NEW to UNIFI VLANs?? START HERE!!!

Поделиться
HTML-код
  • Опубликовано: 26 дек 2024

Комментарии • 455

  • @TimPaddy
    @TimPaddy 8 месяцев назад +6

    Great great video. You are a terrific teacher.

  • @markhokanson2401
    @markhokanson2401 10 месяцев назад +67

    There are a lot of version of this walkthrough out there on RUclips, but (for me at least) this is the only one that took the appropriate time and amount of hand-holding that I need to not just implement the FW rules, but also to help me understand the WHY. That is huge!
    Thanks a ton!

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Thanks for watching. I'm so glad it helped you out.

    • @mzkx67
      @mzkx67 10 месяцев назад

      I am new to the Unifi dream router and loving the custom settings. I agree this is an excellent video that explains the settings very well.

  • @genxl86
    @genxl86 10 месяцев назад +17

    Finally one of those vlan guide that I can follow and understand easily. VLANS are not that scary after all. Cheers man!

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад +1

      Thanks for the comment. I am super happy to hear that it helped.

  • @chrismhaase
    @chrismhaase 8 месяцев назад +9

    Thanks! Great tutorial. I set it up and it works perfectly. A dual screen setup to watch the video and work on the other is the way to do it!!!

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад

      I’m happy to hear it got you set up. Thanks for the super tip.

    • @Lukeb53
      @Lukeb53 3 месяца назад +1

      Wait until you start getting into triple monitors. It's a game changer. Working with VM's on Linux? One screen for a video guide, one to interface, and another with common command templates to copy and paste. Playing video games? One screen for the game, one for discord, and another for a game guide or a map for reference. Researching a new product and comparing stuff? One screen for review videos or articles, one screen for searching product retailers, and another for documenting options and taking notes. The possibilities are endless.

  • @juhatalimaki6664
    @juhatalimaki6664 9 месяцев назад +4

    I am a Unifi virgin. I have watched many videos to try to understan the world of Unifi, this video is gold! You explain it well. Thank you!

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад +1

      Thanks. Hope you subscribed. Next week I’m going to cover the switching aspect of VLANs.

  • @SS-kg6ns
    @SS-kg6ns 11 месяцев назад +15

    Probably the only video with the new interface. Thanks for creating and being very detailed with background info for noobz.

  • @slmj615
    @slmj615 5 месяцев назад +9

    I watched several videos and this is the one where things started clicking. I loved the format of showing the vulnerability, applying the fix and confirming vulnerability is negated along with clear and concise explanations during the process. I also like that the gateways were isolated. Before this video, I was struggling to figure out why I could ping my gateway addresses even though my networks were isolated and now I know. This is the first ever super thanks I have given. It’s well deserved. I’ll be adding one to the follow up video on configuring VLANs on Unifi switches. Many things clicked in that video also.

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      A thousand thanks for your kind words and your generosity. I do my best to try and help the newbies of the Unifi space. I love getting feedback that tells me I was able to help... All the best!

  • @drewpecka
    @drewpecka 9 месяцев назад +6

    Top notch. Thank you!

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад +3

      Holy crap. Thank you so much. That is overly kind of you. So glad it helped.

  • @shyamkasundra675
    @shyamkasundra675 11 месяцев назад +27

    I am finally considering a Unifi setup now that their OS is more well-baked, and you had the most recent Unifi OS VLAN video, so I decided to stop by and see how things have improved over the last few years. However, I must say that this video is probably one for the best for anyone new to VLANs in general, not just VLANs on Unifi. You, sir, are the only one that “teaches one how to fish instead of just giving one a fish” by explaining the logic behind firewall rules, thus giving one the ability to not just copy your foundational firewall rules (which were spot on as the bare minimum starting point), but also gain the confidence to start coming up with their own firewall rules unique to their situation. Looking forward to joining you on this journey to learn from each other!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +1

      Wow. Thanks so much. I am very heppy to hear that it helped you!

    • @BopperNoStopper
      @BopperNoStopper 9 месяцев назад

      I agree, this was extremely clear with no fluff@@ethernetblueprint

  • @sptexas58
    @sptexas58 10 месяцев назад +3

    Glad you are using the new UI. Aside from that, what a great job of providing the list of items to change, their order and a great explanation as to why. I've watched other videos that assume way to much of the audience.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      I'm glad it helped you. Unifi has been busy changing the UI. I think it has changed again a little since I did this video...

  • @EuroPC4711
    @EuroPC4711 9 месяцев назад +1

    Thank you! You’re the first, explaining vlans so that I understand it.

  • @MatiRezyser
    @MatiRezyser 4 месяца назад

    One of my friend said many years ago for his boss: "for thank you I won't feed my family". So please take small tip from me with huge words of appreciation. Great tutorial, the one was very helpful with my first steps to Unifi :)

    • @ethernetblueprint
      @ethernetblueprint  4 месяца назад

      Thank you very much for your kind words and generosity. I'm glad I was able to help you out!

  • @TomWhi
    @TomWhi 9 месяцев назад +1

    As a seasoned firewall admin I thought I knew what I was doing as I started throwing random firewall rules into my new UDM, and it wasn’t working! This makes loads of sense and I’m excited to try it… Also these states look like iptable states, so that’ll be the next thing I start researching! Thanks for the great breakdown 🎉

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      I hope it is helpful to you. Thanks for sharing!

  • @derekteetv
    @derekteetv 9 месяцев назад +1

    Yessir, you explained it well. It's easier to understand the more advanced parts once a baseline has been understood and configured. Just what I needed as there are more and more IOTs and guests in my house these days.

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      Awesome. My next video will be on the switching portion of VLANs so I hope to see you back!

  • @santiagodelbono1
    @santiagodelbono1 9 месяцев назад +1

    Wow, huge work here!, honestly the best vlan class on RUclips. Congrats and thank you

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      Wow, thank you for your kind words. Glad it helped.

  • @Hazletio
    @Hazletio 2 месяца назад

    Awesome content. You saved me a ton of time! Thank you!

    • @ethernetblueprint
      @ethernetblueprint  2 месяца назад

      You are so welcome. And thank you for your generousity!

  • @jim7smith
    @jim7smith Месяц назад

    Well done, I am getting a much needed education on networks.

    • @ethernetblueprint
      @ethernetblueprint  Месяц назад

      Thanks so much! If you haven't already, check out my "Unifi for Newbies" mini series. Its in my playlists!

  • @swisspeedy
    @swisspeedy 9 месяцев назад +1

    Thanks Buddy!

