- 193
- 623 183
777 or 404
United States
เข้าร่วมเมื่อ 29 พ.ย. 2011
Network devices review/configurations for home lab/small business.
Ubiquiti UniFi Switch Multicast Filtering - Fast Leave & Forward Unknown Multicast Traffic
Ubiquiti UniFi Switch Multicast Filtering - Fast Leave & Forward Unknown Multicast Traffic
มุมมอง: 334
วีดีโอ
Ubiquiti UniFi Switch - IGMP Forwarding & Multicast Router Port (Multicast Filtering/IGMP Snooping)
มุมมอง 620วันที่ผ่านมา
Ubiquiti UniFi Switch - IGMP Forwarding & Multicast Router Port (Multicast Filtering/IGMP Snooping)
DIY Vertical Rack For Multiple Mac Minis
มุมมอง 298วันที่ผ่านมา
DIY Vertical Rack For Multiple Mac Minis
Ubiquiti UniFi Switch - Multicast Filtering and IGMP Querier (IGMP Snooping)
มุมมอง 82314 วันที่ผ่านมา
Ubiquiti UniFi Switch - Multicast Filtering and IGMP Querier (IGMP Snooping)
Ubiquiti UniFi Gateway GeoIP (Country Restrictions/Geo/Region Traffic Rule)
มุมมอง 58114 วันที่ผ่านมา
Ubiquiti UniFi Gateway GeoIP (Country Restrictions/Geo/Region Traffic Rule)
Synology Pi-hole Docker and VLANs (Ubiquiti UniFi / Macvlan)
มุมมอง 47921 วันที่ผ่านมา
Synology Pi-hole Docker and VLANs (Ubiquiti UniFi / Macvlan)
Proxmox Pi-hole Container and VLANs (Ubiquiti UniFi / LXC )
มุมมอง 1.4K21 วันที่ผ่านมา
Proxmox Pi-hole Container and VLANs (Ubiquiti UniFi / LXC )
Ubiquiti UniFi Gateway - Device Identification (DPI/Device Fingerprint)
มุมมอง 1.1K21 วันที่ผ่านมา
Ubiquiti UniFi Gateway - Device Identification (DPI/Device Fingerprint)
Ubiquiti UniFi Gateway - NetFlow (ipt_NETFLOW/pmacct)
มุมมอง 1.1K28 วันที่ผ่านมา
Ubiquiti UniFi Gateway - NetFlow (ipt_NETFLOW/pmacct)
HomeLab Migration from ESXi to Proxmox
มุมมอง 83428 วันที่ผ่านมา
HomeLab Migration from ESXi to Proxmox
Ubiquiti UniFi Teleport VPN - Deep Dive
มุมมอง 1.4Kหลายเดือนก่อน
Ubiquiti UniFi Teleport VPN - Deep Dive
Ubiquiti Mini Rack Stacking Kit UACC-Rack-Stacking-Kit
มุมมอง 1.1Kหลายเดือนก่อน
Ubiquiti Mini Rack Stacking Kit UACC-Rack-Stacking-Kit
Ubiquiti UniFi Protect - Convert UNVR/UNVR Pro to NAS, and Why It Failed
มุมมอง 3.9Kหลายเดือนก่อน
Ubiquiti UniFi Protect - Convert UNVR/UNVR Pro to NAS, and Why It Failed
Ubiquiti UniFi Protect UNVR RJ45/SFP+ Speed Puzzles (UNVR Pro)
มุมมอง 956หลายเดือนก่อน
Ubiquiti UniFi Protect UNVR RJ45/SFP Speed Puzzles (UNVR Pro)
Ubiquiti UniFi Site-To-Site IPsec VPN and OSPF
มุมมอง 575หลายเดือนก่อน
Ubiquiti UniFi Site-To-Site IPsec VPN and OSPF
Ubiquiti UniFi Gateway Dual WAN Failover - Android Ethernet Tethering, iPhone USB Tethering
มุมมอง 1.5Kหลายเดือนก่อน
Ubiquiti UniFi Gateway Dual WAN Failover - Android Ethernet Tethering, iPhone USB Tethering
Ubiquiti UniFi Protect - ONVIF (Third-Party Cameras)
มุมมอง 2.3Kหลายเดือนก่อน
Ubiquiti UniFi Protect - ONVIF (Third-Party Cameras)
Ubiquiti UniFi SD-WAN - Site Magic & OSPF
มุมมอง 2K2 หลายเดือนก่อน
Ubiquiti UniFi SD-WAN - Site Magic & OSPF
Ubiquiti UniFi Firewall Rule Action - Reject Vs. Drop (iptables, nmap)
มุมมอง 8572 หลายเดือนก่อน
Ubiquiti UniFi Firewall Rule Action - Reject Vs. Drop (iptables, nmap)
Ubiquiti UniFi AP - Packet Capture (802.11/Wireshark/tcpdump/sniffer)
มุมมอง 1.8K2 หลายเดือนก่อน
Ubiquiti UniFi AP - Packet Capture (802.11/Wireshark/tcpdump/sniffer)
Ubiquiti UniFi Gateway - Distributed Load Balancing (iptables/mangle/routing)
มุมมอง 7062 หลายเดือนก่อน
Ubiquiti UniFi Gateway - Distributed Load Balancing (iptables/mangle/routing)
Ubiquiti UniFi - Firewall Rule Vs. IP ACL Rule
มุมมอง 1K3 หลายเดือนก่อน
Ubiquiti UniFi - Firewall Rule Vs. IP ACL Rule
Ubiquiti UniFi Gateway - Masquerade NAT (NAT Overload / Global NAT Settings)
มุมมอง 1.3K3 หลายเดือนก่อน
Ubiquiti UniFi Gateway - Masquerade NAT (NAT Overload / Global NAT Settings)
Ubiquiti UniFi Gateway - SNAT (Source NAT/1:1 NAT/1-to-1 NAT)
มุมมอง 9703 หลายเดือนก่อน
Ubiquiti UniFi Gateway - SNAT (Source NAT/1:1 NAT/1-to-1 NAT)
Ubiquiti UniFi Gateway DNAT - Redirect Client DNS Request (NAT/Destination NAT)
มุมมอง 1.5K3 หลายเดือนก่อน
Ubiquiti UniFi Gateway DNAT - Redirect Client DNS Request (NAT/Destination NAT)
Ubiquiti UniFi Gateway - DNAT and Port Forwarding (NAT/Destination NAT)
มุมมอง 1.6K3 หลายเดือนก่อน
Ubiquiti UniFi Gateway - DNAT and Port Forwarding (NAT/Destination NAT)
Ubiquiti UniFi U7-Pro-Max - WiFi7 and Spectrum Analysis
มุมมอง 2.8K4 หลายเดือนก่อน
Ubiquiti UniFi U7-Pro-Max - WiFi7 and Spectrum Analysis
Ubiquiti UniFi Vantage Point (UNVR Stacking / Shadow Mode High Availability)
มุมมอง 5644 หลายเดือนก่อน
Ubiquiti UniFi Vantage Point (UNVR Stacking / Shadow Mode High Availability)
Love watching your videos, love these series. Is there any chance you can cover off Site magic (site-to-site VPN), or API? I have just seen these new options when logging in to my Unifi today :) (Or has these two things been there all this time and I've never seen it). To note, I don't have a second gateway, so I cannot test this. I assume it would be very simple to setup the site-to-site VPN, being very user friendly.
I do have an S2S VPN video already. About API, let me see what I can do.
I just checked Ubiquiti's published API document. It's a joke, at lease for now. Only very limited APIs have been published. I know on the web there are unofficial APIs listed, but I would wait till more useful ones are published, then I can do something interesting, for example to control PDU so that multiple outlets can switch on or off together.
