Docs / Getting Started / Quickstart: WAN forwarding
Browse Getting Started
Getting Started

Quickstart: WAN forwarding

Get ScoutDNS protecting your network in minutes by pointing your router or firewall's upstream DNS at the ScoutDNS anycast resolvers.

Updated Nov 12, 2025 • 5 min read

This is the fastest way to put ScoutDNS in front of every device on your network. You point your router or firewall’s upstream DNS at the ScoutDNS anycast resolvers, register your public WAN IP in the console, and you’re done in minutes.

[!NOTE] If you’re a managed service provider, see the MSP setup guide instead, it covers multi-tenant deployment from the start.

Pick a deployment method

ScoutDNS offers three deployment methods. Most teams start with WAN Forwarding (this guide) and add Relay or roaming clients later as needs grow.

MethodBest forTradeoff
WAN Forwarding (this guide)Fastest deployment, BYOD networks, “protect everything behind the firewall”One policy per WAN IP. Logs show WAN IP only, not per-device LAN IP.
LAN RelayPer-VLAN policy, headless / IoT devices, per-device LAN IP logging, encrypted DNSRequires an on-prem host or VM running the Relay service.
Roaming Client (Scout360)Off-network protection (laptops on home Wi-Fi or LTE), per-user loggingRequires installing the agent. Can’t protect headless devices.

[!TIP] Planning to use a Relay later? Configure WAN forwarding first anyway, the Relay needs a configured WAN to register. WAN forwarding is also recommended (not required) for roaming clients so the site is correctly identified.

Step 1: Register your network IP

ScoutDNS is a closed resolver: it only answers queries from registered networks. You add a site (a logical grouping like “HQ” or “Dallas Office”), then add one or more networks under that site with your WAN IP.

Create a site

Every network has to live under a site. Each site supports up to four networks by default.

  1. In the Admin Console, click New Site.
  2. Enter a name.
  3. Save.

Creating a new site

Create a network

  1. Open the site and click Add Network.
  2. Enter a name and your public WAN IP address. If your WAN IP changes, see Dynamic IP setup, you can register a dynamic-DNS hostname instead.
  3. Pick a policy to apply to traffic from this network.
  4. Click the checkmark to register, then Save.

Adding a network under the site

[!TIP] Not sure what your WAN IP is? Open a browser on the network and search “what is my IP”, Google shows your egress IP at the top of the results.

Step 2: Point your network at ScoutDNS

Change the upstream DNS on the device that sets DNS for the rest of your network, usually your router or firewall, sometimes a separate domain controller.

Locate your DNS configuration

Find the device that hands out DNS to client machines. This is typically:

  • The router or firewall (most small networks)
  • The DHCP server (the device that hands out IP leases usually also configures DNS)
  • The Active Directory domain controller in Windows environments

For AD environments, refer to the Active Directory policies article for the recommended pattern (forwarders on the DC, not direct client DNS changes).

Update the DNS server addresses

Replace the upstream DNS IPs with the two ScoutDNS anycast resolver IPs shown in the Admin Console. ScoutDNS runs a global Anycast network so the same two IPs work from anywhere with the lowest available latency.

Example: SonicWall DNS settings.

SonicWall DNS configuration screen

DNS server fields populated with ScoutDNS anycast IPs

[!IMPORTANT] Set DNS to static, not “auto” or “from ISP.” And write down the previous DNS server IPs before you change them, in case you need to revert.

[!WARNING] Tech-savvy users may override your DNS at the device level to bypass filtering. To block this, see Prevent DNS workarounds, it covers firewall rules that force all port-53/853/443 DNS traffic through ScoutDNS.

Restart clients or clear caches

Clients pick up the new DNS in one of two ways:

  • DHCP-assigned DNS, reboot or reconnect the client to pull the new DNS via DHCP renewal
  • Static DNS / domain controller, flush the OS DNS cache and any browser DNS cache

If you run a DNS proxy upstream, clear its resolver cache too. The change won’t apply to cached records until the proxy refreshes.

Verify

Open a browser on a client device and visit verify.scoutdns.com. You should see a “Protected by ScoutDNS” confirmation page.

[!NOTE] In some setups (especially with a DNS proxy in the path), the verify page won’t register even though DNS is correctly flowing through ScoutDNS. As a backup, open Activity → Live Queries in the Admin Console, you should see queries appearing from your WAN IP.

If you don’t see queries arriving after 30 seconds:

  1. Confirm the WAN IP registered in the console matches your actual public egress IP (check with “what is my IP”).
  2. Confirm the client really is using the ScoutDNS resolvers (nslookup verify.scoutdns.com on the client should resolve via the ScoutDNS IPs).
  3. Confirm there’s no upstream DNS-over-HTTPS that’s bypassing the resolver change (some browsers force their own DoH).
Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Nov 12, 2025