Ubiquiti Networks's Frequently Asked Questions page is a central hub where its customers can always go to with their most common questions. These are the 699 most popular questions Ubiquiti Networks receives.
Overview
After reading this article users should gain the knowledge to be able to configure and maintain the IPS/IDS functionality on their UniFi networks.
UniFi - USG: Responding to a Threat Detection Alert
NOTES & REQUIREMENTS:
Applicable to the following:
UniFi Network Controller software version5.9+
UniFi Security Gateway platform firmware 4.4.18+
UniFi Dream Machine platform
The configuration in this article refers to settings found in the UniFi Network Controller's beta settings. These new settings can be enabled by clicking "Try New Settings" at the top of the "classic settings" menu list.
Table of Contents
Introduction
Network Diagram
Intrusion Detection and Prevention
Categories
Whitelisting
Signature Suppression
GeoIP Filtering
DNS Filters
Filter Levels
Deep Packet Inspection
DPI Restrictions (Layer 7 Filters)
Network Scanners
Endpoint Scanner
Internal Honeypot
Honeypot Services
Testing & Verification
Privacy Statement
Related Articles
Introduction
Back to Top
An intrusion prevention system (IPS) is an engine that identifies potentially malicious traffic based on signatures. The signatures contain known traffic patterns or instruction sequences used by malware. This type of signature-based engine can only detect anomalies based on known malicious traffic patterns.
Network Diagram
Back to Top
Intrusion Detection and Prevention
Back to Top
To enable intrusion detection or intrusion prevention, navigate to the NewSettings > Internet Securitysection of the UniFi Network controller.
ATTENTION:
Enabling IDS or IPS will affect the maximum throughput on inter-VLAN and egress traffic.
USG: 85 Mbps*
USG-Pro: 250 Mbps*
USG-XG: 1 Gbps*
Enabling Smart Queues or DPI on top of IPS/IDS will also incur a further throughput penalty to maximum throughput.
UniFi Dream Machine throughput: 850 Mbps*
*Values are rough estimates and can vary depending on configuration.
Threat Management Modes
Intrusion Detection System: When set will automatically detect, and alert, but will not block potentially malicious traffic.
Intrusion Prevention System: When set will automatically detect, alert, and block potentially malicious traffic.
Firewall Restrictions
These restrictions can be found underNewSettings > Internet Security > Advanced.
Restrict Access to ToR: When enabled will block access to The Onion Router.
Restrict Access to Malicious IP Addresses:When enabled will block access to IP addresses or blocks of addresses that have been recognized as passing malicious traffic.
System Sensitivity Levels
The "system sensitivity levels" are pre-defined levels of security categories that will be loaded into the threat management daemon. Each level increase requires more memory and CPU usage. Additionally the "custom" level is utilized when manually selection categories.
Categories
ATTENTION:
Due to the amount of available memory on the USG3 and UDM a limited selection of categories can be enabled.
Click below to see a full list of categories.
Categories and Their Definitions
Click Here to Expand the IPS/IDS Categories Section
Activex: Attacks and vulnerabilities(CVE, etc.) regarding ActiveX.
Attack Response: Responses indicative of intrusionLMHost file download, certain banners, Metasploit Meterpreter kill command detected, etc. These are designed to catch the results of a successful attack. Things like "id=root", or error messages that indicate a compromise may have happened.
Botcc (Bot Command and Control)*: These are autogenerated from several sources of known and confirmed active Botnet and other Command and Control hosts. Updated daily, primary data source is Shadowserver.org. Bot command and control block rules generated from shadowserver.org, as well as spyeyetracker, palevotracker, and zeustracker. Port grouped rules offer higher fidelity with destination port modified in rule.
CIArmy: Collective Intelligence generated IP rules for blocking based upon www.cinsscore.com.
Compromised: This is a list of known compromised hosts, confirmed and updated daily as well. This set varied from a hundred to several hundred rules depending on the data sources. This is a compilation of several private but highly reliable data sources. Warming: Snort does not handle IP matches well load-wise. If your sensor is already pushed to the limits this set will add significant load. We recommend staying with just the Botcc rules in a high load case.
DNS*: Rules for attacks and vulnerabilities regarding DNS. Also the category for abuse of the service for things such as tunneling.
DOS: Denial of Service attempt detection. Intended to catch inbound DOS activity and outbound indications.
Dshield*: IP based rules for Dshield Identified attackers. Daily updated list of the DShield top attackers list. Also very reliable. More information can be found at http://www.dshield.org.
Exploit*: Exploits that are not covered in a specific service category. Rules to detect direct exploits. Generally, if you're looking for a Windows exploit, Veritas, etc, they'll be here. Things like SQL injection and the like, while they are exploits, have their own category.
FTP: Rules for attacks, exploits, and vulnerabilities regarding FTP. Also includes basic none malicious FTP activity for logging purposes, such as login, etc.
Games: Rules for the Identification of gaming traffic and attacks against those games. World of Warcraft, Starcraft, and other popular online games have sigs here. We don't intend to label these things evil, just that they're not appropriate for all environments.
ICMP: Rules for attacks and vulnerabilities regarding ICMP. Also included are rules detecting the basic activity of the protocol for logging purposes.
IMAP: Rules for the identification, as well as attacks and vulnerabilities regarding the IMAP protocol. Also included are rules detecting the basic activity of the protocol for logging purposes.
Malware*: Malware and Spyware related, no clear criminal intent. The threshold for inclusion in this set is typically some form of tracking that stops short of obvious criminal activity. This set was originally intended to be just spyware. That's enough to several rule categories really. The line between spyware and outright malicious bad stuff has blurred too much since we originally started this set. There is more than just spyware in here, but rest assured nothing in here is something you want running on your net or PC. There are URL hooks for known update schemed, User-Agent strings of known malware, and a load of others.
Misc.: Miscellaneous rules for those rules not covered in other categories.
Mobile Malware*: Specific to mobile platforms: Malware and Spyware related, no clear criminal intent.
Netbios: Rules for the identification, as well as attacks, exploits, and vulnerabilities regarding Netbios. Also included are rules detecting the basic activity of the protocol for logging purposes.
P2P*: Rules for the identification of Peer-to-Peer traffic and attacks against. Including torrents, edonkey, Bittorrent, Gnutella, Limewire, etc. We're not labeling these things malicious, just not appropriate for all networks and environments.
POP3: Rules for the identification, as well as attacks and vulnerabilities regarding the POP3 protocol. Also included are rules detecting the basic activity of the protocol for logging purposes.
RPC: RPC related attacks, vulnerabilities, and protocol detection. Also included are rules detecting the basic activity of the protocol for logging purposes.
Scan: Things to detect reconnaissance and probing. Nessus, Nikto, portscanning, etc. Early warning stuff.
Shellcode*: Remote shellcode detection. Remote shellcode is used when an attacker wants to target a vulnerable process running on another machine on a local network or intranet. If successfully executed, the shellcode can provide the attacker access to the target machine across the network. Remote shellcodes normally use standard TCP/IP socket connections to allow the attacker access to the shell on the target machine. Such shellcode can be categorized based on how this connection is set up: if the shellcode can establish this connection, it is called a "reverse shell" or a connect-back shellcode because the shellcode connects back to the attacker's machine.
SMTP: Rules for attacks, exploits, and vulnerabilities regarding SMTP. Also included are rules detecting the basic activity of the protocol for logging purposes.
SNMP: Rules for attacks, exploits, and vulnerabilities regarding SNMP. Also included are rules detecting the basic activity of the protocol for logging purposes.
SpamHaus*:This ruleset takes a daily list of known spammers and spam networks as researched by Spamhaus.
SQL: Rules for attacks, exploits, and vulnerabilities regarding SQL. Also included are rules detecting the basic activity of the protocol for logging purposes.
TELNET: Rules for attacks and vulnerabilities regarding the TELNET service. Also included are rules detecting the basic activity of the protocol for logging purposes.
TFTP: Rules for attacks and vulnerabilities regarding the TFTP service. Also included are rules detecting the basic activity of the protocol for logging purposes.
TOR*: IP Based rules for the identification of traffic to and from TOR exit nodes.
Trojan: Malicious software that has clear criminal intent. Rules here detect malicious software that is in transit, active, infecting, attacking, updating, and whatever else we can detect on the wire. This is also a highly important ruleset to run if you have to choose.
User Agents*: User agent identification and detection.
VOIP: Rules for attacks and vulnerabilities regarding the VOIP environment. SIP, h.323, RTP, etc.
Web Client: Web client-side attacks and vulnerabilities.
Web Server: Rules for attacks and vulnerabilities against web servers.
Web Apps: Rules for very specific web applications.
WORM*: Traffic indicative of network-based worm activity
* Identifies categories that can be enabled on the USG3 and UDM (base model).
The link to the PDF where these categories are described can be found here.
NOTE:The following configuration can be found in theAdvanced tab ofInternet Security.
Whitelisting
The whitelisting function of the IPS engine allows a UniFi Administrator to create a list of trusted IP's. The traffic, depending on the direction selected, will not get blocked to or from the identified IPs.
In the screenshot below traffic to or from the subnet 100.64.0.0/16 will not be tracked by the IPS engine.
Signature Suppression
The signature suppression function of the IPS engine allows a UniFi Administrator to mute the alerting on certain signatures. This will also disable blocking on traffic matching the designated suppression rule.
Adding a signature suppression rule for all traffic will suppress the signature regardless of host IP.
Adding a signature suppression rule with packet tracking based on traffic direction and by single IP, defined UniFi Network, or subnet of choice.
GeoIP Filtering
Back to Top
NOTE:For GeoIP Filtering to work on the USG, hardware offloading must be enabled. When Threat Management is enabled (under Settings > Internet Security > Threat Management), hardware offloading is disabled. Only one of these two features can be enabled at a time on the USG.
Blocking
Blocking individual countries can be configured on the Threat Management Dashboard section of the controller. Blocking is as easy as navigating to the map, clicking on a country, and confirming by clicking "Block".
Unblocking
Unblocking a country can be by performed on the Threat Management Dashboard by navigating to the left side of the map on the Overview tab. A list of blocked countries will be populated. Simply hover over the county that is to be unblocked and an "unblock" option will appear. Select "unblock" and the country will be taken off of the list.
Traffic Direction
The UniFi Network controller allows configuring the GeoIP filtering traffic direction. Follow the steps below:
1.Navigate to the top of the Threat Management Dashboard and select the direction.
2. Select the traffic direction.
3.ClickDone.
DNS Filters
Back to Top
ATTENTION:
DNS Filtering is only available on the UniFi Dream Machine.
Clients that use VPN, DNS-over-HTTPS, or DNS-over-TLS will have non-standard DNS requests that will not be seen by the UniFi Dream Machine.
The DNS Filter feature allows administrators to select levels of filtering per-network. This ensures that any DNS requests that go out from clients on configured LANs adhere to the filtering levels.
1.To configure DNS Filters, navigate to NewSettings > Internet Security > DNS Filters.
2. Enable DNS Filtering by clicking the slider button.
3. SelectAdd Filter.
4. Choose the desired level of filtering for the LAN.
5. Select which network this filter should apply to and confirm the selection.
6. DNS filtering will be enabled at this point.
Filter Levels
Security
Blocks access to phishing, spam, malware, and malicious domains. The database of malicious domains is updated hourly. Note that it does not block adult content.
Adult
Blocks access to all adult, pornographic and explicit sites. It does not block proxy or VPNs, nor mixed-content sites. Sites like Reddit are allowed. Google and Bing are set to the "Safe Mode". Malicious and Phishing domains are blocked.
Family
Blocks access to all adult, pornographic and explicit sites. It also blocks proxy and VPN domains that are used to bypass the filters. Mixed content sites (like Reddit) are also blocked. Google, Bing, and Youtube are set to the Safe Mode. Malicious and Phishing domains are blocked.
Deep Packet Inspection
Back to Top
To configureDeep Packet Inspection (DPI) navigate to NewSettings > Internet Security > Deep Packet Inspection.
NOTE: Device fingerprinting is not available on the UniFi Security Gateway.
DPI Restrictions
ATTENTION:DPI restrictions are limited to whole-category selections on the UniFi Security Gateway. This restriction is not applicable to the UniFi Dream Machine platform.
1. ClickAdd Restriction under "Restriction definitions".
2. In the configuration side-panel select a restriction group to add the rules to.
3. Select a category to block.
4. Select an application from the category or select "All applications" to block the entire category.
5. Ensure that "Enable This Restriction" is selected.
6. Add the restriction group to a network in the "Restriction assignments" section.
NOTE:A restriction definition can be applied to many networks. A restriction definition for each network is not required.
To manage the restriction definition, hover over the definition and selection either edit or remove.
Configuring Network Scanners
Back to Top
ATTENTION:Network Scanners are only available on the UniFi Dream Machine.
Endpoint Scanner
The "endpoint scanner" feature automatically scans the clients on all LANs for the following information:
IP address
Operating system (best effort)
Open ports
NOTE:Not all clients will have open ports or return a detectible operating system.
Scan reports can be found on the Threat Management Dashboard
Internal Honeypot
The "internal honeypot" feature is a passive detection system that listens for LAN clients attempting to gain access to unauthorized services or hosts. Clients that are potentially infected with worm or exfiltration type vulnerabilities are known to scan networks, infect other hosts, and potentially snoop for information on easy-to-access servers. The honeypot will report when hosts attempt to access the honeypot. Reports can be found on the Threat Management Dashboard.
To configure the internal honeypot follow the steps below:
1. Navigate to New Settings > Internet Security > Network Scanners.
2. Enable the honeypot service by clicking the slider button.
3. Select "Add Honeypot".
4. In the popup modal select the network and Honeypot IP.
5. Select "Create".
Honeypot Services
The honeypot service listens on the following ports:
FTP - TCP Port 21
SSH - TCP Port 22
Telnet - TCP Port 23
SMTP - TCP Port 25
DNS - UDP Port 53
HTTP - TCP Port 80
POP3 - TCP Port 110
SMB - TCP Port 445
MSSQL - TCP Port 1443
Testing & Verification
Back to Top
Intrusion Detection/Prevention
Linux or macOS
Input:
curl -A "BlackSun" www.example.com
Expected controller alert result:
Threat Management Alert 1: A Network Trojan was Detected. Signature ET USER_AGENTS Suspicious User Agent (BlackSun). From: 192.168.1.172:55693, to:172.217.4.196:80, protocol: TCP
Windows
The DNS category must be enabled
Input:
nslookup blacklistthisdomain.com 8.8.8.8
Expected controller alert result:
Threat Management Alert 1: A Network Trojan was Detected. Signature ET DNS Reply Sinkhole - 106.187.96.49 blacklistthisdomain.com. From: 192.168.1.1:53, to: 192.168.1.182:61440, protocol: UDP
Internal Honeypot
A few examples of manually testing the internal honeypot service are below. The following commands may or may not prompt for login credentials. The alerts will appear in the Honeypot section of the Threat Management Dashboard a few minutes after attempting the testing.
Telnet:
telnet <honeypot_ip>
SSH:
ssh <honeypot_ip>
NOTE:Replace <honeypot_ip> with the honeypot IP configured in the controller.
Privacy Statement
What information does the IPS/IDS engine send to the cloud?
1. When a UniFi Administrator enables IPS or IDS on the controller a token is generated for the gateway. The information listed below is sent over a TLS 1.2 encrypted connection whenever there is an IPS/IDS signature match.
timestamp
interface
source IP
source port
destination IP
destination port
protocol
signature id
2. Every 120-seconds there is a keep-alive to the ips1.unifi-ai.com hostname. This connection is to ensure reliable delivery of the violation message. The keep-alive is a connection to our cloud using port 443 so it is not just an ICMP ping or DNS resolution but a complete 3-way handshake and SSL Key exchange.
What information is kept on our servers regarding IPS/IDS?
The data listed above is only temporarily stored in the IPS Cloud until the controller downloads the information. After the information is downloaded by the controller, the data is deleted from our cloud except for the attacker IP. The attacker IP information helps Ubiquiti maintain an up-to-date and effective attacker list which will improve Ubiquiti’s services to Ubiquiti customers around the world.
How is the information from alerts used by Ubiquiti?
Ubiquiti will use the alert information to improve its products and services, including generating lists of IP Reputation, Malicious IP addresses, Threat Intelligence and creating blacklists and new signatures for Ubiquiti devices. A sanitized version of IP addresses (Ex: 200.200.x.x) can also be displayed on Ubiquiti Public Threat Map to help the public community to see malicious traffic around the world.
Related Articles
Back to Top
UniFi - USG Firewall: Introduction to Firewall Rules
UniFi - Regenerating an IPS/IDS Token(Debian-based Linux/Cloud Key)
View ArticleOverview
This article reviews three different scenarios forblocking LAN to VLAN2 routing, as well as some other techniques to fine-tune the interVLAN communication.
UniFi - VLAN Traffic Tagging
NOTES & REQUIREMENTS: Applies to our UniFi Security Gateway v4.3.41+. We recommend to upgrade to the newest version, downloadable here.
Table of Contents
Introduction
Option 1: Disable interVLAN routing between LAN and VLAN2
Option 2:Block all VLANs to one another
Option 3: Block LAN to VLAN2, but allow VLAN2 to LAN
Related Articles
Introduction
Back to Top
Inter-VLAN routing is enabled by default between all Corporate LAN networks. In this article, blocking LAN to VLAN2 will be demonstrated, as well as some other techniques to fine-tune your inter-VLAN communication on corporate networks.
Option 1: Disable inter-VLAN routingbetween LAN and VLAN2
Back to Top
1. To disable inter-VLAN routing between LAN and VLAN2, head to the UniFi Controller and go to Settings > Routing & Firewall > Firewall > Rules > LAN IN 1
2. Create a new rule that Drops or Rejects 2 with the configuration shown below.
Name: to your liking.
Enabled: ON
Rule Applied: before Predefined Rules
Action: Drop or Reject 2
Protocol: All
Logging: to your liking
States: all unchecked (assumes all states)
Don't match on IPsec packets
Source Type: Network
Network: LAN - NETv4 3
Destination Type: Network
Network: VLAN2 - NETv4
NOTE:
1.LAN IN is where you want to filter all of your LAN/VLAN traffic, as IN is the first point of entry to the firewall, no matter the interface. The OUT ruleset will only be used in rare special cases.
2. "Drop" will completely drop the traffic resulting in a "request timed out" message on the client;"Reject" will send back a connection refused packet to the client.
3.NETv4 includes the entire network, ADDRv4 only includes the USG's interface address for that network (ex 192.168.1.1-192.168.1.254 vs 192.168.1.1)
Option 2:Block all VLANs to oneanother
Back to Top
1. First create a firewall group containing the RFC1918 private address range 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. This is done in Settings > Routing & Firewall > Firewall > Groups > Create New Group and then click Save.See the screenshot below:
2. Still within Firewall Settings, move from the Groups tabto theRules IPv4tab, select LAN IN 1 and clickCreate New Rule, filling in the following configuration data:
CREATE NEW RULE
Name: to your liking
Enabled: ON
Rule Applied: Before redefined rules
Action: Drop or Reject 2
IPv4 Protocol: all
ADVANCED
Logging: to your liking
States: all unchecked
IPsec: Don't match on IPsec packets
SOURCE
Source Type: Address/Port Group
IPv4 Address group: RFC1918 (the name of the group created in step 1)
Port Group: Any
MAC Address: Leave blank
DESTINATION
Destination Type: Address/Port Group
IPv4 Address Group: RFC1918
Port Group: Any
Using the above rule will block all private network communication between VLANs, however, same-subnet/VLAN traffic will be allowed as expected because it will never be sent to the default gateway (USG).The data will traverse the layer 2 network and be transmitted via frames by the switches in between.
Option 3: Block LAN to VLAN2, but allow VLAN2 to LAN
Back to Top
If you the objective isto block LAN to VLAN2, but allow VLAN2 to LAN, follow Option 1 first, then proceed with creating a rule at the top (first rule) of LAN_IN like the below screenshot. Adding this rule at the top of the ruleset will allow all established and related stateful firewall traffic to be able to pass, which is basically all "reply" traffic.
Name: to your liking
Enabled: ON
Rule Applied: before Predefined Rules
Action:Accept
Protocol:Any
Logging: to your liking
States:Established and Related
Don't match on IPsec packets
Source Type: leave blank
Destination Type: leave blank
NOTE:
Whenadding new rules, take into account that theywon't take immediate effect on existing stateful connections. To solve this, perform one of the following options:
Wait for the states to fall off (close all connections and wait for the state timeout which is roughly 30 seconds)
SSH to the USG and type clear connection-tracking.This wipes the entire state table of the USG
Reboot the USG
Related Articles
Back to Top
UniFi - USW: Using VLANs with UniFi Wireless, Routing & Switching Hardware
View ArticleOverview
In this article we will provide the necessary steps to recover the UFiber OLT models. This process will completely restore the device to the factory default settings and erases all custom configuration.
UFiber GPON - Getting Started
NOTES & REQUIREMENTS:
The recovery image is different than the OLT update firmware. The recovery images can be found on the UFiber Downloads page.
Devices used in this article:
UFiber OLT (UF-OLT)
UFiber OLT 4 (UF-OLT-4)
Table of Contents
Console and Management Port Settings
Connecting to Serial Console
Setting up a TFTP Server
Starting the Recovery Process
Related Articles
Console and Management Port Settings
Back to Top
In rare cases when an OLT becomes unresponsive, these instructions may be suggested by our support team to recover the OLT back to its default state. This is typically not the first step in troubleshooting issues, but rather a last resort recovery method.
The default serial port settings are listed below:
Baud rate 57600
Data bits 8
Parity NONE
Stop bits 1
Flow control NONE
Connecting to Serial Console
Back to Top
A USB-to-Serial adapter will be used to connect to the console port of the UFiber OLT.
NOTE:In order to connect to the console we will need to use the following items/programs:
RJ45 to DB9 serial console cable (rollover cable)
USB to DB9 adapter
Terminal emulation program, such as PuTTY or the macOS/Linux terminal
1. Open the terminal emulator and specify the serial COM line and the baud rate/speed.
Windows Client
Enter the following information in the PuTTY window.
macOS Client
Open Terminal Application and find the serial interface ID.
ls -ltr /dev/*usb*
The serial interface will display as tty. Example output below:
ls -ltr /dev/*usb*
crw-rw-rw- 1 root wheel 21, 3 Feb 8 15:48 /dev/cu.usbserial-AI038TPF
crw-rw-rw- 1 root wheel 21, 2 Feb 9 08:56 /dev/tty.usbserial-AI038TPF
Use thescreen command to connect to console by pasting in the path to the serial interface.
screen/dev/tty.usbserial-AI038TPF 57600
ATTENTION: Replace/dev/tty.usbserial-AI038TPF with the value given when using thels -ltr /dev/*usb* command.
2. Connect to the OLT management port with a separate Ethernet cable.
3. Assign a static IP address to your computer's network interface, for example 192.168.1.10/24.
4. Leave the console window opened and both cables plugged in while continuing on to the next section.
Setting up a TFTP Server
Back to Top
The next step is to set up a TFTP server on the workstation to allow the recovery image to be uploaded to the OLT.
1.Download the latest OLT recovery file from the UFiber Downloads page.
2. Install a TFTP server.
Windows Client
In this example we are using Tftpd32 as the TFTP server.
macOS Client
Open a new terminal window to load and start the TFTP service.
sudo launchctl load -F /System/Library/LaunchDaemons/tftp.plist
sudo launchctl start com.apple.tftpd
Change the file permissions for the TFTP folder.
sudo chmod 777 /private/tftpboot
sudo chmod 777 /private/tftpboot/*
Place the OLT recovery file in the base TFTP directory.
Starting the Recovery Process
Back to Top
CLI: Access the UFiber OLT Command Line using the console connection.
1. Connect the power cable to the OLT and boot up the device.
2. Hold down the 1 (number one)key as the OLT starts upto interrupt the boot process.
3.When holding the 1 key, the bootloader will be interrupted and bring you to a prompt similar to the one below.
Please choose the operation:
1: Load system code to SDRAM via TFTP.
2: Load system code then write to Flash via TFTP.
3: Boot system code via Flash (default).
4: Entr boot command line interface.
7: Load Boot Loader code then write to Flash via Serial.
9: Load Boot Loader code then write to Flash via TFTP.
default: 3
4. Select option 1 and enter the required IP address and filename recovery information.
Device IP This is the IP address that the OLT should use for the TFTP session.
Server IP This is the IP address of the TFTP server (computer).
Linux Kernel Filename Exact name of the OLT recovery image in the base TFTP directory.
An example output is:
1: System Load Linux to SDRAM via TFTP.
Please Input new ones /or Ctrl-C to discard
Input device IP (172.16.3.211) ==:192.168.1.20
Input server IP (172.16.3.210) ==:192.168.1.10
Input Linux Kernel filename (vme600) ==:OLT.recovery.v4.1.0.2648.191120.1333.16de5fdde.img
After completing the steps above, the#symbol will be shown many times as the file is uploaded to the device. This is the expected behavior.
NOTE:The OLT will reboot automatically after the recovery process completes. During the process the fans may spin at full speed.
5. A successful recovery will allow management access via the web UI or CLI using the DHCP assigned IP address or the fallback address ( 192.168.1.20 ) on the management port.
Related Articles
Back to Top
View ArticleOverview
Readers will learn how to configure an EdgeRouter as an OpenVPN server.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Knowledge of the Command Line Interface (CLI) and basic networking knowledge is required. Please see the Related Articles below for more information.
Devices used in this article:
EdgeRouter-4 (ER-4)
Table of Contents
Configuring the OpenVPN Server
Setting up the OpenVPN Client
Related Articles
Configuring the OpenVPN Server
Back to Top
The EdgeRouter OpenVPN server provides access to the LAN (192.168.1.0/24) for authenticated OpenVPN clients.
CLI: Access the Command Line Interface. You can do this using the CLI button in the Web UI or by using a program such as PuTTY.
1. Make sure that the date/time is set correctly on the EdgeRouter.
show date
Mon Jan 21 12:13:07 UTC 2019
2. Log in as the root user.
sudo su
3. Generate a Diffie-Hellman (DH) key file and place it in the /config/auth directory.
openssl dhparam -out /config/auth/dh.pem -2 2048
NOTE: It is possible to use key sizes higher than 2048.
4. Change the current directory.
cd /usr/lib/ssl/misc
5. Generate a root certificate (replace <secret> with your desired passphrase).
ATTENTION: On older firmware versions (pre v2.0.0) the script is namedCA.sh.
./CA.pl -newca
PEM Passphrase: <secret>
Country Name: US
State Or Province Name: New York
Locality Name: New York
Organization Name: Ubiquiti
Organizational Unit Name: Support
Common Name: root
Email Address: [email protected]
NOTE:Replace the location and organizational fields with your own information.
6. Copy the newly created certificate + key to the /config/authdirectory.
cp demoCA/cacert.pem /config/auth
cp demoCA/private/cakey.pem /config/auth
7. Generate the server certificate.
./CA.pl -newreq
Country Name: US
State Or Province Name: New York
Locality Name: New York
Organization Name: Ubiquiti
Organizational Unit Name: Support
Common Name: server
Email Address: [email protected]
8. Sign the server certificate.
./CA.pl -sign
Certificate Details:
Validity
Not Before: Jan 21 13:02:57 2019 GMT
Not After : Jan 21 13:02:57 2020 GMT
Subject:
countryName = US
stateOrProvinceName = New York
localityName = New York
organizationName = Ubiquiti
organizationalUnitName = Support
commonName = server
emailAddress = [email protected]
Certificate is to be certified until Jan 21 13:02:57 2020 GMT (365 days)
Sign the certificate? [y/n]: y
1 out of 1 certificate requests certified, commit? [y/n] y
9. Move and rename the server certificate and key files to the /config/authdirectory.
mv newcert.pem /config/auth/server.pem
mv newkey.pem /config/auth/server.key
10. Generate, sign and move the certificate and key files for the first OpenVPN client.
./CA.pl -newreq
Common Name: client1
./CA.pl -sign
Certificate Details:
Validity
Not Before: Jan 21 13:05:03 2019 GMT
Not After : Jan 21 13:05:03 2020 GMT
Subject:
countryName = US
stateOrProvinceName = New York
localityName = New York
organizationName = Ubiquiti
organizationalUnitName = Support
commonName = client1
emailAddress = [email protected]
Certificate is to be certified until Jan 21 13:05:03 2020 GMT (365 days)
Sign the certificate? [y/n]: y
1 out of 1 certificate requests certified, commit? [y/n] y
mv newcert.pem /config/auth/client1.pem
mv newkey.pem /config/auth/client1.key
11. Repeat the process for the second OpenVPN client.
./CA.pl -newreq
Common Name: client2
./CA.pl -sign
mv newcert.pem /config/auth/client2.pem
mv newkey.pem /config/auth/client2.key
12. Remove the password from the server key file and optionally the client key file(s).
openssl rsa -in /config/auth/server.key -out /config/auth/server-no-pass.key
openssl rsa -in /config/auth/client1.key -out /config/auth/client1-no-pass.key
openssl rsa -in /config/auth/client2.key -out /config/auth/client2-no-pass.key
NOTE:When connecting, the OpenVPN clients will need to enter a password if this step is skipped.
13. Overwrite the existing keys with the no-pass versions.
mv /config/auth/server-no-pass.key /config/auth/server.key
mv /config/auth/client1-no-pass.key /config/auth/client1.key
mv /config/auth/client2-no-pass.key /config/auth/client2.key
14. Add read permission for non-root users to the client key files.
chmod 644 /config/auth/client1.key
chmod 644 /config/auth/client2.key
15. Verify the contents of the/config/auth directory.
ls -l /config/auth
-rw-r--r-- 1 root vyattacf 4477 Jan 21 13:02 cacert.pem
-rw------- 1 root vyattacf 1854 Jan 21 13:02 cakey.pem
-rw-r--r-- 1 root vyattacf 1675 Jan 21 13:06 client1.key
-rw-r--r-- 1 root root 4647 Jan 21 13:05 client1.pem
-rw-r--r-- 1 root vyattacf 1675 Jan 21 13:24 client2.key
-rw-r--r-- 1 root vyattacf 4647 Jan 21 13:24 client2.pem
-rw-r--r-- 1 root vyattacf 424 Jan 21 12:44 dh.pem
-rw------- 1 root vyattacf 1679 Jan 21 13:06 server.key
-rw-r--r-- 1 root root 4642 Jan 21 13:02 server.pem
16. Return to operational mode.
exit
17. Enter configuration mode.
configure
18. Add a firewall rule for the OpenVPN traffic to the WAN_LOCALfirewall policy.
set firewall name WAN_LOCAL rule 30 action accept
set firewall name WAN_LOCAL rule 30 description openvpn
set firewall name WAN_LOCAL rule 30 destination port 1194
set firewall name WAN_LOCAL rule 30 protocol udp
19. Configure the OpenVPN virtual tunnel interface.
set interfaces openvpn vtun0 mode server
set interfaces openvpn vtun0 server subnet 172.16.1.0/24
set interfaces openvpn vtun0 server push-route 192.168.1.0/24
set interfaces openvpn vtun0 server name-server 192.168.1.1
20. Link the server certificate/keys and DH key to the virtual tunnel interface.
set interfaces openvpn vtun0 tls ca-cert-file /config/auth/cacert.pem
set interfaces openvpn vtun0 tls cert-file /config/auth/server.pem
set interfaces openvpn vtun0 tls key-file /config/auth/server.key
set interfaces openvpn vtun0 tls dh-file /config/auth/dh.pem
21.Add the virtual tunnel interface to the DNS forwarding interface list.
set service dns forwarding listen-on vtun0
22. Commit the changes and save the configuration.
commit ; save
Setting up the OpenVPN Client
Back to Top
Windows Client
In this section, we are using a Windows 10 machine as the OpenVPN client.
1. Navigate to the OpenVPN config folder.
C:\Program Files\OpenVPN\config\
2. Create a new folder (optional) and an OpenVPN configuration file (er.ovpn).
3. Transfer the certificates and client key files from the EdgeRouter /config/auth directory to the OpenVPN client.
NOTE:In this example, WinSCP is used to transfer the files.
3. Add the following information to the er.ovpn configuration file (replace<server>with the EdgeRouter's external IP address or hostname).
client
dev tun
proto udp
remote <server> 1194
float
resolv-retry infinite
nobind
persist-key
persist-tun
verb 3
ca cacert.pem
cert client1.pem
key client1.key
4.To send all traffic through the VPN connection, append theer.ovpn configuration file with the following line.
redirect-gateway def1
5. Connect to the server.
macOS Client
In this section, we are using an Apple macOS computer as the OpenVPN client.
1. Open the macOSTerminal and create an OpenVPN directory and configuration file.
mkdir ~/Desktop/config
touch ~/Desktop/config/er.ovpn
2. From the macOSTerminal, transfer the certificates and client key files from the EdgeRouter /config/auth directory to the newly created directory on the client (replace username@<ip-address>with the username and IP address of the EdgeRouter).
scp username@<ip-address>:/config/auth/cacert.pem ~/Desktop/config
scp username@<ip-address>:/config/auth/client1.pem ~/Desktop/config
scp username@<ip-address>:/config/auth/client1.key ~/Desktop/config
3. Add the following information to the er.ovpn configuration file (replace<server>with the EdgeRouter's external IP address or hostname).
client
dev tun
proto udp
remote <server> 1194
float
resolv-retry infinite
nobind
persist-key
persist-tun
verb 3
ca cacert.pem
cert client1.pem
key client1.key
4.To send all traffic through the VPN connection, append theer.ovpn configuration file with the following line.
redirect-gateway def1
5. Connect using your favorite OpenVPN client management software (for example Tunnelblick ).
Related Articles
Back to Top
EdgeRouter - OpenVPN Site-to-Site
EdgeRouter - OpenVPN Layer 2 Tunnel
EdgeRouter - L2TP IPsec VPN Server
View ArticleOverview
This articledescribes how to access the emergencyrecovery user interface (UI) and recover a UniFi Cloud Key or a UniFi Cloud Key Gen 2 (UCK-G2-PLUS and UCK-G2 models). From this recovery UI you can reset it to factory defaults, reboot it, power it off and upgrade the firmware.
UniFi - How to Change the Cloud Key's Controller Version via SSH
NOTES & REQUIREMENTS:
To upgrade the firmware, you will need to download a firmware binary for the Cloud Key found in our Downloads page. Use the left hand menu to select the correct Cloud Key model and find the newest firmware available.
To access this interface you will need to know the IP address of the Cloud Key (visible in the device screen).
Table of Contents
Cloud Key Gen 2 Emergency Recovery
Cloud Key Gen 1 Emergency Recover
Related Articles
Cloud Key Gen 2 Emergency Recover
Back to Top
For second generation Cloud Keys (UCK-G2 and UCK-G2-PLUS) follow these steps to access the Emergency Recovery UI:
Power off the system.
Press and hold the reset button and then power on the Cloud Key by connecting it to the power source.
Cloudkey G2:
CloudKey G2 Plus
Keep the reset button pressed for about 10 seconds, or until yousee the recovery LED pattern in a loop (blue - off - white). The LCD screen on the front panel will also read "RECOVERY MODE."
Once the LED is flashing in the recovery mode pattern, open your browser and type the IP address for the Cloud Key, visible on the device's screen. The IP address comes from your DHCP server, if you can't access DHCP, the fallback IP will work: 192.168.1.30. However, keep in mind that if your Cloud Key does have a IP address assigned by the DHCP server, the fallback IP will not work.
You should be taken to the Recovery Mode screen. From here you can reset, reboot, power off and most importantly you can upload an updated firmware bin file.
To update the firmware, go to the Downloads page, find the correct Cloud Key model on the left hand menu and then click on the download button, read and accept information, and then download the firmware file to your computer to upload in the Recovery Mode UI. Once it is uploaded you will have to reboot the Cloud Key to complete the firmware upgrade.
The LED will flash white while upgrading and then a steady white when it is ready.
Cloud Key Gen 1 Emergency Recovery
Back to Top
For first generation Cloud Keys follow these steps to access the Emergency Recovery UI:
Power off the system.
Press and hold the reset button and then power on the Cloud Key by connecting it to the power source.
Keep the reset button pressed for about 10 seconds, or until yousee the recovery LED pattern in a loop (blue - off - white).
Once the LED is flashing in the recovery mode pattern, open your browser and type the IP address for the Cloud Key. The IP address comes from your DHCP server, if you can't access DHCP, the fallback IP will work: 192.168.1.30. However, keep in mind that if your Cloud Key does have a IP address assigned by the DHCP server, the fallback IP will not work. If you are using a Gen 2 Cloud Key you will see its IP address on the device screen.
User Tip: If you don't know your Cloud Key's IP address, you can use thearp -a SSH command or software such as nmap to find the IP address.
You should be taken to the Recovery Mode screen. From here you can reset, reboot, power off and most importantly you can upload an updated firmware bin file.
To update the firmware, go to the Downloads page, find the correct Cloud Key model on the left hand menu and then click on the download button, read and accept information, and then download the firmware file to your computer to upload in the Recovery Mode UI. Once it is uploaded you will have to reboot the Cloud Key to complete the firmware upgrade.
Once it is uploaded you will have to reboot the Cloud Key to complete the firmware upgrade.
The LED will flash white while upgrading and then a steady white when it is ready.
Related Articles
Back to Top
UniFi - How to Create and Restore a Backup
View ArticleOverview
This article will explain how to troubleshoot, resolve and prevent Cloud Key failures and stability issues.
UniFi - Supported PoE Protocols
NOTES & REQUIREMENTS:
This article applies to the UniFi Cloud Key,which should be updated to the latest stable firmware/controller version before troubleshooting further.
For best results, we recommend using the UniFi Cloud Key Gen2/UniFi Cloud Key Gen2+ which offers greater stability and performance over the UniFi Cloud Key.
Table of Contents
Introduction
Symptoms
Resolution
Reboot
Reset Cloud Key
Restore from Working Backup
Potential Causes & Prevention
Power Outages/Interruptions
Disk Space
Maximum Database Size Limit
Related Articles
Introduction
Back to Top
The UniFi Cloud Key offers perhaps the most convenient and simple UniFi management method available. Setup is easy and doesn’t require a desktop/server on-site to be running at all times to keep online. The Cloud Key still requires some maintenance and use of best practices to ensure proper function. This article will explain how to fix Cloud Key stability issues, troubleshoot and resolve root causes when repeated issues are seen.
Symptoms
Back to Top
All of the following symptoms can indicate stability issues with your Cloud Key:
Flashing white LED indicating the UniFi Cloud Key is disconnected.
