title: Enabling DNSSEC
created at: Tue Oct 22 2024 17:43:08 GMT+0000 (Coordinated Universal Time)
updated at: Tue Oct 22 2024 18:05:37 GMT+0000 (Coordinated Universal Time)
---
# Enabling DNSSEC
# Enabling DNSSEC

DNSSEC activation involves several steps:
1. the system checks the maximum TTL in the domain zone;
2. signs the domain zone;
3. generates a chain of trust.
# Checking the maximum DNS TTL

The maximum DNS TTL must be less than 2 weeks. The default value is 3 hours.
To set the maximum TTL, navigate to **Domains** →\*\* Domain names\*\* →\*\* **select a domain → click **Records** →** TTL, sec\*\*. The default value is 1 hour (3600 sec).
# Signing domain zone
To sign a domain zone, go to **Domains **→** Domain names** → select a domain → click **Edit → Sign domain**. The system will start a background process to sign the domain zone. KSK and ZSK will be generated according to the specified parameters. When signing the domain zone, you will see the icon

in the \*\*Status \*\*column. You cannot **Edit** or **Delete** the domains during that process.
Once the system signs the domain zone you will see the notification icon

in the \*\*Status \*\*column. The "Unpublished DS-records" banner in the panel interface and the **DNSSEC** button will become active for the domain.
The domain zone signing function is available only to "Users" and "Administrators".
# Creating a chain of trust
To create a chain of trust, you need to transfer DS-records (or even DNSKEY-records KSK, depending on a registrar) into the parent zone. You can see the information about the main key parameters and their DNSKEY and DS records in **Domains** → **Domain names** → select a domain → **DNSSEC.**
The following data are displayed for every DS-record:
* Start of record — beginning of the DS-record;
* Tag — KSK-key identifier;
* Algorithm — encryption digest identifier;
* Digest type — digest type identifier;
* Digest — digest content.
Show DNSKEY — click the button to see a table with DNSKEY-records. The following data are shown for every record DNSKEY-record:
* Start of record — beginning of the DNSKEY-record;
* Flags — key type identifier;
* Protocol — DNSSEC protocol number;
* Algorithm — encryption algorithm identifier;
* Public key — public part of the key;
* Tag — KSK-key identifier.
DS-records are sent in one of the following ways:
1. Add records in the domain control panel interface on a registrar side. If records should be added in the form of strings on the registrar side, you need to group the values of all columns of the DS-record table in ISPmanager. Do not forget to add spaces between them.
2. If the domain zone is located along with the parent zone on the same server managed by [DNS management Portal](https://dns.illevante.com/) , on the **DNSSEC parameters** page, you will see the **Send DS-records to the parent zone** button. Click the button to pass the DS-records.
3. If the domain is the parent for the domain on the remote server, create the DS-records of the child domain: **Domain names → Records → Add**. Learn more in [DNS records](https://help.illevante.com/p/6WXF2Riyeez_-z/DNS-Records) .
Once in 24 hours, [DNS management Portal](https://dns.illevante.com/) checks DS-records in the parent zone. At least one DS-record for every KSK must be sent. Once completed, the warning in the **Status** column will change into the icon

confirming that the domain is protected with DNSSEC.