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      Wow. I can’t thank you enough. That is super kind of you.

  • @mvptech2024
    @mvptech2024 7 месяцев назад

    You're a good instructor! You saved me tons of headaches and time. Very much appreciate what you're doing.

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      Wow. Thank you very much. I’m so pleased that it helped you out. Sincerely.

  • @parexcellence8222
    @parexcellence8222 6 месяцев назад

    Many videos in RUclips this is the only video that explained firewalls rules in UniFi that I can understand. Thank you for the video.

  • @zero604
    @zero604 5 месяцев назад +2

    Thanks for explaining all the firewall rules. In other video's I've seen they just tell you do put in certain things but not explain why.

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      You are quite welcome. I hope you found it helpful!

  • @photosbykehinde
    @photosbykehinde 10 месяцев назад +1

    Thank you for this walkthrough. I've struggled trying to configure the UDMP and you made it simple and straightforward.

  • @jasoncherry2508
    @jasoncherry2508 6 месяцев назад +2

    I had no idea about the "new" Wifi Pre-shared Key assignments to different networks, that's cool. Thank you for explaining and showing that.

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад

      Its my pleasure...

    • @ozzy4654
      @ozzy4654 2 месяца назад

      sadly that wont work with wifi 7, as its only good for 2.4 and 5 ghz bands :(

  • @CarlGolden
    @CarlGolden 10 месяцев назад

    I am finally getting fiber. Getting a new home network setup. Going to a dream machine. Love the idea of just one said for multiple v Lans. Goimg to save me a lot of time setting up. Thanks for the walk through.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Happy to do it. Is there anything else you'd like to see a video on that could help you out?

  • @Lukeb53
    @Lukeb53 3 месяца назад

    This video is great. I've been looking into unify for a while now, but my biggest reservations about diving into it has been VLANs. I'm pretty familiar with vlans as I do IT at a large resort and everything we connect to a network has a different VLAN. Everyone says unify can do VLANs, but they don't elaborate further and I want something robust enough for firewall rules like the ones you demonstrated. My biggest concern was that unify either would not allow firewall rules, or they would be very limited. This video demonstrates the capabilities well and has shown this is exactly what I'm looking for. I plan to start ordering my components over the next couple of weeks and setting everything up and I could not be more excited.

    • @ethernetblueprint
      @ethernetblueprint  3 месяца назад

      I appreciate your kind words... Just so you know, I did a full Unifi series and even have a downloadable document for the firewall rules too... check out my playlist for that 8 part series... one video has been dedicated to FW rules...

  • @jamessaunders6439
    @jamessaunders6439 5 месяцев назад +1

    Absolutely brilliant. Finally configured my Unifi gear!

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад +1

      Boom (Mic Drop). So glad to hear it. Thanks for watching!

  • @doncoish
    @doncoish 2 месяца назад

    amazing video I am keep watching it over and over again

    • @ethernetblueprint
      @ethernetblueprint  2 месяца назад

      Thanks. I hope you found it helpful. I also have another FW video in my Newbie series. Even has a downloadable cheat sheet for the rules.

  • @davejones687
    @davejones687 2 месяца назад

    Awesome video that has helped me start to understand a confusing subject. Had to watch it a couple of times but I now have Guest and IOT separated from the main network and all my Home Assistant stuff seems to still be working fine. Thanks for pulling this and your other videos together for plebs like me.

    • @ethernetblueprint
      @ethernetblueprint  2 месяца назад +1

      You are quite welcome. I have a 8 part series I created too. Its in my playlists... Maybe check that out too if you want...

  • @davidmgibbons
    @davidmgibbons Месяц назад

    Very helpful, thank you for this introduction and it helped me setup my first VLANs!

    • @ethernetblueprint
      @ethernetblueprint  Месяц назад

      Awesome... if you haven't already, check out my Unifi for Newbies series in my playlist... it goes into more details on setting up your whole network from start to finish...

  • @cmuench
    @cmuench 3 месяца назад

    Danke!

  • @jarsky
    @jarsky Месяц назад

    Thank you! I didnt know about the feature of being able to integrate multiple VLAN connections into a single SSID.
    Just need to work out a good time to switch!

  • @grosboute
    @grosboute 7 месяцев назад +1

    This is exactly what i was looking for! I applied your IOT logic to a Vland for crypto mining. This way i don't compromise my default network with some shady new crypto mining software and wallets. 😂😁 Thanks you!

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      That’s awesome. I hope the mining is going well.

  • @jrabbott34
    @jrabbott34 11 месяцев назад +2

    Yeah, super handy on the guest landing page. I appreciate the re-accepting of the Guest EULA after a period of time for a business. So you don't saturate the DHCP range. But for home use I very much like disabling so users at my house don't have to re-accept to "logon".

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +3

      That is a good point about the reauthentication for your guests!

  • @jamessapp4679
    @jamessapp4679 10 месяцев назад +3

    On the portion of the video (about 333.) where you set up group Block IOT from other gateways, you set up a group that included 192.168.1.1 and 192.168.3.1. There is no 192.168.3.1 but there is a x.x.99.1. Perhaps you meant to use 99 instead of 3?

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      nice catch... I have done many variations of my test setup and have a VLAN 3 a lot of the time. Sorry if that created any confusion.

  • @ayalgersh2005
    @ayalgersh2005 10 месяцев назад

    This is AWESOME !! I just got my UDM SE and bunch more Unifi equipment and was looking for a video just like yours. Helped lots !! Thank you.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Awesome man. Thanks so much. I have more UDM videos coming soon. Is there anything you’d like to see?

  • @LordSaliss
    @LordSaliss 9 месяцев назад

    Thanks for the best video about VLANs on current UniFi interface layout
    Unifi is about to release (eta 1-2 months) a new EA firmware version that will bring a lot of options for ACL rules to L3 switches. If you have an L3 switch around could you do a detailed video on those rules and the setup once the new firmware releases?

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад +1

      First off, thanks for your tremendous generosity. I will have to look into the Layer 3 switch though as I don't use them much. Appreciate the awareness though. More to come.

  • @NathanielBland
    @NathanielBland 5 месяцев назад

    You may not claim to be an educator, but I am and you did a superb job. Came to see this method on the new interface and this was a great video and you have an excellent way of speaking for these. One idea you might do would be to provide a firewall rule summary in a PDF or something to make reference easier. Maybe even make this apart of a subscription if you wanted to monetize it. Anyway, good job.

