If you have any version of the UniFi Security Gateway or UniFi Dream Machine this article is for you – we will configuring UniFi Internet Security Settings.

To understand if they are truly working we will set and then we will test them whenever that’s possible.

USG/UDM: Configuring UniFi Internet Security Settings

Configuring Internet Security Settings in the UniFi Controllers and their ease of use are one of the features that differentiate UniFi from the other brands on the market. Terms like Deep Packet Inspection, Threat Management, Intrusion Detection System and Intrusion Prevention System as well Honeypot and some others will be explained and put to a test in this article.

Starting right now. 

What is UniFi Controller?

The UniFi Controller is a management software from Ubiquiti Networks that can be run on dedicated hardware devices (like UniFi Cloud Key or UniFi Dream Machine) or it can be installed on any major Operating System or Virtual Machines including Docker. UniFi Controller allows you to manage multiple networks and UniFi devices using a web browser.

Backup UniFi Controller Settings

Before we continue further, let’s fist backup the UniFi controller configuration. The settings that we are going to try are not dangerous or harmful, but it is always a good idea to backup. That way if something is messed up we can always restore our settings safely.

To Backup the UniFi Controller Settings do the following:

In the Classic Settings go to Settings > Backup > Under Backup/Restore section choose Settings Only and then click on Download File.

Backup Controller Settings before begin configuring UniFi Internet Security Settings.
Backup Controller Settings before begin configuring UniFi Internet Security Settings.

The UniFi Controller New Settings

At the moment there are two different views / interfaces in the UniFi controller – the classic settings and the so called new settings.

UniFi Classic settings have been around for a while and almost everything there is polished and working, but it looks a little old school and not so modern.

UniFi Controller Classic View

Old, but gold UniFi classical settings

Also there are too many options there to tweak and change and at the end you could easily break something if you don’t know what are you doing.

Don’t get me wrong here, I love the classic settings. If you ask me I don’t want to switch, but I guess that the classic settings will be gone sooner than later as Ubiquiti is pushing the new settings more and more lately.

That is why we are going to use the UniFi new settings in this article. To enable the new UniFi controller settings go to:

Configuring UniFi Internet Security Settings - USG/UDM 1

Settings > Try New Settings

And with a click of button you will instantly feel a lot more modern and fresh.

You can switch back anytime at least for now by going to the New Settings menu and clicking on the banner on the top saying – Not seeing everything? Go to Classic Settings.

Not seeing everything? Go to Classic Settings.
Not seeing everything? Go to Classic Settings.

UniFi Internet Security Settings

Now let’s finally start configuring the UniFi Internet Security Settings and the first stop will be Threat Management modes. These settings can protect your network from attacks and malicious activities.

Navigate to the New Settings > Internet Security > Internet Threat Management section of the UniFi Network controller and enable the Internet Threat Management option.

Have in mind that enabling Internet Threat Management and IDS or IPS that is Intrusion Detection System and Intrusion Prevention System will limit your maximum connectivity throughput. These below are the maximum values.

DEVICEMAX THROUGHPUT
UniFi Security Gateway (USG)85 Mbps
UniFi Security Gateway Pro (USG-Pro)250 Mbps
UniFi Dream Machine (UDM)850 Mbps
UniFi Dream Machine Pro (UDM-Pro)3.5 Gbps
Enabling IDS or IPS will affect the maximum throughput 

What is Intrusion Detection System (IDS)?

When you enable Intrusion Detection System (IDS) you will receive an alert when threats or malicious activities are detected on your network, but this activities or threats will not be blocked in any way.

What is Intrusion Prevention System (IPS)?

When you enable Intrusion Prevention System (IPS) the UniFi controller will automatically block threats and malicious activity on your network.

Internet Threat Management System Sensitivity

You can customize Sensitivity of both IDS and IPS by just moving the slider where 1 means Maximum Performance and Minimum Protection and 5 is just the opposite – Maximum Protection, Lowest Performance.

