[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-20。"],[[["\u003cp\u003eThis guide provides instructions on how to enable DNSSEC for both new and existing managed public zones using the Google Cloud console, \u003ccode\u003egcloud\u003c/code\u003e command-line tool, and Terraform.\u003c/p\u003e\n"],["\u003cp\u003eDNSSEC deployment can be verified through tools like DNSViz, Verisign DNSSEC debugger, and Zonemaster to ensure correct configuration and the placement of the DS record in the parent zone.\u003c/p\u003e\n"],["\u003cp\u003eWhen using DNSSEC-enabled zones, it's recommended to avoid TTLs longer than 259200 seconds (3 days), as TTL expirations and DNSSEC signature expirations can cause issues if they conflict.\u003c/p\u003e\n"],["\u003cp\u003eDisabling DNSSEC requires deactivating it at the domain registrar before turning it off using \u003ccode\u003egcloud\u003c/code\u003e to ensure DNSSEC-validating resolvers can still access the names in the zone.\u003c/p\u003e\n"],["\u003cp\u003eDNSSEC cannot be enabled for existing zones that have over 3000 resource records, in that case, it is recommended to create a new zone with DNSSEC enabled.\u003c/p\u003e\n"]]],[],null,["# Manage DNSSEC configuration\n\nThis page describes how to enable and disable Domain Name System Security\nExtensions (DNSSEC), and verify DNSSEC deployment.\n\nFor a conceptual overview of DNSSEC, see the [DNSSEC overview](/dns/docs/dnssec).\n| **Note:** You cannot enable or disable DNSSEC for existing zones that have more than 3000 resource record sets. To sign existing large zones, consider setting up a new zone with the same DNS name with DNSSEC enabled, populating it with your resource record sets in additional operations, and changing your delegation to point to the name server set for the new zone that has DNSSEC enabled.\n\nEnable DNSSEC for existing managed public zones\n-----------------------------------------------\n\nTo enable DNSSEC for existing managed public zones, follow these steps. \n\n### Console\n\n1. In the Google Cloud console, go to the **Cloud DNS** page.\n\n [Go to Cloud DNS](https://console.cloud.google.com/net-services/dns/)\n2. Click the zone name for which you want to enable DNSSEC.\n\n3. On the **Zone details** page, click **Edit**.\n\n4. On the **Edit a DNS zone** page, click **DNSSEC**.\n\n5. Under **DNSSEC** , select **On**.\n\n6. Click **Save**.\n\nYour selected DNSSEC state for the zone is displayed in the **DNSSEC**\ncolumn on the **Cloud DNS** page.\n\n### gcloud\n\nRun the following command: \n\n```\ngcloud dns managed-zones update EXAMPLE_ZONE \\\n --dnssec-state on\n```\n\nReplace \u003cvar translate=\"no\"\u003eEXAMPLE_ZONE\u003c/var\u003e with the zone ID.\n\n### Terraform\n\n resource \"google_dns_managed_zone\" \"example\" {\n name = \"example-zone-name\"\n dns_name = \"example.com.\"\n description = \"Example Signed Zone\"\n dnssec_config {\n state = \"on\"\n }\n }\n\nEnable DNSSEC when creating zones\n---------------------------------\n\nTo enable DNSSEC when you are creating a zone, follow these steps. \n\n### Console\n\n1. In the Google Cloud console, go to the **Cloud DNS** page.\n\n [Go to Cloud DNS](https://console.cloud.google.com/net-services/dns/)\n2. Click **Create zone**.\n\n3. In the **Zone name** field, enter a name.\n\n4. In the **DNS name** field, enter a name.\n\n5. Under **DNSSEC** , select **On**.\n\n6. Optional: Add a description.\n\n7. Click **Create**.\n\n### gcloud\n\nRun the following command: \n\n```\ngcloud dns managed-zones create EXAMPLE_ZONE \\\n --description \"Signed Zone\" \\\n --dns-name myzone.example.com \\\n --dnssec-state on\n```\n\nReplace \u003cvar translate=\"no\"\u003eEXAMPLE_ZONE\u003c/var\u003e with the zone ID.