Multicast👍
Here's the thing, you can get Synology DVA 1622 with 8 licenses for 599, and when you got four cameras with the Synology Nas for 450, you only have to buy two licenses. I got a 1522 plus used for 500 1622 used for 420. The DVA 1622 is limited but allowed me to use my previous cameras and I got AI cameras 5mp 20 FPS pretty much to max out the nas surveillance capabilities, for 50 bucks a piece. UniFi cameras are not twice as expensive as equivalent quality cameras from other brands. They are four times as expensive. I think both systems can be good and I'm still learning about surveillance station, but without hard drives, with my setup, I will have about a 60 TB Nas that can do tons of things unify cannot do and a 36 tb back up nas, and I could theoretically be running 10 good cameras at 50 bucks a pop. I think your price comparisons are inaccurate and unify will be roughly twice the price of Synology with very mediocre cameras unless you want to spend 500 bucks a piece for the new AI ones.
Also, I called Synology on the phone and they answered in 2 minutes, another time I waited 5 minutes and then had to hang up, but they have a 24/7 free phone support for all customers. Good luck getting ahold of someone at Ubiquiti without paying hundreds of dollars.
You rock!! I cant believe Unifi does not just move this feature into production. This worked for me and now my security onion is going off the charts lol
Why is an ACL working on networks that are routing to the firewall? ACL cross vlan should be ignored when networks are set to route to firewall, like your first example.
How does the view look from the mobile app? Does it show it as 1 site ? Or do users have to switch between sites to see all recordings ?
The former.
@@hz777 Thanks for the great video!
Hi, great Video! One thought: Wifi Client Isolation can be set for a whole WIFI network. Is this implemented differently?
Yes, it's different. I do have a video about wifi client isolation.
I appreciate the amount of detail and the real step by step methods that you share on how you get to the 'under the hood' inner workings on how these poorly documented unifi features are implemented. I am constantly pausing your uploads, especially when you pop onto the unifi switches via ssh and run a variety of arcane cli commands (sometimes after telnetting into the same switch? why? no idea) or run Wireshark and monitor the packets with filters that I haven't even started to learn and then... describe the results they provide from your well thought out empirically designed tests.. simple joy and applause believe it or not.. on my side that is. Please, consider enlarging or highlighting your mouse cursor when using it on your network diagrams and monitor screens. Many times you will refer to 'this port' and 'this switch' or 'the checkbox' setting while I assume you're wiggling the mouse cursor at the relevant part of interest, but the viewer (me at least) has a problem seeing it as its a tiny few pixels either on a 13" or 55" monitor. Please keep rolling these out as you sure are an excellent 'sleeves rolled up' engineer, detective, and instructor for us nerdy nerds.
Thanks for the suggestion about mouse cursor. I will use larger mouse cursor during screen recording in the future.
Such a great video. Answered so many questions. So it appears the only benefit is the single UI and ability to view all cameras on one screen. As you say, disappointing!
how i do ospf for 60ghz antenna and 5ghz as a backup using ospf?
Have you tested the new fast leave function? I’m seeing an issue. If I’m running multiple receivers and one leaves the others stall for a second every time a receiver leaves. This is especially worse when I have multiple streams and a receiver changes from one stream to another.
Yes I am going to post a video about fast leave. No I have not observed the issue you described. Are all of your receivers directly connected to UniFi switches? Theoretically, what you described should not happen based on how fast leave works.
Do you have a video on setting up Vlans on a L3 switch unifi gateway and any static routing and other settings that needs to occur? Im also wondering what limitations I will have with one L3 switch but also a L2 aggregation switch upstream.
if you use unifi gateway, you do not need to manually setup static routing in order to use L3 switch; if you use third party router, search for "pfSense" and "Layer 3" in my channel. And regarding how L3 switch work together with L2 switch, I am thinking about posting a video about it.
That second to last line, PERFECT! Great video.
