This is soooooo helpful because you explain the rationale behind everything instead of just showing which rules to add! The information you put out on your channel is amazing!
@SeanDevonshire10 ай бұрын
Great video Chris cheers mate. ~ Caution: To those following and deploying Chris' method for your networks. Switching your UDM into the legacy user interface, In "Routing & Firewall" Tab, you will find there is no longer the selection bar for Traffic direction above your Rules table. (IN/OUT/LOCAL-LAN/WAN/GUEST)etc I found out the hard way, Post deployment (causing all sorts of problems) Due to some of my rules being incorrect. Beers++ didnt help* Work around: During all your Rule creations, Toggle them from Enabled to Disabled, after you have added all you need. Switch back to the New User interface, Revisit your new rules, define Lan IN/OUT/LOCAL etc and then enable.
@ElTorro94499 ай бұрын
Maybe @Chris should make light in this, most of us we already use udmSE and it's a nightmare to recover everything.
@NguyenCungHoaHien8 ай бұрын
Thanks for the great tip, Sean. I followed exactly Chris's steps but didn't manage to get it work. I even watched back the previous parts to replicate the same configuration but didn't help until I saw your notes.
@ElTorro94498 ай бұрын
After an accurate attention at every detail, I managed to make it work. There are steps that are not so good explained but if you remain focused on settings, you eventually make it work. One problem that I encountered it was when I move Alexa devices on IoT and I cannot manage to register it until I temporarily disable group rule with deny gateway access.
@NguyenCungHoaHien8 ай бұрын
@@ElTorro9449 Yeah, I get similar issue with my Smart TV, the TV remote app on my phone (connected to main Wifi) could't detect the TV on another network (IoT). Not sure if there is any solution to this, I think it's just caused by how the app search for devices on the very same network/subnet.
@sb861168 ай бұрын
Thanks for the note. I was just about to have to fight through this too!
@davidwright61053 жыл бұрын
Thanks Chris for breaking these vidoes down into sections. I used your hour long video to set up my UDMP. You do a great job.
@JokaJors3 жыл бұрын
Great video. Can you please do a video on the Security Camera VLAN.
@TheSki753 жыл бұрын
Waiting for that setup part as well
@shaunlavoie61833 жыл бұрын
Same!
@aerialscout53153 жыл бұрын
+1 for that video
@Platoface2 жыл бұрын
Same here.
@thesagarmatha2 жыл бұрын
same here,
@CoderMan Жыл бұрын
Most comprehensive guide i've found on the UDM! Also learned a bit more about firewall rules.
@andysilvester4836 Жыл бұрын
Thanks! This series has been really helpful. I just added a Unifi UDR to my home network, set my existing router to 'modem' mode and set-up VLans to cover my main, guest and IoT needs. Of course the Unifi console (4/2023) looks a bit different to yours, but generally can be followed. My question now is about allocating physical ports on the UDR to a specific VLan. My home is cabled with several switches where I don't want ALL devices on (say) the IoT Vlan, so should I NOT set port allocation specifically (i.e. default to 'All') and then set firewall rules to isolate devices between VLans? Many thanks again!
@LTZAK Жыл бұрын
Thanks Chris! I have been fighing vlan firewalls for almost 6 hours now. One 30 minute video from you resolved my issue.. Thank you very much sir.
@lachlanhunt3 жыл бұрын
For those with IPv6 available, be very careful enabling IPv6 on the IoT network. The rules discussed in this video only apply to IPv4 and if you enable IPv6 on the IoT network, you will need additional rules to fully block access to the UDM-Pro interfaces. My ISP gives me a single public IPv6 address for my router in a /64 range, and a prefix delegated /56 range for everything else to use within my network. Note that different ISPs may allocate IPv6 differently. if your ISP gives you a prefix delegated IPv6 range like: 2001:0DB8:1234:ABCD::/56 then the rules in the video would still allow to access the UDM-Pro interface on [2001:0DB8:1234:ABCD::1], as well as on the router's own public IPv6 address. I recommend keeping IPv6 off the IoT network to prevent this entirely, unless you're confident in writing rules to cover all possibilitirs. You may also have similar considerations for the guest network if you have one.
