CAUTION: These documents are intended to provide partners with firewall configuration recommendations ONLY. They contain examples and caution should be exercised when making changes to your firewall as unplanned changed could result in downtime based on the complexity of the environment and/or configuration.
MSS Recomended SonicWall Firewall Best Practices Index
Unifi Network Hosted in the Cloud
Finding Inform URL IP
The user will need to provide their Unifi Inform URL. They can do this by:
DHCP Option 43
You will need to create this so that the management traffic from the AP is forwarded to the Unifi Cloud Controller.
Access Point DHCP
Now we need to assign this DHCP option to the Unifi Access Points. To do this you can either edit the Dynamic DHCP scope for the network that the APs are on, or create static DHCP entries for each AP to statically assign them an IP address based on their MAC address.
Port/Service Restrictions
If the firewall has outbound port/service restrictions in place, you will need to ensure that the correct ports are open from the Unifi equipment to the WAN.
For the current list of required ports, see: UniFi Network - Required Ports Reference – Ubiquiti Support and Help Center
Security Service Exclusions
It is recommended that you exclude Unifi equipment from the security services of the SonicWall as some of the Security Services will interfere with the management traffic.
You will first need to ensure that the Unifi equipment has static IP addresses.
To do this:
Unifi Network Hosted Onsite (Same Network)
Same Network
These notes assume that the Unifi equipment and Unifi Network application are on the same network.
Port/Service Restrictions
If the firewall has outbound port/service restrictions in place, you will need to ensure that the correct ports are open from the Unifi equipment to the WAN.
For the current list of required ports, see: UniFi Network - Required Ports Reference – Ubiquiti Support and Help Center
Security Service Exclusions
It is recommended that you exclude Unifi equipment from the security services of the SonicWall as some of the Security Services will interfere with the management traffic.
You will first need to ensure that the Unifi equipment has static IP addresses.
To do this:
Unifi Network Hosted Onsite (Different Networks)
Different Networks
These notes assume that the Unifi equipment and Unifi Network application are on different networks.
DHCP Option 43
You will need to create this so that the management traffic from the AP is forwarded to the Unifi Network application.
Access Point DHCP
Now we need to assign this DHCP option to the Unifi Access Points. To do this you can either edit the Dynamic DHCP scope for the network that the APs are on, or create static DHCP entries for each AP to statically assign them an IP address based on their MAC address.
Port/Service Restrictions
Since the Unifi equipment needs to communicate to the Unifi Network application, you will need to ensure the required ports are opened from the equipment to the Network application.
For the current list of required ports, see: UniFi Network - Required Ports Reference – Ubiquiti Support and Help Center
Security Service Exclusions
It is recommended that you exclude Unifi equipment & Network application from the security services of the SonicWall as some of the Security Services will interfere with the management traffic.
You will first need to ensure that the Unifi equipment has static IP addresses.
To do this: