래픽 필터링 및 차단 규칙에 대한 자세한 정보는 ['AdGuard DNS에서 필터링 설정 방법'](/private-dns/setting-up-filtering/blocklists.md) 기사를 참고하세요. -If you're interested in specific settings, there are dedicated articles available for that: +특정 설정에 관심이 있다면 해당 주제에 대한 전담 문서를 참조하세요. - [고급 설정](/private-dns/server-and-settings/advanced.md) - [접근 설정](/private-dns/server-and-settings/access.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/nl/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 73728cf21..92b036989 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Voorbeeld:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Voorbeeld:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Voorbeeld:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/nl/docusaurus-plugin-content-docs/current/general/dns-providers.md index c91c9ebd7..f7a0657c1 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is een privacygerichte DNS-service die de beveiliging en anonimiteit van de gebruiker prioriteit geeft. Het ondersteunt zowel standaard DNS als versleutelde protocollen, terwijl het een strikt geen logboekregistratie beleid handhaaft. + +#### Standard + +| Protocol | Adres | | +| -------------------- | -------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Adres | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is een privacyvriendelijke DNS-provider met jarenlange ervaring in de ontwikkeling van domeinnaamresolutieservices. Het doel is om gebruikers een snellere, nauwkeurigere en stabielere recursieve resolutieservice te bieden. -| Protocol | Adres | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Adres | | +| -------------- | ------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,9 +1160,9 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) biedt DoH- & DoT-resolvers met drie niveaus van filtering -#### Standard +#### Standaard Blocks ads, trackers, and malware @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is een persoonlijke DNS-server gevestigd in Vietnam en bedoeld voor persoonlijk en kleinschalig gebruik. Het beschikt over advertentieblokkering, bescherming tegen malware/phishing, filter voor inhoud voor volwassenen en DNSSEC-validatie. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. Het beschikt over advertentieblokkering, bescherming tegen malware/phishing, filter voor inhoud voor volwassenen en DNSSEC-validatie. | Protocol | Adres | | | -------------- | --------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is een DNS die zich richt op het blokkeren van advertenties, privacy, malwarebescherming en heeft een strikt beleid van geen logboekregistratie. + +| Protocol | Adres | | +| --------- | --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Toevoegen aan AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Toevoegen aan AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/nl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index f866f3dfe..ce1109a70 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,12 +1,10 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. -Veilige DNS gebruikt meestal `tls://`, `https://`of `quic://` URL's. This is sufficient for most users and is the recommended way. +Secure DNS usually uses `tls://`, `https://`, or `quic://` URLs. This is sufficient for most users and is the recommended way. However, if you need additional security, like pre-resolved server IPs and certificate pinning by hash, you may generate your own DNS stamp. @@ -18,7 +16,7 @@ DNS stamps allow you to customize Secure DNS settings beyond the usual URLs. In ## Choosing the protocol -Tot de typen beveiligde DNS behoren: `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, en nog enkele andere. Choosing one of these protocols depends on the context in which you'll be using them. +Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, and some others. Choosing one of these protocols depends on the context in which you'll be using them. ## Creating a DNS stamp diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 9abff2ade..27f929b84 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ In this section you will find instructions on how to connect your device to AdGu For devices that do not natively support encrypted DNS protocols, we offer three other options: - [AdGuard DNS Client](/dns-client/overview.md) -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) If you want to restrict access to AdGuard DNS to certain devices, use [DNS-over-HTTPS with authentication](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 0059e101c..45cc022ec 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Configure your game console to use a public AdGuard DNS server or configure it v It would be preferable to use linked IP (or dedicated IP if you have a Team subscription): -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index beded4821..c0a702b81 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Configure your game console to use a public AdGuard DNS server or configure it v It would be preferable to use linked IP (or dedicated IP if you have a Team subscription): -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 2630e1b10..45a30a1e8 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Configure your game console to use a public AdGuard DNS server or configure it v It would be preferable to use linked IP (or dedicated IP if you have a Team subscription): -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index a579a1267..aac5bda1b 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ Configure your game console to use a public AdGuard DNS server or configure it v It would be preferable to use linked IP (or dedicated IP if you have a Team subscription): -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 77975df23..608167a07 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Configure your game console to use a public AdGuard DNS server or configure it v It would be preferable to use linked IP (or dedicated IP if you have a Team subscription): -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 77a119503..9660bb18d 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. @@ -75,5 +75,5 @@ You can configure your DNS server in your device settings. Please note that Andr If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index 583d96684..883709012 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ If you are using a VPN, the configuration profile will be ignored. If you prefer not to use extra software to configure DNS, you can opt for unencrypted DNS. There are two options: using linked IPs or dedicated IPs. -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 37172c0a5..5d874efca 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ You can set up Private AdGuard DNS using the AdGuard VPN CLI (command-line inter 9. Turn off _Auto mode_. 10. Click _Apply_. 11. Link your IP address (or your dedicated IP if you have a Team subscription): - - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) ## Configure manually on Debian (linked IP or dedicated IP required) @@ -61,8 +61,8 @@ You can set up Private AdGuard DNS using the AdGuard VPN CLI (command-line inter 10. Press _Enter_. 11. Close the Terminal. 12. Link your IP address (or your dedicated IP if you have a Team subscription): - - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) ## Use dnsmasq @@ -102,9 +102,31 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## EDNS (Extended DNS) gebruiken + +EDNS breidt het DNS-protocol uit, waarbij grotere UDP-pakketten extra gegevens kunnen bevatten. In AdGuard DNS staat het toe om DeviceID door te geven in standaard DNS met behulp van een extra parameter. + +DeviceID, een achtcijferige hexadecimale identificator (bijv. `1a2b3c4d`), helpt bij het koppelen van DNS-verzoeken aan specifieke apparaten. Voor versleutelde DNS is deze ID onderdeel van het domein (bijv., `1a2b3c4d.d.adguard-dns.com`). Voor onbeveiligde DNS is EDNS vereist om deze identificator over te dragen. + +AdGuard DNS gebruikt EDNS om DeviceID op te halen door te zoeken naar optie nummer `65074`. Als er een dergelijke optie bestaat, wordt de DeviceID daaruit gelezen. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Hier is `65074` de optie-ID en `3031323334353637` is de waarde in hex-formaat (DeviceID: `01234567`). + +Voltooid! DeviceID moet worden weergegeven. + +:::note + +De `dig`-opdracht is slechts een voorbeeld, je kunt elke DNS-software gebruiken met de mogelijkheid om EDNS-opties toe te voegen om deze actie uit te voeren. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 3e3be5626..14eb8d772 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ All done! Your device is successfully connected to AdGuard DNS. If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 0855ffb23..f43cf1e9a 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ More details can be found in [different article](/dns-client/overview/). If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs. -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index fd069e426..0975d7ea2 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,8 +13,10 @@ Een **residentieel IP-adres** wordt toegewezen aan een apparaat dat is verbonden ::: -Soms kan een residentieel IP-adres al in gebruik zijn, en als je probeert er mee te verbinden, zal AdGuard DNS de verbinding voorkomen. +Soms is een IP-adres voor thuisgebruik al in gebruik. Als je verbinding probeert te maken met dit adres, blokkeert AdGuard DNS de verbinding. + ![Gekoppeld IPv4-adres \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + Mocht dat gebeuren, neem dan contact op met de ondersteuning via [support@adguard-dns.io](mailto:support@adguard-dns.io), dan helpen zij je met de juiste configuratie-instellingen. ## Hoe een gekoppeld IP-adres in te stellen @@ -25,6 +27,7 @@ De volgende instructies leggen uit hoe je verbinding kunt maken met het apparaat 2. Voeg een nieuw apparaat toe of open de instellingen van een eerder verbonden apparaat. 3. Ga naar _DNS-serveradressen gebruiken_. 4. Open _Gewone DNS-serveradressen_ en verbind het gekoppelde IP-adres. + ![Gekoppelde IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamische DNS: waarom het nuttig is @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS-ondersteund \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..7f0bb4062 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 2d92bcd77..55864d452 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Use this guide if your FritzBox router does not support DNS-over-TLS configurati 6. Save the settings. 7. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..32b59b1fa 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. @@ -44,5 +44,5 @@ Use these instructions if your Keenetic router does not support DNS-over-HTTPS o 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..1a03069a3 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Toegang tot je MikroTik-router: + - Open je webbrowser en ga naar het IP-adres van je router (meestal `192.168.88.1`) + - Als alternatief kun je Winbox gebruiken om verbinding te maken met je MikroTik-router + - Voer je beheerdersgebruikersnaam en wachtwoord in +2. Configure Plain DNS: + - Ga naar _IP_ → _DNS_ + - Bij _Servers_ voeg de volgende AdGuard DNS-servers toe: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Toegewezen IPv6: Privé AdGuard DNS ondersteunt toegewezen IPv6-adressen. Om ze te vinden, open je het Dashboard, klik je op _Instellingen_ naast je apparaat → _Standaard DNS-serveradressen_ → _Toegewezen IPv6-adressen_. + - Klik _OK_ +3. Disable Peer DNS on DHCP Client: + - Ga naar _IP_ → _DHCP Client_ + - Dubbelklik op de client die wordt gebruikt voor je internetverbinding (meestal op de WAN-interface) + - Verwijder het vinkje bij _Peer DNS gebruiken_ + - Klik _OK_ diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index c4828dc88..1a35a5ac7 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ Use these instructions if your Keenetic router does not support DNS-over-HTTPS o 8. Save the settings. 9. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index 911b2b0de..ddd3012b8 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Use these instructions if your Keenetic router does not support DNS-over-HTTPS o 8. Optionally, you can enable DNSSEC for enhanced security. 9. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 7a287e167..56f4960a2 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Use these instructions if your Keenetic router does not support DNS-over-HTTPS o 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) - [Linked IPs](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index 2ccbb5f78..378c39961 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Here are some general instructions for setting up Private AdGuard DNS on routers 5. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..9a6bb776e 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi-routers hebben veel voordelen: een stabiel, sterk signaal, netwerkbeveiliging, robuuste prestaties en slimme bediening. Gebruikers kunnen tot 64 apparaten verbinden met een lokaal Wi-Fi-netwerk. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. @@ -21,5 +21,5 @@ Use these instructions if your Keenetic router does not support DNS-over-HTTPS o 6. Save the settings. 7. Link your IP (or your dedicated IP if you have a Team subscription). -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +- [Toegewezen IP's](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Gekoppelde IP's](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 1b9d07770..18bf7fe77 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS-snelheidsbeperking werkt meestal door drempels in te stellen voor het aantal Als je geabonneerd bent op een AdGuard DNS _Team_ of _Zakelijk_ abonnement, kun je een hogere snelheidslimiet aanvragen. Volg hiervoor de onderstaande instructies: 1. Ga naar [DNS-dashboard](https://adguard-dns.io/dashboard/) → _Accountinstellingen_ → _Snelheidslimiet_ + 2. Tik op _limietverhoging aanvragen_ om contact op te nemen met ons supportteam en de tariefverhoging aan te vragen. Je moet je CIDR opgeven en de limiet die je wilt hebben -! [Snelheidslimiet](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Snelheidslimiet](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Je verzoek wordt binnen 1-3 werkdagen behandeld. We nemen per e-mail contact met je op over de wijzigingen +3. Je verzoek wordt binnen 1-3 werkdagen behandeld. We nemen per e-mail contact met je op over de wijzigingen diff --git a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/nl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 5dce6a242..f0f7e2c4b 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/general/dns-providers.md index 097e0e6a9..48dcd581d 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocolo | Endereço | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-sobre-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocolo | Endereço | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocolo | Endereço | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocolo | Endereço | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocolo | Endereço | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-sobre-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocolo | Endereço | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index 731a1539a..f1fef14d1 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ Nesta seção, você encontrará instruções sobre como conectar seu dispositiv Para dispositivos que não suportam nativamente protocolos de DNS criptografados, oferecemos três outras opções: - [AdGuard DNS Client](/dns-client/overview.md) -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) Se você quiser restringir o acesso ao AdGuard DNS a certos dispositivos, use [DNS-over-HTTPS com autenticação](/private-dns/connect-devices/other-options/doh-authentication.md). diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 9f4a67f07..1b7035603 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ Configure o seu console de jogos para usar um servidor público AdGuard DNS ou c Seria preferível usar o IP vinculado (ou o IP dedicado se você tiver uma assinatura Equipe): -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index c20daa852..0beba865c 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ Configure o seu console de jogos para usar um servidor público AdGuard DNS ou c Seria preferível usar o IP vinculado (ou o IP dedicado se você tiver uma assinatura Equipe): -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 871b61bff..ca9ad5426 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ Configure o seu console de jogos para usar um servidor público AdGuard DNS ou c Seria preferível usar o IP vinculado (ou o IP dedicado se você tiver uma assinatura Equipe): -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 438e23a83..388c40882 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ Configure o seu console de jogos para usar um servidor público AdGuard DNS ou c Seria preferível usar o IP vinculado (ou o IP dedicado se você tiver uma assinatura Equipe): -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 7c79d9920..189cbe05f 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Nem todos os serviços de VPN suportam DNS criptografado. No entanto, nossa VPN ![Servidor DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Role para baixo e toque em _Adicionar um servidor DNS personalizado_. ![Adicionar servidor DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copie um dos seguintes endereços DNS e cole-o no campo _Endereço dos servidores DNS_ no aplicativo. Se você não tem certeza, opte por DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. Se você não tem certeza, opte por DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Servidor DNS personalizado \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Toque em Salvar e selecionar. @@ -75,5 +75,5 @@ Você pode configurar seu servidor DNS nas configurações do seu dispositivo. P Se você preferir não usar software extra para configuração de DNS, pode optar por DNS não criptografado. Você tem duas opções: usar IPs vinculados ou IPs dedicados. -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index e9247513d..19955a2a0 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ Se você estiver usando uma VPN, o perfil de configuração será ignorado. Se você preferir não usar software extra para configuração de DNS, pode optar por DNS não criptografado. Você tem duas opções: usar IPs vinculados ou IPs dedicados. -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 32dd75a90..f08f80275 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ Você pode configurar o AdGuard DNS Privado usando a interface de linha de coman 9. Desligue o _Modo automático_. 10. Clique em _Aplicar_. 11. Vincule seu endereço de IP (ou seu IP dedicado, caso tenha uma assinatura Equipe): - - [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Configure manualmente no Debian (IP vinculado ou IP dedicado necessário) @@ -61,8 +61,8 @@ Você pode configurar o AdGuard DNS Privado usando a interface de linha de coman 10. Pressione _Enter_. 11. Feche o Terminal. 