By using Govaio Network services, you agree to our terms, policies, and acceptable use rules. Services may be modified or terminated for violations.
Effective Date: 26/01/2026.
This DNS Server Policy (“Policy”) governs the use, configuration, and operation of Domain Name System (“DNS”) services provided by Govaio Network (“Govaio”, “we”, “us”, “our”) via https://www.govaio.com.
By using Govaio DNS services, you agree to comply with this Policy in addition to our Terms & Conditions, Acceptable Use Policy, Service Level Agreement (SLA), and Domain Policy.
The purpose of Govaio DNS services is to:
Provide reliable domain name resolution
Ensure high availability and low latency
Protect against DNS abuse and attacks
Maintain global DNS stability and integrity
This Policy applies to:
Authoritative DNS hosting
Managed DNS
Shared DNS infrastructure
Dedicated DNS services (where applicable)
DNS records associated with domains using Govaio services
3.1 Govaio provides DNS services on a best-effort basis, subject to SLA where applicable.
3.2 DNS uptime targets:
99.9% monthly availability for managed DNS services
3.3 Downtime exclusions:
Scheduled maintenance
DDoS attacks beyond mitigation capacity
Registry or upstream provider issues
Customer misconfiguration
3.1 Govaio provides DNS services on a best-effort basis, subject to SLA where applicable.
3.2 DNS uptime targets:
99.9% monthly availability for managed DNS services
3.3 Downtime exclusions:
Scheduled maintenance
DDoS attacks beyond mitigation capacity
Registry or upstream provider issues
Customer misconfiguration
5.1 Supported record types include:
A, AAAA
CNAME
MX
TXT
SRV
NS
PTR (where supported)
5.2 Unsupported or malformed records may be rejected.
5.3 Customers must not configure records that:
Facilitate spam or phishing
Enable malware or botnets
Bypass security mechanisms
6.1 DNS changes are not instantaneous.
6.2 Propagation time depends on:
TTL values
ISP caching behavior
Global resolver caching
6.3 Govaio is not responsible for delays caused by third-party resolvers.
6.1 DNS changes are not instantaneous.
6.2 Propagation time depends on:
TTL values
ISP caching behavior
Global resolver caching
6.3 Govaio is not responsible for delays caused by third-party resolvers.
DNS services must NOT be used for:
Fast-flux hosting
Command-and-control infrastructure
Phishing redirection
Malware distribution
DNS tunneling without permission
8.1 Govaio enforces query rate limits to:
Prevent abuse
Protect infrastructure
8.2 Excessive DNS queries may result in:
Temporary rate limiting
Suspension of DNS service
9.1 DNS changes are logged for:
Security auditing
Troubleshooting
Abuse investigation
9.2 Customers are responsible for:
Maintaining internal change records
Limiting access to DNS management panels
9.1 DNS changes are logged for:
Security auditing
Troubleshooting
Abuse investigation
9.2 Customers are responsible for:
Maintaining internal change records
Limiting access to DNS management panels
10.1 Proper DNS configuration is essential for email delivery.
10.2 Customers are responsible for:
Correct MX records
SPF, DKIM, and DMARC TXT records
10.3 Govaio is not responsible for email delivery issues caused by DNS misconfiguration.
11.1 Govaio may suspend DNS services for:
Abuse complaints
Policy violations
Legal requirements
Non-payment
11.2 Suspension may result in domain resolution failure.
12.1 DNS logs may be retained for:
Security monitoring
Abuse handling
Compliance purposes
12.2 Logs are handled in accordance with the Data Protection Policy.
Govaio is not liable for:
Downtime caused by DNS misconfiguration
Third-party resolver failures
Customer errors
Registry-level outages
Govaio is not liable for:
Downtime caused by DNS misconfiguration
Third-party resolver failures
Customer errors
Registry-level outages
Govaio may modify this Policy at any time.
Changes take effect upon publication.
This Policy is governed by the laws of India, with exclusive jurisdiction of Indian courts.
These scopes apply to customers who subscribe to Dedicated DNS or Enterprise DNS services provided by Govaio Network.
