{"id":5697,"date":"2021-08-26T05:00:57","date_gmt":"2021-08-26T04:00:57","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5697"},"modified":"2024-03-04T15:36:21","modified_gmt":"2024-03-04T15:36:21","slug":"dns-blocking","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking","title":{"rendered":"What Is DNS Blocking, and What Should You Know about DNS Security?"},"content":{"rendered":"<p>In the workplace, certain web pages can be a distraction for employee productivity\u2014or worse, a disruption. If you\u2019re a managed services provider (MSP), your customers may be interested in finding a way to control the types of websites their employees can access during the workday. One viable option for them to utilize is a DNS block to <a href=\"https:\/\/www.n-able.com\/features\/web-blocking-software-for-business?promo=blog\" target=\"_blank\" rel=\"noopener\">restrict access to certain web addresses<\/a> on a given server.<\/p>\n<p>This article will help you understand what DNS block is, who uses it, and how it works. We\u2019ll also touch on some topics related to DNS security in general, including best practices and key terms, to give you an idea about some of the related threats to cybersecurity.<\/p>\n<h2>What is a DNS block?<\/h2>\n<p>A DNS block is a mechanism that allows you to prevent access to certain web pages on the server. The technology was originally designed to <a href=\"https:\/\/www.n-able.com\/blog\/how-protect-your-organization-against-email-spoofing\" target=\"_blank\" rel=\"noopener\">help defend against spam and phishing attacks<\/a> by blocking known suspicious IP addresses. Today, it serves a variety of purposes\u2014some people use it as an antipiracy safeguard, while others use it to prevent access to infected or addictive sites (like gambling) in the workplace.<\/p>\n<p>The basic function of DNS blocking software is simple\u2014it serves as a gateway between the <a href=\"https:\/\/www.n-able.com\/blog\/servers-vs-workstations\" target=\"_blank\" rel=\"noopener\">web server and your personal server<\/a>, ensuring your browser doesn\u2019t recognize the blocked IP address and cannot access the website\u2019s server.<\/p>\n<h2>Who uses DNS blockers?<\/h2>\n<p>With businesses across industries now spending a large portion of the workday on the internet, DNS blocking has evolved from its original role as an anti-spam device. Today, organizations can utilize this capability to prohibit access to disruptive or distracting sites in the workplace\u2014from gambling sites to social media sites. Many DNS blocking programs allow administrators to adjust their blocks to specify what types of sites they want to restrict, so certain users might have more flexible safeguards.<\/p>\n<p>Because DNS blocking is a server-based identification system and not a software application, multiple devices across a given network\u2014including smartphones, tablets, and other devices\u2014can be governed by DNS blocks, too.<\/p>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h2>How does DNS blocking work?<\/h2>\n<p>To understand fully how DNS blocking works, we need to take a step back. A web page\u2019s IP address\u2014essentially a multidigit identification code\u2014is its primary nametag on the home server. But IP addresses are not practical for users to enter every time they wish to access a web page. If you are looking for Twitter, for example, it would be quite impractical to search for its IP address\u2014199.59.149.165\u2014each time you wanted to reach the home page. DNS\u2014or the domain name system\u2014is the process of naming websites in human language as opposed to their numerical IP addresses.<\/p>\n<p>Created in 1983 to help make the internet more intuitive for everyday users, DNS essentially acts as a telephone book that links the user-friendly domain name to its more technical IP address. (All the \u201ctranslating\u201d is done in the background by your servers.)<\/p>\n<p>A DNS block works by removing the IP address name from the \u201cphonebook\u201d on your server. For example, if you were to block Twitter using a DNS blocker, your server would intentionally forget the name assigned to 199.59.149.165. As a result, blockers disable your server from locating particular web pages. To block whole genres of web pages, like piracy sites, DNS blocking services can set your server to forget large swaths of IP addresses that fit certain criteria. This breaks the communication between the IP server and the user\u2019s device.<\/p>\n<p>This way, DNS blocking can be a quick and easy way to prevent staff from accessing malicious or unwanted web pages with negligible overheads and no physical hardware.<\/p>\n<h2><span lang=\"EN\">Top tips for DNS security<\/span><\/h2>\n<p>As you can see, DNS plays a critical role in facilitating modern web traffic and thus becomes, understandably, a common target for cyberattackers. Utilizing DNS blocking is considered one of the many best practices that can have a large impact on overall cybersecurity.<\/p>\n<p>Read on as we explore some other tips on DNS security that will help you prevent threats originating from this common source.<\/p>\n<ul>\n<li><em>Use redundant DNS servers to increase availability<\/em><\/li>\n<\/ul>\n<p>DNS is a fundamental part of how network applications, like Active Directory, file sharing, and email services operate\u2014phrased another way, this means MSPs need to guarantee that their customers\u2019 DNS infrastructure is highly available.<\/p>\n<p>Redundancy requires, at minimum, a primary and secondary DNS server to keep business-critical service functional. This allows one server to take over in the event that the other encounters an error, increasing infrastructure availability and reducing the risk of failures.<\/p>\n<ul>\n<li><em>Hide DNS servers and DNS information<\/em><\/li>\n<\/ul>\n<p>As with other aspects of IT management, DNS servers should be treated according to the principle of least privilege\u2014that is, they should only be accessible to the specific end users who use them. Your primary server should be hidden from view and restricted to system managers and authorized IT personnel.<\/p>\n<ul>\n<li><em>Use DNS logging<\/em><\/li>\n<\/ul>\n<p>The most efficient way to monitor DNS activity is to use logging, which can reveal issues with client activity, queries, updates, and more. Debug logs can also be used to identify cache poisoning (also called \u201cDNS spoofing\u201d\u2014more on this below), a technique that allows cybercriminals to alter information stored in a user\u2019s cache, causing the server to redirect them away from a legitimate site they\u2019ve previously visited toward a malicious one instead.