Skip to main content
Back to articles
// ARTICLE · ANALYTICAL · UNIFI · IDS/IPS

Why turning on UniFi Threat Management slows your internet

On a UDM, a UDM-Pro, a UCG-Ultra, a UDR, or the original USG, enabling Threat Management(UniFi's label for IDS/IPS plus deep packet inspection) silently caps WAN throughput at a number that's printed on the spec sheet — and is almost always lower than the internet plan the homeowner is paying for. Ubiquiti doesn't publish a single help-center article that says “turn this on and your gigabit fiber will run at a third of that on a UDM-Pro” — but the per-model IDS/IPS throughput numbers are right there on each gateway's tech-specs page, and Ubiquiti's own Optimizing Wired Network Speedsnote warns that Threat Management “may reduce throughput by up to 30 percent.” This is finding #7 in our residential UniFi audit series — the one that comes up every time the homeowner says “I'm paying for gig and speedtest.net keeps reporting 300.”

PublishedMay 15, 2026
Read time~10 minutes
TopicUniFi · IDS/IPS · DPI · WAN throughput
AudienceNetwork engineers · IT teams · homeowners
§ 01 · What “Threat Management” actually means on UniFi

IDS, IPS, and the Suricata engine behind both.

The UniFi feature labelled Threat Management in the controller is, under the hood, two related things and one piece of software.

  • IDS — Intrusion Detection System. The gateway inspects packets traversing the WAN (and, on supported builds, packets crossing between selected VLANs) and raises an alert when something matches a signature in its rule set. Detect only. Nothing is dropped.
  • IPS — Intrusion Prevention System. The same inspection, but inline. When a packet matches a signature, the gateway can drop, reset, or otherwise block the flow before it reaches its destination. Detect and block.
  • Suricata — the engine that does the work.UniFi's IDS/IPS is built on Suricata, the open-source network threat detection engine. Suricata loads tens of thousands of rules (UniFi pulls from the Emerging Threats rule set plus, on CyberSecure-licensed deployments, the Proofpoint commercial feed) and pattern-matches every packet against them in real time.¹ Ubiquiti's own log paths confirm this — the Threat Management logs on a UniFi gateway live in /var/log/suricata/, and alert text begins with the same ET (Emerging Threats) signature prefix the upstream rule set uses.

That distinction matters because it is the deep packet inspection — not the rule count, not the NAT state, not the firewall — that defines the ceiling. Every WAN-direction packet is matched against the loaded signatures before it's allowed onto the LAN or onto the WAN. On gigabit- and multi-gig connections, that match work has to happen at line rate, in software, on the gateway's CPU.

Ubiquiti's help center documents the feature directly and notes that “enabling this increases CPU and memory utilization,” which is also why the controller imposes a hard limit on how many networks IDS/IPS can be applied to at once.² What it does not do — and this is the gap that generates audit findings — is name a per-model throughput ceiling on the same page as the on/off toggle. That number lives on the tech-specs page for each gateway, separate from the controller UI.

§ 02 · The throughput numbers Ubiquiti actually publishes

One row per gateway. The number on the spec sheet is the ceiling.

Every UniFi cloud gateway at techspecs.ui.com lists a line called IDS/IPS Throughput. That is the number Ubiquiti will quote you if you ask support. It is the published ceiling above which DPI cannot run. The list below is current at the date of this article; the spec pages get edited from time to time, but the trend has been one direction only — newer hardware is faster.

