Configure your UniFi zone-based firewall for seamless Spotipo integration using this step-by-step guide. This configuration ensures proper network traffic flow between your UniFi controller and Spotipo's captive portal servers while maintaining network security for your local network.
Understanding Zone-Based Firewall Benefits
UniFi's zone based firewall system transforms how you manage firewall rules across your network infrastructure. Instead of creating dozens of individual rules, you can configure firewall policies that apply to entire network zones. This approach provides:
Simplified firewall management for complex network topologies
Enhanced network security through logical zone segregation
Improved traffic monitoring across your UniFi network
Reduced configuration complexity for captive portal deployments
Why Configure Zone-Based Firewall for Spotipo?
Your UniFi controller needs specific firewall rules to communicate with Spotipo's servers. Zone-based firewall configuration creates secure pathways for:
Network traffic between your controller and external servers
Captive portal authentication and data synchronization
Guest network management and user authentication
Secure communication channels for portal customization
Prerequisites for Configuration
Before you configure firewall settings for Spotipo integration:
Administrative access to your UniFi controller interface
Understanding of your current network security policies
Knowledge of which networks will use captive portal functionality
Familiarity with UniFi network zone management concepts
Creating New Policy
To allow Spotipo servers to communicate with your Unifi controller, you will need to create a new policy.
To do that, go to Settings -> Security -> Firewall from there, create a new policy by clicking on "Create Policy" button at the bottom left corner of the screen
Name the rule Spotipo_allow, copy the rules from the picture below.
Create a new object by clicking New button.
Name the object Spotipo_servers and add the following addresses.
107.178.247.148
35.244.104.229
35.236.87.84
104.155.46.61
Make sure that the Destination Zone is set to Gateway.
Match the rest of the settings to the ones in the picture below.
Additional rules if using Hotspot Zone
This is not mandatory for things to work
β
If you'd like to add your network to the Hotspot zone, make sure to create a rule that's the same as pictured below.
Apply the changes and feel free to test things out.
Next Steps for UniFi Integration
Your zone-based firewall configuration now supports Spotipo's captive portal system. The established firewall rules enable secure communication while maintaining proper network security boundaries across your UniFi network infrastructure.
Continue with the main UniFi setup guide to complete your captive portal deployment and begin collecting guest data through your newly configured system.
Reference: Main UniFi Setup Guide