Skip to main content

How to Configure Unifi Zone Based Firewall to Work with Spotipo

Rakesh M avatar
Written by Rakesh M
Updated over 2 weeks ago

Configure your UniFi zone-based firewall for seamless Spotipo integration using this step-by-step guide. This configuration ensures proper network traffic flow between your UniFi controller and Spotipo's captive portal servers while maintaining network security for your local network.

Understanding Zone-Based Firewall Benefits

UniFi's zone based firewall system transforms how you manage firewall rules across your network infrastructure. Instead of creating dozens of individual rules, you can configure firewall policies that apply to entire network zones. This approach provides:

  • Simplified firewall management for complex network topologies

  • Enhanced network security through logical zone segregation

  • Improved traffic monitoring across your UniFi network

  • Reduced configuration complexity for captive portal deployments

Why Configure Zone-Based Firewall for Spotipo?

Your UniFi controller needs specific firewall rules to communicate with Spotipo's servers. Zone-based firewall configuration creates secure pathways for:

  • Network traffic between your controller and external servers

  • Captive portal authentication and data synchronization

  • Guest network management and user authentication

  • Secure communication channels for portal customization

Prerequisites for Configuration

Before you configure firewall settings for Spotipo integration:

  • Administrative access to your UniFi controller interface

  • Understanding of your current network security policies

  • Knowledge of which networks will use captive portal functionality

  • Familiarity with UniFi network zone management concepts

Creating New Policy

To allow Spotipo servers to communicate with your Unifi controller, you will need to create a new policy.

To do that, go to Settings -> Security -> Firewall from there, create a new policy by clicking on "Create Policy" button at the bottom left corner of the screen

Name the rule Spotipo_allow, copy the rules from the picture below.

Create a new object by clicking New button.

Name the object Spotipo_servers and add the following addresses.

107.178.247.148

35.244.104.229

35.236.87.84

104.155.46.61

Make sure that the Destination Zone is set to Gateway.

Match the rest of the settings to the ones in the picture below.

Additional rules if using Hotspot Zone

This is not mandatory for things to work
​

Example of adding a network under hotspot group


If you'd like to add your network to the Hotspot zone, make sure to create a rule that's the same as pictured below.

Apply the changes and feel free to test things out.

Next Steps for UniFi Integration

Your zone-based firewall configuration now supports Spotipo's captive portal system. The established firewall rules enable secure communication while maintaining proper network security boundaries across your UniFi network infrastructure.

Continue with the main UniFi setup guide to complete your captive portal deployment and begin collecting guest data through your newly configured system.

Did this answer your question?