

Unofficial Ubiquiti community.
Discover innovations, troubleshoot, and optimize your Ubiquiti products and software.
Got the new doorbell installed and I love it!
Got the new @ubiquiti doorbell installed and I love it!
Just got a HUGE care package from Can't wait to start digging into all this and getting it set up in the 6U rack they also included!
Just got a HUGE care package from @ubiquiti Can't wait to start digging into all this and getting it set up in the 6U rack they also included!
What does everyone think of the AI Key?
Click to view this content.
I'm not buying one. But the G4 Pro sucks at package detection. I wonder if this would fix it.
Ubiquiti MAC ACLs not working
I recently got into Ubiquiti, and am trying to limit intra-vlan communications.
I have a Proxmox server hosting a couple VMs that are on the same VLAN (192.168.8.0/24).
These two devices can ping each other, even after I follow the guide here. I've tried just adding that VLAN to the Device Isolation (ACL)
section in Settings > Network
as I believe this should just block everything within that VLAN, as well as trying to add explicit rules in the ACL to block client A -> B and B -> A with no luck.
I feel like I must be missing something simple. Has anyone done this successfully?
VLANs on Ubiquiti Switch
I recently swapped out my old TP-Link switch for a Unifi switch. I'm setting up the VLAN configs as I had it on my previous switch, but wanted to be sure I am understanding this correctly.
For some devices such as my APs, I am trunking the ports they connect to, tagging the VLANs that will need to be present for the corresponding WiFi networks these APs provide.
For other devices that are plugged directly into the switch and which should only have access to a single VLAN, I am setting that VLAN as the default network, and blocking all other VLANs.
Is this the correct approach?
Firewall rules not working as expected
I have a couple rules in place to allow traffic in from specific IPs. Right after these rules I have rules to block everything else, as this firewall is an "allow by default" type.
The problem I'm facing is that when I replace these two ports to match "Any" instead, those machines (matrix server and game server) are unable to perform apt-gets.
I had thought that this should still be allowed, because the egress rules for those two permit outbound traffic to http/s and once that's established it's a "stateful" connection which should allow the traffic to flow back the other way.
What am I doing wrong here, and what is the best way to ensure that traffic only hits these servers from the minimal number of ports.
Obtaining Certification ID's
I was certified on a couple of ubiquity products a few years ago and i've collected so many certifications over the last 20ish years that i can't remember which ones they were.
does ubiquity have a way of letting you look it up?
VPN Client Kill Switch
I am getting used to Ubiquiti, and recently added a VPN Client to cover one of my VLANs. Am I correct in my understanding that having no Fallback
option is essentiall a Kill switch that will not allow traffic to pass outside of the VPN in the event it goes down?
Firewall rule check
I recently started playing with UDM after having been in PFSense for the last few years. In PFSense, I had a pretty organized rule set for each VLAN, and it was pretty easy to read and follow compared to the single list for rules in UDM (though it makes up for it in other areas).
I'm trying to recreate some of my original rules and flows, but wanted to get another pair of eyes on them to be sure I am using "LAN In"
and "LAN Out"
correctly (especially on the rules where I try to only allow necessary devices/ ports out to WAN).
Setting UDM Pro to a non-default network
Just joined the club and got my first piece of ubiquiti gear! I spent some time doing the initial configuration and adding my VLANs, static IPs, however I ran into a bit of an issue that I'm sure is a quick fix.
By default the UDM Pro is on 192.168.1.1, and that's fine. I actually use the 192.168.1.0/24 as a management VLAN for networking devices that other VLANs don't need access to.
The problem I'm running into is that this default space that the UDM Pro is on does not have an option for a VLAN tag. I can change the IP of the default network to be something else like 192.168.100.0/24, and make a management VLAN on 192.168.1.0/24, but then the UDM Pro will grab a 192.168.100.0/24 address (since it is on the default network).
How, after doing this, can I set the UDM Pro to be on this new management VLAN and not the default?
This preview covers the specs and my initial impressions of Ubiquiti’s latest batch of Wi-Fi 7 UniFi access points: the U7 Pro Max, U7 Pro Wall, and U7 Outdoor.
Wi-Fi motion detection
Think we’ll ever get something like this? I miss it from my old Plume network.