@SeattleSandro2 жыл бұрын
Chris, thanks so much for this series. I had to stumble a lot while setting up my network, but these series has been super helpful. So much so that as a weekend project, I'm going to redo my network, so it's more inline with best practices. I really appreciate your time in putting the series together.
@BergeSimonian5 ай бұрын
I'm just getting my UI setup up and running this week and this is a life-saver video. Thanks for all that you do!
@willgaines13503 жыл бұрын
This series was perfectly timed. I followed it to a T to install my UDM pro and access points. Thank you so much. Would love to see a video on optimizing multiple access points. Thanks again.
@willgaines52692 жыл бұрын
I just did a real life double-take reading this comment because I had no recollection of posting it, but then I realized it wasn't me. What a crazy coincidence.
@XUltimatomX2 жыл бұрын
@@willgaines5269 haha
@GunMD2 жыл бұрын
Finally got around to implementing this type or ruleset on all of my vlans (IoT, Casting, Voice, Video Surveillance, and Guests). This video made it very easy. Thanks again for everything you contribute to the community. Keep 'em coming!
@edgew00111 ай бұрын
Thanks! Enjoy a Voodoo Ranger beer on me! The Ubiquiti Dream Series was great!!!!
@DeepFriedLettuce2 жыл бұрын
I'm glad I watched this video. I just set up a new site on my controller and had forgotten to block the gateway!
@HiSk0L3 жыл бұрын
great video. if you could go through the pocess of adding rules for pi-hole and plex across iot and main lan networks that would be helpful.
@auToeXe3 жыл бұрын
If you want to poke holes in the firewall, Chris actually has an example in one of his older videos: kzbin.info/www/bejne/bHbPemuHmr6VkLM
@jspace34233 жыл бұрын
@@auToeXe That's a great video - would be super cool if he would do an updated one though.
@BansheeBunny3 жыл бұрын
@@auToeXe I was able to get Plex to work using that video but my PiHole was still unreachable after opening up port 53.
@tsembelk2 жыл бұрын
Great video indeed, I followed the process this morning. I was thinking the same for pihole and Plex. 😂
@crazyjoezx2 жыл бұрын
@@BansheeBunny Did you ever figure it out?
@bas82002 жыл бұрын
Hi Chris, amazing video series and definitely my Go To for setting up and maintaining my UDM PRO network setup at home - including very recently with adding UniFi protect to my setup. The one thing I keep on struggling with, and which many has tried to tackle, is how to successfully access and control SONOS devices on the IoT VLAN from the main LAN (by iPhone or iPad for example). Would you like to consider making a dedicated video on this, as no other channel on KZbin has successfully managed to do so. Many thanks for considering in advance and keep'm coming!!
@willh202 жыл бұрын
I second this idea
@nightlifeking Жыл бұрын
I’m going to try this out and I could be wrong, but the first thought that comes to mind is that in this video he allowed private IP ranges when the SONOS uses broadcast and multicast non routable IP ranges. I’m assuming because the broad/multicast packets only stay within the switch domain, that you would need to setup snooping and forwarding of multicast/broadcasts from the IOT to the LAN or vice versa. Just a thought.
@twitch2021Ай бұрын
Having the same issue with my Philips Hue setup. To access my HDMI Sync Box through the Hue app on my iPhone, I need to be on the IoT network I setup. Not sure what I need to do to get around this.
@michapeliszko4907 Жыл бұрын
Dziękujemy.
@regdrapeau49038 ай бұрын
I want to say thank you for the 1 -5 videos. Even though my UDM-Pro is running the newer UniFi OS 3.2.12 I was able to follow along pretty good. The only thing that was really different was in the version 3.2.12 OS, when you go into the Firewall rules, it does not show the WAN IN, WAN OUT, WAN LOCAL, LAN IN, LAN OUT LAN LOCAL options at the top like you had. If you ever update your video because of the new OS changes that would probably be helpful to some. Much appreciated!
@forsterdaniel3 жыл бұрын
LOL had to watch it two times to fully understand. Thank you very much for this great detailed network setup, thumbs up !
