Docs / Deployment & Agents / Relay setup and configuration
Browse Deployment & Agents
Deployment & Agents

Relay setup and configuration

Install the ScoutDNS Relay inside your network for per-subnet policy, LAN-aware logging, encrypted upstream DNS, and local-domain forwarding to your domain controllers.

Updated Aug 23, 2025 • 10 min read

The ScoutDNS Relay is a lightweight service that runs inside your network. It acts as a local forwarding resolver: internal queries (to your domain controllers, printers, internal apps) stay on the LAN, while public queries are forwarded over DoH to the ScoutDNS cloud for filtering and logging.

Running a Relay unlocks:

  1. Per-subnet policy (different rules for different LANs)
  2. LAN IP in query logs (instead of just your WAN IP)
  3. Encrypted upstream DNS (DoH on port 443 to ScoutDNS)
  4. Local network aliases for forwarding to internal DNS
  5. Local DNS forwarding to domain controllers
  6. Automatic updates of the Relay software

[!IMPORTANT] The Relay is not a full DNS server. It does not host zones or serve authoritative records. It forwards queries to your internal DNS for configured local domains, and to ScoutDNS for everything else.

DNS query flow with the ScoutDNS Relay

Cloud-configured architecture

The Relay is fully cloud-configured to keep install and management simple. Two steps:

  1. Install the Relay on a local host.
  2. Configure the Relay in the ScoutDNS UI.

ScoutDNS currently supports Debian-based Linux distributions (Ubuntu, Kubuntu, etc.) for the Relay service.

Install the Relay

Prepare the host

Minimum hardware requirements:

ScenarioCPURAMStorage
Single subnet, light usage11 GB free40 GB
Multiple subnets / forward rules22 GB free50 GB
Each additional 1,000 simultaneous users+1+1 GB(no change)

Networking prerequisites:

  • The host will act as DNS for every subnet that uses it, so every subnet must be routable to the host.
  • The Relay host itself should point at your local DNS server so non-forward-specified local queries still resolve.

Download the installer

In the Admin Console, click the Help icon (top right) and download the install file.

Help icon download in the Admin Console

Copy the file to your Relay host and unpack it.

Install the service

sudo ./scoutdns install-dns

The service starts automatically once installed and self-updates to the latest version when one is available.

Service control commands

# Check service status
sudo systemctl status scoutdns scoutdns-updater

# Restart the relay
sudo systemctl restart scoutdns

# Tail service logs
sudo journalctl -u scoutdns -u scoutdns-updater

# Export logs for a support case (since yesterday)
sudo journalctl -u scoutdns -u scoutdns-updater -S yesterday > scoutdns_log.txt

Uninstall

sudo /opt/scoutdns/scoutdns uninstall-dns

When the service is stopped or uninstalled, the host’s DNS settings are automatically reverted.

[!NOTE] The Relay sends all upstream DNS queries to ScoutDNS using DoH over port 443. No port 53 outbound is required for normal operation.

Configure the Relay in the ScoutDNS UI

Before the Relay can be detected, its WAN must already be configured in the Admin Console. See the Quick Start Setup Guide: WAN Forwarding for the initial WAN setup.

Once the Relay is installed on a configured WAN, it registers itself with ScoutDNS and appears under Sites → [your site] → Relays with status Not Adopted.

Adopting a new Relay

Click Adopt to bind the Relay to the site. The Relay then polls the configuration service over HTTPS, picking up new settings within 1 to 2 minutes.

[!TIP] Install multiple Relays on the same site for high availability. They share configuration and clients can fail over between them.

Upstream resolvers

By default the Relay forwards to ScoutDNS’s global anycast network over DoH in a fail-closed state. You can switch to other upstream services (Google DoH, Cloudflare DoH), but those are unfiltered: no ScoutDNS policy applies unless ScoutDNS DoH is the upstream.

Fallback DNS (fail-open)

Enabling fail-open lets the Relay forward to backup resolvers when the ScoutDNS network is unreachable. Up to four backups.

Fail-open backup resolver configuration

[!WARNING] Fail-open queries use standard port 53 DNS, not DoH. Allow outbound port 53 from the Relay host through your firewall if you enable this.

