aboutsummaryrefslogtreecommitdiff
path: root/content/blog/2023-06-18-unifi-ip-blocklist.md
diff options
context:
space:
mode:
authorChristian Cleberg <hello@cleberg.net>2024-07-08 20:31:42 -0500
committerChristian Cleberg <hello@cleberg.net>2024-07-08 20:31:42 -0500
commita807aed5c389d1dfadcd5c88b79c48469aa5b9d9 (patch)
tree5291dff815cf5888992a18702bb1b7f5bb421d3a /content/blog/2023-06-18-unifi-ip-blocklist.md
parentce89917716b1e9f76d49fd169c7b1feab0af6d72 (diff)
downloadcleberg.net-a807aed5c389d1dfadcd5c88b79c48469aa5b9d9.tar.gz
cleberg.net-a807aed5c389d1dfadcd5c88b79c48469aa5b9d9.tar.bz2
cleberg.net-a807aed5c389d1dfadcd5c88b79c48469aa5b9d9.zip
fix images for 2023 and 2024 posts
Diffstat (limited to 'content/blog/2023-06-18-unifi-ip-blocklist.md')
-rw-r--r--content/blog/2023-06-18-unifi-ip-blocklist.md13
1 files changed, 1 insertions, 12 deletions
diff --git a/content/blog/2023-06-18-unifi-ip-blocklist.md b/content/blog/2023-06-18-unifi-ip-blocklist.md
index 9e8a860..5861054 100644
--- a/content/blog/2023-06-18-unifi-ip-blocklist.md
+++ b/content/blog/2023-06-18-unifi-ip-blocklist.md
@@ -27,15 +27,10 @@ blocked yet.
# Create an IP Group Profile
-To start, login to the Unifi machine's web GUI and navigate to the Network app
-
-> Settings > Profiles.
+To start, login to the Unifi machine's web GUI and navigate to the Network app > Settings > Profiles.
Within this page, choose the `IP Groups` tab and click `Create New`.
-![Network
-Profiles](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/unifi_profiles.png)
-
Each IP Group profile can be used as one of three options:
1. Port Group
@@ -46,9 +41,6 @@ In this example, I'm creating an IPv4 Address/Subnet group and adding a few
different IP addresses and a subnet. Once you've added all IP addresses and
subnets, click the `Apply` button that should appear at the bottom.
-![Network Profile
-IPs](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/abusive_ips.png)
-
At this point, the IPv4 Address/Subnet has been created but not yet used.
# Drop IP Group Profile via the Unifi Firewall
@@ -69,9 +61,6 @@ entry should contain the following settings:
Customize the remaining configurations to your liking, and then save and enable
the firewall rule.
-![Firewall
-Rule](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/firewall_drop_rule.png)
-
Once enabled, the Unifi machine will be able to drop all incoming connections
from the defined IP addresses and subnets within the created profile.