@muellerworld3 жыл бұрын
Thank you for all the great videos. Like other commenters, I'd love to see a video on setting up multiple printers that can be accessed from the main LAN, Guest Network, etc. Would you keep it on the main network, and allow other networks to see the IP address (static IP or DCHP?), or put the printer on it's own VLAN, and allow access from other VLANs? Thank you!
@frhwebmaster2 жыл бұрын
Great Question!
@minthos4045 Жыл бұрын
This guide is likely the best in the internet. Very well explained.
@patrick2799 Жыл бұрын
Thanks! Truly helpful!
@bergePanzer5818 ай бұрын
Just got my UDM-SE up and running today. You earned a subscriber here. Thank you for this!!
@ehrhardtgroothoff14672 ай бұрын
Chris, I can't thank you enough for this UDM-Pro Set-up series. Just got broadband fiber connection to the island I live on and invested in a UDM-Pro and accompanying switches. I'm a newbie to networking. Your series made this leap a great deal less stressful and everything worked out of the box following your steps. The newest firmware has some differences like no legacy mode, no Lan Local tab (its a drop down now) and Groups are now under Profile. But you made it so easy! I am particularly thankful for Session 5 on setting up firewall rules to lock down my ROKU and future IOT stuff. Thank you.
@connorblask2 ай бұрын
There is a legacy mode. Go to Settings > System > Advanced and change interface to Legacy.
@pensiveboogie2 жыл бұрын
Hey Chris, I have a basic UDM but I found that most of the config provided in the tute worked for me, thanks. I’m not sure if you are monitoring comments for a post made a year ago, but if you are, here’s some info I discovered when following your tute. I have around 42 devices, and all but my core Apple devices (no pun intended) are on the IoT network and WiFi. When I set up just 2.4Ghz per your advice, my Speedtest, which is normally 100Mbps down, virtually halved. When I added 5Ghz my speed returned to 100 down. I checked the list of clients and only my Amazon devices (three Echo speakers, two Echo Shows and two Dots) were capable of using 5Ghz so I switched 5Ghz back on, and my top speed returned, so I have left it that way. Thanks for the great tutorials. I am working my way through those that are relevant to my setup. By the way I’m in Australia, mate. Fair Dinkum. G’day, how ya goin?
@_intrepid Жыл бұрын
This video is gold. I need to set up some cameras and was thinking about properly isolating them. This is awesome.
@sturgeda733 жыл бұрын
Another great video. "Before we HOP in"....I see what you did there.
@peterwellmann51505 ай бұрын
Hi Chris, even today - 2 years later - running a Cloud Gateway Ultra with completely different user interface ... I succeeded setting up my 10 VLAN's. THANK YOU!
@ehusband5 ай бұрын
This video series is fantastic, thank you!
@Bogomir.2 жыл бұрын
Hi Chris, many thanks for this video. Everything works very well as described. In which network did you setup your HomePod and your Apple TV (AirPlay, Remote, HomeKit, etc.). Would love to see an update video. 👍
@robdevlin21113 жыл бұрын
“Before we *hop* into this video” with a beer in your hand. #iseewhatyoudidthere Thanks for this whole series. I don’t have a UDM, but this was extremely helpful in getting my setup with the USG working properly, as well. Small changes and adaptations but the core steps were all there for anyone to follow. Cheers to that! 👍🏼
@johnm869313 күн бұрын
Can I just say breakin' out the Voodoo Ranger on your YT channel while setting up the network is the coolest thing I've seen in a while?
@typkrft Жыл бұрын
I appreciate these videos so much, they've been a tremendous resource over the years to help me learn and grow as a homelabber. I wish you and yours all the best.
@nickwheeler66853 жыл бұрын
Hi Chris, another great series of videos!! What are your thoughts on setting up a separate network for UniFi protect? and would you do a separate video on this? Keep up the good work!
@jspearm19832 жыл бұрын
This is a great video series and has really helped me. Like others in the comment section here, I still have a few questions around Apple-Airplay and Network printers. My incomplete solution is to just put those devices on the main LAN instead of the IoT vlan, but that doesn't seem like the true solution.
@Beelaim Жыл бұрын
would be really helpful with an updated video with the new interface, since Im doing this via the web I do not have the option to switch to the old one
@mpwieland3 жыл бұрын
I really love to watch your videos, even sometimes hard for me to understand, meaning viewing your videos several time again and again. GOOD STUFF !!!