Dynamic WAN

Under normal conditions the Relay uses the site’s WAN IP as a unique identifier, so the WAN must be static (or kept current with a dynamic-DNS updater). For double-NAT or rapidly-rotating ISP IPs, that updater can lag.

Enabling Dynamic WAN decouples the Relay from the WAN IP after adoption. Traffic is still associated with the site for logging.

Since the Relay normally inherits the WAN’s policy as a default for unconfigured subnets, you must pick a fallback policy when Dynamic WAN is on. Turn on the Dynamic WAN switch and select a Dynamic WAN Policy from the dropdown.

Dynamic WAN configuration

Local forwarders

Tell the Relay where to send queries for internal domains (Active Directory, internal apps, etc.). In the Local Forwarders subtab:

  1. Click + New Domain.
  2. Enter the local domain name (e.g. corp.example.com).
  3. Add up to 4 forwarder IPs (your domain controllers, internal DNS).
  4. Choose which configured LAN the rule applies to, or leave All LANs.
  5. Save.

Adding a local forwarder

Forward lookup zones

Add every domain listed in your domain controller’s Forward Lookup Zones. From Windows DNS Manager, identify each forward-lookup zone and create a matching forwarder entry in ScoutDNS.

Windows DNS Manager showing forward lookup zones

Redirects

Redirects let you point a specific domain at a specific IP, useful for internal printers, video players, or overriding any internal/external domain to a custom IP. Effectively manual DNS records for Relay-connected devices.

  1. Open the Redirects subtab → New Redirect.
  2. Enter the domain and target IP.
  3. Save.

Adding a redirect

[!WARNING] Redirecting a domain that has an existing TLS certificate will cause certificate errors in browsers. Use redirects for internal-only hostnames or accept the cert warning.

LAN

LAN rules let you apply different policies to different subnets. To add one:

  1. Click + New LAN.

  2. Pick the WAN it applies to (default: All WANs).

  3. Name the LAN (shown in reports and other tabs).

  4. Set the IP range. Examples:

    192.168.3.0/24
    10.10.0.1/22
    10.10.0.1/20
    172.16.0.0/21
    
  5. Assign one of your existing policies.

  6. Save.

Creating a LAN rule

You can also specify individual IPs to give one device its own policy. Pair this with a static IP or DHCP reservation so the device’s address doesn’t change.

Test the Relay

Before pointing client devices at the Relay, verify it resolves both public and local queries from every subnet you plan to use it on.

Public DNS test:

nslookup test.verify.scoutdns.com <RELAY_HOST_IP>

test.verify.scoutdns.com only resolves through a configured ScoutDNS network, a successful answer confirms the Relay is reaching ScoutDNS and returning results.

Public DNS test via nslookup

Local DNS test:

nslookup example.yourlocaldomain.corp <RELAY_HOST_IP>

This verifies the Relay is forwarding correctly to your local DNS for internal domains.

Local DNS test via nslookup

If either resolution fails, confirm the Relay host is online and reachable (ping/route) from the affected subnet. If you run multiple Relays, repeat both tests against each Relay’s IP.

Point local clients at the Relay

Configure your DHCP server to hand out the Relay host IP(s). With multiple Relays installed, hand out multiple IPs for redundancy. Test every Relay before rolling out broadly.

[!IMPORTANT] Do not mix DNS server types on client devices. Don’t combine a Relay IP with a domain controller IP, a ScoutDNS Anycast IP, or any other resolver in the same DHCP option. Mixed sets produce inconsistent policy enforcement and some queries won’t be logged or filtered.

[!TIP] Best practice: manually set the Relay as DNS on a handful of test devices across each subnet, validate behavior, then push the change via DHCP.

Existing IP leases

DHCP renewal pushes new DNS settings to clients. For domain-joined machines under Group Policy you can force this via:

ipconfig /renew

run via batch file. Unmanaged devices need a manual renewal or a restart.

Support boundary

[!NOTE] In scope: ScoutDNS supports installation and configuration of the Relay service on qualified hosts, and the cloud-side GUI configuration.

Out of scope: ScoutDNS does not provide support for local network configurations, host OS/networking issues, Windows domain controllers, or DHCP configuration in Windows or other vendor equipment. Please consult the relevant vendor documentation for those areas.

Was this article helpful?
Still stuck? Open a ticket and we'll follow up by email.
Open a ticket
Last updated Aug 23, 2025