Unifi Network Complete Setup 2024

Поделиться
HTML-код
  • Опубликовано: 19 ноя 2024

Комментарии • 195

  • @kuftamarc
    @kuftamarc 4 месяца назад +74

    Thank you so much for making these complete setup videos! This technically counts as a community service.

  • @j.e9971
    @j.e9971 4 месяца назад +38

    CODY I NEEDED THIS! I legit just got a new Ubiqiti setup a few months ago and added new switches, AP’s, a NVR etc. I reset my entire network a few days ago and I’m starting from scratch. Your timing is impeccable!

    • @deinos2114
      @deinos2114 4 месяца назад +2

      Literally set mine up a few weeks ago and wished he had a newer guide out... 🤣

  • @michaelkern8856
    @michaelkern8856 Месяц назад +2

    Can't thank you enough for making this video. I am retired it (71 now) and I never thought I would still be doing this. Donating my time as an IT volunteer for non-profits "fixing" stuff.

    • @MactelecomNetworks
      @MactelecomNetworks  Месяц назад

      Thanks for watching! That’s great you’re volunteering your time. Hope these videos have been of help :)

  • @kuftamarc
    @kuftamarc 4 месяца назад +9

    Cody, one note for the next update to this series- You actually can have a LAN-In firewall rule that blocks all IP addresses from one of your subnets to the gateway address. This won't block internet access, as that traffic's destination IP address isn't a match. It's accomplishes same as the rules you used, but is a little more secure and clean as you do it with fewer rules, and don't end up only blocking specific ports (21,80,443). As other vulnerabilities crop up that affect other ports, you end up better protected. Only gotcha is make sure you test how this affects cams, I don't have a camera network to test with, but this worked great for securing Unifi from my IOT and Guest networks.

    • @ayden8901
      @ayden8901 3 месяца назад

      Can you further explain this?

    • @kuftamarc
      @kuftamarc 3 месяца назад +5

      @@ayden8901 Sure, but it's a bit complicated, so I'll try my best. If you skip to around 24:07, this is where this all starts to become relevant. Cody wants to prevent devices on various subnets from talking to his Dream Machine (this is best practice, and you should absolutely want this). The way he does this is he makes a firewall rule that blocks devices on each subnet from talking to the gateway address of the Dream Machine on other subnets (example: devices on the IOT network shouldn't talk to the gateway address of *other* networks). Cody demonstrates this from the Secure network, but doesn't block devices on the Secure network from talking to the gateway of the Secure network.
      Cody explains at 25:38 that if he included 192.168.40.1 in his list, devices on the Secure network would no longer have internet access. This is actually not correct. When the firewall sees a packet coming from a device on the Secure network for the internet, it sees a destination address on the public internet (not the gateway address of the UDM), and would allow it through, even if the firewall rule said to block devices on the secure network from talking to 192.168.40.1. Cody then demonstrates creating a rule that blocks devices on a subnet from talking to the management ports of the gateway address for that subnet, but it still allows those devices to attempt to send other kind of traffic to the UDM Pro (all other ports).
      The cleaner way that I suggest is stick with Cody at the start:
      -Create your Allow Established/Related Traffic rule
      -Create your Allow Default to all VLANs rule
      -Create the Block Inter-VLAN Routing rule
      BUT THEN:
      -Create a rule to block your Guest and IOT networks from talking to every gateway address
      -Ensure that the network you use when you manage your UDM doesn't block the gateway address on that same subnet
      I don't have cameras, or a camera subnet, so I'm done here. But if you do, Cody's right that you need to let the cameras talk to their gateway address, and that whatever device you use to view the cameras needs to be allowed to talk to the gateway address for the cameras AND the network that the cameras are on. An odd fluke of Unifi, is the gateway addresses are not treated as the rest of that subnet.
      If I've lost you at any point here, do exactly what Cody suggested. His guide is still great. But if this all makes sense, you'll probably prefer not allowing random IOT devices to hit almost every port on the UDM, as they have no legitimate reason to be allowed to do this.

