Skip to main content
Premium DNS

This article describes the features and benefits of our Premium DNS Hosting Service

Garrett Saundry avatar
Written by Garrett Saundry
Updated over a year ago

Webnames.ca's Premium DNS service allows you to use the Webnames.ca DNS servers as the authoritative name servers for your domain name. This service gives you control over your DNS records, and other DNS settings through our Premium DNS interface.

Features

In addition to the features of our Advanced DNS, Premium DNS also offers the following additional functionality:

  • Basic and Advanced Record Types

A and AAAA

SRV

NAPTR

CAA

CNAME

TXT

RP

TLSA

MX

ALIAS / ANAME

PTR

SOA

  • Forwarding

    • Root Domain Forwarding

    • Sub-Domain Forwarding

    • Full HTTPS support via included Let's Encrypt SSL certificate

  • DNS Record Versioning

    • Each saved instance of a zone file can be instantly recalled and restored at the click of a mouse

  • DNS Templates

    • Each saved instance of a zone file can be named and used or assigned again later to other domains within your account

  • DNS Zone File Import

    • Within the creation of DNS Templates is the facility to import a plain text zone file.

  • DNS Zone File Export

    • Export the current Zone File of a domain to a text file.

  • Scheduled DNS Zone File Updates

    • Schedule DNS changes to occur at future date and time, complete with email notifications

  • DNS Record Setup during Registration or Transfer

    • Set your DNS records prior to purchase or import a zone file.

  • Anycast DNS

    • Anycast synchronizes a domain's name servers with a distributed cloud of geographically redundant and fault tolerant servers around the world, providing enhanced performance and resilience against DNS-based DDOS attacks.

  • DNSSEC

    • One-click signing and automated key rollover

ACCESSING DNS HOSTING MANAGEMENT

To access the DNS Management interface for your domain, navigate the following, starting from the Webnames.ca homepage:

  1. Click Account

  2. Click DNS Hosting

  3. Click on the domain you wish to manage

  4. Click on the DNS Hosting Tab

If your domain does not yet have DNS Hosting, click the Learn More button beside DNS Hosting on the Domain Tab.

INTERFACE OVERVIEW

The Premium DNS interface is divided into a section on Domain Settings and URL Forwarding, followed by a section for each type of DNS record that can be added and/or managed.

ZONE FILE MANAGEMENT

DNS VERSIONS

Each saved instance of your DNS records can be recalled via the drop down. Making a selection from the list will load the DNS records from the version into the interface for review. To apply these records to your domain name, make any changes desired, and then click APPLY at the bottom of the page. A new DNS version will be saved each time the APPLY button is clicked.

TEMPLATES

Record templates can be created and then later applied to one or more domains within your account.

Click Create a new or manage an existing DNS template to create your initial templates or manage any existing templates.

IMPORT

A text-based version of a zone file (which follows the format outlined in RFC1035(section 5) and RFC1034(section 3.6.1) at https://tools.ietf.org/html/rfc1035 and https://tools.ietf.org/html/rfc1034), can be imported into the Premium DNS interface

  1. Click Import to go the DNS Templates page

  2. Click Import Settings from Zone File

  3. Paste zone file in space provided

  4. Click Process Zone File

EXPORT

A text-based version of the current zone file can be exported either as a text file or displayed on-screen for simple copying.

  1. Click Export to go the export interface

  2. The currently live zone file for the domain is displayed on-screen

  3. Click Download as Text File to download a copy of the zone file in plain text.

SCHEDULING DNS UPDATES

Updates made within the Premium DNS interface can be scheduled to be applied at a future date and time

To schedule an update to be applied in the future:

  1. Perform the desired DNS updates with the Premium DNS interface

  2. Click Schedule in the bottom left of the page

  3. Select a date and time for the update to be applied, using your local time zone. After selection, the selected time will be transposed to UTC and displayed on screen. For clarity, the UTC date and time is what will be used for the application of the zone file update.

