From fcc889508ab63a679b5cbd231478b25cff48d8fc Mon Sep 17 00:00:00 2001 From: Christian Cleberg Date: Sat, 2 Dec 2023 11:34:20 -0600 Subject: fix: update domains --- blog/2023-06-18-unifi-ip-blocklist.org | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'blog/2023-06-18-unifi-ip-blocklist.org') diff --git a/blog/2023-06-18-unifi-ip-blocklist.org b/blog/2023-06-18-unifi-ip-blocklist.org index 2e14a59..25f66e2 100644 --- a/blog/2023-06-18-unifi-ip-blocklist.org +++ b/blog/2023-06-18-unifi-ip-blocklist.org @@ -31,7 +31,7 @@ Settings > Profiles. Within this page, choose the `IP Groups` tab and click `Create New`. -![Network Profiles](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/unifi_profiles.png "Network Profiles") +![Network Profiles](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/unifi_profiles.png "Network Profiles") Each IP Group profile can be used as one of three options: @@ -44,7 +44,7 @@ different IP addresses and a subnet. Once you've added all IP addresses and subnets, click the `Apply` button that should appear at the bottom. -![Network Profile IPs](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/abusive_ips.png "Network Profile IPs") +![Network Profile IPs](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/abusive_ips.png "Network Profile IPs") At this point, the IPv4 Address/Subnet has been created but not yet used. @@ -66,7 +66,7 @@ entry should contain the following settings: Customize the remaining configurations to your liking, and then save and enable the firewall rule. -![Firewall Rule](https://img.0x4b1d.org/blog/20230618-unifi-ip-blocklist/firewall_drop_rule.png "Firewall Rule") +![Firewall Rule](https://img.cleberg.net/blog/20230618-unifi-ip-blocklist/firewall_drop_rule.png "Firewall Rule") Once enabled, the Unifi machine will be able to drop all incoming connections from the defined IP addresses and subnets within the created profile. -- cgit v1.2.3-70-g09d2