    • @Noob-5
      @Noob-5 3 месяца назад +1

      @@kuftamarc Your client devices don't actually need to talk to the default vlan. The management IP for switches, APs, etc isn't needed for clients to function. Clients only need to reach DHCP and DNS on gateway IP if the console runs those servers (or other specific IP if running a local DHCP/DNS server elsewhere) and the internet. So my LAN LOCAL rules are to allow est/related, allow DHCP and DNS any/any, allow my Trusted devices IP groups (my user vlan and server vlan subnets for 2 locations, camera subnet and VPN subnet) to Trusted devices (lazy way to allow anything trusted full access to any of those subnets gateways for management), then deny RFC 1918 to RFC 1918. If you want to be a tad more secure you can remove cameras from the Trusted devices IP group, move to a Camera IP group, then on LOCAL LAN allow source camera to destination their gateway with only the ports needed for their functionality. Oh, and because it's not needed I did block my cameras from the internet.

    • @kuftamarc
      @kuftamarc 3 месяца назад

      @@Noob-5 Good call on the DNS. I’m not running it on my gateway, so not an issue for me but may be for others. I don’t think you need to allow DHCP any/any, as the destination IP address that your gateway gets is the broadcast IP (255.255.255.255), not the DHCP server’s unicast address, so the gateway wouldn’t block it. You could test to be sure. I block all traffic from most my subnets to their gateway on my IOT and Guest networks and never had an issue picking up an IP.

    • @jackcarr2763
      @jackcarr2763 3 месяца назад +1

      I have apple homeket devices on the IOT network and now I can't see them from IOS Home app, can I make an exception for devices that need to get to homekit. i realize I could get on the IOT wifi, it would be easier if IOT network can get information to and from homekit hub. I am not sure I am saying this correctly thank you

  • @Croc_Mais_Racing
    @Croc_Mais_Racing 4 месяца назад +1

    Thank you Cody for the 2024 yearly complete setup. Unifi changes their UI so much every year that it really does help each and everyone of us to start from scratch without forgetting anything.
    I really was looking forward to this video as I am after moving house and had to reset all my network devices.
    Your videos helped me set my network before and I'm very thankful!
    Keep doing what you do best, a great job!

  • @michaelsims7728
    @michaelsims7728 4 месяца назад +10

    Amazing how many creators just happen to put out a Unifi Network Complete guide at the same time... ;) . Love your videos!

    • @ThinkGreek88
      @ThinkGreek88 4 месяца назад

      Who else?

    • @marc3793
      @marc3793 4 месяца назад +2

      ​@ThinkGreek88 SpaceRex on the same day. How funny! This one has more details on firewall etc which is nice. The other is more beginner I would say.

    • @ThinkGreek88
      @ThinkGreek88 4 месяца назад +1

      ​@marc3793 I'm new in the whole network thing..
      Trying to set up my new house.
      Thanks for the hint I will check the vid out too..

  • @BazejTuszynski
    @BazejTuszynski 29 дней назад

    Great video as always! For those experiencing issues with ICMP/Ping tests and still getting timeouts after setting up the rules to allow network communication, the likely cause is that Windows Firewall blocks ICMP by default. To resolve this, you'll need to create a custom inbound rule in Windows Firewall that specifically enables ICMP over TCP/IPv4. This should allow the devices to communicate successfully.

  • @noloboy
    @noloboy 4 месяца назад +4

    What perfect timing! I was just watching your 2023 video as I'm going to re-do and start from scratch my UDM-Pro this afternoon. I guess I'll delay a bit after I digest this video. Thank you!

  • @johnvanwinkle4351
    @johnvanwinkle4351 Месяц назад

    Thank you for this information! I just bought a new UDM, POE 24 port switch, NVR and 6 cameras for my new home and I am slowly installing it now. Very timely information!

