Configure settings for DNS views in Route 53 Global Resolver - Amazon Route 53
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Configure settings for DNS views in Route 53 Global Resolver

Route 53 Global Resolver allows you to configure different DNS policies and access controls for different groups of client devices based on their security requirements and access needs. Set up DNS policies and access controls in Route 53 Global Resolver for different groups of client devices based on their security requirements and access needs.

Configuring DNS settings for client groups

Each DNS view has several settings that control how DNS queries are processed and resolved for different client device groups.

DNSSEC validation

DNSSEC validation helps ensure that DNS responses for public domains are authentic and haven't been tampered with. When you enable DNSSEC validation, Route 53 Global Resolver checks DNSSEC signatures and returns SERVFAIL for domains with invalid signatures.

Consider enabling DNSSEC validation if:

  • Your organization needs cryptographic verification of DNS responses

  • You want protection against DNS spoofing and cache poisoning attacks

  • You have compliance requirements that require DNSSEC validation

Note

DNSSEC validation only applies to public domains. Private hosted zones use their own authentication mechanisms.

EDNS Client Subnet (ECS)

EDNS Client Subnet includes information about the client's network location in DNS queries sent to authoritative servers. This allows content delivery networks and geographically distributed services to provide location-appropriate responses.

ECS can help you:

  • Get better performance from geographically distributed services

  • Improve content delivery network routing accuracy

  • Better comply with regional content restrictions

Privacy considerations:

  • ECS reveals partial client IP information to authoritative servers (maximum /24 for IPv4 and /48 for IPv6)

  • Consider your organization's privacy requirements before enabling

Firewall fail open

The firewall fail open setting determines what happens when DNS firewall rules cannot be evaluated due to service impairment or configuration issues.

Disabled (default)

DNS queries are blocked when firewall rules can't be evaluated. This gives you maximum security but might affect availability during service issues.

Enabled

DNS queries are allowed when firewall rules can't be evaluated. This prioritizes availability over security during service issues.

Best practices for organizing client device groups

Follow these best practices when designing DNS views for different client device groups:

View organization strategies

  • Separate by security requirements - Create different views for client devices with different security clearances or access levels

  • Organize by location - Use separate views for different geographic locations or network segments

  • Group by device type - Create dedicated views for servers, workstations, mobile devices, or IoT devices

  • Use descriptive names - Choose names that clearly indicate the view's purpose and target client devices

Security considerations

  • Principle of least privilege - Configure each view with the minimum access required for its client devices

  • Default deny - Start with restrictive firewall rules and add exceptions as needed

  • Regular review - Periodically review and update DNS view configurations

  • Monitor usage - Use DNS query logs to monitor and analyze DNS view usage patterns