Cloud Key may show as offline in UniFi Management Dashboard (https://unifi.ubnt.com)
Cloud Key UI may not be accessible via direct URL through browser
i.e. https://[cloudkeyip]:8443/manage/
UniFi service shows as not running through Web UI (https://, Select option Configure > Maintenance > Service > Stop UniFi will be grayed out indicating it is already offline)
UniFi Service will not start by clicking the button "Start UniFi".
Resolution
Back to Top
1. Reboot
As a first step, some Cloud Key issues can be resolved with a simple reboot. If you have not done this, do so now. This can be done by following these steps:
Open the Cloud Key management portal in a browser by typing the IP address of the Cloud Key as URL: i.e. https://192.168.1.15
You may receive a Privacy Error. Click continue.
In Chrome, click Advanced > "Proceed to [IP of Cloud Key](unsafe)"
Click Configure
Log in with UniFi Cloud Key credentials used at setup. See our Related Articles below for credential questions.
Select theMaintenancetab.
Under Maintenance > Actions, click the button to Reboot.
If this does not resolve the issue, then proceed to the next paragraph.
2. Reset Cloud Key
Nearly every UniFi Cloud Key failure, can be quickly resolved by a simple Reset and Restore of a backup file. The Cloud Key has made it easy to maintain backups in case of any failures. Auto Backup, if enabled, will create periodic snapshots that can be restored to in the case of any failures.
These are stored on the SD card and even if the Cloud Key is unable to be accessed manually, a reset of the device will permit a restore of the Auto Backup files on the SD card. Auto Backup is configured in the UniFi Controller underSettings > Auto Backup.
To ensure that you have enough intermittent backups should anything happen, it's recommended to have automated Weekly backups.
Steps: How to Reset your Cloud Key
ATTENTION:Prior to resetting your Cloud Key make sure you have backups available to restore from. To be safe, make sure to download from Cloud Key either through UI or via SSH prior to Resetting. Resetting the Cloud Key will lose all configuration. If no backup file is available, all settings will need to be reconfigured.
Reset Method 1: WebUI
Open the Cloud Key management portal in the browser by typing the IP address of the Cloud Key as a URL: i.e. https://192.168.1.15.
You may receive a Privacy Error, in Chrome, click Advanced > Proceed to [IP of Cloud Key](unsafe).
Click Configure.
Log in with UniFi Cloud Key credentials used at setup.See our Related Articles below for credential questions.
Select theMaintenancetab.
Click Reset to Defaults.
If access to the Cloud Key's management portal is not possible, use one of the following alternatives:
Reset Method 2: Hardware Button
The reset button is at one end of the Cloud Key. See each model's Quick Start Guide for exact location.
Insert a paper clip or similar object into the small hole until the button depresses.
Hold for five seconds, then release.
The LEDs should indicate the Cloud Key is restarting and being reset to default state.
Once completed, the Cloud Key should show a steady white LED if this was done properly.
Reset Method 3: SSH
Use an SSH client like Putty (Windows) or Terminal (macOS).
Connect to the IP address of the Cloud Key.
Authenticate using SSH credentials as previously configured. See this article for help on Cloud Key password disambiguation.
Once you log in successfully, enter the following command then hit enter:
ubnt-systool reset2defaults
The Cloud Key will then reset to default.
How to Restore from Last Working Backup
Once your reset has completed successfully your Cloud Key should be in a factory default state- which will eliminate any database corruption/corrupted configuration of the Cloud Key. Now you are ready to restore from your last known working backup. Here are directions on how to do this:
Restore Method 1: Via UniFi Setup Wizard
Open the Cloud Key management portal in the browser by typing the IP address of the Cloud Key as a URL: i.e. https://192.168.1.15.
You may receive a Privacy Error, in Chrome, click Advanced > Proceed to [IP of Cloud Key](unsafe).
Select Manage.
The UniFi Setup Wizard will present existing Auto Backup files stored on the SD card.
Select which backup to restore and click Restore.
Restore Method 2: Via WebUI
Open the Cloud Key management portal in the browser by typing the IP address of the Cloud Key as a URL: i.e. https://192.168.1.15.
You may receive a Privacy Error, in Chrome, click Advanced > Proceed to [IP of Cloud Key](unsafe).
Click Configure.
Login with default UniFi credentials:
Username: ubnt
Password: ubnt
Go to the Maintenance tab.
Click the Stop UniFibutton, once the Start UniFi buttonbecomes highlighted (appears clickable), proceed to the next step.
Under Auto Backupselect the most recent working backup file and click Restore.
If restoring from a local file, click Choose File.
Potential Causes and Prevention
Back to Top
Since Cloud Key gen1 was released, a number of features have been added and improved via firmware to improve stability and prevent common issues. Because of this, it is always recommended that you upgrade your Cloud Key firmware to the most recent stable version, especially if you repeatedly encounter any stability issues.
If Cloud Key stability issues are not resolved with a reset/restore, or repeatedly come back, it is particularly important to identify and resolve the root cause. The majority of such reported issues are found to be a result of one of the following causes:
Cause 1: Power Outages/Interruptions
User Tip:This cause is associated with Cloud Key Gen1. The Gen2 model has a "graceful shutdown" feature that should prevent sudden power interruptions.
The Cloud Key stores data and UniFi controller configuration in a MongoDB database. Even in small environments, there are ongoing database functions being performed at any given moment. If these database operations are interrupted as a result of a sudden power interruption, this can cause database corruptions which will ultimately hinder the proper function of the Cloud Key. In some cases, after a power outage, the Cloud Key may be unable to start the UniFi service properly due to database errors resulting from the interruption.
If you find your Cloud Key is losing power frequently despite no power loss, you may also have a bad Ethernet Cable being used to power the device via PoE- replace the cable to resolve this.
Symptoms
Stability issues arise after a known power outage/interrupted power.
Persistent Cloud Key stability issues; testing with different ethernet cable fails to reproduce.
How to Prevent
Power the UniFi Switch or other PoE supplying device up to a power source with battery backup to ensure that power remains uninterrupted in short power outages.
Plug a small charged battery like those used for charging mobile phones into the Cloud Key via the micro USB port- this will prevent the Cloud Key from being shut off in a power outage from interrupted PoE.
Replace faulty Ethernet cable with new cable if the Cloud Key loses power in cases where there is no power outage.
Shutdown/Reboot Cloud Key gracefully using the button in UI rather than unplugging/plugging back in.
Cause 2: Disk Space
The Cloud Key was built for compact form, ease of install and affordability. With this comes less disk storage than you’d find on a server that would otherwise be running the UniFi Controller substance. In most environments, this will not become an issue and requires little consideration. However, in larger environments or configurations that have opted to retain more detailed data and a larger number of backups, disk space can become an issue. For this reason, it is good to monitor the disk usage on the Cloud Key regularly just to ensure that the disk space isn’t over-utilized.
Symptoms
Storage Space Shows as close to 100\% utilized
Cloud Key will shut down the controller service without warning as disk space is exhausted/MongoDB is unable to write to the database further
How to Prevent
Periodically check the Cloud Key disk utilization through the WebUI > Configure > Main.
Limit the number of backups stored on the Cloud Key. If longer retention of backups/data is needed, download these files then remove from Cloud Key storage.
Decrease the length of data retention in the UniFi Controller under Settings > Maintenance > Data Retention.
Perform regular compacts on Database under Settings > Maintenance > Compact Database.
Remove excessive backups under Settings > Auto Backup
Cause 3: Maximum Database Limit
All UniFi controllers operate with the use of a MongoDB database. What’s unique about the Cloud Key over most other controllers is that it has an ARMv7 32-bit CPU, and as such can only run 32-bit MongoDB. 32-bit MongoDB instances have a limitation over 64-bit mongo instances in that they can only support database sizes of approximately 2GB. See more info here.
As complexity and scale of the UniFi management increases, the database will grow in size. As the Cloud Key is geared towards smaller sites and portability/compactness, in most cases this will not ever be anything to worry about. However, given the 32-bit limit on size on the Cloud Key, if used in the largest environments (more than a couple dozen APs/UniFi devices), this limit will quickly be reached and prevent healthy function.
If you are unsure of whether your controller should be using a Cloud Key or not, review the following guidelines: UniFi - Cloud Key's Device Management Limit
Symptoms
server.log indicates error identical or similar to the following:
<inform_stat-10> ERROR dev - Error in DeviceManager.processStat() com.mongodb.WriteConcernException: { "serverUsed" : "127.0.0.1:27117", "err" : "can't map file memory - mongo requires 64 bit build for larger datasets"`
The database is close to 2 GB in size
Restoring from a backup may work until the limit is reached again.
How to Prevent
Make sure your UniFi Deployment is not too large for the UniFi Cloud Key to handle. See here.
If thescale of the UniFi deployment on Cloud Key is growing too large, consider migrating to a software install of the UniFi Controller software on a server with a 64-bit OS.
Verify the size of your backups is not approaching the 2GB limit under Settings > Auto Backup.
Reduce Data Retention Settings, then Compact Database under Settings > Maintenance > Compact Database.
Other Causes
If you encounter an issue not covered by one of the above scenarios, get help on our Community. This article will continue to grow thanks to user feedback.
However, if you still don't find a solution you may be dealing with hardware issues. These are very rare but can be encountered. In such cases, usually, the Cloud Key will fail to power on or the SD card will not permit additional data to be written to the Cloud Key. If the issue is apparently a hardware issue and your device is under warranty, fill out the RMA form to arrange a replacement: https://www.ubnt.com/support/rma/
Related Articles
Back to Top
UniFi - Accounts and Passwords for Controller, Cloud Key and Other Devices
UniFi SDN - Repairing Database Issues on the UniFi Controller
UniFi - How to Manage & Upgrade your Cloud Key
UniFi - How to Manually Change the Cloud Key's Controller Version via SSH
View ArticleOverview
This article describes the different sets of credentials UniFi uses, along with information on where each would have been set up initially and where they can be changed, if applicable. It is important to note that both passwords and usernames are case sensitive.
Table of Contents
UniFi Device Authentication Password
UniFi Network Controller Password
Cloud Key SSH
Ubiquiti SSO Cloud Credentials: UI Community, UI Store and UniFi Cloud Access Portal
Other Credentials
Related Articles
UniFi Device Authentication Password
Back to Top
The Device Authentication credentials are used in thedevice management user interfaces (UI). For example, when locally accessing a UniFi Security Gateway (USG) by typing 192.168.1.1 in the browser. They're also used when adopting a "managed by other" device. See this article for more: UniFi - Advanced Adoption of a "Managed By Other" Device.
UniFi - How To Use a Free Email Service as SMTP Server (Gmail)
To see what this password is, and to change it:
1. Launch the UniFi Network Controller and go toSettings > Site and enable Advanced Features. Save changes and refresh the screen.
2. Now you should see aDevice Authenticationsection underSettings > Site. Note that if you had previously enabled SSH Authentication and then disabled Advanced Features, this section would be visible without requiring Advanced Features to be enabled in step 1.
3. Check the box to Enable SSH authentication and set a Username and Password. Or click the eye to see what your Username and Password currently is if the password is already created.
If these have never been set by an admin, there are two possible combinations of default credentials for UniFi devices: ubnt / ubnt orroot / ubnt. However, if you went through the Setup Wizard, it would have required you toassign a new password and username in the Controller Access screen, under Device Authentication. The default credentials of ubnt/ubnt or root/ubnt will be useful when factory resetting a device and managing it in an already installed Controller (hence, forgoing the Setup Wizard).
NOTE: The default ubnt/ubnt username and password also applies to the Cloud Key (and SSH access to the Cloud Key)when accessing the Configuration UI of a new or factory-defaulted Cloud Key by typing its IP address in the browser (default is 192.168.1.30), instead of going through the Setup Wizard. Other than that specific moment, the Cloud Key and SSH password is not the same as the Device Authentication credentials. See the SSH and Cloud Key credentials section for details.
UniFi Network Controller Password
Back to Top
These credentials allow you to log in to the UniFi Network Controller, either accessing it directly by typing the IP address on your browser, or by going to the UniFi Cloud Access Portal and launching the Controller from there. You created these credentials in the Controller Access screen of the Setup Wizard. You have the option to use your SSO Cloud Account credentials for the Controller as well. See the SSO Cloud Credentials section for more information.
How to Change the Controller Admin Name and Password
If you have access to the Controller, you can change your Controller Admin Name and Password at any moment.
1. Within the Controller, click on your username in the upper, right-hand corner.
2. Select Edit account.
3. Here you can change the password, the Admin Name and the Admin email. It is important to note that when you are resetting your password, this is the only email you will be able to send a "reset password" email to, regardless of what email you are using as a SMTP server.
How to Reset the Controller Password
If you forgot the password of the UniFi Network Controller, you can click on theFORGOT PASSWORD?link under the controller login screen and enter the email you have associated with your Controller (as it appears in the Controller'sEdit account section). You will have to click the link in the email to properly reset your password. Until then your current password is still valid.
The password reset email is sent by SMTP server. If you have not enabled the SMTP server and configured it correctly, this option will not work even when appearing to successfully send the reset email. If the SMTP server has not been set up, but you have Cloud Access enabled, you can log in to unifi.ui.com and try to launch your controller using the Cloud, by clicking on the name of the controller and then selecting "Launch Using Cloud" from the drop down that appears in the Site Overview of the controller Details panel that pops out. If you can successfully launch the controller, then you will be able to set up SMTP under Settings > Controllerand then request a password reset with the Forgot Passwordlink afterlocally accessing the controller.
See this article on how to set up a SMTP server with Gmail: UniFi - How To Use a Free Email Service as SMTP Server (Gmail). You can also read the SMTP section in the UniFi User Guide, Chapter 3 (page 57).
If neither of these have been enabled, there is no method to recover the Controller password: it will have to be reinstalled. See this article on how to uninstall the Controller and reinstall by following the Quick Start Guide or User Guide downloadable in the Downloads page (select product on the left hand menu and scroll down to the documentation section).
Cloud Key SSH
Back to Top cloud key password
NOTE: The default device username and password described in the first section also applies to the Cloud Key (and SSH access to the Cloud Key)when accessing the Configuration UI of a new or factory-defaulted Cloud Key.For Cloud Keys that have already been set up, read the following section.
The Cloud Key's SSH credentials are the same as the one's used to enter the Cloud Key's configuration interface, accessed when typing the Cloud Key's IP address in the browser navigation bar. The Setup Wizard gives users the choice to use the same Controller administrator name and password for SSH access. However, if a user decides to leave that box unchecked, they will have to provide another set of credentials in the Wizard's Controller Access screen for SSH and Cloud Key access.
In other words: if the option to "Use the same name and password for SSH access to your Cloud Key" is checked, then the Cloud Key and the SSH credentials will be the same as the Controller's, unless you change them later on. To change them you would:
1. Go to the Cloud Key's configuration UI by typing the Cloud Key's IP address in your browser.
2. Select the Manage Cloud Keyoption and sign in.
3. Click on the username on the upper right hand corner and select change username or change password as applies to your needs. For Gen 1 Cloud Keys these settings are found underMaintenance > Security.
ATTENTION:There is no Cloud Key / SSH credential recovery, so if that password is lost, reset the device to factory defaults by pressing and holding the Cloud Key's reset button for more than 5 seconds. Once you launch the Setup Wizard for your freshly reset Cloud Key, you can restore from one of your backups. The backup will not restore the forgotten credentials, so you will be able to set new ones without any issues and without losing your other settings, as long as you do know your UniFi Network Controller username and password.
Ubiquiti SSO Cloud Credentials
Back to Top
The Ubiquiti Cloud username and password are your Single Sign-On, UI.com account credentials created in https://account.ui.com/. This set of credentials is used in the UI Community, the UI Store, and the UniFi Cloud Access Portal. To change this username and password go to https://account.ui.com. This is also where you would enable (or disable) your 2FA verification. See this article for more: How to Enable Two Factor Authentication.
How to create an account:
Click to Expand
Visit: https://account.ui.com
Under the Sign In button, click on Not a Member?Create account.
Fill in the required information.
First name - First name of the user account owner.
Last name - Lastname of the user account owner.
Username - Public display name for the account. Used for sign in on required Ubiquiti websites.
Email- Email address to receive notification emails. Can also be used for sign in. Will be used by Ubiquiti Support to contact you if necessary.
Password - This password can be any combination of characters as long as it meets the minimum of 8 characters in length.
Agree to the terms and policies, decide if you wish to receive periodic newsletters and updates and clickRegister.
After the account has been registered, check the email inbox for a verification email to make sure that the proper email account was used for the account.
User Tip:If you wish to use your SSO Cloud credentials for your Controller and have one less set of credentials to worry about, you can set this up by logging into your Controller and going to Settings > Remote Access and enabling the Enable Local Login with Ubiquiti Account. Please make sure to read the tooltip in the Controller before enabling.
Other Credentials
Back to Top
Ubiquiti Support and Help Center Credentials
The Ubiquiti Help Center ( https://help.ubnt.com/) uses a different set of credentials than the Community. If you have ever opened a ticket with Ubiquiti support you are already registered but do not have a password. In other words, Support will group tickets according to requester email. If you contact Support they can provide you with the reset password to finish the registering process.
NOTE:It is recommended to use Chrome as your browser.
1. Go to the Help Center and click on the Sign In link in the upper, right-hand corner.
2. In the bottom left of the dialog box that appears, click the Sign UporGet a password link. Fill in the information requested.The Get a password link is also the way to reset a password if it has been forgotten. With your Help Center account you can see your support tickets underMy Activities > Requests and you can also give a thumbs-up or down to the articles. Please remember to click the Send Feedback button and let us know what is missing in our articles!
Wireless Network SSID Password
This is not a common password to get confused, but it is listed in this article since it is also created during the Setup Wizard in theConfigure WiFi screen. You can change this SSID name and password, referred to as Security Key in the UniFi Network ControllerSettings > Wireless Networks > Edit.
Related Articles
Back to Top
UniFi - Advanced Adoption of a "Managed By Other" Device
View Article
Overview
Readers will learn how to configureVRRP(Virtual Router Redundancy Protocol) on an EdgeRouter.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Device used in this article:
EdgeRouter-4 (ER-4)
Table of Contents
Basic VRRP Configuration
Optional VRRP Additions
Related Articles
Basic VRRP Configuration
Back to Top
The VRRP Virtual IP address (VIP) that is shared between the routers is 10.0.0.254/24.
Follow the steps below to configure the VRRP functionality on ER-1:
CLI: Access the Command Line Interface on ER-1.You can do this using the CLI button in the GUI or by using a program such as PuTTY.
1. Enter configuration mode.
configure
2. Define the VRRP group and the virtual IP address.
set interfaces ethernet eth1 vrrp vrrp-group 10 virtual-address 10.0.0.254/24
3. Set the VRRP priority to ensure that ER-1 becomes the master (active) router.
set interfaces ethernet eth1 vrrp vrrp-group 10 priority 200
NOTE: A higher number equals a higher priority.
4. Commit the changes and save the configuration.
commit ; save
Repeat the the VRRP configuration steps on ER-2:
CLI: Access the Command Line Interface on ER-2.You can do this using the CLI button in the GUI or by using a program such as PuTTY.
1. Enter configuration mode.
configure
2. Define the VRRP group and the virtual IP address.
set interfaces ethernet eth1 vrrp vrrp-group 10 virtual-address 10.0.0.254/24
3. Set the VRRP priority to ensure that ER-2 becomes the backup (passive) router.
set interfaces ethernet eth1 vrrp vrrp-group 10 priority 100
4. Commit the changes and save the configuration.
commit ; save
You can verify the VRRP configuration with the following operational mode commands:
show vrrp
show vrrp summary
Optional VRRP Additions
Back to Top
In addition to setting the priority, VRRP supports the following optional additions:
Authentication
Preemption
Transition Scripts
Sync Groups
The VRRP authentication feature will protect the VRRP hello messages with a plain-text password or AH (Authentication Header) encryption. To enable authentication, run the following commands:
configure
set interfaces ethernet eth1 vrrp vrrp-group 10 authentication type < ah | plaintext-password >
set interfaces ethernet eth1 vrrp vrrp-group 10 authentication password < password >
commit ; save
The VRRP preemption feature determines whether the VRRP backup router can preempt the master router and is enabled by default. VRRP preemption is enabled by default. To modify the preemption, run the following commands:
configure
set interfaces ethernet eth1 vrrp vrrp-group preempt < true | false >
commit ; save
Sync groups are used to link VRRP groups together in order to propagate transition changes from one group to another group.To configure a VRRP sync group, run the following commands:
configure
set interfaces ethernet eth1 vrrp vrrp-group 10 sync-group < group-name >
set interfaces ethernet eth2 vrrp vrrp-group 20 sync-group < group-name >
commit ; save
NOTE: VRRP groups in a sync group should have similar configurations in terms of priority and preemption. Before enabling a sync-group you should verify that one router is master of both groups and the other is backup of both groups. If both side think they are master of the same group, then enabling a sync group can cause endless transitioning to get in sync.
Transition scripts are used to run a script whenever the state of the VRRP router changes. The available state changes are:
master Run a script when the EdgeRouter transitions to the VRRP master router.
backupRun a script when the EdgeRouter transitions to the VRRP backup router.
faultRun a script when the underlying Ethernet interface goes down.
To add a custom transition script to VRRP, run the following commands:
configure
set interfaces ethernet eth1 vrrp vrrp-group 10 run-transition-scripts < master | backup | fault > < script-location >
commit ; save
Related Articles
Back to Top
View ArticleOverview
This article explains how to interpret the Debugging Metrics statistics view, and how to use the data therein to troubleshoot and resolve common Wi-Fi issues.
Table of Contents
1. Introduction
2. Most Active APs
3. Retries
4. Channel Utilization
5. Top Clients
6. Top Interference
7. Most Active Clients
8. Longest Connected Clients
9. Top Memory Usage
10. Top CPU Usage
11. Related Articles
Introduction
Back to Top
The Debugging Metrics page shows a collection of data that makes it easier to identify and fix common Wi-Fi performance issues.To access Debugging Metrics on current UniFi Controller versions navigate toStatistics >and select Debugging Metricsfrom the dropdown.TheDebugging Metrics section will include the following data tables:
Most Active APs
Retries
Channel Utilization
Top Clients
Top Interference
Most Active Clients
Longest Connected Clients
Top Memory Usage
Top CPU Usage
UniFi - Understanding and Implementing Minimum RSSI
Each category contains a table that summarizes the data and can display information on the 2.4GHz band or the 5GHz one. In order for this feature to be available, users need to have at least one UniFi Access Point (UAP), although the data will be much improved with the use of a UniFi Security Gateway (USG) and UniFi Switch (USW). The following sections will explain the different fields of the Debugging Metrics view, giving network administrators the tools needed to resolve Wi-Fi issues they might encounter.
Most Active APs
Back to Top
This view lists the access points (APs) on the network that are sending/receiving the most traffic. Tx indicates packets transmitted, and Rx indicates packets received. At a glance, an administrator can identify if there are areas of higher demand that could benefit from having another AP available. Excessive use of an AP can lead to over-utilized memory/CPU, as well as poorer performance for over-active APs.
Common Causes & Solutions:
Not enough APs to meet density demands:If traffic appears consistently too high on a given access point, add an additional AP to help handle the traffic. Alternatively, consider placing nearby APs closer to the over-utilized AP to help handle some of the client load.
Problematic Clients:Sometimes what may look like an over-active AP may be more the result of a client device using up excessive traffic with P2P applications, media streaming, intentional spamming, etc. Identify clients that use too much traffic; and if applicable, use Deep-Packet Inspection (DPI) to identify whether the traffic being used violates what is acceptable terms of use of the network. You can then decide to either limit the problematic client by adding it to a client group with controlled bandwidth limits or to block it altogether.
Poor Configuration on AP: If an AP has a Tx power that is set too high and nearby APs are set too low at lower levels, one AP can attract client devices with better signal strength but fail to deliver optimal Wi-Fi experience. To fix this, make sure all nearby devices are sharing the load with the over-active AP. Additionally, test lowering the Tx power on the active AP; and raise it on the nearby, less active APs.This can be accomplished through the device property panel under the Radio section.
Retries
Back to Top
This view exposes the retry rate for both transmitting (packets that had to be resent to the client) and receiving (RX) packets (packets that had to be resent to the access point). The Retry rate indicates packets that had to be re-sent because they were corrupted upon arriving at the proper destination.
Common Causes & Solutions:
Interference: This is the most common cause of packet loss/retransmissions. Identify whether the Retry rate is higher on one of the two bands: 2.4GHz or 5GHz, or if it is equally impacted on both. Then look for other nearby APs to see how local the interference is. This can point to a rogue access point, a very congested RF environment, a problematic client device near the AP, etc. To solve, perform an RF Scan, and place APs on less congested channels. Also, eliminate adjacent channel overlap on nearby UniFi APs. Another option would be to identify a problematic device causing the interference and re-configure/remove it.
Client/AP Tx Power mismatch: Another common cause of packet retries is the mismatch of broadcast power levels (Tx Power). If an AP and client device are communicating at much different broadcast strengths, then this can cause packet retries. Look for packet retries on Rx specifically as this would indicate the more likely issue of the AP broadcasting too strongly for ideal behavior with the client.
Suggested articles:
UniFi - RF Scan: Suggested Channels Feature
UniFi - Understanding and Implementing Minimum RSSI
Channel Utilization
Back to Top
This view reveals which APs are utilizing the most of their assigned channel on 2G or 5G.
Common Causes & Solutions:
Interference: If there is an access point with 59\% Channel Utilization but only 15\% combines Self Tx/Rx, this can indicate channel re-use/interference is the culprit. In a high-density environment, make sure you are minimizing the number of APs using each respective channel.
Legacy Clients/Poor Data Rates:If high channel utilization is seen on an AP that largely comes from Self Tx/Rx, check the Most Active APs table to see if it is handling excessive traffic. If not, it is possible that poor data rates of older Wi-Fi clients are slowing down the AP and eating up a disproportionate amount of airtime. If this is causing adverse behavior you may opt to not provide connectivity to the lower data rates on this AP to prevent these older clients from causing issues.
Top Clients
Back to Top
The Top Clients view shows what APs are handling the most client devices, and whether one band is more in use than the other. An over-utilized AP can limit network performance, and having too many devices on a particular band may also be undesirable.
Common Causes & Solutions:
Tx Power Levels: In a higher density environment, if clients are connecting to an AP but should be connecting to another nearby one, this can indicate the access point in question is broadcasting at a higher strength than other nearby APs and may benefit from decreasing the Tx power on either band. This can be accomplished through the device property panel under the Radio section.It could also indicate that the other device(s) should have the Tx power increased. Typically this is more of an issue for 5G given the limited range. If devices are connecting to 2G heavily, this can indicate the need to lower 2G Tx levels on the over-utilized AP.
2.4GHz Band Over-utilized: In cases where an AP is seen to have too many clients on 2.4GHz, an administrator may opt to enable Band Steering on the AP. Band steering requiresAdvanced Settings to be enabled underSettings > Site.Once Advanced Settings are enabled in the UniFi Controller, band steering can be enabled by clicking on the AP with the high number of clients, opening the Properties Panel. Go to Config > Band Steering, and select "Prefer 5G". Save and apply changes and then monitor the AP to see whether performance improves.More clients should now be seen on 5G.
AP Placement/Density: If one AP seems to have more clients connected to it than all the others, consider moving other APs closer, or adding another AP to ease the burden on the AP.
Top Interference
Back to Top
This table shows the APs that have the most RF interference. RF interference results from other wireless communications disrupting the normal wireless communication to and from the APs. Excessive interference can cause a number of adverse effects on the wireless network. Look out for sustained interference levels of double-digits and higher.
Common Causes & Solutions:
Poor Channel Assignment: Interference levels are specific to individual channels on each band, based on local RF environment. If you see high interference levels, do an RF Scan on the APs, then manually assign the AP to a channel on the 2.4G or 5G band that is less saturated with wireless signaling. If the network is dealing with severe interference, consider narrowing the channels (2.4GHz channels should in most cases stay at HT20 channel width, and 5GHz in noisy/high-density environments may warrant being narrowed to HT20 as well). Remember that channels must also be assigned correctly to avoid interference of other APs. Make sure to stagger channels and avoid using the same and adjacent channels on adjacent APs.
Tx Levels: If interference is exceptionally high in a certain location, even with devices located local to the device and assigned to the optimal channel, this may indicate that the device is broadcasting too quietly. Try tweaking the Tx power up to medium/high, or use custom levels to see if interference levels are lower with a stronger Tx level. Sometimes excessively high Tx levels in certain environments can cause self-interference. If the AP is placed on a stone/brick/metal surface, self-interference can severely impact performance. In such cases, try lowering Tx power to see if the wireless connection will perform better.
Most Active Clients
Back to Top
This table shows which clients are using the most bandwidth. Look out for highly utilized APs that are being over-used by a small number of clients.
Common Causes & Solutions:
Network Abuse/Misuse:Abnormally high traffic from individual client devices will often point to clients that are either using the network for things that they shouldn't like torrenting, excessive media downloads, or downloading large applications; or it could possibly also point to clients that are seeking to intentionally bring down or negatively impact the network. When this occurs in environments that include a USG, use Deep Packet Inspection (DPI) to find out what kind of traffic these clients are using and identify violations of the network's terms of use. Problematic clients can be added to a user group in UniFi with maximum bandwidth limits. Admins also can ban these users from the wireless network altogether using the "block" button in the UI.
High Demand Clients:Sometimes the high bandwidth may be expected if a client device is a media server, camera or the likes. In such cases, if normal client-use is adversely affected, you may opt to confine high-demand clients to their own wireless network or dedicated access point. This can ensure that other clients have the optimal Wi-Fi experience, while still serving the most demanding clients.
Suggested article: UniFi - How to Set Traffic Bandwidth Limits
Longest Connected Clients
Back to Top
This view displays which clients on the network have been connected for the longest time. This is useful to identify widespread network issues, for example, if client uptime is low across the board. As well as identifying devices that should not be staying on the network for that long, for example in a coffee shop that offers complimentary Wi-Fi for current customers.
Top Memory Usage
Back to Top
Top Memory Usage indicates the percentage of AP hardware memory that is being used by its operations. Devices that may be dealing with abnormally high demand or may be encountering an error of some sort, may have the top memory usage. Typically high memory usage will accompany high utilization/demand; if you see abnormally high amounts of memory utilization i.e. >80\%, clients may experience adverse performance.
Top CPU Usage
Back to Top
Top memory usage indicates the percentage of AP hardware processing resources in use by the AP at a given time. Similarly to memory usage, higher CPU usage will typically indicate the AP is more heavily in use. Abnormally high levels of CPU usage may point to a bug or an error on the AP.
Related Articles
Back to Top
UniFi - Troubleshooting Connectivity Issues
UniFi - RF Scan: Suggested Channels Feature
UniFi - How to Set Traffic Bandwidth Limits
View ArticleOverview
Readers will learn how to create firewall rules that protect the router and limit traffic between multiple Local Area Networks (LANs).
EdgeRouter - Router on a Stick
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Device used in this article:
EdgeRouter-4 (ER-4)
Adding Firewall Rules
Back to Top
Firewall policies are used to allow traffic in one direction and block it in another direction.
The EdgeRouter uses a stateful firewall, which means the router firewall rules can match on different connection states. In the example diagram above, firewall rules will be added to limit the traffic between the trust LAN (192.168.1.0/24) and the GUEST network (172.16.1.0/24).
The following traffic restrictions are applied to the GUEST network:
Management access to the router is denied.
All traffic to the trusted LAN is denied, with the exception of HTTP and HTTPS traffic to the Webserver.
All other traffic is allowed (internet access)
Follow the steps below to manually create these firewall rules:
GUI: Access the EdgeRouter Web UI.
1. Navigate to the Firewall/NAT tab.
2. Create a network group that includes all of the RFC1918 private IP ranges.
Firewall/NAT > Firewall/NAT Groups > + Add Group
Name: LAN_NETWORKS
Description: RFC1918 ranges
Group Type: Network Group
3. Add the IP ranges to the newly created network group.
Firewall/NAT > Firewall/NAT Groups > LAN_NETWORKS > Actions > Config
Network: 192.168.0.0/16
+Add New
Network: 172.16.0.0/12
+Add New
Network: 10.0.0.0/8
NOTE:The 10.0.0.0/8 range is added to the group as well to include all RFC1918 ranges.
4. Add a GUEST_IN firewall policy and set the default action to accept.
Firewall/NAT > Firewall Policies > + Add Ruleset
Name: GUEST_IN
Description: guest to lan/wan
Default action: Accept
5. Add two firewall rules to the newly created firewall policy.
Firewall/NAT > Firewall Policies > GUEST_IN > Actions > Edit Ruleset > + Add New Rule
Description: allow webserver
Action: Accept
Protocol: TCP
Destination > Address: 192.168.1.10
Destination > Port: 80,443
Firewall/NAT > Firewall Policies > GUEST_IN > Actions > Edit Ruleset > + Add New Rule
Description: drop guest to lan
Action: Drop
Protocol: All protocols
Destination > Network Group : LAN_NETWORKS
6. Attach the firewall policy to the eth2 LAN interface in the inbound direction.
Firewall/NAT > Firewall Policies > GUEST_IN > Actions > Interfaces
Interface: eth2
Direction: in
7. Add a GUEST_LOCAL firewall policy and set the default action to drop.
Firewall/NAT > Firewall Policies > + Add Ruleset
Name: GUEST_LOCAL
Description: guest to router
Default action: Drop
8. Add a firewall rule to the newly created firewall policy that allows guests to use the EdgeRouter as a DNS server.
Firewall/NAT > Firewall Policies > GUEST_LOCAL > Actions > Edit Ruleset > + Add New Rule
Description: allow DNS
Action: Accept
Protocol: Both TCP and UDP
Destination > Port: 53
9. Add a firewall rule to the newly created firewall policy that allows guests to use the EdgeRouter as a DHCP server.
Firewall/NAT > Firewall Policies > GUEST_LOCAL > Actions > Edit Ruleset > + Add New Rule
Description: allow DHCP
Action: Accept
Protocol: UDP
Destination > Port: 67
10. Attach the firewall policy to the eth2 LAN interface in the local direction.
Firewall/NAT > Firewall Policies > GUEST_LOCAL > Actions > Interfaces
Interface: eth2
Direction: local
NOTE: EdgeRouter firewall policies only become active when they are attached to an interface + direction.
The above configuration can also be set using the CLI:
CLI: Access the Command Line Interface.You can do this using the CLI button in the GUI or by using a program such as PuTTY.
1. Enter configuration mode.
configure
2. Configure the LAN_NETWORKS network group.
set firewall group network-group LAN_NETWORKS description 'RFC1918 ranges'
set firewall group network-group LAN_NETWORKS network 192.168.0.0/16
set firewall group network-group LAN_NETWORKS network 172.16.0.0/12
set firewall group network-group LAN_NETWORKS network 10.0.0.0/8
3. Configure the GUEST_IN firewall policy.
set firewall name GUEST_IN default-action accept
set firewall name GUEST_IN description 'guest to lan/wan'
set firewall name GUEST_IN rule 10 action accept
set firewall name GUEST_IN rule 10 description 'allow webserver'
set firewall name GUEST_IN rule 10 protocol tcp
set firewall name GUEST_IN rule 10 destination address 192.168.1.10
set firewall name GUEST_IN rule 10 destination port 80,443
set firewall name GUEST_IN rule 20 action drop
set firewall name GUEST_IN rule 20 description 'drop guest to lan'
set firewall name GUEST_IN rule 20 destination group network-group LAN_NETWORKS
set firewall name GUEST_IN rule 20 protocol all
4. Configure the GUEST_LOCAL firewall policy.
set firewall name GUEST_LOCAL default-action drop
set firewall name GUEST_LOCAL description 'guest to router'
set firewall name GUEST_LOCAL rule 10 action accept
set firewall name GUEST_LOCAL rule 10 description 'allow dns'
set firewall name GUEST_LOCAL rule 10 log disable
set firewall name GUEST_LOCAL rule 10 protocol tcp_udp
set firewall name GUEST_LOCAL rule 10 destination port 53
set firewall name GUEST_LOCAL rule 20 action accept
set firewall name GUEST_LOCAL rule 20 description 'allow dhcp'
set firewall name GUEST_LOCAL rule 20 log disable
set firewall name GUEST_LOCAL rule 20 protocol udp
set firewall name GUEST_LOCAL rule 20 destination port 67
5. Attach the firewall policies to the eth2 interface in the inbound and local direction.
set interfaces ethernet eth2 firewall in name GUEST_IN
set interfaces ethernet eth2 firewall local name GUEST_LOCAL
NOTE: EdgeRouter firewall policies only become active when they are attached to an interface + direction.
6. Commit the changes and save the configuration.
commit ; save
Related Articles
Back to Top
Intro to Networking - How to Establish a Connection Using SSH
Intro to Networking - Network Firewall Security
EdgeRouter - How to Create a WAN Firewall Rule
View ArticleOverview
This article describes the data collected by our analytics framework for UniFi Network products. Click on the question that interests you to expand and collapse the answers.
Frequently Asked Questions
What kinds of data are collected?
Analytics data can be categorized as personal data or other data. If the data can be used to identify a specific individual, it's personal data. Otherwise, it’s other data.
Here’s an example of personal data that our analytics framework may collect: In order to get the most useful statistics about Access Points, we need the MAC address. Even though it would be very difficult to use the MAC address to identify an individual, it could fall under the category of personal data as defined by some regulatory bodies and needs to be treated accordingly.
Here’s an example of other data that our analytics feature will collect: We want to evaluate how features impact overall performance of the products, so our analytics framework will identify if features, like Fast Roaming or Guest Networks, are enabled. By itself, this information cannot be used to identify an individual.
Why do we collect analytics data?
We have developed an analytics framework that is used to measure product performance and customer experience. This data enables us to make improvements that have the highest positive impact on products as a whole.
Some analytics require capturing personal data in order to provide an accurate context for the information and therefore make it as useful as possible. We strongly encourage you to enable this option and participate in our effort to make the products better.
You can enable the feature in controller version 5.12.35 (and later) under Controller Settings, then select Enable Analytics & Improvements.
When do we collect data?
We respect your privacy. We only collect personal data under the analytics framework, as described here, after the network administrator has given consent by enabling the feature through the controller. Other data is automatically reported.
All data collection is subject to our Privacy Policy and we will comply with any valid request under applicable privacy laws to export or delete the impacted data.
View ArticleOverview
Readers will learn how to connect to and setupan EdgeRouter for the first time.There are many different environments where specific adjustments may need to be made. This article demonstrates a common setup scenario, but it is not necessary applicable in every network environment.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Setup wizards were added to the Web UI starting from the EdgeOS v1.4.0 firmware. It is highly recommend to upgrade to the most recent firmware release before following this guide. See the How to Upgrade the EdgeOS Firmware article for more information.
This article is applicableto all EdgeRouter models and was written using the latest stable firmware release.
Table of Contents
Establishing Initial Connectivity
Running the Basic Setup Wizard
Related Articles
Establishing Initial Connectivity
Back to Top
1. Connect an Ethernet cable from a computer to the eth0 interface on the EdgeRouter.
2. Configure a static IP address on your computer in the 192.168.1.0/24 range (for example 192.168.1.11).
Windows Client
Navigate to the Windows 10 Network connections.
Settings > Network & Internet > Status > Change Adapter Options
Modify the IPv4 settings of the Ethernet adapter.
Ethernet Adapter properties > Internet Protocol Version 4 (TCP/IPv4) > Properties
Select to manually enter an IP address and add the following information:
IP address: 192.168.1.11
Subnet mask: 255.255.255.0
Default gateway: <blank>
DNS servers: <blank>
macOS Client
Navigate to the macOS Network connections.
System Preferences > Networks > Ethernet Adapter
Select to manually enter an IP address and add the following information:
IP Address: 192.168.1.11
Subnet Mask: 255.255.255.0
Router: <blank>
DNS server: <blank>
ATTENTION: If a wireless adapter is enabled and connected to another network it could conflict with the connection to the EdgeRouter. Disable the wireless adapter if necessary.
3. Open a Web Browser and enter https://192.168.1.1 inthe address bar.
4.Log into the router using the default credentials.
Username: ubnt
Password: ubnt
5.Confirm that the device is running the latest firmware from our Downloads page.Make sure to upgrade it before continuing on to the next section.
NOTE:There is more information about how to upgrade the EdgeRouter in the How to Upgrade the EdgeOS Firmware article.
Running the Basic Setup Wizard
Back to Top
The Basic Setup wizard which will accomplish all the necessary tasks to allow your router to connect to the Internet, including enabling the default firewall, setting up a Local Area Network and adding a DHCP Server. Each item is explained in more detail below.
NOTE:The current configuration will be replaced and a reboot is required when running the setup wizard.
3. Apply the changes and reboot the router when prompted.
1. Navigate to the Wizards tab and run the wizard.
Wizards > Basic Setup
2. Choose the interface that will connect to the ISP define the other router settings.
The available internet connection types are:
DHCP The most common scenario. Use this option if your ISP is distributing IP addresses via DHCP.
Static IP Use this option if your ISP provided you with a static public IP address.
PPPoE Use this option if your ISPauthenticates your internet connection using PPPoE.
NOTE:It is recommended to configure the ISP supplied modem/router in bridge mode. This setting will forward the public IP from the ISP modem/router to the EdgeRouter.
Having a public IP assigned to the EdgeRouter will open up additional features, while also negating the performance drop caused by a double NAT scenario.
The other available options are:
VLAN It is becoming more common forISPs toprovide FTTH (Fiber to the Home) and require that the Internet be distributed using a VLAN to separate Internet from IPTV and Voice services. Use this option to tag the Internet connection with a VLAN ID.
Firewall Enabled by default. See this article for more information on the default firewall policies that are added to the EdgeRouter.
DHCPv6 If your ISP supports IPv6 using DHCPv6-PD, you will need to assign the supplied Prefix length given from the ISP, enable the default IPv6 firewall, and define the LAN interfaces that will need IPv6 connectivity.
LAN IP Address Set to 192.168.1.1/24 by default. Change if necessary.
DHCP Server Enabled by default.
Username Set to ubnt by default. We strongly recommend that you configure your own user account with a strong password.
NOTE: When configuring a router with a built-in switch (such as the ER-10X, ER-X or ER-X-SFP ), the LAN will be set to the switch0 interface. In this case, all ports assigned to the switch will share the same LAN.
3. Apply the changes and reboot the router when prompted.
4. Unplug and reconnect the interfaces so that eth0 is connected to the ISP and the other ports are connected to your LAN.
ATTENTION:The computer's Ethernet connection can be changed back to DHCP if the DHCP server was enabled in the wizard.
Related Articles
Back to Top
EdgeRouter - How to Upgrade the EdgeOS Firmware
EdgeRouter - How to Access the EdgeRouter
EdgeRouter - How to Create a WAN Firewall Rule
EdgeRouter - Hardware Offloading
View ArticleOverview
This article explains how device discovery works on UNMS and how to troubleshoot any issues that may be encountered.
UNMS - Optional Installation Steps
ATTENTION: Since the UNMS version 1.1.0 there is a new discovery tool called Remote DIscovery. If you are running 1.1.0 or higher please visit this link.
NOTES & REQUIREMENTS: Devices using older firmware will have to upgrade to latest version in order to be discovered. If the device has firmware versions as the ones listed below, please upgrade:
airCube no threshold is set
airFiber LTU older than 1.1.1
airFiber older than 4.1.0-beta.6
airMAX AC older than 8.4.3
airMAX M older than 6.1.3
EdgeRouter older than 1.9.7-hotfix4
EdgeSwitch older than 1.7.3. (older than 1.4.0. will have upgrade manually)
EdgeSwitch XP older than 1.4.0
EdgePower older than 1.2.0
UFiber OLT no threshold is set
Table of Contents
Introduction
How Discovery Works
Troubleshooting
Issue: I can't see any devices or some devices are missing
Issue: Ubiquiti devices are found as Unknown
Issue: I can discover the device but connection to UNMS is failing
Issue: There is an error message about contacting the support
Blocking the Discovery
Related Articles
Introduction
Back to Top
Understanding how device discovery works, helps interpret and solve issues if they arise. This article explains how the discovery process works and what to do if you either cannot discover a device or you can discover it, but it won't connect. In case you do not want your device to be discovered for some reason, this article also includes how to prevent discovery.
How Discovery Works
Back to Top
UNMS tries to find Ubiquiti and 3rd party devices through several tools. This is the process it follows:
UNMS uses a PING to make sure there is a device on the given IP address.
If UNMS gets an answer, the process continues and at that point, the device will appear as an 'Unknown device'.
Ubiquiti Discovery is leveraged to get detailed information about the device. In this step, the TCP protocol is used first and in the second wave the UDP protocol. If the device indeed is one of Ubiquiti's and it has discovery enabled it should send back basic information shown in the Discovery Manager: name, SSID, model, firmware version, MAC address and a list of all interfaces.
If the device doesn't reply to Ubiquiti Discovery then UNMS uses SNMP protocol to download some basic info about the device.
ATTENTION:If either UNMS or a device you need to discover are placed on a public IP range, please make sure all conditions for TCP discovery are met.
Issue: I can't see any devices or some devices are missing
Back to Top
Can you ping the device from the UNMS server?
Check traceroute/ping/curl from your UNMS server to the device's IP. Please note that the ping has to be lower than 400ms otherwise discovery can fail.
ping 192.168.x.x
traceroute -n 192.168.x.x
Is your OS supported?
Discovery doesn't work on Debian 8. It's recommended upgrading to Debian 9 which is officially supported.
Are you using virtualization? If yes, is it the supported one?
Discovery doesn't work on UNMS instances running on an LXC container. This is only one of several issues with LXC containers, which is why they are not officially supported. Please use KVM instead.
Do you have a supported storage driver?
Discovery doesn't work on systems without overlay2 storage driver. Please check that your Kernel includes this driver and your Docker is using it. Here are some pointers on adding the overlay2:
#stop the Docker as a first step
sudo systemctl stop docker
#backup of docker folder, just in case
cp -au /var/lib/docker /var/lib/docker.bak
#into the file /etc/docker/daemon.json put this
{
"storage-driver": "overlay2"
}
#install the Docker again
sudo systemctl start docker
Are you searching for the correct IP range?
Make sure that you are using only 24 ranges for public IP addresses. For public IPs, UNMS doesn't allow to search higher ranges. For private IPs it is possible to go to /16 but the search will be very long.
Is device discovery enabled on the device?
Discovery doesn't work on devices with disabled Discovery. Please make sure that Discovery is enabled in your device in the following locations or by following these instructions:
airMAX: UnderSettings > Services > Device Discovery. If the checkbox is set to OFF change it to ON and click Save Settings.
EdgeRouter:UDP discovery is always active on EdgeRouters, but in some cases, you need to make sure TCP discovery is enabled as well. For example when UNMS is on the public IP and the device is on a private one. You can enable TCP discovery by running:
set service ubnt-discover-server protocol tcp_udp
commit
save
Are UDP packets allowed through?
Discovery doesn't work with blocked port 10001. Please check if there isn't an active firewall record for blocking UDP packets on port 10001, as seen in the Blocking the Discovery section.
Do you use an IP address in range 172.x.y.z? Is there a possible collision with Docker?
Check collision with Docker's virtual subnet. While rare, the container's IP might collide with the real IP in your network. Run ifconfig on your UNMS server to see Docker's IPs:
$ ifconfig
br-6805a10e2e92 Link encap:Ethernet HWaddr 02:42:d3:f8:f1:64
inet addr:172.18.0.1 Bcast:0.0.0.0 Mask:255.255.0.0
inet6 addr: fe80::42:d3ff:fef8:f164/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:196618 errors:0 dropped:0 overruns:0 frame:0
TX packets:10 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:5506244 (5.5 MB) TX bytes:764 (764.0 B)
docker0 Link encap:Ethernet HWaddr 02:42:dd:1c:c3:57
inet addr:172.17.0.1 Bcast:0.0.0.0 Mask:255.255.0.0
inet6 addr: fe80::42:ddff:fe1c:c357/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:8 errors:0 dropped:0 overruns:0 frame:0
TX packets:8 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:536 (536.0 B) TX bytes:648 (648.0 B)
If such an IP exists in your network you will have to change Docker's subnet with the following:
cd /home/unms/app
docker-compose -p unms down
docker network create unms_default --subnet 172.30.0.1/24
docker-compose -p unms up -d
If you find there is a collision with docker, please note that you can change the docker subnet which UNMS uses, through installation script parameters.See UNMS - Optional Installation Steps for more information.
Are the UDP packets arriving?
Check with tcpdump that your device receives UDP packet from your UNMS instance and sends back an answer.
Issue: Ubiquiti devices are found as Unknown
Are you running UNMS on a public IP?
If UNMS (up to 0.13.1) has a public IP address and a device has a private IP, there will be an issue with device discovery. UNMS most likely won't recognize this device correctly. This was fixed in 0.13.2.
Is your device supported?
Consider if your device is supported by UNMS, here is a list of supported devices.
Is discovery enabled on the device?
If discovery is disabled the device will show as unknown in UNMS device discovery.
Are UDP packets allowed through?
If they are not, the device willshow as unknown in UNMS device discovery.
Are the UDP packets arriving?
If not, thenthe device will show as unknown in UNMS device discovery.
Issue: I can discover the device, but the connection to UNMS is failing
NOTE: Not every tool is available on all devices. Only EdgeRouters are guaranteed to have all the tools described below.
Is it possible to ping UNMS from the device?
Check traceroute/ping/curl from the device to your UNMS server IP / domain name:
ping unms-server.com
traceroute -n 192.168.x.x
curl --insecure https://192.168.x.x:443/v2.1/nms/version
Does the connection upgrade to WebSocket?
Check HTTPS upgrade to WebSocket:
curl --insecure --include --no-buffer --header "Connection: Upgrade" --header "Upgrade: websocket" --header "Host: example.com:80" --header "Origin: http://example.com:80" --header "Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==" --header "Sec-WebSocket-Version: 13" https://192.168.x.x:443/
The values of the --header parameters do not matter, you can use example.com as shown. Only the last parameter must be the real address of your UNMS server. This should return an output similar to the following, indicating that the upgrade to WebSocket was successful:
HTTP/1.1 101 Switching Protocols
Upgrade: websocket
Connection: Upgrade
Sec-WebSocket-Accept: qGHgK3En71di5rrssAZTmtRTyFk=
db332780afad264425162cb11d19ffd1ac9ad3658f63cb56968a8a2592054a39aac950bcdae301e39eea75f28c7d3e7dd32a568f0fcf67f25b692434c825ffc7d13b7f8bcec1fb649919d784723f039ef50deb939eeb2b1bd602f56339ac20b65b3
Is the time configured correctly?
Make sure the device has the correct time and date set. SSL connection requires valid time and date. This might be an issue for devices not connected to the internet or with NTP service which is disabled.
Is the AES key correct?
If the device has been connected previously try refreshing its UNMS key by clicking Refresh on the corresponding row in the Devices table. If this doesn't succeed, it is also possible to manually paste the universal UNMS key via the device's UI.
Issue: There is an error message about contacting support
Do you know where to contact us?
This error means that some device sent a block of data which UNMS cannot parse. Usually, it is a single device and if its IP address is omitted from the search range the discovery continues without issues. In any case please write a post in our community forum and we will gladly help you.
Blocking the Discovery
Back to Top
If you wish to prevent your device from being discovered, you can perform the following configuration.
airMAX: Go to Settings > Services > Device Discovery > set checkbox to OFF and click Save Settings
EdgeRouter: Currently this can be done only through the firewall rule. To set up the rule issue the following commands:
configure
edit firewall name disable-discover
set default-action accept
set rule 100 action 'drop'
set rule 100 description 'Drop discovery packets'
set rule 100 protocol 'udp'
set rule 100 destination port 10001
exit
# apply rule to the interface that is connected to the Internet
set interfaces ethernet eth0 firewall local name 'disable-discover'
commit
save
show interfaces
NOTE: The rule will block entire incoming UDP communication to port 10001, potentially disabling more than just the discovery.
To disable the rule, issue the following:
configure
delete interfaces ethernet eth0 firewall local name 'disable-discover'
commit
save
Related Articles
Back to Top
View ArticleOverview
This article describes how to install a fresh copy of UNMS on a server, or update an existing installation. This is a guide for a Linux installation, see the following note for Windows and OS X users:
UNMS - The UNMS Key and the Device Registration Process
NOTES & REQUIREMENTS:
Unfortunately proper operation, smooth backups and upgrades of critical Docker containers cannot be ensured on Windows and macOS systems. At this time we recommend that you install VirtualBox with the latest version of Ubuntu 18.04.3 (Bionic Beaver) 64 bit and then follow the Linux instructions provided below.
Table of Contents
Prerequisites
Installation Instructions
Related Articles
Prerequisites
Back to Top
NOTE:It is recommended to install UNMS on a server, with a public IP address and FQDN, which is directly connected to the main gateway of the network. In this setup, UNMS will automatically have a valid certificate, it will report outages in the most precise manner and all of its advanced functions will perform optimally.It is certainly possible to place UNMS server in a different spot in a topology, but there may be some limitations involved.
Supported Distros (LXC virtualized Distros aren’t officially supported please use KVM):
Ubuntu 16.04.1 LTS (Xenial Xerus) 64-bit
Ubuntu 18.04 LTS (Bionic Beaver) 64-bit
Debian 9 64-bit
2 GB RAM (Minimal)
16 GB storage (Minimal)
64-bit (x64) CPU
Local Ports:
80 (Let's Encrypt certificate automation)
81 (Suspension page)
443 (UI, API, Devices connector)
(see Changing the HTTP and HTTPS ports )
Allow ping (see Devices Latency and Outage Statistics )
A kernel with overlay2 storage driver (see Docker Storage Drivers )
bash, curl, sudo, netcat (see Installing prerequisites )
Installation Instructions
Back to Top
Run the command below on the host to install and start UNMS (it will automatically install Docker if it is not installed already). If a UNMS installation already exists, it will be overwritten, but all data will be kept. It is possible to use the attribute--update if the new installation needs to have the same parameters as the old one. Registering new devices to UNMS can be done by following the steps in this article: The UNMS Key and the Device Registration Process. If it is necessary to customize the installation process, please read Optional installation steps, or if you wish to install a UNMS version that is not the current, stable version see this article. Otherwise, the following command will always install the newest, stable version as seen in the Community Releases section (to view, select the Stable Status, the General tab, and the Management Tools > UNMS tag.
curl -fsSL https://unms.com/v1/install > /tmp/unms_inst.sh && sudo bash /tmp/unms_inst.sh
The installation script will check if ports :80 and :443 are open and if they are not, it will ask which ports should UNMS to use. The same applies to the overcommit memory settings. If thevm.overcommit_memory is not set to '1', the installation script asks for permission to do it. In case those interrupts are unwanted in the installation process it is possible to suppress them with --unattendedattribute to let the installation script do all the necessary arrangements by itself.
When the process is complete, UNMS is accessible at http://server_hostname_or_ip/. Please don't use localhost. Use server hostname or its IP address.
NOTE: The installation script needs to use sudo permissions. Those are required to install Docker in case it is not available in the OS already. It is also needed to create the UNMS user, under which the UNMS application runs as well as to set up a cron task that manages the UNMS updates.
Related Articles
Back to Top
UNMS - Optional Installation Steps
View Article
Overview
Readers will learn how to configure Dynamic DNS on the EdgeRouter using the built-in services.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Device used in this article:
EdgeRouter-4 (ER-4)
Configuring the Built-in Dynamic DNS Service
Back to Top
The following Dynamic DNS services are available for use in EdgeOS:
Afraid Requires server to be hard-coded.
Dnspark
Dslreports
dyndns
Easydns
Namecheap
Noip
Sitelutions Requires serial number to be set as the hostname.
Zoneedit
See the Custom Dynamic DNS article for instructions on how to configure a custom Dynamic DNS service.
CLI: Access the EdgeRouter Command Line Interface.
1. Enter configuration mode.
configure
2. Add the Dynamic DNS service and the login credentials.
set service dns dynamic interface eth0 service <dyndnsservice> host-name <host>
set service dns dynamic interface eth0 service <dyndnsservice> login <username>
set service dns dynamic interface eth0 service <dyndnsservice> password <password>
3. Configure the location of the Dynamic DNS server.
set service dns dynamic interface eth0 service <dyndnsservice> server <server>
NOTE: This step is required when using afraid.org.
4. Commit the changes and save the configuration.
commit ; save ; exit
You can verify the status and force an update of the Dynamic DNS service using the commands below:
show dns dynamic status
update dns dynamic interface <interface-name>
By default, EdgeOS will only update Dynamic DNS when the IP address actually changes.
Related Articles
Back to Top
EdgeRouter - Custom Dynamic DNS
View ArticleOverview
This article lists the different CLI commands supported by the USW-Leaf switch and their equivalent command on a Cisco switch.
Back to Top
NOTE:The commands with asterisks (*) below are not fully supported yet, and may change without notice.
Table of Contents
1. General Commands
2. VLAN Commands
3. Port Operation Commands
4. LAG (Link Aggregation) Commands
5. SPAN (Port Mirroring) Commands
6. Storm Control Commands
7. Port Isolation (Protected Port) Commands
8. Flow Control Commands
9. QoS (Scheduling, Shaping and Policing) Commands
10. ACL Commands
11. STP; RSTP Commands
12. MSTP Commands
13. Port Error Disable / Auto Recovery Commands
14. DHCP Guard / DHCP Snooping (Cisco)
15. ARP
16. DHCP Client/Static IP
17. IP Route(Static)
General Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Show OS version information.
show version
show version
Show base MAC address.
show system
show version
Show USW Model.
show platform info
show version
Show current configuration (DRAM).
show running-config
show running-config
Show startup configuration (NVRAM).
show startup-config
show startup-config
Show all logs that the router has in its memory.
show log
show log
Overview all IPv4 interfaces on the switch.
show ip interface brief
show ip interface brief
Display current routing protocols.
show ip protocol
show ip protocol
Display IPv4 routing table.
show ip route
show ip route
Display IPv6 routing table.
show ipv6 route
show ipv6 route
Display access list.
show access-list <list_name>
show access-list
Display MAC addresses table.
show platform mac address-table
show mac address-table
Show ARP table.
show arp
show arp
Display all users connected to the switch.
NA
show users
Display all info about flash memory.
NA
show flash
Display history of commands used.
NA
show history
Display the system clock.
NA
show clock
Information about hardware status.
show environment
show environment
Show the amount of switch free memory.
show memory
show memory
VLAN Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display VLAN information, all ports which belong to specific VLAN, and information about the number of VLANs configured on the switch.
UBNT# show bridge-domain
SW# show vlan
Create new VLAN 2.
UBNT# configure terminal
UBNT(config)# bridge-domain 2
UBNT(bridge-domain)# exit
UBNT(config)#
SW# configure terminal
SW(config)# vlan 2
SW(config-vlan)# exit
Add VLAN 2 membership to the port swp1, configure the native VLAN ID 10.
NPOS operates VLAN inside bridge-domain, so it's necessary to associate port with VLAN in bridge-domain.
UBNT(config)# interface swp1
UBNT(config-if)# switchport mode trunk
UBNT(config-if)# switchport trunk allowed vlan 2
UBNT(config-if)# switchport trunk native-vlan 10
UBNT(config-if)# exit
UBNT(config)# bridge-domain 2
UBNT(bridge-domain)# vlan 2 swp1
UBNT(bridge-domain)# exit
UBNT(config)# bridge-domain 10
UBNT(bridge-domain)# vlan 10 swp1
UBNT(bridge-domain)# exit
SW(config)# interface fa1/0
SW(config-if)# switchport mode trunk
SW(config-if)# switchport trunk allowed vlan add 2
SW(config-if)# switchport trunk native vlan 10
SW(config-if)# exit
Remove VLAN 2 membership from port swp1 and the native VLAN.
NPOS port with VLAN association to bridge-domain is removed automatically.
UBNT(config)# interface swp1
UBNT(config-if)# switchport trunk allowed vlan remove 2
UBNT(config-if)# no switchport trunk native-vlan
UBNT(config-if)# exit
SW(config)# interface fa1/0
SW(config-if)# switchport trunk allowed vlan remove 2
SW(config-if)# no switchport trunk native vlan
SW(config-if)# exit
Enable or disable dot1q tagging for native VLANs on specific port. Cisco's method operates dot1q native tagging globally.
UBNT(config)# vlan do1q tag native
UBNT(config)# interface swp1
UBNT(config-if)# vlan dot1q tag native
UBNT(config-if)# no vlan dot1q tag native
UBNT(config-if)# exit
SW(config)# vlan do1q tag native
SW(config)# no vlan do1q tag native
Configure the swp1 interface as a nontrunking nontagged single-VLAN 3 access mode.
Before switching, disable the current mode.
UBNT(config)# interface swp1
UBNT(config-if)# no switchport
UBNT(config-if)# switchport mode access
UBNT(config-if)# switchport access vlan 3
UBNT(config-if)# exit
UBNT(config)# bridge-domain 3
UBNT(bridge-domain)# vlan 3 swp1
UBNT(bridge-domain)# exit
SW(config)# interface fa1/0
SW(config-if)# switchport mode access
SW(config-if)# switchport access vlan 3
SW(config-if)# exit
Remove any configuration specific to Layer 2 on this interface (include VLAN's membership), switch interface to Layer 3 mode.
UBNT(config)# interface swp1
UBNT(config-if)# no switchport
UBNT(config-if)# exit
SW(config)# interface fa1/0
SW(config-if)# no switchport
SW(config-if)# exit
Disable MAC address learning on a specified VLAN 2.
Maximum number of learning MAC records equal 1000.
Configure a secure sticky MAC address for interface swp1.
UBNT(config)# bridge-domain 2
UBNT(bridge-domain)# no learning enable
UBNT(bridge-domain)# learning limit 1000
UBNT(bridge-domain)# learning sticky aa:bb:cc:dd:11:22 interface swp1
UBNT(bridge-domain)# exit
SW(config)# no mac-address-table learning vlan 2
SW(config)# mac-address-table limit vlan 2 maximum 1000
SW(config)# interface fa1/0
SW(config-if)# switchport port-security mac-address aa:bb:cc:dd:11:22
SW(config-if)# exit
Port Operation Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Show port status and admin state.
UBNT# show interface status
SW# show interface status
Verify the FEC feature status on the interface.
UBNT# show fec status
View the interface status of interface swp1.
UBNT# show port status swp1
UBNT# show interface swp1
SW# show interface fa1/0
Display interface statistics.
UBNT# show statistics interface
SW# show interface counters
Clear interface statistics counters.
UBNT# show statistics clear
SW# clear counters
Display information about the connected transceivers.
UBNT# show interface transceiver swp1
UBNT# show platform fwd interface sfp
SW# show interface transceiver
*Information about the switchport interface.
NA
show interface switchport
Configure interface speed 100g, autonegotiation, and FEC cl-91.
UBNT(config)# interface swp54
UBNT(config-if)# speed 100g
UBNT(config-if)# autonegotiation enabled
UBNT(config-if)# fec cl-91
UBNT(config-if)# exit
SW(config)# interface fa1/0
SW(config-if)# speed 100g
SW(config-if)# speed auto
SW(config-if)# fec cl91
SW(config-if)# exit
Configure maximum transmission unit (MTU) size per specific interface.
UBNT(config)# interface swp54
UBNT(config-if)# mtu 9216
UBNT(config-if)# exit
SW(config)# interface fa1/0
SW(config-if)# ip mtu 9216
SW(config-if)# end
LAG (Link Aggregation) Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display LACP internal information.
UBNT# show lacp internal
SW# show lacp internal
Display the status of a port-channel interface.
UBNT# show interface po1
SW# show interface port-channel 1
Display the traffic statistics for port channels.
UBNT# show lacp counters
SW# show lacp counters
Clear LACP counters.
UBNT# clear lacp counters
SW# clear lacp counters
Display the LACP system identifier.
UBNT# show lacp sys-id
SW# show lacp system-identifier
Display information about the LACP neighbor.
UBNT# show lacp neighbor
SW# show lacp neighbor
Configure the LACP system-priority and priority for the physical interface.
UBNT(config)# lacp system-priority 65535
UBNT(config)# interface swp54
UBNT(config-if)# lacp port-priority priority 20000
UBNT(config-if)# exit
SW(config)# lacp system-priority 65535
SW(config)# interface fa1/0
SW(config-if)# lacp port-priority priority 20000
SW(config-if)# exit
Specify the port mode as active for the links in a port channel.
Define the minimum and maximum number of active bundled.
Define LACP ports allowed in a port channel.
UBNT(config)# interface swp1
UBNT(config-if)# no switchport
UBNT(config-if)# channel-group 1 mode active
UBNT(config-if)# interface swp2
UBNT(config-if)# no switchport
UBNT(config-if)# channel-group 1 mode active
UBNT(config-if)# interface port-channel 1
UBNT(config-if)# lacp min-links 2
UBNT(config-if)# lacp max-bundle 8
UBNT(config-if)# exit
SW(config)# interface fa0/1
SW(config-if)# channel-group 1 mode active
SW(config-if)# interface fa0/2
SW(config-if)# channel-group 1 mode active
SW(config-if)# interface port-channel 1
SW(config-if)# lacp min-links 2
SW(config-if)# lacp max-bundle 8
SW(config-if)# exit
Delete all interfaces from port-channel interface.
UBNT(config-if)# int po1
UBNT(config-if)# delete all-lag-members
UBNT(config-if)# exit
NA
SPAN (Port Mirroring) Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display information about the Switched Port Analyzer (SPAN).
UBNT# show mirror
SW# show monitor session
Set up a SPAN session (session 1) for monitoring ingress & egress port traffic to a destination port.
UBNT(config)# mirror tx session 1
UBNT(config-mirror)# source interface swp1
UBNT(config-mirror)# destination interface swp2
UBNT(config)# mirror rx session 1
UBNT(config-mirror)# source interface swp1
UBNT(config-mirror)# destination interface swp2
UBNT(config-mirror)# exit
SW(config)# monitor session 1 source interface fastEthernet0/1 tx
SW(config)# monitor session 1 source interface fastEthernet0/1 rx
SW(config)# monitor session 1 destination interface fastEthernet0/2
Delete SPAN sessions.
UBNT(config)# no mirror tx session 1
UBNT(config)# no mirror rx session 1
SW(config)# no monitor session 1
Storm Control Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display storm control statistics for specified interface.
UBNT# show statistics storm-control interface swp1
SW# show interface fa0/1 counters storm-control
Traffic Storm Control Configuration (level as a percentage of the total interface bandwidth).
UBNT(config)# interface swp1
UBNT(config-if)# storm-control unicast level 50
UBNT(config-if)# storm-control multicast level 50
UBNT(config-if)# storm-control broadcast level 50
UBNT(config-if)# exit
SW(config)# interface fa0/1
SW(config-if)# storm-control unicast level 50
SW(config-if)# storm-control multicast level 50
SW(config-if)# storm-control broadcast level 50
SW(config-if)# exit
Port Isolation (Protected Port) Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display protected port state for specific interface.
UBNT# show interface swp1 switchport
SW# show interface fa0/1 switchport
Enable or disable the interface that will be a protected port.
UBNT(config)# interface swp1
UBNT(config-if)# switchport protected
UBNT(config-if)# no switchport protected
UBNT(config-if)# exit
SW(config)# interface fa0/1
SW(config-if)# switchport protected
SW(config-if)# no switchport protected
SW(config-if)# exit
Flow Control Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
*Display the flow control settings.
NA
SW# show interface flowcontrol
Configure flow-control mode
Configure flow-control priority
UBNT(config)# interface swp1
UBNT(config-if)# flow-control mode both
UBNT(config-if)# priority-flow-control mode both
UBNT(config-if)# exit
SW(config)# interface ethernet fa0/1
SW(config-if)# flowcontrol receive on
SW(config-if)# flowcontrol send on
SW(config-if)#priority-flow-control mode on
SW(config-if)# exit
Disable Link Level Flow Control and its priority on a specific interface.
UBNT(config)# interface swp1
UBNT(config-if)# no flow-control
UBNT(config-if)# no priority-flow-control
UBNT(config-if)# exit
SW(config)# interface ethernet fa0/1
SW(config-if)# flowcontrol receive off
SW(config-if)# flowcontrol send off
SW(config-if)#priority-flow-control mode off
SW(config-if)# exit
QoS (Scheduling, Shaping and Policing) Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Verify existing scheduling policy, queues weight, and bound interfaces.
UBNT# show qos policy scheduling
SW# show mls qos interface queueing
Verify existing shaping policy.
UBNT# show qos policy shape
SW# show policy-map interface
Verify existing policing policy.
UBNT# show qos policy policing
Configure the QoS Scheduling policy, binding the policy to a specific interface.
UBNT(config)# qos policy scheduling sch_pol
UBNT(qos-policy)# queue 0 dwrr 5
UBNT(qos-policy)# queue 1 dwrr 10
UBNT(qos-policy)# queue 2 dwrr 20
UBNT(qos-policy)# queue 3 dwrr 30
UBNT(qos-policy)# queue 4 dwrr 40
UBNT(qos-policy)# queue 5 dwrr 50
UBNT(qos-policy)# queue 6 dwrr 60
UBNT(qos-policy)# queue 7 dwrr 70
UBNT(qos-policy)# exit
UBNT(config)# interface swp1
UBNT(config-if)# qos policy scheduling sch_pol
UBNT(config-if)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# wrr-queue bandwidth 5 10 20 30 40 50 60 70
SW(config-if)# exit
Configure the QoS Shaping policy, binding the policy to a specific interface.
UBNT(config)# qos policy shape shape_pol
UBNT(qos-policy)# queue 0 min 2000 64000 max 10000 640000
UBNT(qos-policy)# queue 1 min 2000 64000 max 20000 640000
UBNT(qos-policy)# queue 2 min 2000 64000 max 20000 640000
UBNT(qos-policy)# queue 3 min 2000 64000 max 30000 640000
UBNT(qos-policy)# queue 4 min 2000 64000 max 40000 640000
UBNT(qos-policy)# queue 5 min 2000 64000 max 50000 640000
UBNT(qos-policy)# queue 6 min 2000 64000 max 60000 640000
UBNT(qos-policy)# queue 7 min 2000 64000 max 70000 640000
UBNT(qos-policy)# exit
UBNT(config)# interface swp1
UBNT(config-if)# qos policy shape shape_pol
UBNT(config-if)# end
SW(config)#policy-map shape_pol
SW(config-pmap)#class shape_cl
SW(config-pmap-c)#shape avarage 640000
SWconfig-pmap-c)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)#service-policy output shape_pol
SW(config-if)# exit
*Configure the QoS Policing policy that utilizes two ACLs (associated with policer), binding the policy to a specific interface.
UBNT(config)# ip access-list voice-acl
UBNT(config-ip-acl)# 10 permit ip 192.168.10.0/24 any
UBNT(config-ip-acl)# exit
UBNT(config)# ip access-list database
UBNT(config-ip-acl)# 10 permit tcp any any eq 1810
UBNT(config-ip-acl)# 20 permit tcp any any eq 2481
UBNT(config-ip-acl)# 30 permit tcp any any eq 1521
UBNT(config-ip-acl)# exit
UBNT(config)# policer aggregate voice-acl-aggr
UBNT(qos-policer)# conform-action transmit
UBNT(qos-policer)# exit
UBNT(config)# policer aggregate database-aggr
UBNT(qos-policer)# conform-action set-dscp 18
UBNT(qos-policer)# exit
UBNT(config)# qos policy policing test-policing
UBNT(qos-policy-policing)# 10 access-list voice-acl
UBNT(qos-policy-policing-acl)# policer voice-acl-aggr
UBNT(qos-policy-policing-acl)# exit
UBNT(qos-policy-policing)# 20 access-list database
UBNT(qos-policy-policing-acl)# policer database-aggr
UBNT(qos-policy-policing-acl)# exit
UBNT(qos-policy-policing)# exit
UBNT(config)# interface swp1
UBNT(config-if)# qos policy policing test-policing input
UBNT(config-if)# end
SW(config)#ip access-list extended voice-acl
SW(config-ext-nacl#permit ip 192.168.10.0 0.0.0.255 any
SW(config-ext-nacl)#exit
SW(config)#ip access-list extended database
SW(config-ext-nacl)#permit tcp any any eq 1810
SW(config-ext-nacl)#permit tcp any any eq 2481
SW(config-ext-nacl)#permit tcp any any eq 1521
SW(config-ext-nacl)#exit
SW(config)#class-map class-voice
SW(config-cmap)#match access-group name voice-acl
SW(config-cmap)#exit
SW(config)#class-map class-database
SW(config-cmap)#match access-group name database
SW(config-cmap)#exit
SW(config)#policy-map test-policing
SW(config-pmap)#class class-voice
SW(config-pmap-c)#trust cos
SW(config-pmap-c)#exit
SW(config-pmap)#class class-database
SW(config-pmap-c)#set dscp af21
SW(config-pmap-c)#exit
SW(config-pmap)#exit
SW(config)#interface gigabitEthernet 1/0/1
SW(config-if)#service-policy input test-policing
SW(config-if)#exit
Unbind the scheduling, shaping and policing policies from a specific interface.
UBNT(config)# interface swp1
UBNT(config-if)# no qos policy scheduling
UBNT(config-if)# no qos policy shape
UBNT(config-if)# no qos policy policing input
UBNT(config-if)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# no wrr-queue bandwidth
SW(config-if)# no service-policy output shape_pol
SW(config-if)# no service-policy input test-policing
SW(config-if)# exit
ACL Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Show the MAC access list configuration.
UBNT# show access-lists mac-acl
SW# show mac access-lists mac-acl
Show the IP access list configuration.
UBNT# show access-lists ip-acl
SW# show ip access-lists ip-acl
*MAC ACL Configuration
UBNT(config)# mac access-list mac-acl
UBNT(config-mac-acl)# 10 permit any 0000.aaaa.0001 ffff.ffff.ffff any
UBNT(config-mac-acl)# 20 permit any 0000.aaaa.0002 ffff.ffff.ffff any
UBNT(config-mac-acl)# no sequence 20
UBNT(config-mac-acl)# exit
SW(config)#mac access-list extended mac-acl
SW(config-ext-macl)#permit any host 0000.aaaa.0001
SW(config-ext-macl)#permit any host 0000.aaaa.0002
SW(config-ext-macl)#no permit any host 0000.aaaa.0002
SW(config-ext-macl)#exit
IP ACL Configuration
SW(config)# ip access-list ip-acl
SW(config-ip-acl)# 10 permit ip 192.168.10.0/24 any
SW(config-ip-acl)# 20 deny tcp any any eq 8080
SW(config-ip-acl)# exit
SW(config)#ip access-list extended ip-acl
SW(config-ext-ipacl)#permit ip 192.168.10.0 0.0.0.255 any
SW(config-ext-ipacl)#deny tcp any any eq 8080
SW(config-ext-ipacl)#exit
Apply MAC ACL and IP ACL to the specific interface.
UBNT(config-mac-acl)# interface swp1
UBNT(config-if)# mac access-group mac-acl in
UBNT(config-if)# ip access-group ip-acl in
UBNT(config-mac-acl)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# mac access-group mac-acl in
SW(config-if)# ip access-group ip-acl in
SW(config-if)# exit
Remove MAC ACL and IP ACL from the specific interface.
UBNT(config-mac-acl)# interface swp1
UBNT(config-if)# no mac access-group in
UBNT(config-if)# no ip access-group in
UBNT(config-mac-acl)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# no mac access-group mac-acl in
SW(config-if)# no ip access-group ip-acl in
SW(config-if)# exit
STP; RSTP Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display Spanning Tree information.
UBNT# show spanning-tree stp
SW# show spanning-tree
Display a brief summary about STP.
UBNT# show spanning-tree interface brief
SW# show spanning-tree brief
Display the STP interface status and configuration of specified interface.
UBNT# show spanning-tree interface swp1
SW# show spanning-tree interface gigabitEthernet 1/0/1
Display Rapid Spanning Tree information.
UBNT# show spanning-tree rstp
SW# show spanning-tree
Configure Spanning Tree Properties.
UBNT(config)# spanning-tree
UBNT(config)# spanning-tree mode stp
UBNT(config)# spanning-tree priority 32768
UBNT(config)# spanning-tree forward-time 15
UBNT(config)# spanning-tree max-age 20
UBNT(config)# spanning-tree hello-time 2
UBNT(config)# spanning-tree transmit hold-count 4
UBNT(config)# spanning-tree pathcost-method long
UBNT(config)# exit
SW(config)# spanning-tree
SW(config)# spanning-tree mode stp
SW(config)# spanning-tree priority 32768
SW(config)# spanning-tree forward-time 15
SW(config)# spanning-tree max-age 20
SW(config)# spanning-tree hello-time 2
SW(config)# spanning-tree transmit hold-count 4
SW(config)# spanning-tree pathcost-method long
SW(config)# exit
Specify that the Rapid STP is enabled.