UniFi 7 Introduced
Ceiling-mounted WiFi 7 AP with 6 spatial streams and 6 GHz support for interference-free WiFi in demanding, large-scale environments.
Protect access with wireguard vpn
Since the whole security issue popped up, I decided to disable remote access for both my udm pro and UNVR.
I am able to access the udm pro via the unifi app through wireguard but I am unable to access protect.
Has anyone gotten this to work?
Wireguard doesn't allow Server <-> Client pings
So I have two sites: my home network and my cloud VPSs. I have setup a FreeIPA domain that I would like to use for all my machines, local and remote. While I wait for Linode/Akamai to add their new VPC feature, I want to create Wireguard tunnels from each VPS to my home network with my UDMP as the router. I tried to set it up through the UI, however I can't ping to/from the server wireguard interface when connected. So I tried to set it up with wg-quick
but alas that isn't working either. I have the firewall port for wireguard open with both Internet In and Internet Local. I'm not even trying to get LAN access yet because I can't even ping over the tunnel. This has seriously frustrated me and I need to see if I'm just majorly fucking up or if I'm sane afterall and the UDMP just isn't good for Wireguard.
Server conf:
undefined
[Interface] Address = 192.168.84.1/24 ListenPort = 51820 PrivateKey = [server private key] [Peer] PublicKey = [client public key] AllowedIps = 192.168.84.20/32
Unifi Express initial observations
I bought a Unifi Express to upgrade my parents in law from an old orbi mesh system that I handed down to them. I'm hoping this will improve their network, and allow me to remotely help them more easily.
After receiving the device, I decided to first test it out in my network to see if it was a viable replacement for my USG-3P and my RPI4-4GB. TL;DR: it is not.
My setup: 1x U6 Lite 1x AC-AP Lite 1x AC-Mesh 1x Nano HD 1x USW-8-60W 1x Lite 8 POE 1x Flex Mini 1x USG-3P 1x Raspberry PI 4-4GB running pihole, Homebridge, controller 1x Raspberry PI zeroW running redundant pihole and critical redundant homebridge items Centurylink Symmetric gigabit fiber
I have around 35 smart home wifi devices and in generally around 55-60 total clients connected to my network.
I loaded a backup from my RPI4 controller to get started.
My initial attempt just failed, as I tried to like set it up while connected to my existing network. I was also just not used to dealing with a UnifiOS console device an
Ubiquiti stocking issues
Ubiquiti makes some pretty great products, but too many of them are constantly out of stock. I was definitely giving them a pass in 2020, 2021 etc, but this is starting to look like it is now intentional. They are simultaneously out of the express, uxg lite, UDR, and the USG-3P. The only non rack router that is available in the store is the UDM, which they are no longer advertising without searching for it.
I know that the express and uxg lite are brand new, so maybe they can get a pass. The UDR has been out for well over a year. The UDM is just sort of too expensive to be bought without wifi6, and appears to be on the way out.
Further, the U6-lite is also sold out. This just forces people to pay an extra $30 for the U6+ with wifi6 on the 2.4GHz radio, and I'm not really aware of anything that uses wifi6 on 2.4GHz (maybe new mobile phones etc, but they will be defaulting to 5GHz...).
Ubiquiti even hired some B list actors to do an "Apple like" advertisement on their home page for
UDR in a townhome
Does anyone know if I use a UDR(plan on getting one once it’s back in stock) in the 3 level town home how I can extend the signal to the top level. Unfortunately I’m stuck with using the connection to the modem in the bottom level and it’s been difficult to get reliable signal through the house. I was thinking if I have the UDR on the bottom level and use either the U6 extender or the U6 mesh via a moca connection(don’t have Ethernet run in the house but I do have coax). Thanks.
Unifi Network 8.x for self hosted Raspberry PI
Somewhat recently I had to update to the 64 bit version of Raspbian OS to use Unifi Network 7.x. I had to use the tutorial linked from pimylifeup. Today the apt update switched to the 8.x branch of distribution and it said my architecture of armhf was not supported. To fix it, I just had to edit the file: /etc/apt/sources.list.d/100-ubnt-unifi.list from "arch=armhf" to "arch=arm64". If you were already running the latest 7.x then this should get you up and running. If you are upgrading from something older, visit the linked tutorial to get everything you need to be updated.