UniFi Build
The instructions below guide you through the process of establishing a UniFi network. These steps will configure your LAN Networks, Wireless Networks, and Routing and firewall.
To carry out the tasks, a UniFi Controller is necessary. You can find an installer for the Proxmox UniFi Controller LXC in our Homelab repository.
The hardware in this recipe uses:
- UniFi Controller v8 or later
- 1x PiHole server
- 1x Ubiquiti UniFi Security Gateway 3P (USG)
- 1x Ubiquiti UniFi Switch 24
- 1x Ubiquiti UniFi Switch 8 POE-150W
- 1x Ubiquiti UniFi AP-AC-Pro
- 1x Ubiquiti UniFi AP-Lite
- 1x pfSense with 4 NICs
- Proxmox cluster (for UniFi Controller LXC)
Prerequisites
Read about our [system-wide requirements](https://github.com/ahuacate/common/tree/mainβ¦
UniFi Build
The instructions below guide you through the process of establishing a UniFi network. These steps will configure your LAN Networks, Wireless Networks, and Routing and firewall.
To carry out the tasks, a UniFi Controller is necessary. You can find an installer for the Proxmox UniFi Controller LXC in our Homelab repository.
The hardware in this recipe uses:
- UniFi Controller v8 or later
- 1x PiHole server
- 1x Ubiquiti UniFi Security Gateway 3P (USG)
- 1x Ubiquiti UniFi Switch 24
- 1x Ubiquiti UniFi Switch 8 POE-150W
- 1x Ubiquiti UniFi AP-AC-Pro
- 1x Ubiquiti UniFi AP-Lite
- 1x pfSense with 4 NICs
- Proxmox cluster (for UniFi Controller LXC)
Prerequisites
Read about our system-wide requirements before proceeding any further.
Network prerequisites are:
-
Layer 2 Network Switches
-
Network Gateway is
192.168.1.5 -
PiHole CT DNS server. Configured with Conditional Forwarding addresses:
-
Router DNS server (i.e 192.168.1.5 - UniFi DNS)
-
New LAN-vpngate-world DNS Server (i.e 192.168.30.5 - pfSense VLAN30)
-
New LAN-vpngate-local DNS Server (i.e 192.168.40.5 - pfSense VLAN40)
Other Prerequisites are:
- Installation of UniFi Controller on your PC or Proxmox UniFi Controller LXC
Local DNS Records
Before proceeding, we strongly advise that you familiarize yourself with network Local DNS and the importance of having a PiHole server. To learn more, click here.
It is essential to set your networkβs Local Domain or Search domain. For residential and small networks, we recommend using only top-level domain (spTLD) names because they cannot be resolved across the internet. Routers and DNS servers understand that ARPA requests they do not recognize should not be forwarded onto the public internet. It is best to select one of the following names: local, home.arpa, localdomain, or lan only. We strongly advise against using made-up names.
Table of Contents
-
7.2.1. Firewall Internet - Block DNS list from all local LAN (excluding LAN-smart)
-
7.2.2. Firewall Internet - Allow Internet to HAProxy WAN IP/Ports
-
7.2.3. Firewall Internet - Allow Internet to HAProxy WAN IP/Ports
-
7.3.1. Firewall LAN IN - Allow All Established and Related Sessions
-
7.3.7. Firewall LAN IN - Allow client networks to medialab hosts
1. UniFi Controller
A Proxmox UniFi-Controller LXC installer is available in our Homelab repository.
2. UniFi System Settings
Set your basic UniFi site (i.e home, location of site etc) preferences.
- Navigate to
Settings>System>General: β Device Name: Unifi Controller β Country: Select your nation β Language: Select your language β Timezone: Select your Timezone β Time format: 24hrs - Navigate to
Settings>System>Updates: β Network Application Release Channel: official β Device Firmware Release Channel: official β Automate Device Updates: Daily at 03:00 - Navigate to
Settings>System>Advanced: β Interface: new β Network Time Protocol (NTP): Auto β Email Services: SSO email β Network Discovery: Enable β Device Authentication: enable (set username and password)
3. UniFi Networks
We use VLANs to separate networks for easier management and to apply security policies.
3.1. Edit Default LAN network
- Navigate to
Settings>Networks>Default: β Network name: default β Gateway IP/Subnet: Host address192.168.1.5, Netmask24, 254 Usable hosts β Advanced: Manual β IGMP Snooping: enable β Multicast DNS: disable β DHCP Mode: DHCP Server β DHCP Range: 192.168.1.150 - 192.168.1.250 β Default Gateway: Auto β DNS Server: 192.168.1.6, 1.1.1.1 (Note 192.168.1.6 is PiHole. If no PiHole use 192.168.1.5) β Lease Time: 86400 β Domain Name: local
3.2. Create UniFi Networks
Create the following new networks. Navigate to Settings > Networks > New Virtual Network and set the values as follows, remembering to click Save at the end of each new network. There is an OpenOffice calc file βunifi_network_configuration.odsβ in the repository for easy viewing.