  4. Optionally select one email address to be notified upon success or failure of the update

  5. Click Submit

REVIEW OF SCHEDULED DNS UPDATES

Scheduled updates (both upcoming, and past) can be reviewed and managed by browsing to Account -> Manage Scheduled DNS Changes. Note that scheduled DNS updates cannot be edited, however they can be canceled if necessary.

TTL (TIME TO LIVE)

The TTL (Time to Live) setting controls how long your DNS records will be cached for by other DNS servers. Lowering the TTL value ahead of a planned update to your DNS records will shorten the amount of time it takes for said changes to take effect.

The TTL setting can be changed by using the dropdown menu indicated in the screenshot above. The default value is 6 hours. The amount of time required for the propagation of an updated TTL value is governed by the TTL value which was initially present on this page.

Example: If your existing TTL value is 6 hours, and you wish to change the value to 15 minutes, Once you update the value to 15 minutes, it will take up to 6 hours for that new value to propagate across the Internet

NOTE: When selecting 5,15 or 30 minutes as a TTL value, to maintain DNS caching efficiency for your DNS records this value will be reset to 6 hours after 7 days.


ROOT URL FORWARDING

  1. Select the “On” radio button.

  2. Type a URL into the “Destination URL” field.

  3. Select whether or not to apply Gripping to the forward

    • A 'Gripped' domain name will maintain the original domain name in the browser address bar, while at the same time displaying the content of the Destination URL. This functionality is dependent on the Destination URL website being compatible with being displayed in an iframe. Not all Destination websites will be compatible with Gripping

  4. Select whether forward both the root domain and the www to the Destination, or just the root domain (the option to forward both is checked by default, however unchecking this option would be done as part of connecting your domain to a cloud hosting provided. See here for more information)

  5. Click “Apply Now” at the bottom of the page.

NOTE: To mirror subdirectories of your domain to the domain being forwarded to, include a forward slash at the end of the domain name you specify.

Examples:

If the changes were made successfully, you will see the following:

(Note: URL Forwarding will disable any A or CNAME records you have for your domain and www host, as it will point those to the server we use for URL forwarding.)


GRIPPING

If you want to hide the URL you are forwarding to with your domain name, make sure to turn “Gripping” on before submitting the changes.


DNSSEC

DNSSEC allows the for the verification of your published DNS zone and that it has not been altered in transit. When you enable DNSSEC here, we will automatically sign your zone with a cryptographic key and publish the corresponding Delegation Signer (DS) records in the parent registry. The key will also be rolled over every 180 days automatically. Other than enabling this feature, no other configuration or steps are required to fully implement DNSSEC on your domain. DNSSEC is available on all gTLDs and most ccTLDs

ENABLING DNSSEC

  1. Under the heading of DNSSEC, toggle the feature to On

  2. Click “Apply Now” at the bottom of the page.


HOST SETTINGS (A RECORDS OR AAAA RECORDS)

A records are DNS records which point to an IP address. An A record

Closed

lets you create hostnames and point them to an IP address

Closed

. As you can see in the example below, we're pointing the hostname www.exampledomain.ca to the IPv4 address 216.251.32.92.

ADDING A RECORDS

  1. Click “Add a Record” in the A Records section (or AAAA Records section).

  2. Enter the host name of your choice in the “Hostname” field, and then enter in the IP address of your server in the IP Address field

  3. Click “Apply Now” at the bottom of the page.

Note: The Hostname field should be left blank for at least one entry, this being the entry for your root domain, e.g. exampledomain.ca. The Hostname field should only be populated when assigning records for subdomains, e.g. subdomain.exampledomain.ca An additional "@" symbol is not required, but can be used as a shorthand in the targets of CNAME, MX, NS and SRV records as an alias for the root domain.

