Skip to main content

Some Unifi CLI Commands/First Impressions

This document outlines a bunch of items/forum posts that I have used in the past for assisting in getting additional functionality/usage out of my Unifi Switches.

The obvious is the Edge Switch CLI Command Reference
Or for those that like it all shown out EdgeSwitch CLI Tree
And a simple walk through straight from UBNT.

Unifi Switch can be SCP'd into if needed. Credentials are typically under Settings -> Site ->  Device Authentication.

Note: If you make any changes via the CLI using the Edge Switch subsection, it will be removed next time the switch gets provisioned from the Controller. (Reboot, or a physical change in the Controller).  You can keep the changes using json files within the USG, but Unifi has not stated that they will add support to allow this within the Unifi Switches. If you are planning on doing any huge configuration via the CLI, your better buying an Edge Switch instead.

Commands:
US.v3.7.55# telnet localhost //This allows access into CLI of the Unifi Switch (similar config as the Edge Switch)
US.v3.7.55# mca-dump //This allows exportation of the json file to the screen which can be used to be captured if needed.

My First impressions of the Unifi Switch infrastructure is pretty sweet, it does 99% of the items that you will need to do, but I then ran into a configuration issue trying to establish trunks (L2 MPLS VPN) over a local provider and determined that the GUI was just simply not cutting the configuration properly. After logging into the CLI and issuing some Edge Switch show commands, I realized that some of the MTU size values, allowed trunks, and native vlans was not set proper, even though in the GUI it is expected/shown as being right.

Comments

Popular posts from this blog

How to setup a Host-Check for Fortigate SSL VPN

This document outlines how to setup a host-check for a Fortigate SSL VPN (Web only): config vpn ssl web portal edit "portalname" set web-mode enable set host-check custom set host-check-policy "Microsoft-Windows-Firewall" set os-check-enable set ip-pools "PoolName" set split-tunneling disable set page-layout double-column set theme orange config os-check-list "windows-7" set action check-up-to-date set latest-patch-level 1 end  config vpn ssl web host-check-software edit "Microsoft-Windows-Firewall" config check-item-list edit 1 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile:EnableFirewall==1" set type registry next edit 2 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile:EnableFirewall==1" set type registry next edit 3 set target "HKLM\\SYSTEM\\CurrentControlSet\\S...

Implementing 802.1X - Windows 2012R2 + Cisco 4500 Switches

Implementing 802.1X Using Windows Server 2012R2 & Cisco 4500 Series Switches Overview: This document is to outline how the configuration between Windows Server 2012 R2’s NPS Services and Cisco 4500 Series switches has been implemented. High Level Diagram:   Requirements: Windows Server 2012 R2 with NPS Server installed Windows Server 2012 R2 with CA Services Windows AD Environment Cisco 4500 Series Switches Windows 7-10 Clients to connect NPS Configuration: 1. This assumes the above requirement that the NPS Service has already been installed on Windows Server 2012 R2 2. Disable all existing Policies under Connection Request Policies and Network Policies as you will be making your own, except one that states “Catch All” with the below parameters: 3. You will then need to add in a new Radius Client to have Policies built around. Friendly Name will be used going forward for the Policies for referencing the document. 4. Once completed...

OVA/OVF Templates and Older Versions of VMware ESXI

Recently ran into this issue which I feel is something that I should document, as it provides some additional details onto how to configure or modify an existing .ova or .ovf file which is the standard deployment template for ESXI/VMware. Here was the issue: - ESXI 5.5 - OVA required hardware type 8. Gave an error of  " Unsupported hardware version - vmx-8" when testing. Based on everything I was reading, it isn't supported. So using the ovftool which can be found on VMware's Website ( here ) you can basically extract out the ova/ovf file into a directory, and then use it to modify the VMX file and then put it all back together. Steps: 1. Download the application and install it. 2. Go to the directory where the ovftool is stored via cmd line (Typically C:\Programs Files\Vmware\ect..) 3. Issue the following command: ovftool 4. Then modify the .vmx file so that it contains now the hardware ID of 7 (or whatever you need set for your release). 5. Then issu...