Quick Start
Get VeloGuardian DNS filtering running on your network. No VeloGuardian account required — the appliance runs independently on your LAN.
System requirements
Section titled “System requirements”| Resource | Minimum | Recommended |
|---|---|---|
| vCPU | 1 | 2 |
| RAM | 1 GB | 2 GB |
| Disk | 8 GB | 20 GB |
| Network | 1 bridged adapter | 1 bridged adapter |
| Hypervisor | VMware, VirtualBox, or Proxmox | VMware ESXi / Workstation |
-
Download the OVA
Download
VeloGuardianDNS.ovafrom the downloads page. -
Import and boot
Import the OVA into your hypervisor. Assign at least 1 vCPU, 1 GB RAM, and a bridged network adapter so the appliance gets an IP on your LAN.
Power on the VM. The appliance boots to a console menu.
-
Configure the network
The console auto-configures via DHCP on first boot. For a static IP:
- Select 1) Network Configuration
- Choose Static and enter the IP, subnet mask, gateway, and DNS servers
- The change takes effect immediately
Use option 5) Show Web Interface URL to see the appliance’s address.
-
Sign in to the dashboard
Open
http://<appliance-ip>:8080in your browser. The default credentials are:- Username:
admin - Password:
admin
Change the password immediately under Settings > Password.
- Username:
-
Point your network to the appliance
Set your router’s DNS server to the appliance IP. Every device on your network will now have its DNS queries filtered.
Alternatively, configure individual devices to use the appliance as their DNS server.
-
Customize your filtering
The appliance ships with sensible defaults, but you can:
- Add or remove blocklists
- Create filtering profiles for specific devices
- Set up time-based schedules (e.g., block social media during work hours)
- Configure allow/deny rules to override blocklist decisions
Default blocklists
Section titled “Default blocklists”The appliance ships with four curated blocklists enabled out of the box:
| Blocklist | What it blocks |
|---|---|
| Steven Black Unified | Ads, trackers, malware, fakenews |
| OISD Small | Ads, tracking, telemetry |
| Phishing Army Extended | Known phishing domains |
| URLhaus Malware Filter | Active malware distribution domains |
These update automatically every day at 4 AM. You can add more from the Blocklists page.
What’s next?
Section titled “What’s next?”- Dashboard guide — explore the web interface, query logs, statistics, and reports
- Blocklists & filtering — categories, profiles, custom lists, schedules, and rules
- Console CLI — network configuration, system status, and updates