UBNT(config)# spanning-tree mode rstp
SW(config)# spanning-tree mode rstp
Disable Spanning Tree globally.
UBNT(config)# no spanning-tree
SW(config)#no spanning-tree
*Enable or disable BPDU Guard for an interface.
UBNT(config)# interface swp1.1
UBNT(config-if)# spanning-tree bpdu-guard
UBNT(config-if)# no spanning-tree bpdu-guard
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# spanning-tree bpduguard enable
SW(config-if)# spanning-tree bpduguard disable
*Enable or disable Loop Guard for an interface.
UBNT(config)# interface swp1.1
UBNT(config-if)# spanning-tree loopback-detection
UBNT(config-if)# no spanning-tree loopback-detection
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# spanning-tree loopguard default
SW(config-if)# no spanning-tree loopguard default
*Enable or disable Root Guard for an interface.
UBNT(config)# interface swp1.1
UBNT(config-if)# spanning-tree root-guard
UBNT(config-if)# no spanning-tree root-guard
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# spanning-tree guard root
SW(config-if)# no spanning-tree guard root
MSTP Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display Multiple Spanning Tree configuration information.
UBNT# show spanning-tree mst configuration
SW# show spanning-tree mst configuration
Display Multiple Spanning Tree specific instance information.
UBNT# show spanning-tree mst 1 status
SW# show spanning-tree mst 1
Displays a brief summary about specific MSTP instance.
UBNT# show spanning-tree mst 1 interface brief
Configure Multiple Spanning Tree Properties.
UBNT(config)# spanning-tree mode mst
UBNT(config)# spanning-tree mst max-hops 22
UBNT(config)# spanning-tree mst name test_inst
UBNT(config)# spanning-tree mst revision 32768
SW(config)# spanning-tree mode mst
SW(config)# spanning-tree mst max-hops 22
SW(config)# spanning-tree mst configuration
SW(config-mst)# name test_inst
SW(config-mst)# revision 32768
SW(config-mst)# exit
Configure instance priority, and add VLAN 100 to MST instance 2.
UBNT(config)# spanning-tree mst 2 priority 61440
UBNT(config)# spanning-tree instance 2 domain 100
SW(config)# spanning-tree mst 2 priority 61440
SW(config)# spanning-tree mst configuration
SW(config-mst)# instance 2 vlan 100
SW(config-mst)# exit
*STP/MSTP interface related commands for special interface(swp1) in specific vlan(100).
UBNT(config-if)# interface swp1.100
UBNT(config-if)# spanning-tree link-type point-to-point
UBNT(config-if)# spanning-tree cost 10000
UBNT(config-if)# spanning-tree port-priority 32
UBNT(config-if)# spanning-tree edge-port
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# spanning-tree link-type point-to-point
SW(config-if)# spanning-tree mst <instance-id> port-priority 32
SW(config-if)# spanning-tree mst <instance-id> cost 10000
SW(config-if)# spanning-tree portfast
Port Error Disable / Auto Recovery Commands
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display the time period after which the interfaces are enabled for 'errdisable' conditions.
UBNT# show errdisable recovery
SW# show errdisable recovery
Display the reason for the 'errdisable' status.
UBNT# show errdisable detect
SW# show errdisable detect
Configure 'errdisable' recovery interval.
UBNT(config)# errdisable recovery interval 400
SW(config)# errdisable recovery interval 400
*Enable or disable the BPDU guard 'errdisable' recovery condition.
UBNT(config)# errdisable recovery cause bpduguard
UBNT(config)# no errdisable recovery cause bpduguard
SW(config)# errdisable recovery cause bpduguard
SW(config)# no errdisable recovery cause bpduguard
DHCP Guard / DHCP Snooping (Cisco)
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display DHCP guard settings.
UBNT# show ip dhcp guard
SW# show ip dhcp snooping binding
Enable or disable DHCP Guard.
UBNT(config)# ip dhcp guard
UBNT(config)# no ip dhcp guard
SW(config)# ip dhcp snooping
SW(config)# no ip dhcp snooping
Add or remove trusted DHCP server to special VLAN (Cisco uses the trust interface approach).
UBNT(config)# ip dhcp guard vlan 23 server 172.16.1.1
UBNT(config)# no ip dhcp guard vlan 23 server 172.16.1.1
SW(config)# ip dhcp snooping vlan 23
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# ip dhcp snooping trust
SW(config-if)# no ip dhcp snooping trust
ARP
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Display ARP table.
UBNT# show arp
SW# show ip arp
Configure ARP aging time globally and per specific interface.
UBNT(config)# arp aging-time 300
UBNT(config)# int swp1
UBNT(config-if)# arp aging-time 3600
UBNT(config-if)# exit
SW(config)# arp timeout 300
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# arp timeout 3600
SW(config-if)# exit
Add or remove static ARP entry.
UBNT(config)# ip arp 10.1.1.1 44:d9:e7:9e:b6:db port swp1
UBNT(config)# no ip arp 10.1.1.1 44:d9:e7:9e:b6:db
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# ip arp 10.1.1.1 44:d9:e7:9e:b6:db
SW(config-if)# no ip arp 10.1.1.1 44:d9:e7:9e:b6:db
Clear the ARP table.
UBNT# clear arp all
SW# clear ip arp
DHCP Client/Static IP
Back to Top
Command Description
USW-Leaf Command
Cisco Command
Overview all IPv4 interfaces on the switch.
UBNT# show ip interface brief
SW# show ip interface brief
Enable/Disable DHCP Client on bridge-domain interface.
UBNT(config)# interface bridge 1
UBNT(config-if)# ip address dhcp
UBNT(config-if)# no ip address dhcp
UBNT(config-if)# exit
SW(config)# interface vlan1
SW(config-if)# ip address dhcp
SW(config-if)# no ip address dhcp
SW(config-if)# exit
Configure/Remove static IP address on interface.
UBNT(config)# interface swp1
UBNT(config-if)# ip address 172.16.0.1/24
UBNT(config-if)# no ip address 172.16.0.1/24
UBNT(config-if)# exit
SW(config)# interface gigabitEthernet 1/0/1
SW(config-if)# ip address 172.16.0.1 255.255.255.0
SW(config-if)# no ip address 172.16.0.1
SW(config-if)# exit
IP Route(Static)
Command Description
USW-Leaf Command
Cisco Command
Display IPv4 routing table.
UBNT# sh ip route
SW# show ip route
Configure/Remove default static route.
UBNT(config)# ip route 0.0.0.0/0 192.168.1.1
UBNT(config)# no ip route 0.0.0.0/0 192.168.1.1
SW(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
SW(config)# no ip route 0.0.0.0 0.0.0.0 192.168.1.1
Configure/Remove static route to specific network.
UBNT(config)# ip route 172.16.1.0/24 192.168.1.1
UBNT(config)# no ip route 172.16.1.0/24 192.168.1.1
SW(config)# ip route 172.16.1.0 255.255.255.0 192.168.1.1
SW(config)# no ip route 172.16.1.0 255.255.255.0 192.168.1.1
Configure static route with administrative distance.
UBNT(config)# ip route 172.16.1.0/24 192.168.1.1 15
SW(config)# ip route 172.16.1.0 255.255.255.0 192.168.1.1 15
Configure/Remove null0(blackhole) route.
UBNT(config)# ip route 172.16.1.0/24 null0
UBNT(config)# no ip route 172.16.1.0/24 null0
SW(config)# ip route 172.16.1.0 255.255.255.0 null0
SW(config)# no ip route 172.16.1.0 255.255.255.0 null0
Configure/Remove ICMP reject route.
UBNT(config)# ip route 172.16.1.0/24 reject
UBNT(config)# no ip route 172.16.1.0/24 reject
NA
View ArticleOverview
This article lists the ports used by theUniFi Network Controller. To learn how to change ports please see this article: UniFi - Change Default Ports for Controller and UAPs.By default, the UniFi Controller will operate on the ports listed in the following sections. This is applicable to a UniFi Network Controller installed on the UniFi Cloud Key as well as other hosts.
Table of Contents
Local Ingress Ports
Ingress Ports Required for L3 Management Over the Internet
Egress Ports Required for UniFi Remote Access
Related Articles
Local Ingress Ports
Back to Top
TCP or UDP
Port Number
Usage
UDP
3478
Port used for STUN.
TCP
8080
Port used for device and controller communication.
TCP
8443
Port used for controller GUI/API as seen in a web browser
TCP
8880
Port used for HTTP portal redirection.
TCP
8843
Port used for HTTPS portal redirection.
TCP
6789
Port used for UniFi mobile speed test.
TCP
27117
Port used for local-bound database communication.
UDP
5656-5699
Ports used by AP-EDU broadcasting.
UDP
10001
Port used for device discovery
UDP
1900
Port used for "Make controller discoverable on L2 network" in controller settings.
UniFi - Changing Default Ports for Controller and UAPs
NOTE:Although TCP 22 is not one of the ports the UniFi Network Controller operates on by default, it is worth mentioning in this article since it isthe port used when UniFi devices or the controller is accessed via SSH.
Ingress Ports Required for L3 Management Over the Internet
Back to Top
TCP or UDP
Port Number
Usage
UDP
3478
Port used for STUN.
TCP
8080
Port used for device and controller communication.
TCP
8443
Port used for controller GUI/API as seen in a web browser
TCP
8880
Port used for HTTP portal redirection.
TCP
8843
Port used for HTTPS portal redirection.
TCP
6789
Port used for UniFi mobile speed test.
NOTE:These ports need to be open at the gateway/firewall as well as on the controller host. This would be achieved by creating port forwards on the gateway/firewall where the controller host is located.
Egress Ports Required for UniFi Remote Access
Back to Top
TCP or UDP
Port Number
Usage
UDP
3478
Port used for STUN.
TCP/UDP
443
Port used for Remote Access service.
TCP
8883
Port used for Remote Access service.
NOTE:In most cases, these ports will be open and unrestricted by default.
Related Articles
Back to Top
View ArticleOverview
Readers will learn how to create a Bridged interface on an EdgeRouter.
EdgeRouter - Hardware Offloading
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Device used in this article:
EdgeRouter-4 (ER-4)
Creating a Bridged Interface
Back to Top
Bridged interface are used to place multiple physical ports on the same LAN, similar to how a switch functions.
Generally, it is not recommended to bridge ports as it will greatly reduce the performance. If multiple ports need to be placed on the same LAN, it is advisable to use a router with a built-in switch-chip such as the ER-X, ER-X-SFP, ER-10X, EP-R6, ER-12 or ER-12P.
ATTENTION: Packets passed through a bridged interface are not eligible for offloading on some EdgeRouter models. See the Hardware Offloading article for more information.
1. Enter configuration mode.
configure
2. Delete the existing configuration from the interfaces that are to be added to the bridge group.
delete interfaces ethernet eth1
delete interfaces ethernet eth2
delete interfaces ethernet eth3
set interfaces ethernet eth1
set interfaces ethernet eth2
set interfaces ethernet eth3
3. Commit the changes.
commit
4. Create a bridge interface (br0) and assign it an IP address.
set interfaces bridge br0 address 192.168.1.1/24
5. Add the physical interfaces to the bridge group.
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces ethernet eth2 bridge-group bridge br0
set interfaces ethernet eth3 bridge-group bridge br0
6. Commit the changes and save the configuration.
commit ; save
Related Articles
Back to Top
Intro to Networking - How to Establish a Connection Using SSH
View ArticleOverview
This article describes how to adopt a UniFi Security Gateway (USG) into an existing network, and replacing analready functioning router. For first time setup where an existing router is not being replaced, please use the USG's Quick Start Guide (QSG), followed by the UniFi User Guide, both available for download in the Documentation section of our Downloads page. If additional information is required, please see the UniFi - Device Adoption article.
UniFi - Advanced Adoption of a "Managed By Other" Device
NOTES & REQUIREMENTS:This article applies to the all USG models: UniFi Security Gateway, UniFi Security Gateway Pro or UniFi Security Gateway XG.
Table of Contents
Introduction
Plan the Deployment
Upgrading Firmware Before Adoption
Configure the LAN Network
Change the USG LAN IP Before Adoption
Adopt the USG and Configure the WAN
Related Articles
Introduction
Back to Top
With gateway devices having a static LAN IP, the process of adopting a USG can differ from that of a UniFi Access Point (UAP) and a UniFi Switch (USW) in that it may require some initial IP configuration prior to adoption. This article will guide users through the process.
Plan the Deployment
Back to Top
When deploying into an existing network, the USG will replace thecurrent router or firewall device. The USG's WAN will plug into theInternet connection and its LAN into the switch for theinternal network.
IMPORTANT:When replacing a current router, the USG will substitute it and take over its IPs,so to prevent issues during the process,remove the old router before attempting to adopt.
If anInternet Service Provider's (ISP) modem is currently acting as therouter, there are additional considerations in the modem’s configuration. It is usually best to put themodem into bridge or passthrough mode, so the USG’s WAN obtains thepublic IP, and themodem’s involvement is limited to bridging. See themodem’s and ISP’s documentation for instructions and options, as these can vary widely. Thecurrent router’s LAN subnet and IP will need to change, as it will no longer be connected directly into theLAN network.
Upgrading Firmware Before Adoption
Back to Top
To upgrade the firmware before adoption an SSH client is required. The USG will need internet access to complete the upgrade process.
1. Open your SSH client and open up a session to 192.168.1.1.
2. Log in with the default username and password of "ubnt".
3. Use the following command:
upgrade LINK_TO_FIRMWARE_HERE
Find the different USG models' Downloads page here: USG, USG Pro, USG-XG-8.
To find the firmware link, navigate to the downloads page. From here, select download button shown below.
Accept the terms if you wish to proceed. Then selectCopy URL. This URL will be used in step 3 above.
After entering the upgrade command the USG will reboot with the newest firmware image. If the USG has not been adopted it will still be in a default state.
Configure the LAN Network
Back to Top
To configure the IP and other LAN parameters that will be deployed to the USG once adopted, launchthe UniFi Controller. Once there:
Go to Settings >Networks
Find the network you wish to edit, and click on Edit, underActionson the far rightof the LAN table.
Set the IP and DHCP parameters as desired, and click Save.
Now the configuration is ready to deploy to the USG. It may be adopted now.
Change the USG LAN IP Before Adoption
Back to Top
If the controller is on a subnet other than the USG’s default 192.168.1.0/24, it is necessary to change the USG’s LAN IP so the controller and USG can communicate. To do so, follow these steps (for USG version 4.3.60 and newer):
Go to https://192.168.1.1 on your browser.
It will prompt you to enter your username and password. Use ubnt/ubnt if device is in default state.
Go to the Configuration section and edit the LAN IP and DHCP server parameters as necessary.
If the USG is using an older version prior to 4.3.60 or if for some reason performing this configuration via CLI is preferred, click here to see the CLI steps. It is recommended to always upgrade to the newest firmware available to avoid security issues.
1. Connect a computer to the LAN NIC (LAN port) of the USG. It will obtain a 192.168.1.x IP from DHCP.
2. SSH into 192.168.1.1 using username and password combination ofubnt / ubnt.See this article for more on default username and password and this article if you need guidance with SSH.
3. For this example, thecontroller is on 10.0.0.50/24, so let's change the USG’s LAN IP to 10.0.0.1.Choose an available IP within the subnet of thelocal controller.
4. In the SSH session, run the following:
For USG:
configure
set interfaces ethernet eth1 address 10.0.0.1/24
delete interfaces ethernet eth1 address 192.168.1.1/24
commit
For USG Pro:
configure
set interfaces ethernet eth0 address 10.0.0.1/24
delete interfaces ethernet eth0 address 192.168.1.1/24
commit
Now the USG’s LAN IP is 10.0.0.1/24. TheSSH session will drop.
NOTE:On the USG Pro, if the controller is in the 192.168.2.0/24 subnet, it is necessary to delete the eth2 address 192.168.2.1/24 before committing the changes.
5. Plug the USG’s LAN into the network with the controller at 10.0.0.50
6. Go to the UniFi Controller and adopt it. Note: Before adopting, make sure you changed the LAN network in the Controller Settings as described above, so it doesn’t revert back to the default controller configuration of 192.168.1.1/24.
Adopt the USG and Configure the WAN
Back to Top
To adopt the USG, navigate to the Devices section using the side menu on the left.
Find the USG and click the Adopt button. The controller will provision the configuration as currently defined in thecontroller and reboot. While it’s doing that, configure your WAN interface specifics.
User Tip:If you experience an issue where the status of the device loops from trying to adopt > disconnected > trying to adopt, it may be an issue with the firewall of the machine hosting the UniFi Network Controller. Port 8080 must be open for inbound traffic. Either open up that port or turn off the firewall if that’s a possibility. See what ports are needed for UniFi here: UniFi - Ports Used.
Navigate to Settings > Network > WAN and edit the network.In the Connection Type drop-down, pick the appropriate type for your Internet connection. Refer to information provided by your ISP to obtain this information. If using a static IP WAN, make sure to also define two DNS servers here. This is optional for DHCP and PPPoE WANs, as your ISP will likely assign a DNS server, but can be manually specified in that case if desired.
After the WAN configuration provisions to the USG, plug the USG's WAN port into the ISP modem/router. For cable and DSL service, it is often required to power cycle the modem after connecting a new gateway device. In those cases, power cycle the modem after plugging in the USG’s WAN.
After the modem boots back up, you should have Internet connectivity from your LAN via the USG. Verify the WAN information in the controller (following step 2 once again).
Related Articles
Back to Top
UniFi - Device Adoption
UniFi - Accounts and Passwords for Controller, Cloud Key and Other Devices
Intro to Networking - How to Establish a Connection Using SSH
View ArticleOverview
This article will answer the question of how to access the UniFi Network Controller on the UDM platform by IP or hostname.
UniFi - USG Port Forward: Port Forwarding Configuration and Troubleshooting
NOTES & REQUIREMENTS:
This article applies only to the UniFi Dream Machine Pro (UDM-Pro).
Table of Contents
Introduction
Network Diagram
Steps: How to Access the Controller via IP
Testing & Verification
Related Articles
Introduction
Back to Top
Users may wish to access the UniFi-OS local portal by IP in certain situations. Since the local portal is on the UDM Pro, and not on a host that is on the LAN, a firewall pin-hole is suggested instead of port forwarding as would be done on other hosts (see Related Articles below).
NOTE:Applying a port forward rule to a UDM Pro LAN IP will provision a destination network address translation (DNAT) rule and is not recommended.
Network Diagram
Back to Top
Steps: How to Access the Controller via IP
Back to Top
1. Open the UniFi Network Controller.
2. Navigate to Settings > Routing & Firewall > Firewall > WAN_LOCAL.
3. Select "Create New Rule".
4. Fill in the fields with the following information:
Action : Accept
IPv4 Protocol : TCP
Rule Applied : Before pre-defined rules
Destination : Create a new port group withport 443 in the group
OPTIONAL PARAMETERS:
If desired, also apply a "source restriction" to this rule to make the access only available to certain IP addresses.
When restricting direct access to UniFi-OS on a dual-WAN configuration also indicate the proper destination IP in this firewall rule.
5. Click"Save".
Testing & Verification
Back to Top
To verify that the firewall pin-hole has been properly configured, try to access the UDM Pro by its WAN IP or hostname associated with the IP. If the test does not provide the desired results, check any source IP restrictions configured. If the rule appears to be applied properly, advanced troubleshooting with tcpdump may provide the clearest indication of the issue.
CLI: Access the command line interface (CLI). You can do this by using a program such as PuTTY.
WAN 1
tcpdump -npi eth8 dst port 443 and host <WAN1_IP_ADDRESS_HERE>
WAN 2
tcpdump -npi eth9 dst port 443and host <WAN2_IP_ADDRESS_HERE>
For further support please reach out to the UniFi Support Team.
Related Articles
Back to Top
View ArticleOverview
This article provides details about UNMS's generic key and how it works, as well as describing the fundamentals of the device registration process.
UNMS - Device Discovery
NOTES & REQUIREMENTS
This article applies to the following firmware versions:
EdgeRouter: 1.9.7+ /EdgeSwitch: 1.7.3+ /UFiber OLT: 1.0.0+ /airMAX (AC): 8.4.1+ /airMAX (M): 6.1.3+ /airCube: 1.0.0+
Also please note that UNMS doesn't support older airMAX devices with firmware versions 4.x, 5.x or 7.x.
WARNING:For security reasons, never share your UNMS key publicly. If you need to share it for whatever reason, always obscure the hostname and AES string parts of the key.
Table of Contents
Introduction
How to Register a Device via UNMS Discovery
How to Manually Register a Device via Device UI
How to Register a Device via SSH
UNMS Generic Key Details
Behind the Scenes: How Does the UNMS Key Work?
Related Articles
Introduction
Back to Top
The purpose of the UNMS key is to provide a secure communication using AES encryption while telling a device where to look for a UNMS server. The process of device registration using the generic UNMS key and the device specific UNMS key ensures secure communication between the user's devices and UNMS.
How to Register a Device via UNMS Discovery
Back to Top
1. Go to the UNMS Discovery Manager.
2. Fill in the subnet or IP addresses of the devices.
3. Click the START button.
4. Fill in the credentials.
5. Click theCONNECT button.
How to Manually Register a Device via Device UI
Back to Top
This is only necessary if UNMS is not on the same network as the devices being registered and they cannot be found with UNMS Discovery.
1. Open UNMS and go to the Devices section.
2. In the upper, right had side, click the ADD DEVICE button.
3. Click the "Copy UNMS key to clipboard" to copy the key which will be pasted in step 6. The key is the same for all devices.
4. Open the device's administration page.
5. Go to the System or Services section.
6. Paste the UNMS key.
7. Enable the UNMS connection.
8. Save the device configuration.
9. Authorize the device in the UNMS devices list.
How to Register a Device via SSH
Back to Top
ATTENTION: The NTP protocol must be enabled to add the device into UNMS this way
EdgeMAX
admin@ER-X:~$ configure
admin@ER-X# delete service unms disable
admin@ER-X# set service unms connection generic UNMS key
admin@ER-X# commit
admin@ER-X# save
Saving configuration to '/config/config.boot'... Done
airMAX
Danger: Be extremely careful when changing airMAX devices'configurations. There is no validation before this manual change applies and a mistake in configuration may lead to losing connectivity to the device.
1. Edit device configuration in file /tmp/system.cfg
unms.uri=wss://XX.YY.ZZ.XX:XX+XYZYXZYXYZYXZYXYZXZYXZ+allowSelfSignedCertificate
unms.uri.changed=wss://XX.YY.ZZ.XX:XX+XYZYXZYXYZYXZYXYZXZYXZ+allowSelfSignedCertificate
unms.status=enabled
2. To apply the configuration use command /usr/etc/rc.d/rc.softrestart save
UNMS Generic Key Details
Back to Top
In the following two sections we will discuss what happened in the background as the devices were registered using one of the two processes described above. Here is an example of the UNMS key:
wss:// your.domain.com :443 + n9yU137QSwTzBXnF...9Sk0pC7sDKGnpbxiHRI9W +
The UNMS key consists of several parts (shown in different colors above), each with their own purpose. In the table below the UNMS key appears split in its different parts, and each section's purpose described.
Key Part
Purpose
wss://
WebSocket Secure connection protocol
your.domain.com
Hostname or IP of the server where UNMS runs
:443
Port for devices to access UNMS server
n9yU137QSwTzBXnF...9Sk0pC7sDKGnpbxiHRI9W
Advanced Encryption Standard key (AES key)
Behind the Scenes: How Does the UNMS Key Work?
Back to Top
When a new instance of UNMS is installed, it creates its own UNMS key which is called The Generic UNMS Key. This key represents a pointer for any device being added to the system for the first time. When the generic UNMS key is entered into a device's settings, that device will try to connect to UNMS using the hostname / IP and the port part of that key (see the third row of the table above).
If the connection is successful, the AES key part of UNMS key is used for secure communication between the device and UNMS. When the connection is established for the first time then a new AES key is generated for the device. This new AES key replaces the original AES key in the generic UNMS key, creating The Device Specific UNMS Key. Then the device specific UNMS key rewrites the generic UNMS key on the device and UNMS stores the device’s MAC address and AES key in PostgreSQL database.
From that point forward, each time the device wants to communicate with UNMS, the AES key part of the device specific UNMS key is used and UNMS uses the AES key from the PostgreSQL database for decryption/encryption.
Related Articles
Back to Top
View ArticleOverview
This article answers some of the most common questions about airFiber LTU.Click on the question that interests you to expand and collapse the answers.This articlewill be updated as more common questions are brought to our attention. If you feel that a question is missing, please click thefeedback button at the bottom of the pageand let us know!
Frequently Asked Questions
Are LTU products compatible with other airMAX or airFiber products?
LTU is a completely new platform based on proprietary technology, which doesn't use 802.11 protocol, making it incompatible with 802.11n and 802.11ac devices. For that reason it is NOT compatible with airMAX M5 nor with airMAX 5AC.
On the other hand, although LTU is based on airFiber technology, it uses a different protocol for communication, making it incompatible with other 5GHz airFiber products such as AF-5X or AF-5/5U.
Does LTU support licensed frequencies in the United States?
Currently, the LTU products are capable of operating on both 4.9GHz and 6GHz bands but are not approved for these licensed bands under FCC regulations.
What products are part of the LTU family?
LTU family is composed today of several products:
LTU-Rocket
LTU-Pro
LTU-Lite
LTU-LR
AF-5XHD
However, new products are coming this year.
What is the input voltage range of the airFiber LTU products?
Both AF-5XHD and the AF-LTU support any voltage from +18Vdc to +56Vdc. Just make sure the PoE source can deliver at least 24 Watts to compensate any voltage drop because of cable length.
Does AF-5XHD support NxN mode?
The current firmware version doesn't support NxN mode (multiplexing). However, we are working on new firmware versions that will support NxN mode. Target for release is 2020.
What is the difference between the AF-5XHD and the AF-LTU?
There are four main differences:
Dual RJ45 port only available in the AF-5XHD. Both ports can be used for PoE IN and the Config port can be configured to also work as DATA port, but both RJ45 ports don't support bonding.
Connectorization: AF-5XHD comes with 3 RP-SMA ports, the one in the middle for GPS, and the other two for chain 0 and chain 1, for antennas like the RocketDish or AF-5G23/30/34-S45 antennas. On the other hand, the AF-LTU comes with a waveguide connector for waveguide antennas, like the PrismAP antennas. Also, the AF-LTU comes with a built-in GPS antenna.
Only the AF-5XHD offers IP67 protection (optional adapter could be required)
here
NOTE:AF-5XHD chains can work in V&H or Dual Slant polarization depending on the antenna you are using.
What are the differences between the AF-5X and the AF-5XHD
AF-5XHD includes all AF-5X features but NxN mode and TDD Frequency Split (both under development for the HD version), plus:
1024QAM modulation on the entire 5GHz band (will soon support 4096QAM modulation)
Extended frequency range from 4800MHz to 6200MHz for licensed applications (only for International units)
Built-in Accelerometer for better alignment andtampering detection
Bluetooth for easier configuration from Smartphones
Up to 1+Gbps performance and 2,000,000pps processing power
More channel width options adding 60, 80 and 100MHz channels
Improved interference mitigation
Active Live airView (doesn't drop the wireless link for scan)
More powerful Web UI
Dual PoE IN
Re-configurable Config port to operate as DATA port
Among many others
What antennas are compatible with each LTU product?
LTU-Rocket supports connectorizedRP-SMA MIMO antennas including but not limited to: AF-5G23-S45, AF-5G30-S45, AF-5G34-S45,RD-5G30, RD-5G30-LW, RD-5G34, AM-5AC21-60, AM-5AC22-45, AM-5G16-120*, AM-5G17-90*, AM-5G17-90A*, AM-5G19-120*, AM-5G20-90*, AM-M-V5G-TI, AM-V5G-Ti.
AF-LTU supports Ubiquiti waveguide antennas, including but not limited to:PrismAP-5-30, PrismAP-5-45, PrismAP-5-60, PrismAP-5-90 and LTU-Extend (27dBi dish) antennas.
* Supported antenna but not recommended.
What LTU models support Station mode?
LTU-Lite, LTU-LR, LTU-Pro, AF-LTU and AF-5XHD.
What is the maximum number of CPE per AP in LTU PtMP mode?
The maximum number of active CPEs per AP in PtMP mode is 250 subscribers. However, if you want to offer high-speed services (over 50Mbps per customer) we highly recommend to limit the number of CPEs per AP to 100, or even lower if you offer a low oversell ratio.
What kind of services are supported in LTU networks?
Any IP-based service should work fine on LTU networks, including but not limited to:
High-Speed Internet
IPTV
VoIP
IP Video surveillance
Machine to Machine communication based on TCP/IP
What is the maximum link distance in Point to Point (PtP) and Point to MultiPoint (PtMP) Modes?
There's no strict limit on the platform. However, there are two factors that will determine the maximum link distance (always assuming clear Line of Sight):
The antenna gain of each side (the higher the antenna gain the longer the link)
Tx Power (the higher the Tx Power in most cases will allow longer distance links). This value is determined by your country and could vary depending on the frequency you are using.
Tips:
In order to simulate the expected link capacity for your link, please simulate it using our free link planning tool, https://airlink.ui.com
Always select the right country code for your installation, using a different country code could violate local telecommunication laws and involve high fines.
What is the expected latency?
It depends on the Frame Length selected, but using the shortest Frame Length average latency will be 2-3ms under normal circumstances.
How do I synchronize my network?
GPS Sync only needs to be enabled in the Access Point, there's no need to enable it on the CPEs.Simply enable the GPS Sync option in the Wireless section and make sure Duty Cycle and Frame Length is the same in all the APs you wish to synchronize, like so:
Most of the data on my network is "download heavy", why can't I have higher ratios like 85/15 or 95/5 for example?
TCP-based download traffic requires TCP ACKs to be sent using the UL. In a PtMP network, there will be multiple TCP downloads going on, each requiring TCK ACKs being sent using the UL. Having enough time on the UL to allow multiple CPEs to send TCP acknowledgments, reduces the latency experienced by TCP, thereby increases the actual DL throughput.
As an example:
There are 50 clients connected to an AP. If 10 of these clients are simultaneously downloading and the UL allocation is extremely small like in 95/5, the UL time may only be enough to carry the TCP ACKs of one of the stations. The others will need to wait for their turn, which will arrive according to the TDD framing cycle. But during this time the TCP may stall its window and not send any further traffic until the ACKs are received. This causes underutilization of DL.
Hence extremely low UL allocations may end up reducing the effective throughput of the DL on larger PtMP networks.
Is GPS Sync built in or is there a cost associated with it?
GPS Sync is built in, there is no cost to use this technology.
Can I manage and monitor my LTU products with UNMS?
Yes, UNMS (version 0.12.0) offers basic monitoring for LTU products. Newer UNMS versions will support configuration of most important LTU settings.
What is the maximum MTU size allowed by LTU products?
LTU products support Jumbo Frames up to 9000 bytes in the DATA interface.
NOTE:ifconfig info will only display 1500 bytes because that command only shows MTU size for the interface connected to the CPU. Since DATA traffic pass through an ASIC, which is not displayed in theifconfig command, it will not show real MTU size. Just make sure you set MTU value above 1600 and Jumbo Frames support will be enabled.
Does LTU support SNMP?
Yes, MIBs can be downloaded for airFiber5XHD firmware v1.1.2.
Can you connect the AF5X to the AF5XHD?
No, the AF5XHD is a brand new architecture that is not compatible with the AF5X.
View ArticleOverview
This article describes what an ideal network structure should look like from a UNMS standpoint.
UCRM - WISP Management Platform Help Articles
NOTES & REQUIREMENTS:This article applies to UNMS 1.0.0 with integrated CRM module.
Table of Contents
Introduction
UNMS Terminology
Example Deployment Scenarios
Related Articles
Introduction
Back to Top
The goal of this article is to exemplify what type of network structure UNMS has been designed for; and what an ideal topology looks like from a UNMS point of view. Please note that UNMS is primarily designed for Internet Service Providers (ISP) who want to take full advantage of the benefits Ubiquiti devices provide. UNMS strives to offer advanced, fully automated functions that need a specific network topology in order to run as they were intended to. It is certainly possible to run UNMS in different types of networks and deployments, but some features may be unavailable or perform suboptimally.
UNMS Terminology
Back to Top
The UNMS side of the integrated UNMS-UCRM application (referred to as the "Network" in the rest of this guide) is exclusively dedicated to the physical structure and real topology of a network. The focus is either on backbone devices and their placement on towers or buildings, or CPE devices and their location. The CRM part of the application takes care of the business side: management of real people, services, and customers along with their personal data.
Network
Device: a physical device like a router, switch or wireless antenna. It can be a Ubiquiti device or a manually specified 3rd party device.
Site: a location where a device is placed. It can be a tower, roof, building or even a roompretty much any geographical spot with an address. Sites are key components of a network and they create its backbone.
Client Site: a specific type of location (site) with an address, where there are devices providing internet to a single CRM client. Client Sites can be paired with services defined in CRM, allowing business-oriented operations, such as blocking a customer when payment is due or setting a traffic Shaping on specific devices associated with a particular customer.
NOTE:The term Client Site will be first introduced in version 0.14.0. Currently, the structure is defined by Sites (which will remain the same) and Clients (which will be turned into Client Sites for better clarity).
AP: an Access Point is a connection point with the potential to offer an internet connection to several devices.
Stations / Clients:Stations or CPEs are the devices connected to an AP of the airMAX family. Those CPE devices create the endpoints of the network. On the other hand, a home WiFi router like an airCube will have a list of connected devices, called clients. Those are devices that usually belong to a customer (like a mobile phone or laptop) and are not managed via UNMS. So a possible connection between these could be:airMAX AP > Station (CPE) > home WiFi (airCube) > client (laptop).
NOTE:Please be aware that there is a difference between a UNMS client, which is a client device and the CRM client which represents a customer paying for a Service (more info in the CRM section below).
GW: A gateway in a network. There can be several gateways in the network. These are necessary for advanced features such as client suspension, setting up a traffic Shaping client or measuring the throughput with NetFlow protocol. UNMS facilitates a way to automatically configure NetFlow usingan EdgeRouter with firmware 2.0.1. or higher.
CRM
Client: a person or a company, who is receiving a service such as the Internet or VoIP, for example. A client can have several services in different locations with different parameters.
NOTE: Notice the difference between a UNMS client, which is a client device such as a laptop; and the CRM client which basically means "customer"be it an individual or a company.
Service: One specific internet connection which represents an item on an invoice and is providing a connection to one or more devices in a specific location. In the future (UNMS 1.0.0. with integrated UCRM 3.0.0), CRM will allow pairing this Service to a Client Site in the UNMS structure and subsequently offer some business actions, such as blocking a CRM Client. An action such as blocking would translate into configuration changes of specific devices, that can be easily done thanks to UNMS and this integration.
Example Deployment Scenarios
Single location (Eg. Flat)
A simple deployment, where the customer receives internet service at home. In CRM there will be one client, a real person, with a single service. That service is paired with a specific Client Site in UNMS. The Client Site might contain:
One CPE, connected to an AP which is also assigned to another Site.
Behind that CPE there could be an airCube, for example, which also belongs to the Client Site.
Or instead of the airCube, there might be a 3rd party WiFi router that belongs to the customer. A network element such as that WiFi router can be added to UNMS as a 3rd party device.
Instead of the CPE, the client might have an Optical Network Unit (ONU) like the UFiber Nano G or UFiber loco, connected to an Optical Line Terminal (OLT) such as UFiber OLT or UFiber OLT 4, which is inserted into a Site.
User Tip:
For simple, inexpensive installations it is effective to use the airCube ISP (ACB-ISP).For classic installations where a mesh WiFi network needs to be supported, we would recommend the airCube AC (ACB-AC). For more demanding users it is possible to use AmpliFi, which is not supported by UNMS at this time, but will be added soon.
Larger Area (Eg. Farm)
A farm, a hotel or a school are classic examples of a more complex customer. From the CRM point of view, it is one paying Client, with a single Service for the internet provision. In this example, it is necessary to have all devices which the Client owns, assigned to only one Client Site. The general recommendation for this situation is to use Ubiquiti's Enterprise WiFi solution: UniFi. In the future, it will be possible to integrate a UniFi site as a virtual device into UNMS and to insert such a device into a Client site.
Once that happens, there will be a dashboard of the UniFi site available in UNMS with a direct link to the UniFi Controller. Particular devices will not be manageable directly through UNMS but only via the link to the UniFi Controller. However, the UNMS unified alert system will work seamlessly with this setup.
NOTE: For customers with more complex networks it is possible to use EdgeMAX, airMAX, and other devices: it is just not the primarily supported scenario. For example, using such device configuration may cause the dashboard of that Client Site to be rendered suboptimally.
Multiple locations (Eg. Chain Store)
A chain store is an example of a deployment where a single customer has several locations at a considerable distance with an internet connection. In this case, it is suggested to create separate Services in CRM for each location and pair them with Client Sites in UNMS. Each branch of the chain store can be then treated as a "simple flat" or a more complex "larger area" as described in the previous examples.
Repeater Point
The repeater point is a relatively common scenario which can be confusing at first glance from the UNMS configuration perspective. From the geographical perspective, however, it is a single location, for example, a family house roof with both a PtP connection as well as an AP for local coverage. At the same time, the house itself is connected to the internet. In such cases, it is recommended to model the deployment in such a way that the end of the PtP and AP belong to a Site in this location. The customer's own devices inside the family house belong to a Client Site, which will have the same address as the aforementioned Site.
User Tip:
It is important to mention that UNMS doesn't support a situation where two Client Sites are connected to each other. In order to make the structure clear and readable, the Client Site must always be an endpoint in the network topology. Sometimes it will be necessary to create an artificial duplicate Site, just as described in the repeater point example.
Related Material
Back to Top
View ArticleOverview
This article will discuss how to use and configure the auto backup function of the UniFi Network Controller. The minimum version of the UniFi Network Controller required for this is 5.1.0.
Table of Contents
Auto Backup Overview
How to Change the Location of Backup File
Related Articles
Auto Backup Overview
Back to Top
Intro to Networking - How to Establish a Connection Using SSH
In the UniFi Network Controller, navigate to Settings > Auto Backup. To start using this feature you must first enable it by turning the toggle to the ON position. This will reveal some configuration options. Choose the frequency of backups and time to run the backup by editingOccurrenceand Occurrence Timezone. Define how many backups (Number of Files) you wish to retain andthe amount and what data you wish to save within these backups.