<\/p>\n<ul>\n<li><em>Enable DNS cache locking<\/em><\/li>\n<\/ul>\n<p>After enabling debug logs, the next step is to lock the cache. Whenever DNS receives a query, it retrieves and stores the proper data in the cache for future use, which significantly reduces the server\u2019s response time for the same queries. However, as mentioned above, hackers can use the cache as an attack vector for gaining entry to your systems.<\/p>\n<p>Locking the cache helps to prevent this by restricting when the stored information can be altered, thereby preventing it from being overwritten before the TTL (time to live) expires. Cache locking may be enabled by default and can be scaled to block overwriting the data for a specific percentage of the TTL.<\/p>\n<hr \/>\n<h4><strong>Learn also:<\/strong><\/h4>\n<h3>Key DNS security terms to know<\/h3>\n<p>Looking to better understand some of the key terms and acronyms related to securing your DNS? You\u2019re likely to encounter one of the following:<\/p>\n<ul>\n<li><strong>DNSSEC:<\/strong> Domain Name System Security Extensions (DNSSEC) is a DNS feature that authenticates the responses to queries for domain names by using digital cryptographic signatures. DNSSEC can prevent cyberattacks from altering these responses but does not otherwise offer privacy protection.<\/li>\n<li><strong>DNS spoofing:<\/strong> This kind of attack occurs when DNS request information is modified to redirect end users to an imposter website designed to trick them into entering their login credentials. Many of these websites also install viruses onto the user\u2019s device to provide hackers with long-term access. Read more about <a href=\"https:\/\/www.n-able.com\/blog\/what-is-dns-poisoning\">DNS spoofing<\/a> on our blog.<\/li>\n<li><strong>DNS tunneling:<\/strong> This is a form of cyberattack that embeds information from other programs or protocols into DNS queries and responses, bypassing firewalls in the process. Typically, a tunneling attack will include data payloads that, when sent to a compromised DNS server, can enable a hacker to remotely control the server and the applications it\u2019s running. Tunneling requires access to an internal DNS server that has network access, but many cybercriminals bank on businesses and organizations not examining their DNS traffic because it\u2019s such a well-known and trusted protocol, which makes hardening your customers\u2019 networks all the more necessary.<\/li>\n<li><strong>DNS cache: <\/strong>The DNS cache is temporary local storage of data retained from previous DNS lookups. The cache allows an operating system or web browser to retrieve a site\u2019s IP address far faster. Here\u2019s an article on our blog to help you <a href=\"https:\/\/www.n-able.com\/blog\/dns-cache-overview\">get a better understanding of DNS cache<\/a>.<\/li>\n<li><strong>Dynamic DNS:<\/strong> Dynamic DNS (DDNS) is a method of keeping your DNS nameservers automatically updated in real time, including information like the active DDNS configuration\u2019s host names and addresses. Check out this N&#8209;able blog post to <a href=\"https:\/\/www.n-able.com\/blog\/dynamic-dns-overview\">learn more about dynamic DNS<\/a>.<\/li>\n<li><strong>DNS over HTTPS:<\/strong> DNS over HTTPS (DoH) is a protocol that allows you to remotely resolve lookups using HTTPS. By encrypting the information sent between the DoH client and its DNS resolver, DoH stops would-be intruders from accessing or altering DNS data.<\/li>\n<\/ul>\n<hr \/>\n<p>With these best practices and key terms under your belt, you\u2019ll be prepared to handle DNS services for your customers and better prevent common security issues.<\/p>\n<p>Be sure to also read our comprehensive guide on <a href=\"https:\/\/www.n-able.com\/blog\/troubleshooting-dns-issues\" target=\"_blank\" rel=\"noopener\">steps to troubleshooting DNS issues<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end-users from visiting malicious websites.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5697","post","type-post","status-publish","format-standard","hentry","topic-security-fr","topic-security","topic-security-pt-br","topic-security-es","topic-security-de","topic-security-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is DNS Blocking, and What Should You Know about DNS Security? - N-able<\/title>\n<meta name=\"description\" content=\"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DNS Blocking, and What Should You Know about DNS Security? - N-able\" \/>\n<meta property=\"og:description\" content=\"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-26T04:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T15:36:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"What Is DNS Blocking, and What Should You Know about DNS Security?\",\"datePublished\":\"2021-08-26T05:00:57+01:00\",\"dateModified\":\"2024-03-04T15:36:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\"},\"wordCount\":1464,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\",\"name\":\"What Is DNS Blocking, and What Should You Know about DNS Security? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2021-08-26T05:00:57+01:00\",\"dateModified\":\"2024-03-04T15:36:21+00:00\",\"description\":\"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is DNS Blocking, and What Should You Know about DNS Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is DNS Blocking, and What Should You Know about DNS Security? - N-able","description":"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking","og_locale":"es_ES","og_type":"article","og_title":"What Is DNS Blocking, and What Should You Know about DNS Security? - N-able","og_description":"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.","og_url":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-08-26T04:00:57+00:00","article_modified_time":"2024-03-04T15:36:21+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"What Is DNS Blocking, and What Should You Know about DNS Security?","datePublished":"2021-08-26T05:00:57+01:00","dateModified":"2024-03-04T15:36:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking"},"wordCount":1464,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking","url":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking","name":"What Is DNS Blocking, and What Should You Know about DNS Security? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2021-08-26T05:00:57+01:00","dateModified":"2024-03-04T15:36:21+00:00","description":"Read about DNS blocking tactics and use cases for needing DNS blocks to prevent end users from visiting malicious websites.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/dns-blocking"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/dns-blocking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"What Is DNS Blocking, and What Should You Know about DNS Security?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5697"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}