5 Mistakes New UniFi Users Make (don't make these)

แชร์
ฝัง
  • เผยแพร่เมื่อ 13 ม.ค. 2025

ความคิดเห็น • 45

  • @WunderTechTutorials
    @WunderTechTutorials  12 ชั่วโมงที่ผ่านมา

    Since this has come up a few times in the comments, if you set your hardware to use a static IP address, you should modify the DHCP range to ensure the DHCP server doesn't attempt to give out those IP addresses. I go over it in this video if you'd like to see it: th-cam.com/video/3ZxnCtQ31ew/w-d-xo.html

  • @jonnyzeeee
    @jonnyzeeee วันที่ผ่านมา +1

    Excellent video. Thanks for all your great work. Agree with the need for dynamic dns however unifi’s implementation is lacking IMO. There are no logs to tell you what’s going on. I prefer using a docker container.

  • @comptvlee
    @comptvlee 18 ชั่วโมงที่ผ่านมา

    You're an exceptional orator, sir! Cleared up a lot of confusion concisely and with great examples. Much appreciated!

    • @WunderTechTutorials
      @WunderTechTutorials  16 ชั่วโมงที่ผ่านมา

      Thank you very much! Appreciate you watching!

  • @TechMeOut5
    @TechMeOut5 วันที่ผ่านมา +4

    Spot on Frank! the allow return traffic checkbox implementation is definitely a greatly welcomed addition!

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      Thanks, Avi! Totally agree, happy to see it added!

    • @jonnyzeeee
      @jonnyzeeee วันที่ผ่านมา

      But do you need this when you have a separate rule for allow established and related? Perhaps it depends on rule order.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      @@jonnyzeeee No, if you have a separate rule, you don't need it (but yes, the order matters).

  • @purmll1762
    @purmll1762 วันที่ผ่านมา +6

    Quick question on the static IP tip. I always configure static IPs on the HW but when it comes to DNS, if you’re running something like a PiHole or AdGuard Home config locally on LAN, wouldn’t you want to point the UI HW DNS to that IP so that all traffic traverses the internal PiHole / AdGuard server (which also has pointers to upstream DNS) rather than external ? Thanks

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา +2

      In my opinion, no. The benefits that Pi-hole/AdGuard provide don't really benefit the hardware. I can understand wanting to monitor them and their DNS requests, but the downside is that they'll lose DNS resolution the same way the rest of your network will in the event of an issue. With this approach, you'd still be able to use the Site Manager because the hardware wouldn't be impacted...assuming it was a DNS issue. With all of that said, this is just my opinion!

    • @MacGyver0
      @MacGyver0 วันที่ผ่านมา +4

      It's correct way IMO, just don't forget to set alternative (second) DNS that points to cloudflare (or what you like). In case of local DNS failure, router will use second fallback address.
      But don't use local dns (such as ADGuard or PiHole) to specify local dns records, add such records in the router itself.
      It's kind of a waste of time to manually specify DNS for each local device. Also, ADGuard can provide better DNS resolution speed by resolving from cache (optimistic scheme).

    • @Ijaz.s
      @Ijaz.s วันที่ผ่านมา

      Unfortunately, that hasn't been my experience as well as of others online. If you put multiple DNS servers, UDM will split the traffic between both and not do one and then the other. ​@@MacGyver0

    • @cejay67
      @cejay67 วันที่ผ่านมา +1

      We always configure to an external provider, never internal. Lose that DNS resolver and you lose connectivity. You’re not doing local lookups anyway, so just point at two external resolvers. Our SOP is to always configure static IP’s, but some of our techs forget.

    • @purmll1762
      @purmll1762 วันที่ผ่านมา

      So use PiHole AdGuard to point the APs and switches to plus DHCP the same to clients /networks BUT UDMP to the externals ? Best of both worlds

  • @LukeHoersten
    @LukeHoersten วันที่ผ่านมา +1

    Great video! Thank you!

  • @nicolaslavinicki4029
    @nicolaslavinicki4029 วันที่ผ่านมา

    Great one! Just save the video! Thank you so much!

  • @kevinhughes9801
    @kevinhughes9801 วันที่ผ่านมา

    So useful thank you

  • @NoneBusiness-cf1dx
    @NoneBusiness-cf1dx วันที่ผ่านมา

    Having issues with pinging devices in my IoT (UnTrusted) zone from my default (Trusted) zone. Any ideas on how to set up the polices with the new zone based setup?

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      Did you allow return traffic on the untrusted zone?

    • @NoneBusiness-cf1dx
      @NoneBusiness-cf1dx วันที่ผ่านมา

      @@WunderTechTutorials I did.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      Is the allow rule above any block rules you created? The allow return traffic rule should be created on the untrusted zone.

  • @yifeiren8004
    @yifeiren8004 วันที่ผ่านมา +1

    Suggestion, you should not configure DNS that way. Simply go under security and enable HTTPS DNS, that will overwrite whatever the gateway got from for the WANs, and also encrypted

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      It's not about the WAN, it's about the LAN. Some people change their default DNS servers to local DNS servers without realizing that it impacts their Switches and APs as well.

  • @ronm6585
    @ronm6585 วันที่ผ่านมา

    Thank you.

  • @agglad2230
    @agglad2230 20 ชั่วโมงที่ผ่านมา

    I'd like to request video about USW-EnterpriseXG-24. Thank you.

  • @nicolaslavinicki4029
    @nicolaslavinicki4029 วันที่ผ่านมา

    I'm looking to buy a U7 Pro, but I've read in the unifi community that many users have and continue to have problems with it. Have you had any problems with the U7 lineup? Could you share your experience?

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      So funny enough, I was a little concerned about that too from what I was reading, but I haven't had any problems at all. Nothing from IoT devices to WiFi 7 devices. The WiFi 7 performance is great if I'm close to the AP, and slowly gets worse as I move away from it, but that's just how the 6 GHz band works so that's expected. Overall, very happy with it all.

  • @yifeiren8004
    @yifeiren8004 วันที่ผ่านมา

    Correction, when you tag Vlan, you are blocking the traffic in layer 2, aka same broadcast domain.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      Agreed, traffic still flows through layer 3 if allowed.

    • @diabilliq
      @diabilliq วันที่ผ่านมา

      @@WunderTechTutorials indeed but note it will only flow on whatever is natively tagged on the port aka the untagged VLAN. anything tagged on the port will get dropped.

    • @PrymalInstynct
      @PrymalInstynct วันที่ผ่านมา

      Agreed, the vlan section felt incredibly confusing and inaccurate to what I know.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา +1

      I tried to simplify it because the average user doesn't understand tagged, untagged, layer 2, layer 3, etc. I'll try and explain it better and more technically in a future video.

  • @jhonattansouza
    @jhonattansouza วันที่ผ่านมา +1

    i've learned very nice tips in this video, appreciate it , keep up w the good work !

    • @LtsPrty
      @LtsPrty วันที่ผ่านมา

      same. cheers!

  • @robertterzi4451
    @robertterzi4451 19 ชั่วโมงที่ผ่านมา +1

    The title doesn't really fit the content. The first topic really feels like it is aimed at.intermediate users who have bought a the whole unifia stack

    • @WunderTechTutorials
      @WunderTechTutorials  16 ชั่วโมงที่ผ่านมา

      Fair point. Always forget there are people who have a UDR or UX. My apologies - I'll try and be clearer next time.

  • @yifeiren8004
    @yifeiren8004 วันที่ผ่านมา

    Correction again, when you select Lan In, you are only blocking a device from the source VLAN to the destination. Because that's LAN in from the perspective of the router. So even when you have that rule, the destination VLAN device can still reach to the source VLAN. Because it will be a LAN out traffic.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      If you explicitly allow return traffic, then you're not blocking it in both directions. If you don't, traffic will be blocked in both directions even with only one rule blocking the source from accessing the destination. You can get around it by having a separate rule that allows return traffic, but if you only have one and you don't allow return traffic, it will be blocked.

  • @pablosskates7067
    @pablosskates7067 วันที่ผ่านมา

    Doesn't this guy have the manliest man voice ever. God damn he should be in hollywood.

    • @WunderTechTutorials
      @WunderTechTutorials  วันที่ผ่านมา

      😂! No better way to start off the day. I wish I felt the same though 😂

    • @RoyalFlushFan
      @RoyalFlushFan 15 ชั่วโมงที่ผ่านมา

      You ain’t wrong.