NOTE:Controllers hosted on Cloud Keys will only be able to enable Auto Backup if there is an SD card inserted in the Cloud Key.
How to Change the Location of the Backup File
Back to Top
The default storage location of the backup file is as follows:
On the Gen2 Cloud Keys autobackups are stored on both the eMMC ( HDD for UCK-G2-Plus ) and SD card if inserted.
/data/autobackup/ (SD card)
/usr/lib/unifi/data/backup/autobackup/ (eMMC/HDD)
On the Gen1 Cloud Key autobackups are saved on the SD card.
/data/autobackup/ (SD card)
For software installs: {data.dir}/backup/autobackup
The location of the backup file cannot be modified in the Controller UI: it must be configured via the system.properties file. To change the default location add the following line to the system.properties file (substituting /some/path with the chosen storage place):
autobackup.dir=/some/path
For a more detailed explanation about the system.properties file please see our Related Articles below.
Related Articles
Back to Top
UniFi - system.properties File Explanation
View ArticleOverview
This article provides an overview of how VLAN traffic gets tagged on UniFi. If you are searching for how to configure VLANs on UniFi, please see our UniFi - Using VLANs with UniFi Wireless, Routing & Switching Hardware article.
Table of Contents
Tagging and Untagging Traffic
Guest Portals and VLANs
Related Articles
Tagging and Untagging Traffic
Back to Top
So, how does VLAN traffic get tagged on UniFi? In short, the UniFi access point (AP) tags packets when they go out from WLAN to wire. When tagged traffic comes in from the wire, it will untag it and forward it to WLAN. Take in consideration the following points:
Traffic initiated from the AP is untagged and sent through br0 (or bond0 if link aggregation is enabled). This includes management traffic and RADIUS traffic, as described below:
AP <-> Controller (management traffic)
AP <-> RADIUS (when WPA-EAP is used)
Traffic from WLAN without VLAN configured is untagged (the athX is bridged to br0).
Traffic from WLAN with VLAN configured is always tagged (athX bridged to br0.VLAN to eth0.VLAN):
AP <-> RADIUS (when WPA Enterprise is used)
Station -> AP (tags) -> switch
Station <- AP (untags) <- switch
Whether it's redirected (to the guest portal) doesn't matter. When WLAN is configured with VLAN, the traffic will be tagged when it leaves the AP. However, after traffic is tagged by the AP, it's up to you where it should be passed upstream.
Intro to Networking - Introduction to Virtual LANs (VLANs) and Tagging
EXAMPLE
Management network: 10.1.0.0/24
Guest VLAN network: 10.2.0.0/24
Switch
AP connected to port 5 (VLAN 1-untagged and VLAN 5-tagged)
Ubuntu connected to port 1 (VLAN 1-untagged and VLAN 5-tagged)
Controller connected to port 8 (VLAN 1-untagged)
Ubuntu (acting as a Router)
eth0: 10.1.0.2/24, routable to the Internet (gateway 10.1.0.1)
eth0.5: 10.2.0.1/24, NATed to eth0
Controller is at 10.1.0.26.
Guest Portals and VLANs
Back to Top
It's natural to think of a VLAN when guest access is mentioned since guests placed in their own VLAN, are isolated from other parts of the network. However, there are a few technical details worth mentioning talk about.
Let's start with the basic VLAN deployment where the guest portal is not enabled:
UniFi AP tags WLAN->wire traffic.
AP-controller is untagged.
Controller is likely running on untagged interface.
Configured inside the AP: guest --- br0.3 --- eth0.3 --3--+ br0 ------------------+--u,3---port1 corp -----+
DEPLOYMENT EXAMPLE:
port8 connecting to router's DMZ port, add port8 as a member of VLAN 3 and untagging. Enable DHCP server on your DMZ.
port5 connecting to an internal network, have port5 untagged.
So what would happen when the guest portal is enabled with VLAN? When the guest portal is enabled, the UniFi Controller acts as a portal server and the guests will be redirected to http://unifi_ip:unifi_http_portal_port/guest/. Some issues might arise, for example a guest is on VLAN 3, bridged to DMZ, and can't reach unifi_ip:unifi_http_portal_port. This issue could be addressed by adding rules to the router:
Add a route for traffic from DMZ->unifi_ip
Allow DMZ->unifi_ip:unifi_http_portal_port
Related Articles
Back to Top
UniFi - USW: Using VLANs with UniFi Wireless, Routing & Switching Hardware
View ArticleOverview
This article describes how to back up or migrate UNMS application data.
Table of Contents
Introduction
How to Backup UNMS Application Data
How to Restore UNMS
Related Articles
Introduction
Back to Top
Backing up data is always a good idea, but it is especially important in certain scenarios. For example, when migrating UNMS to a different server, or when testing different features or configurations on UNMS. Performing a backup first is a best practice that allows experimentation without the danger of losing carefully polished settings.
How to Backup UNMS Application Data
Back to Top
For most users, it may be most convenient to use the automatic backup feature available since version 1.0.0. The list of automatic backups is available underSettings -> Backups. At the same place, a fresh backup can be initialized in case the automatic one is too old. It is also possible to apply older backup here.
UNMS - Installation Guide
NOTE:
The UNMS backup combines databases from both Network and CRM modules.
User Tip:
In case users would like to use scripts to perform automated actions like downloading a fresh backup to a remote location, it can be achieved by using the powerful UNMS API.
In order to keep the size of automatic backups manageable, only the essential data is stored. This backup doesn't contain for example stored firmware files. In order to backup, absolutely everything a wholeUNMS data folder can be archived. The folder is located on this path/home/unms/data on the Docker host and includes settings, logs, statistics, images, backups, and SSL certificates. In order, to back upthis data first pause the running containers. Go to the directory, where docker-compose.yml is located (probably /home/unms). Then archive the data and save it somewhere safe. As the final step, unpause the containers.
# go to your UNMS home directory
cd /home/unms
#stop docker containers
sudo /home/unms/app/unms-cli stop
# pack the data directory
sudo tar -cvjSf unms-data.tar.bz2 data
# start docker containers
sudo /home/unms/app/unms-cli start
This set of commands will create an archive for all UNMS settings and data. Then it can be moved to another machine or archive.
Howto Restore UNMS
Back to Top
In the UNMS user interface this can be done from section Settings -> Backups.
If there is no GUI access for some reason, apply the backup from the command line. Please note that the 'unms-data.tar.bz2' from the example above will be needed.
# go to your UNMS home directory
cd /home/unms
#stop docker containers
sudo /home/unms/app/unms-cli stop
#rename the current data folder
sudo mv data data_old
#create the empty data folder
sudo mkdir data
# extraxt the data directory
sudo tar -xvjSf unms-data.tar.bz2 data
# run the installation script (make sure to include any optional tag that was used in previous installation)
sudo curl -fsSL https://unms.com/v1/install > /tmp/unms_inst.sh && sudo bash /tmp/unms_inst.sh
ATTENTION:Automatically create backups should be always the minimal possible size, but manually created ones are not limited in this regard. If the backup file is huge it can take even a couple of hours to apply it.
Related Articles
Back to Top
View ArticleOverview
This article describes the logic between theBSSID (Basic Service Set Identifier) and corresponding radio's MAC address.
Back to Top
NOTES & REQUIREMENTS: This article applies toGen 1, Gen 2 and Gen 3 UAPs, excluding the Broadcom based models (Gen 1 UAP-AC and UAP-AC-Outdoor). See what Generation your UAP is here.
Table of Contents
Introduction
How to Find Mapping in the UniFi Controller
Related Articles
Introduction
Back to Top
An access point uses multiple MAC addresses for layer 2 communication on the different interfaces. The MAC address of a wireless interface is called the Basic Service Set Identifier (BSSID). A wireless access point needs a way to dynamically create those BSSIDs as it can have different numbers of SSIDs. In general, each radio and network interface has a globally unique MAC address programmed when the AP leaves the factory. The MAC Address rule (including Ethernet, if it has any) is as follows:
For Gen 3: UAP-nanoHD, UAP-IW-HD, UAP-FlexHD, UDM, and UAP-BeaconHD
The default MAC ID (found on the back of the AP) is reserved for ethernet. If the model doesn’t have an ethernet port, such as UAP-BeaconHD, it is still reserved for this purpose.
The 6th byte (counting from right to left) of the default MAC ID indicates the base MAC address of each radio for deriving the BSSID. The base MAC address is derived as follows:
2.4G radio (raX) - 6th byte + 1
5G radio (raiX) - 6th byte + 2
Software uses that base MAC address to derive the BSSID (by changing the 3rd byte) by using the following logic for each radio:
Every subsequent SSID sets the U/L bit (bit 1 of the first octet) to 1, indicating a locally administered MAC address.
In addition, the 3rd byte is determined by the following rule:
MacMSK = b’10001111
3rd byte of (rai0 or ra0) = 3rd bytes of original MAC ID
3rd byte of (raiX or raX, X is non-zero) = (3rd bytes of original MAC ID & MacMSK) + (X << 4). (Where "&" stands for a logical "AND".)
For example, for an an access point like the one in the image to the left, with a MAC ID of 78:8a:20:df:88:70 and four SSIDs: SSID1, SSID2, SSID3, SSID4 (SSID1-2 is for 2.4G, SSID3-4 is for 5G) would use the following mapping:
SSID1: 78:8a:20:df:88:71 (2.4G, ra0, 0xdf = original 3rd byte of MAC ID)
SSID2: 7a:8a:20:9f:88:71 (2.4G, ra1, MacMSK = b’10001111, 0x9f = 0xdf & 0xef + 1 << 4)
SSID3: 78:8a:20:df:88:72 (5G, rai0, 0xdf = original 3rd byte of MAC ID)
SSID4: 7a:8a:20:9f:88:72 (5G, rai1, MacMSK = b’10001111, 0x9f = 0xdf & 0xef + 1 << 4)
Note that this MAC address (78:8a:20:df:88:71) is the MAC of the radio broadcasting SSID1 (and so on and so forth for the other SSIDs), and does not correspond to the MAC address of the wired ethernet port (which is 78:8a:20:df:88:70 in this example case)
For Gen 1, Gen 2, Gen 3 UAPs
Excluding Gen 1 UAP-AC and UAP-AC-Outdoor and Gen 3 UAP-nanoHD, UAP-IW-HD, UAP-FlexHD, UDM, UAP- and BeaconHD)
The first SSID uses the default hardware MAC of the radio
Every subsequent SSID sets the U/L bit (bit 1 of the first octet) to 1, indicating a locally administered MAC address. In addition, it increments the most-significant 4 bits of the first octet by (SSID index - 2).
For example, an AP with MAC address 80:2a:a8:17:74:b5 and four SSIDs: SSID1, SSID2, SSID3, SSID4 would use the following mapping:
SSID1: 80:2a:a8:17:74:b5
SSID2:82:2a:a8:17:74:b5
SSID3: 92:2a:a8:17:74:b5
SSID4: a2:2a:a8:17:74:b5
Note that this MAC address, 80:2a:a8:17:74:b5, is the MAC of the radio broadcasting those SSIDs, and does not correspond to the MAC address of the wired ethernet port. The ethernet port is usually close by (i.e. modification of one of the octets by 1 or 2, depending on the number of radios), but it is not defined which octet gets modified.
How to Find Mapping in the UniFi Network Controller
1. Navigate to theDevices section of the controller.
2. Click on the AP of your choice to reveal the AP's properties panel.
3. In the properties panel, within the Details tab check out theWLANSsection. There is a BSSID column where this information is available.
Please note that this is a basic example of a network with one wireless network.
View ArticleOverview
This article covers some basics about connecting to the UniFi Protect Cloud interface at https://protect.ui.com/, and the steps to diagnose and then solve issues regarding this connection. It is important to read and follow the initial diagnostics section, followed by the network, operating system, and browser troubleshooting. If only one is aspect is investigated the solution might be missed.
Table of Contents
Introduction
General Network Connectivity Requirements
Initial Connectivity Diagnostics
Network Troubleshooting
Troubleshooting Android Devices
Troubleshooting iOS Devices
Troubleshooting Browser Connectivity
Introduction
Back to Top
UniFi Protect’s Hybrid Cloud uses WebRTC technology to facilitate direct, configuration-free, and encrypted peer-to-peer connections between the client device (computer browser or mobile app) and the Protect controller. WebRTC allows connections to be established through NAT and Firewalls (such as a UniFi Gateway) without requiring explicit port forwarding or editing firewall rules.
Under normal circumstances, UniFi Protect users should not need to make any changes to their network environment, device or client configuration in order to connect locally or remotely using the Cloud interface at https://protect.ui.com/ or any of the mobile apps. That said, certain network environments, third-party software, or client-side settings may interfere. This article provides an overview of known causes for connectivity problems and potential solutions or workarounds that can be implemented.
If you are interested in the technical aspects of WebRTC, please visit https://webrtc.org/
General Network Connectivity Requirements
Back to Top
For a WebRTC connection to be established, the conditions listed below must be met by both networks: the one where the Protect controller is connected, as well as the one where the client is connected. The client may refer to your home network, your cellular carrier’s network, or your remote WiFi network such as the one at your workplace or public WiFi.
Reliable access to Internet and DNS service.
Adequate bandwidth for basic connectivity and video transport.
Ability to establish outbound TCP connections on port 443 (no need to port forward).
Ability to establish outbound UDP connections on ports 0 - 65535 (no need to port forward).
Firewall configured to accept solicited inbound UDP traffic.
No network security appliances (IPS) or services blocking WebRTC (STUN or DTLS).
No gateways configured to use Symmetric NAT (uncommon), as this will cause the peer-to-peer connection to fail forcing the use of a relay (TURN) server or failing altogether.
If you are using UniFi Protect in an isolated environment (where Protect has no access to the Internet), WebRTC is still used for connectivity. In this case, only browser-based access is available by connecting directly to the Protect controller/*- IP address on port 7443 ( https://<your-protect-ip>:7443 ).
Initial Connectivity Diagnostics
Back to Top
In order to focus troubleshooting efforts efficiently, it is best practice to try to identify any patterns to the connectivity issues by attempting to connect using different methods. Try the following and take note of results:
Use different mobile devices, such as different phones or tablets, ideally running different operating systems (Android / iOS) if possible.
Use different supported browsers, such as Chrome, Firefox, or Safari, on different computers.
Connect from different client locations:
From the local network (same subnet as Protect).
From the mobile carrier network (on a mobile device, or via tethering).
From a remote network (such as workplace or public WiFi network).
If you can isolate which scenarios work or do not work, you can focus your troubleshooting accordingly:
If a mobile device fails to connect regardless of network location, but browser-based devices work, the problem is likely specific to your mobile device, its configuration, or the software installed.
If a browser-based device fails to connect regardless of network location, but mobile devices work, and the experience is consistent across multiple browsers (Chrome, Firefox, Safari), the problem is likely specific to your computer’s configuration or installed software.
If a browser-based device fails to connect, but works in one browser but not the other, then the problem is likely specific to the browser’s configuration or environment.
If any connection methods (browser or mobile devices) work from one network location but not another, then the problem is likely caused by the network configuration or environment for that location.
If no connection methods work regardless of the device or location, the problem is likely caused by either the Protect Controller, its host device or, most likely, its local network configuration. See Network Troubleshooting.
Network Troubleshooting
Back to Top
If you can isolate connectivity problems to a particular network (for example, you can connect to your business Protect deployment from your home, but can’t connect while at a friend’s house), focus troubleshooting on the network where the connection fails. If the connection fails from any remote location, focus troubleshooting first on the network where Protect is located. Perform the following troubleshooting:
Verify that both the device hosting UniFi Protect, as well as the client device have proper Internet access, including a valid gateway IP and DNS servers. Please note that some DNS providers have been known to cause problems, such as 1.1.1.1. Try changing to Google's 8.8.8.8.
Verify that selected DNS servers properly resolve the following domains:
device.svc.ubnt.com
device.amplifi.com
global.stun.twilio.com
global.turn.twilio.com
Review the firewall configuration to ensure the connectivity requirements established in the section “General Network Connectivity Requirements” are met. If you have custom firewall rules configured, try disabling them temporarily to test.
Remove any port forwards for UniFi Protect, which may have been mistakenly configured.
Disable any network-level security appliance or service rules intended to block WebRTC’s internal protocols: STUN or DTLS. If you are using a UniFi Gateway, the UniFi Intrusion Prevention System (IPS) does not require specific configuration to prevent blocking WebRTC connectivity.
Symmetric NAT
While uncommon, Symmetric NAT poses a challenge for WebRTC (and most other peer-to-peer connections). Symmetric NAT does not maintain a 1:1 port mapping for established connections, which in all cases will cause the WebRTC peer-to-peer connection to fail. WebRTC will then attempt to fall back to connecting via a relay (TURN) server, providing a degraded user experience and in some cases may not work at all.
If you are behind a Symmetric NAT, the only solution is to either establish a VPN connection between the client and Protect, or configure the router in question to a mode other than Symmetric NAT (typically Cone NAT).
The UniFi Protect Controller detects and logs if the controller-side connection is behind a Symmetric NAT, but is unable to determine the NAT type on the client side. If you suspect Symmetric NAT on the controller-side connection, connect to the Cloud Key via SSH and execute the following command:
grep -Ri "symmetric" /srv/unifi-protect/logs
Any results will reveal evidence that the connection failed due to Symmetric NAT.
Troubleshooting Android Devices
Back to Top
Follow these steps to troubleshoot the Android mobile device that has the UniFi Protect app installed on it:
Verify that the Android UniFi Protect application is up to date and running the latest version available in the Play Store.
Ensure that the UniFi Protect application has not been restricted from accessing WiFi or Cellular data. On most Android phones this can be configured by going to Settings > WiFi & Internet > Data Usage > Cellular Data Usage > select UniFi Protect, and in App data usage make sure WiFi and Cellular data has not been disabled.
If a VPN is configured and enabled, try disabling it. Some VPNs and VPN services will block WebRTC connectivity.
If enabled, try disabling Private DNS under Settings > WiFi & Internet > Private DNS. On some networks and carrier networks, certain Private DNS providers such as CloudFlare’s 1dot1dot1dot1 may interfere with WebRTC.
Disable or remove any third-party applications that may interfere with network connectivity. Many security and privacy applications such as Blockada will block WebRTC connections in their default configuration.
Force quit the UniFi Protect application and attempt to connect again.
Uninstall the UniFi Protect application, re-install, and attempt to connect again.
Troubleshooting iOS Devices
Back to Top
Follow these steps to troubleshoot the iOS mobile device that has the UniFi Protect app installed on it:
Verify that the iOS UniFi Protect application is up to date and running the latest version available in the Apple Store.
Ensure that the UniFi Protect application has not been restricted from accessing WiFi or Cellular data. In iOS, go to Settings > Cellular Data and make sure UniFi Protect is toggled ON.
If a VPN is configured and enabled, try disabling it. Some VPNs and VPN services will block WebRTC connectivity.
Force quit the UniFi Protect application and attempt to connect again.
Uninstall the UniFi Protect application, re-install, and attempt to connect again.
Troubleshooting Browser Connectivity
Back to Top
In most cases, browser-specific failures to connect are typically caused by third-party software installed either as an extension in the browser, or an application on the host computer. To troubleshoot browser issues try the following:
Disable all suspected third-party extensions and security or privacy software installed on the computer. If connectivity is restored, re-enable extensions or software one at a time, testing each time, until the extension or software causing the problem is identified.
Once the extension or software has been identified as the cause, either leave it disabled or uninstall it. You may reach out to that software's support team for further assistance on how to configure itso it does not interfere with UniFi Protect. Unfortunately, we are unable to provide assistance on how to configure third-party software.
Common extensions known to cause issues include uBlock Origin, Privacy Badger and WebRTC Leak Prevent. Various VPN services such as Tunnelbear, as well as ad blockers or general tracking blockers are likely to interfere with WebRTC connectivity across all platforms that use the technology. If you identify conflicting software that is not included in this list, please let us know by emailing [email protected] so it can be added.
If using Chrome, please disable the following feature flag "Anonymize local IPs exposed by WebRTC." by copying and pasting the following address into the address bar, selecting Disabled, then restarting the browser:
chrome://flags/#enable-webrtc-hide-local-ips-with-mdns
View ArticleOverview
This article explains what to doif a SSL Certificate Error is shown upon attempting to open the UniFi controller page.
Table of Contents
What does this error look like?
Cause: Missing a Valid SSL Certificate
Cause: Adopting UniFi for the First Time
Related Articles
What does this error look like?
Back to Top
UniFi - How to Setup your Cloud Key and UniFi Access Point (for beginners)
Missing a Valid SSL Certificate
Back to Top
UniFi relies on HTTPS for extra security. This means that the browser will check for valid certificates when making a secure connection to the web server. Although the alert message may prove annoying, there's no risk to the connecting user. To avoid this error you must:
Buy a signed SSL certificate from any web hosting provider (or if you decide to generate one, see a few notes on that below ).
Then make the following changes to the controller:
sudo su -
# cd <unifi_base>
# on Windows, "\%USERPROFILE\%/Ubiquiti Unifi"
cd /usr/lib/unifi
# create new certificate (with csr)
java -jar lib/ace.jar new_cert <hostname> <company> <city> <state> <country>
# Enter your password if prompted and then it will create your CSR in /var/lib/unifi
# - unifi_certificate.csr.der
# - unifi_certificate.csr.pem
# have this CSR signed by a CA, you'll get a few certificates back...
# copy the signed certificate(s) to <unifi_base>
# import the signed certificate and other intermediate certificates
java -jar lib/ace.jar import_cert <signed_cert> [<other_intermediate_root_certs>...]
NOTES:
Following notes for X509Subject Alternative Name:
If you're using Windows to generate the certificate, make sure the alternative name is set as DNS within thecertificate's properties window, and fill out the value.
If you're on Ubuntu / Debian and using openssl to generate acertificate, make sure to use the SANextensions or you will be promoted that the cert is invalid. Which is indication for the mission X509Subject Alternative Name. See external documentation about Subject Alternative Name here.
Once you have created theCSRitcan be found in the \%USERPROFILE\%\Ubiquiti UniFi\data folder. On Mac find it here:/Users/username/Library/Application\ Support/UniFi/data.Not sure where to find <unifi_base>? See this article.
Troubleshooting
If the error "Unable to import certificate into keystore" appears when importing the signed certificate & intermediate certs, try the following steps:
1. Edit the certificate file using a text editor and remove any blank spaces and line breaks after each line of the cert. The cert should be one single line.
2. Save changes re-import the certificate.
Adopting UniFi for the First Time
Back to Top
This error should not be confused with the one seen when adopting a Cloud Key for the first time. This error can be safely ignored by:
1. Click Advanced
2. ClickProceed to <your IP>
Verify if this is your case by seeing our UniFi - How to Setup your Cloud Key and UniFi Access Point (for beginners) article (in step 3.5 of the section 3. Configuring your Cloud Key & Access Point).
Related Articles
Back to Top
View ArticleOverview
This article provides the steps to migrate froma live UCRM instance to a live UNMS instance.
Back to Top
NOTES & REQUIREMENTS:
This guide assists in migrating from live UCRM to live UNMS. However, if you wish to get familiar with UNMS with its CRM module, it is possible to test it in a sandboxed VM beforehand. When testing, it is important to make sure you are not running two CRMs in production mode at the same time to avoid duplicate invoices and other unwanted consequences. To play it safe, it’s recommended to turn off these features in the sandboxed CRM’s System Settings: Billing, Payment Gateways, Mailer, and Plugins. When you are done with testing, drop the whole sandboxed CRM module or the whole testing UNMS and return to this guide to migrate your live UCRM properly.
Table of Contents
Introduction
Considerations Before Migrating from UCRM to UNMS v1
What to Expect from the UCRM to UNMS Upgrade Process
Steps: How to Upgrade from UCRM to UNMS v1
Important Notes
Introduction
Back to Top
The process of the migration that will be followed in this article is:
Prepare the current UCRM for the migration and turn it off.
Install UNMS v1(or upgrade your current UNMS to this new version).
Enable the new CRM module in UNMS with the current UCRM backup file.
Run the wizard designed to move the devices from CRM to UNMS.
Check the configuration of UNMS including its CRM module
Considerations Before Migrating from UCRM to UNMS v1
Back to Top
Make sure you are using the latest firmware version 2.0.6 or newer on your gateway EdgeRouter. Please upgrade to this latest version using UNMS or the router's web interface. Note that you can use another router device or firmware version but the new fully automatic Shaping, Suspension, and NetFlow features won’t be available.
Suspension on Mikrotik routers is not supported in UNMS v1. Workaround: use the existing UCRM Plugins.
CRM backup sync to Dropbox has been removed and replaced by the Dropbox plugin. It is also possible to back up UNMS/CRM manually or automatically using a cron job.
UNMS v1 works directly with devices instead of IP. For Ubiquiti devices, it can easily gather all available IP addresses, but for 3rd party devices, it is necessary to insert them manually. Please note that IP ranges can no longer be set to client's devices, only single IPs can now be inserted manually.
We recommend only upgrading to stable UNMS versions.
What to Expect from the UCRM to UNMS Upgrade Process
Back to Top
The upgrade and migration process ensures that all the devices are present only in the Network module, all the sites are moved to the Network module, and the CRM Client’s Services are linked to appropriate Network Client Sites. In other words, all the devices configured manually in UCRM won’t be lost, they will be moved to the UNMS Network module, or just skipped when the given device is already there.
All the existing UCRM Site/Service Devices will be moved into the UNMS Network module automatically. If a device is already there, it will be detected by matching MAC or IP and no duplicate will be created. This is applied to all 3rd party devices as well, they will be migrated to UNMS.
Sites missing in UNMS will also be created automatically. The "missing site" is the site where all its devices are present only in UCRM and not in the UNMS Network.
The migration wizard will never modify or delete the existing Sites or Devices in UNMS. Additionally, no duplicate Sites or Devices will be created during the process.
CRM Client Services will then be linked to the corresponding Network Client Sites. Only 100\% matches are linked automatically, i.e. only when all the previous service devices (in CRM) are matching to all the client site devices (in Network). The missing Client Sites are also created automatically.
CRM will never modify or delete the existing sites or devices in UNMS. Additionally, no duplicate Sites or Devices will be created during the migration process.
NOTES
The primary device matching key is the MAC ID, the secondary matching key is IP and it is used only when the MAC value is empty.
If you were using UCRM and UNMS simultaneously and the devices or network topology were configured manually, there might be some ambiguous cases disabling automatic linking of client’s service (CRM) and client sites (Network).
For example, when the CRM Service has two devices that match devices of two different Network Client Sites. The network migration wizard will help you solve these cases but you can also "fix" the data in your current UNMS or UCRM beforehand or skip the migration tool and match all services manually.
Steps: How to Upgrade from UCRM to UNMS v1
Back to Top
1. Prepare the Current UCRM Instance for Migration
These are the recommended steps to prepare the current data and the whole UCRM system for migration. The goal is to terminate the current UCRM instance properly and migrate the data into the new UNMS’ CRM module in order not to run two CRM systems at the same time to avoid duplicate invoicing and other issues.
User Tip: Choose a part of a day with low activity, when there are not many clients in the client zone, no automatic invoices are being created, no emails waiting in the sending queue, etc.
1.1. As of UCRM v2.16+, go to or use the "Upgrade to UNMS" button in the top-left corner of the UCRM interface.
1.2.Follow the steps shown on that page to properly terminate billing and online payments, and to remove the shaping and suspension rules from the HW.
NOTE:This is the correct way of moving your online payments to UNMS’ CRM. It’s ok to keep UCRM switched off while the new UNMS’ CRM is not yet online. The online payment gateways repeat the notifications for many times until the system is back online. However, if you are migrating to a completely new domain, please make sure you check the configuration of the payment gateways according to the in-app guide on <yourdomain>//crm/help/online-payment-gateways.
1.3. By the end of the instructions provided in the UCRM "UNMS Integration" page, you should havethe Backup in UNMS format ready for the next step and your production UCRM should be turned off. Make sure you have downloaded the"Backups in UNMS format" (only this format can be used for upgrading to UNMS' CRM module. See the bottom of the System > Tools > Backup page).
2. Install UNMS v1
2.1.Install UNMS v1 or upgrade your existing UNMS to this version. Follow the UNMS installation guide or use the in-app upgrade tool in your existing UNMS.
2.2. If you are already a UNMS user and you have some data and devices configured in UNMS, it’s recommended to create a backup file of your UNMS instance at this point.
3. Verify that the New CRM Module in UNMS is Enabled
3.1.Go to Network > Settings > UNMS > UNMS Mode and make sure the ISP mode is enabled. Now you can enter the CRM Module through the top menu bar.
3.2. Once you are in the CRM module, go to System > Tools > Backup >Restore your UCRM v2and restore the backup in UNMS format from your previous UCRM v2 instance. Once the backup is restored, continue with the Network Migration Wizard.
4. Follow the Network Migration Wizard.
The Network Migration Wizard will be automatically skipped if there were no devices in the old UCRM instance since there would be nothing to migrate to UNMS. If the Network Migration Wizard is launched, go through the two sections: migration of Sites, and the migration and binding of Services to Client Sites.
A few pointers:
If you haven't been using UNMS before, the migration will be very simple: all of the "network data" will be moved to the Network module by clicking "Start Migration".
If you have been using UNMS, pay attention to the migration plan offered by the wizard. Most of the data will be just moved or linked with the existing entities in UNMS. However, there might be some ambiguous items which cannot be migrated or linked automatically. Please follow the information and tooltips shown for these cases. These are examples of some cases which wouldn't be migrated automatically and which might need your attention:
A single CRM service match multiple Network Client Sites (e.g. the CRM service ends up with 2 devices that belong to two different Client Sites in UNMS).
Multiple services match a single Client Site (e.g. you added all your CPEs into a single Client Site in UNMS).
CRM services match Sites in UNMS instead of Client Sites and vice versa, or former UCRM Sites match Client Sites in UNMS.
Mismatching IPs (e.g. one of the service device IP matches one Client Site in UNMS, while the second IP of the same device belongs to another Client Site).
CRM services that have no devices will not be bound to any Client Site.
Similarly, service devices with neither an IP nor a MAC or unattached service devices are not migrated to UNMS. Additionally, devices with non-unique Management IP are skipped by the wizard.
NOTE: UCRM service devices having more than one IP address (including the management IP) are migrated as separate devices for each IP to ensure no IP is lost during the migration, and the shaping and suspension feature will continue to work unaffected. If these IPs belongs to the same Ubiquiti device, UNMS will recognize this and merge these devices into one automatically.
USER TIP: In case it is necessary, you can re-run the migration wizard by doing the following:
If using UNMS version 1.1.x and up:Perform a factory reset of the CRM data in CRM > System > Tools > Factory reset.
If using UNMS versions older than 1.1.x:Toggle the Sandbox mode on and off to trigger the wizard.
Optional step: Force Mode for Service Devices
This option is available only when at least one UCRM service device exists also in UNMS. This mode for migrating UCRM service devices can be useful for those who have been using UNMS along with UCRM, while the UNMS network data related to Client Sites is incorrect. For example, if you have one Client Site containing 300 devices in UNMS which is obviously incorrect. If you think your UCRM data pertaining to Service Devices is better (for the example mentioned it might be: 300 services, having one device each), you can use it to "force push" the UCRM data into UNMS. This mode is not applied to UCRM Sites and the migration of Sites and their devices is not affected by this mode. More details about Force Mode:
When turned on, all the Client Sites and their devices are pushed into UNMS based on the UCRM data, regardless of the devices and network topology in UNMS.
The existing UNMS Client Sites won’t be deleted. Note that this means that the number of Client Sites in UNMS can be doubled.
No device duplicates are created, the existing UNMS devices will be just relocated from Client Site or Site to the proper Client Site according to the CRM info.
To sum it up, this Force Mode never deletes anything and it never creates any duplicate devices in UNMS. It will just create a non-existing Client Site for each UCRM service according to UCRM data and create the missing devices or relocate the existing ones.
User Tip:Before you start the migration, click on the Force Mode toggle to preview the planned actions. When you are satisfied with the proposed migration plan, start it up. When completed, go to finalize the UNMS configuration.
It is also possible to skip this wizard and manage the binding of services and client sites on your own one by one. If you prefer this method, click "I want to do this manually".
5.Check and Finalize UNMS Configuration
5.1. Check that the bindings between the CRM services and the Network Client Sites are correctly set.
Feel free to finalize the bindings manually: go to the CRM client service page and bind some Client Site in the “Network” box.
5.2. Use the old UCRM hostname for the new UNMS
It’s highly recommended to use the same hostname of the previous UCRM for the new UNMS to ensure smooth transition of all CRM features and for seamless replacement of the client zone. Go to Network > Settings > UNMS > UNMS Hostname/IP.
Note that the new UNMS hostname will be used by the payment gateways to communicate with your UNMS’ CRM and also your clients might be used to the previous hostname, and might be still using the URLs in old emails sent from UCRM.
If you were already using UNMS with some connected devices. The change of its hostname will require to reconnect the devices, read more in this guide.
WARNING: If you use another hostname for UNMS (e.g. when migrating to the UNMS cloud version), you should reconfigure the settings of your payment gateways, go through the config guide for your gateway from the first step. Otherwise the payment gateway will try to send the payment info to a wrong URL.
5.3. If you are new to UNMS, check its configuration.
Configure UNMS Mailer settings which are used by the CRM module as well in Network >Settings > UNMS > Mail Server. Note thatthe Mailer settings haven't been migrated from your old UCRM.
Configure the SSL certificate. Establish a new Let’s Encrypt certificate in Network >Settings > UNMS > SSL Certificate. If you need to use the SSL certificates from your previous UCRM, go to /home/ucrm/data/ucrm/ssl/ on your previous UCRM server, or you can also find them migrated at /home/unms/data/ucrm/ssl/ on your current UNMS server if you used the UCRM backup file including these keys.
Configure the Google map keys in UNMS.
5.4. Configure the UNMS Home Page.
The new UNMS has 2 separate login screens:
For both Network and CRM administrators (at yourdomain/nms), which is the default option.
For clients accessing the Client Zone (at yourdomain/crm).
You can choose which should be used as the default UNMS home page when the domain name is accessed without any suffix /crm or /nms by configuring it inNetwork > Settings > UNMS > Home page.
If you have been providing your clients with access to the Client Zone in your old UCRM, it’s recommended to set the client zone login screen (the second option) as the default login screen.
Note that payment gateways are not affected by this choice, the one-time payments and subscriptions will work regardless of the UNMS homepage selected.
5.5. UNMS and CRM Administrators:
NOTE: Please note thatthe CRM login screen only works for clients attempting to access the Client Zone.
All the UNMS and CRM administrators can sign in using the same administrators screen at yourdomain/nms. All the UCRM accounts (usernames/passwords) from your previous UCRM will work in this UNMS login screen, except the super-admin account. If there is just one super admin in UNMS and one in CRM, these super-admins accounts are considered as beingfor the same person and are merged into one.This user will need to use the username/password set in the UNMS app, configured during the first run of UNMS.
5.6. If you were using the Traffic Shaping feature in the old UCRM v2.x:
The UNMS Network module will take care of it: just turn it on for the gateway router in UNMS v1.0. For an easy configuration, use this UNMS Traffic Shaping guide.
5.7.If you were using the Suspension feature in the old UCRM v2.x:
Follow the guide to enable suspension feature in UNMS settings.
You might also need to recheck the configuration of Excluded Destination IP for suspended connections. To do so, you need to goNetwork > Settings > Network, select the appropriate active gateway and click the Edit link on the right. A popup will be shown with the 'Allow IP addresses' field.
5.8.If you were using the NetFlow feature in the old UCRM v2.x:
You can continue using it in the new UNMS as well, just make sure the destination IP for NetFlow packets is aiming at the UNMS server IP.
The NetFlow data usage measured by UCRM won’t be removed from the CRM module. But as of UNMS v1, any new usage data shown in the CRM module are obtained from the Network module automatically (only for client’s services bound to a client site in UNMS Network).
5.9.If you were using UCRM Plugins:
All of your UCRM Plugins and their data will be migrated into UNMS' CRM module using the UCRM backup file (if you haven’t explicitly excluded Plugins from the creation of backups). However, all of these plugins are turned off and need to be upgraded manually to the new version compatible with the CRM module in the new UNMS v1.
To do so, go to CRM > System > Plugins and click "update" to all of your existing plugins.
Important Notes
Backward compatibility for Client Zone URL and payment processing URL is ensured automatically by UNMS. For example, clients going to yourdomain/client-zone will be automatically redirected to yourdomain/crm/client-zone. You just need to make sure you are using the same domain for UNMS as the old UCRM instance was using.
Files uploaded to System > Tools > Webroot are now accessible using a new URL starting with /crm. For example: “wispdomain.com/crm/clients-guide.pdf”. You may need to change the URL used in your documents or email templates.
The following data is not transferred from the old UCRM to UNMS: device stats, logs, backups, and charts.
If you migrate to UNMS Cloud, the UCRM Plugins cannot be migrated automatically due to security reasons (workaround: you need to reinstall the plugins manually). Also, note that custom made plugins (unofficial versions) are not allowed on the UNMS Cloud version.
View ArticleOverview
This article will outline how to reset a UniFi Video Installation under the Linux operating system (also applies to our hardware NVR) and how to restore recordings. The article for resetting a Windowsinstallation can be found here.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Please note that this will clear out all settings and managed cameras but therecordings will remain. If you do not restore a configuration backup, it will be necessary tore-manage thecameras, set up motion zones/sensitivities, reconnect theinstall to the cloud, etc. This method should only be used after a database repair has been attempted and been advised by a Ubiquiti employee.
Table of Contents
Steps: How to Reset a UFV Installation
Steps: How toRestore Recordings
Related Articles
Steps to Reset a UFV Installation
Back to Top
For versions 3.10.1 or Earlier:
If you wish to restore your current configuration after the reset, ensure you have a configuration backup, or generate one from the Settings page in UniFi Video.
SSH into theUniFi Video server or hardware NVR. (Need guidance on SSH? Click here.)
Edit /usr/lib/unifi-video/data/system.properties
You can use vi,nano, orpicoto do this. However, on our hardware NVR, viis the only text editor. You can quickly install nanoby executing apt-get update; apt-get upgrade; apt-get install nano; apt-get clean
Locate the line that reads: is_default=false and change it to: is_default=true
Restart UniFi Video service unifi-video restart
It will take a moment to wipe out the database and restart the web service.
Access your install as usual (https://[UniFi-Video IP address]:7443).The complete process of how to access the initial setup wizard can be found in the UniFi Video User Guide.