Super great timing for me- on multicast filtering setting should all of your networks EXCEPT the network that you need multicast OR opposite do you turn multicast filtering on for only the network in which you have multicast devices? I just know sometimes the names of features don’t actually mean what they imply. Sometimes actually opposite of the name
I would enable it on all VLANs. But to avoid potential issues, to be safe you may first only enable IGMP Snooping in networks where you do have multicast streaming devices.
@hz777 was your video prompted because of ProAV port profiles being introduced? Perhaps a video of you digging into the settings behind the gui of the different port proav profiles - Qsys, Qsys with Dante, shure, Svode etc. great content!!!
Thank you for sharing this insightful video. How would one approach this if the NAS is being used primarily for file storage and they wish to utilize the unused second port to create these macvlan networks? Additionally, does the user need to connect an Ethernet cable from port 2 of the NAS to the UDM router-gateway/switch? Currently, I have Pi-hole set up on one VLAN (Secure), which is configured with firewall rules, and the Pihole interface is allowed from all origins. Ideally, I’d like to adopt your approach to create a more secure environment. Thanks!
The approach in this video is more for experiment purpose, and is very risky. Sorry but I decide not to provide any recommendations for this topic just to avoid troubles. If you want to follow what I did in the video, take your own risks. Regarding whether an Ethernet connection is needed, the answer is yes.
@@hz777 No problem! I truly appreciate your response. Thanks again!
Good video very informative and well presented. I understood the concept and application easily. 🙏
really great work 👏
Hi, I've been following your channel for a while now. Could you please create more videos about UniFi Protect and a detailed breakdown of its features? It would be really helpful for improving my home network.
I also thought of creating videos for UniFi Protect, deep dive style, option by option, like what I am doing for UniFi gateway/switch. But the thing is: first, sometimes UniFi Protest's settings are camera specific, but I don't own many of the cameras; second, to show how it works I have to show the camera video, which I want to avoid. So, if you have any video ideas about general settings, please let me know.
@@hz777 I understand your point, you can make a video on How stacking works, and the mode of communication between parent and child console. sometime, there are incidence when a wireless camera disconnect, how to check logs for those via SSH. There are camera logs inside the console logs, how we can navigate via that. I hope you get my point
Are you using the native macOS Screen Share app to display your other macOS desktops? If you are not, what VNC client and server are you using? Thank you.
Native.
Great video, thanks for taking the time to benefit us.
looking awesome
Geez, that is a great collection of tools 🔥
question, you servers and clients, are they on the same subnet.... implying no routing needed from the pfSense... looking at your first diagram, it looks like you aggregated 4 x ? ports between switch and pfSense host, what would be the impact if say that link is 10GbE, and you need to do inter vLan routing... does the traffic move via the pfSense or does only manage/allow the movement via FW rules... building similar, but at a slower, speed. I have a USW Pro aggregate and a USW 8port Aggregation.
Yes, routing is through the router. Yes, speed is faster than non-aggregated.
How you use all the mac mini together?, I am curious, really good machines you have
From a remote Mac, screen share the 4 Mac mins.
@@hz777 I want to see that, I love the idea, maybe I take the idea for my 2 laptops, there are an special software to share the screen with the minis?
@@AIPapersDecodedPodcastit's builtin feature for macos. Settings-->share-->screen share
@@hz777 Thank you Sir
You are not only tech savvy, but also super Handy. And you have even more variety of equipment than a professional contractor...
Slick! I liked cookies better ;) Soon you will need to make a rack for the Mac Minier heh
I canceled my order for the minier... Waiting for the not so mini studio :D
Hello, the Rack is for Desktop or who is the Place of this. I Thing this is a Good Idee for not Buy and when you love woodwork its nice.
I don't think anyone else has so many outdated minis and are still using them :)
What website were you using @8:01 ?
8:01 is not a website. It's my slide for this video.