- Navigate to
Settings>Networks: β Global Network Settings β IPv6 Support: disabled β Multicast DNS: LAN-open, LAN-smart, LAN-medialab, LAN-homelab, LAN-IoT β IGMP Snooping: Default, LAN-open, LAN-smart, LAN_guest, LAN-medialab, LAN-vpnserver, LAN-homelab, LAN-IoT, LAN-NoT, VPN-egress, LAN-transit-pfsense β DHCP Snooping: enabled
3.3. Global Network Settings
- Navigate to
Settings>Networks: β IPv6 Support: disable β Multicast DNS: LAN-Open, LAN-smart, LAN-medialab, LAN-homelab, LAN-IoT β IGMP Snooping: Default, LAN-open, LAN-smart, LAN-guest, LAN-medialab, LAN-vpnserver, LAN-homelab, LAN-IoT, VPN-egress, LAN-transit-pfsense
3.4. Global Switch Settings
- Navigate to
Settings>Networks: β DHCP Snooping: enable β Spanning Tree Protocol: RSTP
4. UniFi Wireless Networks
Here we create wireless networks in VLAN increments of 10 (i.e VLAN10, VLAN20) which correspond to our Network settings.
- Navigate to
Settings>WiFi>+Create Newand set the values as follows, remembering to clickApply Changeswhen done: β Name/SSID:name-open(Choose your own SSID such asbanana-open) β Password: Common passphrase (Between 8 and 63 ASCII-encoded characters) β Network: LAN-open β Broadcasting APs: Group, All β Advanced: Manual β WiFi Band: 2.4 GHZ, 5 GHz β BSS Transition: enabled β Multicast enhancement: enabled β 802.11 DTIM Period: Auto enabled β Security Protocol: WPA2 β Group rekey interval: 3600 Sec β WiFi Scheduler: Off
Now repeat the procedure, using the above values except where shown (i.e Guest/IoT/NoT passphrase(s), Name/SSID, Guest Policy), creating new wireless networks on the following VLANβs:
| Create New Wireless Network | VLAN10 | VLAN20 | VLAN30 | VLAN40 | VLAN70 | VLAN110 | VLAN120 |
|---|---|---|---|---|---|---|---|
| Name/SSID | name-open | name-smart | name-vpngate-world | name-vpngate-local | name-guest | name-iot | name-not |
| Password | Common Passphrase | Common Passphrase | Common Passphrase | Common Passphrase | Guest Passphrase | IoT Passphrase | IoT Passphrase |
| Network | β Use VLAN 10 | β Use VLAN 20 | β Use VLAN 30 | β Use VLAN 40 | β Use VLAN 70 | β Use VLAN 110 | β Use VLAN 120 |
Your finished configuration should resemble the image below:
5. UniFi Profiles - IP Groups
You should create all your Profile Groups before creating firewall rules.
- Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Chromecast broadcast IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.20.0/24, 192.168.50.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Block DNS addresses β Type: IPv4 Address/Subnet β Address: 8.8.4.4, 8.8.8.8 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Aircon host IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.110.221 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Aircon ports β Type: Port Group β Port: 30000,30050,443 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All DNS ports β Type: Port Group β Port: 53,853 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All HAProxy WAN ingress ports β Type: Port Group β Port: 443,80,8443 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All HAProxy WAN ingress server addresses β Type: IPv4 Address/Subnet β Address: 192.168.2.1 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Home App/Nest/Chromecast/Netflix ports β Type: Port Group β Port: 1900,5353,5556,5558,8008,8009 β Profile Name: All IP addresses β Type: IPv4 Address/Subnet β Address: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/3, 224.0.0.0/4 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All Home host IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.110.0/24, 192.168.80.0/24, 192.168.50.0/24, 192.168.20.0/24, 192.168.10.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All IP addresses β Type: IPv4 Address/Subnet β Address: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/3, 224.0.0.0/4 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All local addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.0/24, 192.168.10.0/24, 192.168.20.0/24, 192.168.50.0/24, 192.168.60.0/24, 192.168.80.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All local user addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.0/24, 192.168.10.0/24, 192.168.40.