  • @gjhunter9326
    @gjhunter9326 4 месяца назад +4

    Just replaced my pfSense router with UDMP SE, this video was fantastic! Thank you Cody!

  • @peerview
    @peerview 4 месяца назад +2

    Thanks for this videos, recently switch to Unifi and loved the guides to know the best practices and new options. Keep it up

  • @SpiderSato
    @SpiderSato 4 месяца назад +2

    Good timing
    My Cloud Gateway Ultra will arrive today.
    Just launched yesterday here in japan.
    Keep up the good work

  • @andrescalapt_
    @andrescalapt_ 4 месяца назад +8

    Let’s goooo! Was waiting for this one! ❤

  • @Jupiter0ne
    @Jupiter0ne 4 месяца назад

    Thank you Cody for making and remaking this video every year. Unifi changes their UI so much that it really is needed so we can go back and refer to something when needed. Your videos helped me set my network a year ago and I'm very thankful!

  • @kelemvor3333
    @kelemvor3333 4 месяца назад +2

    Well that was fast! Watching it now as I just got my WAP yesterday so I can finally use my UDM SE.

  • @ivankolev459
    @ivankolev459 Месяц назад

    Thanks mate! Finally I have clarified to myself how are vlans functioning! Huge thanks!!!

  • @rq-nt7zi
    @rq-nt7zi 4 месяца назад +2

    Thank you so much! I was playing with these firewall settings last week and missed the top down rule set. Thanks for making another great video!

  • @NiftuCalTheGOD
    @NiftuCalTheGOD 3 месяца назад

    This is an unbelievable guide for any Ubiquiti user and configurator! Tyvm, you're awesome!

  • @genxguy
    @genxguy 4 месяца назад

    Probably the best Unifi instructional videos out there. I know most of this of it but great to fill in a few gaps and refresh the brain cell!
    VPN wifiman for desktop! Didn't even know that existed 🤦🏻‍♂️🤣

  • @Bloodycub666
    @Bloodycub666 4 месяца назад +2

    Thank you for this video will do this weekend and add this as favorite! Keep on going hope reach 100k SOON!

  • @antoniorodrigues8495
    @antoniorodrigues8495 4 месяца назад +1

    Amazing tutorial. Good Job! but I am still with old square USG due to less budget that satisfies home security needs. Anyway i got the knowledge. Thanks Cody...

  • @SnowBob302
    @SnowBob302 3 месяца назад +2

    This is the best video but one issue I had with this setup is that HomeKit devices on the IoT network stop working when the blocking firewall rules are put into effect. I tried searching the UI community and Reddit but looks like there’s not a clear guide on how to keep HomeKit devices segregated on an IoT VLAN while allowing HomeKit to work properly. I tried putting HomePods on the IoT but iPhones on the Secure VLAN can’t reach them. Same for the other configuration. mDNS settings didn’t clear this up for me. I would love if you could take this one as a separate video: “HomeKit Setup with UniFi.”

  • @andyjayh
    @andyjayh 4 месяца назад

    Great video, well structured and explained. I was finally able to apply f/w rules between my vlans and confidently fault find to fine tune. Thank you.

  • @TomasVillegas
    @TomasVillegas 4 месяца назад +1

    Appreciate the work you put into this and thank you for sharing 🤝

  • @ttam1534
    @ttam1534 4 месяца назад +2

    Great video, don’t know if I missed it or misunderstood, but with the separate VLANS for IOT and secure, how do I control my IOT devices with my iPhone that would be connected to the secure network?

  • @AlexPettitt
    @AlexPettitt 4 месяца назад +1

    Great video. Can you expand on what you said at 24:55 around not wanting to block a camera VLANs gateways due to it slowing things down. What then would be the process for setting up a camera VLAN? Would you still create "Black Cameras To Gateways" and "Block Cameras to UDM Interface" rules for the camera VLAN?

