UniFi Home Network Review — Sample Report
A read-only, written audit of a fictional Manhattan-area residence running a UniFi network alongside professionally installed Crestron Home automation, Lutron HomeWorks lighting, 2N IP intercoms, and a UniFi Protect camera system. Standard-tier engagement: 2 hours of senior engineering time, written report, 15-minute walkthrough.
The shape of the engagement, at a glance.
This is a remote, read-only audit of the UniFi configuration at the reference site. The hardware foundation is strong — a current-generation UDM Pro gateway, two PoE switches, five WiFi 6 access points, and a UniFi Protect camera system, all on current firmware. The 15 findings below are not hardware failures; they describe how the network is configured to handle remote access, Wi-Fi security, segmentation, and administrative access.
Primary findings requiring attention
- Three port-forwarding rules to the Crestron processor are open to the entire internet (
From: Any), which no longer aligns with Crestron's current published remote-access guidance.¹ - No LAN remote-access VPN is configured, so there is no immediate substitute for those open ports.
- All five Wi-Fi SSIDs use WPA2-only security with Protected Management Frames (PMF) disabled — the hardware supports WPA3 / PMF on every AP.
- All 62 client devices share one flat
192.168.88.0/24network — personal devices, IoT, intercoms, cameras, and Crestron and Lutron processors are all in the same broadcast domain. - The UniFi console's Owner role sits with the AV integrator, and one of their accounts appears to be a shared service account.
None of the findings indicate an active incident — there is no evidence of unauthorized devices in the reviewed client data. Taken together, however, they describe a meaningful gap between the strong hardware foundation already in place and the security posture that hardware is capable of supporting. See § 06 for the prioritized action list, and § 05 for the things that are working well today.
What was reviewed, and what wasn't.
This was a remote, read-only configuration review of the UniFi console. No configuration changes were made. No client passwords were requested. No active scanning or penetration testing was performed.
Areas reviewed
- Wi-Fi configuration — SSIDs, security mode, PMF, band steering, isolation
- Networks and VLANs — segmentation, DHCP, DNS, IPv6 posture
- Internet / WAN — uplink, DDNS, smart queues, UPnP
- Firewall and policy engine — ACLs, traffic rules, NAT
- Port-forwarding rules — source restrictions, protocol scope, target
- VPN — server, client, site-to-site
- CyberSecure — Intrusion Prevention, Content Filter, Encrypted DNS, Region Blocking, Honeypot
- Gateway and infrastructure resilience — uplink status, device health, update posture
- Admin / identity — accounts, roles, last activity, MFA-enforcement posture
- Device inventory — gateway, switches, access points, cameras (firmware, status)
- Client device inventory — visible client population, vendor identification, network membership
Items not verifiable in this scope
- Each administrator's specific MFA method (held privately at the Ubiquiti SSO level — MFA itself is enforced by default)
- Gateway backup cadence and remote-restore readiness
- Whether any current AV-integrator remote-tool depends on existing port-forwards
The site, as inventoried.
- Site
- Reference Site SR-01 (Manhattan-area private residence)
- Gateway
- UniFi Dream Machine Pro (UDM-Pro), UniFi OS 4.x · Network app 9.x
- Switches
- USW Pro 24 PoE (Layer 3) · USW 16 PoE (Layer 2, uplinked off Pro)
- Access points
- 5 total — U6-Pro × 3 (living, master, dining) · U6-LR × 2 (rack, study) — all WiFi 6
- Cameras
- UniFi Protect — 8 cameras (G4 Pro × 2, G4 Bullet × 4, G4 Doorbell × 2) on a CK-G2-Plus NVR
- AV / automation
- Crestron Home processor (CP4-R) at
192.168.88.20· Lutron HomeWorks Processor at192.168.88.30· 2N IP Verso intercom · Sonos zones - ISP / WAN
- Verizon FiOS Gigabit, single uplink (illustrative public IP
198.51.100.42, no IPv6) - LAN
- Single network 'Default' —
192.168.88.0/24, DHCP 100–250, ~55 leases in use - Wi-Fi SSIDs
- 5 total — 'House', 'House-Guest', 'House-IoT', 'House-AV', 'House-Service' — all bound to Native Network, all WPA2
- Clients
- 62 total (54 online, 8 offline) — 38 wired, 24 wireless
- Admin accounts
- 5 total — 2 homeowner (Super Admin) · 3 AV integrator (1 Owner + 2 Custom)
- Remote access
- 3 port-forward rules to
192.168.88.20(Crestron) on external 8443→443, 50001→50001, 41796→41796 · 'From: Any' · no VPN configured
Grouped by severity. Severity reflects impact on this environment.
Each finding includes the observation, why it matters, the recommendation, and a downtime / risk note where applicable. Severity is rated against this specific environment — a home network — not a generic enterprise threat model.
Critical· 1 finding
Crestron port-forwards are reachable from the entire internet and no longer align with Crestron's current remote-access guidance
Critical- Observation
Three port-forwarding rules on the UDM-Pro expose ports on the Crestron processor at
192.168.88.20to the public internet: external8443→ internal443(HTTPS), external50001→ internal50001(Crestron Home App), and external41796→ internal41796(Secure CIP, Crestron Home Setup app). TheFromfield on all three rules isAny, meaning any source IP on the internet is permitted.- Why it matters
Crestron Home's official documentation now states the following about port mapping for remote access:¹
“Remote system access for the Crestron Home app on mobile devices has been replaced with a secure, cloud-based remote access service. Port mapping is not required.”— docs.crestron.com, Remote System Access“To connect remotely for system configuration, set up a secure VPN connection to the customers house.”— docs.crestron.com, Remote System Access“After setting up secure remote access, remove port mapping from the router.”— docs.crestron.com, Remote System AccessThe current configuration is one generation behind Crestron's recommended deployment model. Automation controllers and embedded systems have historically been attractive targets when reachable directly from the internet, and a successful authentication here grants access onto the same flat LAN as personal devices and IP intercoms (see F-05).
- For context
Adjacent AV-control vendors have converged on the same architecture — outbound cloud relay for the homeowner app, VPN for installer config, no inbound port-forwarding required:
VendorRemote-access model in 2026Crestron HomeCloud relay for mobile app · VPN for installer setup · port mapping no longer required¹Lutron HomeWorks / CasétaCloud relay via Lutron Smart Bridge — outbound only; the Smart Bridge documentation states that since no inbound connections are made, no ports need to be forwarded³Control4 (4Sight / Control4 Connect)Cloud relay — 4Sight (for systems installed before April 23, 2024) and Control4 Connect (its replacement for newer systems) both provide remote access through the vendor cloud⁴Savant ProCloud relay — Savant Home Manager runs in the vendor cloud⁵- Recommendation
Retire all three port-forwards, in line with Crestron's current guidance:
- Move the homeowner's mobile Crestron Home app to Crestron's cloud-based remote-access service. That removes the need for the
50001port-forward entirely. - Provide AV-integrator technician access to the processor through a UniFi WireGuard VPN (F-02). That removes the need for the
8443and41796port-forwards. - As an interim measure while the VPN is being set up, tighten each port-forward's
Fromfield fromAnyto the integrator's known public IP range. - After the cloud + VPN substitutes are verified end to end, remove the port-forwards entirely.
- Move the homeowner's mobile Crestron Home app to Crestron's cloud-based remote-access service. That removes the need for the
- Downtime / risk
Low-to-medium. The retire-and-replace sequence above is staged, not flash-cut. The mobile app may need to be reauthorized once against the cloud relay.
High· 2 findings
No LAN remote-access VPN configured
High- Observation
Settings → VPN shows no VPN Server, VPN Client, or Site-to-Site VPN configured. UniFi cloud access to the controller itself is independent of this — the gap here is specifically that there is no VPN tunnel into the LAN.
- Why it matters
Without a VPN, every remote-access requirement turns into another open port on the WAN. This is the direct cause of F-01's exposure, and it blocks any clean path to retiring the open Crestron rules. Crestron's own current guidance for installer config explicitly names VPN as the substitute.¹
- Recommendation
Stand up a UniFi VPN server. WireGuard is the recommended choice on UDM-Pro — modern, fast, and supported by macOS / Windows / iOS / Android clients. Once the VPN is verified end-to-end (the AV-integrator technician successfully reaches the Crestron processor through the tunnel), proceed with the Phase 2 work in F-01.
One UniFi Protect camera retains a default administrative password
High- Observation
One G4 Bullet (driveway-facing) was adopted and is reachable on the local management network, but the controller flags it with a 'Default Password In Use' advisory. The other seven cameras have rotated passwords managed through the Protect application.
- Why it matters
Cameras retaining default credentials are widely abused by automated tools. Although the camera is not directly internet-exposed today, the flat LAN (F-05) means any compromised LAN device could attempt to reach it on the management network.
- Recommendation
Rotate the camera password from the Protect application's device-management screen and verify the 'Default Password In Use' advisory clears.
Medium· 5 findings
All Wi-Fi SSIDs are WPA2-only with Protected Management Frames disabled
Medium- Observation
All five SSIDs are set to Security Protocol = WPA2. Protected Management Frames (PMF) is set to Disabled on all five.
- Why it matters
WPA2 without PMF is susceptible to deauthentication and beacon-spoofing techniques that can knock clients offline or push them onto a malicious AP. PMF support is defined in IEEE 802.11w and is standard on every modern client. All five APs in this deployment are WiFi 6 (U6-Pro / U6-LR), which support WPA2/WPA3 transition mode and PMF Optional natively.
