jfb
February 27, 2019, 7:07pm
10
This guide I wrote and posted on Reddit. I had originally written it for a friend who started with zero Linux knowledge and wanted to set up a Pi-Hole from scratch. The guide gets you to a running Pi-Hole, and doesn't discuss how to do configuration and other details in Pi-Hole.
https://www.reddit.com/r/pihole/comments/9y9e9w/simple_guide_to_setting_up_a_pi_zero_w_and/
We have several FAQ's on this forum for configuring clients to use Pi-Hole:
Three methods
Generally, there are three different methods that will enable devices on your network to be protected by Pi-hole.
1. Define Pi-hole's IP address as the only DNS entry in the router
Rationale
Only is italicized here for a reason: Pi-hole needs to be the only DNS server because it intercepts queries and decides whether or not they should be blocked. If you have other DNS servers configured, you may be sent to the correct domain, bypassing Pi-hole completely.
Because of this, we…
Reduced Ad Blocking Capability
The main reason you should Pi-hole as your only DNS server is that you will see increased performance in the blocking of ads.
If you have two DNS servers (Pi-hole and something else), your network clients may not always query Pi-hole for name resolution. If a query happens to be answered from a non-Pi-hole DNS server, your block lists will not apply (since that DNS server doesn't know about them).
All Queries Need To Go Through Pi-hole First
Since other DNS se…
Please generate a debug log, upload it when prompted and post the token here. We can take a look at your Pi-Hole setup for any errors.
pihole -d
from the Linux terminal
or do it through the Web interface:
Method 1: Generate a debug token via the Web interface
Log in to your Pi-hole's Web interface
Navigate to Tools > Generate debug log
Click the Generate debug log button
Send us the debug token
[debug]
Method 2: Use the command line to generate a debug token
Login into your Pi-hole's command line
Enter pihole -d
Provide us with the debug token that is generated after the debug script completes
Alternative: Securely sending us additional information
Preferred Method
If there is additi…