  • @notsrynot
    @notsrynot 4 месяца назад

    Yoooo I’m so excited to watch through this, I haven’t touched my UDMSE config in over a year and I know with an update some of my firewall rules went wonky so this will help a lot

  • @YYSilby
    @YYSilby 4 месяца назад +1

    These videos are always super helpful! Thank you!

  • @nduri2
    @nduri2 4 месяца назад

    Excellent video. Considering upgrading to Unify from a mix of various, random gear...wanted something more Unified, pardon the pun...BTW I found your channel at the right time, great information.

  • @mkbean
    @mkbean 4 месяца назад +2

    Have you considering doing a video showing a potential migration from the UDR to a UDM (pick your flavor)? I know besides myself that others would be interesting in it.

  • @larslaguna
    @larslaguna 4 месяца назад

    How happy I was you have done a fantastic and easy to understand installation, very many and good tips for my part. Keep up your movies I love them +++++

  • @hyperprotagonist
    @hyperprotagonist 4 месяца назад

    As I’ve always said, I love your content! Keep up the great work!

  • @stepmback
    @stepmback 4 месяца назад +1

    If I followed this design what network would I use for my main workstation and my server? Secure? Also... when you say IOT what kind of devices are you talking about? What about a Nest thermostat or Nvidia Shield or Apple TV? Last question, what about iPhones, should they be on IOT as well?

  • @jyss60
    @jyss60 4 месяца назад

    Really appreciate your dedication to do this each year, straightforward and clear explanation

  • @dukeseb
    @dukeseb 4 месяца назад +1

    Thanks for all the hardwork on this Cody

  • @rodolforts
    @rodolforts 4 месяца назад +1

    Cody great video! Tks for sharing. Can you help me with one doubt? In the RFC1918 rule, if I have changed the IP address ranges in my network should I adapt the RFC1918 rule as well? Eg: 192.168.1.1 to 1.1.16.1... would affect the three IP ranges in the RFC1918 rule?

  • @barat7867
    @barat7867 4 месяца назад +1

    Would be nice to see, which things from this video couldn't be achieved by just using Layer 3. There's almost no resources about Ubiquiti L3 after recent updates. It would be nice to maintain inter-VLAN traffic with ACLs when UDM is down.

  • @TechGuyWiz
    @TechGuyWiz 4 месяца назад

    Just setting up a new Company with two sites thank you so much@

  • @tonyvowels5165
    @tonyvowels5165 4 месяца назад +2

    Thanks Cody good video. I am trying to find some more information on why you would allow Default to talk to all LANs and Devices. Are there specific reasons or white papers you can help point me at to address why this is needed. I have been running without this for some time and just want to expand my knowledge incase I have been doing something incorrect.

    • @kettnsaeg
      @kettnsaeg 4 месяца назад

      I'm pretty new to this topic and I was just asking myself the same question - would be glad if someone could clarify this!

  • @forsterdaniel
    @forsterdaniel 4 месяца назад

    thank you very much. Even with experience, this is a very good refresh to check if something can (has to) be improved.

  • @dukeseb
    @dukeseb 3 месяца назад

    thanks again cody, i needed to use this again after nerfing my UDMP

  • @4tv914
    @4tv914 4 месяца назад

    I've just updated my setup with your video last year, but still thank you lol

  • @marvinfrancisco4812
    @marvinfrancisco4812 4 месяца назад +1

    Just the right time before my UDM Pro arrive.

  • @__AT__0
    @__AT__0 8 дней назад

    Thank you so much for sharing this video! In addition to using these configurations, how would one set up Pi-hole with Unbound on a Synology NAS and use that as the DNS server on a UDM Pro/Pro Max?

  • @selectthedead
    @selectthedead 4 месяца назад +1

    Thank you for another build video!

  • @MikeS29
    @MikeS29 2 месяца назад

    I learn a bunch every video you make!

