From a network perspective, DNS and DNSSEC packets are very similar, DNSSEC packets are just bigger, which means DNS is more likely to use TCP. You should test for the following two items, to make sure your network is ready for DNSSEC:
- DNS over TCP: Verify network connectivity over TCP port 53, this may mean updating firewall policies or Access Control List (ACL) on routers. See the section called “Wait... DNS Uses TCP?” more details.
- Large UDP packets: Some network equipment such as firewalls may make assumptions about the size of DNS UDP packets and incorrectly reject DNS traffic that appears "too big". You should verify that the responses your nameserver generates are being seen by the rest of the world. See the section called “What's EDNS All About (And Why Should I Care)?” for more details.