12. Vincule seu endereço de IP (ou seu IP dedicado, caso tenha uma assinatura Equipe): - - [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## Use dnsmasq @@ -102,9 +102,31 @@ Se você receber uma notificação de que não está conectado ao AdGuard DNS, p ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +Feito! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Usando DNS simples Se você preferir não usar software extra para configuração de DNS, pode optar por DNS não criptografado. Você tem duas opções: usar IPs vinculados ou IPs dedicados: -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 278e19957..7bb705fd5 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ Feito! Seu dispositivo foi conectado com sucesso ao AdGuard DNS. Se você preferir não usar software extra para configuração de DNS, pode optar por DNS não criptografado. Você tem duas opções: usar IPs vinculados ou IPs dedicados. -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 8e49b8e2f..ab6bbe584 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ Mais detalhes podem ser encontrados em [outro artigo](/dns-client/overview/). Se você preferir não usar software extra para configuração de DNS, pode optar por DNS não criptografado. Você tem duas opções: usar IPs vinculados ou IPs dedicados. -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 96a893314..c01de37b4 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ Se você tiver uma assinatura Team ou Enterprise, receberá vários endereços d ## Por que você precisa de um IP dedicado? -Infelizmente, as especificações técnicas do dispositivo conectado podem nem sempre permitir que você configure um servidor privado e criptografado do AdGuard DNS. Neste caso, você terá que usar DNS padrão não criptografado. Existem duas maneiras de configurar o AdGuard DNS: [usando IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) e usando IPs dedicados. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. Neste caso, você terá que usar DNS padrão não criptografado. Existem duas maneiras de configurar o AdGuard DNS: [usando IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) e usando IPs dedicados. IPs dedicados são geralmente uma opção mais estável. O IP vinculado tem algumas limitações, por exemplo, a permissão de endereços residenciais apenas. No entanto, seu provedor pode mudar o IP, e você precisará revincular o endereço de IP. Com IPs dedicados, você obtém um Endereço de IP que é exclusivamente seu, e todas as Solicitações serão contadas para o seu dispositivo. diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 41c353554..a5d5920a8 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ Um **endereço IP residencial** é atribuído a um dispositivo conectado a um IS ::: -Às vezes, um endereço IP residencial pode já estar em uso, e se você tentar se conectar a ele, o AdGuard DNS impedirá a conexão. -![Endereço IPv4 vinculado \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -Se isso acontecer, entre em contato com o suporte via [support@adguard-dns.io](mailto:support@adguard-dns.io), e eles te ajudarão com as configurações corretas. +Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + +![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## Como configurar IP vinculado @@ -25,6 +27,7 @@ As instruções a seguir explicam como se conectar ao dispositivo via **endereç 2. Adicione um novo dispositivo ou abra as configurações de um dispositivo previamente conectado. 3. Vá para _Usar endereços de servidor DNS_. 4. Abra _Endereços de servidor DNS simples_ e conecte o IP vinculado. + ![IP vinculado \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## DNS dinâmico: por que é útil @@ -44,14 +47,21 @@ Dessa forma, você não precisará atualizar manualmente o endereço de IP assoc ## DNS dinâmico: como configurá-lo 1. Primeiro, você precisa verificar se o DDNS é compatível com as configurações do seu roteador: + - Vá para _Configurações do roteador_ → _Rede_ - Localize a seção DDNS ou _DNS Dinâmico_ - - Navegue até ele e verifique se as configurações são realmente compatíveis. _Isso é apenas um exemplo. Pode variar dependendo do seu roteador_ - ![DDNS suportado \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navegue até ele e verifique se as configurações são realmente compatíveis. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Registre seu domínio em um serviço popular como [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), ou qualquer outro provedor de DDNS que preferir. + 3. Insira o domínio nas configurações do seu roteador e sincronize as configurações. + 4. Vá para as configurações de IP vinculado para conectar o endereço, depois navegue até _Configurações Avançadas_ e clique em _Configurar DDNS_. + 5. Insira o domínio que você registrou anteriormente e clique em _Configurar DDNS_. + ![Configurar DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Tudo pronto, você configurou o DDNS com sucesso! diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index ff155611a..37cc5175c 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ Se necessário: Para configurar o DNS-over-TLS no ASUS, instale o [firmware ASUS 2. Digite o nome de usuário do administrador (geralmente, é admin) e a senha do roteador. 3. Na barra lateral das _Configurações Avançadas_, navegue até a seção WAN. 4. Na seção _Configurações de DNS da WAN_, defina _Conectar ao servidor DNS automaticamente_ como _Não_. -5. Defina _Encaminhar consultas locais_, _Ativar DNS Rebind_ e _Ativar DNSSEC_ como _Não_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Altere o protocolo de privacidade do DNS para DNS-over-TLS (DoT). 7. Certifique-se de que o _Perfil DNS-over-TLS_ está definido como _Estrito_. 8. Role para baixo até a seção _Lista de Servidores DNS-over-TLS_. No campo _Endereço_, insira um dos endereços abaixo: @@ -32,11 +32,10 @@ Se necessário: Para configurar o DNS-over-TLS no ASUS, instale o [firmware ASUS 3. Abra _Configurações avançadas_ ou _Avançado_. 4. Selecione _WAN_ ou _Internet_. 5. Abra _Configurações de DNS_ ou _DNS_. -6. Escolha _Manual DNS_. Selecione _Usar estes servidores DNS_ ou _Especificar servidor DNS manualmente_ e insira os seguintes endereços de servidor DNS: +6. Choose _Manual Setting_. Selecione _Usar estes servidores DNS_ ou _Especificar servidor DNS manualmente_ e insira os seguintes endereços de servidor DNS: - IPv4: `94.140.14.49` e `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` 7. Salve as configurações. 8. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). - -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 3b4cde541..bbf46df46 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ Use este guia se o seu roteador FritzBox não oferece suporte à configuração 6. Salve as configurações. 7. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 06b06bc08..ad9388737 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Os roteadores Keenetic são conhecidos pela sua estabilidade e configurações f 5. Em _Utilitários e serviços_, selecione proxy DNS-over-HTTPS e instale-o. 6. Vá para _Menu_ → _Regras de rede_ → _Segurança na Internet_. 7. Navegue até servidores DNS-over-HTTPS e clique em _Adicionar servidor DNS-over-HTTPS_. -8. Insira a URL do servidor DNS privado AdGuard no campo `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Clique em Salvar\*. ## Configuração do DNS-over-TLS @@ -26,7 +26,7 @@ Os roteadores Keenetic são conhecidos pela sua estabilidade e configurações f 5. Em _Utilitários e serviços_, selecione proxy DNS-over-HTTPS e instale-o. 6. Vá para _Menu_ → _Regras de rede_ → _Segurança na Internet_. 7. Navegue até servidores DNS-over-HTTPS e clique em _Adicionar servidor DNS-over-HTTPS_. -8. Insira a URL do servidor DNS privado AdGuard no campo `tls://*********.d.adguard-dns.com`. +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Clique em Salvar\*. ## Use o painel de controle do seu roteador @@ -44,5 +44,5 @@ Use estas instruções se o seu roteador Keenetic não oferece suporte à config 7. Salve as configurações. 8. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 784c79f2a..06705cc5e 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -Roteadores MikroTik utilizam o sistema operacional RouterOS de código aberto, que fornece serviços de roteamento, rede sem fio e firewall para redes domésticas e de pequenos escritórios. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configuração do DNS-over-HTTPS @@ -23,38 +23,42 @@ Roteadores MikroTik utilizam o sistema operacional RouterOS de código aberto, q - `94.140.14.49` - `94.140.14.59` - Defina _Permitir solicitações remotas_ para _Sim_ (isso é crucial para o funcionamento do DNS-over-HTTPS) - - No campo _Usar servidor DNS-over-HTTPS_, insira a URL do servidor privado do AdGuard DNS: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Clique em _OK_ 4. Crie registros DNS estáticos: - Nas _Configurações de DNS_, clique em _Estático_ - Clique em _Adicionar novo_ - - Defina _Name_ para d.adguard-dns.com - - Defina _Type_ como A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Defina o _Endereço_ como `94.140.14.49` - - Defina o _TTL_ para 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repita o processo para criar uma entrada idêntica, mas com _Address_ definido como `94.140.14.59` 5. Desative o Peer DNS no DHCP Client: - Vá para _IP_ → _DHCP Client_ - Clique duas vezes no cliente usado para sua conexão de internet (geralmente na interface WAN) - Desmarque _Usar Peer DNS_ - Clique em _OK_ -6. Vincule seu IP. -7. Teste e verifique: - - Pode ser necessário reiniciar seu roteador MikroTik para que todas as alterações tenham efeito - - Limpe o cache DNS do seu navegador. Você pode usar uma ferramenta como [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) para verificar se as suas solicitações de DNS estão agora sendo roteadas pelo AdGuard +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use o painel de controle do seu roteador +## My router does not support DNS-over-HTTPS -Use estas instruções se o seu roteador Keenetic não oferece suporte à configuração de DNS-over-HTTPS ou DNS-over-TLS: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Abra o painel de administração do roteador. Pode ser acessado em `192.168.1.1` ou `192.168.0.1`. -2. Digite o nome de usuário do administrador (geralmente, é admin) e a senha do roteador. -3. Abra _Webfig_ → _IP_ → _DNS_. -4. Selecione _Servidores_ e insira um dos seguintes endereços de servidor DNS. - - IPv4: `94.140.14.49` e `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` -5. Salve as configurações. -6. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). - -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +1. Acesse seu roteador MikroTik: + - Abra seu navegador e acesse o endereço de IP do seu roteador (geralmente `192.168.88.1`) + - Alternativamente, você pode usar o Winbox para conectar-se ao seu roteador MikroTik + - Digite seu nome de usuário e senha de administrador +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` e `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` e `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Desative o Peer DNS no DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Clique duas vezes no cliente usado para sua conexão de internet (geralmente na interface WAN) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index 2e9b6f8e3..6af58589d 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ Use estas instruções se o seu roteador Keenetic não oferece suporte à config 8. Salve as configurações. 9. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index 5f2227d44..b88490437 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ Use estas instruções se o seu roteador Keenetic não oferece suporte à config 8. Você também tem a opção de habilitar DNSSEC para maior segurança. 9. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index 6bcceaf68..9854149ca 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Use estas instruções se o seu roteador Keenetic não oferece suporte à config 7. Salve as configurações. 8. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [IPs vinculados](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index f9673375d..e0a777e3e 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ Aqui estão algumas instruções gerais para a configuração do AdGuard DNS Pri 5. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 5f59af85c..c1421f98e 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Os roteadores Xiaomi têm muitas vantagens: sinal forte e estável, segurança da rede, operação estável, gerenciamento inteligente, ao mesmo tempo, o usuário pode conectar até 64 dispositivos à rede Wi-Fi local. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Infelizmente, ele não oferece suporte para DNS criptografado, mas é ótimo para configurar o AdGuard DNS via IP vinculado. @@ -21,5 +21,5 @@ Use estas instruções se o seu roteador Keenetic não oferece suporte à config 6. Salve as configurações. 7. Vincule seu IP (ou seu IP dedicado, caso tenha uma assinatura Equipe). -- [IPs dedicados](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [IPs vinculados](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 59e07154b..7fb22799f 100644 --- a/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/pt-BR/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Configurações do servidor sidebar_position: 1 --- -## O que é um servidor e como usá-lo +## What is a server and how to use it Ao configurar o AdGuard DNS privado, você encontrará o termo _servidores_. diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/ru/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 729b9ea92..e8c9c4fad 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ sidebar_position: 2 - `size`: максимальный размер кеша результатов DNS в виде удобочитаемых данных. Он должен быть больше нуля, если `enabled` равно `true`. - **Пример:** `128 МБ` + **Example:** `128MB` - `client_size`: максимальный размер кеша результатов DNS для каждого настроенного адреса клиента или подсети в виде удобочитаемых данных. Он должен быть больше нуля, если `enabled` равно `true`. - **Пример:** `4 МБ` + **Example:** `4MB` ### `server` {#dns-server} diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/ru/docusaurus-plugin-content-docs/current/general/dns-providers.md index 63699b4c0..d65f4fc32 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ DNS-серверы с фильтрацией, защищающей ваше ус | DNS-over-TLS | Провайдер: `Surfnet` Имя хоста: `tls://dnsovertls.sinodun.com` IP-адрес: `145.100.185.15` и IPv6: `2001:610:1:40ba:145:100:185:15` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Провайдер: `Surfnet` Имя хоста: `tls://dnsovertls1.sinodun.com` IP-адрес: `145.100.185.16` и IPv6: `2001:610:1:40ba:145:100:185:16` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) — это ориентированный на конфиденциальность DNS-сервис, который ставит безопасность и анонимность пользователей на первое место. Он поддерживает как стандартные, так и зашифрованные DNS-протоколы, сохраняя при этом строгую политику отсутствия логов. + +#### Стандартный + +| Протокол | Адрес | | +| -------------------- | -------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Добавить в AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Добавить в AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Добавить в AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Другие DNS-серверы с политикой без логов | Протокол | Адрес | | @@ -391,12 +406,13 @@ DNS-серверы с фильтрацией, защищающей ваше ус [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) — это защищающий конфиденциальность DNS-провайдер с многолетним опытом развития DNS-сервисов, который стремится обеспечить пользователей быстрым, точным и стабильным рекурсивным сервисом разрешения имён. -| Протокол | Адрес | | -| -------------- | --------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Добавить в AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Добавить в AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Протокол | Адрес | | +| -------------- | ------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Добавить в AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Добавить в AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -616,7 +632,7 @@ Hurricane Electric Public Recursor — это бесплатный альтер | DNS-over-HTTPS | `https://dns.quad9.net/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.quad9.net/dns-query&name=dns.quad9.net), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.quad9.net/dns-query&name=dns.quad9.net) | | DNS-over-TLS | `tls://dns.quad9.net` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dns.quad9.net&name=dns.quad9.net), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.quad9.net&name=dns.quad9.net) | -#### Unsecured +#### Незащищённый У незащищённых DNS-серверов нет списков блокировки, DNSSEC или EDNS Сlient Subnet. @@ -661,13 +677,13 @@ EDNS Client Subnet — это метод, который включает ком | -------------- | ------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | DNS-over-HTTPS | `https://dns.rabbitdns.org/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.rabbitdns.org/dns-query&name=dns.rabbitdns.org), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.rabbitdns.org/dns-query&name=dns.rabbitdns.org) | -#### Security-filtering +#### Безопасный | Протокол | Адрес | | | -------------- | ------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | DNS-over-HTTPS | `https://security.rabbitdns.org/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://security.rabbitdns.org/dns-query&name=security.rabbitdns.org), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://security.rabbitdns.org/dns-query&name=security.rabbitdns.org) | -#### Family-filtering +#### Семейный | Протокол | Адрес | | | -------------- | ---------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -755,7 +771,7 @@ ByteDance Public DNS — это бесплатный альтернативны [CIRA Shield DNS](https://www.cira.ca/cybersecurity-services/canadianshield/how-works) защищает от кражи личных и финансовых данных. Помогает справиться с вирусами, программами-вымогателями и другими вредоносными программами. -#### Private +#### Приватный В «Приватном» режиме — только разрешение DNS. @@ -766,7 +782,7 @@ ByteDance Public DNS — это бесплатный альтернативны | DNS-over-HTTPS | `https://private.canadianshield.cira.ca/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://private.canadianshield.cira.ca/dns-query&name=private.canadianshield.cira.ca), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://private.canadianshield.cira.ca/dns-query&name=private.canadianshield.cira.ca) | | DNS-over-TLS — частный | Имя хоста: `tls://private.canadianshield.cira.ca` IP-адрес: `149.112.121.10` и IPv6: `2620:10A:80BB::10` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://private.canadianshield.cira.ca&name=private.canadianshield.cira.ca), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://private.canadianshield.cira.ca&name=private.canadianshield.cira.ca) | -#### Protected +#### Защищённый В «Защищённом» режиме — защита от вредоносного ПО и фишинга. @@ -844,7 +860,7 @@ ByteDance Public DNS — это бесплатный альтернативны [114DNS](https://www.114dns.com) — это профессиональный и надёжный DNS-сервис. -#### Normal +#### Обычный Блокирует рекламу и раздражающие сайты. @@ -852,7 +868,7 @@ ByteDance Public DNS — это бесплатный альтернативны | --------- | ------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | | DNS, IPv4 | `114.114.114.114` и `114.114.115.115` | [Добавить в AdGuard](adguard:add_dns_server?address=114.114.114.114&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=114.114.114.114&name=) | -#### Safe +#### Безопасный Блокирует фишинговые, вредоносные и другие небезопасные сайты. @@ -978,7 +994,7 @@ ByteDance Public DNS — это бесплатный альтернативны [Yandex.DNS](https://dns.yandex.com/) — это бесплатный рекурсивный DNS-сервис. Серверы Yandex.DNS расположены в России, странах СНГ и Западной Европы. Пользовательские запросы обрабатываются ближайшим дата-центром, что обеспечивает высокую скорость соединения. -#### Basic +#### Базовый В «Базовом» режиме трафик не фильтруется. @@ -989,7 +1005,7 @@ ByteDance Public DNS — это бесплатный альтернативны | DNS-over-HTTPS | `https://common.dot.dns.yandex.net/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://common.dot.dns.yandex.net/dns-query&name=yandex.doh), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://common.dot.dns.yandex.net/dns-query&name=yandex.doh) | | DNS-over-TLS | `tls://common.dot.dns.yandex.net` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://common.dot.dns.yandex.net&name=yandex.dot), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://common.dot.dns.yandex.net&name=yandex.dot) | -#### Safe +#### Безопасный В «Безопасном» режиме обеспечивается защита от заражённых и мошеннических сайтов. @@ -1021,7 +1037,7 @@ ByteDance Public DNS — это бесплатный альтернативны [AhaDNS](https://ahadns.com/) — DNS-сервис без логирования и с блокировкой рекламы от провайдера Fredrik Pettersson. -#### Netherlands +#### Нидерланды | Протокол | Адрес | | | -------------- | ------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1030,7 +1046,7 @@ ByteDance Public DNS — это бесплатный альтернативны | DNS-over-HTTPS | `https://doh.nl.ahadns.net/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://doh.nl.ahadns.net/dns-query&name=doh.nl.ahadns.net), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://doh.nl.ahadns.net/dns-query&name=doh.nl.ahadns.net) | | DNS-over-TLS | `tls://dot.nl.ahadns.net` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dot.nl.ahadns.net&name=dot.nl.ahadns.net), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.nl.ahadns.net&name=dot.nl.ahadns.net) | -#### Los Angeles +#### Лос-Анджелес | Протокол | Адрес | | | -------------- | ------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1144,7 +1160,7 @@ Marbled Fennec Networks размещает DNS-резолверы, способ ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) предоставляет DoH- и DoT-резолверы с тремя уровнями фильтрации #### Стандартный @@ -1155,7 +1171,7 @@ Marbled Fennec Networks размещает DNS-резолверы, способ | DNS-over-HTTPS | `https://dns.momou.ch/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://dns.momou.ch/dns-query&name=dns.momou.ch), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.momou.ch/dns-query&name=dns.momou.ch) | | DNS-over-TLS | `tls://dns.momou.ch` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dns.momou.ch&name=dns.momou.ch), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.momou.ch&name=dns.momou.ch) | -#### Kids +#### Детский Фильтр для детей, который также блокирует рекламу, трекеры и вредоносное ПО @@ -1205,7 +1221,7 @@ Marbled Fennec Networks размещает DNS-резолверы, способ [Privacy-First DNS](https://tiarap.org/) блокирует больше 140 тысяч рекламных, трекинговых, вредоносных и фишинговых доменов. Без логирования и ECS, с валидацией DNSSEC, бесплатный! -#### Singapore DNS Server +#### Сингапурский DNS-сервер | Протокол | Адрес | Локация | | -------------- | --------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1218,7 +1234,7 @@ Marbled Fennec Networks размещает DNS-резолверы, способ | DNS-over-QUIC | `quic://doh.tiar.app` | [Добавить в AdGuard](adguard:add_dns_server?address=quic://doh.tiar.app:784&name=doh.tiar.app), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=quic://doh.tiar.app:784&name=doh.tiar.app) | | DNS-over-TLS | `tls://dot.tiar.app` | [Добавить в AdGuard](adguard:add_dns_server?address=tls://dot.tiar.app&name=dot.tiar.app), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.tiar.app&name=dot.tiar.app) | -#### Japan DNS Server +#### Японский DNS-сервер | Протокол | Адрес | | | -------------- | ------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1232,9 +1248,9 @@ Marbled Fennec Networks размещает DNS-резолверы, способ ### Seby DNS -[Seby DNS](https://dns.seby.io/) — это сервис, ориентированный на конфиденциальность, предоставляемый Sebastian Schmidt. Нет регистрации, проверка DNSSEC. +[Seby DNS](https://dns.seby.io/) — это сервис Sebastian Schmidt, ориентированный на конфиденциальность. Нет логирования, проверка DNSSEC. -#### DNS Server 1 +#### DNS-сервер 1 | Протокол | Адрес | | | -------------- | ----------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1248,7 +1264,15 @@ Marbled Fennec Networks размещает DNS-резолверы, способ | Протокол | Адрес | | | -------------- | --------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `103.70.12.129` | [Add to AdGuard](adguard:add_dns_server?address=103.70.12.129&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=103.70.12.129&name=BlackMagiccDNS) | -| DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | -| DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | +| DNS, IPv4 | `103.70.12.129` | [Добавить в AdGuard](adguard:add_dns_server?address=103.70.12.129&name=BlackMagiccDNS), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=103.70.12.129&name=BlackMagiccDNS) | +| DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Добавить в AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | +| DNS-over-QUIC | `quic://rx.techomespace.com` | [Добавить в AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Добавить в AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) — это DNS, который блокирует рекламу, защищает от вредоносного ПО и имеет строгую политику отсутствия логов. + +| Протокол | Адрес | | +| --------- | --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Добавить в AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Добавить в AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/ru/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index d1644a5c0..5a08623e3 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,24 +1,22 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - -В этой инструкции рассказывается о том, как создать собственную DNS-метку (DNS stamp) для шифрованного DNS. Шифрованный DNS — это сервис, который улучшает конфиденциальность и безопасность в интернете через шифрование DNS-запросов. Таким образом злоумышленники не смогут перехватить ваши DNS-запросы. +В этой инструкции рассказывается о том, как создать собственную DNS-метку (DNS stamp) для Secure DNS. Secure DNS — это сервис, который улучшает конфиденциальность и безопасность в интернете через шифрование DNS-запросов. Таким образом злоумышленники не смогут перехватить ваши DNS-запросы. -В шифрованном DNS обычно используются URL-адреса `tls://`, `https://` или `quic://`. Этого достаточно для большинства пользователей, и мы рекомендуем использовать именно их. +В Secure DNS обычно используются URL-адреса `tls://`, `https://` или `quic://`. Этого достаточно для большинства пользователей, и мы рекомендуем использовать именно их. Однако, если вам нужна дополнительная безопасность, например заведомо известные IP-адреса серверов и закрепление сертификата по хешу, вы можете создать собственную DNS-метку. ## Коротко о DNS-метках -DNS-метки (DNS stamps) — это короткие строки, в которых содержится вся необходимая информация для подключения к шифрованному DNS-серверу. Они упрощают процесс настройки шифрованного DNS, поскольку пользователю не нужно вручную вводить все эти данные. +DNS-метки (DNS stamps) — это короткие строки, в которых содержится вся необходимая информация для подключения к шифрованному DNS-серверу. Они упрощают процесс настройки Secure DNS, поскольку пользователю не нужно вводить все эти данные вручную. -DNS-метки позволяют настраивать, помимо обычных URL-адресов, другие параметры шифрованного DNS. В частности, они позволяют указывать жёстко заданные адреса серверов, использовать хеширование сертификатов и так далее. Поэтому DNS-метки — это универсальный и более надёжный вариант настройки шифрованного DNS. +DNS-метки позволяют настраивать, помимо обычных URL-адресов, другие параметры шифрованного DNS. В частности, они позволяют указывать жёстко заданные адреса серверов, использовать хеширование сертификатов и так далее. Поэтому DNS-метки — это универсальный и более надёжный вариант настройки Secure DNS. ## Выбор протокола -Типы шифрованного DNS включают в себя `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)` и некоторые другие. Выбор одного из этих протоколов зависит от контекста, в котором вы будете их использовать. +Типы Secure DNS включают в себя `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)` и некоторые другие. Выбор одного из этих протоколов зависит от контекста, в котором вы будете их использовать. ## Создание DNS-метки diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 7879e5951..8109c1828 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ sidebar_position: 2 ![DNS сервер \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Прокрутите вниз и нажмите _Добавить пользовательский DNS-сервер_. ![Добавить DNS-сервер \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Скопируйте один из следующих DNS-адресов и вставьте его в поле _DNS-сервера_ в приложении. Если вы не уверены, какой выбрать, выберите DNS-over-HTTPS. +7. Скопируйте один из следующих DNS-адресов и вставьте его в поле _Адреса DNS-серверов_ в приложении. Если вы не уверены, какой выбрать, выберите DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Пользовательский DNS-сервер \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Нажмите _Сохранить и выбрать_. diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index fe86f7671..1d9b7f14c 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ AdGuard DNS Client — это кроссплатформенная консол ::: +## Используйте EDNS (Расширенный DNS) + +EDNS расширяет DNS-протокол, включая более крупные UDP-пакеты для передачи дополнительных данных. В AdGuard DNS он позволяет передавать DeviceID в обычном DNS с помощью дополнительного параметра. + +Идентификатор DeviceID, восьмизначный шестнадцатеричный идентификатор (например, `1a2b3c4d`), помогает связывать DNS-запросы с конкретными устройствами. Для зашифрованного DNS этот идентификатор является частью домена (например, `1a2b3c4d.d.adguard-dns.com`). Для незашифрованного DNS требуется EDNS для передачи этого идентификатора. + +AdGuard DNS использует EDNS для получения DeviceID путём поиска номера опции `65074`. Если такая опция существует, он будет считывать DeviceID оттуда. Для этого вы можете использовать команду `dig` в терминале: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Здесь `65074` — идентификатор опции, а `3031323334353637` — его значение в шестнадцатеричном формате (DeviceID: `01234567`). + +Готово! DeviceID должен отображаться. + +:::note + +Команда `dig` — всего лишь пример, вы можете использовать любой DNS с возможностью добавления опций EDNS для выполнения этого действия. + +::: + ## Использовать обычный DNS Если вы предпочитаете не использовать дополнительное программное обеспечение для настройки DNS, вы можете выбрать незашифрованный DNS. У вас есть два варианта: использовать связанные IP-адреса или выделенные IP-адреса: diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 83cf1e6cd..df536b018 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ sidebar_position: 2 ## Зачем вам нужен выделенный IP-адрес? -К сожалению, технические характеристики подключаемого устройства не всегда позволяют настроить зашифрованный частный AdGuard DNS сервер. В этом случае вам придется использовать стандартный незашифрованный DNS. Есть два способа настроить AdGuard DNS: [использование связанных IP-адресов](/private-dns/connect-devices/other-options/linked-ip.md) и использования выделенных IP-адресов. +К сожалению, технические характеристики подключаемого устройства не всегда позволяют настроить зашифрованный сервер Личного AdGuard DNS. В этом случае вам придется использовать стандартный незашифрованный DNS. Есть два способа настроить AdGuard DNS: [использование связанных IP-адресов](/private-dns/connect-devices/other-options/linked-ip.md) и использования выделенных IP-адресов. Выделенные IP-адреса, как правило, более стабильный вариант. Связанный IP-адрес имеет некоторые ограничения, такие как разрешены только жилые адреса, ваш провайдер может изменить IP, и вам потребуется повторно связать IP-адрес. С выделенными IP-адресами вы получаете IP-адрес, который используется исключительно вами, и все запросы будут учитываться для вашего устройства. diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 2ead07f8a..6f1191760 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,8 +14,10 @@ sidebar_position: 3 ::: Иногда резидентный IP-адрес уже может быть задействован, и при попытке подключения к нему, AdGuard DNS предотвратит соединение. -![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. + +![Привязанный IPv4-адрес \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +Если это произошло, обратитесь в поддержку по адресу [support@adguard-dns.io](mailto:support@adguard-dns.io), и вам помогут с правильными настройками конфигурации. ## Как настроить привязанный IP @@ -25,6 +27,7 @@ If that happens, please reach out to support at [support@adguard-dns.io](mailto: 2. Добавьте новое устройство или откройте настройки ранее подключённого устройства. 3. Перейдите в раздел _Использовать адреса DNS-серверов_. 4. Откройте _Адреса незашифрованных DNS-серверов_ и подключите привязанный IP. + ![Привязанный IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Динамический DNS: зачем это нужно @@ -44,14 +47,21 @@ If that happens, please reach out to support at [support@adguard-dns.io](mailto: ## Динамический DNS: как настроить 1. Сначала вам нужно проверить, поддерживает ли ваш роутер DDNS: + - Перейдите в _Настройки роутера_ → _Сеть_ - Найдите раздел DDNS или _Dynamic DNS_ - - Перейдите в него и убедитесь, что настройки действительно поддерживаются. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Перейдите в него и убедитесь, что настройки действительно поддерживаются. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![Поддержка DDNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Зарегистрируйте домен через популярный сервис, такой как [Dyn](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) или любой другой предпочитаемый вами поставщик DDNS. + 3. Введите домен в настройках роутера и синхронизируйте конфигурации. + 4. Откройте настройки _Привязанного IP-адреса_, затем перейдите в _Расширенные настройки_ и нажмите _Настроить Dyn_. + 5. Введите домен, который вы зарегистрировали ранее, и нажмите _Настроить Dyn_. + ![Настроить Dyn \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Готово, вы успешно настроили Dyn! diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index c2107cc84..3ac1fd422 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -32,11 +32,10 @@ sidebar_position: 3 3. Откройте «Дополнительные настройки» или «Дополнительно». 4. Выберите «WAN» или «Интернет». 5. Откройте Настройки «DNS» или «DNS». -6. Выберите «Ручной DNS». Выберите «Использовать эти DNS-серверы» или «Указать DNS-сервер вручную» и введите следующие адреса DNS-серверов: +6. Выберите _Manual Setting_. Выберите «Использовать эти DNS-серверы» или «Указать DNS-сервер вручную» и введите следующие адреса DNS-серверов: - IPv4: `94.140.14.49` и `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` и `2a10:50c0:0:0:0:0:dad:ff` 7. Сохраните настройки. 8. Привяжите свой IP (или ваш выделенный IP, если у вас есть подписка Team). - -- [Выделенные IP-адреса](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Привязанные IP-адреса](/private-dns/connect-devices/other-options/linked-ip.md) + - [Выделенные IP-адреса](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Привязанные IP-адреса](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 40e1846f6..a9b80dcac 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ sidebar_position: 5 5. В разделе «Утилиты и сервисы» выберите DNS-over-HTTPS-прокси и установите его. 6. Перейдите в «Меню» → «Правила сети» → «Интернет-безопасность». 7. Перейдите к DNS-over-HTTPS-серверам и нажмите «Добавить DNS-over-HTTPS-сервер». -8. Введите URL приватного AdGuard DNS сервера в поле `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. +8. Введите URL сервера Личного AdGuard DNS в поле `https://d.adguard-dns.com/dns-query/{Your_Device_ID}`. 9. Нажмите _Сохранить_. ## Настройка DNS-over-TLS @@ -26,7 +26,7 @@ sidebar_position: 5 5. В разделе «Утилиты и сервисы» выберите DNS-over-HTTPS-прокси и установите его. 6. Перейдите в «Меню» → «Правила сети» → «Интернет-безопасность». 7. Перейдите к DNS-over-HTTPS-серверам и нажмите «Добавить DNS-over-HTTPS-сервер». -8. Введите URL приватного AdGuard DNS сервера в поле `tls://*********.d.adguard-dns.com`. +8. Введите URL сервера Личного AdGuard DNS в поле `tls://*********.d.adguard-dns.com`. 9. Нажмите _Сохранить_. ## Через панель управления роутера diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 1a4da5cb3..ac1b093ec 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -23,38 +23,42 @@ sidebar_position: 6 - `94.140.14.49` - `94.140.14.59` - Установите для параметра _Разрешить удалённые запросы_ значение _Да_ (это необходимо для работы DNS-over-HTTPS) - - В поле _Использовать сервер DoH_ введите URL частного сервера AdGuard DNS: `https://d.adguard-dns.com/dns-query/*******` + - В поле _Использовать сервер DoH_ введите URL сервера Личного AdGuard DNS: `https://d.adguard-dns.com/dns-query/*******` - Нажмите _ОK_ 4. Создайте статические записи DNS: - В _Настройках DNS_, нажмите _Статический_ - Нажмите _Добавить_ - - Установите _Имя_ как d.adguard-dns.com - - Установите _Тип_ как A + - Установите для параметра _Name_ значение `d.adguard-dns.com` + - Установите для параметра _Type_ значение `A` - Установите _Адрес_ как `94.140.14.49` - - Установите _Время жизни_ как 1д 00:00:00 + - Установите для параметра _TTL_ значение `1d 00:00:00` - Повторите процесс для создания идентичной записи, но установите _Адрес_ на `94.140.14.59` 5. Отключите Peer DNS на DHCP-клиенте: - Перейдите в _IP_ → _DHCP Client_ - Дважды щёлкните по клиенту, используемому для подключения к интернету (обычно это интерфейс WAN) - Снимите флажок _Использовать Peer DNS_ - Нажмите _ОK_ -6. Привяжите свой IP-адрес. -7. Проверьте получившееся: +6. Проверьте получившееся: - Возможно, вам потребуется перезагрузить роутер MikroTik, чтобы все изменения вступили в силу - - Очистите кеш DNS вашего браузера. Вы можете использовать инструмент, такой как [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) для проверки того, находятся ли ваши DNS-запросы теперь в маршруте через AdGuard + - Очистите DNS-кеш браузера. Вы можете использовать такой инструмент, как [https://www.dnsleaktest.com](https://www.dnsleaktest.com/), чтобы проверить, направляются ли теперь ваши DNS-запросы через AdGuard -## Через панель управления роутера +## Мой роутер не поддерживает DNS-over-HTTPS -Используйте эту инструкцию, если ваш роутер Keenetic не поддерживает настройку DNS-over-HTTPS или DNS-over-TLS: +Используйте эту инструкцию, если ваш роутер MikroTik не поддерживает настройку DNS-over-HTTPS: -1. Откройте панель управления роутера. Доступ возможен по адресам `192.168.1.1` или `192.168.0.1`. -2. Введите логин пользователя администратора (обычно это admin) и пароль роутера. -3. Откройте _Webfig_ → _IP_ → _DNS_. -4. Выберите _Серверы_ и введите один из следующих адресов DNS-серверов. - - IPv4: `94.140.14.49` и `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` и `2a10:50c0:0:0:0:0:dad:ff` -5. Сохраните настройки. -6. Привяжите свой IP (или ваш выделенный IP, если у вас есть подписка Team). - -- [Выделенные IP-адреса](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Привязанные IP-адреса](/private-dns/connect-devices/other-options/linked-ip.md) +1. Перейдите в настройки роутера MikroTik: + - Откройте браузер и перейдите по IP-адресу вашего роутера (обычно это `192.168.88.1`) + - Для подключения к роутеру MikroTik вы также можете использовать Winbox + - Введите имя пользователя и пароль администратора +2. Настройка незашифрованного DNS: + - Перейдите в _IP_ → _DNS_ + - В разделе _Servers_ добавьте следующие серверы AdGuard DNS: + - IPv4: `94.140.14.49` и `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` и `2a10:50c0:0:0:0:0:dad:ff` + - Выделенный IPv6: Личный AdGuard DNS поддерживает выделенные адреса IPv6. Чтобы найти их, откройте Панель управления, нажмите _Настройки_ рядом с вашим устройством → _Адреса незашифрованных DNS-серверов_ → _Выделенные адреса IPv6_. + - Нажмите _ОK_ +3. Откройте _Webfig_ → _IP_ → _DNS_: + - Перейдите в _IP_ → _DHCP Client_ + - Дважды щёлкните по клиенту, используемому для подключения к интернету (обычно это интерфейс WAN) + - Снимите флажок _Использовать Peer DNS_ + - Нажмите _ОK_ diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 3ee3d8867..af8e50a40 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Роутеры Xiaomi имеют много преимуществ: стабильный сильный сигнал, безопасность сети, стабильная работа, интеллектуальное управление, а также возможность подключения до 64 устройств к локальной сети Wi-Fi. +У роутеров Xiaomi есть много преимуществ: стабильный, сильный сигнал, безопасность сети, высокая производительность и умное управление. Пользователи могут подключить до 64 устройств к локальной сети Wi-Fi. К сожалению, он не поддерживает зашифрованный DNS, но отлично подходит для настройки AdGuard DNS через привязанный IP. diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md index 69a062011..af2d54fb3 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/access.md @@ -15,7 +15,7 @@ sidebar_position: 3 ### Запрещённые клиенты -Здесь вы можете перечислить клиентов, которым не разрешено использовать ваш DNS-сервер. Вы можете заблокировать доступ всем клиентам и использовать только выбранных. To do this, add two addresses to the disallowed clients: `0.0.0.0/0` and `::/0`. Затем в поле _Разрешённые клиенты_ укажите адреса, которые могут получить доступ к вашему серверу. +Здесь вы можете перечислить клиентов, которым не разрешено использовать ваш DNS-сервер. Вы можете заблокировать доступ всем клиентам и использовать только выбранных. Для этого добавьте два адреса в список запрещённых клиентов: `0.0.0.0/0` и `::/0`. Затем в поле _Разрешённые клиенты_ укажите адреса, которые могут получить доступ к вашему серверу. :::note Важно diff --git a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index d0d585412..42f99d8ff 100644 --- a/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/ru/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ sidebar_position: 4 Если у вас есть _Командная_ или _Корпоративная_ подписка на AdGuard DNS, вы можете запросить увеличение лимита запросов. Чтобы это сделать, следуйте инструкции ниже: 1. Перейдите в [Панель управления DNS](https://adguard-dns.io/dashboard/) → _Настройки_ → _Лимит запросов_ -2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. Вам нужно будет указать ваш CIDR и желаемый лимит -![Лимит запросов](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) +2. Нажмите _запросить увеличение лимита_, чтобы связаться с нашей службой поддержки и подать заявку на увеличение лимита. Вам нужно будет указать ваш CIDR и желаемый лимит -1. Your request will be reviewed within 1-3 working days. Мы сообщим вам об изменениях по почте + ![Лимит запросов](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + +3. Ваш запрос будет рассмотрен в течение 1–3 рабочих дней. Мы сообщим вам об изменениях по почте diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md b/i18n/sk/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md index 5ac32c043..b54292af1 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md @@ -156,7 +156,7 @@ To update AdGuard Home package without the need to use Web API run: This setup will automatically cover all devices connected to your home router, and you won’t need to configure each of them manually. -1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as http://192.168.0.1/ or http://192.168.1.1/. You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. +1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as or . You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. 2. Find the DHCP/DNS settings. Look for the DNS letters next to a field that allows two or three sets of numbers, each divided into four groups of one to three digits. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/sk/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/sk/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/sk/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/sk/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/sl/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/sl/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/sl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/sl/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md b/i18n/sr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md index 5ac32c043..b54292af1 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/adguard-home/getting-started.md @@ -156,7 +156,7 @@ To update AdGuard Home package without the need to use Web API run: This setup will automatically cover all devices connected to your home router, and you won’t need to configure each of them manually. -1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as http://192.168.0.1/ or http://192.168.1.1/. You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. +1. Open the preferences for your router. Usually, you can access it from your browser via a URL, such as or . You may be prompted to enter a password. If you don’t remember it, you can often reset the password by pressing a button on the router itself, but be aware that if this procedure is chosen, you will probably lose the entire router configuration. If your router requires an app to set it up, please install the app on your phone or PC and use it to access the router’s settings. 2. Find the DHCP/DNS settings. Look for the DNS letters next to a field that allows two or three sets of numbers, each divided into four groups of one to three digits. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/sr/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/sr/docusaurus-plugin-content-docs/current/general/dns-providers.md index a547f0863..1c50b5744 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protokol | Adresa | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protokol | Adresa | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protokol | Adresa | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protokol | Adresa | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protokol | Adresa | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protokol | Adresa | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/sr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/sr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/configuration.md index b821c72b8..23e887d7a 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ Açıklamalarla birlikte [YAML][yaml] yapılandırma dosyasının tam bir örne - `size`: İnsan tarafından okunabilir veri boyutu olarak DNS sonuç önbelleğinin maksimum boyutu. Eğer `enabled` değeri `true` ise sıfırdan büyük olmalıdır. - **Örnek:** `128 MB` + **Example:** `128MB` - `client_size`: Yapılandırılmış her istemcinin adresi veya alt ağı için DNS sonuç önbelleğinin insan tarafından okunabilir veri boyutu olarak maksimum boyutu. Eğer `enabled` değeri `true` ise sıfırdan büyük olmalıdır. - **Örnek:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: Önyükleme DNS istekleri için insan tarafından okunabilir bir süre olarak zaman aşımını belirtir. - **Örnek:** `2 s` + **Örnek:** `2s` ### `upstream` {#dns-upstream} @@ -88,7 +88,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se :::note Not - Properties specified within a single entry are combined with a logical AND. Girişler mantıksal bir VEYA ile birleştirilir. + Tek bir girdi içerisinde belirtilen özellikler mantıksal bir AND ile birleştirilir. Girişler mantıksal bir VEYA ile birleştirilir. ::: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/environment.md b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/environment.md index 0c036cbf2..0dc399a60 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/environment.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/environment.md @@ -5,7 +5,7 @@ sidebar_position: 3 -AdGuard DNS Client uses [environment variables][wiki-env] to store part of the configuration. Yapılandırmanın geri kalanı [yapılandırma dosyası][conf] içinde saklanır. +AdGuard DNS İstemcisi yapılandırmanın bir kısmını saklamak için [ortam değişkenleri][wiki-env] kullanır. Yapılandırmanın geri kalanı [yapılandırma dosyası][conf] içinde saklanır. [conf]: configuration.md [wiki-env]: https://en.wikipedia.org/wiki/Environment_variable @@ -14,7 +14,7 @@ AdGuard DNS Client uses [environment variables][wiki-env] to store part of the c Günlük hedefi, dosyaya giden mutlak bir yol veya özel değerlerden biri olmalıdır. Yapılandırma dosyasıyla ilgili makaledeki [günlük yapılandırma açıklaması][conf-log] bölümüne bakın. -This environment variable overrides the [`log.output`][conf-log] field in the configuration file. +Bu ortam değişkeni yapılandırma dosyasındaki [`log.output`][conf-log] alanını geçersiz kılar. **Default:** **Unset.** @@ -24,15 +24,15 @@ This environment variable overrides the [`log.output`][conf-log] field in the co Günlük girişlerinin biçimi. Yapılandırma dosyasıyla ilgili makaledeki [günlük yapılandırma açıklaması][conf-log] bölümüne bakın. -This environment variable overrides the [`log.format`][conf-log] field in the configuration file. +Bu ortam değişkeni yapılandırma dosyasındaki [`log.format`][conf-log] alanını geçersiz kılar. **Default:** **Unset.** ## `LOG_TIMESTAMP` {#LOG_TIMESTAMP} -When set to `1`, log entries have a timestamp. When set to `0`, log entries don’t have it. +`1` olarak ayarlandığında, günlük girdileri bir zaman damgasına sahip olur. `0` olarak ayarlandığında, günlük girdileri buna sahip olmaz. -This environment variable overrides the [`log.timestamp`][conf-log] field in the configuration file. +Bu ortam değişkeni yapılandırma dosyasındaki [`log.timestamp`][conf-log] alanını geçersiz kılar. **Default:** **Unset.** @@ -40,6 +40,6 @@ This environment variable overrides the [`log.timestamp`][conf-log] field in the `1` olarak ayarlandığında ayrıntılı günlük kaydını etkinleştirir. `0` olarak ayarlandığında devre dışı bırakılır. -This environment variable overrides the [`log.verbose`][conf-log] field in the configuration file. +Bu ortam değişkeni yapılandırma dosyasındaki [`log.verbose`][conf-log] alanını geçersiz kılar. **Default:** **Unset.** diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/overview.md b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/overview.md index f03179d19..22d0344ab 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/overview.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/dns-client/overview.md @@ -37,7 +37,7 @@ Desteklenen CPU mimarileri: 1. `.tar.gz` or `.zip` arşivini [sürümler sayfasından][releases] indirin ve açın. - :::dikkat + :::caution macOS'ta, genel olarak yüklenen daemonların `root` tarafından sahiplenilmesi çok önemlidir (bkz. [`launchd` dokümantasyonu][launchd-requirements]), bu nedenle `AdGuardDNSClient` çalıştırılabilir dosyası `/Applications/` dizinine veya alt dizinine yerleştirilmelidir. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-filtering-syntax.md b/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-filtering-syntax.md index ac161b980..664435f8d 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-filtering-syntax.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-filtering-syntax.md @@ -472,7 +472,7 @@ Ana makine adları yalnızca alfanümerik karakterler, tire-eksi işaretleri (`- AdGuard Home'da IP adresleri, bu alan adları için DNS sorgularına yanıt vermek için kullanılır. Özel AdGuard DNS'de bu adresler basitçe engellenir. -## Domains-only syntax {#domains-only-syntax} +## Yalnızca alan adları söz dizimi {#domains-only-syntax} Her satırda bir ad olacak şekilde basit bir alan adları listesi. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-providers.md index b0412122d..b03c5b5a0 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -65,7 +65,7 @@ Bu sunucuların her biri güvenli ve güvenilir bir bağlantı sağlar, ancak "S ### Ali DNS -[Ali DNS](https://alidns.com/), İnternet kullanıcılarının çoğu için hızlı, kararlı ve güvenli DNS çözünürlüğü sağlamayı taahhüt eden ücretsiz bir özyinelemeli DNS hizmetidir. Kullanıcıları çeşitli saldırılardan ve tehditlerden korumak için AliGuard özelliğini içerir. +[Ali DNS](https://alidns.com/), internet kullanıcılarının çoğu için hızlı, kararlı ve güvenli DNS çözünürlüğü sağlamayı taahhüt eden ücretsiz bir özyinelemeli DNS hizmetidir. Kullanıcıları çeşitli saldırılardan ve tehditlerden korumak için AliGuard özelliğini içerir. | Protokol | Adres | | | -------------- | ------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -351,6 +351,21 @@ Kimlik avı, spam ve kötü amaçlı alan adlarını engeller. | DNS-over-TLS | Sağlayıcı: `Surfnet` Ana makine adı: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` ve IPv6: `2001:610:1:40ba:145:100:185:15` | [AdGuard'a ekle](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Sağlayıcı: `Surfnet` Ana makine adı: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` ve IPv6: `2001:610:1:40ba:145:100:185:16` | [AdGuard'a ekle](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org), kullanıcı güvenliğini ve anonimliğini ön planda tutan, gizlilik odaklı bir DNS hizmetidir. Hem standart DNS'i hem de şifrelenmiş protokolleri desteklerken, katı bir kayıt tutmama politikasını sürdürür. + +#### Standard + +| Protokol | Adres | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [AdGuard'a ekle](adguard:add_dns_server?address=162.55.52.228&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [AdGuard'a ekle](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [AdGuard'a ekle](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [AdGuard'a ekle](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [AdGuard'a ekle](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [AdGuard'a ekle](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Günlük tutmamama politikasına sahip diğer DNS sunucuları | Protokol | Adres | | @@ -391,12 +406,13 @@ Bu sunucular bazı günlük kaydı, kendinden imzalı sertifikalar kullanır vey [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protokol | Adres | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [AdGuard'a ekle](adguard:add_dns_server?address=119.29.29.29&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [AdGuard'a ekle](adguard:add_dns_server?address=2402:4e00::&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [AdGuard'a ekle](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [AdGuard'a ekle](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protokol | Adres | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [AdGuard'a ekle](adguard:add_dns_server?address=119.29.29.29&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [AdGuard'a ekle](adguard:add_dns_server?address=2402:4e00::&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [AdGuard'a ekle](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [AdGuard'a ekle](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [AdGuard'a ekle](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -514,7 +530,7 @@ Hurricane Electric Public Recursor is a free alternative DNS service by Hurrican [Neustar Recursive DNS](https://www.security.neustar/digital-performance/dns-services/recursive-dns), yerleşik güvenlik ve tehdit istihbaratı ile sitelere ve çevrimiçi uygulamalara hızlı ve güvenilir erişim sağlayan ücretsiz bir bulut tabanlı özyinelemeli DNS hizmetidir. -#### Reliability & Performance 1 +#### Güvenilirlik ve Performans 1 Bu sunucular, herhangi bir belirli kategoriyi engellemeden güvenilir ve hızlı DNS aramaları sağlar. @@ -523,7 +539,7 @@ Bu sunucular, herhangi bir belirli kategoriyi engellemeden güvenilir ve hızlı | DNS, IPv4 | `156.154.70.1` ve `156.154.71.1` | [AdGuard'a ekle](adguard:add_dns_server?address=156.154.70.1&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=156.154.70.1&name=) | | DNS, IPv6 | `2610:a1:1018::1` ve `2610:a1:1019::1` | [AdGuard'a ekle](adguard:add_dns_server?address=2610:a1:1018::1&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=2610:a1:1018::1&name=) | -#### Reliability & Performance 2 +#### Güvenilirlik ve Performans 2 Bu sunucular, belirli kategorileri engellemeden güvenilir ve hızlı DNS aramaları sağlar ve ayrıca NXDomain (var olmayan alan adı) yanıtlarının açılış sayfalarına yönlendirilmesini önler. @@ -757,7 +773,7 @@ ByteDance Public DNS, Çin'de ByteDance tarafından sunulan ücretsiz bir altern #### Private -"Özel" modda, yalnızca DNS çözümlemesi. +"Private" modda, yalnızca DNS çözümlemesi. | Protokol | Adres | | | ---------------------- | -------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/), DoH ve DoT çözümleyicilerine üç filtreleme düzeyi sağlar +[momou! DNS](https://dns.momou.ch/), DoH ve DoT çözümleyicilerine üç filtreleme düzeyi sağlar #### Standard @@ -1232,9 +1248,9 @@ Bu sunucular reklam engelleme sağlamaz, günlük tutmaz ve DNSSEC'yi etkinleşt ### Seby DNS -[Seby DNS](https://dns.seby.io/), Sebastian Schmidt tarafından sağlanan gizlilik odaklı bir DNS hizmetidir. Günlük Tutmama, DNSSEC doğrulaması. +[Seby DNS](https://dns.seby.io/), Sebastian Schmidt tarafından sağlanan gizlilik odaklı bir DNS hizmetidir. Günlük tutmama, DNSSEC doğrulaması. -#### DNS Server 1 +#### DNS Sunucusu 1 | Protokol | Adres | | | -------------- | ----------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1244,7 +1260,7 @@ Bu sunucular reklam engelleme sağlamaz, günlük tutmaz ve DNSSEC'yi etkinleşt ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc), Vietnam'da bulunan kişisel ve küçük ölçekli kullanım için tasarlanmış kişisel bir DNS Sunucusudur. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protokol | Adres | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ Bu sunucular reklam engelleme sağlamaz, günlük tutmaz ve DNSSEC'yi etkinleşt | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [AdGuard'a ekle](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [AdGuard'a ekle](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [AdGuard'a ekle](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/), reklam engelleme, gizlilik, kötü amaçlı yazılım korumasına odaklanan ve katı bir günlük tutmama politikasına sahip bir DNS'dir. + +| Protokol | Adres | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [AdGuard'a ekle](adguard:add_dns_server?address=23.176.184.32&name=), [AdGuard VPN'e ekle](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index eb1ea30c6..efa41a0e1 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,24 +1,22 @@ - - - -title: Güvenli DNS için kendi DNS damganızı nasıl oluşturabilirsiniz - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - -Bu kılavuz, Güvenli DNS için kendi DNS damganızı nasıl oluşturacağınızı gösterir. Güvenli DNS, DNS sorgularınızı şifreleyerek internet güvenliğinizi ve gizliliğinizi artıran bir hizmettir. Bu, sorgularınızın kötü niyetli kişiler tarafından ele geçirilmesini veya manipüle edilmesini önler. +This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. -Güvenli DNS genellikle `tls://`, `https://` veya `quic://` URL'lerini kullanır. Bu, çoğu kullanıcı için yeterlidir ve tavsiye edilen yoldur. +Secure DNS usually uses `tls://`, `https://`, or `quic://` URLs. This is sufficient for most users and is the recommended way. -Ancak, önceden çözümlenmiş sunucu IP'leri ve karma yoluyla sertifika sabitleme gibi ek güvenliğe ihtiyacınız varsa, kendi DNS damganızı oluşturabilirsiniz. +However, if you need additional security, like pre-resolved server IPs and certificate pinning by hash, you may generate your own DNS stamp. ## DNS damgalarına giriş -DNS damgaları, güvenli bir DNS sunucusuna bağlanmak için gereken tüm bilgileri içeren kısa dizelerdir. Kullanıcının tüm bu verileri elle girmesi gerekmediğinden, Güvenli DNS kurma sürecini basitleştirirler. +DNS stamps are short strings that contain all the information needed to connect to a secure DNS server. They simplify the process of setting up Secure DNS as the user does not need to manually enter all this data. -DNS damgaları, Güvenli DNS ayarlarını normal URL'lerin ötesinde özelleştirmenize olanak tanır. Özellikle, sabit kodlanmış sunucu adreslerini belirtmenize, sertifika karması kullanmanıza, vb. izin verirler. Bu özellikler, DNS damgalarını Güvenli DNS ayarlarını yapılandırmak için daha sağlam ve çok yönlü bir seçenek hâline getirir. +DNS stamps allow you to customize Secure DNS settings beyond the usual URLs. In particular, they allow you to specify hard-coded server addresses, use certificate hashing, and so on. These features make DNS stamps a more robust and versatile option for configuring Secure DNS settings. ## Protokol seçimi -Güvenli DNS türleri arasında `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)` ve diğerleri yer alır. Bu protokollerden birini seçmek, bunları hangi bağlamda kullanacağınıza bağlıdır. +Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, and some others. Choosing one of these protocols depends on the context in which you'll be using them. ## DNS damgası oluşturma @@ -58,21 +56,21 @@ Güvenli DNS türleri arasında `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, ` ### Sertifika karmasının elde edilmesi -**Sunucunun sertifika karmaları** alanını doldurmak için, ``, `` ve `` ile DNS sunucunuz için karşılık gelen değerleri değiştirerek aşağıdaki komutu kullanabilirsiniz: +To fill in the **Hashes of the server's certificate** field, you can use the following command, replacing ``, ``, and `` with the corresponding values for your DNS server: ```bash echo | openssl s_client -connect : -servername 2>/dev/null | openssl x509 -outform der | openssl asn1parse -inform der -strparse 4 -noout -out - | openssl dgst -sha256 ``` -:::dikkat +:::caution -Karma komutunun sonucu, sunucunun sertifikası güncelleştirildikçe zaman içinde değişebilir. Bu nedenle, DNS damganız aniden çalışmayı durdurursa, sertifikanın karmasını yeniden hesaplamanız ve yeni bir damga oluşturmanız gerekebilir. DNS damganızı düzenli olarak güncellemek, Güvenli DNS hizmetinizin sürekli güvenli çalışmasını sağlamaya yardımcı olur. +The result of the hash command may change over time as the server's certificate is updated. Therefore, if your DNS stamp suddenly stops working, you may need to recalculate the hash of the certificate and generate a new stamp. Regularly updating your DNS stamp will help ensure the continued secure operation of your Secure DNS service. ::: ## DNS damgasını kullanma -Artık Güvenli DNS kurmak için kullanabileceğiniz kendi DNS damganız var. Bu damga, gelişmiş internet gizliliği ve güvenliği için AdGuard ve AdGuard VPN'e girilebilir. +You now have your own DNS stamp that you can use to set up Secure DNS. Bu damga, gelişmiş internet gizliliği ve güvenliği için AdGuard ve AdGuard VPN'e girilebilir. ## DNS damgası oluşturma örneği diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/structured-dns-errors.md b/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/structured-dns-errors.md index 141f19705..8e8a98e48 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/structured-dns-errors.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/miscellaneous/structured-dns-errors.md @@ -7,7 +7,7 @@ With the release of AdGuard DNS v2.10, AdGuard has become the first public DNS r ## What Structured DNS Errors are -When a request to an advertising or tracking domain is blocked, the user may see blank spaces on a website or may not even notice that DNS filtering has occurred. However, if an entire website is blocked at the DNS level, the user will be completely unable to access the page. When trying to access a blocked website, the user may see a generic "This site can't be reached" error displayed by the browser. +When a request to an advertising or tracking domain is blocked, the user may see blank spaces on a website or may not even notice that DNS filtering has occurred. Ancak bir sitenin tamamı DNS düzeyinde engellendiğinde, kullanıcı sayfaya erişim tamamen imkansız hâle gelecektir. Engellenmiş bir siteye erişmeye çalışırken, kullanıcı tarayıcı tarafından görüntülenen genel bir “Bu siteye erişilemiyor” hatası görebilir. !["Bu siteye ulaşılamıyor" hatası](https://cdn.adtidy.org/content/blog/dns/dns_error.png) @@ -26,7 +26,7 @@ The SDE data is included in the `EXTRA-TEXT` field of the DNS response. Şunu i - `o` (organization): Organization responsible for DNS filtering in this case (optional) - `s` (suberror): The suberror code for this particular DNS filtering (optional) -Such a system enhances transparency between DNS services and users. +Böyle bir sistem, DNS hizmetleri ile kullanıcılar arasındaki şeffaflığı artırır. ### What is required to implement Structured DNS Errors @@ -36,9 +36,9 @@ Although AdGuard DNS has implemented support for Structured DNS Errors, browsers To showcase how Structured DNS Errors work, AdGuard DNS has developed a demo browser extension that shows how _Structured DNS Errors_ could work if browsers supported them. If you try to visit a website blocked by AdGuard DNS with this extension enabled, you will see a detailed explanation page with the information provided via SDE, such as the reason for blocking, contact details, and the organization responsible. -![Explanation page](https://cdn.adtidy.org/blog/new/jlkdbaccess_blocked.png) +![Açıklama sayfası](https://cdn.adtidy.org/blog/new/jlkdbaccess_blocked.png) -You can install the extension from the [Chrome Web Store](https://chromewebstore.google.com/detail/oeinmjfnchfhaabhchfjkbdpmgeageen) or from [GitHub](https://github.com/AdguardTeam/dns-sde-extension/). +Uzantıyı [Chrome Web Mağazası](https://chromewebstore.google.com/detail/oeinmjfnchfhaabhchfjkbdpmgeageen) veya [GitHub'dan](https://github.com/AdguardTeam/dns-sde-extension/) yükleyebilirsiniz. DNS düzeyinde neye benzediğini görmek istiyorsanız, `dig` komutunu kullanabilir ve çıktıda `EDE` araması yapabilirsiniz. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md index 47792b43e..20a44552e 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/changelog.md @@ -78,7 +78,7 @@ _16 Haziran 2023 tarihinde yayınlandı_ ### Güvenli gezinti ayarları için model değiştirildi -From: +Şundan: ```json { @@ -86,7 +86,7 @@ From: } ``` -To: +Şuna: ```json { @@ -100,7 +100,7 @@ burada `enabled` artık gruptaki tüm ayarları kontrol eder, `block_dangerous_d ### Sunucu ayarlarını kaydetme modeli değiştirildi -From: +Şundan: ```json { diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/reference.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/reference.md index 10d5ce843..019b09126 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/reference.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/api/reference.md @@ -66,9 +66,9 @@ Cihazları listeler ##### Yanıtlar -| Kod | Açıklama | -| --- | --------------- | -| 200 | List of devices | +| Kod | Açıklama | +| --- | ------------------ | +| 200 | Cihazların listesi | #### POST diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index c0d01c253..408be0614 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -9,7 +9,7 @@ Yönlendiricinizin şifrelenmiş DNS sunucularının kullanımını desteklemesi [How to configure your router](/private-dns/connect-devices/routers/routers.md) -## Connect AdGuard DNS +## AdGuard DNS'e bağlanma Oyun konsolunuzu bir genel AdGuard DNS sunucusunu kullanacak şekilde yapılandırın veya bunu bağlı IP üzerinden yapılandırın: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 9edf9997e..eb4aeb198 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -15,7 +15,7 @@ New Nintendo 3DS, New Nintendo 3DS XL, New Nintendo 2DS XL, Nintendo 3DS, Ninten ::: -## Connect AdGuard DNS +## AdGuard DNS'e bağlanma Oyun konsolunuzu bir genel AdGuard DNS sunucusunu kullanacak şekilde yapılandırın veya bunu bağlı IP üzerinden yapılandırın: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index ebe97a618..b844931e9 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -9,11 +9,11 @@ Yönlendiricinizin şifrelenmiş DNS sunucularının kullanımını desteklemesi [How to configure your router](/private-dns/connect-devices/routers/routers.md) -## Connect AdGuard DNS +## AdGuard DNS'e bağlanma Oyun konsolunuzu bir genel AdGuard DNS sunucusunu kullanacak şekilde yapılandırın veya bunu bağlı IP üzerinden yapılandırın: -1. Turn on your PS4/PS5 console and sign in to your account. +1. PS4/PS5 konsolunuzu açın ve hesabınıza giriş yapın. 2. Ana ekrandan, üst sırada bulunan dişli çark simgesini seçin. 3. _Ayarlar_ menüsünden _Ağ_ öğesini seçin. 4. _İnternet Bağlantısını Ayarla_ öğesini seçin. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index 10fffe9ee..1dea57893 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -9,7 +9,7 @@ Yönlendiricinizin şifrelenmiş DNS sunucularının kullanımını desteklemesi [How to configure your router](/private-dns/connect-devices/routers/routers.md) -## Connect AdGuard DNS +## AdGuard DNS'e bağlanma Oyun konsolunuzu bir genel AdGuard DNS sunucusunu kullanacak şekilde yapılandırın veya bunu bağlı IP üzerinden yapılandırın: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 9b65f1c9d..d399b5869 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -9,7 +9,7 @@ Yönlendiricinizin şifrelenmiş DNS sunucularının kullanımını desteklemesi [How to configure your router](/private-dns/connect-devices/routers/routers.md) -## Connect AdGuard DNS +## AdGuard DNS'e bağlanma Oyun konsolunuzu bir genel AdGuard DNS sunucusunu kullanacak şekilde yapılandırın veya bunu bağlı IP üzerinden yapılandırın: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 36369b20f..e77dadd1d 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Tüm VPN hizmetleri şifrelenmiş DNS'i desteklemez. Ancak bizim VPN'imiz destek ![DNS sunucusu \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Aşağıya kaydırın ve _Özel DNS sunucusu ekle_ öğesine dokunun. ![DNS sunucusu ekle \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. Hangi seçeneği kullanacağınızdan emin değilseniz, DNS-over-HTTPS öğesini işaretleyin. +7. Aşağıdaki DNS adreslerinden birini kopyalayıp uygulamada _DNS sunucu adresleri_ alanına yapıştırın. Hangi seçeneği kullanacağınızdan emin değilseniz, DNS-over-HTTPS öğesini işaretleyin. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Özel DNS sunucusu \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. _Kaydet ve seç_ öğesine dokunun. @@ -58,7 +58,7 @@ Tüm VPN hizmetleri şifrelenmiş DNS'i desteklemez. Ancak bizim VPN'imiz destek Hepsi tamam! Cihazınız AdGuard DNS'e başarıyla bağlandı. -## Configure Private DNS manually +## AdGuard DNS'i elle yapılandırma DNS sunucunuzu cihaz ayarlarınızdan yapılandırabilirsiniz. Android cihazların yalnızca DNS-over-TLS protokolünü desteklediğini lütfen unutmayın. @@ -71,7 +71,7 @@ DNS sunucunuzu cihaz ayarlarınızdan yapılandırabilirsiniz. Android cihazlar ![Özel DNS \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_manual/manual_step4.png) Tamamlandı! Cihazınız AdGuard DNS'e başarıyla bağlandı. -## Configure plain DNS +## Düz DNS'i yapılandırma DNS yapılandırması için ekstra yazılım kullanmak istemiyorsanız, şifrelenmemiş DNS'i tercih edebilirsiniz. İki seçeneğiniz var: bağlı IP'ler veya özel IP'ler. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index c8c1efc48..be5325308 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -74,7 +74,7 @@ Eğer VPN kullanıyorsanız yapılandırma profili göz ardı edilecektir. 4. _Yükle_ öğesine dokunun ve ekrandaki talimatları izleyin. ![Yükle \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/ios_manual/manual_step4.png) -## Configure plain DNS +## Düz DNS'i yapılandırma DNS yapılandırması için ekstra yazılım kullanmak istemiyorsanız, şifrelenmemiş DNS'i tercih edebilirsiniz. İki seçenek var: bağlı IP'ler veya özel IP'ler kullanmak. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 1d79bf71e..94f1ac569 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## EDNS (Genişletilmiş DNS) kullanma + +EDNS, DNS protokolünü genişleterek daha büyük UDP paketlerinin ek veri taşımasını sağlar. AdGuard DNS'de, ekstra bir parametre kullanılarak DeviceID'nin düz DNS'te geçirilmesine izin verilir. + +Sekiz basamaklı bir onaltılık tanımlayıcı olan DeviceID (örneğin, `1a2b3c4d`), DNS isteklerini belirli cihazlara bağlamaya yardımcı olur. Şifrelenmiş DNS için, bu ID alan adının bir parçasıdır (örneğin, `1a2b3c4d.d.adguard-dns.com`). Şifrelenmemiş DNS için bu tanımlayıcıyı aktarmak üzere EDNS gereklidir. + +AdGuard DNS, `65074` numaralı seçeneği arayarak DeviceID'yi almak için EDNS kullanır. Böyle bir seçenek varsa, oradan DeviceID'yi okur. Bunun için terminalde `dig` komutunu kullanabilirsiniz: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Burada, `65074` seçenek kimliğidir ve `3031323334353637` onun hex biçimindeki değeridir (DeviceID: `01234567`). + +Hepsi tamam! DeviceID görüntülenmelidir. + +:::note + +`dig` komutu sadece bir örnektir, bu eylemi gerçekleştirmek için EDNS seçeneklerini ekleme yeteneğine sahip herhangi bir DNS yazılımını kullanabilirsiniz. + +::: + ## Düz DNS kullanma DNS yapılandırması için ekstra yazılım kullanmak istemiyorsanız, şifrelenmemiş DNS'i tercih edebilirsiniz. İki seçeneğiniz var: bağlı IP'ler veya özel IP'ler: diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index 00c336a83..cfe4445e3 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -73,7 +73,7 @@ Eğer VPN kullanıyorsanız yapılandırma profili göz ardı edilecektir. Hepsi tamam! Cihazınız AdGuard DNS'e başarıyla bağlandı. -## Configure plain DNS +## Düz DNS'i yapılandırma DNS yapılandırması için ekstra yazılım kullanmak istemiyorsanız, şifrelenmemiş DNS'i tercih edebilirsiniz. İki seçeneğiniz var: bağlı IP'ler veya özel IP'ler. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index 3dd784c11..d4afa8a86 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -60,7 +60,7 @@ AdGuard DNS İstemcisi, şifrelenmiş DNS protokollerini kullanarak AdGuard DNS' Daha fazla ayrıntı [farklı makalede](/dns-client/overview/) bulunabilir. -## Configure plain DNS +## Düz DNS'i yapılandırma DNS yapılandırması için ekstra yazılım kullanmak istemiyorsanız, şifrelenmemiş DNS'i tercih edebilirsiniz. İki seçeneğiniz var: bağlı IP'ler veya özel IP'ler. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 2b0de191c..cdba6275b 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,15 +11,15 @@ Bir Takım veya Kurumsal aboneliğiniz varsa, birkaç kişisel özel IP adresi a ## Neden özel IP'ye ihtiyacınız var? -Ne yazık ki, bağlı cihazın teknik özellikleri her zaman şifrelenmiş özel bir AdGuard DNS sunucusu kurmanıza izin vermeyebilir. Bu durumda, standart şifrelenmemiş DNS kullanmanız gerekir. AdGuard DNS'i kurmanın iki yolu vardır: [bağlı IP'leri kullanarak](/private-dns/connect-devices/other-options/linked-ip.md) ve özel IP'leri kullanarak. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. Bu durumda, standart şifrelenmemiş DNS kullanmanız gerekir. AdGuard DNS'i kurmanın iki yolu vardır: [bağlı IP'leri kullanarak](/private-dns/connect-devices/other-options/linked-ip.md) ve özel IP'leri kullanarak. -Özel IP'ler genellikle daha istikrarlı bir seçenektir. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. Özel IP'lerle, yalnızca size ait bir IP adresine sahip olursunuz ve cihazınıza gelen tüm istekler sayılacaktır. +Özel IP'ler genellikle daha istikrarlı bir seçenektir. Bağlı IP'nin bazı sınırlamaları vardır; örneğin yalnızca konut adreslerine izin verilir, sağlayıcınız IP'yi değiştirebilir ve IP adresini yeniden bağlamanız gerekir. Özel IP'lerle, yalnızca size ait bir IP adresine sahip olursunuz ve cihazınıza gelen tüm istekler sayılacaktır. Dezavantajı, genel DNS çözümleyicilerinde her zaman olduğu gibi alakasız trafik (tarayıcılar, botlar) almaya başlayabilirsiniz. Bot trafiğini kısıtlamak için [Erişim ayarları](/private-dns/server-and-settings/access.md) kullanmanız gerekebilir. Aşağıdaki talimatlar cihaza özel IP'nin nasıl bağlanacağını açıklamaktadır: -## Connect AdGuard DNS using dedicated IPs +## Özel IP'ler kullanarak AdGuard DNS'i bağlama 1. Panoyu açın. 2. Yeni bir cihaz ekleyin veya önceden oluşturulmuş bir cihazın ayarlarını açın. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 0bc1110b6..84f7cce41 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -3,7 +3,7 @@ title: Bağlı IP'ler sidebar_position: 3 --- -## What linked IPs are and why they are useful +## Bağlı IP'ler nedir ve neden faydalıdırlar Tüm cihazlar şifrelenmiş DNS protokollerini desteklemez. Bu durumda, şifrelenmemiş DNS kurmayı düşünmelisiniz. Örneğin, **bağlı IP adresi** kullanabilirsiniz. Bağlı bir IP adresi için tek gereksinim, bunun bir konut IP'si olmasıdır. @@ -14,7 +14,9 @@ Tüm cihazlar şifrelenmiş DNS protokollerini desteklemez. Bu durumda, şifrele ::: Bazen, bir konut IP adresi zaten kullanımda olabilir ve siz bu adrese bağlanmaya çalıştığınızda AdGuard DNS bağlantıyı önler. + ![Bağlı IPv4 adresi \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + Eğer böyle bir durum olursa lütfen [support@adguard-dns.io](mailto:support@adguard-dns.io) adresinden destek ekibiyle iletişime geçin, doğru yapılandırma ayarları konusunda size yardımcı olacaklardır. ## Bağlı IP nasıl kurulur @@ -25,11 +27,12 @@ Aşağıdaki talimatlar, cihaza **IP adresini bağlamak** aracılığıyla nası 2. Yeni bir cihaz ekleyin veya önceden bağlanmış bir cihazın ayarlarını açın. 3. _DNS sunucu adreslerini kullan_ öğesine gidin. 4. _Düz DNS sunucu adresleri_ öğesini açın ve bağlı IP'yi bağlayın. + ![Bağlı IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) -## Dynamic DNS: Why it is useful +## Dinamik DNS: Neden yararlıdır -Bir cihaz ağa her bağlandığında yeni bir dinamik IP adresi alır. When a device disconnects, the DHCP server can assign the released IP address to another device on the network. This means dynamic IP addresses change frequently and unpredictably. Sonuç olarak, cihaz her yeniden başlatıldığında veya ağ değiştiğinde ayarları güncellemeniz gerekir. +Bir cihaz ağa her bağlandığında yeni bir dinamik IP adresi alır. Bir cihazın bağlantısı kesildiğinde, DHCP sunucusu serbest bırakılan IP adresini ağdaki başka bir cihaza atayabilir. Bu, dinamik IP adreslerinin sık sık ve öngörülemeyen bir şekilde değiştiği anlamına gelir. Sonuç olarak, cihaz her yeniden başlatıldığında veya ağ değiştiğinde ayarları güncellemeniz gerekir. Bağlı IP adresini otomatik olarak güncel tutmak için DNS kullanabilirsiniz. AdGuard DNS, DDNS alan adınızın IP adresini düzenli olarak kontrol eder ve sunucunuza bağlar. @@ -44,14 +47,21 @@ Bu şekilde, ilişkili IP adresini her değiştiğinde elle güncellemeniz gerek ## Dinamik DNS: Nasıl kurulur 1. Öncelikle, DDNS'nin yönlendirici ayarlarınız tarafından desteklenip desteklenmediğini kontrol etmeniz gerekir: + - _Yönlendirici ayarları_ → _Ağ_ öğesine gidin - DDNS veya _Dinamik DNS_ bölümünü bulun - - Oraya gidin ve ayarların gerçekten desteklendiğini doğrulayın. _Bu sadece neye benzeyebileceğine dair bir örnektir. Yönlendiricinize bağlı olarak değişebilir_ - ![DDNS destekli \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Oraya gidin ve ayarların gerçekten desteklendiğini doğrulayın. _Bu, neye benzeyebileceğine dair sadece bir örnektir, ayarlar yönlendiricinize bağlı olarak değişebilir_ + + ![DDNS destekli \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Alan adınızı [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/) veya tercih ettiğiniz başka bir DDNS sağlayıcısı gibi popüler bir hizmetle tescil ettirin. + 3. Yönlendirici ayarlarınıza alan adını girin ve yapılandırmaları senkronize edin. + 4. Adresi bağlamak için Bağlı IP ayarlarına gidin, ardından _Gelişmiş Ayarlar_ öğesine gidin ve _DDNS'i yapılandır_ öğesine tıklayın. + 5. Daha önce tescil ettirdiğiniz alan adını girin ve _DDNS'i yapılandır_ öğesine tıklayın. + ![DDNS'i yapılandır \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) Hepsi tamam, DDNS'i başarıyla kurdunuz! @@ -66,7 +76,7 @@ En kolay yol Görev Zamanlayıcı'yı kullanmaktır: - Görev Zamanlayıcı'yı açın. - Yeni bir görev oluşturun. - Tetikleyiciyi her 5 dakikada bir çalışacak şekilde ayarlayın. - - Select _Run Program_ as the action. + - Eylem olarak _Programı Başlat_ öğesini seçin. 2. Program seçin: - _Program veya Betik_ alanına `powershell` yazın - In the _Add Arguments_ field, type: @@ -78,11 +88,11 @@ En kolay yol Görev Zamanlayıcı'yı kullanmaktır: On macOS and Linux, the easiest way is to use `cron`: 1. Open crontab: - - In the terminal, run `crontab -e`. + - Terminalde `crontab -e` komutunu çalıştırın. 2. Bir görev ekleyin: - Aşağıdaki satırı ekleyin: `/5 * * * * curl https://linkip.adguard-dns.com/linkip/{ServerID}/{UniqueKey}` - - This job will run every 5 minutes + - Bu işlem her 5 dakikada bir çalışır 3. Save crontab. :::note Önemli diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 55e25cbd4..52172d1dc 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Yönetici kullanıcı adını (genellikle yöneticidir) ve yönlendirici parolasını girin. 3. _Gelişmiş Ayarlar_ kenar çubuğunda WAN bölümüne gidin. 4. _WAN DNS Ayarları_ bölümünde _DNS Sunucusuna otomatik olarak bağlan_ öğesini _Hayır_ olarak ayarlayın. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. _Yerel sorguları ilet_, _DNS Yeniden Bağlama korumasını etkinleştir_ ve _DNSSEC desteğini etkinleştir_ öğelerini _Hayır_ olarak ayarlayın. 6. DNS Gizlilik Protokolü öğesini DNS-over-TLS (DoT) olarak değiştirin. 7. _DNS-over-TLS Profili_ öğesini _Katı_ olarak ayarlandığından emin olun. 8. _DNS-over-TLS Sunucuları Listesi_ bölümüne doğru aşağı kaydırın. _Adres_ alanına aşağıdaki adreslerden birini girin: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. _Gelişmiş Ayarlar_ veya _Gelişmiş_ öğesini açın. 4. _WAN_ veya _İnternet_ öğesini seçin. 5. _DNS Ayarları_ veya _DNS_ öğesini açın. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. _Manuel Ayar_ öğesini seçin. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` ve `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` ve `2a10:50c0:0:0:0:0:dad:ff` 7. Ayarları kaydedin. 8. IP'nizi (veya bir Takım aboneliğiniz varsa özel IP'nizi) bağlayın. - -- [Özel IP'ler](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Bağlı IP'ler](/private-dns/connect-devices/other-options/linked-ip.md) + - [Özel IP'ler](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Bağlı IP'ler](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index bfef9d6d9..de517a8e2 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic yönlendiriciler kararlılıkları ve esnek konfigürasyonları ile bil 5. _Hizmetler ve servisler_ bölümünde DNS-over-HTTPS proxy'sini seçin ve yükleyin. 6. _Menü_ → _Ağ kuralları_ → _İnternet güvenliği_ öğesine gidin. 7. DNS-over-HTTPS sunucularına gidin ve _DNS-over-HTTPS sunucusu ekle_ öğesine tıklayın. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Özel AdGuard DNS sunucusunun URL'sini `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` alanına girin. 9. _Kaydet_ öğesine tıklayın. ## DNS-over-TLS'yi yapılandırma diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index a43c2acac..26452cf1e 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -23,38 +23,42 @@ MikroTik yönlendiriciler, ev ve küçük ofis ağları için yönlendirme, kabl - `94.140.14.49` - `94.140.14.59` - _Uzak İsteklere İzin Ver_ öğesini _Evet_ olarak ayarlayın (bu, DoH'un çalışması için önemlidir) - - _DoH sunucusunu kullan_ alanına özel AdGuard DNS sunucusunun URL'sini girin: `https://d.adguard-dns.com/dns-query/*******` + - _DoH sunucusu kullan_ alanına özel AdGuard DNS sunucusunun URL'sini girin: `https://d.adguard-dns.com/dns-query/*******` - _Tamam_ öğesine tıklayın 4. Create Static DNS Records: - _DNS Ayarları_ öğesinde _Statik_ öğesine tıklayın - _Yeni Ekle_ öğesine tıklayın - - _Adı_ d.adguard-dns.com olarak ayarlayın - - _Türü_ A olarak ayarlayın + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - _Adresi_ `94.140.14.49` olarak ayarlayın - - _TTL_ değerini 1d 00:00:00 olarak ayarlayın + - Set _TTL_ to `1d 00:00:00` - Aynı girdiyi oluşturmak için işlemi tekrarlayın, ancak _Adres_ `94.140.14.59` olarak ayarlanmalıdır 5. DHCP İstemcisinde Eş DNS'i devre dışı bırakın: - _IP_ → _DHCP İstemcisi_ öğesine gidin - İnternet bağlantınız için kullanılan istemciye çift tıklayın (genellikle WAN arayüzünde) - _Eş DNS Kullan_ öğesinin işaretini kaldırın - _Tamam_ öğesine tıklayın -6. IP'nizi bağlayın. -7. Test edin ve doğrulayın: - - Tüm değişikliklerin etkili olması için MikroTik yönlendiricinizi yeniden başlatmanız gerekebilir - - Tarayıcınızın DNS önbelleğini temizleyin. DNS isteklerinizin artık AdGuard üzerinden yönlendirilip yönlendirilmediğini kontrol etmek için [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) gibi bir araç kullanabilirsiniz +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Yönlendirici yönetici panelini kullanma +## Yönlendiricim DNS-over-HTTPS'yi desteklemiyor -Keenetic yönlendiriciniz DNS-over-HTTPS veya DNS-over-TLS yapılandırmasını desteklemiyorsa bu talimatları kullanın: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Yönlendirici yönetici panelini açın. `192.168.1.1` veya `192.168.0.1` adresinden erişilebilir. -2. Yönetici kullanıcı adını (genellikle yöneticidir) ve yönlendirici parolasını girin. -3. _Webfig_ → _IP_ → _DNS_' öğesini açın. -4. _Sunucular_ öğesini seçin ve aşağıdaki DNS sunucu adreslerinden birini girin. - - IPv4: `94.140.14.49` ve `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` ve `2a10:50c0:0:0:0:0:dad:ff` -5. Ayarları kaydedin. -6. IP'nizi (veya bir Takım aboneliğiniz varsa özel IP'nizi) bağlayın. - -- [Özel IP'ler](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Bağlı IP'ler](/private-dns/connect-devices/other-options/linked-ip.md) +1. MikroTik yönlendiricinize erişin: + - Web tarayıcınızı açın ve yönlendiricinizin IP adresine gidin (genellikle `192.168.88.1`) + - Alternatif olarak, MikroTik yönlendiricinize bağlanmak için Winbox'ı kullanabilirsiniz + - Enter your administrator username and password +2. Configure Plain DNS: + - _IP_ → _DNS_ öğesine gidin + - Sunucular\* bölümünde, aşağıdaki AdGuard DNS sunucularını ekleyin: + - IPv4: `94.140.14.49` ve `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` ve `2a10:50c0:0:0:0:0:dad:ff` + - Özel IPv6: Özel AdGuard DNS, özel IPv6 adreslerini destekler. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - _Tamam_ öğesine tıklayın +3. DHCP İstemcisinde Eş DNS'i devre dışı bırakın: + - _IP_ → _DHCP İstemcisi_ öğesine gidin + - İnternet bağlantınız için kullanılan istemciye çift tıklayın (genellikle WAN arayüzünde) + - _Eş DNS Kullan_ öğesinin işaretini kaldırın + - _Tamam_ öğesine tıklayın diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index 2f4cf65a2..afb8d8b0c 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -38,7 +38,7 @@ https-dns-proxy'yi yapılandırmak için _LuCI_ → _Hizmetler_ → _HTTPS DNS P ## DNS-over-TLS'yi yapılandırma -- **Komut satırı talimatları**. [Disable](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#disabling_dns_role) Dnsmasq DNS role or remove it completely optionally [replacing](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#replacing_dnsmasq_with_odhcpd_and_unbound) its DHCP role with odhcpd. +- **Komut satırı talimatları**. Dnsmasq DNS rolünü [devre dışı bırakın](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#disabling_dns_role) veya isteğe bağlı olarak DHCP rolünü odhcpd ile [değiştirerek](https://openwrt.org/docs/guide-user/base-system/dhcp_configuration#replacing_dnsmasq_with_odhcpd_and_unbound) tamamen kaldırın. ```# Install packages 1. opkg update diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 830f2fd2f..7556e17a1 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi yönlendiricilerin birçok avantajı vardır: Sürekli güçlü sinyal, ağ güvenliği, kararlı çalışma, akıllı yönetim, aynı zamanda kullanıcı yerel Wi-Fi ağına 64 cihaza kadar bağlanabilir. +Xiaomi yönlendiricilerin birçok avantajı vardır: istikrarlı, güçlü bir sinyal, ağ güvenliği, sağlam performans ve akıllı yönetim. Kullanıcılar yerel Wi-Fi ağına 64 cihaza kadar bağlanabilir. Ne yazık ki, şifrelenmiş DNS'i desteklemiyor, ancak bağlı IP aracılığıyla AdGuard DNS'i kurmak için harikadır. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index f1e3139d5..e922bbfe5 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS oran sınırlaması genellikle bir istemcinin (IP adresi) belirli bir süre AdGuard DNS _Takım_ veya _Kurumsal_ planına aboneyseniz, daha yüksek bir oran sınırlaması talep edebilirsiniz. Bunu yapmak için, aşağıdaki talimatları izleyin: 1. [DNS panosu] (https://adguard-dns.io/dashboard/) → _Hesap ayarları_ → _Oran sınırlaması_ öğesine gidin + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Oran sınırlaması](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Oran sınırlaması](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Talebiniz 1-3 iş günü içerisinde incelenecektir. Değişiklikler hakkında sizinle e-posta yoluyla iletişime geçeceğiz +3. Talebiniz 1–3 iş günü içerisinde incelenecektir. Değişiklikler hakkında sizinle e-posta yoluyla iletişime geçeceğiz diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/setting-up-filtering/blocklists.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/setting-up-filtering/blocklists.md index b44515ee3..a27dd010e 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/setting-up-filtering/blocklists.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/setting-up-filtering/blocklists.md @@ -7,7 +7,7 @@ sidebar_position: 1 Engel listeleri, AdGuard DNS'in gizliliğinizi tehlikeye atabilecek reklamları ve içerikleri filtrelemek için kullandığı metin biçimindeki kurallar kümesidir. Genel olarak bir filtre, benzer odak noktasına sahip kurallardan oluşur. Örneğin, site dilleri için kurallar (Almanca veya Rusça filtreleri gibi) veya kimlik avı sitelerine karşı koruma sağlayan kurallar (Phishing URL Blocklist gibi) olabilir. Bu kuralları bir grup olarak kolayca etkinleştirebilir veya devre dışı bırakabilirsiniz. -## Why they are useful +## Neden faydalıdırlar Engel listeleri, filtreleme kurallarının esnek bir şekilde özelleştirilmesi için tasarlanmıştır. Örneğin, belirli bir dil bölgesindeki reklam alan adlarını engellemek, izleme veya reklam alan adlarından kurtulmak isteyebilirsiniz. İstediğiniz engel listelerini seçin ve filtrelemeyi isteğinize göre özelleştirin. diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/solving-problems/icloud-private-relay.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/solving-problems/icloud-private-relay.md index 874fe2378..17dcb06e7 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/solving-problems/icloud-private-relay.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/solving-problems/icloud-private-relay.md @@ -25,7 +25,7 @@ Bu sorunu çözmek için cihazınızın ayarlarında AdGuard sitelerin IP adresi 1. `adguard-dns.io` adresine gidin - 1. Safari'de, **Görüntüle** → **Yeniden Yükle ve IP Adresini Göster** öğesini seçin + 1. Safari'de, **Görüntü** → **Yeniden Yükle ve IP Adresini Göster** öğesini seçin 1. `adguard.com` adresi için tekrarlayın diff --git a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/statistics-and-log/query-log.md b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/statistics-and-log/query-log.md index 97623c423..d28dd86d3 100644 --- a/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/statistics-and-log/query-log.md +++ b/i18n/tr/docusaurus-plugin-content-docs/current/private-dns/statistics-and-log/query-log.md @@ -5,7 +5,7 @@ sidebar_position: 5 ## Sorgu günlüğü nedir -Query log is a useful tool for working with AdGuard DNS. +Sorgu günlüğü, AdGuard DNS ile çalışmak için faydalı bir araçtır. Seçilen süre boyunca cihazlarınız tarafından yapılan tüm istekleri görüntülemenize ve istekleri duruma, türe, şirkete, cihaza, ülkeye göre sıralamanıza olanak tanır. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/vi/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/vi/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/vi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/vi/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_. diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/dns-client/configuration.md index 7a8ef38db..94121dbea 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ sidebar_position: 2 - `size`:DNS 结果缓存的最大值(人类可读的数据量格式)。 如果 `enabled` 为 `true`,该值必须大于零。 - **示例:** `128MB` + **Example:** `128MB` - `client_size`:指定每个已配置客户端地址或子网的 DNS 结果缓存的最大尺寸(人类可读的数据量格式)。 如果 `enabled` 为 `true`,该值必须大于零。 - **示例:** `4MB` + **Example:** `4MB` ### `server` {#dns-server} diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/general/dns-providers.md index 345245f7c..118b36c20 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ OpenDNS 服务器删除某些响应(包括带有 NODATA 的响应)中的 AUT | DNS-over-TLS | 提供商:`Surfnet` 主机名:`tls://dnsovertls.sinodun.com` IP 地址:`145.100.185.15` IPv6 地址:`2001:610:1:40ba:145:100:185:15` | [添加到 AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | 提供商:`Surfnet` 主机名:`tls://dnsovertls1.sinodun.com` IP 地址:`145.100.185.16` 和 IPv6:`2001:610:1:40ba:145:100:185:16` | [添加到 AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### 标准 + +| 协议 | 地址 | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### 其他采取「零日志」政策的 DNS 服务器。 | 协议 | 地址 | | @@ -391,12 +406,13 @@ OpenDNS 服务器删除某些响应(包括带有 NODATA 的响应)中的 AUT [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) 是一家拥有多年域名解析服务开发经验的隐私友好型 DNS 提供商,旨在为用户提供更快速、准确、稳定的递归解析服务。 -| 协议 | 地址 | | -| -------------- | --------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [添加到 AdGuard](adguard:add_dns_server?address=119.29.29.29&name=),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [添加到 AdGuard](adguard:add_dns_server?address=2402:4e00::&name=),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [添加到 AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [添加到 AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| 协议 | 地址 | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [添加到 AdGuard](adguard:add_dns_server?address=119.29.29.29&name=),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [添加到 AdGuard](adguard:add_dns_server?address=2402:4e00::&name=),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [添加到 AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [添加到 AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec 网络正在托管能够解析 OpenNIC(根域名系统) 和 I ### momou! DNS -[momou! DNS](https://dns.momou.ch/) 提供三级过滤的 DNS-over-HTTPS 和 TLS 加密协议的 DNS(DoT)解析器。 +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### 标准 @@ -1203,7 +1219,7 @@ Marbled Fennec 网络正在托管能够解析 OpenNIC(根域名系统) 和 I ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) 拦截超过十四万个广告、广告跟踪、恶意软件和钓鱼域名。 无日志记录,无 ECS,DNSSEC 验证,免费! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. 无日志记录,无 ECS,DNSSEC 验证,免费! #### 新加坡 DNS 服务器 @@ -1232,7 +1248,7 @@ Marbled Fennec 网络正在托管能够解析 OpenNIC(根域名系统) 和 I ### Seby DNS -[Seby DNS](https://dns.seby.io/) 是 Sebastian Schmidt 提供的一项注重隐私的 DNS 服务。 无日志记录,支持 DNSSEC 验证。 +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS 服务器 1 @@ -1244,7 +1260,7 @@ Marbled Fennec 网络正在托管能够解析 OpenNIC(根域名系统) 和 I ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) 是一个位于越南的 DNS 服务器,供个人和小规模使用。 它具有广告拦截、恶意软件/网络钓鱼保护、成人内容过滤和 DNSSEC 验证功能。 +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. 它具有广告拦截、恶意软件/网络钓鱼保护、成人内容过滤和 DNSSEC 验证功能。 | 协议 | 地址 | | | -------------- | --------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ Marbled Fennec 网络正在托管能够解析 OpenNIC(根域名系统) 和 I | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [添加到 AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS),[添加到 AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| 协议 | 地址 | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index a131a97a7..2304e1ac5 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,24 +1,22 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - -本指南将介绍如何为安全 DNS 创建自己的 DNS 戳。 安全 DNS 是一项通过加密 DNS 查询来增强互联网安全和隐私的服务。 这可以防止用户的查询被恶意行为者拦截或操纵。 +This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. -安全 DNS 通常使用 `tls://`、`https://` 或 `quic://` URL。 这对大多数用户来说已经足够,也是推荐的方式。 +Secure DNS usually uses `tls://`, `https://`, or `quic://` URLs. This is sufficient for most users and is the recommended way. -不过,如果需要额外的安全性,例如预解析服务器 IP 或通过散列进行证书标号,用户可以生成自己的 DNS 戳。 +However, if you need additional security, like pre-resolved server IPs and certificate pinning by hash, you may generate your own DNS stamp. ## DNS 戳简介 -DNS 戳是简短的字符串,包含连接到安全 DNS 服务器所需的全部信息。 DNS 戳简化设置安全 DNS 的过程,可使用户无需再手动输入这些数据。 +DNS stamps are short strings that contain all the information needed to connect to a secure DNS server. They simplify the process of setting up Secure DNS as the user does not need to manually enter all this data. -DNS 戳让用户自定义常规 URL 之外的安全 DNS 设置。 它们还允许用户指定硬编码的服务器地址,使用证书哈希等等。 这些功能使 DNS 戳成为配置安全 DNS 设置更强大、更通用的选择。 +DNS stamps allow you to customize Secure DNS settings beyond the usual URLs. In particular, they allow you to specify hard-coded server addresses, use certificate hashing, and so on. These features make DNS stamps a more robust and versatile option for configuring Secure DNS settings. ## 选择协议 -安全 DNS 的类型包括 `DNS-over-HTTPS (DoH)`、`DNS-over-QUIC (DoQ)`、`DNS-over-TLS (DoT)` 等。 具体协议的选择取决于您的使用环境。 +Types of Secure DNS include `DNS-over-HTTPS (DoH)`, `DNS-over-QUIC (DoQ)`, `DNS-over-TLS (DoT)`, and some others. Choosing one of these protocols depends on the context in which you'll be using them. ## 创建 DNS 戳 @@ -58,7 +56,7 @@ DNS 戳让用户自定义常规 URL 之外的安全 DNS 设置。 它们还允 ### 获取证书哈希 -要填写**服务器证书哈希值**字段,可以使用以下命令,将 ``、`` 和 `` 替换为您的 DNS 服务器的相应值: +To fill in the **Hashes of the server's certificate** field, you can use the following command, replacing ``, ``, and `` with the corresponding values for your DNS server: ```bash echo | openssl s_client -connect : -servername 2>/dev/null | openssl x509 -outform der | openssl asn1parse -inform der -strparse 4 -noout -out - | openssl dgst -sha256 @@ -66,17 +64,17 @@ echo | openssl s_client -connect : -servername 2 :::caution -哈希命令的结果可能随着服务器证书的更新而随时间变化。 所以,如果 DNS 戳突然停止工作,您可能需要重新计算证书的哈希值并生成一个新的 DNS 戳。 定期更新 DNS 戳有助于确保安全 DNS 服务的持续安全运行。 +The result of the hash command may change over time as the server's certificate is updated. Therefore, if your DNS stamp suddenly stops working, you may need to recalculate the hash of the certificate and generate a new stamp. Regularly updating your DNS stamp will help ensure the continued secure operation of your Secure DNS service. ::: ## 使用 DNS 戳 -现在您有自己的 DNS 戳,可以用来设置安全 DNS。 DNS 戳可以导入 AdGuard 和 AdGuard VPN,从而增强互联网隐私性和安全性。 +You now have your own DNS stamp that you can use to set up Secure DNS. This stamp can be entered into AdGuard and AdGuard VPN for enhanced internet privacy and security. ## 创建 DNS 戳示例 -让我们以使用 DoT 为 AdGuard DNS 创建 DNS 戳为例进行说明: +Let's go through an example of creating a stamp for AdGuard DNS using DoT: 1. 打开 [DNSCrypt 戳计算器](https://dnscrypt.info/stamps/)。 diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md index afa9a77e0..757d7b981 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/connect-devices.md @@ -18,8 +18,8 @@ toc_max_heading_level: 3 对于本机不支持加密 DNS 协议的设备,我们提供其他三种选择: - [AdGuard DNS 客户端](/dns-client/overview.md) -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) 如果用户在某些设备上想要限制 AdGuard DNS 的访问权限,请使用[带有身份验证的 DNS-over-HTTPS](/private-dns/connect-devices/other-options/doh-authentication.md)。 diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md index 6988ebc02..f9b23eb6a 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo-switch.md @@ -25,5 +25,5 @@ sidebar_position: 3 最好使用关联的 IP 地址(如果拥有团队版订阅,可以使用专用 IP 地址): -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md index 5f8eb30c0..244b87efa 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/nintendo.md @@ -32,5 +32,5 @@ sidebar_position: 2 最好使用关联的 IP 地址(如果拥有团队版订阅,可以使用专用 IP 地址): -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md index 962c647fb..ab34872df 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/playstation.md @@ -32,5 +32,5 @@ sidebar_position: 4 最好使用关联的 IP 地址(如果拥有团队版订阅,可以使用专用 IP 地址): -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md index ebbf9560a..addc0c5e4 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/steam.md @@ -25,5 +25,5 @@ sidebar_position: 5 最好使用关联的 IP 地址(如果拥有团队版订阅,可以使用专用 IP 地址): -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md index 20c34bf1f..bacb7785c 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/game-consoles/xbox-one.md @@ -25,5 +25,5 @@ sidebar_position: 6 最好使用关联的 IP 地址(如果拥有团队版订阅,可以使用专用 IP 地址): -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 669821848..db7e08d09 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ AdGuard 应用程序让用户使用加密的 DNS,在 Android 设备上使用 A ![DNS 服务器 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. 向下滚动并点击「_添加自定义 DNS 服务器_」。 ![添加 DNS 服务器 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. 复制以下 DNS 地址之一,并将其粘贴到应用程序的「_DNS 服务器地址_」字段中。 如果不确定使用哪个地址,请选择「DNS-over-HTTPS」。 +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. 如果不确定使用哪个地址,请选择「DNS-over-HTTPS」。 ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![自定义 DNS 服务器 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. 点击「_保存并选择_」。 diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md index 4ab0936ba..2466a9277 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/ios.md @@ -78,5 +78,5 @@ iOS 设备的描述文件,也被 Apple 称为「配置描述文件」,是一 如果您不希望通过额外的软件来配置 DNS,可以选择无加密的 DNS。 有两种选择:使用链接的 IP 或专用 IP 地址。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 0d93d87dc..f4fd8b741 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -42,8 +42,8 @@ AdGuard DNS 客户端是一个跨平台的控制台工具,让用户使用加 9. 关闭「_自动模式_」。 10. 点击「_应用_」。 11. 连接您的 IP 地址(如果用户有团队订阅,可以使用专用 IP 地址): - - [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## 在 Debian 上手动配置(需要已链接 IP 地址或专用 IP 地址) @@ -61,8 +61,8 @@ AdGuard DNS 客户端是一个跨平台的控制台工具,让用户使用加 10. 按下回车键。 11. 关闭终端。 12. 连接您的 IP 地址(如果用户有团队订阅,可以使用专用 IP 地址): - - [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) - - [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) ## 使用 dnsmasq @@ -102,9 +102,31 @@ AdGuard DNS 客户端是一个跨平台的控制台工具,让用户使用加 ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +完成! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## 使用无加密的 DNS 如果您选择不使用额外的软件进行 DNS 配置,可以选择无加密 DNS。 您有两种选择:使用关联的 IP 或专用 IP: -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md index c23e532cd..430a685c1 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/macos.md @@ -77,5 +77,5 @@ macOS 设备的描述文件,也被 Apple 称为「配置描述文件」,是 如果您选择不使用额外的软件进行 DNS 配置,可以选择无加密 DNS。 您有两种选择:使用关联的 IP 或专用 IP。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md index d1f05603c..5904821d6 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/windows.md @@ -64,5 +64,5 @@ AdGuard DNS 客户端是一个多功能的跨平台控制台工具,让用户 如果您选择不使用额外的软件进行 DNS 配置,可以选择无加密 DNS。 您有两种选择:使用关联的 IP 或专用 IP。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index be5270c82..507cb898d 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ sidebar_position: 2 ## 为什么要用专用 IP? -不幸的是,所连接设备的技术规格并不总是让用户设置加密的私人 AdGuard DNS 服务器。 在这种情况下,用户要使用标准的无加密的 DNS。 有两种方式可以设置 AdGuard DNS:[使用关联 IP 地址](/private-dns/connect-devices/other-options/linked-ip.md)和专用 IP 地址。 +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. 在这种情况下,用户要使用标准的无加密的 DNS。 有两种方式可以设置 AdGuard DNS:[使用关联 IP 地址](/private-dns/connect-devices/other-options/linked-ip.md)和专用 IP 地址。 专用 IP 地址通常是更稳定的选择。 关联 IP 有一些限制,例如只允许住宅地址,提供商可以更改 IP,您需要重新关联 IP 地址。 通过专用 IP,用户将获得一个专属于您的 IP 地址,所有请求都将计入设备。 diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 7452e7f95..b900e03b1 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -13,9 +13,11 @@ sidebar_position: 3 ::: -有时候,住宅 IP 地址可能已被设置,如果用户尝试连接到它,AdGuard DNS 将阻止连接。 -![关联 IPv4 地址 \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) -如果发生这种情况,请联系 [support@adguard-dns.io](mailto:support@adguard-dns.io) 支持,他们将帮助您完成正确的配置设置。 +Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + +![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + +If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## 如何设置关联 IP @@ -25,6 +27,7 @@ sidebar_position: 3 2. 添加新设备或打开已连接设备的设置。 3. 转到「_使用 DNS 服务器地址_」。 4. 打开「_无加密的 DNS 服务器地址_」连接关联的 IP。 + ![关联 IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## 动态 DNS:为什么有用 @@ -44,14 +47,21 @@ sidebar_position: 3 ## 动态 DNS:如何设置 1. 首先,需要检查您的路由器设置是否支持 DDNS: + - 转到「_路由器设置_」→「_网络_」。 - 找到 DDNS 或「_动态 DNS_」部分。 - - 请验证设置确实受支持。 _以下是一个示例。 这可能会因用户的路由器而异_ - ![DDNS 支持 \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - 请验证设置确实受支持。 _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. 使用像 [DynDNS](https://dyn.com/remote-access/)、[NO-IP](https://www.noip.com/) 或您喜欢的任何其他 DNS 提供商注册您的域名。 + 3. 在路由器设置中输入域名并同步配置。 + 4. 前往关联 IP 设置以连接地址,然后导航到「_高级设置_」并点击「_配置 DDNS_」。 + 5. 输入您之前注册的域名,然后点击「_配置 DDNS_」。 + ![配置 DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) 全部完成,DDNS 设置成功! diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 0125dca6e..4b0a3c148 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ sidebar_position: 3 2. 输入管理员用户名(通常是「admin」)和路由器密码。 3. 在「_高级设置_」侧边栏中,转到「WAN」部分。 4. 在「_WAN DNS 设置_」部分中,将「_自动连接到 DNS 服务器_」设置为「_否_」。 -5. 将「_转发本地查询_」、「_启用 DNS 重新绑定_」和「_启用 DNSSEC_」设置为「_否_」。 +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. 将「DNS 隐私协议」更改为「DNS-over-TLS」。 7. 确保「_DNS-over-TLS 描述文件_」设置为「_严格_」。 8. 向下滚动到「_DNS-over-TLS 服务器列表_」部分。 在「_地址_」字段中,输入以下地址之一: @@ -32,11 +32,10 @@ sidebar_position: 3 3. 打开「_高级设置_」或「_高级_」。 4. 选择「_WAN_」或「_互联网_」。 5. 打开「_DNS 设置_」或「_DNS_」。 -6. 选择「_手动 DNS_」。 选择「_使用指定 DNS 服务器_」或「_手动指定 DNS 服务器_」,然后输入以下 DNS 服务器地址: +6. Choose _Manual Setting_. 选择「_使用指定 DNS 服务器_」或「_手动指定 DNS 服务器_」,然后输入以下 DNS 服务器地址: - IPv4 地址:`94.140.14.49` 和 `94.140.14.59` - IPv6 地址:`2a10:50c0:0:0:0:0:ded:ff` 和 `2a10:50c0:0:0:0:0:dad:ff` 7. 请保存设置。 8. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 - -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md index 6ffcfcc79..968ab25bb 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/fritzbox.md @@ -29,5 +29,5 @@ FRITZ!Box 为所有设备提供最大的灵活性,能够同时使用 2.4 GHz 6. 请保存设置。 7. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 9f5e2b179..a649bca5f 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic 路由器以稳定性和灵活的配置而闻名,并且 Keenetic 路 5. 在「_实用程序和服务_」中,选择并安装 DNS-over-HTTPS 代理。 6. 前往「_菜单_」→「_网络规则_」→「_互联网安全_」。 7. 前往 DNS-over-HTTPS 服务器并点击「_添加 DNS-over-HTTPS 服务器_」。 -8. 在 `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` 字段中输入私有 AdGuard DNS 服务器的 URL。 +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. 点击「_保存_」。 ## 配置 DNS-over-TLS @@ -26,7 +26,7 @@ Keenetic 路由器以稳定性和灵活的配置而闻名,并且 Keenetic 路 5. 在「_实用程序和服务_」中,选择并安装 DNS-over-HTTPS 代理。 6. 前往「_菜单_」→「_网络规则_」→「_互联网安全_」。 7. 前往 DNS-over-HTTPS 服务器并点击「_添加 DNS-over-HTTPS 服务器_」。 -8. 在 `tls://*********.d.adguard-dns.com` 字段中输入私有 AdGuard DNS 服务器的 URL。 +8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. 点击「_保存_」。 ## 使用路由器管理面板 @@ -44,5 +44,5 @@ Keenetic 路由器以稳定性和灵活的配置而闻名,并且 Keenetic 路 7. 请保存设置。 8. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index 68ebd36f1..9b6a94af1 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik 路由器使用开放源代码 RouterOS 操作系统,该系统为家庭和小型办公室网络提供路由、防火墙和无线网络服务。 +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## 配置 DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik 路由器使用开放源代码 RouterOS 操作系统,该系统为家 - `94.140.14.49` - `94.140.14.59` - 将「_允许远程请求_」设置为「_是_」(这对 DNS-over-HTTPS 的功能至关重要)。 - - 在「_使用 DoH 服务器_」字段中,输入私有 AdGuard DNS 服务器的 URL:`https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - 点击「_确定_」。 4. 创建「静态 DNS 记录」: - 在「_DNS 设置_」中,点击「_静态_」。 - 点击「_添加新的_」。 - - 将「_名称_」设置为 d.adguard-dns.com - - 将「_类型_」设置为 A。 + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - 将「_地址_」设置为 `94.140.14.49` - - 将「_TTL_」设置为 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - 请重复该过程以创建相同的条目,但将「_地址_」设置为 `94.140.14.59` 5. 禁用 DHCP 客户端的 Peer DNS: - 转到「_IP 地址_」→「_DHCP 协议客户端_」。 - 双击用于互联网连接的客户端(通常在 WAN 接口上)。 - 取消勾选「_使用 Peer DNS_」 - 点击「_确定_」。 -6. 连接 IP 地址。 -7. 测试和验证: - - 可能需要重启 MikroTik 路由器,以使更改生效。 - - 请清除浏览器的 DNS 缓存。 用户可以使用类似 [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) 的工具来检查 DNS 请求是否已通过 AdGuard 进行路由。 +6. Test and verify: + - You might need to reboot your MikroTik router for all changes to take effect + - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## 使用路由器管理面板 +## My router does not support DNS-over-HTTPS -如果您的 Keenetic 路由器不支持 DNS-over-HTTPS 或 DNS-over-TLS 配置,请使用以下指示说明: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. 打开路由器管理面板。 可以通过 `192.168.1.1` 或 `192.168.0.1` 访问。 -2. 输入管理员用户名(通常是「admin」)和路由器密码。 -3. 打开「_Webfig_」→「_IP 地址_」→「_DNS_」。 -4. 选择「_服务器_」并输入以下 DNS 服务器地址之一: - - IPv4 地址:`94.140.14.49` 和 `94.140.14.59` - - IPv6 地址:`2a10:50c0:0:0:0:0:ded:ff` 和 `2a10:50c0:0:0:0:0:dad:ff` -5. 请保存设置。 -6. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 - -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +1. 请转到 MikroTik 路由器设置: + - 打开浏览器并转到路由器的 IP 地址(通常为 `192.168.88.1`)。 + - 或者,也可以使用 Winbox 连接到 MikroTik 路由器。 + - 输入您的管理员用户名和密码。 +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4 地址:`94.140.14.49` 和 `94.140.14.59` + - IPv6 地址:`2a10:50c0:0:0:0:0:ded:ff` 和 `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. 禁用 DHCP 客户端的 Peer DNS: + - Go to _IP_ → _DHCP Client_ + - 双击用于互联网连接的客户端(通常在 WAN 接口上)。 + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md index 0edb849df..860881bb5 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/openwrt.md @@ -91,5 +91,5 @@ OpenWRT 路由器使用基于 Linux 的开源操作系统,提供依据用户 8. 请保存设置。 9. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md index ae1c3801d..0b8e72a6f 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/opnsense.md @@ -21,5 +21,5 @@ OPNSense 固件通常用于配置无线接入点、DHCP 服务器、DNS 服务 8. 或者,用户可以启用 DNSSEC 以增强安全性。 9. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md index c1d9ae564..b8eed9166 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/synology-nas.md @@ -20,5 +20,5 @@ Synology NAS 路由器非常易于使用,可以组合成一个 Mesh 网络即 7. 请保存设置。 8. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) - [关联 IP](private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md index 988818e28..efd7580c7 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/universal.md @@ -28,5 +28,5 @@ sidebar_position: 2 5. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index 1e7885f35..f7c9e431a 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: 小米 sidebar_position: 11 --- -小米路由器有很多优势:信号稳定强大、网络安全、运行稳定、智能管理,同时用户可以将多达 64 台设备连接到本地 Wi-Fi 网络。 +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. 有一个缺点,小米路由器不支持加密 DNS,但非常适合通过绑定 IP 地址设置 AdGuard DNS。 @@ -21,5 +21,5 @@ sidebar_position: 11 6. 请保存设置。 7. 关联 IP 地址(如果您有团队版订阅,也可以关联您的专用 IP 地址)。 -- [专用 IP](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [关联 IP](/private-dns/connect-devices/other-options/linked-ip.md) +- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) +- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 06d2287bb..4ffc1d864 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS 速率限制通常通过设置客户端(IP 地址)在特定周期内可 如果您订阅了 AdGuard DNS「_团队_」或「_企业版_」,可以申请增加请求数量。 请按照以下说明进行操作: 1. 进入 [DNS 仪表板](https://adguard-dns.io/dashboard/) →「_账号设置_」→「_请求数量限制_」 + 2. 点击「_提升数量上限_」联系我们的客户支持团队并申请提高限额。 请提供 CIDR 和想要的数量限制。 -![请求数量限制](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. 我们将在 1-3 个工作日内审查您的申请。 我们将通过电子邮箱与您联系。 +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 6d571babd..d54c75847 100644 --- a/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/zh-CN/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: 服务器和设置 sidebar_position: 1 --- -## 什么是服务器及其使用方法 +## What is a server and how to use it 设置私人 AdGuard DNS 时,您将遇到「服务器」这个词。 diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/dns-client/configuration.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/dns-client/configuration.md index a1aaaee99..14a49b3d2 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/dns-client/configuration.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/dns-client/configuration.md @@ -28,11 +28,11 @@ The `cache` object configures caching the results of querying DNS. It has the fo - `size`: The maximum size of the DNS result cache as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `128 MB` + **Example:** `128MB` - `client_size`: The maximum size of the DNS result cache for each configured client’s address or subnetwork as human-readable data size. It must be greater than zero if `enabled` is `true`. - **Example:** `4 MB` + **Example:** `4MB` ### `server` {#dns-server} @@ -64,7 +64,7 @@ The `bootstrap` object configures the resolution of [upstream](#dns-upstream) se - `timeout`: The timeout for bootstrap DNS requests as a human-readable duration. - **Example:** `2 s` + **Example:** `2s` ### `upstream` {#dns-upstream} diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/general/dns-providers.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/general/dns-providers.md index 9d27a4c03..22b3c9740 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/general/dns-providers.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/general/dns-providers.md @@ -351,6 +351,21 @@ A collaborative open project to promote, implement, and deploy [DNS Privacy](htt | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls.sinodun.com` IP: `145.100.185.15` and IPv6: `2001:610:1:40ba:145:100:185:15` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls.sinodun.com&name=dnsovertls.sinodun.com) | | DNS-over-TLS | Provider: `Surfnet` Hostname: `tls://dnsovertls1.sinodun.com` IP: `145.100.185.16` and IPv6: `2001:610:1:40ba:145:100:185:16` | [Add to AdGuard](adguard:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dnsovertls1.sinodun.com&name=dnsovertls1.sinodun.com) | +### FutureDNS + +[FutureDNS](https://futuredns.eu.org) is a privacy-focused DNS service that prioritizes user security and anonymity. It supports both standard DNS and encrypted protocols while maintaining a strict no-logging policy. + +#### Standard + +| Protocol | Address | | +| -------------------- | -------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `162.55.52.228` | [Add to AdGuard](adguard:add_dns_server?address=162.55.52.228&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=162.55.52.228&name=) | +| DNS, IPv6 | `2a01:4f8:1c1c:adbc::` | [Add to AdGuard](adguard:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2a01:4f8:1c1c:adbc::&name=) | +| DNS-over-HTTPS, IPv4 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-HTTPS, IPv6 | `https://dns.de.futuredns.eu.org/dns-query/` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.de.futuredns.eu.org/dns-query/&name=futuredns) | +| DNS-over-TLS | `tls://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dns.de.futuredns.eu.org&name=FutureDNSDoT) | +| DNS-over-QUIC | `quic://dns.de.futuredns.eu.org` | [Add to AdGuard](adguard:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://dns.de.futuredns.eu.org&name=FutureDNSDoQ) | + #### Other DNS servers with no-logging policy | Protocol | Address | | @@ -391,12 +406,13 @@ These servers use some logging, self-signed certs or no support for strict mode. [DNSPod Public DNS+](https://www.dnspod.cn/products/publicdns) is a privacy-friendly DNS provider with years of experience in domain name resolution services development, it aims to provide users more rapid, accurate and stable recursive resolution service. -| Protocol | Address | | -| -------------- | --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | -| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | -| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | -| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | +| Protocol | Address | | +| -------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `119.29.29.29` | [Add to AdGuard](adguard:add_dns_server?address=119.29.29.29&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=119.29.29.29&name=) | +| DNS, IPv6 | `2402:4e00::` | [Add to AdGuard](adguard:add_dns_server?address=2402:4e00::&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2402:4e00::&name=) | +| DNS-over-HTTPS | `https://dns.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://dns.pub/dns-query&name=dns.pub) | +| DNS-over-HTTPS | `https://sm2.doh.pub/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.doh.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://sm2.doh.pub/dns-query&name=sm2.dns.pub) | +| DNS-over-TLS | `tls://dot.pub` | [Add to AdGuard](adguard:add_dns_server?address=tls://dot.pub&name=dot.pub), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=tls://dot.pub&name=dot.pub) | ### DNSWatchGO @@ -1144,7 +1160,7 @@ Marbled Fennec Networks is hosting DNS resolvers that are capable of resolving b ### momou! DNS -[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering +[momou! DNS](https://dns.momou.ch/) provides DoH & DoT resolvers with three levels of filtering #### Standard @@ -1203,7 +1219,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Privacy-First DNS -[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware and phishing domains. No logging, no ECS, DNSSEC validation, free! +[Privacy-First DNS](https://tiarap.org/) blocks over 140K ads, ad-tracking, malware, and phishing domains. No logging, no ECS, DNSSEC validation, free! #### Singapore DNS Server @@ -1232,7 +1248,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### Seby DNS -[Seby DNS](https://dns.seby.io/) is a privacy focused DNS service provided by Sebastian Schmidt. No Logging, DNSSEC validation. +[Seby DNS](https://dns.seby.io/) is a privacy-focused DNS service provided by Sebastian Schmidt. No logging, DNSSEC validation. #### DNS Server 1 @@ -1244,7 +1260,7 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. ### BlackMagicc DNS -[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS Server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. +[BlackMagicc DNS](https://bento.me/blackmagicc) is a personal DNS server located in Vietnam and intended for personal and small-scale use. It features ad blocking, malware/phishing protection, adult content filter, and DNSSEC validation. | Protocol | Address | | | -------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | @@ -1252,3 +1268,11 @@ These servers provide no ad blocking, keep no logs, and have DNSSEC enabled. | DNS, IPv6 | `2001:df4:4c0:1::399:1` | [Add to AdGuard](adguard:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=2001:df4:4c0:1::399:1&name=BlackMagiccDNS) | | DNS-over-QUIC | `quic://rx.techomespace.com` | [Add to AdGuard](adguard:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=quic://rx.techomespace.com&name=BlackMagiccDNS) | | DNS-over-HTTPS | `https://rx.techomespace.com/dns-query` | [Add to AdGuard](adguard:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=https://rx.techomespace.com/dns-query&name=BlackMagiccDNS) | + +### LaxrFar DNS + +[LaxrFar DNS](https://laxrfar.xyz/) is a DNS that is focused on ad blocking, privacy, malware protection and has a strict no-logging policy. + +| Protocol | Address | | +| --------- | --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| DNS, IPv4 | `23.176.184.32` | [Add to AdGuard](adguard:add_dns_server?address=23.176.184.32&name=), [Add to AdGuard VPN](adguardvpn:add_dns_server?address=23.176.184.32&name=) | diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md index 45174fa3d..35f01fc95 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/miscellaneous/create-dns-stamp.md @@ -1,7 +1,5 @@ - - - -title: How to create your own DNS stamp for Secure DNS - -sidebar_position: 4 +title: How to create your own DNS stamp for Secure DNS sidebar_position: 4 - - - This guide will show you how to create your own DNS stamp for Secure DNS. Secure DNS is a service that enhances your internet security and privacy by encrypting your DNS queries. This prevents your queries from being intercepted or manipulated by malicious actors. diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md index 976861f0e..db9abf1e8 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/android.md @@ -49,7 +49,7 @@ Not all VPN services support encrypted DNS. However, our VPN does, so if you nee ![DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step5.png) 6. Scroll down and tap _Add a custom DNS server_. ![Add a DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step6.png) -7. Copy one of the following DNS addresses and paste it into the _DNS servers adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. +7. Copy one of the following DNS addresses and paste it into the _DNS server adresses_ field in the app. If you are not sure which one to use, select DNS-over-HTTPS. ![DoH \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_1.png) ![Custom DNS server \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/android_vpn/android_step7_2.png) 8. Tap _Save and select_. diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md index 84da1c08e..56fdf24af 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/mobile-and-desktop/linux.md @@ -102,6 +102,28 @@ If you see a notification that you are not connected to AdGuard DNS, most likely ::: +## Use EDNS (Extended DNS) + +EDNS extends the DNS protocol, enabling larger UDP packets to carry additional data. In AdGuard DNS, it allows passing DeviceID in plain DNS using an extra parameter. + +DeviceID, an eight-digit hexadecimal identifier (e.g., `1a2b3c4d`), helps link DNS requests to specific devices. For encrypted DNS, this ID is part of the domain (e.g., `1a2b3c4d.d.adguard-dns.com`). For unencrypted DNS, EDNS is required to transfer this identifier. + +AdGuard DNS uses EDNS to retrieve DeviceID by looking for option number `65074`. If such an option exists, it will read DeviceID from there. For this, you can use the `dig` command in the terminal: + +```sh +dig @94.140.14.49 'www.example.com' A IN +ednsopt=65074:3031323334353637 +``` + +Here, `65074` is the option ID, and `3031323334353637` is its value in hex format (DeviceID: `01234567`). + +All done! DeviceID should be displayed. + +:::note + +The `dig` command is merely an example, you can use any DNS software with an ability to add EDNS options to perform this action. + +::: + ## Use plain DNS If you prefer not to use extra software for DNS configuration, you can opt for unencrypted DNS. You have two choices: using linked IPs or dedicated IPs: diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md index 3c5d33eff..5ca8f3872 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/dedicated-ip.md @@ -11,7 +11,7 @@ If you have a Team or Enterprise subscription, you'll receive several personal d ## Why do you need a dedicated IP? -Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. +Unfortunately, the technical specifications of the connected device may not always allow you to set up an encrypted Private AdGuard DNS server. In this case, you will have to use standard unencrypted DNS. There are two ways to set up AdGuard DNS: [using linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) and using dedicated IPs. Dedicated IPs are generally a more stable option. Linked IP has some limitations, such as only residential addresses are allowed, your provider can change the IP, and you'll need to relink the IP address. With dedicated IPs, you get an IP address that is exclusively yours, and all requests will be counted for your device. diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md index 77755bd94..dbf7ef47d 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/other-options/linked-ip.md @@ -14,7 +14,9 @@ A **residential IP address** is assigned to a device connected to a residential ::: Sometimes, a residential IP address may already be in use, and if you try to connect to it, AdGuard DNS will prevent the connection. + ![Linked IPv4 address \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked.png) + If that happens, please reach out to support at [support@adguard-dns.io](mailto:support@adguard-dns.io), and they’ll assist you with the right configuration settings. ## How to set up linked IP @@ -25,6 +27,7 @@ The following instructions explain how to connect to the device via **linking IP 2. Add a new device or open the settings of a previously connected device. 3. Go to _Use DNS server addresses_. 4. Open _Plain DNS server addresses_ and connect the linked IP. + ![Linked IP \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/linked_step4.png) ## Dynamic DNS: Why it is useful @@ -44,14 +47,21 @@ This way, you won’t have to manually update the associated IP address each tim ## Dynamic DNS: How to set it up 1. First, you need to check if DDNS is supported by your router settings: + - Go to _Router settings_ → _Network_ - Locate the DDNS or the _Dynamic DNS_ section - - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like. It may vary depending on your router_ - ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + - Navigate to it and verify that the settings are indeed supported. _This is just an example of what it may look like, the settings may vary depending on your router_ + + ![DDNS supported \*mobile\_border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dynamic_dns.png) + 2. Register your domain with a popular service like [DynDNS](https://dyn.com/remote-access/), [NO-IP](https://www.noip.com/), or any other DDNS provider you prefer. + 3. Enter the domain in your router settings and sync the configurations. + 4. Go to the Linked IP settings to connect the address, then navigate to _Advanced Settings_ and click _Configure DDNS_. + 5. Input the domain you registered earlier and click _Configure DDNS_. + ![Configure DDNS \*border](https://cdn.adtidy.org/content/kb/dns/private/new_dns/connect/dns_supported.png) All done, you've successfully set up DDNS! diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md index 810269254..58bec6b70 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/asus.md @@ -15,7 +15,7 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 2. Enter the administrator username (usually, it’s admin) and router password. 3. In the _Advanced Settings_ sidebar, navigate to the WAN section. 4. In the _WAN DNS Settings_ section, set _Connect to DNS Server automatically_ to _No_. -5. Set _Forward local queries_, _Enable DNS Rebind_, and _Enable DNSSEC_ to _No_. +5. Set _Forward local queries_, _Enable DNS Rebind protection_, and _Enable DNSSEC suppport_ to _No_. 6. Change DNS Privacy Protocol to DNS-over-TLS (DoT). 7. Make sure the _DNS-over-TLS Profile_ is set to _Strict_. 8. Scroll down to the _DNS-over-TLS Servers List_ section. In the _Address_ field, enter one of the addresses below: @@ -32,11 +32,10 @@ If necessary: Configure DNS-over-TLS on ASUS, install the [ASUS Merlin firmware] 3. Open _Advanced Settings_ or _Advanced_. 4. Select _WAN_ or _Internet_. 5. Open _DNS Settings_ or _DNS_. -6. Choose _Manual DNS_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: +6. Choose _Manual Setting_. Select _Use These DNS Servers_ or _Specify DNS Server Manually_ and enter the following DNS server addresses: - IPv4: `94.140.14.49` and `94.140.14.59` - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` 7. Save the settings. 8. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) + - [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) + - [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md index 5139d1f0a..dac9a5329 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/keenetic.md @@ -14,7 +14,7 @@ Keenetic routers are known for their stability and flexible configurations, and 5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. 7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. -8. Enter the URL of the private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. +8. Enter the URL of the Private AdGuard DNS server in the `https://d.adguard-dns.com/dns-query/{Your_Device_ID}` field. 9. Click _Save_. ## Configure DNS-over-TLS @@ -23,9 +23,9 @@ Keenetic routers are known for their stability and flexible configurations, and 2. Press the menu button at the bottom of the screen and select _Management_. 3. Open _System settings_. 4. Press _Component options_ → _System component options_. -5. In _Utilities and services_, select DNS-over-HTTPS proxy and install it. +5. In _Utilities and services_, select DNS-over-TLS proxy and install it. 6. Head to _Menu_ → _Network rules_ → _Internet safety_. -7. Navigate to DNS-over-HTTPS servers and click _Add DNS-over-HTTPS server_. +7. Navigate to DNS-over-TLS servers and click _Add DNS-over-TLS server_. 8. Enter the URL of the private AdGuard DNS server in the `tls://*********.d.adguard-dns.com` field. 9. Click _Save_. diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md index cfb61f713..10949731e 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/mikrotik.md @@ -3,7 +3,7 @@ title: MikroTik sidebar_position: 6 --- -MikroTik routers use the open source RouterOS operating system, which provides routing, wireless networking and firewall services for home and small office networks. +MikroTik routers use the open-source RouterOS operating system, which provides routing, wireless networking, and firewall services for home and small office networks. ## Configure DNS-over-HTTPS @@ -23,38 +23,42 @@ MikroTik routers use the open source RouterOS operating system, which provides r - `94.140.14.49` - `94.140.14.59` - Set _Allow Remote Requests_ to _Yes_ (this is crucial for DoH to function) - - In the _Use DoH server_ field, enter the URL of the private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` + - In the _Use DoH server_ field, enter the URL of the Private AdGuard DNS server: `https://d.adguard-dns.com/dns-query/*******` - Click _OK_ 4. Create Static DNS Records: - In the _DNS Settings_, click _Static_ - Click _Add New_ - - Set _Name_ to d.adguard-dns.com - - Set _Type_ to A + - Set _Name_ to `d.adguard-dns.com` + - Set _Type_ to `A` - Set _Address_ to `94.140.14.49` - - Set _TTL_ to 1d 00:00:00 + - Set _TTL_ to `1d 00:00:00` - Repeat the process to create an identical entry, but with _Address_ set to `94.140.14.59` 5. Disable Peer DNS on DHCP Client: - Go to _IP_ → _DHCP Client_ - Double-click the client used for your Internet connection (usually on the WAN interface) - Uncheck _Use Peer DNS_ - Click _OK_ -6. Link your IP. -7. Test and verify: +6. Test and verify: - You might need to reboot your MikroTik router for all changes to take effect - Clear your browser's DNS cache. You can use a tool like [https://www.dnsleaktest.com](https://www.dnsleaktest.com/) to check if your DNS requests are now routed through AdGuard -## Use your router admin panel +## My router does not support DNS-over-HTTPS -Use these instructions if your Keenetic router does not support DNS-over-HTTPS or DNS-over-TLS configuration: +Use these instructions if your MikroTik router does not support DNS-over-HTTPS configuration: -1. Open the router admin panel. It can be accessed at `192.168.1.1` or `192.168.0.1`. -2. Enter the administrator username (usually, it’s admin) and router password. -3. Open _Webfig_ → _IP_ → _DNS_. -4. Select _Servers_ and enter one of the following DNS server addresses. - - IPv4: `94.140.14.49` and `94.140.14.59` - - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` -5. Save the settings. -6. Link your IP (or your dedicated IP if you have a Team subscription). - -- [Dedicated IPs](/private-dns/connect-devices/other-options/dedicated-ip.md) -- [Linked IPs](/private-dns/connect-devices/other-options/linked-ip.md) +1. Access your MikroTik router: + - Open your web browser and go to your router's IP address (usually `192.168.88.1`) + - Alternatively, you can use Winbox to connect to your MikroTik router + - Enter your administrator username and password +2. Configure Plain DNS: + - Go to _IP_ → _DNS_ + - In the _Servers_ section, add the following AdGuard DNS servers: + - IPv4: `94.140.14.49` and `94.140.14.59` + - IPv6: `2a10:50c0:0:0:0:0:ded:ff` and `2a10:50c0:0:0:0:0:dad:ff` + - Dedicated IPv6: Private AdGuard DNS supports dedicated IPv6 addresses. To find them, open the Dashboard, click _Settings_ next to your device → _Plain DNS server addresses_ → _Dedicated IPv6 addresses_. + - Click _OK_ +3. Disable Peer DNS on DHCP Client: + - Go to _IP_ → _DHCP Client_ + - Double-click the client used for your Internet connection (usually on the WAN interface) + - Uncheck _Use Peer DNS_ + - Click _OK_ diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md index e9ffed727..e3371b32e 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/connect-devices/routers/xiaomi.md @@ -3,7 +3,7 @@ title: Xiaomi sidebar_position: 11 --- -Xiaomi routers have a lot of advantages: Steady strong signal, network security, stable operation, intelligent management, at the same time, the user can connect up to 64 devices to the local Wi-Fi network. +Xiaomi routers have many advantages: a stable, strong signal, network security, robust performance, and smart management. Users can connect up to 64 devices to a local Wi-Fi network. Unfortunately, it doesn't support encrypted DNS, but it's great for setting up AdGuard DNS via linked IP. diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md index 3a1474a2b..50278fc82 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/rate-limit.md @@ -16,8 +16,9 @@ DNS rate-limiting typically works by setting thresholds on the number of request If you are subscribed to AdGuard DNS _Team_ or _Enterprise_ plan, you can request a higher rate limit. To do so, please follow the instructions below: 1. Go to [DNS dashboard](https://adguard-dns.io/dashboard/) → _Account settings_ → _Rate limit_ + 2. Tap _request a limit increase_ to contact our support team and apply for the rate limit increase. You will need to provide your CIDR and the limit you want to have -![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) + ![Rate limit](https://cdn.adtidy.org/content/kb/dns/private/rate_limit.png) -1. Your request will be reviewed within 1-3 working days. We will contact you about the changes by email +3. Your request will be reviewed within 1–3 working days. We will contact you about the changes by email diff --git a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md index 44625e929..b2fd9e41c 100644 --- a/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md +++ b/i18n/zh-TW/docusaurus-plugin-content-docs/current/private-dns/server-and-settings/server-and-settings.md @@ -3,7 +3,7 @@ title: Server and settings sidebar_position: 1 --- -## What is server and how to use it +## What is a server and how to use it When you set up Private AdGuard DNS, you'll encounter the term _servers_.