GatewayPublished IDS/IPS throughputNotes
USG (original)≈ 85 MbpsBelow most 2026 residential WAN plans. Discontinued; firmware-stale on current controllers.
USG-Pro-4≈ 250 MbpsRackmount predecessor of the UDM-Pro. Same throughput-collapse pattern as the USG.
UniFi Express (UX)Not supportedHardware too constrained — IDS/IPS is unavailable on the original UX.
UDM (original Dream Machine)≈ 850 MbpsTech-specs page lists IPS/IDS as a feature, not a throughput figure; 850 Mbps is the public Ubiquiti-blog number for the launch hardware.
UDR (Dream Router)1 Gbps³Matches the 1 GbE WAN port; on a sub-gigabit plan, headroom is minimal.
UCG-Ultra1 GbpsSame ceiling as the WAN port. Field reviews report ~900–950 Mbps sustained.
UCG-Max2.3 Gbps2.5 GbE WAN. First UniFi gateway whose IDS/IPS ceiling clears a 2 Gbps plan.
UDR-72.3 GbpsWi-Fi 7 Dream Router. Same ceiling as UCG-Max.
UDM-Pro3.5 GbpsRackmount; supports SFP+ WAN. Real-world field testing reports ~3.5 Gbps with default categories.
UDM-SE3.5 Gbps¹⁰Same CPU family as UDM-Pro plus PoE; same ceiling.
UCG-Fiber5 Gbps¹¹10G SFP+ WAN; first non-rackmount Ubiquiti gateway with multi-gig IDS/IPS headroom.
UDM-Pro Max5 Gbps¹²Rackmount; current upper end of the home / pro-sumer range for IDS/IPS at line rate.
UDM-Beast / Enterprise Fortress Gateway (EFG)25 Gbps+Enterprise tier. Out of scope for residential audit; included here for the upper bound.

Two things to read off that table. First: every gateway up to and including the UDM-SE has an IDS/IPS ceiling belowwhat a US residential fiber line typically delivers today (Verizon Fios 2 Gig, Optimum 5 Gig, Frontier 5 Gig, AT&T Fiber 5 Gig). The UDM-Pro's 3.5 Gbps ceiling is a hard cap on a 5 Gbps plan whether the WAN port is SFP+ or not. Second: the published number is the ceiling, not the floor. Whether you hit it depends on traffic mix, signature set, CPU contention from other features (Smart Queues, traffic identification, content filtering), and how busy the gateway is doing everything else. The number is what the silicon can do under good conditions, not what you will see on a Tuesday-night Zoom call with three 4K streams running.

§ 03 · Why DPI is hard for any router

Line-rate pattern matching is an expensive thing to do in software.

A standard layer-3 forwarding decision — “does this destination IP match a route in my table, and if so which interface do I send it out of?” — is cheap. Most modern home routers offload it to dedicated forwarding silicon and can hit line rate on a 1 Gbps or 2.5 Gbps WAN port without breaking a sweat. Stateful NAT is a little more expensive, but still trivial in hardware-accelerated forms.

Deep packet inspection is a fundamentally different workload. For every packet, the engine has to:

  • Reassemble it into the application-layer flow it belongs to (TCP segments, IP fragments, the TLS client-hello if visible, the DNS query, the HTTP request line).
  • Run the reassembled payload past every signature in the loaded rule set — tens of thousands of regular expressions, byte patterns, and protocol-specific match conditions.
  • Maintain per-flow state across packets, since a lot of signatures only fire on sequence (an HTTP request with one header followed by a body matching another pattern).
  • Decide, before the packet is allowed to forward, whether to drop, reset, or alert.

Suricata can be very fast at this — multi-gigabit throughput is routine on a dedicated x86 server with multi-queue NICs and many cores pinned to packet threads. On the ARM SoC inside a UDM-Pro, with the same chip also handling routing, switching, the controller process, the Protect process if installed, and whatever else the gateway is doing, the math is different. Ethan Word's 2025 field tests on a UDM-Pro reported “CPU usage was completely maxed out across all 4 cores” even while throughput sat well below the line rate of the WAN.

That's the engineering shape of the problem. It's not that Ubiquiti shipped a slow IDS engine — Suricata is a competent piece of software. It's that running it on a residential gateway, where the same CPU has many other jobs, leaves a very small budget for line-rate signature matching. The hardware ceiling is the cost of running a tool designed for dedicated security appliances on a box that also has to be a router, switch, controller, and (optionally) NVR.

§ 04 · What “IPS Throughput: 3.5 Gbps” really means in practice

The number on the box is a best case, not a contract.