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      I appreciate your kind words. I should include a PDF. Good suggestion.

  • @Ducksnuget
    @Ducksnuget 10 месяцев назад

    Thank you for this video. It was so much clearer and personable than others. You say you're not a teacher, but I'm not convinced.

  • @keifer39
    @keifer39 6 месяцев назад

    You easily earned a sub for this. I'm very new to unifi gateways after using pfsense for years and firewalla for a few months this was just what I needed after getting my UDM Pro SE up and running yesterday. I had my pfsense dialed in for years, but I wanted to get a more user-friendly network solution for my home just in case something happens to me. This tutorial is solid and I'll be employing much of this ruleset to my network to start as my basic setup is very similar to your example. Great job and Thanks!

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад

      Wow. Thank you very much. I am very pleased to hear that it helped you! Thanks for the sub!

  • @danielsprohar9738
    @danielsprohar9738 9 месяцев назад

    Thanks!

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      Wow... Thank you so much. I really appreciate that.

  • @davidrmays8867
    @davidrmays8867 5 месяцев назад

    Thank you so much for this. Been searching for a logical and more importantly logical explanation of the logic. My first venture into VLANs as our collection of IoT devices is growing! Now have to figure out how to assign MAC address of wired device to VLAN.....via a Ubiquiti Express - Thanks again

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      I'm glad this video helped... I have a new series coming out that goes over FW rules too and it has more detail in it. Hoping to help as many as I can.

  • @jamessaunders6439
    @jamessaunders6439 5 месяцев назад

    This is great. I did find one more thing that needs consideration from the IOT network. If you run the network controller on a local PC like I do, then that is also accessible from the IOT network and needs to be blocked in the firewall, much like the gateway access was done.

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад +1

      Great call out! Thanks for sharing with the viewers. I did forget about that!

  • @patrickbaune5377
    @patrickbaune5377 10 месяцев назад

    This is brilliant. Easy to follow and understand. Thanks

  • @tobiasjakobprivate
    @tobiasjakobprivate 4 дня назад

    🎯 Key points for quick navigation:
    00:00 *🌐 Introduction to VLAN setup and importance in home networks*
    - Understanding the significance of VLANs in home networks, particularly due to IoT device security concerns,
    - Starting with a basic setup on a UDM Pro, emphasizing simplicity and essential network segmentation,
    - Overview of the initial setup and equipment requirements for VLAN configuration.
    07:06 *🔧 Creating VLANs and initial network configurations*
    - Step-by-step creation of VLANs for default, IoT, and guest networks,
    - Explanation of VLAN IDs and IP addressing schemes for each network,
    - Importance of segregating traffic to enhance network security and manageability.
    11:25 *📶 Setting up Wi-Fi networks with multiple SSIDs and unique passwords*
    - Configuring a single SSID with multiple pre-shared keys for different VLANs,
    - Demonstration of how VLAN tagging works with a unified Wi-Fi network,
    - Benefits of using a single SSID approach versus multiple separate Wi-Fi networks.
    15:55 *🛡️ Implementing firewall rules for network security*
    - Introduction to basic firewall rules to secure VLAN traffic,
    - Ensuring secure communication between VLANs while restricting unauthorized access,
    - Overview of essential firewall configurations for home network protection.
    19:25 *🛡️ VLANs and Default Network Communication*
    - VLANs in Ubiquiti allow unrestricted communication by default across all VLANs.
    - Firewall rules are crucial to restrict inter-VLAN communication effectively.
    - Example setups demonstrate how different networks can freely communicate initially.
    22:28 *🔒 Creating Firewall Rules and IP Groups*
    - Using IP groups simplifies firewall management by consolidating IP addresses.
    - Port groups enable unified rules for services like HTTP, HTTPS, and SSH.
    - Steps involve navigating between security settings and IP/port profile configurations.
    26:56 *🌐 All Private IPS and Network Access Control*
    - Definition and creation of an "All Private IPS" group encompassing all private IP ranges.
    - Establishing rules to control traffic flow between networks and private IP groups.
    - Demonstrating how to configure rules that allow specific network access while restricting general private IP communication.
    31:30 *🚫 Blocking IoT Network from Gateways*
    - Implementing rules to prevent IoT networks from accessing specific gateways.
    - Importance of ordering firewall rules to prioritize security policies.
    - Testing configurations to verify restricted access to designated gateways and services.
    Made with HARPA AI

  • @johnringo2884
    @johnringo2884 10 месяцев назад

    This is the best tutorial I have seen describing the UniFi setup I was looking for. Thanks a lot for this easy to use tutorial 👍 You got a new subscriber. Can’t wait for more of this stuff!!

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Super nice of you to say. Thank you. Is there anything you'd like to see a video on?

    • @johnringo2884
      @johnringo2884 10 месяцев назад

      @@ethernetblueprint An extension/tutorial on how to setup a VLAN for UniFi cameras together with firewall rules would be very interesting to watch 👍

    • @johnringo2884
      @johnringo2884 10 месяцев назад

      @@ethernetblueprint Perhaps also implementing a Synology NAS into this setup. Not sure if that needs to be on its own VLAN and how the firewall rules would look like if it needs to reachable from the outside. I guess the safest setup would be to use some sort of VPN solution to be able to safely reach the NAS from the internet. But is there a way to set it up in a safe way without VPN?

  • @theexpatgunner
    @theexpatgunner 5 месяцев назад

    Great information I’ve just started getting into the UniFi ecosystem with a Cloud Gateway Ultra. Certainly feels like a massive upgrade in terms of features and capabilities over my standard WiFi 6 router which is now be converted to a temporary access point. I’ve set a Vlan for wired devices and one for wireless for now to add some degree of separation. Once I add a UniFi AP then I can add separate vlans for IoT and Guests.

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      Awesome... This is great. Make sure you watch my VLANs and Switching Video to ensure your switch is setup the way you want it too. That video compliments this one. Congrats!

  • @davidjohns4556
    @davidjohns4556 6 месяцев назад

    Great video, Tim. Thank you so much!

  • @clnred
    @clnred 7 месяцев назад

    Thanks

  • @brianhampton9138
    @brianhampton9138 11 месяцев назад +4

    You don't understand how helpful this has been!! No-one else that I watch has broken what rules to make down so well. I wanted to ask what if I need devices on my IOT to talk to each other? I have a lot of devices that would need inter-vlan communication. Would I just not do the drop all private ip addresses traffic or some other allow rule? Thanks

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +2

      I am so pleased to hear that my video helped you out. I can't thank you enough for that. As for your questions, just to be clear, the firewall rules only apply when one VLAN is talking to another one. This is called Inter-VLAN communication. If IOT devices are talking to each other, they would most likely be in the same IOT VLAN and would not be affected by the firewall rules. Unless I am not understanding what you are asking here...

