You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Log in to the Pi-hole web interface at `https://pi-hole.local/admin`.
171
171
1. Go to **Lists**.
@@ -178,7 +178,7 @@ To add a list:
178
178
179
179
Gravity also runs automatically on a weekly schedule.
180
180
181
-
{/*</Steps>*/}
181
+
</Steps>
182
182
183
183
## Add Allowlists and Domains to Pi-hole
184
184
@@ -194,7 +194,7 @@ There are two ways to allowlist in Pi-hole v6:
194
194
The HaGeZi Referral Allowlist is a maintained collection of domains that blocklists commonly block but that services legitimately need.
195
195
Adding it as a subscription prevents a large category of false positives before they happen.
196
196
197
-
{/*<Steps>*/}
197
+
<Steps>
198
198
199
199
1. In the Pi-hole web interface, go to **Lists**.
200
200
1. Paste the allowlist:
@@ -212,7 +212,7 @@ Adding it as a subscription prevents a large category of false positives before
212
212
213
213
Gravity also runs automatically on a weekly schedule.
214
214
215
-
{/*</Steps>*/}
215
+
</Steps>
216
216
217
217
### Add an Individual Domain to the Allowlist
218
218
@@ -340,7 +340,7 @@ A device can be added to multiple groups at the same time and will follow the co
340
340
341
341
Useful for a device where blocking breaks functionality and you can't or would rather not troubleshoot it (smart TVs, streaming sticks, Paramount+, Roku).
342
342
343
-
{/*<Steps>*/}
343
+
<Steps>
344
344
345
345
1. Find the device's IP address in **Tools** > **Network** or based on its traffic in the **Query Log**.
346
346
@@ -353,7 +353,7 @@ Useful for a device where blocking breaks functionality and you can't or would r
353
353
354
354
1. Select **Add**.
355
355
356
-
{/*</Steps>*/}
356
+
</Steps>
357
357
358
358
The device now resolves DNS without any filtering.
359
359
All other devices are unaffected.
@@ -363,7 +363,7 @@ All other devices are unaffected.
363
363
Apply extra blocklists on top of the normal ones without affecting the rest of the network.
364
364
This can be useful for a child's device or a school-issued laptop.
365
365
366
-
{/*<Steps>*/}
366
+
<Steps>
367
367
368
368
1. Confirm that the device's network traffic isn't being routed through a VPN.
369
369
@@ -399,7 +399,7 @@ This can be useful for a child's device or a school-issued laptop.
399
399
400
400
1. Select **Add**.
401
401
402
-
{/*</Steps>*/}
402
+
</Steps>
403
403
404
404
The device is now blocked by everything in `Default` as well as the extra lists.
405
405
Other devices that are not in the new group are unaffected.
Copy file name to clipboardExpand all lines: src/content/docs/pi-hole/network-level-blocking.mdx
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Look for **DHCP**, **LAN**, or **DNS** settings.
40
40
41
41

42
42
43
-
{/*<Steps>*/}
43
+
<Steps>
44
44
45
45
1. Log in to the Omada controller and select the site's name.
46
46
1. In the sidebar, under **Configuration**, select **Network Config** > **LAN**.
@@ -51,7 +51,7 @@ Look for **DHCP**, **LAN**, or **DNS** settings.
51
51
1. In the second box, enter `1.1.1.1` to use Cloudflare as a backup DNS server.
52
52
1. Select **Next** to save and apply the settings.
53
53
54
-
{/*</Steps>*/}
54
+
</Steps>
55
55
56
56
After you save the settings, devices need to renew their DHCP lease to pick up the new DNS server.
57
57
This happens automatically when the lease expires (typically within 24 hours, depending on your router), or immediately if you disconnect and reconnect Wi-Fi, or restart the device.
@@ -68,7 +68,7 @@ Some smart devices like Chromecast and Samsung Smart TVs ignore the DNS server y
68
68
-**Samsung Smart TVs** may use `8.8.8.8` for some services even when a different DNS is assigned.
69
69
-**Android and iOS** support encrypted DNS (DNS-over-HTTPS or DNS-over-TLS), which can send queries directly to Google or Cloudflare, bypassing Pi-hole completely.
70
70
71
-
{/*<Steps>*/}
71
+
<Steps>
72
72
73
73
1. To force traffic from these devices through the Pi-hole, add NAT rules that intercept all outbound DNS on port 53.
74
74
@@ -97,7 +97,7 @@ Some smart devices like Chromecast and Samsung Smart TVs ignore the DNS server y
97
97
98
98
You should see two rules with `DNAT` and `to:YOUR-PI-IP` — one for `udp dpt:domain` and one for `tcp dpt:domain`.
99
99
100
-
{/*</Steps>*/}
100
+
</Steps>
101
101
102
102
To verify a specific device is now routing through Pi-hole, check the query log at `https://pi-hole.local/admin/queries` and filter by that device's IP.
0 commit comments