UniFi Firewall Block Outbound Ports

preview_player
Показать описание
Follow this quick guide to block outbound ports on the UniFi firewall. If you want to see a video on really locking down the outbound traffic let me know below!

Amazon Afflilate Links for Ubiquiti Gear:

Affiliate Links (I earn a small percentage of the sale if you use these links):

Contact us for network consulting and best practices deployment today! We support all Grandstream, Synology, DrayTek, Obihai, Poly, Ubiquiti, MikroTik, Extreme, Palo Alto, and more!

Come back for the next video!
Twitter - @WillieHowe
TikTok - @whowe82

SUBSCRIBE! THUMBS-UP! Comment and Share!
Рекомендации по теме
Комментарии
Автор

Would love to see a video on locking down guest networks

johnmasters
Автор

Yes, I would like to see a video on blocking all traffic. Great Videos!!!!

ScottiRaffaele
Автор

Yes, I would like to see a video on blocking all traffic. Thanks for what you do Willie.

jims
Автор

Yes, I want to see more because there's not a lot of content teaching about Unifi firewall with the latest interface.

JasonS-hx
Автор

i really like this format. One topic, quick and clean. I learn more here than any other creator. Thanks for getting to the point without a lot of fluff or production

talkenrain
Автор

Great video and thanks again. I want to see how you actually lock down all ports except the ones needed like 80, 443, emails ports. I'm using pfsense and I want to see how you do it with unifi firewalls.

tokoiaoben
Автор

I am really interested in locking down the guest network. Would love to see that video

jparrish
Автор

YES! Locking down Torrent! Would love to know how!

ETRdotTV
Автор

Yes. That would be nice to see blocking all traffic.

JorgeHerrera
Автор

Fresh cup of coffee and some WillieHowe Content :)

JasonsLabVideos
Автор

I would love to see a video on locking down networks and securing the IoT network.

grundy
Автор

That sounds like a great video idea. I vote you do it!

iamkerok
Автор

Good video. This is a great suggestion, and the video was right to the point. It is a little different for anyone running the older controller versions (Cloud key gen 1). Anyway, I thought I would mention that it would be good to point out if there are multiple guest networks (I had such a case), 'Guest' networks by default in UniFi are able to communicate with each other. Not sure why that would be true, but there are automatically created rules for anything labelled a guest network to allow multiple guest networks to communicate with each other.
I only mention this, because I have a special network for 'recovery' testing for an application I support. Trying to be diligent, I created it as a guest network in the intent to 'isolate' it from the other networks. It was isolated from the corporate networks, just not from the other guest network. Yes, this might be an edge case. That's fair, but I think the point is important.

cjramseyer
Автор

Thank Willie for this series of UniFi videos... What about restrict VPN clients to access only to a specific VLAN or a specific internal source using UniFi Firewall or Traffic Management rules?

javiercamacho
Автор

I would like to see a video on blocking all traffic. Thank you

mbashir
Автор

Very good video Willie - you got my 'like' 🙂

PEDoers
Автор

Get you elaborate more on the double Nat vpn configuration you mentioned on the unifi vpn video. Thanks

jorgegomez
Автор

Also let’s see a video on bandwidth vampires 😂 cause that’s what I’m dealing with

kristopherleslie
Автор

When making a rule in the Traffic Management screen and targetting a device, it seems like the block and allow settings only affect outbound traffic from the device for the traffic the rule is set for and not inbound traffic (at least that is what others have told me when I asked why Iw as still getting internet traffic hits despite a block rule). Is there any way to make that block inbound traffic to the device as well? Or if that can only be done in the more normal firewall rule, how would you do things like block an app, or a domain, or a region of traffic in the firewall section? Seems like it wants an IP and/or a port for the firewall rule, so how would we find out what the IP or port the app we are trying to block is actually doing so we can add it to the firewall?

LordSaliss
Автор

Yes, show the other video with only the (3) allowed ports. Also, show in the logs where it shows as blocked.

Moonraker
visit shbcf.ru