Customizing Sensitivity of the IDS or IPS that can increase or decrease Protection and device Performance.
Customizing Sensitivity of the IDS or IPS that can increase or decrease Protection and device Performance.

When you move the slider you enable or disable the options like Botcc, Malware, P2P etc. under the Customize Threat Management section.

How to test if IDS/IPS is working?

To test the IDS/IPS, you can open a new Terminal if you are using Linux/macOS and type the following:

curl -A "BlackSun" www.example.com

You can then check the Alerts section in the UniFi controller and you will see there your activity detected and/or blocked. Depending of what are you using Intrusion Detection System (IDS) or Intrusion Prevention System (IPS).

Check the Alerts in UniFi Controller to see the log of blocked/ detected activities by the IDS or IPS
Check the Alerts in UniFi Controller to see the log of blocked/ detected activities by the IDS or IPS.

Biggest Threat?

One of the biggest Internet threads these days is called – “Not smashing the subscribe button for my Newsletter.”

To protect against it just hit the subscribe button gently and don’t forget to confirm your subscription from the confirmation mail that you will receive (if you don’t see it check your spam folder).

UniFi Network Scanners

Next section in the UniFi Internet Security Settings is called Network Scanners. You can find Threat scanner and Internal Honeypot.

Threat scanner

Threat scanner is a feature that will automatically scan connected clients to your network and it will try to identify any vulnerabilities on them.

Network Scanners section that contains Threat Scanner and Internal Honeypot options.
Network Scanners section that contains Threat Scanner and Internal Honeypot options.

You know that they say – One systems is as strong as it’s weakest element. In other words if you have good overall security, but you have connected clients that are wide open and not protected at all – your security can be compromised.

To see the result from the Threat scanner just go to Threat Management > Endpoint Scans in the UniFi controller.

Endpoint Scans can show you the results from Threat Scanner
Endpoint Scans can show you the results from Threat Scanner

Internal Honeypot

Internal Honeypot feature is a passive detection system that listens for LAN clients attempting to gain access to unauthorized services. 

To create a Honeypot go to New Settings > Security > Internet Threat Management > Network Scanners > enable Internal Honeypot > Create Honeypot

Creating a Honeypot in UniFi controller

Click on this link to create a Honeypot.

Then you only have to select one of the available networks from the dropdown menu and to choose a virtual IP that will be your actual Honeypot.

The Honeypot IP will be open for attacks on purpose.

The Honeypot IP will be open for attacks on purpose.

When you finally create your UniFi Internal Honeypot you will be able to test if it is really working.

Open a Terminal if you are Linux/macOS user or open an SSH client like putty if you are on Windows and try to connect to the Honeypot IP using SSH and/or Telnet.

ssh root@YOUR_HONEYPOT_IP

The result should be a successful connection and new detailed record in Thread Management > Honey Pot menu in the UniFi controller. If you click on the record you can add the Source IP to the deny list.

The records are showing all attempts to connect or attack the UniFi Internal Honeypot. And you can easily block find them out and block them.
The records are showing all attempts to connect or attack the UniFi Internal Honeypot. And you can easily block find them out and block them.

Threat Management Allow List

Threat Management Allow List is simply a white list of IPs, networks or subnets that will not be affected by the above Internet Threat Management settings.

Threat Management Allow List is located in New Settings > Security > Internet Threat Management > Advanced

Create New Allow List to whitelist your trusted devices

If you have a list of device(s) that you are sure that they are trusted and secured you can whitelist them from here.

What is Deep Packet Inspection (DPI)?

Next on the list is the UniFi Deep Packet Inspection which will allow your USG or UDM to analyze the traffic on your network. Thanks to DPI or Deep Packet Inspection you can go to the Statistics section in UniFi controller.