  • @carstenskjoed9026
    @carstenskjoed9026 Месяц назад

    Great video, so helpful…💪 thanks! 🙏

  • @dws1337
    @dws1337 3 месяца назад +1

    Hi, you say, that you block secure from accessing IoT. Usealy Smartphones and Laptops are in the secure network. What if you want to use a IoT Device App at the secure devices? Do you change the Wifi Network to do this?

  • @arthurbernardes1
    @arthurbernardes1 4 месяца назад +1

    Hey Cody, thanks for you great video.

  • @macm3086
    @macm3086 Месяц назад

    Thank you for sharing your expertise with us in this video. In our company, we have a small office and in different locations. Is it possible to control them all from one location?
    Sorry for asking, but I am new to the Unifi WiFi network and am trying to figure it out.

  • @MickParker-d9l
    @MickParker-d9l 2 месяца назад

    Loved this one but hanging out for the Camera Vlan set up. Any time frame?

  • @IbizaStyler
    @IbizaStyler 4 месяца назад +1

    Thanks a lot, Cody, for this video! I guess all of us really appreciate your work!!
    ...but, may I ask you a question please? The identity VPN feature... I would like to do the same as you in your video to allow the vpn users only access to my nas (it has the function as an exchange drive for teachers).
    So if I do exactly the same as you in your video, is it the same as split tunneling? So the users have access over vpn to my nas from their homes/their common school, but all their home/school traffic (normal browsing, streaming, etc.) doesn't run over our private internet connection... Am I wrong or does all their traffic run over my private internet connection? And if thats the case, how can I only allow split tunneling?
    I hope you can help or want to help me!! I've tried it with wireguard, but it doesn't work as expected (I'm sure it is a layer 8 problem ;) ) and also with openvpn. It was working, but the connection speed could be much better.
    Thanks a lot in advance, Cody!!

  • @JagadishM
    @JagadishM 4 месяца назад

    Thanks for wonderful setup complete video from Unifi,
    If possible can you make it same kind of setup from TP-Link it would be great helpful 😊

  • @NathanSweet
    @NathanSweet 4 месяца назад

    WDYT about using the Default network solely for adoption, then having a separate Management VLAN where the Unifi devices live? Would be cool to see a video about setting that up. I set it up but I'm not sure what optimizations are appropriate. Eg, should I check Isolate Network for Default?
    I did (stupidly) find that if you remove DHCP from Default then you have to boot into recovery mode and reset to factory default settings. Getting into recovery mode was a huge pain, as the UDM-SE just booted as normal despite holding down Reset. It took ~30 tries!
    EDIT: You started talking about blocking IoT from accessing gateways, then you blocked Secure from accessing gateways? Maybe I'm confused by the naming, eg you have a network named Secure and then create a rule "Secure IoT". I don't like naming the profiles what they are for, instead I name them what they are, eg "IoT gateway". Also I like Trusted for the network name.
    It would be good to mention that after setting the router to a L3 switch, firewall rules will not be applied anymore.
    Separating IoT from Secure is good, but you don't want hacking your fridge to compromise other IoT devices (like a door lock!). How to block IoT to IoT by default, but allow it on a case-by-case basis? Traffic on the same VLAN won't use firewall rules, so maybe this is not possible.
    I find it cleanest (especially when doing this for multiple networks) to block IoT to all gateways' HTTP, HTTPS, and SSH. I don't see a point in blocking non-IoT gateways. It's the same device as IoT's gateway. The important part is that nothing can be done with any gateway.

  • @ericilkwatson5557
    @ericilkwatson5557 4 месяца назад

    Thank you for this video. What is your reason for having a different WiFi subnet? I get why you want to have separate subnets for your IoT, Guest, and Camera devices, but why split your main subnet into two parts?

  • @orlovskyconsulting
    @orlovskyconsulting 2 месяца назад

    Great tutorial, from the preview this routing hardware looks like kind of as Cisco major competitor, sure you can configure yourself into failure, thats always challenges , but i like that this hardware is affordable it have the 2 10GB ports which can be used for wan and for lan.

  • @prfrag
    @prfrag 3 месяца назад +1

    Excellent!! What you do with the printers?? IOT? Secured? or dedicated vlan?

    • @antaloga
      @antaloga 3 месяца назад +2

      Separate VLAN is good if you need users on more than one VLAN to have access to the same printer(s).

  • @thesagarmatha
    @thesagarmatha 4 месяца назад

    Thanks for the 2024 setup guide.

  • @DeciduousNature
    @DeciduousNature 4 месяца назад

    What about when using a UNVR for the cameras? You only need to install Protect on the UNVR and then Adopt them via the UNVR in that case, right?
    I'd read elsewhere to: use both ports on the back of the UNVR. Connect the SFP port on the UNVR to the SFP port on the switch and put the SFP port (on the switch) in the 'Cameras' VLAN. Then connect the RJ-45 port on the back of the UNVR to the switch also and put the RJ-45 port connected to the RJ-45 on the UNVR on your Default network LAN (and that this will improve throughput and reduce buffering).
    Do you agree with this setup?

  • @jrogerss8616
    @jrogerss8616 4 месяца назад +1

    Have they fixed the issue with the UDM Pro that causes it to brick after power loss until you remove it from power for 24 hours? As of a couple of months ago they hadn't. I had to switch to a UXG-Max and a UCK2.

  • @krisleslie
    @krisleslie Месяц назад

    Can wait till we have you at 500k subs

  • @waltpage
    @waltpage 4 месяца назад

    Love the IoT network name of Deloris - I hope West World can make a movie or one more season to wrap everything up

  • @zweefvlieger
    @zweefvlieger 4 месяца назад

    Very nice video as always!
    I did my setup not to long ago.
    But I am struggling with airplay/cast function to my LG smart TV. I like it to be on a other vlan then default with airplay and casting working. Any ideas?

  • @MoneyMarcMes
    @MoneyMarcMes 3 месяца назад +1

    What online courses can you take for unifi to get a deeper understanding of firewall rules etc. Does Ubiquiti offer online courses?

  • @SnailDOS
    @SnailDOS 4 месяца назад +1

    Great video Cody!

  • @balla2172
    @balla2172 9 дней назад

    I watch this every year

  • @skrivyd
    @skrivyd 4 месяца назад

    Thank you for this! How do the Traffic & Firewall rules you created differ from the rules created with you check the "Isolate Network" box on the network config?

  • @navonenicola
    @navonenicola 4 месяца назад

    Hey Codi, very nice 2024 tutorial from "zero to hero"! 1 question, does the speed limit rule apply to the entire network or to one single client of that network ? If i got this correctly, setting X/X (mbps) means all guest clients have to share a X/X internet bandwidth...am I right ?

  • @JerryPena
    @JerryPena 4 месяца назад

    Hope you can do a video on the Tesla Wall Connector for some reason,. We Tesla owners can't connect the wall connector to Unifi Wifi. Tesla custumer support are not that informed in networking so we have to rely on our knowhow to find the sultion. Been following you for a while, so maybe you can get down to the cause and see if we can set something up on our settings, other than their recommendation of just having the 2.4Ghz radio on and only using WPA2.
    Thanks

  • @pe1pqx321
    @pe1pqx321 4 месяца назад

    Thanks Cody, have to have a look later!

  • @douglasthom3335
    @douglasthom3335 4 месяца назад

    Great video, but a little fast. How about a video discussing Guest Networks printing to a different VLAN using AirPrint.

  • @bryancamphens
    @bryancamphens 4 месяца назад

    Hi, what is your advice…the Cloud Gateway Ultra of Max? I have a 1Gb Ethernet connection and I only use the network option in Unifi because my cameras are from Eufy.