@AlbaTech3 жыл бұрын
This is one of the most useful UniFi videos I have come across, thanks.
@MarkvanDeelen9 ай бұрын
Thanks a lot Chris for this clear video. It really helped me to setup my IOT and guest network. Also well explained, not everyone has this skill.
@gsethi20032 жыл бұрын
Best explanations of UDM available on the Net, trust me I have looked!
@SimonAgricola3 жыл бұрын
Hi Chris, great video! Love all the video's you make on the UDM-Pro. It is a perfect preparation for when I buy my own UDM-Pro. Could you explain why you didn't use devise isolation with IoT devices?
@MrGatlin983 жыл бұрын
I have this same question Edit: Maybe it's because IoT devices need to be able to see each other? Like a hub of some sort connect to devices
@karmaomg3 жыл бұрын
I too have the same question. MrGatlin's theory may be the exact reason but I've no idea. Thanks for putting this series together. Very much appreciated for assisting in setting up my UDM!
@skywagonA185F3 жыл бұрын
@@MrGatlin98 I'm pretty sure this is the case with Nest. When you add additional devices to a home it gets its configuration from peers.
@shredit_nyc3 жыл бұрын
@@skywagonA185F Ah, I didn't think of that. This Nest requirement aside, it seems setting device isolation makes sense.
@wwolfram332 жыл бұрын
Great presentation. The intro. to the firewall rules was fantastic!
@bfranks772 жыл бұрын
Just wanted to comment that as of the current update (6.5.55), the firewall rule for the guest network no longer works as described. The firewall setup in the new UI has a section specifically for guest, so all of the firewall rules for the guest network had to be moved from the Local Lan section to the Guest section..
@trevinc6 ай бұрын
This is an incredible video, thanks so much! One thing to consider is a new video that talks about your POV and advice on using the new feature of "Preshared Keys" which allows you to have a single wifi network map different pwds to different VLANs. Very useful to simplify setups.
@skywalkernoscope19543 жыл бұрын
Hi Chris, great video, learned a lot from it. I was just wondering, for a "surveillance/ camera" VLAN would you put your NVR on the main VLAN or on the surveillance VLAN? And what firewall settings would you use? I would love to see a future episode where you could go through that.
@leephcom3 жыл бұрын
In the case of Unifi Protect, the NVR really needs to be on the same subnet as the cameras, otherwise discovery & adoption doesn't work.
@gurban3332 жыл бұрын
@@leephcom if its a UDM PRO its on all the VLANS by default
@DwarDPT Жыл бұрын
Thank you SO mutch for this video! Love how you explain the firewall rules and it made it ALOT easyer for me! Thanks!
@CharlieReeves-gb3sv Жыл бұрын
Great videos. Thank you so much. Two questions - 1) Why did you only want to block the IoT network from the UDM-Pro Access ports and not also the Guest network? Is it because the guest network by default is blocked? 2) what is the benefit/logic to the allow established/related connections rule? I am just learning and want to make sure I am not missing anything. Thanks.
@sml2238 Жыл бұрын
excellent tutorial series this helped me more than any other video, post, etc.
@MyClato2 жыл бұрын
Hi Chris! Well done with these clips. I used them when setting up my IoT network and installing UDP Pro. I will buy you a beer! Cheers!
@thembones189510 ай бұрын
This was awesome, thanks. I did it in the native UI in my edgerouter, not this UI/appliance you are using - so just had to manually create LAN-in and LAN-local, but otherwise this worked great. Will have VMs on my isolated (setup like your IoT) network with some forwarded ports. Thanks again!
@johnaguilera68973 жыл бұрын
Chris - thanks for the great video tutorials, I used them to setup my UDMP. I used your firewall rules to segregate my networks and I would like to implement pihole. Can you add a video on how to implement with firewall rule setup steps?
@generalcohan42412 жыл бұрын
Now, ,this is a simple and important video to watch. Thanks
@louiskoh43642 жыл бұрын
Hi Chirs, your series of videos on UDM Pro guided me pretty much from the start to end in setting up my home network. Have 1 question though, if I need to print from a Computer connected to VLAN1 to the printer which is in VLAN2, is there a way to do so?
