From a network perspective, DNS and DNSSEC packets are very similar,
 DNSSEC packets are just bigger, which means DNS is more likely to use TCP. You
 should test for the following two items, to make sure your network is ready
 for DNSSEC:
  
- DNS over TCP: Verify network connectivity
    over TCP port 53, this may mean updating firewall policies or Access
    Control List (ACL) on routers. See the section called “Wait... DNS Uses TCP?” more
    details.
 - Large UDP packets: Some network equipment such as
    firewalls may make assumptions about the size of DNS UDP packets and incorrectly
    reject DNS traffic that appears "too big". You should verify that the
    responses your nameserver generates are being seen by the rest
    of the world.  See the section called “What's EDNS All About (And Why Should I Care)?” for
    more details.