Statistic Section in the UniFi Controller where Deep Packet Inspection (DPI) collected data is.
Statistic Section in the UniFi Controller where Deep Packet Inspection (DPI) collected data is.

In Statistics section you will see very interesting data for your clients and your general network usage separated by categories and pie charts.

To activate Deep Packet Inspection (DPI) go to New Settings > Security > Traffic & Device Identification

To activate the Deep Packet Inspection in UniFi controller follow these steps.
To activate the Deep Packet Inspection in UniFi controller follow these steps.

To check your individual clients data gathered by the Deep Packet Inspection go to Clients > click on a client of your choice and select Traffic tab from the opened window.

Detailed data for my Amazon Echo Dot gathered from Deep Packet Inspection

Detailed data for my Amazon Echo Dot gathered from Deep Packet Inspection.

You can also clear the Deep Packet Inspection data from the same menu by just clicking on the Clear DPI Data button.

Restriction Definitions and Restriction Assignments

Use these features to define restrictions based on different categories, services or applications. You can then assign these restrictions to the connected clients by either choose your WiFi or Wired network.

To define a restriction go to New Settings > Security > Traffic & Device Identification > Restriction Assignment > Add Restriction Group > add a name for your restriction group and click on Add Restriction button.

Add and name a Restriction Group or you can use the default one.
Add and name a Restriction Group or you can use the default one.

After you create a restriction group you can add restrictions to it by clicking on the Add restriction button.

Add Restrictions to a Restriction Group
Add Restrictions to a Restriction Group.

From the dialog that will be shown you can select from multiple categories and applications what exactly to restrict.

You can switch on or off Block Traffic, Log Events, and Enable This Restriction toggle buttons.

Add Restriction dialog from where you can add categories and applications that you wish to restrict

When you are ready click on Add Restriction button.

Then go to Restriction Assignments section and select either Network Restriction or WiFi Network Restriction and click on the button underneath to assign the created restriction group that we created earlier.

Assigned restriction group to a wireless network.
Assigned restriction group to a wireless network.

UniFi GeoIP Filtering

And last but not least is the UniFi GeoIP Filtering from where you can block individual countries.

To access the GeoIP Filtering go to Threat Management > Overview.

Blocking Country to enable the GeoIP Filtering.

Blocking is as easy as navigating to the map, clicking on a country, and confirming by clicking “Block”.

You can also choose GeoIP Filtering traffic direction from the upper right corner.

GeoIP Filtering traffic in Both directions.
GeoIP Filtering traffic in Both directions.

The available options are: Both, Incoming and Outgoing. That means you can block only the Incoming traffic from a country or countries, which makes the most sense for me.

Question for You!

Quick question for you what is your favorite security feature in UniFi controller? Let me know in the comments below. I promise to respond you back so we can chit chat a bit 😜

Summary

I really hope that you find this information useful and you now know more about the UniFi Internet Security Settings available in USG and UDM devices. As well as terms like Deep Packet Inspection, Threat Management, Intrusion Detection and Prevention Systems, Honeypot and so on and so on.

If you want to secure this blog existence you can become one of my supporters. You can see exactly how in this section of my site.

I can’t thank enough to all wonderful guys that are supporting my work already – you are amazing!

Any other sort of engagement on this site and my YouTube channel does really help out a lot with the Google & YouTube algorithms, so make sure you hit the subscribe, as well as the Like and Bell buttons.

If you are just entering the Smart Home world you could also buy my digital product called: Smart Home – Getting Started Actionable Guide 👉 LINK

Also feel free to add me on Twitter by searching for @KPeyanski.  You can find me on my Discord server as well.

Stay safe and don’t forget – Home Smart, But Not Hard!


1 Comment

Sascha · 13/07/2022 at 11:04 am

Hi, thank you for the nice Site.
How can I whitelist one single web server in a geo blocked country? Is this possible?

best wishes
Sascha

Leave a Reply

Avatar placeholder

Your email address will not be published. Required fields are marked *