Unifi OpenVPN Server

preview_player
Показать описание
In this video I go over how to setup a OpenVPN Server in Unifi network. I also create a DDNS server and traffic management rules to only allow our VPN users access to my Synology NAS

▶ Hire us on our website

▶ Get Mactelecom Merch 👕

▶ Join our Discord Channel:

------------------------------------------------------------------------------------
Affiliates I use:

▶ VOIP.MS

▶Canadian Amazon Store front:

▶USA Amazon store front:

------------------------------------------------------------------------------------
▶ Find us on social media:

▶ Instagram:

▶ Facebook:

▶ Twitter:

▶ TikTok:

▶ Linkedin:

▶ Twitch:

0:00 Intro
0:48 Creating DDNS
2:05 Creating OpenVPN Server
4:40 Creating Traffic management rules
6:30 Final thoughts
Рекомендации по теме
Комментарии
Автор

That's a great Video! Let's hope they'll release IKEV2 at some point.

terrorwolf
Автор

Great video. The only thing that stinks with using OpenVPN on a UDM is that it’s only TCP-based and not UDP. Not very efficient for an IPSec tunnel. Let’s hope Ubiquiti changes that or at least gives you an option between the two. Furthermore, you can only create one OpenVPN tunnel/server. Let’s hope they change that as well in the future.

AviatorMike
Автор

I love this feature and have had it running since possible. My family members have UDR's and I have the SE. With Netflix cutting down on password sharing, I've been able to use this to forward all traffic from their respective apple tv's through the vpn

tfacter
Автор

Any information on the network speed impact when doing this in an UDM Pro? Does it really go down to 800 Mbps?

gaijinboricua
Автор

So, is it better to do the VPN set up on the Unifi or on Synology side? Also, what about Tailscale, as a replacement for all these VPN configurations?

pantag
Автор

Great video thanks! Quick question, is every traffic rule processed no matter what? I would have thought the traffic would have been immediately dropped after hitting your first block rule and disregarded your allow rule? Or are the rules processed from bottom to top?

mattguyatt
Автор

Hi there, I've been using L2TP VPN on my USG Pro. It stopped working and Ubiquiti says my ISP is blocking the signal/traffic. The ISP says they don't do that. It's been a run around. Will this help me VPN back into my network or is it another round of back and forth? What are your thoughts on my current situation? Thank you

johnmoricone
Автор

What do you guys think? I'm using the free home edition of Sophos Firewall with one of their access points. The access point is about to reach end-of-life later this year and will no longer function. Their newer access points are super expensive (we're talking almost $350 for the better entry-level models) and then you can only use them with Sophos firewalls. I have some Tp-link Omada switches and a controller. I would either stick with Sophos and go with a tp-link Omada access point which would make the most sense right now, or dump Sophos altogether and go with Ubiquity now that they are working on having OpenVPN server in their devices. From a security standpoint, Ubiquity is a kid's toy compared to Sophos, but Sophos can be a real pain to configure all the time and requires extensive amounts of configuration to keep working.

canadianwildlifeservice
Автор

Great video as always my man 🇨🇦...Im curious...when you created that allow rule, did it automatically build out a route for that traffic flow? Would be interesting to see how it builds out the route. I know there are options for manually configuring routes.

darealdynasty
Автор

Hi Cody,

This OpenVPN setup works nice, however I cannot get out again via the internet. (Internet pass-throug?)
The OpenVPN clients will not get an Gateway IP adress and are not able te get out to the web again.

I like to use OpenVPN on my smartphone (when not at home) to use 2 Pi-Holes on my phone also. (I really hate annoying advertisements, and do not want to install "an other app" in my android phone)
The only (known to me that is) work around is to "allow access to LAN/VLAN" to get internet on my smartphone.
Big security risk here is access to all de LAN devices are allowed, no blocking is in place then.

What I like to achieve: internet access with add-block capabilities AND access to selected devices (only NAS and LAN printer for example), but no access to Unifi Console via VPN.

Equipment: UDM-Pro, Unifi OS 3.2.9, Unifi Network 8.028 with a 1/1gbit fiber connection.

pepqx
Автор

Does this allow WAN traffic to be sent? If your outside the home and connect to the VPN and do a what is my ip does it show the VPN IP and DNS or your cellular IP and DNS?

jcb
Автор

Thanks for the video. Does this OpenVPN implementation support static IP assignments for the vpn clients?

vladjirasek
Автор

What are the max simultaneous users at the time on OpenVPN? Can we do 10 users?
Also, with OpenVPN, can we have more than 5 concurrent users on RDP on different computers?

gonxme
Автор

Amigo boa noite, posso usar outra porta tipo 1195 ?

rodolfoandrade
Автор

Hi Cody. Is this setup an alternative to the WireGuard video you previously created? In other words, is OpenVPN just another way for allowing remote access INTO your network? If so, I'm curious what the differences are. This setup seemed way more involved than the WireGuard setup.

Jupiterne
Автор

How do I prevent the clients from accessing the other network if the VPN goes down?

Firebirdgm
Автор

Hi this is very useful tutorial. I wonder how to add speed limit over the VPN connection?

przeniko
Автор

Did you had success with Stripe / payment logistic yet with the new captive portal page?

TheRealscarab
Автор

Hey Cody! A month ago, DNSoMatic and Cloudflare DDNS (dyndns) stopped working on my UXG. Nothing's working so I have to use MarcsUpdater. Have you been able to make it work recently?

Автор

How can I block the vpn clientes to been able to access the web interface of the UDM

eduardovazquez