    • @brianhampton9138
      @brianhampton9138 11 месяцев назад

      Well I don't know if I'm asking it right myself...I just assume that when you enter the firewall rule to Block all private IPs for the Iot vlan that that would prevent anything on the IOT from talking to anything but the internet including other Iot devices on the same vlan@@ethernetblueprint

  • @bw_chrisknights
    @bw_chrisknights 3 месяца назад

    This helped thank you. So many videos watched. This one works and is very well explained.

  • @rapha5586
    @rapha5586 5 месяцев назад

    Man nice video, makes a lot of sense and the whole thing super easy to learn. Much appreciated!! Thanks a bunch :)

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      Thanks for watching and for the compliment. I’m happy to share.

  • @Mouratidis
    @Mouratidis 6 месяцев назад

    Congratulations!Great tutorial and learling point

  • @SimonBetty
    @SimonBetty 4 месяца назад

    I wanted to create some simple rules and VLAN's, not touched networking for many many years, since I did CCNA when I was 16 (Now 35!!!) this jogged the memory nicely, also new to UniFi so understanding it's flow this really helped. All networks now created and all rules and VLAN's setup! Happy with it.
    I just now have the joy or resetting all my dumb smart devices to be on my IoT network! I presume those devices can still talk externally to the web for their native apps to still work etc?
    Thanks though, brilliantly spoken!

    • @ethernetblueprint
      @ethernetblueprint  4 месяца назад

      Nice. I am so glad to hear you dusted off the old VLAN knowledge a bit and this helped you! The IOT devices will be able to communicate with the internet, yes.

  • @Kcnewf
    @Kcnewf 9 месяцев назад

    Great content. Made it easy for me to understand VLANS

  • @packawackajoe5271
    @packawackajoe5271 8 месяцев назад

    Just setup my home network using this video ! Thank you so much of the help ! Would love to know now how to improve WIFI and get the best experience

  • @thomasovendale1437
    @thomasovendale1437 9 месяцев назад

    Beautiful explanation! Thank you 🙏

  • @commonwealth6
    @commonwealth6 6 месяцев назад

    Thanks. I learn something new today.

  • @chrisccs2112
    @chrisccs2112 6 месяцев назад

    One of the best, if not, the best unifi firewall tutorial on youtube. You explain it so well!!
    Question for you: I didn't need to block the ssh,http,https ports on my vlan gateways, i just blocked the gateway ips.
    Did you block the ports just for that extra security? Thanks!

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад +1

      Thanks for the watch and compliment. The local rules are there just to block assess to the gateway when on the restricted VLANs. If the rule you created does the same thing, then you don't need them. I would double check though that you can't access the gateway from your restricted VLANs. I have never just blocked the gateway as I don't know what that will do.... But I have had so many people ask me that I think I am going to test it and see what happens. Thanks again for the comment!

    • @chrisccs2112
      @chrisccs2112 6 месяцев назад +1

      @@ethernetblueprint
      Thanks for the quick reply.
      So I blocked the IOT vlan from accessing the IOT gateway by just blocking the IOT gateway IP. I never blocked the ports. It works perfectly.
      Should I block the ports as extra security?

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад +1

      If you can't access the device via its local IP address, then I would say problem solved...

  • @EmiNetworks
    @EmiNetworks 10 месяцев назад

    Good job 👍. Everything you showed is very simple, but it may be useful for beginners.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Thanks so much!

    • @greghansen7616
      @greghansen7616 9 месяцев назад

      It might be simple to you… I’m a UniFi newbie and brand new to VLANs and configuring firewall rules.
      Thank you, Tim, for opening the door for me!

  • @ianrobson9612
    @ianrobson9612 8 месяцев назад

    Thanks Great Video. I had had trouble finding some of the settings and this helped immensley. I followed your instructions and thought i had a problem as i refreshed the gateway page and could still get to it then a light bulb went off. As i had an established connection it remained. Closed the connection and went again and no access. Thought i would mention it in case others thought the same thing. Thanks again

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад

      Thank you for commenting and helping my followers!

  • @hanvandewal917
    @hanvandewal917 10 месяцев назад

    Hi Tim, excellent step-by-step tutorial, followed you along in setting it up. Thank you, concise and also sufficient details. One small thing you already mentioned: Unibuiti changes things and I am running version 8.0.28 In this version there is no upper tab / bookmark line anymore with items like LAN-IN, LAN-Out etc. Greetings from Amsterdam.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      Maybe I am looking in the wrong place from where you are talking about?? I don't see any changes in 8.0.28 from what I showed on the video. Can you help me find what is missing now?

  • @XyzoTube
    @XyzoTube 11 месяцев назад

    Perfect tutorial! Not that I can only get what you set up but I got some understanding so I can adapt to my own rules using your video. Keep up the good work!

  • @1d9d5k6
    @1d9d5k6 10 месяцев назад +1

    Outstanding presentation with the new interface. I would like to have a private wireless for my wife, because of her job. Could I use a shared key for default, IOT, Wife's Wifi and use the Guest 99 network with the standard isolation with it's own password? I am going to check out your VLAN video. Maybe I can come up with other ideas. Also, one of the things that gets frustrating is when videos are not updated when there is a noticeable OS change. I look forward to you continuing to do so.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад +1

      If I understand correctly, you are asking if you can setup muliple password (Private Pre-shared keys) for the default, IOT and Wife (all connecting to the same SSID) and then setup a separate WiFi name for guest and still make all this work in the Firewall... If so, the answer is yes. The firewall rules are based on the VLANs, not how the WiFi networks are setup. You could create a shared SSID for all of your "main" networks and then create a Guest VLAN and choose the isolation check box... Then create a separate Guest SSID for that network. As a matter of fact, I think that is a better way to do that anyways. It is nice for the guests to be able to connect to a separate SSID so they know they are on the guest network...

  • @Mido-qr6bw
    @Mido-qr6bw 8 месяцев назад

    I'm a total newbie in the world of home networking. Recently, I made a jump from Asus eco system to Unifi and can't seem to wrap my head around all new concepts like Vlan, traffic/firewall rules and stuff. Your video is so easy to understand and following with, absolutely one of the best for Unifi's new customers to learn from. Thank you for taking your time and effort to share with us your knowledge, cheers !!!!