The initial setup wizard will appear. Either restore the backup saved prior to recover your configuration or complete the configuration wizard to configure the system.
As always, the first thing you should do after completing the wizard is go to Settings > NVR Settings > Configure tab and check your storage path as well as the "Space to Keep Free" setting.
For versions 3.10.2 or Later:
If you wish to restore your current configuration after the reset, ensure you have a configuration backup. You can generate one from the Settings page in UniFi Video.
Navigate to Settings > System Configuration > Configure > Tools > Controller -Check the Reset Box, and Click the Restart button. (You will need to be the Super Administrator to see this option.)
After a couple minutes,The initial setup wizard should appear (you may need to refresh your browser) - Either restore the backup saved prior to recover your configuration or complete the configuration wizard to configure the system.
As always, the first thing you should do after completing the wizard is go to Settings > NVR Settings > Configure tab and check your storage path as well as the "Space to Keep Free" setting.
Steps to Restore Recordings
Back to Top
The following methods willguide a user to attempt to restore theirrecordings.
ATTENTION:Please note that the analysis tool may actually remove therecordings. It is recommended to make a backup of your recordings prior to performing thesesteps.
For versions 3.9.0 or later:
Go to Settings > NVR Settings > Configure tab > Expand Tools section.
Check the "Restore Recordings" option, and click ANALYZE:
For versions 3.8.5 or earlier:
Edit the system.properties file (/usr/lib/unifi-video/data/system.properties) and add the following to the bottom:
recording.recovery=true
Restart the UniFi Video service viaservice unifi-video restart.
Log in to the web interface.
Go to Settings > NVR Settings > Configure tab > Expand Tools section > Click the Analyze button. Your recordings will only restore if the storage path is correct.
Restoring recordings can take some time (anywhere from 30 minutes to 5+ hours depending on how many you have). You can continue to use the system as normal, as well as continue to manage your cameras and set up your configuration, but make sure you stay logged in while the analysis is complete. A simple way to do this would be to open a Live Feed from a camera or a Live View to prevent the systemfrom logging you out.
Related Articles
Back to Top
UniFi Video - How to Reset a UniFi Video Installation forWindows
UniFi Video - Repairing a Database
View ArticleOverview
In this article we will show a roadmap for UNMS.
UNMS - Supported devices
NOTE:Content listed here is based on our Community feature requests.
Table of Contents
Introduction
Upcoming Features
Related Articles
Introduction
Back to Top
We have opened UNMS development to the feedback of our community as much as possible. For that reason, it is paramount for us to hear your feature requests and allow you to influence our plans for new features accordingly.We prioritize on those requests that are most desired by the community so here is a short list of those.
Upcoming Features
Back to Top
NOTE: Planned featuresin the table below are ordered neither by importance nor by the expected time of implementation.
Our top priority is to complete support for all Ubiquiti devices. Here is a table showing,what is already done and what needs to be added. We are committed to listen to your feedback and drive the development of UNMS in a direction that our community will appreciate. For that, we would like to encourage you to express your desires in our feature request section.
Stations
For airMAX and airCube devices in AP mode, we will show more detailed info about connectedclients. You will be able to investigate any client issues much more effectively with this feature.
UNMS Team
Feature
Description
Submitted By
AirLink
(First gen. already available in 1.1.0)
UNMS will be integrated with AirLink. This will allow you to easily plan new connections and simulate the coverage of an area with Ubiquiti devices. This solution will provide a clear view of your network topology on a satellite map background, showing all your AP, stations, clients and datalinks.
UNMS Team
Parallel FW upgrade
(First gen. already available in 1.1.0)
Smart FW upgrade for APs and their stations together. This feature will allow scheduling FW upgrade as well. The mass parallel upgrade will be able to evaluate the structure of a site and recognize if a device is providing energy to other devices through PoE. This is necessary to prevent a restart of any device in the middle of an upgrade.
UNMS Team
Insights
Real-time analysis and evaluation of issues in your network. Each discovered issue is immediately followed by an alert. This system will be able to recognize the wide scale of issues: outages, signal strength, capacity overload, configuration mistakes etc...
Rebelwireless
Roles
Advanced system for roles and multi-tenancy. This feature will allow restricting access to specific sites/clients for particular users.
MajoV
Justmeccsn
IP management
Subsystem for IP management. This feature allows attaching a specific IP address to any device. UNMS will not only offer a list of all used IP addresses, but it will be able to assign IP addresses to devices according to business requirements of UCRM as well. Also, the new smart installation wizards in the UNMS mobile app will be dependent on this feature to work properly.
Tech53
Firewall configuration
On EdgeRouters it will be possible to configure selection of the most important firewall settings remotely from UNMS.
UNMS Team
IPv6
Full support of IPv6 protocol everywhere in UNMS. UNMS will be able to run on IPv6 server, connect devices from IPv6 networks and correctly display and manage IPv6 addresses.
UNMS Team
Site survey
UNMS will be able to scan nearby networks for all wireless airMAX and airCube devices. This feature will give you a useful overview of neighboring networks and their devices.
UNMS Team
UniFi integration
This feature will allow connecting a whole UniFi network as a single UNMS device for simple monitoring only. It will not be able to manage the UniFi network in any way but we will add a one-click link to the UniFi controller.
Phastier
Tsial
VPN management
A configuration of VPN on EdgeRouters.
Horfic
Related Articles
Back to Top
View ArticleOverview
This article specifies what data is shared with Ubiquiti via the automatic stability issues reporting.
Table of Contents
Introduction
Sample Data Export
Introduction
Back to Top
Ubiquiti's goal is to improve products intelligently, by tracking and prioritizing the most common errors. Issues reporting enables the team to be able to fix any issue quickly and improve the product design by having a better understanding of our real customers' use cases. With that in mind, the data shared with the developer team is limited to information and configuration which doesn't have personal character. That is why all IP addresses, MAC addresses, SSIDs and any unnecessary information is omitted from the reported data. Please see an example of a real set of reported data in the section below.
Sample Data Export
Back to Top
The crash report example below is from a real case and is shown unencrypted to reveal the data that is being sent. Please note that in reality, all this data is sent encrypted.
=> Send header, 236 bytes (0xec)
0000: POST /api/v1/core-dump HTTP/1.1
0021: Host: crash.ubncloud.com
003b: User-Agent: curl/7.47.0
0054: Accept: text/plain
0068: Content-Length: 9791
007e: Expect: 100-continue
0094: Content-Type: multipart/form-data; boundary=--------------------
00d4: ----d1daba1c5ab6abf6
00ea:
<= Recv header, 23 bytes (0x17)
0000: HTTP/1.1 100 Continue
=> Send data, 9791 bytes (0x263f)
0000: --------------------------d1daba1c5ab6abf6
002c: Content-Disposition: form-data; name="device_id"
005e:
0060: 5f40abdf4a0447105252f2f2f2e66fa1
0082: --------------------------d1daba1c5ab6abf6
00ae: Content-Disposition: form-data; name="bomrev"
00dd:
00df: 13-00488-19
00ec: --------------------------d1daba1c5ab6abf6
0118: Content-Disposition: form-data; name="model"
0146:
0148: ACB-AC
0150: --------------------------d1daba1c5ab6abf6
017c: Content-Disposition: form-data; name="version"
01ac:
01ae: ACB.feature/aircube-114.f876678.191209.1309
01db: --------------------------d1daba1c5ab6abf6
0207: Content-Disposition: form-data; name="system_time"
023b:
023d: 2019-12-09T14:36:01
0252: --------------------------d1daba1c5ab6abf6
027e: Content-Disposition: form-data; name="kernel_version"
02b5:
02b7: 4.1.16
02bf: --------------------------d1daba1c5ab6abf6
02eb: Content-Disposition: form-data; name="architecture"
0320:
0322: mips
0328: --------------------------d1daba1c5ab6abf6
0354: Content-Disposition: form-data; name="load_average"
0389:
038b: 0.56 0.47 0.41
039b: --------------------------d1daba1c5ab6abf6
03c7: Content-Disposition: form-data; name="df"
03f2:
03f4: Filesystem 1K-blocks Used Available Use\% Mounted
0434: on./dev/root 5888 5888 0 100\% /.tmp
0474: fs 30240 1536 28704 5\% /tmp.tmpfs
04b4: 512 0 512 0\% /dev
04ec: --------------------------d1daba1c5ab6abf6
0518: Content-Disposition: form-data; name="free"
0545:
0547: total used free shared buffers
0587: cached.Mem: 60480 49364 11116 1536
05c7: 4948 15600.-/+ buffers/cache: 28816 31664.Swa
0607: p: 0 0 0
062e: --------------------------d1daba1c5ab6abf6
065a: Content-Disposition: form-data; name="ps"
0685:
0687: PID USER VSZ STAT COMMAND. 1 ubnt 1536 S /sbi
06c7: n/procd. 2 ubnt 0 SW [kthreadd]. 3 ubnt
0707: 0 SW [ksoftirqd/0]. 5 ubnt 0 SW< [kworker/0:0H].
0747: 7 ubnt 0 SW< [khelper]. 77 ubnt 0 SW< [wri
0787: teback]. 78 ubnt 0 SW< [crypto]. 79 ubnt 0
07c7: SW< [bioset]. 81 ubnt 0 SW< [kblockd]. 83 ubnt
0807: 0 SW [kswapd0]. 84 ubnt 0 SW [kworker/0:1].
0847: 165 ubnt 0 SW [fsnotify_mark]. 186 ubnt 0 SW
0887: [spi0]. 326 ubnt 0 SW< [ipv6_addrconf]. 332 ubnt
08c7: 0 SW< [deferwq]. 337 ubnt 0 SW< [kworker/0:1H].
0907: 369 ubnt 0 SW [kworker/0:2]. 502 ubnt 1180 S
0947: /sbin/ubusd. 503 ubnt 1188 S -ash. 801 ubnt 202
0987: 4 S /sbin/rpcd. 844 ubnt 0 SW< [cfg80211]. 875 ubn
09c7: t 0 SW< [ath10k_wq]. 876 ubnt 0 SW< [ath10k_a
0a07: ux_wq]. 1012 ubnt 0 SW< [krfcommd]. 1063 ubnt 0
0a47: SW [kworker/u2:1]. 1228 ubnt 2184 S /sbin/logd -S 102
0a87: 4. 1287 ubnt 1700 S /sbin/netifd. 1356 ubnt 1916 S
0ac7: /usr/sbin/uhttpd -f -h /usr/www -r airCube-AC -l /ap. 1449 ub
0b07: nt 4188 S /sbin/infctld -n. 1470 ubnt 1184 S /us
0b47: r/sbin/crond -f -c /etc/crontabs -l 5. 1578 ubnt 0 SW
0b87: [kworker/u2:2]. 1666 ubnt 1184 S /usr/sbin/ntpd -n -S /u
0bc7: sr/sbin/ntpd-hotplug -p 0.ubn. 1696 ubnt 1180 S udhcpc -
0c07: p /var/run/udhcpc-wan0.pid -s /lib/netifd/dh. 2048 ubnt 263
0c47: 2 S /usr/bin/lua /usr/share/ubnt/uacbd. 2065 ubnt 4620 S
0c87: /usr/bin/udapi-bridge -w -g -p 81 -U /var/run/ubnt-u. 2086 u
0cc7: bnt 4812 S {exe} /usr/bin/udapi-bridge -w -g -p 81 -U /v
0d07: ar/run/. 2099 nobody 4616 S /usr/sbin/lighttpd -D -f /etc/
0d47: lighttpd/lighttpd.conf. 2139 nobody 1052 S /usr/sbin/dnsma
0d87: sq -C /var/etc/dnsmasq.conf -k -x /va. 2354 ubnt 1768 S
0dc7: /usr/sbin/hostapd -s -P /var/run/wifi-phy0.pid -B /v. 3362 ubnt
0e07: 1740 S /usr/sbin/hostapd -s -P /var/run/wifi-phy1.pid -B
0e47: /v. 5772 ubnt 2892 S /usr/bin/udapi-server -g -s /var/r
0e87: un/ubnt-udapi-serv. 5970 ubnt 1200 S {crash-handler.s} /
0ec7: bin/sh /usr/share/crash-report/cr. 5997 ubnt 1180 R ps.1
0f07: 3201 ubnt 0 SW [kworker/u2:0]
0f30: --------------------------d1daba1c5ab6abf6
0f5c: Content-Disposition: form-data; name="uptime"
0f8b:
0f8d: 5033.07
0f96: --------------------------d1daba1c5ab6abf6
0fc2: Content-Disposition: form-data; name="cmd"
0fee:
0ff0: udapi-server
0ffe: --------------------------d1daba1c5ab6abf6
102a: Content-Disposition: form-data; name="cmd_fullpath"
105f:
1061: !usr!bin!udapi-server
1078: --------------------------d1daba1c5ab6abf6
10a4: Content-Disposition: form-data; name="cmd_envvars"
10d8:
10da: HOME=/.TERM=linux.board=AIRCUBE.PATH=/usr/sbin:/usr/bin:/sbin:/b
111a: in
111e: --------------------------d1daba1c5ab6abf6
114a: Content-Disposition: form-data; name="cmdline_params"
1181:
1183: /usr/bin/udapi-server -g -s /var/run/ubnt-udapi-server.sock
11c1: --------------------------d1daba1c5ab6abf6
11ed: Content-Disposition: form-data; name="signal"
121c:
121e: 11
1222: --------------------------d1daba1c5ab6abf6
124e: Content-Disposition: form-data; name="file_descriptors"
1287:
1289: dr-x------ 2 ubnt ubnt 0 Dec 9 14:36 ..dr-xr
12c9: -xr-x 8 ubnt ubnt 0 Dec 9 14:35 ...lr-x-----
1309: - 1 ubnt ubnt 64 Dec 9 14:36 0 -> /dev/null.l
1349: -wx------ 1 ubnt ubnt 64 Dec 9 14:36 1 -> /de
1389: v/null.l-wx------ 1 ubnt ubnt 64 Dec 9 14:36
13c9: 2 -> /dev/null.lrwx------ 1 ubnt ubnt 64 Dec
1409: 9 14:36 3 -> socket:[357992].lrwx------ 1 ubnt ubnt
1449: 64 Dec 9 14:36 4 -> anon_inode:[eventpoll].lr-x------
1489: 1 ubnt ubnt 64 Dec 9 14:36 5 -> pipe:[357994].l-
14c9: wx------ 1 ubnt ubnt 64 Dec 9 14:36 6 -> pipe
1509: :[357994].lrwx------ 1 ubnt ubnt 64 Dec 9 14:
1549: 36 7 -> socket:[357995].lrwx------ 1 ubnt ubnt
1589: 64 Dec 9 14:36 8 -> socket:[358008].lrwx------ 1 ubnt u
15c9: bnt 64 Dec 9 14:36 9 -> socket:[358015]
15fe: --------------------------d1daba1c5ab6abf6
162a: Content-Disposition: form-data; name="memory_map"
165d:
165f: 00400000-0042d000 r-xp 00000000 1f:03 1541 /usr/bin/udapi-
169f: server.0043c000-0043d000 r--p 0002c000 1f:03 1541 /usr/bin
16df: /udapi-server.0043d000-0043e000 rw-p 0002d000 1f:03 1541 /
171f: usr/bin/udapi-server.0043e000-00441000 rwxp 00000000 00:00 0 .00
175f: ac1000-00b27000 rwxp 00000000 00:00 0 [heap].77c40000-7
179f: 7c52000 r-xp 00000000 1f:03 870 /usr/lib/lua/uci.so.77c52
17df: 000-77c53000 r--p 00002000 1f:03 870 /usr/lib/lua/uci.so.
181f: 77c53000-77c54000 rw-p 00003000 1f:03 870 /usr/lib/lua/uc
185f: i.so.77c54000-77c67000 r-xp 00000000 1f:03 863 /usr/lib/l
189f: ua/ubus.so.77c67000-77c68000 r--p 00003000 1f:03 863 /usr
18df: /lib/lua/ubus.so.77c68000-77c69000 rw-p 00004000 1f:03 863
191f: /usr/lib/lua/ubus.so.77c6a000-77c7d000 r-xp 00000000 1f:03 866
195f: /usr/lib/lua/cjson.so.77c7d000-77c7e000 r--p 00003000 1f
199f: :03 866 /usr/lib/lua/cjson.so.77c7e000-77c7f000 rw-p 0000
19df: 4000 1f:03 866 /usr/lib/lua/cjson.so.77c80000-77c91000 r-
1a1f: xp 00000000 1f:03 862 /usr/lib/lua/bit32.so.77c91000-77c9
1a5f: 2000 r--p 00001000 1f:03 862 /usr/lib/lua/bit32.so.77c920
1a9f: 00-77c93000 rw-p 00002000 1f:03 862 /usr/lib/lua/bit32.so
1adf: .77c94000-77ca6000 r-xp 00000000 1f:03 852 /usr/lib/libre
1b1f: g.so.77ca6000-77ca7000 r--p 00002000 1f:03 852 /usr/lib/l
1b5f: ibreg.so.77ca7000-77ca8000 rw-p 00003000 1f:03 852 /usr/l
1b9f: ib/libreg.so.77ca8000-77cc1000 r-xp 00000000 1f:03 876 /u
1bdf: sr/lib/libiwinfo.so.77cc1000-77cc2000 r--p 00009000 1f:03 876
1c1f: /usr/lib/libiwinfo.so.77cc2000-77cc3000 rw-p 0000a000 1f:03
1c5f: 876 /usr/lib/libiwinfo.so.77cc4000-77cd7000 r-xp 0000000
1c9f: 0 1f:03 864 /usr/lib/lua/iwinfo.so.77cd7000-77cd8000 r--p
1cdf: 00003000 1f:03 864 /usr/lib/lua/iwinfo.so.77cd8000-77cd9
1d1f: 000 rw-p 00004000 1f:03 864 /usr/lib/lua/iwinfo.so.77cda0
1d5f: 00-77cfc000 r-xp 00000000 1f:03 776 /lib/libgcc_s.so.1.77
1d9f: cfc000-77cfd000 rw-p 00012000 1f:03 776 /lib/libgcc_s.so.
1ddf: 1.77cfe000-77d2a000 r-xp 00000000 1f:03 877 /usr/lib/libl
1e1f: ua.so.5.1.5.77d2a000-77d2b000 r--p 0001c000 1f:03 877 /us
1e5f: r/lib/liblua.so.5.1.5.77d2b000-77d2c000 rw-p 0001d000 1f:03 877
1e9f: /usr/lib/liblua.so.5.1.5.77d2c000-77d3e000 r-xp 00000000
1edf: 1f:03 779 /lib/libsw.so.77d3e000-77d3f000 r--p 00002000 1
1f1f: f:03 779 /lib/libsw.so.77d3f000-77d40000 rw-p 00003000 1f
1f5f: :03 779 /lib/libsw.so.77d40000-77d55000 r-xp 00000000 1f:
1f9f: 03 825 /usr/lib/libnl-tiny.so.77d55000-77d56000 r--p 0000
1fdf: 5000 1f:03 825 /usr/lib/libnl-tiny.so.77d56000-77d57000 r
201f: w-p 00006000 1f:03 825 /usr/lib/libnl-tiny.so.77d58000-77
205f: d69000 r-xp 00000000 1f:03 790 /lib/libblobmsg_json.so.77
209f: d69000-77d6a000 r--p 00001000 1f:03 790 /lib/libblobmsg_j
20df: son.so.77d6a000-77d6b000 rw-p 00002000 1f:03 790 /lib/lib
211f: blobmsg_json.so.77d6c000-77d82000 r-xp 00000000 1f:03 738
215f: /lib/libuci.so.77d82000-77d83000 r--p 00006000 1f:03 738
219f: /lib/libuci.so.77d83000-77d84000 rw-p 00007000 1f:03 738
21df: /lib/libuci.so.77d84000-77d9b000 r-xp 00000000 1f:03 755
221f: /lib/libubox.so.77d9b000-77d9c000 r--p 00007000 1f:03 755
225f: /lib/libubox.so.77d9c000-77d9d000 rw-p 00008000 1f:03 755
229f: /lib/libubox.so.77d9e000-77db1000 r-xp 00000000 1f:03 721
22df: /lib/libubus.so.77db1000-77db2000 r--p 00003000 1f:03 721
231f: /lib/libubus.so.77db2000-77db3000 rw-p 00004000 1f:03 721
235f: /lib/libubus.so.77db4000-77dca000 r-xp 00000000 1f:03 873
239f: /usr/lib/libjson-c.so.2.0.1.77dca000-77dcb000 r--p 000060
23df: 00 1f:03 873 /usr/lib/libjson-c.so.2.0.1.77dcb000-77dcc00
241f: 0 rw-p 00007000 1f:03 873 /usr/lib/libjson-c.so.2.0.1.77d
245f: cc000-77e5d000 r-xp 00000000 1f:03 761 /lib/libc.so.77e6a
249f: 000-77e6b000 r--s 00000000 00:0e 1184 /tmp/TZ.77e6b000-77e
24df: 6c000 r-xp 00000000 00:00 0 [vdso].77e6c000-77e6e000 rw
251f: -p 00090000 1f:03 761 /lib/libc.so.77e6e000-77e70000 rwxp
255f: 00000000 00:00 0 .7f7fc000-7f81d000 rw-p 00000000 00:00 0
259f: [stack]
25ac: --------------------------d1daba1c5ab6abf6
25d8: Content-Disposition: form-data; name="crash_log"
260a:
260c: xxx
2611: --------------------------d1daba1c5ab6abf6--
<= Recv header, 17 bytes (0x11)
0000: HTTP/1.1 200 OK
<= Recv header, 31 bytes (0x1f)
0000: Server: nginx/1.14.0 (Ubuntu)
<= Recv header, 37 bytes (0x25)
0000: Date: Mon, 09 Dec 2019 14:36:11 GMT
<= Recv header, 41 bytes (0x29)
0000: Content-Type: text/plain; charset=utf-8
<= Recv header, 19 bytes (0x13)
0000: Content-Length: 2
<= Recv header, 24 bytes (0x18)
0000: Connection: keep-alive
<= Recv header, 25 bytes (0x19)
0000: cache-control: no-cache
<= Recv header, 2 bytes (0x2)
0000:
<= Recv data, 2 bytes (0x2)
0000: OK
View ArticleOverview
This article explains how to reset an NVR Appliance to its original factory settings.
How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
The following guide is based on UniFi Video version 3.1.x and later.
Factory resetting an NVR will remove all previous management settings and video data. Any custom configuration changes applied by the system administrator will be lost, such as file-systems mounted on iSCSI volumes or locally attached external disk drives.
The default IP address of the NVR appliance is 192.168.1.30 (but will retrieve a DHCP-assigned address if a DHCP server is present).
Table of Contents
Introduction
Graphical User Interface (GUI) Reset
Command Line Interface (CLI) Reset
Hard (Physical) Reset
Related Articles
Introduction
Back to Top
There are three methods to factory reset your NVR: via Graphical User Interface, Command Line Interface, or the reset button on the actual device. After resetting your NVR to factory defaults, please follow this article to bring it back to current firmware: UniFi Video - How to Update the NVR via SSH.
Graphical User Interface (GUI)
Back to Top
Open the NVR landing page in a browser (http://<NVR_APPLIANCE_IP>/). You do not need to include the default port "7443" as the NVR hardware itself is what will be managed, not UniFi Video.
Click on the gear icon on the upper right hand corner of the page to access the Configure Devicepage.
Log in as "root" system account (username/password should be either ubnt/ubnt or root/ubnt). If you've changed this password, and don't have it anymore, proceed to the Hard (physical) reset method.
Navigateto the Maintenance tab.
Click "Reset to Defaults" button next to "Reset To Factory Defaults:"
Re-open the NVR landing page in a browser (http://<NVR_APPLIANCE_IP>/).
Command Line Interface (CLI)
Back to Top
Open a shell session to the NVR appliance e.g. ssh root@<NVR_APPLIANCE_IP>
Enter the following command-line
nvr-systool reset2defaults
Re-open the NVR landing page in a browser (http://<NVR_APPLIANCE_IP>/).
For more options, typenvr-systool --helpto list other administrative parameters. Thenvr-systoolis used by the NVR management console where this CLI approach is equivalent to the GUI steps.
Hard (Physical) Reset
Back to Top
Press and hold the Reset button (the crescent moon button) located below the Power button for 10+ seconds. The device will take up to 60+ seconds to restore the default configuration and return to the original factory version.
Re-open the NVR landing page in a browser (http://<NVR_APPLIANCE_IP>/).
Related Articles
Back to Top
View ArticleOverview
This article will explain what broadcast traffic is and why it's important to manage it in your UniFi-managed network.
Table of Contents
What is Broadcast Traffic?
Effects of Excessive Broadcast Traffic
Managing Broadcast/Multicast Traffic
How-to EnablePort Isolation in UniFi Controller
How Broadcast Blocking Works
Related Articles
What is Broadcast Traffic?
Back to Top
Broadcast traffic is a topic of critical importance for network administrators, especially in larger networks. Without managing broadcast and multicast traffic, most networks will likely suffer the consequences sooner or later which can be detrimental to network health.
With UniFi, administrators have a number of methods of both monitoring broadcast/multicast traffic and taking action to prevent the network issues that can come from too much of it. In this article, we'll explain why broadcast/multicast traffic is an important consideration for network administrators and suggest some methods of managing this traffic.
First let's define the three fundamentally different ways communication occurs over a network- unicast, broadcast and multicast.
Unicast is the most common method used for network transmissions. Unicast involves one device sending info to another single network address. This is the method used most often on networks when users browse the internet or download files from a file server.
Broadcast involves sending a single packet on a network to every possible recipient on the network. This method has its own advantages/disadvantages over unicast and is very efficient. It can, however, only extend so far as the broadcast domainwhich is usually defined by subnet. Common uses of broadcast transmissions include UniFi device discovery, ARP (Address Resolution Protocol) requests, DHCP, etc.
Multicast functions in a sort of mix between broadcast/unicast. With multicast one device sends data only to systems that are set to receive this data but unlike unicast can send to multiple devices. This means it's more efficient than unicast while consuming fewer resources than broadcast. This most commonly occurs on local networks. An example of a common function that uses multicast transmissions is media streaming like a live stream of a sporting event.
Since unicast communication is the most common and essential on most networksand the least intensive of the three, special precautions will usually need to be taken to ensure that broadcast/multicast requests do not consume so much network resources that they adversely impact network performance. Let's explore how this happens and how you can identify the symptoms.
Effects of Excessive Broadcast Traffic
Back to Top
Chances are most of us have been on a network when someone plugged in a router or IP phone incorrectly and basically took down the network. The cause of these network outages is most often broadcast/multicast traffic. When a router plugs into the local network incorrectly and starts broadcasting ARP requests in a loop- this consumes such a large amount of bandwidth that there are is quickly no room for normal network operations. This is what is called a broadcast storm.
While many networks can experience problems from time to time, the less obvious consequences of unmanaged broadcast/multicast traffic often go unnoticed while still severely impacting the network. In such cases, dropped packets, intermittent connectivity issues with APs and slower network speed can tip administrators off.
This diagram will give a closer look at how this happens. Thisis what 400 packets/second of broadcast traffic looks like on a WLAN network with 5 APs:
UniFi - Guest Network, Guest Portal and Hotspot System
While 393 kbps isn't a particularly large amount of data, when sent via broadcast it can consume 80\% of airtime. This takes roughly the same amount of airtime as trying to send 639 Mbps (500 packets/second * 123 bytes * 8bytes/bit * 1300 unicast frames/multicast frame) through the AP at full PHY rate.
In the above example, both AP1 and AP4 will likely experience intermittent connectivity issues and dropped packets, which will adversely further affect the performance of other APs. These conditions would result in APs having intermittent connectivity with a maximum of 17 Mbps of actual user throughput (unicast data). This would drastically limit the number of users that could connect to each access pointand make the wireless network particularly slow.
As broadcast transmissions increase, this will continue to choke out network function with cascading failures.
For these reasons, it is critical to manage the broadcast/multicast traffic. Let's take a look at how beneficial this can be through another example:
As you can see, with proper control of broadcast/multicast traffic, the same APs can handle over four-fold the user throughput without experiencing any intermittent connectivity. This means the same number of users will all have four times the amount of throughput, or for the same throughput, the system will be able to handle four times the number of users.
In the next section, we’ll explain how this traffic can be managed.
Managing Broadcast/Multicast Traffic
Back to Top
Depending on what tools are available to you in your network, there are a number of ways to manage broadcast/multicast traffic. With UniFi Switches/hardware, the currently recommended method is using "port isolation". This method both ensures that broadcast/multicast data is kept to a minimum while allowing critical services that rely on broadcast/multicast transmissions. Let’s look at an overview of what this would look like:
How to EnablePort Isolation in UniFi Controller
Back to Top
ATTENTION: Port isolation between access points is generally not recommended, since it breaks communication between the UAPs.
Here’s how to set this up as shown in the above example in the UniFi controller:
First, open theUniFi Controller that manages the network.
Click the Devices tab on the left to see the devices.
Click on the switch to enable port isolation, and go to the Ports tab.
Either select the ports individually or click the box to select all.
Click Edit Selected at the bottom.
Go to Advanced.
Expand Advanced Options.
Under Isolation, select Enable port isolation.
Click Applyto finalize changes.
How Broadcast BlockingWorks
Back to Top
It's important to note that theLAN-WLAN Broadcast blocking feature underWireless Network Settings does not actually block stations from sending broadcast frames to the AP for forwarding onto the wired network. Instead, it blocks broadcast frames that are destined to the athX interface and avoids them from being transmitted.
The frames are dropped atawireless driver level. Therefore, if you run a tcpdumpon the athX interface ofthe AP itself, traffic that will wind up being blocked later will appear. The bridge to Ethernet/VLAN forwards everythingto the athX interface, which is whattcpdumppicks up, completely unaware of which frames the wireless driver willdropafterwards.
This is why verifying the blockage viatcpdumpwon't work. You will however, be able to observe by listening on their wireless interface, that once this feature is enabled, broadcast traffic will not be received by any computer connected to that AP, even though you wouldstill be able to see thattraffic when runningtcpdump -i athX on the AP.
Related Articles
Back to Top
UniFi - Troubleshooting Connectivity Issues
UniFi - Methods for Capturing Useful Debug Information
View ArticleOverview
This article describes howto select the correct firmware, either for the XW or XM platforms of an airMAX M device; or the XC or WA platforms of an airMAX AC device.
airMAX - How to Update Device Firmware
NOTES & REQUIREMENTS:
The "correct firmware" will always be the latest release. The airMAX team is hard at work adding improvements to each new version. For security reasons, please be prompt to update all your devices to the latest firmware available in the Downloads page.
If you wish to test beta firmware versions, you will need to get beta access and then navigate to the Releases section of our Community. Once there, select RC (Release Candidate) status, choose to filter byCategoryandBeta and then select airMAX from the ISP grouping.
Table of Contents
Introduction
Identifying a Device's Platform
How to Download the Correct Firmware
Related Articles
Introduction
Back to Top
In 2015, the new airMAX AC line of products was released. This platform requires different firmware than the XM/XW used with the airMAX M line. The airMAX AC products use either XC or WA. You can easily check to see which firmware is needed for your specific model by checking the Main Dashboard of the airOS webUI.
Identifying a Device's Platform
Back to Top
airMAX M
The airMAX M devices use XW or XM platforms. Identify which one by looking at the firmware version in the device's SYSTEMtab; or by checking the firmware version in theMAINtab.
XW devices will display an 'XW' before the firmware version. In the example above, the firmware is 6.1.6 and for XW devices. XM devices will show an 'XM' before the firmware version.
Older M devices are XM while most new M devices are XW. The first Rocket Titaniums were TI, but new Titanium Rockets are also XW. These changes were rolled in over an extended period of time.
If you cannot log into a device to check the board version, it is safe to attempt the wrong firmware first. You will only see an error.
airMAX AC
Identify if your airMAX AC product uses XC or WA platform by looking at the firmware version in your device'smaintab. The device's platform, as well as the firmware version will appear in the top bar of the UI as well as in the version line.
XC devices will display an "XC" next to the firmware version. In the example above, the firmware is 8.0.2 and uses the XC platform.On the other hand, WA devices will show a "WA" next to the firmware version.
For those rare cases where logging into the device is not possible, use this table to see which firmware is required for each AC device.
airMAX AC Board List
XC
WA
2XC
2WA
R5AC-Lite
PBE-5AC-300
R2AC
NBE-2AC-13
R5AC-PTP
PBE-5AC-400
PBE-2AC-400
R5AC-PTMP
PBE-5AC-300-ISO
PBE-5AC-500
PBE-5AC-400-ISO
PBE-5AC-620
NS-5ACL
PBE-5AC-500-ISO
NS-5AC-GEN2
R5-AC-PRISM
NBE-5AC-16
PS-5AC
IS-5AC
LBE-5AC-23
NBE-5AC-GEN2 (Single ethernet port)
LBE-AC-16-120
RP-5AC-GEN2
LAP-GPS
NBE-5AC-19
LBE-5AC-LR
LBE-5AC-GEN2
NBE-5AC-GEN2 (Dual ethernet port)
PBE-5AC-GEN2
PBE-5AC-ISO-GEN2
How to Download the Correct Firmware
Back to Top
1. Download the latest firmware for your device from https://www.ubnt.com/download.
2. Use the left hand menu to go to the airMAX M or airMAX AC section, depending on your device, and select your product from the list.
3. Click on the correct firmware, selecting the correct board: airMAX M's XM or XW, and airMAX AC's XC or WA. In some cases, the board firmware version number could be different. In all cases, it's recommended to have the latest firmware version available for your device's platform.
ATTENTION: If you attempt to install the wrong firmware on your device, the following error message will be displayed: "Please check that you have selected the correct firmware architecture for your device."
Related Articles
Back to Top
View ArticleOverview
This short guide describes how to retrieve a list of all the UNMS login names and how to perform password recovery when needed.This method should be used when email password recovery is not possible.
Password recovery (0.14.0+)
Back to Top
In version 0.14.0 we changed the password recovery to have the same format as the rest of UNMS CLI commands. To change a user's password, specify the username as a parameter and enter a new password when asked:
sudo ~unms/app/unms-cli set-password --username <username>
In case of any issues with two-factor authentication this command can be used to completely disable it:
sudo ~unms/app/unms-cli disable-two-factor --username <username>
Another new feature is the role of the super admin. When it is necessary to set super admin from outside of UNMS GUI, this command is available
sudo ~unms/app/unms-cli set-superadmin --username <username>
UNMS - How to Find Logs and Report Bugs
NOTE:It is possible to use all of the commands above without the --username tag, to display the list of users instead of changing their password or disabling 2FA for them.
Related Articles
Back to Top
View ArticleOverview
This article will explain in detail how to use the UniFi Site Export Wizard to quickly and easily export sites from one Controller (including configuration and devices) to another.
UniFi - Device Adoption Methods for Remote UniFi Controllers
NOTES & REQUIREMENTS:
The Site Export Wizard is compatible with UniFi Controller versions 5.4.11 and above.
The new Controller version (the one you will be migrating the site to) must be the same or newer than the original Controller's.
Exporting a site using the method described in this article will create a new site in your Controller. Since the default site cannot be deleted, the Controller would have two sites (as minimum). If this is not something you want, we would recommend using the "backup and restore" method described in this article: UniFi - How to Create and Restore a Backup
Table of Contents
Introduction
Steps - How to Migrate a Site with the Site Export Wizard
Related Articles
Introduction
Back to Top
The Site Export Wizard allows UniFi administrators (with Super Administrator roles only) to export sites from one UniFi Controller to be managed by a different or new UniFi Controller. This was previously possible with manual configuration, but thewizard offers a more convenient, anduser-friendly way to do this. This process can work to/from any type of UniFi Controller including locally hosted Controllers, Cloud Keys, and UniFi Cloud Controllers, so long as Controller version is 5.4.11 or later.
IMPORTANT:It is important to note that the Site Export Wizard is not meant to be used to create a complete backup or to perform a restoration via the setup wizard since it does not include the admin accounts or credential information.
The migration process is virtually seamless, with a downtime of about a minute as devices provision anda few minutes for devices to appear in the new controller between steps 10 and 11 when changing the "inform URL".
How-to/Instructions
Back to Top
NOTE:To minimizecomplications, make sure to complete every step of the process and to not skip any steps. Please verify that the new Controller version (the one you will be migrating the site to) is the same or newer than the original Controller's.
To get started, open the Controller and site that is to be exported.
1.Go to Settings > Site
2.Select the gray “Export Site” button in the bottom-right of the page. This will initiate the wizard.
3.In the first step, click “Download Backup File” to download the file that contains the site configuration to be imported into the Controller you are migrating to.
4.Next, import this site into the new controller. To do so, open up the second controller web UI, click “Current Site - (Site Name)” in top-right of the display. Within this drop-down box select “Import Site” as shown:
5. The site input will need a name(itdoes not have to match the original site name). Once the site has been named, select “Choose file” and select the backup file that was just downloaded i.e. "5.9.29_default.unf"
6. Once the import has finished, a confirmation that the site was imported will appear. Once the import step has been completed, go back to the export controller and click "confirm".
7. Once import step has been completed (step 5) click "Confirm".
The following steps will migrate the devices. To do so:
8.First, find the URL or IP of the destination Controller. In this case, the new controller has an IP of 192.168.1.8. So that is what is entered into the "Custom Inform URL" input field.
9.Next, select the devices that are to migrated over by clicking the boxes next to one otherwise select the entire group.
10.Click “Migrate Devices”.
11.As the last step verify that all devices are connected to the new controller and are visible on the devices page. Note this may take a few minutes. Once verification of the devices showing "connected" in the new controller site select "forget devices".
IMPORTANT: Verify that the devices are visible and appear as connected in the new Controller's Devices section before clickingForget Devices.
Once the site export wizard has completed with success, the devices will be configurable in the new controller. At this time, unless the site was a default site, it should be safe to remove the site from the previous controller.
Related Articles
Back to Top
UniFi - How to Create and Restore a Backup
UniFi - Advanced Adoption of a "Managed By Other" UAP
View ArticleOverview
Before beginning a Return Merchandise Authorization (RMA) process, please follow these three basic troubleshooting steps to ensure the device is truly defective.
Steps to Troubleshoot a Defective Device
Back to Top
1. Power the unit using the designated power supply as described in the product's Quick Start Guide (found in the Downloads page or at the bottom of each specific product page).
If the devicedoes not power onand is still under warranty, please begin an RMA process by filling out this form: https://rma.ui.com/
If devicedoes power on, proceed to step 2.
2. Factory default the unit as described in the product's Quick Start Guide, or you can also find specific articles in the Troubleshooting section of each product category.
3. Access the user interface of the device.
3.1. Make sure the device is powered on and connected via a working ethernet cable to a computer.
3.2. Follow the configuration instructions found at the end of the product's Quick Start Guide to access the User Interface and proceed with setup. The Configuration section name can vary product to product, but it will usually be found after the Hardware Installation section and before the Specifications table.
Where is my MAC ID and Date Code?
NOTE: ForUniFi and UniFi Video products make sure to have the Controller software running on the latest version, thensimply power on the unit and see if the unit is adoptable/manageable in the Controller devices section, as described in the UniFi User Guide or the UniFi Video User Guide.
4. If issues continue make sure to check if any cables are at fault: perform same steps with a different Ethernet cable, using another power supply or PoE port.
Related Articles
Back to Top
View ArticleOverview
This is a complete guide for designing the best deployment for a high-density environment. The article is divided in Planning, Design, Deployment, and Config. For information on what UniFi Access Points (UAPs) to select for a high density deployment, please see the UniFi - Access Point Comparison Charts article.
Table of Contents
Introduction
Planning
Application Requirements
User Bandwidth
WLAN Capacity
Design
Cell Sizing & Channel Patterns
Minimizing Interference
Deployment
Access Point Placement
Wireless Site Surveys
Configuration of the UniFi Controller
Recommendations for High-Density WLANs
Related Articles
Introduction
Back to Top
This article will provide a detailed explanation of the concepts/principles behind high-density Wi-Fi deployments. For users who are already comfortable with their understanding of the basics, we have added a brief list of configuration recommendations/advanced tips for high-density UniFi deployments. Click here to proceed to this section.
What is High-Density Wireless?
By definition, High-Density (HD) wireless scenarios refer to WLANs whose coverage area contains a relatively high concentration of APs and connected client devices. As mobile networking trends toward scenarios where users carry multiple client devices, HD WLANs become increasingly more commonplace. Therefore, WLAN administrators tasked with designing a successful HD network can do so using Ubiquiti’s UniFi platform, provided they carefully consider and account for all of the unique design variables surrounding the enterprise project.
UniFi Demo Simulator - FedEx Forum Site
Throughout the HD WLAN Design Guide, we’ll reference the “FedEx Forum” Site, inside the UniFi Demo Simulator. The “FedEx Forum” Site mimics a real-world HD deployment that supports more than 7,000 simultaneous Wi-Fi users today: https://demo.ubnt.com
Why HD WLANs Generally Fail?
Ubiquiti identifies three major areas that impact the performance of every HD WLAN deployment:
Problem Area
Description
Solution
Broadcast/Multicast Domain Control
Uncontrolled network traffic jeopardizes airtime, resulting in decreased speed, increased latency, and potential connectivity problems.
Besides assigning VLANs to WLANs, configure Port Isolation at the switch layer to limit unnecessary traffic and conserve precious airtime available to stations in the HD WLAN.
WLAN Planning & Design
Inadequate and improper planning/design physically inhibits wireless performance and cripples user activity on the network.
Carefully anticipate and plan for network capacity parallel to the user requirements for the HD WLAN prior to methodically designing the coverage area with proper channel reuse patterns.
Site Survey, Analysis, & System Characterization
Lackadaisical attention of the RF environment results in careless placement and inept configuration of APs for poor wireless performance.
Before, during, and after deployment, consciously track, measure, and evaluate signals, noise, traffic, and other metrics to optimize the HD WLAN accordingly.
Planning: Application Requirements
Back to Top
The Purpose of the HD WLAN
Regardless of user density, the purpose of every WLAN is to support the wireless users’ application requirements. Therefore, the very first step when planning for the WLAN is to understand the user applications and behavior. Typical projects involving HD WLANs include stadiums, auditoriums, concerts, and other events where a high volume of users gather across the coverage area. The most common applications for these HD scenarios range from social media to live video/VoIP streams to simple web browsing. Consequently, use of these applications may see varied levels of activity due to the nature of the event, such as with spontaneous traffic bursts (e.g., everyone posts to social media during breaks) or as more constant streams of data (e.g., students taking notes in a lecture hall).
Core Applications Define Planning & Design
Recognizing the core applications and types of users on the network, begin to plan and design the HD WLAN with regards for the unique limitations and requirements of the planned project. For example, the performance of latency-sensitive applications like VoIP can degrade as WLAN usage reaches peak levels. Why? Because the wireless channel is shared among all nearby, active stations, an 802.11 station (i.e., the VoIP user) must ‘wait’ to transmit until the channel is free of activity. Fundamentally speaking, the principal applications and services on the network dictate the architecture and design of the WLAN, especially in HD scenarios.
Realistic WLAN Planning/Design
Can a WLAN simultaneously support latency-sensitive applications, as well as high bandwidth users? With total control over all of the variables affecting the WLAN, including client devices and the physical environment for deployment, the realization of both objectives in a single, culminating project becomes more realistic. When faced however with “bring your own device” (BYOD) scenarios, as HD WLANs often are limited control over environmental variables during planning, forces the network to choose between supporting high throughput or low latency applications.
Planning: User Bandwidth
Back to Top
Client Traffic Analysis via UniFi DPI
Following deployment, enterprise network administrators can take advantage of the Deep-Packet Inspection (DPI) engine running on the UniFi Security Gateway (USG) to review the applications in use by client devices on the network. The UniFi Controller summarizes the total bandwidth consumed by the user applications, as well as the individual activity of users, so WLAN administrators can make firewall and other configuration changes to improve the performance of the network.
What is “Service Level Assurance”?
Prior to deployment, however, anticipate which applications will be serviced by the HD WLAN to develop a plan for “Service Level Assurance” (SLA) ahead of estimating the “Per-Client Bandwidth”. A clearly-defined SLA identifies the primary applications and services to be supported on the intended network (such as VoIP or YouTube), and therefore, guides the early stages of planning and designing the WLAN architecture. Keep in mind that although low-end VoIP and video calls require minimal bandwidth, their tolerance for latency is also much lower, and therefore are designed uniquely. Although UniFi APs give “Quality of Service” (QoS) priority to such traffic (per WMM standards), initial planning/design for the HD WLAN should cater to the specific needs of the applications.
Create an SLA for the HD WLAN
To help formulate the SLA for the users on our unique HD WLAN, let’s reference the client device “current-e58ba353” as a baseline example. A quick analysis of the DPI section under the UniFi Client Properties tab reveals its top three applications to be:
Web Browsing
Social Media, and,
Video Download.
“Application Requirements” Data Table
The following “Application Requirements” table relates info about the speed and connection required to service some of the most popular applications used in today’s WLANs.
Type
Example
Bandwidth (Mbps)
Latency Tolerance
Packet Flux
Email & Instant Messenger
Gmail, Messages
0.1
High
Bursty
VoIP
Skype Audio Call
0.1
Low
Constant
Podcast/Radio Download
Pandora, Spotify
0.2
Medium
Bursty
Social Media
Instagram, Facebook
0.25
High
Bursty
Video Call
Skype Video (Low)
0.3
Low
Constant
Skype Video (High)
0.5
Low
Skype Video (HD)
1.5
Low
Web Browsing
Wikipedia, Google Web Results
0.5
High
Bursty
Reddit, Google Image Results
1
High
Bursty
Video Download
YouTube 240p
0.4
Medium
Bursty
YouTube 360p
0.75
YouTube 480p
1
YouTube 720p
2.5
YouTube 1080p
4.5
Online Gaming
League of Legends
2
Low
Constant
Internet TV
Netflix 720p
4
Low
Bursty
Netflix 1080p
5
Low
Bursty
File Sharing
BitTorrent
10
High
Bursty
File Backups
Dropbox
10
High
Bursty
SLA for Multitasking & Multiple Users Types
In some WLAN scenarios, the SLA may seek to support a variety of user types, or even multiple applications per client device (i.e., network multitasking, background services), and should, therefore, sum together the total Bandwidth required for each application.
“Application A Bandwidth + Application B Bandwidth + Application C Bandwidth + ”
“Per-Client Bandwidth”
For purposes of our HD WLAN example, our SLA assumes that the user (guest) is single-tasking, and therefore, seeks to support the most bandwidth intensive application used by client “current-e58ba353”: Video Download (0.3-4.5Mbps, with 1Mbps, assumed for mobile resolution playback). This means that the “Per-Client Bandwidth” (that is, the HD WLAN’s SLA) is approximate 1Mbps.
“Maximum Aggregate Throughput Requirement”
To discover the “Maximum Aggregate Throughput Requirement,” that is, the total amount of bandwidth needed for the HD WLAN to support ALL client devices simultaneously, multiply the “Per-Client Bandwidth Requirement” (1Mbps) by the “Total Number of Client Devices” (the “FedEx Forum” has a seating of 18,119). While not all 18,119 in attendance will bring one mobile device to the event, planning for future growth is an important consideration for every WLAN.
“Per-Client Bandwidth Requirement” x “Total Number of Client Devices” = “Aggregate User Throughput Requirement”
(1Mbps) x 18,119 Clients = 18,119Mbps Aggregate
“Expected Peak Aggregate Throughput”
Therefore, the “Maximum Aggregate Throughput” at the “FedEx Forum” is 18,119Mbps. However, since it is impractical to assume that all 18,119 will ever pass traffic simultaneously, let’s multiply the “Expected Peak Usage” (let’s estimate 50\% of total attendance) by the “Maximum Aggregate Throughput Requirement” to determine the “Expected Aggregate Throughput”.
“Maximum Aggregate Throughput Requirement” x “Expected Peak Usage” = “Expected Peak Aggregate Throughput”
(18,119Mbps) x (50\%) = 9059.5Mbps “Expected Peak Aggregate Throughput”
Later on, the “Expected Peak Aggregate Throughput” value will directly help to estimate the minimum number of Access Points required for the HD WLAN deployment.
Upstream Data Links
The ~9Gbps of data passed on the HD WLAN by the guest users is Internet traffic, and therefore, the upstream pipe to the ISP should support the “Expected Peak Aggregate Throughput” to account for the offered SLA at the event. Throughout the HD WLAN, make sure that upstream network infrastructure (e.g., switches) accommodates the traffic bandwidth downstream (i.e., aggregation switches at the core, access switches at the edge).
Planning: WLAN Capacity
Back to Top
What is Capacity?
In the context of all WLANs, capacity is defined as the data rates supported by an AP and its respective clients. Capacity is, therefore, twofold dependent on the characteristics of both client devices and APs (hereafter called “stations”). By anticipating and analyzing the characteristics of stations, we can accurately calculate the capacity of the network in order to estimate the total number of access points required to support the planned HD WLAN.
Choose the Best AP Possible
Although “bring your own device” (BYOD) scenarios mean client devices cannot be consciously chosen, fortunately, WLAN administrators can select access points whose wireless characteristics offer the best performance to match their particular HD WLAN scenarios. This is also important to ensure that the HD WLAN has longevity through down-the-road support for the client devices of today and tomorrow.
For example, the UAP-AC-M unit supports versatile coverage options through external connectors for pairing with directional antennas. By pairing the UAP-AC-M with a 45 airMAX sector antenna, WLAN administrators can produce small, controlled 5GHz cellsideal in certain HD WLAN scenarios. By comparison, the omnidirectional antennas and mounting capabilities make the UAP-HD well-suited for low-ceiling and wall deployments, while the UAP-AC-M (a Wave 1 “Single User” (SU) MIMO AP) is ideal for high-vaulted ceilings seen in auditoriums, stadiums, and concert halls.Please see the UniFi - Access Point Comparison Charts article for information on the complete HD and Mesh lines.
WLAN Capacity Variables
To review, there are five variables that determine the supported data rates of a WLAN, including:
802.11 Protocol - the hardware standard characterizing the 802.11 stations on the WLAN (a, b, g, n, ac Wave 1, ac Wave 2). As a backward-compatible AP, the UAP-HD immediately serves in HD deployments today, while anticipating growth as WLANs scale to support more client devices for years to come.
Spatial Streams - the total number of data streams simultaneously transmitted and received by the AP and clients. “Multiple In, Multiple Out” (MIMO) operation traditionally has been limited by the supported data streams of the single client with whom the AP communicates. As a Wave 2 802.11ac access point, the UAP-HD boosts the available airtime through true “Multi-User” MIMO mode, concurrently pushing up to 8 streams of data to clusters of 2G & 5G clients. And since most client devices opt for fewer antennas (i.e., fewer spatial streams) to conserve battery life, the UAP-HD’s MU-MIMO technology is critically important to ensuring maximum WLAN performance.
Channel Width - the bandwidth over which an AP and its clients transmit data signals (20/40/80 MHz). While 40/80 MHz channels are tempting, HD WLANs dictate the use of 20 MHz channel widths to conserve the number of channels available for reuse during deployment (especially true in extreme HD scenarios). In contrast, larger channel widths in HD scenarios generally creates a fundamentally flawed WLAN design where closely-placed AP cells operating on same or nearby channels see degraded SNR performance and increased contention for use of the wireless channel.
Signal-to-Noise Ratio (SNR) - the difference in receive signal (the desired data signal) and noise (the combined level of in-band interference). From the point-of-view of HD networks, SNR poses the greatest threat to performance since by nature, densely-packed WLANs face greater interference. In order to ensure strong SNR levels for clients, HD WLANs necessitate careful cell planning, including methodical channel assignments, very low, controlled transmit power levels, and precisely deployed AP locations.
Guard Intervals (GI) - 802.11n/ac WLANs support “long” and “short” waiting periods between transmitted symbols (data). Although a short GI is desirable, UniFi APs automatically toggle between “long” and “short” GI depending on the WLAN performance.
PHY Rates vs. Throughput
Now that we have identified the factors that determine capacity, it's important to distinguish that these are physical-layer (PHY) data rates. What does this mean? Due to overhead in the 802.11 protocol, the actual amount of real TCP data payload sent over wireless signals is approximately half of the advertised PHY rates. When estimating the capacity of the HD WLAN, we’ll factor a 50\% reduction of the calculated PHY rates to align with speed results experienced in the real world.
Estimate Client Throughput
Returning to “current-e58ba353” as our baseline example, the reported 72.2Mbps PHY rate assumes that a ‘typical’ client device is characterized as:
An 802.11n client device,
With a single (1x1) data stream,
Operating on a 20MHz channel,
With the best SNR,
And short GI.
By cutting the PHY rate in half (72.2Mbps), we estimate that for the planned HD WLAN, the “Achievable Real-World Client Throughput” of 36.1Mbps.
Estimate Minimum Required APs
By dividing the total “Aggregate User Throughput Requirement” (9059.5Mbps) by the “Achievable Real-World Client Throughput” (36.1Mbps), we calculate 251 radios (rounded up from 250.955679) as the minimum number of radios required to service the HD WLAN.
“Aggregate User Throughput Requirement” Achievable Real-World Client Throughput” = “Minimum Required Radios”
(9059.5Mbps) (36.1Mbps) = 250.955679 Radios
In some scenarios, 2G and 5G bands can and should be used. Note, however, that in many HD WLANs, such as stadiums and arenas, only 5G channels are deployed since propagation characteristics make 2G difficult to control.
Therefore, a “Minimum AP Estimate” of 251 APs could satisfy the capacity requirements for the “FedEx Forum” site, based on the following assumptions:
Full person attendance at the event is 18,119.
“User-to-Client Device” ratio is 1:1.
“Total Client Devices” at the event is 18,119.
“Expected Peak Usage” is 50\%.
“Expected Peak Aggregate Throughput” is 9059.5Mbps.
‘Typical’ client device is 802.11n, 1x1, with strong SNR.
WLAN operates on 20 MHz channels with short Guard Intervals.
“Achievable Real-World Client Throughput” is 36.1Mbps.
Capacity Conclusions
The “Minimum AP Estimate” is a function of two capacity variables: “Aggregate User Throughput Requirement” and “Achievable Real-World Client Throughput”. In simpler words, a client’s speed and bandwidth requirements directly affect the capacity offered by an AP. Increased client speeds (e.g., more spatial streams, improved SNR) means fewer APs are required since each AP reaches greater capacity. Conversely, decreased client speeds means more APs are required. And bandwidth consumption on the network increases, more capacity is needed to support user applications, thereby requiring more APs.
Theoretical vs. Actual APs Deployed
As a theoretical number, the “Minimum AP Estimate” gives network administrators starting point as they undertake the important task of designing the HD WLAN. The actual number of APs deployed will depend on a broad range of physical factors noted during site visits, floor plan analysis, as well as site surveys conducted at the intended HD WLAN site.
Design: Cell Sizing & Channel Patterns
Back to Top
Capacity, Coverage & “Cells”
Recall that WLAN capacity is directly dependent on the SNR of stations across the wireless coverage area. The primary design objective of each HD WLAN is to limit the coverage area provided by each AP (hereafter called “cells”), then apply an effective channel reuse pattern to ensure a high SNR for every station. HD WLANs perform poorly when AP cells are overextended or if channel reuse patterns are not respected.
2G/5G Characteristics
Although the 2.4GHz band contains eleven 20MHz channels on which a WLAN can operate, only 3 may be used in a non-overlapping channel pattern: 1, 6, and 11. By contrast, the 5G band supports over 20 non-overlapping 20MHz channels, depending on the region. The availability of more channels gives the 5G band a distinct advantage in limiting the interference of neighbor cells through more flexible channel reuse patterns. And due to propagation characteristics, certain HD WLANs may only deploy on 5G channels, especially in open settings like stadium and arena, where controlling the effective size of a 2G cell can be physically challenging.
Cell Characteristics
There are seven fundamental points to consider that can affect a cell’s coverage area:
Factor
Description
HD WLAN Recommendation
Frequency
Due to “Free Space Path Loss”, 2G signals propagate farther than 5G.
Deploy on 5Guse 2G with extreme discretion.
Channel Width
Increased channel width (e.g., 80MHz) means decreased range for signals.
From the standpoint of channel reuse patterns, only use 20 MHz channels.
Transmit Power
High transmit power increases an AP’s coverage area.
Reduce transmit power to “Low” to for small, controlled cells.
Antenna
Antenna gain influences the directivity and size
Consider UAP-AC-M with directional antenna capability in areas with ceilings 25 feet or higher should.
Obstacles
Obstacles attenuate signals at different rates and influence the propagation behavior of signals (e.g., reflect, absorb, scatter).
Consider the structural elements at the site when choosing how and where APs will be mounted since walls can help control cell size.
Clients
Like APs, client devices also transmit and generate signals.
Implement strict channel reuse patterns and limit overlap between neighbor cells.
DFS Channels
In the 5G band, Dynamic Frequency Selection (DFS) operation requires APs stop broadcasting if radar signatures are detected. As part of the site survey, WLAN administrators must scan these channels prior to deployment and for planning. Whenever possible, include DFS channels in the HD WLAN design for a more robust channel reuse pattern.
Floor Plan Example
The FedEx Forumfloor plan shows the wireless cells of 118 UAP-AC-M deployed for high-density coverage. The 5G heatmap shown belowuses very lowtransmitpower levels and directional antennas to create distinct coverage areas with the strongest possible SNR for clients. Often, in environments like stadiums or arenas,disabling the 2G radiosacross the AP networkis desirable toavoid poor scalability and exaggerated noise/interference levels, colloquially described as "fishbowl effect".
UniFi - Access Point Comparison Charts
In order to design a working HD WLAN, consider these three fundamental characteristics:
Characteristic
Reason
Diagram
Small, controlled cell sizes
Each coverage area features a distinguishable channel for high SNR
(i.e., channel 1 inside daisy flower of 6 & 11 around perimeter...show client SNR from Channel 1 = SNR Strong, Channel 6/11 weak -80)
Neighbor cells (2G/5G) never use the same channel
Avoid channel contention by two competing stations
(i.e., station 1 & station 2 in overlapping AP cells, both on channel 6)
Neighbor cells (5G) assigned non-adjacent channels
Improve SNR inside the cell
(i.e., Channel 36 & 165 instead of 36 & 40
Adjacent channels refer to WLAN channels whose bandwidth (channel width) edges touch. By contrast, non-adjacent channels are WLAN channels whose bandwidth edges are spaced with 20 MHz or more. For example, 5G channels 36 and 40 are adjacent channels; 36 and 44, non-adjacent channels. When deployed on neighbor and overlapping cells, non-adjacent channels see better performance, a principle that holds especially true in HD WLANs, where the combined total of competing, in-band signals is much higher. The adjacency of 2G channels 1, 6, and 11 causes SNR to degrade quickly, giving 5G the advantage in HD WLAN scenarios.
Design: MinimizeInterference
Back to Top
Interference & HD WLANs
Interference represents the total amount of competing, in-band signals that prevent a station from ‘hearing’ the intended receive signal with clarity. The extreme proximity of so many client devices on adjacent and non-adjacent channels increases interference levels, and therefore, reduces SNR and performance across the HD WLAN service area. When properly designed, an HD WLAN ensures each connected client device has a strong SNR, while mitigating the potential for collisions and limiting the impact of in-band interference.
What is Co-Channel Interference?
Whenever WLAN administrators deploy two neighbor AP cells on the same channel, the overlapping coverage areas encounter Co-Channel Interference (CCI). With the resulting transmit collisions that occur as a result of CCI, stations must retransmit data, which results in decreased speeds, increased latency, and problems for client device connectivity. This is due to the Clear Channel Assessment (CCA) mechanism, which requires an 802.11 station to listen prior to transmission, and yields the channel in case a station is already transmitting on the wireless channel. An HD WLAN with poor channel design and uncontrolled coverage areas will suffer as CCI plagues the wireless network. Conversely, HD WLANs that deploy AP cells with strict channel reuse patterns and controlled coverage areas can avoid CCI in the wireless network.
What is Adjacent Channel Interference?
Although CCI is largely avoidable in a properly designed, well-controlled wireless network, Adjacent Channel Interference (ACI) presents a significantly greater challenge for HD WLANs, and is not easily countered. ACI describes the overall increase in interfering, in-band wireless signals faced by stations as multiple AP cells are placed in relatively close proximity. By overextending the coverage area in a dense wireless setting, ACI increases aggressively throughout the HD WLAN, thereby reducing SNR levels for client devices, and dropping speeds dramatically. More generally, ACI speaks to the type of interference generated along the ‘tail-ends’ of an 802.11 transmission, which raise noise levels for other nearby in-band stations. Because adjacent channels (i.e., 36 & 40) suffer greater interference levels than non-adjacent channels (i.e., 36 & 165), the channel design for HD WLANs should position AP cells on adjacent channels as distantly as possible.
Best Practices for HD WLAN
To review, an HD WLAN should follow a series of best design practices:
Characteristic
Reason
Diagram
Small, controlled cell sizes
Each coverage area features a distinguishable channel for high SNR
(i.e., channel 1 inside daisy flower of 6 & 11 around perimeter...show client SNR from Channel 1 = SNR Strong, Channel 6/11 weak -80)
Neighbor cells (2G/5G) never use the same channel
Avoid channel contention (CCI) by two competing stations
(i.e., station 1 & station 2 in overlapping AP cells, both on channel 6)
Neighbor cells (5G) assigned non-adjacent channels
Control ACI and maintain high SNR inside the cell
(i.e., Channel 36 & 165 instead of 36 & 40
Deployment: AP Placement
Back to Top
Omnidirectional Antennas
In general, most client devices, as well as all UniFi Access Points, feature antennas that are omnidirectional. Similar to a light-bulb, omnidirectional antennas radiate wireless signals in all directions. More specifically, however, the coverage area produced by an omnidirectional antenna looks similar to a donut pattern, with peak signal strength nearest to the center of the donut, and weaker signals at the edges of the ‘cell’. Recognizing that not only UAPs but client devices radiate signals in all directions is crucially important to understanding interference from all station types contributes to the SNR across the HD WLAN coverage area.
Ceiling & Wall Mounted APs
Indoor UniFi Access Points like UAP-HD and UAP-AC-PRO feature easy mount fixtures for quick installation into walls and ceiling tiles. The UAP-HD provides excellent wireless coverage in extremely dense indoor with ceilings under 25 feet height. Although the antenna coverage pattern of each indoor UAP is similar, understand that reflective surfaces and multipath effects in crowded, more dense settings can result in unexpected signal readings from distant and/or nearby APs, therefore necessitating careful cell adjustments based on site survey analysis.
Directional Antennas
Alternatively, directional antennas can be paired with select UniFi Access Points like UAP-AC-M to produce distinct, controlled coverage areas, making them very popular in outdoor or open indoor settings. When mounting UAPs in open rooms with high ceilings (25 feet and higher), omnidirectional antennas are incapable of producing distinct coverage areas vital in the design of the HD WLANs. Instead, pair the UAP-AC-M with directional antennas pointed at specific areas of the HD WLAN event to produce controlled areas of coverage with robust SNR. Note that when using 5GHz directional antennas with the UAP-AC-M that the 2G radio should be disabled.
“Under Seat” APs
An increasing more popular AP placement trend in today’s HD WLANs, such as seated sporting events, is mounting APs below users in attendance. By securely installing an AP in a locked box under seats or within the building foundations itself, this coverage technique seeks to improve the SNR of client devices by placing APs in closer to the users themselves. The “under seat” technique, however, presents new challenges for the HD WLAN, including coverage overextension during low attendance events, since fewer users mean fewer bodies attenuating (controlling) the size of each wireless cell.
Deployment: Wireless Site Surveys
Back to Top
Site Visit
While important during the planning phase, visiting theHD WLAN sitebefore and after deploymentis totally necessary in order to criticallyassess the area fordesign and installation guidelines, as well as to conductcrucial site surveys to gather RF information needed forchannel assignment.Although the UniFi Controller supports RF scanning with second-generation UniFi Access Points, be sureto also bring sample client devices with spectrum analysis and WLAN scanning software, as well as cameras to document the key areas involved in deployments, such asinstallation areas, potentially problematicregions, and cable drops.
Map, Topology & Deployment
After visiting the intended deployment site and making adjustments to the final channel plan, WLAN administrators can begin to install UAPs. In addition to the high capacity requirements at HD wireless events, the same-channel requirement for two neighbor UAPs to perform a Wireless Uplink make this topology inappropriate for HD WLANs. Instead, connect each UAP via wired Ethernet cables back to UniFi Switches to support the bandwidth requirements at both the access and core layers of the network.
Site Walkthrough
After supplying POE to the UAPs and updating with the intended channel pattern, consider defining simple SSIDs to uniquely identify each UAP as you walk around the HD WLAN coverage area. With any site walkthrough, you should carry a sample client device (anticipated at the time of HD WLAN Planning) to measure and track the most important metrics throughout and across the coverage area including signal strength, noise floor, and SNR. Since the purpose of the initial site walkthrough is to establish, define, and adjust the intended wireless coverage area, be sure to also bring a laptop make immediate configuration changes to the deployed UAPs as well.
Controller Tips for Site Surveys
As part of the Site Walkthroughs, consider using the WLAN Override function to temporarily rename the primary SSID broadcast by each AP to uniquely identify each individual cell to the client device performing the Site Survey. To tweak the HD WLAN coverage area between events, create a backup of the Site that contains the “one-SSID-per-AP-radio” naming convention.
Client Benchmarking
The UniFi Mobile App allows WLAN administrators to collect the most important metrics conducted during the Site Survey, including signal strength and noise levels. Following deployment, use the UniFi Speed Test as well as intended applications during live events to ensure that client devices support the SLA requirements for the HD WLAN.
UniFi RF Scanning
In order to make educated decisions regarding channel operation throughout the wireless network, WLAN administrators must study and analyze the RF environment within the HD WLAN. Before and after deployment, use the RF Scan tool to conduct a spectral analysis from the perspective of each UAP. During the RF Scan, the UAP radio will stop broadcasting WLANs for up to 5 minutes in order to ‘listen’ the RF environment. Following the RF Scan, the UAP radio reports two important characteristics needed to the level of interference as well as utilization percentage. Based on the results of each scan, record, re-plan, and reassign channels before reevaluating the RF environment of the HD WLAN. Be sure to run the RF Scan tool on all APs individually, but not simultaneously, otherwise, the data presented by the spectral analysis will not accurately represent the RF environment in which the HD WLAN operates (furthermore, all clients will experience connectivity issues).
UniFi Statistics & Insights
The UniFi Controller gathers and reports the most important Client and WLAN information in real-time needed to make ‘on-the-fly’ changes to the wireless network under management. Here are a few of the most important in-Controller Statistics and Insights to review from the perspective of HD WLANs.
UniFi Info
Description
Recommendation
Traffic Statistics
Relates the aggregate network bandwidth consumed on the network.
Ensure that the aggregate traffic statistics match WLAN capacity plans, otherwise add/remove UAPs as needed.
User Activity
Relates the level of activity and bandwidth consumed by individual users.
Enforce stricter traffic shaping policies to high-activity client devices to minimize their negative effect on the HD WLAN.
Deep-Packet Inspection
Relates information about the applications in use on the network.
Create traffic-shaping and/or firewall rules to limit or eliminate the negative effect of select apps on the HD WLAN.
Configuration of the UniFi Controller
Back to Top
Broadcast/Multicast Control
When left unchecked, broadcast and multicast network traffic can severely reduce the available airtime on the HD WLAN, leading to a decrease in speed, increase in latency, and potential connectivity problems for clients. Consider segmenting the wired and wireless portions of the network through VLAN assignment at the time of WLAN creation. Alternatively Port Isolation at the switch layer to limit unnecessary traffic and conserve precious airtime available to stations in the HD WLAN.
SSIDs
To ensure maximum Access Points make efficient use of airtime, limiting the number of SSIDs announced throughout the HD WLAN is a vital detail. Although UAPs support up to 4 SSIDs per radio band, most scenarios (including HD WLANs) only require two SSIDs to support two types of security: Open for ‘Guests’ and WPA2-PSK or -EAP for trusted, ‘Corporate’ users). For client roaming reasons, use the same SSIDs throughout the entire HD WLAN coverage area (e.g., SSID-event) rather than complicated naming schemes (e.g., SSID-11th-floor, SSID-lobby). Any SSID that serves a nominal purpose separate from the capacity objectives of the HD WLAN (e.g., SSID-admins) does not warrant existence.
Traffic Shaping
To limit the impact of data-hungry users and applications that jeopardize the availability of bandwidth and airtime on the HD WLAN, define widespread rate limits (in Mbps) via the User Groups feature. Speed limits that are too strict can detrimentally affect the performance of the wireless network, while too high of speed limits the effectiveness of traffic shaping.
Minimum RSSI
Following association and/or when roaming in the HD WLAN coverage area, client devices negotiating at low speeds (due to long distance from the AP) have a negative impact on the aggregate performance of the wireless cell through poor airtime efficiency. Therefore, proper design and architecture of HD WLANs paired with signal threshold levels help ensure that clients remain connected to the intended AP cell offering them the best performance. When defining the Minimum RSSI setting, WLAN administrators must be careful, since too strict threshold levels can result in severe, widespread connectivity problems that cripple user activity on the network. For HD WLANs, Ubiquiti recommends setting the Minimum RSSI to no greater than -75 dBm, where lower thresholds levels (e.g., -80 dBm) mean clients will remain connected to the AP at greater distances from the center of the cell coverage area. Because UniFi Minimum RSSI uses a ‘soft’ kick implementation, whether or not the station disassociates from the AP is ultimately determined by the client device itself.
Band Steering
Although an increasing number of client devices today support and even prefer 5G operation, balancing the client activity between wireless bands often fail in large part due to the strong signals and propagation characteristics of the 2G band. In dual-band HD WLAN scenarios, therefore, steering capable wireless clients to the 5G band is a particularly vital configuration setting to avoid 2G band congestion. Because UniFi Band Steering uses a ‘soft’ steering implementation, whether or not the station associates and remain connected to the 5G band is ultimately the decision of the client device itself.
Load-Balancing
The unpredictability introduced by variables like user attendance and roaming can often result in scattered wireless activity through the HD WLAN. While an emphasis on proper design, architecture, and AP placement precedes and carries more importance than post-deployment configuration ‘tricks’, the UniFi load-balancing technique defines a soft user-ceiling whereby APs attempt to kick the clients with the weakest signals until the total number of associated clients returns to the defined threshold. Because UniFi load-balancing uses a ‘soft’ kick implementation, whether or not the station disassociates from the AP is ultimately determined by the client device itself.
802.11 Rate Configuration
In High-Density WLANs, where airtime efficiency is critically important to the overall performance of the wireless network, carefully consider adjusting the 802.11 RATE AND BEACON CONTROLSalbeit with extreme caution. Improper configuration of this advanced feature can lead to disruptive performance or widespread connectivity problems for clients throughout the WLAN.
Disabling lower rates benefits HD-WLANs in a few important ways:
Forces “sticky” roaming clients to re-associate to another AP. If the WLAN is well-designed/implemented, the new AP to which the client roams will offer a better signal and have a twofold impact on improving that client’s speeds as well as the aggregate performance of the previous BSS, since low-rate clients no longer drag down the airtime.
Lessens the probability of channel contention (i.e., the likelihood that a transmitted signal collides with another signal being received by a receiver in the WLAN) since there is less overhead from associated clients within the BSS. With low data rates disabled, clients transfer data as quickly as possiblethen remain quiet. This frees up the WLAN for other clients that need to use the channel.
Reduces the chance of hidden nodes on the network since associated clients are within a close proximity of each other, and therefore, able to 'hear' whenever a transmitter is actively using the wireless channel.
Recommendations for High-Density WLANs
Here are some additional performance recommendations that may improve performance in high-density deployments:
1. Only use 5GHz in high-density deployments.
If used at all, 2.4GHz Wi-Fi should be only enabled on a very few number of APs/and only as an exception to the rule.
2. Enable multicast block on any VLANs with over 100 devices.
This can be done in the UniFi SDN Controller under Settings > Wireless Networks > Edit > Advanced Options, and clicking the checkbox next to "Block LAN to WLAN Multicast and Broadcast Data".
ATTENTION:You will need to whitelist any devices that require clients be able to communicate via multicast/broadcast data, such as your gateway.
3. Increase ARP Timeout on the Router.
If using a USG, this can be done by adding lines as shown in the following example to the config.gateway.json file as explained here.
ATTENTION:This is an advanced configuration and should only be considered if you are experienced and familiar with manual USG configuration process.
{
"system": {
"ip": {
"arp": {
"base-reachable-time": "7200",
"stale-time": "1200"
}
}
}
}
4. Enable minRSSI at -75 dBm, with strict minRSSI as well.
Ensure that the venue is covered with at least -60 dBm throughout all locations where it's important to have WiFi. This can be done in Devices > Config > Radios > Advanced Options under "RADIO 5G(11N/A/AC)".
ATTENTION:This is an advanced configuration and should only be considered suggested in high-density environments and for those experienced with advanced WLAN management.
Related Articles
Back to Top
View ArticleOverview
This article provides the steps to enable guest authentication with Facebook and Google+.
UniFi - Viewing Guest Connection Information
NOTES & REQUIREMENTS:
Applicable to UniFi Network Controller 5.4.2.1 and later. In order to use 3rd party guest authentication, there must have a publicly-resolvable hostname pointing to the Controller. If your company already uses a public domain, such as 'example.com', you may want to set up a subdomain such as 'portal.example.com'. There are a variety of Dynamic DNS providers where you can register a hostname, then have your router update it to your WAN IP.
Table of Contents
Introduction
Facebook App Setup
Google+ API Setup
UniFi Controller Setup
Related Articles
Introduction
Back to Top
Social media guest authentication can be enabled to allow clients to log in to a guest network using their Facebook or Google+ credentials. Start by creating a facebook app, google+ API login, or both.
Facebook App Setup
Back to Top
1. Register a Facebook App
Use the guide HERE to register a Facebook authentication app, keeping this help article open for reference.
Step 3 prompts you to choose a display name for your application. Choose a name that will represent your WiFi portal. Users will see this when authenticating. For this example, I’ll use the name "CMurphy Hotspot Login," and keep the default email, which is the email linked to my Facebook account. For Category, I’ll use Communication. Category isn’t critical here, so feel free to use a different category if it better represents your business.
You will be prompted to either enter a quick-start guide, or go back. If you click go back, you can get to the dashboard by clicking My Apps in the top right corner. Select Choose Platform > Website to begin the quick start quide.
2. Complete Facebook Website Quick Start.
Choose Website.
Under Tell us about your website, enter the domain name of your controller as the Site URL. Next, click Skip to Developer Dashboard.
3. App Settings
Navigate to Settings in the sidebar to open up the basic app settings.
App ID and App Secret will be automatically assigned to your app. Choose a Display Name and Namespace for your app - these can be anything, but users will see them when authenticating.
Under both App Domains and Site URL, enter the domain or subdomain of your controller.
You must add URLs for privacy policy and terms of service. These are required for proper function.
You can add Privacy Policy/Terms of Service to guest portal through Settings > Guest Control > Enable Terms of Service, then can use the url of your controller, for example: https://controller:8843/guest/s/<site-id>/#/tos
Replace controller with publicly accessible controller URL, and if using non-default site, replace site id with the site's unique 8-digit identifier, i.e. ryx7y4tf in the following example:
Be sure to save your changes.
4. Add Product
Next, click Add Product, then Facebook Login to create the login page.
5. Add Controller Redirect URI and Port
Under Facebook Login settings, include the following URL under "Valid OAuth redirect URIs". Use the toggle options in the below image.
Or if using http (which may not be permitted by current Facebook settings):
Replace domain.com with your publicly accessible controller URL, and site <siteid> with the 8-digit site identifier from your UniFi Controller URL, for example:
In this example, the siteid is "ryx7y4tf" and would need to be included in the URL added to the "Valid OAuth redirect URIs" in Facebook App settings:
https://unifi.exampleurl.com:8443/guest/s/ryx7y4tf/oauth.html?by=facebook
Save changes before continuing.
6. Publish App
Finally, publish the app to live, by changing the "Off" dialog button at the top of the Facebook for developers page to on.
If you are setting up Google authentication as well, continue reading. Otherwise, skip to Controller Setup.
Google+ API Setup
Back to Top
1. Enable Google Login
Use the Enable the Google+ API Guide HERE to enable Google login.
When prompted to enter the app origin, use the subdomain, followed by port 8880 (and/or 8843). Note the Client ID and Client Secret, which will be used later in the Controller Setup.
You will need to add your customized version of the following URL to Google API Credentials Settings:
If using Secure Portal (https):
https://<controller-url>:8843/guest/s/<site-id>/oauth.html?by=google
Or if you do not have Secure Portal enabled (http):
http://<controller-url>:8880/guest/s/<site-id>/oauth.html?by=google
Replace <controller-url> with your publicly accessible controller URL, and site <siteid> with either default if using the default site, or the 8-digit site identifier from your UniFi Controller URL, as in the following example:
In this example, the siteid is "ryx7y4tf" and would need to be included in the URL added to Google API settings.
