No, that's not it. Going back to my original post, it's about the ability of a router to block a site. The issue is that I believed the router when it said it could block a site. It seems that my definition of "Blocked" is terribly inaccurate. 

No. If you setup a raspberry pi / x86 pi-hole dns (with dhcp service running) server It will "block" the entire network if you disable dhcp on the router. All devises in on your network will use pi-hole as the dns server.That would work for a single device but not the entire network, correct?
It's not what I was after.
That snippet was referring to the Hosts file. Which is device specific. Is it not?No. If you setup a raspberry pi / x86 pi-hole dns (with dhcp service running) server It will "block" the entire network if you disable dhcp on the router. All devises in on your network will use pi-hole as the dns server.
So any device on the network want to visit a website ex. blockedsite.com, or a webpage embedded with links pointing to blockedsite.com, it will get an ip address 0.0.0.0 instead an correct ip address aa.bb.cc.dd. When router see an ip address 0.0.0.0, it will not route the data packets to the internet at all to request the website's contents. That's how a website is blocked.
Yep. If you go with editing hosts file, then it's device specific. You will have to edit hosts file on every pc/linux/mac. It's tedious and non practical.That snippet was referring to the Hosts file. Which is device specific. Is it not?
Where did you even get Pi-Hole from? DNS and PiHole are not the same thing.Using pi-hole or any ad-blocking dns is not always positive, however. Sometimes it will block too much and causes problem with a website like Vons.com, where the site will not load properly since it's webpages have may ad-links or popups, and those ads are exactly what you want to see.
To make it load properly, you have to look at pi-hole logs to figure out what ads domains are blocked to cause issues. That's not an easy job sometimes. Personally I use Ghostery extension for Chrome instead using ad-blocking dns.
Well, you are right Pi-Hole is not exactly a DNS , it's just a DNS forwarder. BIND/UNBOUND/Technitium are. Calling Pi-Hole a DNS is easier for most people.Where did you even get Pi-Hole from? DNS and PiHole are not the same thing.
If OP wants adblocking, which isn't even a topic of discussion until you brought it up, each device should have its own blocker.
Back to the subject at hand, @IGotAnAngle look into setting up the DNS caching. It's simple-ish to do and in general a good starter Pi project (if you're not familiar it it) and can slightly boost network response as all the hops to the DNS server are eliminated after the first call.
And ANY desired domain can be added to PIHole for blocking. It is a local DNS provider, which like all local DNS providers forwards to an authoritative DNS.Well, you are right Pi-Hole is not exactly a DNS , it's just a DNS forwarder. BIND/UNBOUND/Technetium are. Calling Pi-Hole a DNS is easier for most people.
Incorrect for this discussion. It will not keep a 'local log' and will go out to OpenDNS every time.And ANY desired domain can be added to PIHole for blocking. It is a local DNS provider, which like all local DNS providers forwards to an authoritative DNS.
Nailed it.Pi-Hole is based on dnsmasq, it will not do recursive and iterative queries.
https://thekelleys.org.uk/dnsmasq/doc.html
View: https://www.youtube.com/watch?v=PS0UppB3-fg
most home router's 3rd party firmware use it as a very simple local dns
Pi-Hole expand dnsmasq's functionality in a very big way but still not a real dns.
Personally I highly recommend Technitium DNS https://technitium.com/dns/
PIHole does keep a local blacklist and whitelist. Will it (the PI) consult the upstream DNS before or after the local blacklist? I haven't researched that. BUT the end result is that the blacklisted domain is not translated to the requesting client.Incorrect for this discussion. It will not keep a 'local log' and will go out to OpenDNS every time.