Do IPV4 rules only apply or allow creation with networks that have the switch set as router - or can you apply an ACL IPV4 rule to 2 networks that are "created" on the firewall, have the unifi gateway set as router....meaning inter-vlan traffic between the two is sent to the UDM. I want to intercept this with some ACL allow rules. For instance, I want to create and separate all VLANS via the UDM but then use ACL IPV4 ACL rules to "ALLOW" traffic between 10GB clients on different vlans to avoid the UDM lousy inter-vlan throughput. I have 10GB servers and 10GB clients that must stay in separate vlans but I want their traffic to each other to remain at the switch level to saturate that 10GB link. ACL allow rules was my idea on how to achieve this. Would this work as ACL takes precedence over FW rule when the devices are connected to L3 switch? Or will it ignore ACL rule because the networks have UDM set as gateway? Alternatively I could create all VLANS on the switch, use ACL isolation rules or ACL block IPV4 rules to separate them and then all traffic is passed at line speed/switch level. I feel I may be missing out on some needed future firewalls rules if I do it this way.
IP ACL applies to "normal" VLANs as well. I believe I had already explained the difference between IP ACL and firewall rules in this video. Regarding your question about whether ip acl rule and firewall rule can co-exist, the answer is yes, because technically they are implemented in totally different ways so have nothing to do with each other. However, because ip acl is in switch, it will be executed "earlier" than firewall rule in router, so you may need to look into the whole process to understand whether they conflict and override each other.
@@hz777 Interesting as I received the opposite answer from ChatGpt: ACLs will not work to intercept inter-VLAN traffic routed by the UDM. If the UDM is set as the gateway, it dictates inter-VLAN routing, and traffic must pass through it. This implies IP ACL will have no effect with "normal" or switch facing VLANS. Have you tested this by any chance?
Have you watched this particular video you are commenting on?
@@hz777 Yes perhaps I'm confused. In this video to answer my question we would need to create IPV4 ACL rule with VLAN 10 and VLAN 30. Those networks are firewall isolated so they certainly have the Unifi gateway set as router in the network pane. In this scenario would IP ACL work since these networks are firewall controlled but connected to same L3 switch? Forgive me if I am not following but I would like to see if IP ACL rule could be applied to vlan 10 and 30. The only examples I saw were with vlan 20 and 40, both of which I assume have the switch set as router. Lol I have watched a bunch of your videos past 2 days. I hope I am not making it more confusing for you.
The video was several months old, so I cannot remember all the details. Maybe I did not show the network configuration, so caused the confusion from your side believing two of the vlans were managed by L3 switch. No, ALL the vlans in the video were managed by gateway. This video has nothing to do with L3 switch.
hello, I just tried with installing pihole in lxc but when multiple nics are attached pihole takes 5 minutes or more to start, is it a normal behavior or I missed something?
Yes I have the same experience. Don't have time to look into it to see why, but a Google search leads to some web forum posts about IPV6 DHCP.
Some other differences... - Traffic Rules Region drops will appear in Insights > Flows, but there is currently no logging of Country Restrictions. - using Allow in General Country Restrictions will automatically block all other traffic. - using Allow in Traffic Rules does not automatically block all other traffic, you would need a separate drop rule.
Forgive me I'm not very experienced in network. But for a simple home setup with say 4-5 Vlans a NAS, a server or 2 and just a bunch of clients mostly needing internet connectivity what is the case to have any networks on the router except for the default or management network for your appliances and server IMPI etc...wouldn't you want to have most everything you could created on the L3 switch to avoid that traffic ever routing to the gateway/FW just to be sent back down the stack? Furthermore for this video wouldn't it just be wise to use IPV4 ACLs if you want one way or directional separation for VLAN seeing as how the L3 isolation is both directions? I don't understand the need for the L3 isolation option unless its just there for people who may not understand how to create IPV4 ACL?
Mac ACL, IP ACL, firewall rules, they work differently from technical perspective, they were introduced to the unifi network controller in different time for different reasons. So today if you see an option as an seemingly overlap with another option, it can either be because those two options were introduced at different time, or because they are for different types of target users: one-click-then-call-it-done users or explore-all-and-understand-all users :)
Can we achieve true Layer 3 routing then by creating our networks with the switch as gateway...using L3 network isolation....then using IPV4 ACLs to ALLOW certain VLANS to communicate with each other? Would the latter override the former? Because the L3 network isolation ACL unfortunately is both ways and the IPV4 ACL have source and destination. So would this keep inter-vlan traffic on the L3 switch instead of routing to firewall and back? Am I making sense? This is all because the L3 isolation cant be provisioned with a specific direction, that would make L3 routing finally possible? I purchased a unifi L3 switch a year ago and found out quick it doesn't have any L3 functions so I've been waiting for this to take inter-vlan traffic away from the firewall. I did just change from Pfsense to unify gateway hoping that would make it possible but I'm still unsure. Some things in unifi are great and other things they try to re-invent just making it more confusing than needs to be. I think so many of us already have vlan separation for secure/guest/IOT but want the inter-vlan traffic to be routed at the switch level for the speed and also weight off the FW cpu. I keep all my VLANS isolated from each other except one. My secure VLAN can reach any network but not BOTH ways of course. I'm frustrated lol. Great videos with such great examples as always. I keep coming to you for help before anyone else. you should teach!
I do have multiple videos covering ip ACL and its comparison with firewall rules. The short answer is yes you can, but the end result may not be exactly the same firewall rules.
@@hz777 Ok I was just thinking and playing around. I see you can add multiple networks to destination in IPV4 ACLs...this would mean I could separate all networks with just a few rules...If I have 3 networks it would only require 3 rules for complete isolation? Then everything stays routing on the switch. I'll have to check out your video and see if there are any caveats to this?
By far best explanation about all this. I legit have been looking for days to explain all of this and I think you are the only source even 5+ months later... Good job and you have a new sub. If you are looking for new video ideas. Unifi now lets you add Stamps to DNS Shield. I would be very interested in learning how to create custom stamps within CloudFlare Zero Trust while also doing ad filtering. I have succesfully created my own CloudFlare Zero Trust free account and created my own stamp, but not sure how to add any type of filtering.
As I know, zero trust does support ads filtering, but the rule allows very limited entries, which does not make sense for ads blocking. There are many workarounds on the web, have you tried them?
Thanks a lot! Are those settings still safe with regard to the Blast-RADIUS attack? Or do we need to configure things differently (e.g. requiring the message authenticator attribute)?
What I did is create unique querier IP addresses for each switch in each VLAN where I have IGMP enabled and want a querier. 192.168.10.0/24 has querier IPs of 192.168.10.5 and 192.168.10.225 192.168.20.0/24 has querier IPs of 192.168.20.5 and 192.168.20.225 192.168.50.0/24 has querier IPs of 192.168.50.5 and 192.168.50.225 ... my management IPs are in 192.168.5.0/24 and aren't defined as querier IPs. To keep things simple, I used the last octet of the management IPs, but obviously changed the subnet. Agg8 show ip igmp snooping querier VID | State | Status | Version | Querier IP | Elected IP ------+----------+-------------+---------+-----------------+----------------- 1 | Disabled | Non-Querier | No | --------- | --------- 5 | Disabled | Non-Querier | No | --------- | --------- 10 | Enabled | Non-Querier | v2 | 192.168.10.225 | 192.168.10.5 20 | Enabled | Non-Querier | v2 | 192.168.20.225 | 192.168.20.5 30 | Disabled | Non-Querier | No | --------- | --------- 50 | Enabled | Non-Querier | v2 | 192.168.50.225 | 192.168.50.5 200 | Disabled | Non-Querier | No | --------- | --------- 666 | Disabled | Non-Querier | No | --------- | --------- 999 | Disabled | Non-Querier | No | --------- | --------- Pro24 show igmpsnooping querier detail Last Querier VLAN ID Address IGMP Version ------- ---------------- ------------ Global IGMP Snooping querier status ----------------------------------- IGMP Snooping Querier Mode..................... Enable Querier Address................................ 