DNS, DHCP & IP Address Management appliances
For Microsoft DNS & DHCP servers
For open source DNS & DHCP servers
Cloud-based visualization of analytics across DDI architecture
Manage multi-vendor cloud DNS servers centrally
RIR Declaration Management and Automation
Automated network device configuration and management
Centralized visibility over all your clouds
A single source of truth for your network automation
Why DDI is an Obvious Starting Point
DNS Threat Intelligence for proactive defense
Intelligence Insights for Threat Detection and Investigation
Adaptive DNS security for service continuity and data protection
Improve Application Access Control to prevent spread of attacks
Protect users and block DNS-based malware activity
Carrier-grade DNS DDoS attack protection
Optimize application delivery performance from the edge
for Proactive Network Security
Visibility, analytics and micro segmentation for effective Zero Trust strategy
Enable work from anywhere by controlling access, security and data privacy
Simplify management and control costs across AWS, Azure and GCP environments
Policy enforcement, risk management, and automation for simplifying compliance
Risk-free migration to reduce DDI complexity and cost
Move risk-free to improve performance, security and costs
Automate management, unify control and strengthen security of connected devices
Protect your network against all DNS attacks, data exfiltration and ransomware
Enable zero touch operations for network management and security
Improve resiliency, deployment velocity and user experience for SD-WAN projects
Integrated DNS, DHCP, IPAM services to simplify, automate and secure your network.
Simplify design, deployment and management of critical DDI services for telcos
Optimize administration and security of critical DDI services for healthcare
Simplify and automate management of critical DDI services for finance
Simplify and automate management of critical DDI services for higher education
Simplify and automate management of critical DDI services for retail
Simplify Management and Automation for Network Operations Teams
Elevate SecOps Efficiency by Simplifying Threat Response
Open architecture for DDI integration
Technology partnerships for network security & management ecosystems
Extend security perimeters and strengthen network defenses
Submit requests for temporary licenses
Submit access requests for EfficientIP knowledge platforms
Submit membership requests for EfficientIP Community
Strengthen your network security with insights from the Forrester 2025 Study on DNS Security.
Customer-centric DDI project delivery and training
Acquire the skills needed to manage EfficientIP SOLIDserverโข
Identify vulnerabilities with an assessment of your DNS traffic
Test your protection against data breaches via DNS
Dedicated representation for your organization inside EfficientIP
Explore content which helps manage and automate your network and cloud operations
Read content which strengthens protection of your network, apps, users and data
Learn how to enhance your app delivery performance to improve resilience and UX
See all your assets in one place
This enterprise-grade cloud platform allows you to improve visibility, enhance operational efficiency, and optimize network performance effortlessly.
Who we are and what we do
Meet the team of leaders guiding our global growth
Technology partnerships for network security and management ecosystems
Make your cloud projects successful with insights from the 2025 EMA Hybrid Multi-cloud Report.
Discover the benefits of the SmartPartner global channel program
Become a part of the innovation
The latest updates, release information, and global events
Which transport protocol is most commonly used: UDP or TCP for DNS?DNS uses both UDP and TCP on port 53. UDP (User Datagram Protocol) is the default transport for most DNS queries because it is fast and connectionless; TCP (Transmission Control Protocol) is used when reliability, ordering, or larger payloads are required โ for example when a UDP reply is truncated, for DNSSEC-signed responses, or for zone transfers between authoritative servers.
When a client issues a DNS query, it typically sends a small packet over UDP to the target server at the DNS port, which is port 53. UDP is a lightweight transport protocol that avoids the overhead of establishing a connection, so the round-trip time is minimal. For the majority of name lookups โ a query and a short response carrying address or resource record information โ UDP provides the best trade-off between performance and resource usage. Servers and recursive resolvers can handle very high query rates with minimal per-query state because UDP does not require maintaining open connections.
UDP offers specific operational benefits that make it the preferred first choice for DNS communication and the majority of use cases:
The trade-off is that UDP does not guarantee delivery or ordering. When reliability or larger size matters, DNS relies on TCP.
DNS switches to TCP in defined situations:
In short: UDP is the fast path; TCP is the reliable path when the application (DNS) or network conditions require it.
The fallback process is simple and deterministic:
A client sends a DNS query over UDP to destination port 53.The server prepares a response. If the response cannot be safely delivered in a single UDP packet (given the negotiated EDNS buffer), it returns a UDP empty reply with the TC (truncated) flag set. The client detects TC=1 and opens a TCP connection to the same server on port 53, resends the query, and receives the full, ordered response. For zone transfer, the entire exchange is negotiated and executed over TCP from the start.
This design preserves UDPโs low-latency benefits while providing TCP as a fallback connection for completeness.EDNS and UDP packet size limits EDNS(0) extensions allow a client to advertise a larger UDP buffer than the original 512-byte limit. Common negotiated sizes are 1232 or up to 4096 bytes. EDNS reduces the frequency of TCP fallbacks but increases the risk of IP fragmentation on networks with small MTUs. Operational best practice is to choose a conservative EDNS buffer (for example, 1232 bytes) that reduces unnecessary TCP retries while minimizing fragmentation that can disrupt DNS communication.
The importance of properly handling EDNS settings and buffer sizes was notably highlighted during DNS Flag Day 2020, which emphasized compliance with modern DNS standards and better interoperability between resolvers and authoritative servers.