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All not LAN-smart local addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.0/24, 192.168.10.0/24, 192.168.30.0/24, 192.168.40.0/24, 192.168.50.0/24, 192.168.3.0/28 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All PiHole IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.6 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All printer host IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.91 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All printer ports β Type: Port Group β Port: 137 Default generic SMB (works with Brother laser) β Port: 138 Default generic SMB β Port: 139 Default generic SMB β Port: 631 ASCII laser printer (works with Brother laser) β Port: 6310 ASCII laser printer β Port: 9100 ASCII laser printer - IBM, Ricoh, HP, Lexmark β Port: 9101 ASCII laser printer - Jetdirect, Marknet server - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: All WAN IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.1.4 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: CCTV host IP addresses β Type: IPv4 Address/Subnet β Address: 127.0.0.1 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: CCTV ports β Type: Port Group β Port: - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: Google DNS IP addresses β Type: IPv4 Address/Subnet β Address: 8.8.8.8, 8.8.4.4 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: Home Assistant host IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.110.131 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: LAN-vpngate-local addresses β Type: IPv4 Address/Subnet β Address: 192.168.40.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: LAN-vpngate-world addresses β Type: IPv4 Address/Subnet β Address: 192.168.30.0/24 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: Media server IP addresses β Type: IPv4 Address/Subnet β Address: 192.168.50.111 (or whatever your Jellyfin/Emby server IP is) - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: Media server ports β Type: Port Group β Port: 8096,8097,8920,32400,32410-32414, 32469 (these are Jellyfin, Emby and Plex ports) - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: MQTT ports β Type: Port Group β Port: 1883,8883 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: NTP ports β Type: Port Group β Port: 123 - Navigate to
Settings>Profiles>IP Groups>+Create Newβ Profile Name: SSDP ports β Type: Port Group β Port: 1900
6. UniFi Routing - Static Routes
Set the values as follows, remembering to click Save at the end.
Navigate to Settings > Routing > +Create Entry β Name: Route access to VLAN30 β Distance: 1 β Destination Network: 192.168.30.0/24 β Type: Next Hop β Next Hop: 192.168.3.1
1.
Navigate to Settings > Routing > +Create Entry β Name: Route access to VLAN40 β Distance: 1 β Destination Network: 192.168.40.0/24 β Type: Next Hop β Next Hop: 192.168.3.1
7. UniFi Security
Here we create our Firewall rules, Port Forwarding and general security. Set the values as follows, remembering to click Save at the end.
7.1. General
- Navigate to
Settings>Security>General: β Traffic Identification: enable β Suspicious Activity: Advanced β Network: Default, LAN-open, LAN-smart, LAN-guest, LAN-medialab, LAN-vpnserver, LAN-homelab, LAN-IoT, VPN-egress, LAN-transit-pfsense β Filtering Action: No Action
7.2. Firewall - Internet
Here we create most of our firewall rules under the Internet Tab. Navigate to Settings > Security > Firewall Rules > Internet and create the entries as follows, remembering to click Save at the end.
7.2.1. Firewall Internet - Block DNS list from all local LAN (excluding LAN-smart)
| Create New Rule | Value | Notes |
|---|---|---|
| Type | Internet Out | |
| Name | Block DNS list from all local LAN (excluding LAN-smart) | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | All not LAN-smart local addresses | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | Block DNS IP addresses | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.2.2. Firewall Internet - Allow Internet to HAProxy WAN IP/Ports
| Create New Rule | Value | Notes |
|---|---|---|
| Type | Internet Local | |
| Name | Allow Internet to HAProxy WAN IP/Ports | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | Any | |
| Port Group | All HAProxy WAN ingress ports | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | All HAProxy WAN ingress server addresses | |
| Port Group | All HAProxy WAN ingress ports | |
| Advanced | ||
| Auto |
7.2.3. Firewall Internet - Allow Internet to HAProxy WAN IP/Ports
Used only for testing. Pause/disable when not required.
| Create New Rule | Value | Notes |
|---|---|---|
| Type | Internet Local | |
| Name | (Test Only) Allow ICMPv4 Echo Request from WAN to Internet | |
| Action | β Accept β Reject β Drop | |
| Protocol | ICMP β Before predefined rules | |
| IPv4 ICMP Type Name | Echo Request | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | Any | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | Any | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.3. Firewall - LAN IN
Here we create most of our firewall rules under the LAN Tab. Navigate to Settings > Security > Firewall Rules > LAN and create the entries as follows, remembering to click Save at the end.