Dedicated nameservers (NS) assigned per customer or organization
No shared DNS zones with other customers
Independent DNS configuration and zone management
No reputation impact from other users
Enhanced security and privacy
Ideal for banks, SaaS, enterprises, and resellers
Anycast-enabled DNS nodes
Multiple geographic locations
Traffic routed to nearest DNS node
Faster resolution globally
Improved redundancy
Higher DDoS resilience
White-labeled nameservers (e.g. ns1.customer.com)
Branded DNS for resellers and enterprises
Custom reverse DNS (rDNS) where applicable
Brand trust
Professional presentation
Better client retention for resellers
DNSSEC signing
DDoS protection (L3/L4/L7 DNS attacks)
Query rate limiting per zone
Zone transfer restrictions (AXFR/IP allowlist)
Protection from DNS hijacking
Compliance with enterprise security standards
Reduced attack surface
DNSSEC signing
DDoS protection (L3/L4/L7 DNS attacks)
Query rate limiting per zone
Zone transfer restrictions (AXFR/IP allowlist)
Protection from DNS hijacking
Compliance with enterprise security standards
Reduced attack surface
Higher DNS query-per-second (QPS) limits
No aggressive throttling
Priority processing during peak loads
Stable performance for high-traffic websites
Suitable for APIs, apps, and large portals
DNS change history
Role-based access control (RBAC)
Multi-user access with permissions
Change approval workflows (optional)
Reduced human error
Enterprise governance
Audit readiness
Higher uptime SLA (e.g. 99.99%)
Faster incident response
Priority escalation path
Mission-critical reliability
Contractual assurance
Higher uptime SLA (e.g. 99.99%)
Faster incident response
Priority escalation path
Mission-critical reliability
Contractual assurance
Automated health checks
Failover between IPs or regions
Weighted or priority-based routing
High availability
Disaster recovery support
DNS management API
Infrastructure-as-code compatibility
Automated zone updates
DevOps-friendly
Faster deployments
Reduced manual errors
Ultra-low TTL support
Granular cache control
Rapid change propagation options
Fast failover
Dynamic applications
Blue-green deployments
Data residency options (where available)
Audit documentation
Compliance reporting support
Enterprise & government readiness
Easier vendor onboarding
Priority support queue
Direct NOC escalation
Named technical contact (optional)
Faster resolution
Higher accountability
Dedicated DNS is recommended for:
Financial institutions
SaaS platforms
High-traffic eCommerce
Enterprises & government entities
Large resellers
API-driven applications
DNS FAILOVER POLICY
This DNS Failover Policy (“Policy”) defines the scope, operation, limitations, and responsibilities related to DNS-based failover services provided by Govaio Network (“Govaio”, “we”, “us”, “our”).
This Policy applies to customers using Managed DNS, Dedicated DNS, or Enterprise DNS services with failover functionality enabled.
The purpose of DNS failover is to:
Improve service availability
Redirect traffic during outages
Reduce downtime impact
Provide disaster recovery support
DNS failover operates at the DNS level and is not a substitute for application-level redundancy.
The purpose of DNS failover is to:
Improve service availability
Redirect traffic during outages
Reduce downtime impact
Provide disaster recovery support
DNS failover operates at the DNS level and is not a substitute for application-level redundancy.
Failover is triggered based on automated health checks, which may include:
ICMP (Ping)
TCP port checks
HTTP / HTTPS response codes
Custom endpoint checks (enterprise plans)
Health check intervals and thresholds are configurable per plan.
Failover actions may include:
Switching from primary IP to secondary IP
Routing traffic to backup region
Weighted or priority-based routing
Failover is dependent on DNS TTL values and global resolver caching.
4.1 DNS failover is not instantaneous.
4.2 Actual failover time depends on:
Configured TTL
ISP and resolver cache behavior
End-user DNS settings
4.3 Ultra-low TTLs may be supported on Dedicated DNS but may increase query load.
Customers are responsible for:
Configuring valid primary and secondary endpoints
Maintaining functional backup infrastructure
Testing failover regularly
Selecting appropriate TTL values
Govaio does not create or manage customer backend infrastructure unless explicitly agreed.
Supported:
Active-Passive setups
Regional failover
Disaster recovery redirection
Not supported:
Application-level session persistence
Database replication
Load balancing beyond DNS level
Supported:
Active-Passive setups
Regional failover
Disaster recovery redirection
Not supported:
Application-level session persistence
Database replication
Load balancing beyond DNS level
7.1 DNS failover for email (MX records):
Does not guarantee message delivery
Depends on sender retry behavior
7.2 Email failover is best-effort only.
8.1 Customers are encouraged to:
Perform scheduled failover tests
Validate DNS responses
Verify application behavior
8.2 Govaio is not responsible for service disruption caused by testing.
9.1 Govaio may provide:
Health check status
Failover event logs
Alerts (email or dashboard)
9.2 Alert delivery depends on customer contact details.
Govaio is not responsible for failover failure caused by:
Misconfigured DNS records
High TTL values
Third-party DNS resolvers
Backend application failures
Force majeure events
DNS failover must not be used to:
Evade abuse detection
Hide malicious infrastructure
Rotate endpoints for illegal activity
Violation may result in suspension.
Govaio may suspend DNS failover services for:
Policy violations
Non-payment
Abuse investigations
Legal requirements
Failover-related logs may include:
Health check results
Failover timestamps
Endpoint status
Logs are handled per the Data Protection Policy.
DNS failover is provided on a best-effort basis.
Govaio does not guarantee:
Zero downtime
Immediate traffic redirection
Specific recovery times
Govaio may modify this Policy at any time.
Changes take effect upon publication.
Govaio may modify this Policy at any time.
Changes take effect upon publication.
For DNS failover queries: