UniFi Network Lab:
Networking Topology
Why UniFi?
UniFi gives me a single control plane for gateways, switches, and APs with an approachable UI and solid telemetry. In this lab I designed a small, production‑like topology with multiple VLANs, mapped Wi‑Fi to those networks, added firewall policy, and set up monitoring and backups.
Lab Gear & Topology
- Gateway: UniFi Dream Machine (or UDR/UDM‑SE/UXG).
- Switch: USW‑Lite‑16‑PoE (any managed UniFi switch works).
- AP: UniFi 6 Lite / Pro.
- WAN: ISP modem bridged; public IP on the UniFi gateway.
Networks (VLAN → subnet): Users (10 → 192.168.10.0/24), Servers (20 → 192.168.20.0/24), IoT (30 → 192.168.30.0/24), Guest (40 → 192.168.40.0/24), Mgmt (50 → 192.168.50.0/24).
Adopt Devices & Prepare the Controller
- Launch UniFi Network application (on UDM/UDR/Cloud Key/Console).
- Create a Site and run the Setup Wizard (WAN, timezone, basic Wi‑Fi).
- Adopt Switch and AP: plug into LAN, wait for Pending Adoption, then Adopt → Upgrade.
- Label devices (Location, Purpose) and set Device names for readability.
- Enable Automatic backups and download a backup snapshot.
Create Networks (VLANs)
- Settings → Networks → Create new network.
- Name:
Users, VLAN ID: 10, Gateway/Subnet: 192.168.10.1/24, DHCP enabled. - Repeat for
Servers (20),IoT (30),Guest (40),Mgmt (50). - Options: enable IGMP Snooping if you have IPTV/multicast; enable mDNS Repeater only if you need service discovery across VLANs.
Wi‑Fi SSIDs Mapped to VLANs
- Settings → WiFi → Add new WiFi → SSID:
Home‑Users, Security: WPA2/WPA3, Network: Users. - Create
Home‑IoTbound to IoT; disable fast roaming and set a unique, strong passphrase. - Create
Home‑Guestbound to Guest; enable Guest Policies (client isolation, optional captive portal), set bandwidth limits. - Apply an AP group if you want certain SSIDs only on certain APs (e.g., IoT only on Basement AP).