You want an awesome ad blocker on your local network using Pi-hole , but don’t want to dig for answers? You’re in the right place. This quick guide will walk you through the generic Raspberry Pi setup, install and configure Pi-hole, then manually connect devices.
Why manually connect devices instead of the Pi-hole default? If you live with other people, they get frustrated when their browsing experience breaks inexplicably. In my experience, they are not amazed by how many ad requests you’ve blocked enough to warrant the interruptions.
These steps assume you want to have your Pi connected to your local Wi-Fi network and use SSH.
Alternative: SSH over USB
It turns out it’s also possible to connect directly over a USB connection! These are the directions if you want to try it - it changes the Pi config so you are able to SSH over the USB connection as if it was Ethernet, how cool!
Install the Raspberry Pi official imaging tool .
Load SD card into adapter and connect to your computer.
Using the imaging tool, load the standard Raspberry Pi OS .
You should now see a
bootdrive available. You’ll know you’re in the right place if you see several
*.elffiles. We’ll make a couple small tweaks to enable headless Wi-Fi access.
Boot up your Pi and try connecting to the default address
Once you’re inside, you’ll want to use
sudo raspi-config to edit the password as well as the hostname, for security reasons and to avoid conflicts if you end up with more Pis in the future. After making your changes, reboot, and try connecting again.
(Optional) Security people will tell you should also set up your own user that isn’t
pi and remove
pi so an attacker trying default Raspberry Pi credentials can’t get into your machine.
🤖 You’re ready to get Pi-hole running!
The maintainers of the project do an excellent job keeping this step as friction free as possible.
Set a static IP in the Netgear dashboard.
sshing to the Pi, run the install script
. ⭐ Make sure to save the password it gives you.
Once loading and setup have finished, reboot the Pi. Give it a minute or two, then in your browser try navigating to
http://<static_ip>/admin. If everything went well, you should be greeted by the Pi-hole admin dashboard🥧🕳!
There are several ways to use Pi-hole on your network to protect devices , as I mentioned earlier, we’ll only be covering the manual device configuration here. If you’re dipping your toes into the idea and live with others, I do recommend this approach to start and deciding to expand later on.
Linux laptop - followed the steps to edit network DNS servers from the article above .
One of the most interesting things I find from running network-level ad blocking is seeing the amount of background activity as you browse. Even simple pages might load a chat client, feature flag, crash-reporting, telemetry, and more! I’ve noticed this to be especially true for mobile devices. It may look like they’re sitting quietly while you sleep, but they are actually a hum of activity all night. You’ll run into all sorts of fun here, so welcome to the world of Pi-hole - adventure awaits!
With a few small tweaks, take the default terminal and make it uniquely yours - then watch your dotfiles evolve as you find new tricks for your toolkit.
Configure Obsidian for seamless daily notes by adding the Periodic Notes, Templater, and Calendar community plugins.
DNS sinkholes like Pi-hole have to rapidly decide whether a new URL is allowed - what data structures might they use under the hood to enable quick responses?