====== PFSense - DNS - Custom WAN DNS Servers (Secure) (Forced) ======
Navigate to **System -> General Setup**.
In **DNS Server Settings**:
* DNS Server: **9.9.9.9** / DNS Hostname: **dns.quad9.net** (Primary DNS)
* DNS Server: **149.112.112.112** / DNS Hostname: **dns.quad9.net** (Secondary DNS) (optional)
**NOTE:** A suggestion is to not add a Secondary DNS.
* Doing so, will make it harder to diagnose DNS issues and security later.
* The performance increase is negligible.
* DNS Server Override: **Not checked**.
Navigate to **Services -> DNS Resolver -> General Settings**.
In **General DNS Resolver Options**:
* Network Interfaces: **All**.
* **ALL** is easier to configure, but on a high load system you might want to specify these.
* Outgoing Network Interfaces: **WAN**.
* Strict Outgoing Network Interface Binding: **Checked**.
* DNSSEC: **Not checked**.
* Quad9 does all of this upstream so this is not needed here as well.
* DNSSEC needs to be turned off because it just causes extra traffic.
* It is suggested to check this by running a test with DNSSEC turned off in pfSense.
* Enable Forwarding Mode: **Checked**.
* DNS Resolver uses unbound and the old way of doing things was with DNS Forwarder powered by dnsmasq which could only forward DNS requests.
* Controls whether unbound uses resolver mode (unchecked) or forwarding mode (checked). See [[https://docs.netgate.com/pfsense/en/latest/services/dns/resolver-modes.html|DNS Resolver Mode]] for an explanation of the modes.
* To utilize Quad9 blocking capabilities, the DNS Resolver needs to be put into forwarder mode.
* Use SSL/TLS for outgoing DNS Queries to Forwarding Servers: **Checked**.
----