If the changes were made successfully, you will see the following:


ALIASES (CNAME RECORDS)

A Canonical Name (CNAME) record causes the specified hostname to become an alias for some other, canonical name. A CNAME record

Closed

useful if you want to associate more than one name with the same collection of A, MX, TXT, etc. records. For example, suppose you have set an A record and an MX record for example.com. If you then create a CNAME for mail.example.com and point it to example.com, this will make mail.example.com share the same IP address and MX information as the domain.

Note: If you have a CNAME record for a particular hostname, you may not have other types of resource records (A, MX, etc.) for that same hostname.

ADDING A CNAME RECORD

  1. Click “Add a Record” in the CNAME Records section.

  2. Enter the host name of your choice in the “Hostname” field, and then enter in the hostname of your server you want to alias to.

  3. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


MAIL EXCHANGE (MX RECORDS)

MX or Mail Exchanger Records as they are also known are used to specify how the SMTP (Simple Mail Transfer Protocol) routes email messages. If you have email services on your domain name either with Webnames.ca or a third party, it is imperative that you create MX records correctly, or your emails will not work.

An MX record cannot be pointed to an IP address directly; they must be pointed to a hostname. Usually one would create an A record pointing to the mail server IP address, and then create an MX record pointing to the hostname.

The MX hostname should typically be your domain name, as it will determine what your email addresses are. If your MX hostname is “example.com ”, then your email addresses will be “[email protected] ”. This is done by simply leaving the Hostname field blank.

However, if you use mail.example.com as your MX hostname, then your email addresses will be “[email protected] ”, which is generally not a good thing.

For redundancy, you can use more than one MX record to point to multiple mail servers. Which mail server is used first is determined by the priority value. The lower the priority value, the higher the actual priority will be.

ADDING AN MX RECORD

  1. Click “Add a Record” in the MX Records section.

  2. Leave the hostname field blank.

  3. Enter a priority value (Lower numbers means a higher priority.)

  4. Enter the hostname of the mail server in the “Mail Server Name” field

  5. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


DELEGATE SUBDOMAINS (NS RECORDS)

In order to have Subdomains of your domain serviced by alternate name servers (i.e. other than ns1.webnames.ca etc.), delegation can be used by way of an NS record for the subdomain in question.

  1. Click “Add a Record” in the NS Records section.

  2. Enter the host name (subdomain) of your choice in the “Hostname” field, and then enter in the name server name you wish to delegate to.

  3. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


TXT RECORDS

TXT are simply plain text records. They allow you to associate text to a host name. Currently a primary use for TXT records is for the implementation of SPF records. For information on SPF, please see: http://en.wikipedia.org/wiki/Sender_Policy_Framework

ADDING A TXT RECORD

  1. Click “Add new TXT Record” in the TXT Records section.

  2. Enter in the hostname of your choice in the Hostname field.

  3. Type in your text string into the TXT field.

  4. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


SERVICES (SRV RECORDS)

SRV records are required by services such as the SIP or XMPP Instant Messaging protocols. Microsoft Exchange servers also make use of SRV records. As you'll notice SRV records have more parameters than other records. The parameters are as follows:

Priority: Priority of the target host, lower the value, the higher the priority.

Weight: If more then one SRV record share the same priority, then the DNS server will consider the weight.

Port: The TCP or UDP port used by the service.

Target: The canonical hostname of the machine providing the service.

ADDING AN SRV RECORD

  1. Click “Add new SRV Record” in the SRV Records section.

  2. In the hostname field, you must specify the service name preceded by an underscore (in this case it's sip) then a dot, followed by another underscore and he protocol. (In this case it's TCP.)

  3. Enter in a priority and weight.

  4. Specify the port the server is listening on.

  5. Specify the target, which is the hostname assigned to the server hosting the service.

  6. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


ALIAS RECORDS

ALIAS pseudo-record type is supported to provide CNAME-like mechanisms on a zone's apex. While not a true DNS record type, the ability to forward the root of a domain name to another domain name has become an increasingly in-demand feature, especially when associating a domain name with website hosted on cloud-based providers.

The use of the Alias record at the apex (root) of a domain name will not have adverse effect on subdomains nor email, such as when a CNAME record is utilized.