7.3.1. Firewall LAN IN - Allow All Established and Related Sessions
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow All Established and Related Sessions | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | All local addresses | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | All local addresses | |
| Port Group | Any | |
| Advanced | ||
| Manual | ||
| Match States | β New β Invalid β Established β Related | |
| Match IPsec | β Do not match β IPsec β non-IPsec | |
| Logging | β |
7.3.2. Firewall LAN IN - Accept all NTP Requests
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Accept All NTP Requests | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | All local addresses | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | ANTP ports | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.3.3. Firewall LAN IN - Allow Home interlan connectivity
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow Home interlan connectivity | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | All Home host IP addresses | |
| Port Group | All Home App/Nest/Chromecast/Netflix ports | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | All Home host IP addresses | |
| Port Group | All Home App/Nest/Chromecast/Netflix ports | |
| Auto |
7.3.4. Firewall LAN IN - Allow NoT to MQTT
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow NoT to MQTT | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-NoT | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | Home Assistant host IP addresses | |
| Port Group | MQTT ports | |
| Advanced | ||
| Auto |
7.3.5. Firewall LAN IN - Allow IoT to Home Assistant
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow IoT to Home Assistant | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-IoT | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | Home Assistant host IP addresses | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.3.6. Firewall LAN IN - Allow LAN-smart to Media Server
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow LAN-smart to Media Server | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-smart | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | Media server IP addresses | |
| Port Group | Media server ports | |
| Advanced | ||
| Auto |
7.3.7. Firewall LAN IN - Allow client networks to medialab hosts
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Allow client networks to medialab hosts | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | All local user addresses | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Network | |
| Network | LAN-medialab | |
| Network Type | IPv4 Subnet | |
| Advanced | ||
| Manual | ||
| Match State | β New | |
| Match IPsec | β Do not match |
7.3.8. Firewall LAN IN - Block IoT from LAN
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Block IoT from LAN | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-IoT | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Network | |
| Network | Default | |
| Network Type | IPv4 Subnet | |
| Advanced | ||
| Auto |
7.3.9. Firewall LAN IN - Block IoT from NoT
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Block IoT from NoT | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-IoT | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Network | |
| Network | LAN-NoT | |
| Network Type | IPv4 Subnet | |
| Advanced | ||
| Auto |
7.3.10. Firewall LAN IN - Block all NoT
| Create New Rule | Value | Notes |
|---|---|---|
| Type | LAN In | |
| Name | Block all NoT | |
| Action | β Accept β Reject β Drop | |
| Protocol | β All β Before predefined rules | |
| Source | ||
| Source Type | Network | |
| Network | LAN-NoT | |
| Network Type | IPv4 Subnet | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | All IP addresses | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.4. Firewall - Guest IN
Here we create most of our firewall rules under the Guest Tab. Navigate to Settings > Security > Firewall Rules > Guest and create the entries as follows, remembering to click Save at the end.
7.4.1. Firewall GUEST IN - Allow PiHole DNS in
| Create New Rule | Value | Notes |
|---|---|---|
| Type | Guest In | |
| Name | Allow PiHole DNS in | |
| Action | β Accept β Reject β Drop | |
| Protocol | β UDP β Before predefined rules | |
| Source | ||
| Source Type | Port/IP Group | |
| Address Group | Any | |
| Port Group | Any | |
| Mac address | Leave blank | |
| Destination | ||
| Destination Type | Port/IP Group | |
| Address Group | All PiHole IP addresses | |
| Port Group | Any | |
| Advanced | ||
| Auto |
7.5. Port Forwarding
Here we create our port forwarding rules. Navigate to Settings > Security > Port Forwarding and set the values as follows, remembering to click Save at the end.
7.5.1. Port Forwarding - HAProxy 80
| Create New Port Forward Rule | Value | Notes |
|---|---|---|
| Name | HAProxy | |
| Forward Rule | β Enable | |
| From | Any | |
| Port | 80 | |
| Forward IP | 192.168.2.1 | |
| Forward Port | 80 | |
| Protocol | TCP | |
| Logs | β Enable |
7.5.2. Port Forwarding - HAProxy 443
| Create New Port Forward Rule | Value | Notes |
|---|---|---|
| Name | HAProxy | |
| Forward Rule | β Enable | |
| From | Any | |
| Port | 443 | |
| Forward IP | 192.168.2.1 | |
| Forward Port | 443 | |
| Protocol | TCP | |
| Logs | β Enable |
7.5.3. Port Forwarding - HAProxy 8443
| Create New Port Forward Rule | Value | Notes |
|---|---|---|
| Name | HAProxy | |
| Forward Rule | β Enable | |
| From | Any | |
| Port | 8443 | |
| Forward IP | 192.168.2.1 | |
| Forward Port | 8443 | |
| Protocol | TCP | |
| Logs | β Enable |