@stefanfroese2015 Жыл бұрын
Like so many already commented here: THANK YOU so much for this series of how-to videos. I can't wait to set up my newly purchased UDM-Pro with the help of your guidelines. Oh, and that beer is one of my favorites - zum Wohl und Prost!!!! 🍻🍺🍻
@TankSchu2 жыл бұрын
Great video series! Helped me do exactly what I wanted to do on my new UniFi home network! What are your thoughts on enabling and setting up firewall rules for IPv6? I figured out how to get it set up and working for each VLAN, but I don’t know what firewall rules to use to create the same security and network segregation for IOT devices that would mimic the rules you suggested for IPv4. So as I keep digging to find good firewall rules, I decided to revert to disabling IPv6. :(
@Mekillewe3 жыл бұрын
You can add firewall rules using the new interface mode. Under Security/Internet Threat Management/Firewall is the option to add firewall rules if I’m not mistaken.
@BansheeBunny3 жыл бұрын
There is a reason the statement "Not seeing everything? Go to Classic Settings" exist at the top of Settings. It is not because they have been relocated, It is because some of the setting are not accessible in the new UI.
@Mekillewe3 жыл бұрын
I’m sure that is true. But all of the rules he added in the video can be added from the new interface.
@BansheeBunny3 жыл бұрын
@@Mekillewe He created a network and applied firewall rules to it for people not familiar with the processes. The old UI has templates for network purposes and doesn't truncate menu items into pull down fields, so it is a better teaching tool. If you know all the rules are in the new UI, why did you ask your question in the first place?
@Mekillewe3 жыл бұрын
@@BansheeBunny because he stated that you have to use the old UI to add firewall rules be the new UI doesn’t have that option. I was just pointing out that the new UI also has the option to add firewall rules as well.
@handlealreadytaken2 жыл бұрын
Just got my UDM-SE and this was really helpful to make sure I didn't miss all the ways to isolate my IoT devices. Now I just have a few dozen IoT devices left that I need to switch over which is probably the most time consuming part. So far Ring, Echo and Govee devices are easy to switch using the app, but the TP Link outlets require touching each one individually.
@bash65192 жыл бұрын
where did you find the Classic Interface option, I dont see it anywhere on my network system settings
@MichaelBesse-rf7wr8 ай бұрын
Hi Chris, thanks for all the great videos. I have just purchased a UDM-Pro and tried to follow the instructions for IoT VLAN, I think there has been some updates to the interface since you did the video, as some of the selections didn't match what I am now seeing. It would be great to see an update on this topic, perhaps even using the new interface. I have many, many IoT devices, so I really need to get a IoT VLAN working. Never the less your videos have been a great help.
@twitch2021Ай бұрын
Just wanted to say that I just recently set up my UDM-PRO and switch following this video series without much trouble. The interface has changed and even going back to the legacy interface didn’t always line up but with a bit of poking around, I was able to achieve everything he showed in his videos.
@BrendanBellomo2 жыл бұрын
Your tutorials and reviews are great! Thank you for making these.
@robdp89002 жыл бұрын
Just want to say I really appreciate the time you put into this video. I found it super helpful.
@NYTechDoof11 ай бұрын
Thank you again for an amazing video. Finally was able to take the time yesterday and set up my UDM-Pro with the IoT VLAN. Chris, have you considered doing an updated video on this, seeing that UniFi has removed a majority of items from the legacy side and added new features to the "new" side?
@lycediumАй бұрын
Great video! Thanks so much for sharing these configurations.
@roshinobi2 жыл бұрын
Thanks - this was exactly what I needed and crystal clear. AT&T fiber passes through the public IP to my UDM-SE, but it also keeps open a management UI at its own IP in the RFC1918 space, so I added LAN IN rules to block IOT and Guest from that very similar to how you blocked the UDM's UI. Thanks for clarifying this murky topic.