Supporting both transports is required for protocol compliance and robust service:
A server that only supports UDP risks failing to serve complete information to a subset of clients or failing zone replication.
Network architects should configure firewalls and NAT devices with DNS behavior in mind:
Encrypted DNS transports aim to enhance privacy, integrity, and security between clients and resolvers by encrypting DNS queries and responses. Each protocol, however, operates differently and is suited for specific use cases.
DNS over TLS (DoT) typically uses TCP port 853, providing confidentiality and integrity between client and resolver. It establishes an encrypted channel using TLS, ensuring that DNS traffic cannot be easily intercepted or tampered with.
DNS over HTTPS (DoH) runs over HTTPS/TCP 443, blending DNS traffic into standard web traffic. This makes it harder for intermediaries to distinguish or block DNS requests, though it can complicate enterprise traffic inspection and policy enforcement.
Both DoT and DoH rely on TCP/TLS, complementing classic DNS operations rather than replacing them โ for instance, UDP/TCP 53 remains necessary for server-to-server communication, such as zone transfers.
DNS over QUIC (DoQ) introduces a newer encrypted transport that combines TLS 1.3 security with the QUIC protocolโs performance benefits. Running over UDP port 8853, DoQ enables faster connection setup, multiplexing of multiple queries, and greater resilience to packet loss. By eliminating TCP handshakes, it achieves lower latency and improved efficiency while maintaining strong encryption and privacy protection.
Although DoQ adoption is still emerging, it represents the next step in encrypted DNS, offering an ideal balance between security, performance, and modern network compatibility for organizations seeking cutting-edge DNS privacy solutions.
Case: An authoritative DNS operator receives reports of intermittent resolution failures. Monitoring shows many UDP replies with TC=1 but few successful TCP retries.Diagnosis: Firewall or middlebox is blocking TCP/53 or dropping fragmented large UDP packets.Fix: Ensure authoritative servers accept TCP/53, update firewall rules to allow TCP/53 between resolvers and authoritative servers, and tune EDNS buffer size to reduce fragmentation while maintaining necessary response capacity. This restores reliable delivery of DNSSEC-signed resource records and large responses.
Q โ Does using TCP for DNS significantly slow down lookups?A โ TCP introduces a connection handshake, so a TCP-based lookup will often have slightly higher latency than a single UDP exchange. However, TCP is only used when necessary (large responses, DNSSEC, zone transfers), so the performance impact is limited to those cases. Proper caching, tuned EDNS settings, and keeping TCP available mitigate perceived delays.
Q โ How can I check if a resolver or server is using TCP for DNS?A โ Use network tools like dig with the +tcp option (e.g. dig @resolver example.com +tcp) to force a TCP query and compare results. Packet captures (tcpdump/ Wireshark) can also show whether responses arrive over UDP or TCP and reveal truncated (TC) flags in UDP replies.
Q โ What firewall rules should I apply for DNS?A โ Allow destination port 53 for both UDP and TCP between clients/resolvers and authoritative servers where resolution and zone transfers are required. For outbound queries from clients, permit UDP/TCP to destination port 53; for authoritative zones, ensure TCP/53 is allowed for secondary servers and replication. Also monitor and rate-limit to reduce abuse.
Q โ How does DNSSEC affect the choice between UDP and TCP?A โ DNSSEC increases the size of DNS responses (signatures, RRSIGs), which raises the likelihood of truncation over UDP and therefore more TCP fallbacks. Proper EDNS sizing and supporting TCP/53 are essential to reliably serve DNSSEC-signed zones.
Q โ Will enabling DoT or DoH remove the need to support UDP/TCP on port 53?A โ No. DoT and DoH provide encrypted client-to-resolver channels (ports 853 and 443) but do not replace classic DNS/53 for resolver-to-authoritative communication. You should support DoT/DoH for privacy where appropriate, while still allowing standard DNS transports for operational tasks.
Q โ What monitoring metrics should I track to ensure DNS health?A โ Track UDP vs TCP query ratios, the rate of UDP responses with the TC (truncated) flag, TCP fallback success rates, EDNS buffer negotiation failures, and zone transfer success rates. Alert on spikes in truncation or failed TCP retriesโthey often indicate firewall issues, fragmentation problems, or misconfigured resolvers.
Q โ Can DNS run entirely over TCP if needed?A โ Technically yes โ DNS can operate over TCP for queries and transfers โ but running all traffic over TCP removes UDPโs performance and scalability benefits. Most deployments use UDP for the fast path and TCP when reliability or larger payloads are required.
Q โ How do I troubleshoot clients that never fall back to TCP after truncation?A โ Verify that the clientโs network path allows TCP/53 (firewalls, NATs, middleboxes), confirm the resolver behavior (some resolvers may be misconfigured), and inspect for IP fragmentation issues due to oversized UDP packets. For stubborn cases, temporarily lower EDNS buffer size and capture traffic to observe whether TCP retries are attempted and if they are being blocked.
This topic shows that DNS is pragmatic: it uses UDP for speed and efficiency, but retains TCP on port 53 when reliability, order, or larger payloads are required. For resilient DNS service, network teams must treat port 53 as a dual-transport endpoint, tune EDNS and MTU behavior, and monitor both UDP and TCP paths so clients reliably receive the address and resource information they need.