- Recommendation
Move each SSID to WPA2/WPA3 transition mode with PMF = Optional. Test one SSID first (the IoT SSID is the lowest-risk place to start since IoT clients are typically more rigid about Wi-Fi security than personal devices, so any compatibility issues will surface fastest there).
Flat LAN — no VLAN segmentation between personal, IoT, intercom, automation, and camera devices
Medium- Observation
Only one logical network exists: 'Default' on
192.168.88.0/24. The 62 client devices include personal computers and phones, Crestron Home processor, Lutron HomeWorks processor, 2N IP intercoms, Sonos zones, UniFi Protect cameras, and a printer — all sharing the same broadcast domain.- Why it matters
If any one device on the LAN is compromised (an unpatched IoT device, a malicious app on a phone), it can directly reach every other device. IoT and home-automation devices in particular often ship with weak or hard-coded credentials. Camera systems and access-control intercoms should be on isolated management networks.
- Recommendation
Introduce at least four logical networks:
- Trusted personal — laptops, phones, tablets
- Home automation — Crestron, Lutron, intercoms (allowed to reach the internet and their named cloud endpoints; cannot initiate connections into Trusted)
- IoT / smart-home — Sonos, lighting accessories, printer, etc.
- Camera management — Protect NVR + cameras (locked to that VLAN; outbound only to Ubiquiti cloud)
Multicast / mDNS reflection can be enabled selectively where Apple / Chromecast / Sonos discovery needs to cross zones.
Console Owner sits with the AV integrator; one integrator account is a shared service account
Medium- Observation
The Owner role on the UniFi console is held by an AV-integrator email of the form
service@<integrator>.example. The mailbox pattern (a role-named mailbox rather than a named individual) suggests it is a shared service account used by multiple technicians. Two further integrator accounts hold Custom roles tied to identifiable individuals; two homeowner accounts hold Super Admin.- Why it matters
Owner-on-integrator is a common pattern in professionally installed AV systems and is not in itself a problem — but it has two consequences. First, if the homeowner ever changes integrators, control of the network sits outside the household. Second, a shared service account makes MFA enforcement and offboarding harder (anyone with the credentials retains access), and makes audit attribution impossible.
- Recommendation
Decide deliberately whether console Ownership should remain with the integrator or transfer to a homeowner-controlled account — there is no single right answer, but the decision should be made. Replace the shared service account with per-individual technician accounts under least-privilege Custom roles, so MFA and offboarding can actually be enforced.
UPnP is enabled on the WAN interface
Medium- Observation
Internet → WAN → UPnP is On. The current rule table shows two auto-opened mappings created via UPnP requests from internal devices.
- Why it matters
UPnP lets any internal device punch holes in the firewall without administrator review. On a network that already exposes Crestron via static port-forwards (F-01) and lives on a flat LAN (F-05), additional dynamic port-openings widen the attack surface in ways the homeowner cannot see or audit.
- Recommendation
Disable UPnP. Any service that genuinely needs an inbound port should be configured explicitly as a port-forward (and ideally moved behind the VPN per F-02 once that's in place).
Port-forwards use TCP/UDP combined where TCP-only is appropriate
Medium- Observation
All three Crestron port-forwards in F-01 are configured with Protocol = TCP/UDP. HTTPS (443) is TCP-only. The Crestron control ports (50001, 41796) are documented as TCP/TLS services² — UDP is not required.
- Why it matters
Forwarding UDP on these ports needlessly broadens the exposed attack surface and adds amplification / scan opportunities for UDP-based probes.
- Recommendation
Set each rule's Protocol explicitly to TCP. This change is reversible in seconds and has no functional impact on the documented Crestron services.
Low· 3 findings
Multiple SSIDs are used as soft segregation but are not actually segmented
Low- Observation
The five SSIDs ('House', 'House-Guest', 'House-IoT', 'House-AV', 'House-Service') are all bound to the same Native Network. The SSID names suggest segmentation, but the underlying network is shared — clients on each SSID land in the same
192.168.88.0/24broadcast domain.- Why it matters
The intended segmentation is illusory. A compromised IoT device on House-IoT has the same network reach as a laptop on House.
- Recommendation
This is a natural starting point for the VLAN work in F-05. Keep the SSID names, but bind each to its own VLAN with explicit allow/deny rules between them. Rotate the PSK on the Service SSID after each major integrator visit, since it is shared with technicians by design.
DNS and content filtering are at ISP defaults
Low- Observation
WAN and Default network DNS are set to Auto, which uses the ISP's DNS resolvers. Encrypted DNS is Off. No CyberSecure Content Filter is bound to the LAN.