@bend3862 жыл бұрын
I was following this video to setup my network and I had some thought. If you have more than 2 or 3 networks managing the LAN LOCAL rules by using Groups of other gateway IPs becomes difficult and unscalable. I think a better way to organize things is to have 1. Block subnet to subnet gateway console ports (so any attempt to access the console is blocked), 2. Allow subnet to subnet gateway IP (so you can still access the internet, DNS etc) 3. Block subnet to anywhere (block all access to other subnet's gateway). This way however many networks you add you can just add these 3 rules and not worry about maintaining address groups etc.
@Maximusrex45752 жыл бұрын
When making the choice to allow 5Ghz, I have had IoT devices choke on a network that offers both when it only supports 2.4 Ghz. That is what encouraged me to look into making an IoT network years ago. Now that I have a UDM Pro it was nice to revisit with a newer source of instruction.
@mychaelhouck24043 жыл бұрын
Chris this is awesome, but I have some questions. 1) Does your G4 doorbell work on the IoT network? If so how would you give it access to the UDM? What about music streamers such as a Sonos Port? I'd like them to be able to hit local music on my main LAN.
@solaajewole25952 жыл бұрын
Love this video. You are always the best men. You should Teach men
@ken8593 жыл бұрын
Great Videos - Fan of the UDM Pro. Any chance you are going to cover VPN?. Have VPN running connecting via L2TP, but the VPN throughput of the UDM Pro is terrible. Maybe there is a way to optimize the throughput?
@CourtMcMullin3 жыл бұрын
Please do a video about the DNS setup!
@swytchnetworks44453 жыл бұрын
Extremely helpful! Thank you so much. I made some changes to my firewall rules and things are better than ever.
@BoricuaFez2 жыл бұрын
Awesome video!, doing research to implement this feature to secure my network.
@andyfinney68253 жыл бұрын
Chris - Great job! I was looking for the "Secure IoT Netowrk" video that was UniFi based and 'Ta-Da!' here is it. I tried to follow along with the Edge Router version but kept getting tripped up. Thanks again and the next time you're near N. Idaho I'll 'buy' you one of my home brews!
@5280Woodworking3 жыл бұрын
I setup everything with the new UI, including my 5 VLANs, WiFi networks, firewall rules...everything and then I switched to classic because I realized the new UI is incomplete. Thanks for the tip blocking SSH, I had HTTP and HTTPS but forgot about the former! Great video, where was this 3 months ago!
@frankho76323 жыл бұрын
Great channel and video as always. Opening the beer reminds me of CraftComputing though 😀
@TJDowling3 жыл бұрын
Chris, nice job. This one was easier to follow then the one you did prior. FYI.. I am still running the USG Pro 4 and once I put it in Classic mode, it worked like a charm.
@markjhorsley Жыл бұрын
Just what I was after, amazing video
@robindavey19202 жыл бұрын
Hey Chris, a wonderful series of videos, so thank you so much. I'm just moving over to UniFi kit and was wondering, if I create an IoT vlan and put my home assistant machine on that network and block access to my main home network, how will home assistants Unifi integration be able to work? Also, this would be true for any unifi protect cameras that may be connected would it not? Would love some help on this as I do very much want to segregate any IoT devices from my main home network. I saw a similar comment earlier, but haven't yet seen a solution. Apologies if it's already been answered.
@FelipeLoyo2 жыл бұрын
Hi Cris, you could make a video specific to camera's VLAN, how to continue recording on a separate network.
@thetango80173 жыл бұрын
Great video - Explained and easily understood. Your videos are better that anyone's.
@MiekSr Жыл бұрын
Nice guide. Is it possible to make an up to date guide on this for the new unify ui?
@henkbeerens32712 жыл бұрын
Hi Chris! Great videos, very helpful. If I understand correct I will want to also apply the last rule to my guest network and repeat all steps for additional VLANs like NoT en security cams, right?
@gabrielcastlebary28362 жыл бұрын
Bought UDM Pro last week. Setup networks.... added firewall rules..... IoT Network is locked down harder than a crazy person on Alcatraz. Thanks for such an awesome tutorial. I learned SO much by just following along and got something really cool for my home out of it. This is a fantastic series and I can not recommend it enough. Question: I'm noticing that the 'new' UDM interface has a "Guest Network" designation. Does anyone know what specifically that does? Part of me was thinking that it would negate the need to create a bunch of these firewall rules?