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад

      I am so happy to... This is one that I will be redoing as Unifi Upgrades their interface too...

  • @bigeyesbeats1838
    @bigeyesbeats1838 10 месяцев назад

    thank you for this structred yet simple to understand and setup tutorial, appreciate it and now its time to check your other videos 😉

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      I am really glad it was helpful to you. Anything else you'd like to see a video on that could help you out?

  • @buzzzz1252
    @buzzzz1252 11 месяцев назад +2

    Great tutorial! I have recently setup two additional VLANs (Family and IOT). I did this because I liked your "kids" network in your prior video. I have not set any rules yet, just been busy getting devices on the correct VLAN/Wifi. Will be playing with firewall rules soon. My question is... The first thing that came to mind when you were creating rules, especially the port rules, was what are the chances that one mistake could potentially lock you out of the gateway from ALL networks. It just made me think I should be VERY careful!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +3

      It is possible however there are fail safes in place that warn you about it. If you look through the comments here, I talke about that with another viewer because he got a warning on his and it wouldnt allow him to set that rule. However, just know that is possible. Be Careful.

  • @aroundtheshop
    @aroundtheshop 8 месяцев назад

    Great Video..... Will use a bunch of this when my Gear arrives

  • @TommieRC
    @TommieRC 11 месяцев назад +2

    Great tutorial, thanks! I love all the details! I just followed your previous tutorial to setup my vLan protections on my UDM SE, your earlier tutorial was super helpful!! I think you were on 7.x in that tutorial. Glad to see this updated tutorial, on 8.0.26! I saw you had a Guest firewall rule for "Allow DNS Packets to External Name Servers". It would be great to see a tutorial on this topic. I am looking to block all DNS (Port 53) queries out (on my various vLans), unless they come from my DNS (PiHole or other DNS like ControlD or NextDNS) server, if someone on my network tries to change their DNS, my goal is that they will not connect to another DNS server and their Name Resolution will fail. It would be good to see options, but wanted to share an idea (I'm sure you have considered this topic too! Great Job! Thanks!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +1

      You will most likely have to do that with Firewall rules on a standard VLAN and not by clicking the guest portal policy checkbox... The guest rules in this video were automatically generated by the system and can't be updated... I am confident you could create a VLAN like I did the IOT network in this video and then add rules to control the DNS servers...

  • @davidweiner3365
    @davidweiner3365 9 месяцев назад

    Outstanding Video..... I have a USG and 3 access points, and want to keep Guests, IOT, and my default all separate, so your video hit a sweet spot for me. I've very concerned about getting hacked thru IOT (like Wyze) and this helped to show how to block the IOT to the gateways. I'll probably have to watch it a few more times to get it right, but thank you.

    • @ethernetblueprint
      @ethernetblueprint  9 месяцев назад

      You are quite welcome. I am happy that it helped!

  • @erichubbard7754
    @erichubbard7754 11 месяцев назад

    Great job of teaching/explaining vlans, watched another video that didn't explain much and hurried through everything
    Didn't work and certainly didn't learn anything about what I was doing from other videos
    Thank you for teaching subbed & liked!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +1

      I appreciate the feedback. Glad it was helpful!

  • @brianbuell975
    @brianbuell975 8 месяцев назад

    Really great stuff. Love that you used the latest version.
    FYI - WiFi Private Pre-Shared Key is not supported on 6 Ghz WiFi

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад

      Thanks so much. And that’s good to know about the pre-shared key and 6Ghz. I wasn’t aware of that.

  • @cmuench
    @cmuench 3 месяца назад

    Great tutorial. Thanks.

  • @ninjmnky
    @ninjmnky 11 месяцев назад +1

    Great guide, from zero to hero with everything needed, just one comment - please consider using dark mode ui when recording these, cheers!

  • @wheresmymaitai
    @wheresmymaitai 7 месяцев назад

    Thank you so much. After watching several videos and web based walk-throughs, but I could not get things working 100% - finally scrapped and went through your video and presto everything is working, have my Iot and Cameras on separate vlans as well as my Guest Network. Tested, retested and everything is communicating as it should and blocked as it should.
    I am getting a ton of DROP invalid State trigger events for various devices I have, mostly Apple ones (home pods, Apple TVs, iPads, iPhones) as well as some out door eufy cams. Within an hour I’m seeing 60 plus triggers, 95% are Apple devices. This seems excessive, but I’m unsure if this is anything to be concerned about.

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад +1

      I have read that can be common and a lot of times it’s from a malformed packet. I get a lot of those too. It has never presented an issue.

    • @wheresmymaitai
      @wheresmymaitai 7 месяцев назад

      @@ethernetblueprint Thanks once again! I'll just ignore those and move on.

  • @stevetheisen
    @stevetheisen Месяц назад

    This is a GREAT tutorial, thank you very much. Do you see any value in having a separate WIFI for 2G IOT devices? I have about 60 of these devices to connect, and I wonder if they would conflict with 5G traffic at that volume.

    • @ethernetblueprint
      @ethernetblueprint  Месяц назад

      Some IOT devices may require you to have an 2G network, but to keep things clean, I would try it without if first and only add if necessary... Make sure you don't have band steering turned on and you "should" be fine. The device is really what determines the need for an isolated 2g network in my experience.

  • @CJ-vg4tg
    @CJ-vg4tg Месяц назад

    Great video thanks. I am working with omada and they appear very similar.
    But the firewall entry types are a labelled a little different. I have LAN->WAN, LAN->LAN and [WAN2] IN.
    Would WAN IN be equivalent to LAN in on unifi?
    But LAN->LAN only has the options of network to network rules and not IP groups. LAN->WAN has the source and destination options of IP groups. WAN IN has Network source greyed out. Your 1st rule would be WAN IN (ipgroup_any to ipgroup_any)? Looking at your rule for all Private IP groups, may I assume I need to choose LAN->WAN in this case? Many thanks

    • @ethernetblueprint
      @ethernetblueprint  Месяц назад

      So I didn't create any WAN rules. If you saw them on my video, those were created by the system. If you are trying to recreate the rules I did in this video, I would think LAN-LAN would be the same as the LAN in Rules, but I don't know that for sure. That is just the one that makes the most sense to me.

  • @larrameburger
    @larrameburger 6 месяцев назад

    Thanks for this great video but I have a question about the rule to block the IOT network from it's own gateway, why can't you just combine it into one group with the port group? It seems redundant to create a separate rule for this.