Ubiquiti's published IDS/IPS throughput figure is a synthetic-traffic number generated under controlled conditions. The actual factors that move it around in a real home:

  • Signature set selected. UniFi exposes categories (Malware, Exploit, Scan, Reputation, etc.). More categories loaded means more rules in memory but, somewhat counter-intuitively, not always meaningfully slower steady-state throughput once the rule cache is hot. The hit is mostly at the category-toggle boundary — the first three or four categories cost the most, and additional ones are nearly free in throughput terms.
  • Traffic mix. A single bulk-TCP download is the easiest case for DPI — long-lived flow, predictable packet sizes. A house full of video chat, screen sharing, gaming, and many short-lived TLS connections is much harder, and CPU climbs faster.
  • Concurrent gateway load.Smart Queues (SQM/cake), application identification, honeypot, country blocking, content filtering, the embedded UniFi controller process — all of these share the CPU with Suricata. Ubiquiti's own Optimizing Wired Network Speedsguidance flags this directly: “resource- intensive features such as Threat Management and Smart Queues may reduce throughput by up to 30 percent.”¹³ That figure is from Ubiquiti, not us, and is the closest thing to an official acknowledgement we could find.
  • Single-flow vs. aggregate. The spec number is aggregate across all flows. A single iperf-style test from one client may not hit it even when the gateway is otherwise idle, because of how Suricata distributes flows across worker threads.

The pragmatic read: treat the published number as a not-to-exceedceiling. The realistic expectation on a residential gateway is somewhere between 60 and 90 percent of the published figure on a good day, and meaningfully lower when the gateway is also doing Smart Queues or application identification at the same time.

§ 05 · How to tell if Threat Management is the bottleneck

The toggle is the test.

The diagnostic is simple: run a wired speedtest with Threat Management on, disable Threat Management, wait a minute for the gateway's rule processes to wind down, run the same speedtest. Three patterns are possible.

1. Speed jumps to (or near) the WAN line rate.

Diagnostic confirmed. The gateway's IDS/IPS throughput ceiling was the cap. On a UDM or UDM-Pro on gigabit fiber, this is the most common reading we see — speedtest jumps from ~300 Mbps to ~940 Mbps after disabling Threat Management. Re-enabling brings the cap right back.

2. Speed barely changes.

The bottleneck is somewhere else. Common other culprits at this point: a 100 Mbps-negotiated Ethernet link (cable, port, NIC), an ISP-side provisioning issue, a Smart Queue limiter you forgot you turned on, or — for wireless tests — the airtime / TX-power issues covered in our too many APs at too high power writeup.

3. Speed jumps part of the way.

Both are contributing. Threat Management is one ceiling, and there is another ceiling you'll surface only when you fix this one. Disable Threat Management, document the new floor, and continue the audit from there.

A wired test from a laptop plugged directly into the gateway LAN port — not over Wi-Fi, not through a switch hop with PoE budget contention, not from a phone over 2.4 GHz — is the only test that isolates the gateway. Anything else mixes wireless airtime, switch behavior, and gateway load into the same number.

§ 06 · The three honest options

Disable, upgrade, or accept.

There is no fourth path. We've looked. The community has looked. Trimming the signature set does almost nothing to the ceiling once the engine is warm.Tuning Suricata variables from the UniFi side isn't exposed in the UI. Hardware acceleration of DPI doesn't exist on the current consumer-tier SoCs. The honest options are these:

Option A. Disable Threat Management.

The fastest and cheapest fix. Settings → Security → Threat Management → off. The gateway immediately reclaims the throughput ceiling. The cost is the loss of IDS alerts and the IPS block action on known signatures. On a residential network already running endpoint protection on the machines (most do, even if it's just the OS vendor's built-in), behind a proper firewall with no inbound port-forwards, the marginal security benefit of a Suricata-based home-grade IDS is modest. The marginal performance benefit of turning it off is large.

Option B. Upgrade to a gateway whose IDS/IPS ceiling clears your WAN.

If the homeowner is on a 2 Gbps plan and wants Threat Management, the gateway needs to be at least a UCG-Max (2.3 Gbps), UDR-7 (2.3 Gbps), UDM-Pro (3.5 Gbps), UDM-SE (3.5 Gbps), UCG-Fiber (5 Gbps), or UDM-Pro Max (5 Gbps) depending on rackmount preference. On a 5 Gbps plan, the practical options shrink to UCG-Fiber, UDM-Pro Max, or above. The conversation is honest — the existing gateway is what it is, and the new gateway costs what it costs.

Option C. Accept the cap.

Leave Threat Management on, accept that the WAN will cap at the IDS/IPS ceiling, document that to the homeowner. This is sometimes the right answer when the actual sustained traffic mix in the home (streaming + web + light video chat) doesn't hit the cap anyway. The speedtest number is lower than it could be; the lived experience is fine. What we won't do is leave it on without naming the trade-off.