ADDING AN ALIAS RECORD

  1. Populate the Hostname field if the forwarding is to be applied only to a specific subdomain (e.g. subdomain.yourdomain.ca) To forward the root of the domain (e.g. yourdomain.ca), leave the hostname field blank.

  2. Populate the Alias field with the address the domain should be forwarded to (e.g. myhostingprovider.com)

  3. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


SUBDOMAIN URL REDIRECT

While not a specific record type, this section of the DNS record editor allows for the forwarding of multiple subdomains to other discrete URLs, similar to our See also: "Root URL Forwarding".

ADDING A SUBDOMAIN URL REDIRECT

  1. Type a URL into the “Forwarding To:” field.

  2. Select whether or not to apply Gripping to the forward

    • A 'Gripped' domain name will maintain the original domain name in the browser address bar, while at the same time displaying the content of the Destination URL. This functionality is dependent on the Destination URL website being compatible with being displayed in an iframe. Not all Destination websites will be compatible with Gripping

  3. Click “Apply Now” at the bottom of the page.

NOTE: To mirror subdirectories of your domain to the domain being forwarded to, include a forward slash at the end of the domain name you specify.

Examples:

If the changes were made successfully, you will see the following:


NAPTR RECORDS

Naming Authority Pointer Records were originally produced as a way to encode rule-sets in DNS so that a regular expression would be used by a client program to rewrite a string into a domain name.

The function of rewriting a string according to rules in a record has usefulness in several different applications. The reasons the rewrite is used, what the expected outcomes are, or what they are used for, are all specified by applications that will ultimately utilize them.

Flags and other fields are also specified in the NAPTR to control the rewrite procedure in various ways or to provide information on how to communicate with the host at the domain name that was the result of the rewrite.

ADDING A NAPTR RECORD

  1. Click “Add new NAPTR Record” in the RP Records section.

  2. Enter in the hostname of your choice in the Hostname field.

  3. Type in the desired values for the following fields

    • Order*

    • Preference*

    • Flag

    • Service / Parameters*

    • Regex

    • Replace*

    • * Denotes required values

  4. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:


RP RECORDS

The Responsible Person Record defines information about the responsible person(s) for the domain.

ADDING AN RP RECORD

  1. Click “Add new RP Record” in the RP Records section.

  2. Enter in the hostname of your choice in the Hostname field.

  3. Type in the desired email address into the Mailbox field.

  4. Optionally, provide an additional Host Reference value

  5. Click “Apply Now” at the bottom of the page.

If the changes were made successfully, you will see the following:

NOTE: The email address should be entered into the field verbatim. Note that RP records often utilize a . in place of the @ symbol. For simplicity, our system will accept the verbatim email address (though one in which the @ has already been replaced with a . will also be accepted)and then perform any necessary character replacements before committing the value to DNS.

If the email address being utilized contains a dot within the local portion of the address (i.e. to the left of the @), then those additional dots can be escaped by using a backslash. e.g. [email protected] would be host\[email protected].

The above is not required for additional dots appearing within the domain name, such as [email protected] . This address can be entered in verbatim.


PTR RECORDS

Pointer to a canonical name. Pointer Records are used to perform IP address resolution (as opposed to name resolution), and as such, function conversely to A records. They are there fore used most commonly to implement reverse DNS lookups.

In following the reverse DNS function, PTR records are assigned to an IP address and are used to resolve the IP address to a name. Therefore. PTR records are normally created and hosted by the IP address provider (ISP etc).

Pointer Records can however be delegated by one IP provider to another provider, and in this context Webnames can host PTR Records.

ADDING A PTR RECORD

  1. Click Add new PTR Record

  2. Enter in the hostname of your choice in the Hostname field (or leave blank to apply the record to the root of the domain).