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад

      I actually need to test this a little more. I have a lot of people ask me this question and to be honest, this is the way I have always done it and have never just blocked the gateway. I will have to test and get back to the group!

  • @davidbacon4963
    @davidbacon4963 7 месяцев назад

    Thank you! This is the bomb-diddly!!!!
    I have attempted this in 3 prior efforts with compromised results. After testing, I am now convinced that my IoT is configured as I had hoped. Not being a Net Admin type, the explanations were matched nicely with the recipes. A fantastic balance!
    An excellent time investment. Thank you again!!
    One small suggestion that would have completed my setup .... the recipe to expose the printer on the default vlan to those connected to the Guest vlan. BUT, I have enough knowledge now (from the camera examples?) to try to pull that off. Did I learn to fish??? ;-)

    • @davidbacon4963
      @davidbacon4963 7 месяцев назад

      Rel 8.1.127
      Tried configuring the printer. Let it be used from the Guest vlan. Created the rule. It can't be moved above the "Drop All Private IP Communication" rule, as you stressed.
      LAN Local, Accept, Source = Guest, Destination = Default, IPv4 for both, Match state = New, Established
      Connect an iPad to Guest. Apps don't find a printer.
      Thoughts? Suggestions?

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      Printing depends on a couple factors, but there are a couple of things you can try... However, I will warn you that not all printers play well with VLANs though...
      1) make sure mDNS is enabled and is allowing the VLANs that need to talk to each other. Some printers use this to communicate with their devices
      2) I would edit your rule and try the following... put the printer IP in an IP group by itself... then try the rule
      'LAN Local, Accept, Source =Guest, Destination Port/IP Group and choose your printer... don't add the new, established... just leave that out...
      Also make sure that your new printer rule is above the 'Drop all private IP' rules that you created earlier... They run in order and you don't want that the traffic blocked before it hits your rule.

  • @danielmontanez7029
    @danielmontanez7029 11 месяцев назад +1

    Amazing tutorial! Thank you!

  • @Serafiniush1
    @Serafiniush1 7 месяцев назад

    Hi. Great video but one part confuses me one bit. At the 33:42 mark you add the 192.168.3.1 adress which I dont really know what it corresponds to. Was the 192.168.99.1 intended as the Guest VLAN Gateway? Other than that u made my configuration process a lot easier. Thank You.

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад +1

      You are correct... I am so sorry that was confusing. The 3.1 address was a mistake. That was supposed to be the 99.1 for the guest gateway... Sorry about that and good catch!

  • @TorbjornOrnstig
    @TorbjornOrnstig 6 месяцев назад

    Thanks so much for a great video. I have tried for a while but now I finally have got my VLANs to work. I even used my knowledge from the video to figure out how to get all my Denon/HEOS stuff to work on the IoT! Much obliged!
    Just two small question if you don’t mind though.
    Should I not block access to the gateway from the guest network? I have tried to understand the rules ubiquity has given me but I don’t seem to find that?
    Next a more general question. In the firewall rules from ubiquity there are 4 “accept” at the end. What good are they if no “drop” after them? Maybe I have misunderstood something?

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад

      I would make sure you block access to the gateway from your guest network.. (either with your own rules or the built in ones) If you hit the guest checkbox for that VLAN and let it do it for you, I believe it will block access to the gateway for you without you putting in any FW rules. It isolates that network and only allows guest to get the internet. Hope that helps!

  • @deesr.4335
    @deesr.4335 8 месяцев назад

    Thanks you! This was so very helpful to assisting me in my basic setup. Great!

  • @RyanJones989
    @RyanJones989 11 месяцев назад +1

    Hey Tim! Just found your channel, I have a bunch of UniFi gear and have been running it for years, but you have taught me quite a bit and this video right here has helped me figure a bunch of stuff out! As a thanks, I noticed that your audio is being done from a laptop/phone mic, which works, but, I have a set of lavaliers that I would love to send you as a thanks. But I couldn't DM you, Drop me a line back and I'll find a way to get them to you! Thank you for the great information!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад

      Wow... Thanks... I actually use my earbuds, but I wouldn't mind trying out yours... email me at tim@ethernetblueprint.com if you like...

  • @wannabemultitool
    @wannabemultitool 5 месяцев назад

    25:35 I can copy paste but I don’t understand. What is defined as “good traffic” and what is included in “established” and “related” ?

    • @wannabemultitool
      @wannabemultitool 5 месяцев назад

      What if I add a new device to my network? Would that be considered as “not established” or “new” which is not tick marked so it won’t be able to communicate ?

    • @wannabemultitool
      @wannabemultitool 5 месяцев назад

      What is an example of “invalid” communication ? 26:39

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      When one device talks to another device on a network, there is a string of bits that are in a certain order that make up a network packet that get sent back and forth. Network sessions between devices can get messed up for a lack of better description and so when the FW sees these sessions, it knows to just drop that traffic. 'Invalid' traffic primarily appear to be for an existing session but that do not have an already existing firewall session

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      No. It would be able to communicate just fine... (I will talk to Established and Related in original comment)

    • @ethernetblueprint
      @ethernetblueprint  5 месяцев назад

      Established and Related and Invalid: I agree that this can be a little confusing. When looking at these factors, your FW is basically making sure the traffic going back and forth is allowed and that packets in the communication are what it expects to see. Invalid traffic for example might be from a stale network session that didn't get closed properly so the network packet has information in it that would flag it as "invalid". It is very common for this to happen and the FW knows to just drop it.
      In the case Established and Related, when a device on one network (VLAN) is traveling through the firewall to talk to a device on another "restricted" network (VLAN), if that communication is allowed, and the network packet looks like it should, it will be seen as "good" and allow that communication to happen. When this occurs, that device on that first VLAN has now "Established" a communication. The "Related" portion basically allows that the device on that second "restricted" VLAN to respond back and answer to the first device...
      So, the reason I include this in my firewall rules is because our default network is allowed to talk to other VLANs and this rule allows those other "restricted" VLANs to talk back... However, the "restricted" VLANs are not allowed to Establish a communication to our default network... That is blocked...
      EXAMPLE: A phone on the default network can talk to an IOT device on the restricted network... And if the communication originates with the phone, the IOT device is allowed to talk back... Phone tells IOT device to turn on a smart light, IOT device says, "yes". However, traffic originating from the IOT network can NOT talk to the default network. The traffic has to originate from the default network for this to happen... That is basically what these rules are allowing to happen and why I add them... I want my default network to talk to other VLANs and be able to have them respond back... And I want to drop network packets that are deemed as "invalid"...
      I hope that helps...