  • @oakfig
    @oakfig 3 месяца назад

    Bro they should pay you for this. It is greatly appreciated!!

  • @Mlo99
    @Mlo99 4 месяца назад

    Nice! Thanks for the update!

  • @BrazenNL
    @BrazenNL 4 месяца назад

    I'd love a video on how to gently progress from a 1GB network to 2.5 or even 10GB network.

  • @cajuclc
    @cajuclc 4 месяца назад +1

    As always an awesome video!

  • @Ex_impius
    @Ex_impius 4 месяца назад

    I confuse myself a lot making rules. Whats the best way to write a rule if I have say 5 Roku tvs in IoT? Need the Main secure network to talk to the Rokus but not talk back to secure. Like I said, I confuse myself a lot and what seems logical when making rules doesn’t work sometimes.

  • @MarioSesana
    @MarioSesana 3 дня назад

    So is this a complete guide I can follow to the letter? And does this work if my ISP Modem isn't on Bypass mode?

  • @balanced6352
    @balanced6352 4 месяца назад

    Amazing video. Thank you!!!

  • @parthshah3800
    @parthshah3800 Месяц назад

    @17:35, why do you add your main IP and the other 2 IP address to set up RFC1918? - (172.16.0.0 and 10.0.0)? any why those specific numbers and why that subnet?

  • @JeffreyFrye
    @JeffreyFrye 4 месяца назад

    Is there a difference between the 'Simple' Block Networks that you did between Secure and IoT versus the Blocking Inter-VLAN routing?

  • @SB-hu5uy
    @SB-hu5uy 24 дня назад

    That is a good video. But we are having problem with ID or wireguard VPN (we didn't test openvpn). Everything is set to default (ips, firewall, ...).
    1. we created wireguard server
    2. add some users
    3. install wireguard client
    4. user vas able to connect to vpn, user was able to ping VPN gw, user was able to ping UDMPM network, user was able to use internet.
    5. but user was unable to ping his own local network when connected to VPN.
    6. after restart UDMPM, user was able to connect to vpn, ping vpn gw, able to ping UDMPM network.
    7. but user was unable to ping his own local network and internet was not working.
    This is really strange as this happened now on 3 different devices without firewall rules changes. I am missing something or this is some kind of bug.
    We tried with different router (different brand) and everything is working as it should.

  • @k4hdw
    @k4hdw Месяц назад

    Great video!

  • @JMagG23
    @JMagG23 4 месяца назад

    Will you be going over any IPV6 configurations in the future with Unfi, love your videos as I have used them for reference to help setup my home network and firewall rules. Thanks!

    • @MactelecomNetworks
      @MactelecomNetworks  4 месяца назад +2

      Most likely not as I don’t use it but you never know what the future holds :)

  • @Vin68142
    @Vin68142 4 месяца назад

    Great video, I am still a bit confused with my upcoming setup. It's a small office 1000sqft split in 3 areas but open space. I was putting together my setup and ended up over $1000 which I think is a bit overboard, I just want (3) indoor cameras, poe. I have fios gbit coming and running my lines next week, so I was curious if you can provide any suggestions. No doorbels neded just 3 cameras (was thinking 2k torrents) and thats about it, would like 24hr recording and only need 7-10 days storage, specifically the mvr option as im abit confused there, would the $99 option work in my scenario? I appreciate the help!

  • @random-ig6tp
    @random-ig6tp 4 месяца назад

    Hi Mac, If you're routing traffic from one UMD to another. Are there any useful firewall rules to harden the setup?

  • @MrEricH5470
    @MrEricH5470 Месяц назад

    Cody, is there a way to copy certain configurations from one UDM backup, and import them into another UDM? For example Copy all the VLANS, Firewall Rules and VPN's from one UDM, and import only those selections into another UDM Pro?