§ 07 · The per-VLAN gotcha

New VLANs are not automatically inspected.

There is a related configuration trap we want to name even though it is not the same problem as the throughput ceiling. UniFi's Threat Management does not automatically apply to every VLAN. Ubiquiti's help-center article notes directly that enabling IDS/IPS “increases CPU and memory utilization,” and as a result the controller imposes a limit on the number of networks it can be applied to at once.² Practically: when Threat Management is first turned on, the user selects which VLANs it monitors. New VLANs created later — for guest, for IoT, for a kid's gaming network, for any segmentation added after the initial enable — are not automatically added to the monitored list.

On audit, the pattern looks like this: a homeowner with an old UDM-Pro proudly shows that “Threat Management is on,” and on inspection it's only on for the main LAN. The IoT VLAN, the guest Wi-Fi, the camera VLAN are all bypassing IDS entirely. Two opposite mistakes hide in the same place — the network is paying the throughput ceiling cost for the LANs Threat Management isapplied to, while getting none of the security benefit on the LANs it isn't.

Mitigation on audit: when Threat Management is on, check which VLANs it is applied to. If the list hasn't kept up with the network's segmentation, decide deliberately — add the missing VLANs to the monitored list, or accept that those VLANs are out of scope for IDS by design. Either is defensible. The one we want to retire is the accidental version.

§ 08 · What we recommend on a residential audit

The default is “off,” with named exceptions.

The recommendation we make on most residential audits, in order of likelihood:

  1. If the gateway is at or below UDM-SE class and the WAN plan is 1 Gbps or faster:turn Threat Management off. The performance ceiling outweighs the marginal security benefit on a home network with no exposed inbound services. The audit report names the decision and the reasoning so it's reversible.
  2. If the gateway is UCG-Max / UDR-7 / UDM-Pro Max / UCG-Fiber and the WAN plan is at or below the gateway's IDS/IPS ceiling: Threat Management on, with a deliberate VLAN application list. Re-test wired throughput after enabling; document the new ceiling.
  3. If there are exposed inbound services (port forwards for a home server, a public game server, a CCTV NVR with a public hostname, a SIP trunk):have the conversation about whether the exposure is actually necessary first, because almost every one of those services has a modern WireGuard / UniFi Teleport / VPN-based alternative that doesn't need the port forward at all. Where the exposure is genuine and must remain, prefer the gateway upgrade path over running an undersized gateway with Threat Management on.
  4. For commercial / multi-tenant / PCI-scoped networks:Threat Management alone is not a substitute for a real layered security posture. UniFi's own CyberSecure documentation makes that point as well — the feature is one layer in a stack, not a SOC in a box.

The throughput-ceiling problem is not a UniFi indictment. It's a consequence of running a line-rate security feature on consumer hardware, and every vendor in this segment has the same trade-off — the spec sheets just spell it out with more or less candor. Ubiquiti's actually do spell it out, on every per-model page; the audit finding is that homeowners don't see those pages until someone shows them.

§ 09 · Honest caveats

Where this article is firmer, and where it is softer.

  • The per-model IDS/IPS throughput numbers are firm.Each is read directly from Ubiquiti's own tech-specs page for that gateway. They are footnoted to the source. The exception is the original UDM, whose current tech-specs page lists IPS/IDS as a feature but omits the throughput figure; the 850 Mbps number we use for it is the Ubiquiti-blog launch number widely cited in community write-ups.
  • The “reduce by up to 30 percent” figure is from Ubiquiti, not us. It appears on the official Optimizing Wired Network Speeds help- center article and is the closest thing to an official acknowledgement that Threat Management has a real performance cost.¹³ It is not a guarantee. Some homes see less. Some see more.
  • Real-world numbers vary widely by signature set and traffic.The single largest public benchmark we found — Ethan Word's August 2025 UDM-Pro tests — showed raw throughput drop from ~8 Gbps without IDS/IPS to ~3.5 Gbps with three categories enabled, with little further drop as categories were added.A homeowner's test on a normal traffic mix may not match those synthetic numbers in either direction.
  • This is finding #7 in our residential UniFi audit series.Among multi-gigabit homes that brought us in because “the internet is slow,” the most common single cause we've found that points at the gateway itself rather than the Wi-Fi is Threat Management running on a gateway that can't carry it at line rate. That is a narrow population — the homes where the problem is worth auditing. It is not a claim about every UniFi network or every homeowner.
  • This does not apply uniformly to business deployments. Commercial deployments often need the IDS layer for compliance or insurance reasons that outweigh the throughput trade-off, and the gateway tier is usually higher to begin with. The framing in this article is residential. The mechanics are the same on a UDM-Pro in an office; the conclusion may not be.
  • We don't publish per-home audit numbers in this article. The audit produces a written report for a specific home, not a public dataset. The pattern described above is what we and the cited community sources observe.

