diff --git a/DnsServerCore/www/index.html b/DnsServerCore/www/index.html index 458c5014..90239f07 100644 --- a/DnsServerCore/www/index.html +++ b/DnsServerCore/www/index.html @@ -652,21 +652,21 @@
Enable this option to accept DNS-over-HTTP requests for both wire and json response formats. It must be used with a TLS terminating reverse proxy like nginx and will work only on private networks.
Enable this option to accept DNS-over-TLS requests.
Enable this option to accept DNS-over-HTTPS requests for both wire and json response formats.
@@ -692,7 +692,7 @@

NOTE! These optional DNS server protocols are used to host these as a service. You do not need to enable these optional protocols to use them with Forwarders or Conditional Forwarder Zones.

To enable or disable these protocols, you will need to manually restart the main service. These optional protocols will be enabled only when a TLS certificate is configured.

-

For DNS-over-HTTP, use http://localhost:8053/dns-query with a TLS terminating reverse proxy like nginx. For DNS-over-TLS, use tls-certificate-domain:853 and for DNS-over-HTTPS use https://tls-certificate-domain/dns-query to configure supported DNS clients.

+

For DNS-over-HTTP, use http://localhost:8053/dns-query with a TLS terminating reverse proxy like nginx. For DNS-over-TLS, use tls-certificate-domain:853 and for DNS-over-HTTPS use https://tls-certificate-domain/dns-query to configure supported DNS clients.

Use the following openssl command to convert your TLS certificate that is in PEM format to PKCS #12 certificate (.pfx) format:

openssl pkcs12 -export -out "example.com.pfx" -inkey "private.key" -in "certificate.crt" -certfile "ca_bundle.crt"
@@ -846,7 +846,7 @@
-
DNS Server will use the data returned by the block list URLs to update the blocked zone automatically every 24 hours. The expected file format is standard hosts file format or plain text file containing list of domains to block.
+
DNS Server will use the data returned by the block list URLs to update the blocked zone automatically every 24 hours. The expected file format is standard hosts file format or plain text file containing list of domains to block.
Help: Blocking Internet Ads Using DNS Sinkhole
@@ -1178,7 +1178,9 @@
The TTL value of the DNS records updated for the above provided domain name.
+ +
@@ -1202,7 +1204,9 @@
The boot file name stored on the bootstrap TFTP server to be used by the clients.
+
+
@@ -1242,7 +1246,9 @@
The Network Time Protocol (NTP) server IP addresses to be used by the clients.
+
+
@@ -1262,6 +1268,25 @@
+
+
+ +
+ + + + + + + + + +
Vendor Class IdentifierVendor Specific Information
+
+
The vendor specific information option (43) to be sent to the clients that match the vendor class identifier option (60) in the request. The vendor class identifier can be empty string to match any identifier, or matched exactly, or match a substring, for example substring(vendor-class-identifier,0,9)=="PXEClient". The vendor specific information must be a colon (:) separated hex string, for example 06:01:03:0A:04:00:50:58:45:09:14:00:00:11:52:61:73:70:62:65:72:72:79:20:50:69:20:42:6F:6F:74:FF.
+
+
+
@@ -1279,7 +1304,9 @@
The IP address range that must be excluded or not assigned dynamically to any client by the DHCP server.
+
+