GDNS Network-Wide DNS Filtering Solution

Flexible Deployment

Runs on commodity hardware and containers (Linux, Windows, Docker)

Privacy & Security

Secure, encrypted DNS queries and Supports DoH, DoT, and DNSCrypt to prevent ISP

Network-wide Protection

Blocks ads, trackers, and phishing domains across the entire network without installing apps on individual devices

Performance & Efficiency

Lightweight resource consumption and DNS caching reduces latency and improves browsing speed

 

Product Overview

G-DNS provides network-wide protection by blocking ads, trackers, malware, and phishing domains at the DNS level before they reach user devices. It enhances privacy with encrypted DNS support and DNSSEC validation, ensuring secure and authentic responses. Flexible to deploy across multiple platforms, it offers simple management through a web dashboard and API, while its lightweight design and caching deliver fast performance. Cost-effective and easy to use, G-DNS enables safer and cleaner internet access for all devices on the network.

Key Features

 

  • DNS-based filtering: block ads, trackers, analytics, and malicious domains.
  • Custom rules: whitelist/blacklist, Adblock-style syntax support.
  • Encrypted DNS: DNS-over-HTTPS (DoH), DNS-over-TLS (DoT), DNSCrypt.
  • Client-based policies: per-device filtering (IP, MAC, Client ID).
  • Parental controls: optional blocklists for adult content.
  • Cross-platform: Linux, Windows, macOS, Raspberry Pi, Docker.
  • Web-based admin interface: statistics, query logs, top clients.
  • REST API: automate config, retrieve logs, integrate with tools.

Security & Compliance

 

  • Privacy-first: no data collection, logs remain local unless exported.
  • Encrypted DNS: prevents ISP-level DNS snooping and manipulation.
  • DNSSEC validation: ensures integrity of upstream DNS answers.
  • Configurable log retention: align with compliance requirements.

Deployment Scenarios

  • Standalone mode: simple resolver for single and multi LAN.
  • Docker/Kubernetes: containerized deployment in cloud or lab.
  • Forwarding mode: integrate with Unbound or upstream DoH/DoT providers.
  • Hybrid: combine with enterprise firewall or gateway filtering.
Data-driven decision making

Analyze interactions
and monitor quality

Unlock insights with our robust analytics tools. Monitor performance, track customer satisfaction, and optimize your support.

Customer testimonials

Hear from our satisfied customers

The best way to showcase our commitment is through the experiences and stories of those who have partnered with us.

"Forcepoint DLP has transformed our data protection strategy. We now have visibility and control over sensitive data movements, reducing data loss incidents significantly."

Frederic Hill
+ 0 %

Decrease in data loss incidents

"Forcepoint One's intuitive cloud security features have streamlined our compliance processes, enabling us to quickly adapt to new regulations without compromising on performance."

Safaa Sampson
+ 0 %

Improvement in compliance efficiency

"With Forcepoint's seamless integration into our existing infrastructure, we've enhanced our security posture, protecting critical assets from internal and external threats."

Brendan Buck
+ 0 %

Increase in overall security posture