Google Cloud DNS
Reliable, resilient, low-latency DNS serving from Google's worldwide network.
- Authoritative DNS lookup
Cloud DNS translates requests for domain names like www.google.com into IP addresses like 184.108.40.206.
- Fast anycast name servers
Cloud DNS uses our global network of anycast name servers to serve your DNS zones from redundant locations around the world, providing high availability and lower latency for your users.
- Scalability and availability
Cloud DNS can support a very large number of zones and DNS records per zone. Contact us if you need to manage millions of zones and DNS records. Our SLA promises 100% availability of our authoritative name servers.
- Zone and project management
Create managed zones for your project, then add, edit, and delete DNS records. You can control permissions at a project level and monitor your changes as they propagate to DNS name servers.
- Manage through API and web UI
You can manage DNS records using the Google Cloud Console. Or, try our easy-to-use, scriptable gcloud command-line tool to manage your records. You can also access the fully featured REST API to create your own customized DNS interface.
- Private zones
Private DNS zones provide an easy-to-manage internal DNS solution for your private Google Cloud networks, eliminating the need to provision and manage additional software and resources. And since DNS queries for private zones are restricted to a private network, hostile agents can’t access your internal network information.
- DNS forwarding
If you have a hybrid-cloud architecture, DNS forwarding can help bridge your on-premises and Google Cloud DNS environments. This fully managed product lets you use your existing DNS servers as authoritative, and intelligent caching makes sure your queries are performed efficiently—all without third-party software or the need to use your own compute resources.
- Cloud Logging
Private DNS logs a record for every DNS query received from VMs and inbound forwarding flows within your networks. You can view DNS logs in Cloud Logging and export logs to any destination that Cloud Logging export supports.
- DNS peering
DNS peering makes available a second method of sharing DNS data. All or a portion of the DNS namespace can be configured to be sent from one network to another and, once there, will respect all DNS configuration defined in the peered network.
Cisco Prime™ Network Registrar is a high-performance, scalable, integrated DNS, DHCP, and IPAM (DDI) solution that supports the IPv4-to-IPv6 transition and allows dual-stack deployments on a single server. The solution includes the following integrated components and their respective services, all of which support both IPv4 and IPv6: A single DHCP server for device network access, A single DNS server for IP address translation and service delivery, A DNS caching server that supports DNS Security Extensions (DNSSEC) and is designed to prevent cache poisoning and other attacks, A powerful, comprehensive IPAM system to automate and manage all IP address requirements.
F5® BIG-IP® DNS distributes DNS and user application requests based on business policies, data center and cloud service conditions, user location, and application performance. The BIG-IP platform delivers F5’s high-performance DNS services with visibility, reporting, and analysis; hyperscales and secures DNS responses geographically to survive DDoS attacks; delivers a real-time DNSSEC solution; and ensures high availability of global applications in all cloud environments.
Virtualization, Software Defined Networking and Network Functions Virtualization are top of mind issues as many organizations seek ways to increase flexibility and reduce capital and operating expenses. But increased attacks on the DNS make security a high priority even for organizations moving to a virtual environment. DNS Authority for x86 is authoritative name server software that
provides unmatched levels of security and attack resiliency while making it easy to integrate with orchestration software and other systems running in the network. Additionally, because it is not based on open-source BIND, it is immune to the many critical security vulnerabilities found in BIND each year.