  • @a.daubercy9784
    @a.daubercy9784 4 месяца назад

    I legit just got a new Ubiqiti install and added new switches, APs, an NVR, etc. I and I'm starting from scratch.
    But I have a few questions, in my network there is also a Synology NAS with an Ubuntu Virtual Machine running an ODOO Application.
    Ask :
    - In which Vlan is this best placed (Management!)?
    - This Application must be available via the internet (cloud), certain adjustments are required in the settings (VLAN, Profile, Firewall), only Staff & IoT Users should be able to do this.

  • @GpconnectInfohotspot
    @GpconnectInfohotspot 4 месяца назад +1

    hello, where do you get the icons to use with draw io ? thanks

  • @LordSaliss
    @LordSaliss 4 месяца назад

    Thanks for this! great video

  • @ZCTravels1
    @ZCTravels1 6 дней назад

    Question: how come when I setup L3 mitigation, sometimes my network certain devices gets complete slow down to near 0 mbps? I have to physically restart the switch to go back to normal. Also if I go back to normal mitigation L2 it is normal.

  • @marcorobbe9003
    @marcorobbe9003 2 месяца назад

    Hey, I just set up a Unifi Network. I have a UDM SE, a USW Pro Max 16 PoE and two Access-Points (UC HD in basement and U6+ in the upper floor). In the cellar I also connected a AVM Fritz WLAN Repeater. In My Rack I also have a Synology NAS. My Problem is: If I am in my office in the upper floor, my WOL from my iPhone dosen't start the Synology. But when I am the cellar the WOL works.
    As I could find out, that could be a problem with VLANS, but I couldn't figure out, how to solve this. Do you have a tip for me or maybe a video where you explained it befour that I did not find? Thank a lot

  • @mindcreativestudios4709
    @mindcreativestudios4709 4 месяца назад

    Can you do a video on setting up a mail server/ access on the udm?

  • @fordi_steve
    @fordi_steve 4 месяца назад

    Appreciate these bud!

  • @ebay11123
    @ebay11123 Месяц назад

    Do you know how to isolate ipcameras on a vlan with the UDM pro running protect on it. If the cameras are on another vlan the protect app can't see them so I'm looking for a way around that to isolate the cameras from the default network. Unifi support was not helpful. As of now the only way I know how to do it is to buy a separate UNVR pro and put that on its own VLAN with the cameras.

  • @brentfausett8989
    @brentfausett8989 2 месяца назад

    Any reason to configure switch ports to direct devices to virtual networks vs virtual network override in the device settings?

  • @GrahamWerle
    @GrahamWerle 4 месяца назад

    have you experienced an issue with NVRs dropping connectivity when blocking inter vlan routing?

  • @BattleBear96
    @BattleBear96 4 месяца назад +1

    One question about IDS/IPS: is this also limiting the speed for LAN-internal traffic (PC to NAS for example) to the limit of the router used (3.5 Gbps for UDM SE for example)? Is all this traffic then routed "over" the UDM for IDS/IDS inspection? Or is this feature for external WAN connections only? Greetings from germany :)

    • @antaloga
      @antaloga 3 месяца назад +1

      It only affects wan traffic.

  • @jaredgrieve5749
    @jaredgrieve5749 4 месяца назад

    So if you want to use PPSK and you want guests to be able to present on say apple tvs and print but dont want guests to see each other or staff, but want staff to be able to see each other for airdrop, I assume your only option would be to create a PPSK SSID for your secure network and your iot network and create a separate SSID for guests on the guest network since device isolation is enabled by SSID? Or would you make a single PPSK SSID and create firewall rules to allow the specific ports etc used by airdrop within the secure network only?

  • @carlosbril9412
    @carlosbril9412 4 месяца назад

    Cody, do you know if you will be able to disable shadow mode in the case that you need to run two different networks connected from your UDM PRO LAN port to a second UDM PRO Wan port?