  • @cacophony6963
    @cacophony6963 6 месяцев назад

    Great tutorial, but one question:
    I followed your exact approach yet I'm able to ping other devices on the IOT network while on the IOT network. I thought that should have been blocked based on the rules? I'm using a new UCG Ultra running latest software.

    • @ethernetblueprint
      @ethernetblueprint  6 месяцев назад

      With these rules, you should to be able to ping and communicate within the IOT VLAN. Thats normal. You shouldn’t be able to reach other VLANs or get to the IOT gateway on ports 80, 443 and 22. If you were to do device isolation, then you’d achieve what you’re talking about. Hope that makes sense.

  • @yvesbaumes
    @yvesbaumes 8 месяцев назад

    Great video. I still fail to understand a point. We need to introduce a FW rule "Block IOT to other Gateways". Obviously, your machine inside the IOT network is able to connect/reach the gateway inside the default network. Therefore you need this rule. But I still fail to see why the FW rule "DROP ALL private IP communication" is not enough... Any observations/development on this point?

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад

      I understand the confusion. This is because of the type of rule it is... The "LAN in" rule is different than the "LAN Local" rules. The LAN In rules control intercommunication between VLANs. (ie. this device over here can not talk to this device over there) However, Unifi uses the LAN local rules to allow you to block local service services that run on the local device... (ssh, dhcp, https, dns, etc...). You almost have to think of accessing the web portal of the UDM as a service. You are going to an IP configured on the device (a gateway) and accessing a https page. So a LAN Local Firewall rule is required on the gateways (both its own gw and the other gw's) to block that traffic.
      Note: With the rules I created in here to block traffic to other gateways, I chose to just block all ports - Kill ALL access to services on those GW IP addresses. However, I could have created the "block other gateways" rule to just block ssh, https and http like I did on the "blocking its own gw" rule. I hope that makes sense and helps you out a bit...

  • @JohnSparro
    @JohnSparro 7 месяцев назад

    Thank you!! One question, when setting up your LAN LOCAL rules, why do you explicitly add DENY rules instead of explicitly adding ACCEPT rules with a default DENY at the end? This seems like the only place where you do not follow the "deny by default" best practice? This doesn't seem to scale with more networks (but maybe this is intentional for the video!).
    Also, Unifi has a firewall option for "network type" of "Gateway IP Address", which I believe is the 192.168.x.1. Would you recommend using that Unifi default instead of creating the groups like "DROP IOT to its Gateway"?
    Thank you!!!

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      You bring up a good point. Most of the home networks that are setup as on the smaller side so this ruleset works pretty well. For larger scale networks, your suggestion would work better for scale. Most of the reasons I do this this way is to be able to teach people who are newer to Unifi and Firewalls in general. Deny by default practices can more difficult to troubleshoot - especially if you are newer.
      As far as your second question, I am not familiar with where that setting is to be able to answer your question. Sorry man!

  • @stephensweeney1154
    @stephensweeney1154 4 месяца назад +1

    Do you not recommend the Isolate Network checkbox in 8.3.32 (different from the Guest Network checkbox) on the Unifi VLAN (Network) configuration screen for the IOT network?

    • @ethernetblueprint
      @ethernetblueprint  4 месяца назад +2

      This is a valid point. That is one way to do it sure. Simple and fast. It will create a single Isolate rule in the FW rules.
      (FW Rule it Creates)
      Isolate IPv4 Traffic From Selected Subnets To Any Local Subnet, Drop, LAN In, All, 192.168.X.0/24, Any, (4 Networks), Any, 60001
      If you needed to allow other VLANs to communicate with your IOT network, you could simply add your "allow" rules above this rule and they should communicate.
      I simply wanted to point out how to make FW rules from scratch to accomplish to same thing so it helps people learn how the rules work.

    • @stephensweeney1154
      @stephensweeney1154 4 месяца назад +1

      @@ethernetblueprint Thanks!

  • @trajanparker
    @trajanparker 6 месяцев назад

    Outstanding! Thank you!

  • @texican3574
    @texican3574 11 месяцев назад

    Really useful tutorial. I'm new to Unifi and I'm sure I'll be configuring, resetting and reconfiguring things for awhile. I am updating my little home network mainly because my WAP is EoL and hasn't had an update in 2 years. I have been using an ERL for several years, which is a great little router, but I am using the WAP as an excuse to build an easier to manage network . I guess it's like Apple once you get into the Unifi ecosystem you're better off staying there. I bought an UDR and Lite 16 port switch to replace my existing switch, AP and router. I have the UDR and switch kinda hanging off my current setup so I can practice with it and not worry about getting my "users" upset. I plan on eventually adding APs to connect a shop and would be interested in ways to connect between buildings.
    The VLAN stuff is very timely. I have stayed away from IoT devices because of security concerns. I'm hoping to get a good understanding how to control and secure things both internal and external. What I would like to see is a tutorial on best practices for setting up and securing the Ubiquiti VPN. I also would like to add a NAS to do my own cloud storage as well as local file, media and backup. Thinking about why, where and how to put a NAS on the network while being able to restrict access based on who and where the access is coming from all turns into a confusing mess quick.
    Keep up the tutorials. I'm looking forward learning more. 👍

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +2

      Thank you for tuning in. I think you will like the Unifi echosystem once you get used to it. But don't get me wrong, it definately has its painful moments. I haven't gone too deep into the VPN realm yet, but full intend on doing some videos on that. I know it is a hot topic. Unifi has been making some changes in that area as well. As far as a NAS goes, it really depends on what needs the most access. For me, my default network uses the NAS the most, so that is where I put it. I don't really have a need in my home to have any external devices talk to it so it works well for me there. But that is me. Hope your new direction goes well!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад +1

      Also, as far as connecting to your shop, check out my Nanobeam point to point video. I plan on doing an update to that since that was made specifically for my brother in law, but that may push you in the right direction. Look at the Nanobeam 5AC from Ubiquiti for creating a wireless bridge to your outbuilding. They work awesome...

  • @paulstemmler9879
    @paulstemmler9879 7 месяцев назад

    Thank you I tried to follow but I couldn’t get my Camaras to work. Should my nvr be in the iot network

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад +1

      I didn't make cameras a part of this video... when I do my next "refresh" of it, I will add them in just so people have a reference. Personally, I would recommend putting your cameras and NVR on their own Camera network... and not have them be on the IOT... But the situation, setup and types of cameras all can play into this decision... may need a little more info....

