diff options
author | Christian Cleberg <hello@cleberg.net> | 2024-05-01 21:45:52 -0500 |
---|---|---|
committer | Christian Cleberg <hello@cleberg.net> | 2024-05-01 21:45:52 -0500 |
commit | dc1261d703ae1e1a14841b030888e3f87ff7c38f (patch) | |
tree | 71139c9021b09704b2d45be3b64d54e2acbae55f /content/blog/2023-06-18-unifi-ip-blocklist.md | |
parent | ba6b552c8256cc2e071c910ef7821c82443f1f82 (diff) | |
download | cleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.tar.gz cleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.tar.bz2 cleberg.net-dc1261d703ae1e1a14841b030888e3f87ff7c38f.zip |
prettier formatting and rewrap lines
Diffstat (limited to 'content/blog/2023-06-18-unifi-ip-blocklist.md')
-rw-r--r-- | content/blog/2023-06-18-unifi-ip-blocklist.md | 17 |
1 files changed, 9 insertions, 8 deletions
diff --git a/content/blog/2023-06-18-unifi-ip-blocklist.md b/content/blog/2023-06-18-unifi-ip-blocklist.md index 0d1e014..9e8a860 100644 --- a/content/blog/2023-06-18-unifi-ip-blocklist.md +++ b/content/blog/2023-06-18-unifi-ip-blocklist.md @@ -7,8 +7,8 @@ draft = false # Identifying Abusive IPs -If you're like me and use Unifi network equipment at the edge of the network -you manage, you may know that Unifi is only somewhat decent at identifying and +If you're like me and use Unifi network equipment at the edge of the network you +manage, you may know that Unifi is only somewhat decent at identifying and blocking IPs that represent abusive or threat actors. While Unifi has a [threat @@ -28,6 +28,7 @@ blocked yet. # Create an IP Group Profile To start, login to the Unifi machine's web GUI and navigate to the Network app + > Settings > Profiles. Within this page, choose the `IP Groups` tab and click `Create New`. @@ -58,12 +59,12 @@ navigate to the Network app > Settings > Firewall & Security. Within this screen, find the Firewall Rules table and click `Create Entry`. This entry should contain the following settings: -- Type: `Internet In` -- Description: `<Your Custom Rule>` -- Rule Applied: `Before Predefined Rules` -- Action: `Drop` -- Source Type: `Port/IP Group` -- IPv4 Address Group: `<Name of the Group Profile You Created Above>` +- Type: `Internet In` +- Description: `<Your Custom Rule>` +- Rule Applied: `Before Predefined Rules` +- Action: `Drop` +- Source Type: `Port/IP Group` +- IPv4 Address Group: `<Name of the Group Profile You Created Above>` Customize the remaining configurations to your liking, and then save and enable the firewall rule. |