2. Add Redirect URIs
The following would need to be added to Authorized redirect URIs in Google API settings:
https://unifi.exampleurl.com:8443/guest/s/ryx7y4tf/oauth.html?by=google.
If client device gets a redirect error after setup, add the redirect URI below under "Authorized redirect URIs" in the above step:
3. Enable People API for your project.
Follow Google's instructions on how to enable People API.
UniFi Controller Setup
Back to Top
1. Activate Guest Policies
Once you have configured your Facebook or Google app, open your publicly hosted controller. Begin by activating Guest Policies by navigating to Settings > Wireless Networks and making sure the Guest Policy box is checked to enable.
2. Configure the Guest Portal
2.1 Next, open Setting > Guest Control to configure the guest portal. To view these options, the "Enable Guest Portal" box must be checked.
2.2 Select Hotspot authentication.
2.3 If you wish, enter a Promotional URL to forward clients to your website after they are authenticated. Or leave it in Redirect to the original URL to allow user to continue to the website they were trying to get to.
2.4. Select Redirect using hostname, and enter the URL of your subdomain in the field provided.
2.5. Check Enable encrypted redirect URL.
2.6 Under Settings > Guest Control > Access Control, allow Google Sites for pre-authorization access by adding the IP number 172.217.20.0/19.
3. Activate Third Party Authentication Method
Under theSettings > Guest Control >Hotspotsection, select the third party authentication methods that you wish to activate (Facebook and Google). Enter the ID and Secret for the selected app(s) as configured in those platforms.
4. Add Facebook and Google's Public IPs
Under Access Control, add the following public IPs that Facebook uses to the Pre-Authorization Access list:
31.13.24.0/21
31.13.64.0/18
45.64.40.0/22
66.220.144.0/20
69.63.176.0/20
69.171.224.0/19
74.119.76.0/22
103.4.96.0/22
129.134.0.0/16
157.240.0.0/16
173.252.64.0/18
179.60.192.0/22
185.60.216.0/22
204.15.20.0/22
If you haven't yet, add the following public IP that Google uses to the Pre-Authorization Access list:
172.217.20.0/19
5. Test the Guest Network
Finally, use a device to connect to the guest network and verify that the guest portal works properly.
Related Articles
Back to Top
UniFi - Guest Network, Guest Portal and Hotspot System
View ArticleOverview
This article discusses how to use VLANs with UniFi products. Find a link to an introductory article on VLANs in the Related Articles below.
Table of Contents
UniFi Device Management
UniFi Access Points (UAP)
UniFi Switch (USW)
UniFi Security Gateway (USG)
Related Articles
UniFi Device Management
Back to Top
Initially, you need to adopt your UniFi access points or switches over the native, or untagged, VLAN, and this will be the continued requirement. That being said, L3 management is supported, so your UniFi Network Controller can be on a different L3 network (or remote, etc.). See more about that on our UniFi - Device Adoption Methods for Remote UniFi Controllers article.
As of Controller software version 5.8, access points and switches can be set to tagged VLANs. After you adopt the device over the untagged VLAN, you can define a tagged management VLAN to use. This is found under the device Properties window (from the Devices page click on the device to reveal) > Configuration > Services > Management VLAN.
UniFi - Configuring Access Policies (802.1X) for Wired Clients
UniFi Access Points (UAP)
Back to Top
You can have upwards of one tagged VLAN per SSID, and 4 SSIDs per radio. You can set the VLAN that an SSID uses by going to Settings > Wireless Networks > Advanced Options. The advanced options area is shown either when you create a new wireless network (SSID), or when you edit an existing SSID. You can use VLANs on standard or guest SSIDs.
Currently, the only VLAN you can't tag to an SSID is 1, although that may change in the future, once we expand the ability to define a management VLAN to all UAPs.
Within UniFi Network Controller v5, and subsequent releases, you can use RADIUS controlled VLANs with UniFi APs and Switches. Instead of defining a VLAN, you enable this within the RADIUS profile.Find this section under Settings > Profiles. Below is an example of the RADIUS profile section.
Set the following RADIUS attributes in the RADIUS server for each user or group, based on your RADIUS configuration:
Tunnel-Type = 13,
Tunnel-Medium-Type = 6,
Tunnel-Private-Group-Id = "149" # <=== add your vlan id for each user.
At the time of writing, one known limitation withRADIUS controlled VLANs is that you can't share a VLAN ID between RADIUS users and a static VLAN assignment on another SSID on that AP. So, if SSID1 has a static VLAN assignment of 10, and SSID2 is configured for RADIUS controlled VLANs, the users on SSID2 cannot use the VLAN ID of 10, but they can use any other VLAN ID. If you had a 3rd SSID, that also used RADIUS controlled VLANs, you can use the same VLAN IDs as you would for the users on SSID 2 (except for 10). This applies on a per-AP basis. Disabling the wireless network on the controller is sufficient means to avoid the static VLAN overlap while transitioning to dynamic VLAN.
NOTE:Where using RADIUS-assigned VLANs, the UAP's switch port must have all the RADIUS-assigned VLANs configured as tagged VLANs on its switch port. With UniFi switches, the default "All" network assignment on the UAP's switch port covers that requirement, as long as those VLAN IDs are defined in the controller under Settings > Networks, as either a VLAN-only, corporate, or guest network.
UniFi Switch (USW)
Back to Top
As with UAPs, you can use VLANs with UniFi Switches. By default, your ports are set to All, so it'll have an untagged VLAN 1, and then the rest will be tagged. VLANs need to be defined in the UniFi Network Controller under Settings > Networks. To simply set up a VLAN you would set a network as VLAN only.
To change the profile on a port, or port group, you would click on the Switch in the Devices tab to reveal the Properties window, then go to Ports,and either choose the edit button on the right or select the desired ports and click "edit selected" on the bottom. In editing mode, you can choose the profile for the port(s). The Networks/VLANs profile on a port can be used to define the untagged and tagged networks on the selected port(s).
You can create port profiles in the controller's Settings > Profiles > Switch ports > Add new Profile.Currently, UniFi switches are different from UAPs in the sense that you can tag VLAN 1 on a port.
The UniFi switch is currently the only device where you can tag VLAN 1 if needed. The default LAN network in the controller is VLAN 1. So to tag it, you would create a custom profile and tag it. VLAN 1 is the default LAN network in Settings > Networks in a fresh controller.
In UniFi Network Controller 5.5.x+ versions, support for RADIUS controlled VLANs was added. You would first have to enable 802.1x control and choose a RADIUS profile. This is found under the switch Properties Window > Configuration > Services.You then need to either create a new RADIUS profile, with it RADIUS VLAN enabled for the switch, or make sure it's enabled on an existing profile.
You may also need to configure the switch port profile for 802.1x in Settings > Profiles > Switch Ports > "Add New Port Profile" or edit existing. 802.1x Settings can be found under "Advanced Settings".
You can manage RADIUS profiles from Settings > Profiles.
UniFi Security Gateway (USG)
Back to Top
The USG can be used to manage DHCP server, routing, and VLANs on your network. It would also use the Settings > Networks area to define subnets. A corporate network has no restrictions, whereas a guest network cannot communicate with other subnets on your network. The guest control settings are also applied to guest networks (i.e. wired guest portal).
The default physical LAN interface's network is, by default, using untagged VLAN 1. There can be multiple VIFs (virtual interface/VLANs) per physical LAN interface. You cannot edit the VLAN ID of the untagged subnet (it is 1 or 4010, depending on if it's LAN or VoIP subnet). The settings window looks similar for both corporate and guest networks, so we'll only picture a corporate network. Basically, enter the desired IP with CIDR, and then choose your VLAN ID.
Related Articles
Back to Top
Intro to Networking - Introduction to Virtual LANs (VLANs) and Tagging
UniFi - VLAN Traffic Tagging
UniFi - Device Adoption Methods for Remote UniFi Controllers
View ArticleOverview
Readers will learn how to forward UDP and TCP ports to an internal server using the Port Forwarding feature.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Devices and products used in this article:
EdgeRouter-4 (ER-4)
Ubiquiti Network Management System (UNMS)
Table of Contents
Frequently Asked Questions (FAQ)
Adding Port Forwarding Rules
Related Articles
Frequently Asked Questions (FAQ)
Back to Top
What is the difference between Destination NAT and Port Forwarding?
Destination NAT and Port Forwarding serve the same purpose and can both be used to forward ports to an internal host behind NAT.
Do I need to manually add firewall entries for each Port Forwarding rule?
No, see the steps below.
Do I need to manually configure Hairpin NAT?
No, see the steps below.
When using Hairpin NAT, add the LAN interfaces of all networks that need to use the router's external address to access the internal host(s).
Adding Port Forwarding Rules
Back to Top
The HTTPS traffic with TCP port 443 and 10443 from external clients will be forwarded to the UNMS server.
Follow the steps below to add the Port Forwarding rules to the EdgeRouter:
GUI: Access the EdgeRouter Web UI.
1. Select the WAN and LAN interfaces that will be used for Port Forwarding. The auto-firewall feature will automatically open the required ports in the firewall.
Firewall / NAT > Port Forwarding
Check:Show advanced options
Check:Enable auto firewall
Check: Enable Hairpin NAT
WAN interface: eth0
LAN interface: eth1
ATTENTION:The WAN and LAN interfaces might differ depending on your EdgeRouter model and setup. For example, the ER-X / ER-X-SFP / ER-10X / ER-12 / ER-12P and EP-R6 are able to use switch0 as the LAN interface.There is an example in this community post.
2. Add the port-forwarding rules for TCP ports 443 and 10443.
+Add Rule
Original port: 443
Protocol: TCP
Forward-to address: 192.168.1.10
Forward-to port: 443
Description: https443
+Add Rule
Original port: 10443
Protocol: TCP
Forward-to address: 192.168.1.10
Forward-to port: 443
Description: https10443
3. Apply the changes.
The above configuration can also be set using the CLI:
CLI: Access the Command Line Interface.You can do this using the CLI button in the GUI or by using a program such as PuTTY.
configure
set port-forward auto-firewall enable
set port-forward hairpin-nat enable
set port-forward wan-interface eth0
set port-forward lan-interface eth1
set port-forward rule 1 description https443
set port-forward rule 1 forward-to address 192.168.1.10
set port-forward rule 1 forward-to port 443
set port-forward rule 1 original-port 443
set port-forward rule 1 protocol tcp
set port-forward rule 2 description https10443
set port-forward rule 2 forward-to address 192.168.1.10
set port-forward rule 2 forward-to port 443
set port-forward rule 2 original-port 10443
set port-forward rule 2 protocol tcp
commit ; save
Related Articles
Back to Top
EdgeRouter - Destination NAT
EdgeRouter - Hairpin NAT
View ArticleOverview
In this article, readers will learn about the different modes that are used in the EdgeOS Command Line Interface (CLI).
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:Applicable to the latest EdgeOS firmware on all EdgeRouter models. Knowledge of the Command Line Interface (CLI) and basic networking knowledge is required. Please see the Related Articles below for more information.
Device used in this article:
EdgeRouter-4 (ER-4)
Table of Contents
Configuration and Operational Mode Basics
Making Configuration Changes
Related Articles
Configuration and Operational Mode Basics
Back to Top
There are two modes in the EdgeOS command line, this article describes what each does, how to switch from one to another in the Command Line Interface and finally how to make configuration changes via CLI. TheOperational Mode, represented by a dollar sign $ is used to display the status of the device. TheConfiguration Mode,represented by a hashtag # is used to make configuration changes to the device.
The default mode when logging into the command line is Operational Mode. To switch to Configuration Mode, use theconfigurecommand:
ubnt@edgerouter:~$ configure
[edit]
ubnt@edgerouter#
NOTE: Operational Mode is indicated by a dollar sign $, whereas Configuration Mode uses the hashtag #.
To go back to operational mode, use the exit command:
[edit]
ubnt@edgerouter# exit
exit
ubnt@edgerouter:~$
Each mode has its own unique commands. You can use the question mark?key to display all the available commands in both modes. Press the?key twice to also display the command descriptions:
ubnt@edgerouter:~$ ?
Possible completions:
configure Enter configure mode
ping Send Internet Control Message Protocol (ICMP) echo request
reboot Reboot the system
show Show system information
shutdown Shutdown the system
traceroute Track network path to <hostname|IPv4 address>
traceroute6 Track network path to <hostname|IPv6 address>
<...output shortened...>
ubnt@edgerouter:~$ configure
[edit]
ubnt@edgerouter# ?
Possible completions:
commit Commit the current set of changes
compare Compare configuration revisions
delete Delete a configuration element
edit Edit a sub-element
exit Exit from this configuration level
run Run an operational-mode command
save Save configuration to a file
set Set the value of a parameter or create a new element
show Show the configuration (default values may be suppressed)
<...output shortened...>
NOTE: The second question mark?does not display onscreen.
If you wish to run an Operational Mode command from while inConfiguration Mode, use the runcommand.
[edit]
ubnt@edgerouter# run show ?
Possible completions:
interfaces Show network interface information
ip Show IPv4 routing information
ipv6 Show IPv6 routing information
<...output shortened...>
Making Configuration Changes
Back to Top
The EdgeRouter uses three configuration sets:
Boot/Startup ConfigWhen the EdgeRouter reboots, it loads the boot/startup configuration (config.boot)
Active Config Currently active configuration with changes that have not been saved to the boot/startup configuration yet.
Working ConfigNon-active configuration with changes that have not been applied (committed) yet.
Use the following commands to make changes to the configuration:
setAdds a configuration statement from the device
deleteRemoves a configuration statement from the device
commitApplies any changes that were added with thesetordeletecommands
save Saves the active configuration to the boot/startup configuration
Let's say that we want to enable the Telnet service, we would issue the following:
[edit]
ubnt@edgerouter# set service telnet port 23
ubnt@edgerouter# compare
[edit service]
+telnet {
+ port 23
+}
[edit]
ubnt@edgerouter# commit
[ service telnet ]
Starting the telnet service. Check /var/log/messages.
NOTE: Thecomparecommand will show you the difference between the working and the active configurations.
Save the configuration changes to the boot/startup configuration by using thesavecommand:
[edit]
ubnt@edgerouter# save
Saving configuration to '/config/config.boot'...
Instead of applying changes with thecommitcommand, you can also usecommit-confirm. The latter command reboots the device in 10 minutes (you can customize this value) unless the commit is confirmed with theconfirmcommand. This is helpful when you are making changes to a remote device and you do not want to risk losing access to it. If you accidentally lock yourself out of the device, the EdgeRouter will reboot after 10 minutes and the boot/startup configuration is re-loaded.
[edit]
ubnt@edgerouter# delete service telnet
[edit]
ubnt@edgerouter# commit-confirm 5
commit-confirm will automatically reboot in 5 minutes unless confirmed
Proceed? [yes][y]
Type 'confirm' to stop reboot
[edit]
ubnt@edgerouter# confirm
Related Articles
Back to Top
EdgeRouter - How to Configure an Interface
EdgeRouter - User Accounts
EdgeRouter - How to Create a WAN Firewall Rule
EdgeRouter - Archiving and Managing the Configuration Files
View ArticleOverview
This article provides step-by-step instructions on how to use Facebook Wi-Fi for Guest Authorization with UniFi.
Table of Contents
Introduction
Requirements
Directions
Related Articles
Introduction
Back to Top
UniFi introduced the Facebook Authentication method for Guest Wi-Fi beginning in UniFi Network Controller version 5.6.12. This feature allows businesses to permit users to authenticate to Wi-Fi via Facebook. Using Facebook authorization can provide an easy and straight-forward way of ensuring customers are able to access Wi-Fi while also gaining benefit for marketing your business via social media. This guide will show you how to set up a Facebook Wi-Fi Network in UniFi.
Requirements
Back to Top
Much of how Facebook Wi-Fi works is based on Facebook's requirements which will differ from standard UniFi networks. In order to use Facebook Wi-FI with UniFi the following requirements must be met:
Must be on UniFi Network Controller version 5.6.12 or later.
Must have created a Facebook page for your business, and this page MUST be published publicly. See directions here.
UniFi Network Controller must remain online to process Guest Authorization.
Directions
Back to Top
1. Open your UniFi Network Controller.
UniFi - Viewing Guest Connection Information
User Tip:The following instructions are on the Controller's "Classic Settings Mode", if you are using the New Settings, use the search bar on top to find the settings mentioned in these steps.
2. Go to Settings > Guest Control, and check "Enable Guest Portal" if not already enabled.
3. For Authentication, select "Facebook WiFi".
4. Once Facebook WiFi is selected as Authentication, a new section titled "Facebook WiFi" will appear on this page.In this section, provide a Gateway Name. This is only used on the Facebook WiFi and will not be visible to clients. Notice the note under Gateway Configuration: "Facebook Wi-Fi gateway configuration will be available after registering the gateway with Facebook. The registration will happen automatically after applying the changes with the Facebook Wi-Fi feature enabled for the first time. Once you select the name, it won't be possible to change it without gateway re-registration."
5. Once you have provided a name for the Gateway, hit "Apply Changes".
6. Once changes have been applied, you will be able to proceed with Facebook WiFi configuration by clicking "GO TO FACEBOOK WIFI CONFIGURATION".
7. Clicking this field will direct you to Facebook's site to proceed with the configuration steps. You should see a page like this:
8. Next, under Facebook Page, select the Facebook Page that you'd like the Wi-Fi to be associated with.
9. Under Bypass Mode, select either:
"Skip check-in link" which permits users to get access to the Wi-Fi without having to check-in with social media.
"Require Wi-Fi code" which requires the user to use a pre-defined Wi-Fi code you can provide to your customers.
10. Select "Session Length" to determine how long users should have access to Wi-Fi before having to reauthenticate.
11. Under "Terms of Service", if enabled you can require users to first accept your own Terms and Services.
12. Once you have configured these settings to your liking, click "Save Settings". You will then be prompted to close the window.
13. After these settings have been applied, the only thing that is left to do is to apply Guest Policies to your Facebook Wi-Fi Guest Network, by going to Settings > Wireless Networks > Select the SSID you wish to use Facebook Authentication with, and clicking "Apply Guest Policies", then click "Save" at the bottom of the page.
14. You should now be able to test Facebook Wi-Fi.
Testing Facebook Wi-Fi
Let's take a look at what the process looks like from a user's perspective:
1. The user will connect via Wi-Fi to your Guest SSID. Once connected, they will be automatically prompted to complete additional steps as shown:
2. The user will then need to Login to Facebook to authenticate/associate the individual's Wi-Fi access with their Facebook account.
3. After signing in, the user will then be prompted with the ability to Check In, which is a nice way to increase traffic to your Facebook page, or alternatively skip Check-in or enter a Wi-Fi code depending on how you want to enforce this.
User Tip:By setting a Wi-Fi code you will likely direct more users to Check-In to your business page, helping generate more traffic on your Facebook business page.
Related Articles
Back to Top
UniFi - Wireless Guest Network Setup
View ArticleOverview
In this article users can comparethe differentantenna radiationpatternsof a few of ourUniFi Access Points. For an explanationon how to read antenna radiation patterns see our UniFi - Introduction to Antenna Radiation Patterns article.
Table of Contents
1. Introduction
2. Radiation Plot Format
3. Comparison Table
4. Model Summary Plots
4.1 UAP-HD
4.2 UAP-SHD
4.3 UAP-AC-Lite
4.4 UAP-AC-LR
4.5 UAP-AC-PRO
4.6 UAP-AC-IW
4.7 UAP-AC-IW-PRO
4.8 UAP-IW-HD
4.9 UAP-AC-M
4.10 UAP-AC-M-PRO
4.11 UMA-D
4.12 UAP-nanoHD
4.13 UAP-XG
4.14 UWB-XG
4.15 UDM
4.16 UAP-FlexHD
4.17 UAP-BeaconHD
5. Antenna Files (.ant)
6. Related Articles
Introduction
Back to Top
The UniFi access pointshave a distinct hardware design to meet the varying needs of wireless deployments. A critical part of what differentiates each model is the number, arrangement, and orientation of the AP’s antennaswhich influences the shape and behavior of wireless signal (both on transmit and receive). Radiation patterns can be used to better understand how each UniFi access point model broadcasts wireless signa. These patterns are what antenna engineers call reciprocalin that the transmit-power (the capability of the AP to ‘speak’) will be highest at the peaks, and so will the receive-sensitivity (the capability of the AP to ‘hear’).
Please note that these radiation patterns are gathered in a fully anechoic environment. Their shape, peak gain/directivity and efficiency will change in installed environments. Every deployment will behave differently due to interference, materials, geometries of structures, and how these materials behave at 2.4GHz and 5GHz.
With that in mind, use these radiation plots as a "general guide" to identify where most of the energy (and receive sensitivity) of the UniFi APs is being directed; but keep present that the ultimate way to know how successful the coverage design isis to measure it. Measure signal strength and coverage before (with mock positioning), during (as you install), and after to guarantee that you have the coverage you wantand don’t have the coverage you don’t want (for example with self-interference: APs hearing each other or other AP stations on the same channel).
Radiation Plot Format
Back to Top
Radius represents ‘elevation’, with 0 representing antenna gain straight under the AP, and 90 representing antenna gain at horizon. The degrees on the circumference represent ‘Azimuth’. That is to say, left/right/front/back of the AP, when mounted overhead. For a more detailed explanation, please see our UniFi - Introduction to Antenna Radiation Patterns article.
Comparison Table
Back to Top
Use this table to compare the radiation patterns of each UAP. The first column shows where the respective colored dots found in each radiation plot is placed in the actual devices. Note that colored dots in the plots might be in the outer perimeter or closer to center.
UniFi - Introduction to Antenna Radiation Patterns
NOTE:Varying scales are represented in the graphs below. Consider each graph individually and take note of scale when comparing products.
Product Image
Directional Color Dots
5.20GHz
Frequency
5.50GHz
Frequency
5.80GHz
Frequency
2.45GHz
Frequency
UAP-HD
UAP-SHD
UAP-AC-Lite
UAP-AC-LR
UAP-AC-PRO
UAP-AC-IW
UAP-AC-IW-PRO
UAP-IW-HD
Coming soon.
UAP-AC-M
UAP-AC-M-PRO
UMA-D
UAP-nanoHD
UAP-XG
UWB-XG
(High Gain)
(High Gain)
(High Gain)
The UWB-XG models do not operate on the 2.4GHz band.
UDM
(5.15GHz)
(5.50GHz)
(5.85GHz)
(2.45GHz)
UAP-FlexHD
(5.15GHz)
(5.50GHz)
(5.85GHz)
(2.45GHz)
UAP-BeaconHD
(5.15GHz)
(5.50GHz)
(5.85GHz)
(2.45GHz)
Model Summary Plots
Back to Top
This section includes a graphic summary for eachUAP shownin thetable above, portrayingradiation plots for Azimuth, Elevation 0, Elevation 90 and Mapped 3D, for three different frequencies: 5.20GHz, 5.50GHz and 5.80GHz. Click on each one to expand and zoom.
UAP-HD
Back to Top
UAP-SHD
Back to Top
UAP-AC-Lite
Back to Top
UAP-AC-LR
Back to Top
UAP-AC-PRO
Back to Top
UAP-AC-IW
Back to Top
UAP-AC-IW-PRO
Back to Top
UAP-IW-HD
Back to Top
UAP-AC-M
Back to Top
UAP-AC-M-PRO
Back to Top
UMA-D
Back to Top
UAP-nanoHD
Back to Top
UAP-XG
Back to Top
UWB-XG
Back to Top
High Gain
Low Gain
UDM
Back to Top
UAP-FlexHD
Back to Top
UAP-BeaconHD
Back to Top
Antenna Files (.ant)
Back to Top
Please notethe data in the .ant files below was extracted from full model simulations. Clicking on the links in the following table will prompt the immediate download of the .ant file.
UniFi Access Point Model
Downloadable Antenna Files (.ant)
UAP-AC-IW-Pro
UAP-AC-IW-Pro.zip
UAP-AC-IW
UAP-AC-IW.zip
UAP-AC-Lite
UAP-AC-Lite.zip
UAP-AC-LR
UAP-AC-LR.zip
UAP-AC-Pro
UAP-AC-Pro.zip
UAP-AC-Mesh
UAP-AC-Mesh.zip
UAP-AC-Mesh-Pro
UAP-AC-Mesh-Pro.zip
UAP-HD
UAP-HD.zip
UAP-SHD
UAP-SHD.zip
UAP-nanoHD
UAP-nanoHD.zip
UAP-XG
UAP-XG.zip
UWB-XG
UWB-XG.zip
UMA-D
UMA-D.zip
UDM
UDM.zip
UAP-BeaconHD
UAP-BeaconHD.zip
UAP-FlexHD
UAP-FlexHD.zip
Related Articles
Back to Top
View ArticleRMA form Ubiquiti devices will have aMAC ID number printed on a small sticker or on the device itself. This information can be found on the back panel or on the underside of devices. Some devices have silicon inserts to protect the Ethernet port areas, remove the insert to expose the MAC ID. MAC IDs can also be found on the outside of product boxes.
The first 5 characters which end with a letter are the device's Date Code. The following 12 characters, a mixture of numbers and letters, will be theMAC ID. The image points out the Date Code section in blue, and the MAC ID, in red. The barcode itself only contains the MAC ID, not the Date Code.
Components and parts of devices do not have MAC ID or Date Code information. In these cases, use the Serial Number (S/N) in the MAC Address space instead when using the official. Serial Number format and length will vary: some will be all numbers, others will have alphabetical and numerical characters. Identify a Serial Number by the S/N or SN in front of it. A few bundled itemswill not have an individual Serial Number, only the packaging box one. In these cases use the carton Serial Number for any of the items packaged within.
View ArticleOverview
Click on the question that interests you to expand and collapse the answers. If you don't see the answer you are looking for, search in our other UniFi FAQ articles: UniFi - Getting Started FAQ,or let us know by clicking on theSend Feedback button at the bottom of this article.
Frequently Asked Questions
What are the current UniFi Controller software versions for the different release branches?
Release Branch
Definition
Current Release
EOL Product Support
Release that is maintained for products that do not support newer firmware versions.
5.6.42
Stable
General availability (GA) release.
5.12.35
Release Candidate
Release we think can go to Stable unchanged. Formerly called Stable Candidate.
-
Testing
Feature-frozen, going to Release Candidate and then Stable.
5.13.9
Unstable
Branch where new features are being added.
5.12.5
unifi.ui.com
NOTE:Some of these versions are in beta. To sign up for the early access program and be able to access these, follow this article.
Why do I see Release Candidate and Stable releases in the Official release section on the community?
Release Candidate versions are essentially what we are targeting for Stable. We find value in getting these out to a broader audience. If there are no known bugs and nothing discovered in testing, then this release may be promoted to Stable after one week from the initial time it was released to official. Sometimes this process is accelerated and other times it's delayed.
Why do I see Release Candidate and Stable releases in the Official release section on the community?
Release Candidate versions are essentially what we are targeting for Stable. We find value in getting these out to a broader audience. If there are no known bugs and nothing discovered in testing, then this release may be promoted to Stable after one week from the initial time it was released to official. Sometimes this process is accelerated and other times it's delayed.
The Beta section of Releases will hold versions in Unstable, Testing, and Release Candidate stages. The Official section, will only share Release Candidate and Stable stages.
Why can't I find the latest release in the repo for Debian/Ubuntu?
A release is initially only available via the Downloads page or release post on the Releases section of the Community. As a general rule, one week after a release goes Stable it will be made available on the repos. There will be some exceptions where the this period will be shorter or longer. There are also cases where a release goes Stable but we find a bug and decide not to push that out to the repo, and instead will work on a follow-up release which fixes the bug, promoting that release to stable instead. The follow-up release may follow an accelerated release plan or it may go through the regular one week intervals.
What are the recommended UniFi Network Controller versions for UniFi Hardware?
We recommend always running the latest UniFi Network Controller software version as well as the latest device firmware version provided in our Downloads page. Our developers are constantly updating and improving features, so for best functionality always upgrade. To know which is the latest recommended version for a specific device, go to the Downloads page, click on the model of choice in the left hand menu and look at the Software and Firmware sections. For example, notice that for the UAP-AC and the UAP-AC-Outdoor it is suggested to stay in the 5.6.42 software controller version.
If you wish to know what theminimum version you can use is to check your device's Quick Start Guide's Introduction section.Quick Start Guides can be found at the bottom of the product page, which can be accessed when navigating from the UI Products page. They can also be downloaded from UI Downloads.
Does the UniFi Controller have to run at all times? What happens with the Guest Portal when the Controller is offline?
UniFi devices retain their running configuration post-adoption. The controller is not required to be running for the devices to forward traffic. If the controller is restarted it will not restart your access points or other devices. All configurations, as well as your internet connectivity, will continue working as usual. However, you will lose anything running on the Controller directly instead of a device; for example: statistics, reporting, manually applied user groups, and most importantly, the Guest Portal.
When the Guest Portal feature is enabled, the controller is functioning asa captive portal.When a UniFi access point (UAP) cannot reach the controller, it goes into "SELFRUN" state. In this state, it will not redirect guests to the portal since it is not reachable, so the UAP will automatically allow guests to use the network without redirecting. Moreover:
The guest access policies willstill be effective, along with the restricted subnets feature.
The user group configuration associated with this WLAN will still be effective.
When the Controller comes back online (and the UAP goes into MANAGED state), the Guest Portal redirection feature will restore automatically.
If you wish to configure the "SELFRUN" state, please see this article. If you would like to know more about setting up Guest Networks (including the Portal), please see: UniFi - Guest Network, Guest Portal and Hotspot System.
Can I make the UniFi Controller update information more frequently? Where is the refresh button?
The controller's refresh button is hidden by default, but it can be added to the top toolbar, by enabling it in the Controller's Preferences. You'll beable to select between 15 seconds, 1 minute, 2 minute or 5 minutes update intervals. Or you could altogether eliminate automatic refreshing, by selecting "Never refresh" and only refreshing the controller manually with the button once it is enabled. To configure these two settings:
Classic Controller Mode:
Go to Settings > User Interface and scroll down to the Datasubsection.
To add the refresh button to your controller's top toolbar, switch on the Enable refresh button setting.
To adjust the frequency of automatic refreshing, or disable it completely, use the drop-down of the Refresh ratesetting.
New Settings (Beta) Mode:
Go toSettings > Preferences > Advanced to theData section.
To add the refresh button to your controller's top toolbar, switch on the Enable Refresh Button setting.
To adjust the frequency of automatic refreshing, or disable it completely, use the drop-down of the Refresh Ratesetting.
Can I change the language of the UniFi Controller?
Yes! The UniFi Controller translation, as well as most other translations in Ubiquiti are Community based. They're a team effort done by native speaking Community members who have volunteered to work on this project. If you are interested in collaborating with us, please sign up for beta access first by following this article: How To Sign Up for Early Access and then tag UI-AlexCaldas to volunteer. If you find mistakes in translations, please let us know in this dedicated Community thread. To change the language of your Controller follow these steps:
On the Classic Controller Mode:
Go to Settings > User Interface and the Localizationsubsection.
Select the language you prefer from theLanguage drop-down menu.
Read the warning before clickingSave and Close, now visible in your selected language. Sometimes you will need to refresh the page to see the translations reflected on your screen. You can toggle to another section and back to force this refresh.
On the New Controller Settings (Beta):
Go to Settings > Preferences > Formatting.
Select the language you prefer from theLanguage drop-down menu.
ATTENTION:All translations (other than English) are Community sourced, and should be considered to be in beta always. Before making any big changes, check the English translation first.Translations improve as they move forward; to get the best translations please upgrade to the newest Controller software version available.
I'm having trouble upgrading from an older UniFi Controller version, what can I do?
When upgrading, always read the Release Notes, there will be information on any considerations to keep in mind when migrating from previous versions.
Upgrading from v2 to current version: There is no direct upgrade path from v2 to v5 current releases. You first need to upgrade from v2 to v3 then from v3 to a newer version. There should be virtually no installs running v2 or earlier but if you fall into this category please reach out to support and we will happily provide you with a v3 release as an intermediary upgrade to help you get your site onto something current.
Migrating from v3 to current version: There are many changes to APIs and it's not backward compatible. You may need to update the shell library ( unifi_sh_api ) and/or your customized portal/external portal code.
What Java / JRE version should I be using?
UniFi 5.11.39 Stable Release: Java 8 must be installed on the system hosting the controller software. Java 9 and later are not yet supported.
UniFi 5.6.42 LTS Stable Release: Java 8 must be installed on the system hosting the controller software. Java 9 and later are not yet supported.
NOTE: Although Javais required on any machine that is actually hostingthe UniFi Controller, it is not required to navigate to(the UniFi Cloud Access portal) to access .
How can I trigger a provision?
Whenever a configuration is modified within the UniFi Controller UI, it will be automatically detected and a provision will be triggered. However, if you are changing configurations by modifying theconfig.properties file, the Controller will not detect the change and you will have to manually instruct it to begin a provision.
To trigger a provision via the controller follow these steps:
Launch the Controller and accesstheDevices section.
Click on the device you wish to provision, displaying the Properties panel.
Click on theConfigtab.
Click to expand the Manage Device section.
Scroll down to the Force Provision sectionand click on theProvision button.
If you need to trigger a provision for all access points, perform it using thegroup configfeature by doing the following:
Launch the Controller and accesstheDevices section.
In the top toolbar Allwill be selected by default. Click onAPS.
Click on the gear icon in the upper right hand corner and check the box for Enable group config. This will add a empty checkbox to AP row.
Check the top box to select all.
Clickthe button ofEdit Selected which appeared in the top toolbar. This expands a batch AP Properties panel.
Go toConfig> Manage Devices and click theProvision button.
View ArticleOverview
Readers will learn how to configure a Policy-Based Site-to-Site IPsec VPN between an Edgerouter and a USG.
Intro to Networking - How to Establish a Connection Using SSH
NOTES & REQUIREMENTS:
Applicable to the latest EdgeOS firmware on all EdgeRouter models. Please see the Related Articles below for more information.
Devices used in this article:
EdgeRouter-4 (ER-4)
UniFi Security Gateway (USG-3)
Table of Contents
Frequently Asked Questions (FAQ)
Setting up a Policy-Based VPN
Related Articles
FAQ
Back to Top
1. What site-to-site IPsec VPN types can be configured on EdgeOS?
The following IPsec VPN types can be configured on EdgeOS:
Policy-Based
Route-Based (VTI)
GRE over IPsec
2. What are the available encryption and hashing options (Security Associations / SAs) for Phase 1 (IKE) and Phase 2 (ESP)?
Encryption
AES128
AES256
AES128GCM128
AES256GCM128
3DES
Hashing
MD5
SHA1
SHA2-256
SHA2-384
SHA2-512
Setting up a Policy-Based VPN
Back to Top
The 192.168.1.0/24 and 172.16.1.0/24 networks will be allowed to communicate with each other over the VPN.
GUI: Access the EdgeRouter Web UI.
1. Define the IPsec peer and hashing/encryption methods.
VPN > IPsec Site-to-Site > +Add Peer
Check: Show advanced options
Check: Automatically open firewall and exclude from NAT
Peer: 192.0.2.1
Description: ipsec
Local IP: 203.0.113.1
Encryption: AES-128
Hash: SHA1
DH Group: 14
Pre-shared Secret: <secret>
Local subnet: 192.168.1.0/24
Remote subnet: 172.16.1.0/24
2. Apply the changes.
GUI: Access the UniFi Controller Web Portal.
1. Navigate to the Settings to create a new IPsec network using a custom profile.
Settings > Networks > +Create New Network
Name: ipsec
Purpose: Site-to-Site VPN
VPN Type: Manual IPsec
Enabled: Enable this Site-to-Site VPN
Remote Subnets: 192.168.1.0/24
Peer IP: 203.0.113.1
Local WAN IP: 192.0.2.1
Pre-Shared Key: <secret>
IPsec Profile: Customized
Expand (+) Advanced Options
Key Exchange Version: IKEv1
Encryption: AES-128
HASH: SHA1
DH Group: 14
PFS: Enable Perfect Forward Secrecy / Check
Dynamic Routing: Disable / Uncheck
NOTE: The USG will use the all corporate networks as the local subnet(identifiers)for the IPsec connection.
2. Apply the changes.
Related Articles
Back to Top
EdgeRouter - Policy-Based Site-to-Site IPsec VPN
EdgeRouter - Route-Based Site-to-Site IPsec VPN
View ArticleOverview
Users will learn how to test throughput using the CLI tool known as iPerf3. TheiPerf3tool generates and sends traffic from a server to a client, or from a client to a server. This is the best option for testing throughput when speedtest websites are showing poor results.
https://iperf.fr/iperf-download.php#windows
NOTES & REQUIREMENTS:This article requires a limited amount of CLI experience. Users should understand how to login via SSH and run commands via SSH.
Table of Contents
Introduction
How Does this Test Work?
Steps: How to Test Throughput
Introduction
Back to Top
Internet speedtests can fail for a variety of reasons including, but not limited to the following:
Server location
Server load
Server connection speed
Server networking issues
Simultaneous tests being run to the same server
This is why it is useful to rule out connection issues that are out of your control by testing from one end of a link to another.
How Does this Test Work?
Back to Top
iPerf3between two PCs plugged into either side of the link.
This is the best way to test your throughput. It will rule out any other networking equipment on your network and allow you to test only that wireless link.
This test will also be able to show any limiting factors on your LAN connections because it will test through the LAN interface on one radio, through the LAN interface of the other radio, without causing too much overhead on the radios themselves.
Steps: How to Perform the Test
Back to Top
ATTENTION: These instructions assume you are running Windows on both PCs.
1. Visitto download the current version ofiPerf3 for your Windows PCs.
2. Once you download the file, you will need to extract it. You may put the extracted contents on C:\.
3. Once you have downloadediPerf3 and extracted the files to C:\, you can open the command prompt and navigate to the directory that you savediPerf3 to.
cd C:\
4. Now run iperf3.exe as a server on one PC.
iperf3.exe -s
5. Runiperf3.exe as the client on the other PC.
iperf3.exe -c 203.0.113.26 -t 100 -P 5
NOTE:203.0.113.26 is the IP address of the exampleiPerf3 server running on the opposite PC. You will need to change the IP address to match that of the PC that you started the server on.
This will start aniPerf3 TCP throughput test and run for 100 seconds while showing the results every one second.
View Article