None of these caveats changes the headline: the IDS/IPS throughput ceiling on UniFi gateways is real, it is published on the per-model spec sheets, and Ubiquiti does not display it next to the Threat-Management toggle. That is the gap this article exists to close.

// REFERENCES

  1. [1]Suricata — Open Source Network Threat Detection Engine, User Guide. Source for the Suricata engine architecture that powers UniFi's IDS/IPS, including signature loading, flow reassembly, and per-flow state tracking. docs.suricata.io
  2. [2]Ubiquiti Help Center — UniFi Gateway — Intrusion Detection and Prevention (IDS/IPS). Source for the “increases CPU and memory utilization” statement and the per-network application limit on Threat Management. help.ui.com — IDS/IPS
  3. [3]Ubiquiti Tech Specs — UniFi Dream Router (UDR). Source for the 1 Gbps IDS/IPS throughput figure on the UDR. techspecs.ui.com — UDR
  4. [4]Ubiquiti Tech Specs — UniFi Cloud Gateway Ultra (UCG-Ultra). Source for the 1 Gbps IDS/IPS throughput figure on the UCG-Ultra. techspecs.ui.com — UCG-Ultra
  5. [5]iFeeltech — UniFi Cloud Gateway Ultra Review (2026), updated 6 May 2026. Source for the ~900–950 Mbps sustained field-test figure on the UCG-Ultra with IDS/IPS enabled. ifeeltech.com — UCG-Ultra review
  6. [6]Ubiquiti Tech Specs — UniFi Cloud Gateway Max (UCG-Max). Source for the 2.3 Gbps IDS/IPS throughput figure on the UCG-Max. techspecs.ui.com — UCG-Max
  7. [7]Ubiquiti Tech Specs — UniFi Dream Router 7 (UDR-7). Source for the 2.3 Gbps IDS/IPS throughput figure on the UDR-7. techspecs.ui.com — UDR-7
  8. [8]Ubiquiti Tech Specs — UniFi Dream Machine Pro (UDM-Pro). Source for the 3.5 Gbps IDS/IPS throughput figure on the UDM-Pro. techspecs.ui.com — UDM-Pro
  9. [9]Ethan Word — Do IDS/IPS Signature Counts On UniFi Affect Performance?, Medium, 2 August 2025. Source for the UDM-Pro field-test numbers (8 Gbps raw → ~3.5 Gbps with three categories → little further change as categories grew, with CPU pinned at 100 percent across all four cores). medium.com — IDS/IPS signature count testing
  10. [10]Ubiquiti Tech Specs — UniFi Dream Machine Special Edition (UDM-SE). Source for the 3.5 Gbps IDS/IPS throughput figure on the UDM-SE. techspecs.ui.com — UDM-SE
  11. [11]Ubiquiti Tech Specs — UniFi Cloud Gateway Fiber (UCG-Fiber). Source for the 5 Gbps IDS/IPS throughput figure on the UCG-Fiber. techspecs.ui.com — UCG-Fiber
  12. [12]Ubiquiti Tech Specs — UniFi Dream Machine Pro Max (UDM-Pro Max). Source for the 5 Gbps IDS/IPS throughput figure on the UDM-Pro Max. techspecs.ui.com — UDM-Pro Max
  13. [13]Ubiquiti Help Center — Optimizing Wired Network Speeds. Source for the “resource-intensive features such as Threat Management and Smart Queues may reduce throughput by up to 30 percent” statement. help.ui.com — Optimizing Wired Network Speeds
// GET A REVIEW

Want a written audit of your own UniFi network?

A read-only Health Check covers the gateway, switch, Wi-Fi configuration, admin list, the public-IP / NAT posture, the IDS/IPS application list, and the access-point fleet — delivered as a written report with citations and a 15-minute walkthrough.