@Rosscoff20003 жыл бұрын
Hi Chris, thanks for the video. Can you explain why an IoT network can't simply be set up as a guest network with client isolation selected, rather than ploughing through all those firewall rules? I guess it wouldn't be an option if you had guest portal in use, but hardly anyone seems to use that (and in my experience it's flaky and just annoys guests!).
@MPaulCezanne3 жыл бұрын
I tried this and it appears to have accomplished all the blocks the firewall rules in Episode 5 were designed for (e.g., simply switching on Device Iso on the "20" network blocked 20.xxx from pinging 10.xxx, 1.1. and 20.1) while maintaining Internet access. Interestingly, my UDM-Pro strangely didn't seem to do anything when I put the individual firewall rules in place and I followed the instructions and methods exactly. Not sure why except Device Isolation definitely redefines the network "type" as Guest and applies the restriction rules in the Guest section of the Firewall. Maybe that's got something to do with it. EDIT: all the blocks in the vid except the full RFC1918 to RFC 1918 general drop rule on LAN IN of course.
@MatthewMorseCA3 жыл бұрын
@@MPaulCezanne @Rosscoff2000 If you had existing connections, say IoT devices already making persistent connections on your 20_net then they would either need to be restarted, disconnected for the timeout duration, or recycle the UniFi controller to establish clean blocking according the the sequential firewall rules in place. Many times it's often missed that a firewall restart is necessary for a global network to 'commit' the firewall changes during a live and persistent network update. Chris demonstrated this by breaking the ICMP ping, but it should be a footnote to either restart all your IoT devices to establish *new connections, or simply schedule a downtime to recycle your UDMP Network Controller. This is an IPSEC best practice and also validates your firewall rules stick and are persistent after a system restart/update, etc. If you have IoT devices like Amazon Echo where, for example, two Echo Dots are used for stereo playback of your music streams then those two devices technically need to "talk" to each other. Using the Guest network isolation capability will block that inter-device communication on the IoT VLAN if you set it up as Guest and not CORP type. If you really want to block device-to-device connections then yeah, Guest networks are great isolation solutions. But if you want an IoT device to communicate with a NAS for a service or data source like with a digital cam or music player then a Guest network type isn't the right choice. The firewall rules would be the correct path in that scenario.... #foodforthought
@MPaulCezanne3 жыл бұрын
@@MatthewMorseCA I actually had no devices connected. I was just plugging my laptop into ports that were assigned to specific networks. Restarted everything too. BTW - I submitted a support ticket to Ubiquiti and they were able to replicate the problem. Still waiting for a response on further action.
@Tom-ds8nb2 жыл бұрын
same question here. is it possible to set up the iot network as guest network without the firewall rules?
@johnmichaels72652 жыл бұрын
Nice guide Chris! One plaguing issue is setting up a Sonos speaker system on an IoT, and the Sonos controller resides on the main WiFi LAN. (UDM Pro) If you could address this sometime, I’m sure you would receive many beers! Thanks, John
@mcgooinc35682 жыл бұрын
I know this was made quite a while ago, but this episode and the last are absolutely brilliant!! I have setup and my network is now very secure and perfect, i have many IoT devices along with a large camera, security system at my property. everythings great! thank you for your time!
@deanantonakis90592 жыл бұрын
Did you just create separate VLAN for the cameras like in the video for the IoT devices?.. I have my Sonos working on my main network, have not tried it on a VLAN. Been reading about people having a lot of issues with Sonos in general so I am hesitant to move it off of there. Do have your printer on the IoT VLAN?
@mcgooinc35682 жыл бұрын
I created VLAN 30 for my Dahua CCTV and my home Alarm System basically mirror of the IOT setup. I don't have any IOT cameras but if I did I would just leave them on the IOT network on VLAN 20 so all my TUYA, Smartthings "IOT" devices etc all stay together... I have Sonos but haven't added it yet so I will add that to the IOT network and see if it functions ok?.. The only issue I had is that I have a large unraid server I don't want to take off the main network as it has all our media and mainly photos on it I don't want to lose, so as I have Google Chromecast TVs having them on the IOT network was playing against Plex saying it couldn't play things locally as it couldn't talk to the unraid server and would get it via the net so, lower resolution and that. So I put the Chromecast TVs back on the main network... (For now)...