0.0.0.0 IGMP Version................................... 2 Querier Query Interval......................... 60 Querier Expiry Interval........................ 125 VLAN 10 : IGMP Snooping querier status ---------------------------------------------- IGMP Snooping Querier VLAN Mode................ Enable Querier Election Participate Mode.............. Disable Querier VLAN Address........................... 192.168.10.5 Operational State.............................. Querier Operational version............................ 2 Operational Max Resp Time...................... 10 VLAN 20 : IGMP Snooping querier status ---------------------------------------------- IGMP Snooping Querier VLAN Mode................ Enable Querier Election Participate Mode.............. Disable Querier VLAN Address........................... 192.168.20.5 Operational State.............................. Querier Operational version............................ 2 Operational Max Resp Time...................... 10 VLAN 50 : IGMP Snooping querier status ---------------------------------------------- IGMP Snooping Querier VLAN Mode................ Enable Querier Election Participate Mode.............. Disable Querier VLAN Address........................... 192.168.50.5 Operational State.............................. Querier Operational version............................ 2 Operational Max Resp Time...................... 10
I haven't looked at it in Wireshark yet, but the correct IP is elected as querier with these manual definitions, so something must be happening to facilitate that between the switches. Another test would be to fail the querier switch and ensure the next best option is elected when they are manually defined.
In the video because I only enabled IGMP Snooping in one channel, I can simply use the original IP addresses of the switches. But if multiple VLANs are enabling it, yes an address naming convention is needed.
是不是因为两个ap信号重叠区域的信号强度都低于你设置的67db,所以设备会在两个ap之间反复连接呢?
I checked the "Isolate Network" and Im still able to ping other Networks... Any fix to this?
Thanks for the video, helped a done. My other question is how you could accomplish the same for IPv6 DNS requests? This rule doesn't appear to capture that traffic.
I don't have an environment to test IPV6.
Excellent video. Just ordered my u7 pro max. Time to test out 6ghz before it starts getting stomped on.
Finally a good video that does a deep dive on Ubiquiti! Thank you sir!
Hello I hope you can help me out. I have implemented all this in exactly the same way, but when I inspect with wireshark I notice that during the TLSv1.3 handshake the SNI is completely leaked. Any idea why that can be?
Are you referring to the SNI in the "server_name" section of the "Client Hello" packet? Because a server can host multiple websites, the SNI is needed to make sure the server can choose correct certificate to provide the service. As long as the SNI does not include the domain name you want to resolve, I don't see an issue.
Great video as always. Couple of quick questions: 1 - Which release of switch FW were you running ? If not EA have you tried that ? 2 - Would you generally recommend multicast filtering / IGMP snooping being enabled for surveillance VLANs (Cameras + NVR) as opposed to just media networks (AirPlay etc) ? Thanks
1) 7.1.26. No, I don't use EA firmware. 2) For a VLAN you don't expect multicast traffic, the only benefit of enabling IGMP Snooping I can think of is to prevent potential DOS attach by using multicast floods.
Thank you!
This is the best guy on the Internet on Unifi software, he really goes in detail on any Unifi option. I don't think that even unifi guys know more than him :). Thanks for the video.
Thanks!
Thanks for making my suggestion :D <3
This and your whole channel is very underrated! Thank you for the very detailed information. Keep the good work up!
Hi there, super nice content ive been a unifi consumer for the las few years, but right now with all this mayor upgrades that they have done, im in need of some consulting and brainstorming for an specific scenario that i acquired with EOL switches need to be upgraded and a fortinet routing environment. looking foward to replace it all with unifi, so any advice or idea exchange will be very helpful.
Awesome video, do I need to change settings to my access point in order to benefit from this configuration?
The setting is in the gateway and will impact your whole network, instead of just an access point. When it comes to whether to implement a feature or not, my answer is always the same: it depends. I believe all functions are there for a reason.