    • @paulstemmler9879
      @paulstemmler9879 7 месяцев назад

      @@ethernetblueprint thank you for getting back to me. I’m retired military and I’ve had to install a rack of cameras around my house do problems with my neighbors. I have two cameras that are wired by ethernet and 10 g4 instant around the house. I really appreciate your video. It was the first time I’ve seen one that actually allowed me to understand and how it’s set up for firewall, etc. I looked at your website. I was gonna try emailing you but noticed that I couldn’t do that. My house is already constructed so adding ethernet connections for the remaining cameras would be way too expensive for me. I look forward to seeing you next video.

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      Just so you know, I do talk about cameras on the VLANs on a Unifi Switch video that I did recently... If you ever have any questions that need further explanation, email me at tim@ethernetblueprint.com and I will try to help where I can...

  • @mattschoular8844
    @mattschoular8844 11 месяцев назад

    Thanks, that's a great tutorial. I am in the process of setting up my UDM Pro. VLANs and Firewall are next...

  • @AC-sc1pc
    @AC-sc1pc 11 месяцев назад

    Really good walkthrough!!!
    Suggest doing a VPN network walkthrough.

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад

      Copy that. I will have to do a video on that...

  • @HarryM2022
    @HarryM2022 5 дней назад

    Excellent and informative videos and explanations!!! Many thanks for all the effort!!! I set up my network following your instructions and work nicely. There is skmething i dont understand though; My default network it is supposed to have access (ping) all the vlans. After i followed your firewall rules it seems that i can ping only devices within the default network but no in the guest or IoT. Did i miss something?

    • @ethernetblueprint
      @ethernetblueprint  4 дня назад +1

      Sounds like you missed something... There should be a LAN in rule to allow Default to ANY right before the block all rule... make sure that is in there and is correct.

    • @HarryM2022
      @HarryM2022 4 дня назад

      @ethernetblueprint That's what I thought but can't figure out what i messed up probably. I have them in the following order: ALLOW established n related, DROP invalid, ALLOW default to all private and DROP all private to all private. The order is not right maybe?

    • @ethernetblueprint
      @ethernetblueprint  4 дня назад +1

      That is correct. Why dont you email me at tim@ethernetblueprint.com and send me some screenshots and we’ll see if we can figure it out.

    • @HarryM2022
      @HarryM2022 4 дня назад

      @@ethernetblueprint Much appreciated. I just emailed you a few details regarding this issue

    • @HarryM2022
      @HarryM2022 17 часов назад

      All sorted! Many thanks! I had to re-do the firewall rules to make it work properly (no idea why)

  • @MenoClause
    @MenoClause 7 месяцев назад

    Absolutely incredible video! I have a question on how you set up your pinters specifically. I read that putting them on their own VLAN is the way to go, and someone who is learning I would love to try and do that but I was having issues getting it to communicate with my other devices on my other VLANS. Do you have any recommendations on firewall rules or should I just throw it on the IOT VLAN?

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      Follow up question, with the rules I put in that video, if you did have them in the IOT VLAN, are you able to communicate with them from the main VLANs?

  • @rlainez
    @rlainez 11 месяцев назад

    Tim, this was helpful to understand the importance of VLAN’s. I really want to do something similar but your comment about Sonos makes me not want to proceed. I am not qualified to troubleshoot any networking and I would just end up resetting everything back to default!

    • @ethernetblueprint
      @ethernetblueprint  11 месяцев назад

      Sonos will work great if you put it in your default network with your phones... Typically that is what I recommend even though it is less secure.

  • @GreatYTShark
    @GreatYTShark 7 месяцев назад

    I've watched a ton of these firewall setup videos but this one is probably the best at explaining what each setting does so thanks. The reason I keep watching them is I can't for the life of me get my macbook on VLAN 1 to talk to a Pi server on VLAN 2. It wont ping, it wont shh. But it will if I connect the wifi on the mac to the VLAN 2 wifi network. If followed every little detail in this video (which is almost identical to many others) and put in an allow rule for pi ip to talk to the mac ip. I've also tried it as a all VLAN 2 to all VLAN 1 rule. Still won't work. Hope that makes sense but is there any other gotchya that could be preventing this in unifi?

    • @ethernetblueprint
      @ethernetblueprint  7 месяцев назад

      Do you have another device (non Mac) on VLAN 1, that you can’t try pinging the Pi server? Can your Mac ping other devices on VLAN2? If this is a “server” make sure the local firewall isn’t blocking the pings. I have seen that cause issues like this and people are troubleshooting the wrong device. If you want to email me at tim@ethernetblueprint.com, we can have a convo about some options.

  • @sviviano1066
    @sviviano1066 10 месяцев назад

    Love your video I would love to see you corporate a cameras into that that’s gonna be figured in my mind and I’m really new at this so you did it really well love love to see it. Nice job.

    • @ethernetblueprint
      @ethernetblueprint  10 месяцев назад

      In my home, I do have my cameras on their own VLAN and isolated from the other VLANS.

  • @freelance-darkspear1495
    @freelance-darkspear1495 8 месяцев назад

    Nice walk through. Still following it and slowly setting things up but it is helping a lot. My only so far is I have the Cloud Gateway Ultra and in it the options are Guest Network and Isolate Network compared to your "Isolation" when setting up the guest vlan. Do I check both of these or just guest or just isolation ?

    • @ethernetblueprint
      @ethernetblueprint  8 месяцев назад +1

      Unifi loves to change their own wording... For a guest network you can check either one... but you don't need to check both. If you check the Guest Network box, you will be able to setup a guest Portal page for your guests to use in the Hotspot manager... If you check Isolate Network box, then it will just lock it down and not give any additional guest portal features... Hope that makes sense!

    • @freelance-darkspear1495
      @freelance-darkspear1495 7 месяцев назад

      @@ethernetblueprint Ha ha, thanks for the reply. I did end up checking both at the time I think.
      Another new thing ive recently discovered is that when it comes to vLan if your using a switch other than a ubiquiti one there is no way to have some devices on vlan 1 and others on vlan 2 as they are all tagged on the vlan set in the port for untagged traffic.
      Which is mildly annoying as I then need to pick up more of their kit, just to put something on a particular vlan instead of getting it and building in time.
      Unless.... you happen to know of a way ? :D

  • @KyzaSaucer
    @KyzaSaucer 7 месяцев назад

    amazing content one so far