@mcgooinc35682 жыл бұрын
... to add, with the printer I probably would add it to the IOT network as i don't need to use the screen on it to search the network... but just to receive data to then print from a device on the main network, so should function fine.
@deanantonakis90592 жыл бұрын
@@mcgooinc3568 ok thanks for input. Do you have Apple TV? I've been reading people having issues with Apple Tv sending airplay to a TV
@mcgooinc35682 жыл бұрын
Looks like my last comment got deleted, due to the link. But no I don't have any apple products, Google Chromecast TV worked perfectly fine on a VLAN though as it's a one way device where as apple airplay is 2 way and probably the problem. If you google: Airplay to Apple TV on VLAN - not working you should see a link to the ubnt forum which might help?!
@patrick40032 жыл бұрын
Very good video again, It was recommended to me that the "LAN" network be for the MGMT for the peripherals (Router, switch, AP etc) and to create another "main" type network (Main PC, printer etc) is more secure.
@seanclester Жыл бұрын
I followed right along with your setup here, now I've tried about every firewall I can think of to allow a phone from the Guest VLAN to be able to Print to a Printer on the Iot network. Any thoughts on how to accomplish this? After I tried every firewall rule I could think of, I turned to trying to figure out the Traffic Rules, since with the Network isolation turned on in the guest network, the documentation states that you can fine tune network isolation settings.
@WhatsUpWithSix Жыл бұрын
Thanks!
@bitkahuna3 жыл бұрын
great videos by the way. my main need apparently beyond this video is to be able to access an IoT device from the LAN, such as a chromecast, or smart TV i might want to airplay to from my iPad on the LAN.
@supremealpha12 жыл бұрын
Hello, today I was amazed with the great and detailed explanations. It helped me a bunch as the clarity of the information was very understantable. I just want to thank you for creating these videos. Please keep up the great work!
@CoFRHeLLsFuRy2 жыл бұрын
A video showing how to set up pihole would be awesome. Being able to control Philips Hue for instance would be handy. Plex too but I could move that PC to IoT network I spose.
@richardk77613 жыл бұрын
Hi Chris, thank you very much for this video. I have a Unifi EdgeRouter Pro-8 and have watched your previous video on IoT firewall rules, and implemented them too. These rules appear to be more comprehensive and was wondering how to translate the Unifi rules to EdgeRouter rules. I am a little unsure of the terminology used on the EdgeRouter. Love your videos. Greetings from Australia.
@daveagne33083 жыл бұрын
Thank you for your quite informative lectures. I've had to watch #5 at least 3 times through in order to catch everything. I am trying to follow your steps, mostly with success. However, when it came to the point of setting the specific port on the switch to use the IoT network, I've run into trouble. I set the port option, and then within 10 seconds, the switch disconnects itself and everything else down stream, from the network. I am using a UDM Pro, a Unifiy 24-port PoE switch, and a 16-port PoE switch. This is taking down most of my network when it happens. I have "liked", "Subscribed", and even hit the "Bell" icon. Looking forward to more videos. Thank you
@thesagarmatha2 жыл бұрын
Chris, please make a video for Camera Network.
@kearneyIT8 ай бұрын
Brilliant Video man. Love it, was killing myself moving from Cisco to UDM
@kristofgeerts13 жыл бұрын
Very helpful isolating IoT devices - thanks!
@tomasmatejka14437 ай бұрын
Like the beer you are drinking 🥰 is it only available in America or also in Europe?
@bellsyau2 жыл бұрын
Fantastic videos, very very helpful. The only thing that didn't work for me, was that the settings you suggested for the DHCP Name Servers. It caused my IoT network to not be able to connect to the internet. I just set it back to Auto and voila, all working. I can't quite determine why, I checked every switch, port profile, AP etc.
@JoeyD4rb2 жыл бұрын
So if I wanted to put my Apple TVs on the IOT network but wanted to use my phone to control the TV. Is that possible? My phone will be on the admin network.
@markc2283 жыл бұрын
Chris, great tutorial. Now I've separated out my IoT devices, I cannot see the IoT clients in the 'Client' tab on both old and new GUI. Am I missing a trick?