\n\nVerify DNSSEC deployment\n------------------------\n\nTo verify correct deployment of your DNSSEC-enabled zone, make sure that you\nplaced the correct DS record in the parent zone. DNSSEC resolution\ncan fail if either of the following occurs:\n\n- The configuration is wrong, or you have mistyped it.\n- You have placed the incorrect DS record in the parent zone.\n\nTo verify that you have the right configuration in place and to cross-check the\nDS record before placing it in the parent zone, use the following tools:\n\n- [DNSViz](https://dnsviz.net/)\n- [Verisign DNSSEC debugger](https://dnssec-analyzer.verisignlabs.com/)\n- [Zonemaster](https://zonemaster.net/)\n\nYou can use the Verisign DNSSEC debugger and Zonemaster sites to validate your\nDNSSEC configuration *before* you update your registrar with your Cloud DNS\nname servers or DS record. A domain that is properly configured for DNSSEC is\n[`example.com`](http://dnsviz.net/d/www.example.com/dnssec),\nviewable using DNSViz.\n\nRecommended TTL settings for DNSSEC-signed zones\n------------------------------------------------\n\nTTL is the time to live (in seconds) for a DNSSEC-signed zone.\n| **Important:** In DNSSEC-enabled zones, avoid TTLs longer than **259200** (3 days).\n\nUnlike TTL expirations, which are relative to the time a name server sends a\nresponse to a query, DNSSEC signatures expire at a fixed absolute time.\nTTLs configured longer than a signature lifetime can lead to many clients\nrequesting records at the same time as the DNSSEC signature expires.\nShort TTLs can also cause problems for DNSSEC-validating resolvers.\n\nFor more recommendations about TTL selection, see\n[RFC 6781 section 4.4.1 Time Considerations](https://tools.ietf.org/html/rfc6781#section-4.4.1)\nand [RFC 6781 Figure 11](https://tools.ietf.org/html/rfc6781#page-50).\n| **Note:** Having a TTL that is at least a few times smaller than your signature validity period avoids query load peaks.\n\nWhen reading RFC 6781 section 4.4.1, consider that many signature time\nparameters are fixed by Cloud DNS and you cannot change them.\nYou cannot change the following parameters (subject to change without notice or update to this document):\n\n- Inception offset = 1 day\n- Validity period = 21 days\n- Re-sign period = 3 days\n- Refresh period = 18 days\n- Jitter interval = ½ day (or ±6 hours)\n- Minimum signature validity = refresh -- jitter = 17.75 days = 1533600\n\nYou must never use a TTL longer than the minimum signature validity.\n\nDisable DNSSEC for managed zones\n--------------------------------\n\n| **Important:** Before disabling DNSSEC for a managed zone that you want to use, you must [deactivate DNSSEC at your domain registrar](/dns/docs/registrars#del-ds) to ensure that DNSSEC-validating resolvers can still resolve names in the zone.\n\nAfter you have removed DS records and waited for them to expire from cache,\nyou can use the following `gcloud` command to turn off DNSSEC: \n\n```\ngcloud dns managed-zones update EXAMPLE_ZONE \\\n --dnssec-state off\n```\n\nReplace \u003cvar translate=\"no\"\u003eEXAMPLE_ZONE\u003c/var\u003e with the zone ID.\n\nWhat's next\n-----------\n\n- To get information about specific DNSSEC configurations, see [Use advanced DNSSEC](/dns/docs/dnssec-advanced).\n- To work with managed zones, see [Create, modify, and delete zones](/dns/docs/zones).\n- To find solutions for common issues that you might encounter when using Cloud DNS, see [Troubleshooting](/dns/docs/troubleshooting).\n- To get an overview of Cloud DNS, see [Cloud DNS overview](/dns/docs/overview)."]]