aboutsummaryrefslogtreecommitdiff
path: root/blog/2023-06-18-unifi-ip-blocklist.org
diff options
context:
space:
mode:
authorChristian Cleberg <hello@cleberg.net>2023-12-02 11:34:20 -0600
committerChristian Cleberg <hello@cleberg.net>2023-12-02 11:34:20 -0600
commitfcc889508ab63a679b5cbd231478b25cff48d8fc (patch)
treea9ec2ce9f00b07a0ab081e7160e1183a7cef634f /blog/2023-06-18-unifi-ip-blocklist.org
parentdfb4de1797796c72f597f4c0c6cd1e01dc5a66ee (diff)
downloadcleberg.net-fcc889508ab63a679b5cbd231478b25cff48d8fc.tar.gz
cleberg.net-fcc889508ab63a679b5cbd231478b25cff48d8fc.tar.bz2
cleberg.net-fcc889508ab63a679b5cbd231478b25cff48d8fc.zip
fix: update domains
Diffstat (limited to 'blog/2023-06-18-unifi-ip-blocklist.org')
-rw-r--r--blog/2023-06-18-unifi-ip-blocklist.org6
1 files changed, 3 insertions, 3 deletions
diff --git a/blog/2023-06-18-unifi-ip-blocklist.org b/blog/2023-06-18-unifi-ip-blocklist.org
index 2e14a59..25f66e2 100644
--- a/blog/2023-06-18-unifi-ip-blocklist.org
+++ b/blog/2023-06-18-unifi-ip-blocklist.org
@@ -31,7 +31,7 @@ Settings > Profiles.
Within this page, choose the `IP Groups` tab and click `Create New`.
-![Network Profiles](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/unifi_profiles.png "Network Profiles")
+![Network Profiles](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/unifi_profiles.png "Network Profiles")
Each IP Group profile can be used as one of three options:
@@ -44,7 +44,7 @@ different IP addresses and a subnet.
Once you've added all IP addresses and subnets, click the `Apply` button
that should appear at the bottom.
-![Network Profile IPs](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/abusive_ips.png "Network Profile IPs")
+![Network Profile IPs](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/abusive_ips.png "Network Profile IPs")
At this point, the IPv4 Address/Subnet has been created but not yet used.
@@ -66,7 +66,7 @@ entry should contain the following settings:
Customize the remaining configurations to your liking, and then save and enable
the firewall rule.
-![Firewall Rule](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/firewall_drop_rule.png "Firewall Rule")
+![Firewall Rule](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/firewall_drop_rule.png "Firewall Rule")
Once enabled, the Unifi machine will be able to drop all incoming connections
from the defined IP addresses and subnets within the created profile.