  3. Enter the reverse DNS value as provided by your IP Address provider.

  4. Click “Apply Now” at the bottom of the page.


CAA RECORDS

Closed

is an Internet security policy mechanism which uses resource records in the Domain Name System (DNS) to allow domain name holders to specify which certificate authorities are authorized to issue certificates for that domain, and which types of certificates they are able to issue.

ADDING A CAA RECORD

  1. Click “Add new CAA Record” in the RP Records section.

  2. Enter in the hostname of your choice in the Hostname field (or leave blank to apply the record to the root of the domain).

  3. Enter the desired Flag value:

    • A Flag value of 128 or more is an indication to a CA which does not understand or does not implement the Tag value specified in the record to refuse to issue a certificate for domain identified in the hostname field in step 2, above.

    • A Flag value of 127 or less will result in no action or further consideration by a CA.

  4. Select the desired Tag value:

    • ISSUE This property authorizes the holder of the domain specified in the "value" field to issue certificates for the domain for which the property is published.

    • ISSUEWILD This property acts like issue but allows wildcard certificates.

    • IODEF This property specifies a method for CAs to report to the domain holder when a certificate is issued. Not all CAs support this tag, so there is no guarantee that all certificate issuances will be reported.

  5. Define the Value for the Record

    • For ISSUE and ISSUEWILD tags, the value specifies the CA which is to be permitted to issue certificates for the domain identified in the hostname field in step 2, above. To prohibit the issuance of certificates, a value of ';' is used.

    • For IODEF tags, provide an email address which will be notified upon issuance of an SSL certificate for the domain identified in the hostname field in step 2, above. Alternatively, a URL can be supplied as a destination for RID Message, if supported by the CA.

  6. Click “Apply Now” at the bottom of the page.

NOTE: More than one CAA Record for a particular hostname may be created. For example, one ISSUE and one IODEF record may be created.


TRANSPORT LAYER SECURITY AUTHENTICATION (TLSA RECORD)

A Transport Layer Security Authentication (TLSA) Record is used to allow X.509 certificates, commonly used for Transport Layer Security (TLS), to be bound to DNS names using Domain Name System Security Extensions (DNSSEC) as a way to authenticate TLS client and server entities without a certificate authority (CA).

ADDING A TLSA RECORD

  1. Click Add new TLSA Record

  2. Enter in the hostname of your choice in the Hostname field (or leave blank to apply the record to the root of the domain).

  3. Enter the desired Port number (typically 443)

  4. Enter the desired Protocol (typically tcp)

  5. Select the desired Usage value

    • 0 PKIK-TA: Certificate Authority Constraint

    • 1 PKIX-EE: Service Certificate Constraint

    • 2 DANE-TA: Trust Anchor Assertion

    • 3 DANE-EE: Domain Issue Certificate

  6. Choose a Selector Value

    • 0 Cert: Use Full Certificate

    • 1 SPKI: Use Subject Public Key

  7. Select the desired Matching Type value

    • 0 Full: No Hash

    • 1 SHA-256: SHA-256 Hash

    • 2 SHA-512: SHA-512 Hash

  8. Enter or Generate a Record Value

    • If choosing to generate a Record Value, in the subsequent pop-up window paste in the entirety of the Certificate which the TLSA record will pertain to. A Record Value will then be generated using a combination of the previously chosen Selector Value, Matching Type and the Certificate itself.

  9. Click “Apply Now” at the bottom of the page.


AUTHORITY SETTING (SOA RECORD)

The Start of Authority or SOA record

Closed

determines how often the secondary servers will refresh their information with the primary name server, as well as how long to wait before retrying if the connection fails. It also controls how long to wait before giving up if the connection keeps failing.

This particular section should not need to be edited, except by advanced users. The default settings for this section are all fairly standard, and changing them would not have a large impact on your DNS.

CUSTOM LABEL

The DNS records on page can be given a label and saved for future re-use or reference within the Version portion of the interface

SCHEDULE

In addition to applying DNS updates instantly, updates can instead be schedule to be applied at a future date and time. See also: "Scheduling DNS Updates"

Did this answer your question?