- Why it matters
ISP DNS may offer fewer privacy, security-filtering, and policy-control options than dedicated resolvers (e.g., Cloudflare 1.1.1.1, Quad9 9.9.9.9). DNS over TLS (RFC 7858)⁷ and DNS over HTTPS provide a meaningful confidentiality layer over plaintext DNS, particularly on a network that already lacks VLAN isolation.
- Recommendation
Set Encrypted DNS to Cloudflare or Quad9 on the WAN, and apply the Basic Content Filter to the IoT VLAN once F-05 is in place. Quality-of-life and minor-security improvement; not urgent on its own.
No Dynamic DNS configured against a dynamic public IP
Low- Observation
The WAN IPv4 is obtained via DHCP from the ISP; the WAN IP field in port-forward rules carries the standard warning that the IP may change. No DDNS service is bound to WAN1.
- Why it matters
If the public IP changes, any remote-access workflow that hard-codes it will silently break. For a VPN-based remote-access model (F-02), a stable hostname is operationally preferable.
- Recommendation
When WireGuard is stood up per F-02, configure DDNS on WAN1 with a service the integrator already manages (No-IP, DynDNS, etc.) and reference the hostname in the VPN client config rather than a literal IP.
Informational· 4 findings
Firmware, Network application, and Protect application are current
Info- Observation
UDM-Pro and Network application are on the Official channel with auto-update enabled. All 16 UniFi infrastructure devices show as Up to date. Protect application is current.
- Recommendation
Maintain. Keep the Official channel and auto-update enabled; consider scheduling auto-updates for low-impact hours.
All access points are WiFi 6 generation (802.11ax)
Info- Observation
Five APs total — three U6-Pro and two U6-LR, all on 802.11ax (WiFi 6). All five support WPA3 and PMF natively, which is why F-04 is recommended as a software-only change rather than a hardware refresh.
- Recommendation
None at hardware level. At next AP refresh cycle, evaluate WiFi 6E / 7 APs (U7-Pro / U7-Pro Max) for 6 GHz support if client density rises significantly.
Defensive controls correctly in place — IPS, Region Blocking, Rogue DHCP, RSTP
Info- Observation
CyberSecure IPS is On, Detection Mode = Notify-and-Block, all categories selected. Region Blocking is enabled. Rogue DHCP Server Detection is On. Spanning Tree is RSTP. Single WAN is in Failover-Only mode. IPS signatures updated within the last 24 hours.
- Recommendation
Maintain. These are appropriate defaults for this environment and represent meaningful active protection. Effectiveness improves further once F-01 / F-07 are addressed.
Locally-administered MAC addresses in the client list are consistent with Apple's Private Wi-Fi Address feature
Info- Observation
The controller's tracked-client list contains six locally-administered MAC addresses — the first hex digit's lower nibble indicates the U/L bit is set.⁶ All six are fingerprinted by the controller (DHCP option 55 / vendor class identifier / mDNS hostnames per RFC 2132⁸) as Apple devices.
- Why it matters
None observed. The observed pattern is consistent with Apple's Private Wi-Fi Address feature, which generates a software-defined MAC for Wi-Fi networks; some configurations rotate it on a recurring basis, which produces 'new client' entries in the controller as the address changes.⁹
- Recommendation
No action required for security. If the homeowner wants the client list to stop showing repeated 'new device' entries, the setting is per-network on each Apple device. See the companion article The mystery MACs on your UniFi network.
The findings list is not the whole picture.
The following aspects of the deployment are correctly configured today and worth noting alongside the findings above.
- Firmware is current — UDM-Pro, Network application, Protect application, and all 16 infrastructure devices on the Official channel with auto-update on.
- WAN health is excellent — Verizon FiOS Gigabit uplink with low-double-digit-millisecond latency to the first ISP hop and no observed loss in the visible window.
- Intrusion Prevention is enabled and active — CyberSecure IPS in Notify-and-Block mode with all categories selected; signatures current.
- Region Blocking is doing measurable work — inbound flows from blocked regions are being dropped at the gateway and surfacing in the logs.
- WAN mode is appropriate — single WAN set to Failover-Only (correct for a single-ISP deployment).
- Rogue DHCP detection is on — the gateway will alert if another device on the LAN starts handing out leases.
- Spanning Tree is correctly configured — RSTP enabled on switches, which prevents loops if a cable is miswired.
- WiFi 6 hardware is current — every AP supports WPA3 / PMF natively, which is why F-04 is a software-only change.
- UniFi Protect is on a dedicated NVR — the camera workload is not competing with the gateway for compute or storage.
Sequenced to maximize security gain per unit of disruption.
From to integrator's public IP range. Phase 2: cloud relay for homeowner app + VPN for installer setup; remove port-forwards.P2: Med / Low
Not findings — but worth a conversation.
- Schedule a gateway configuration backup cadence (UniFi Site Manager → Backups) so that any configuration drift after these changes is recoverable.
- Consider a UPS on the equipment rack housing the UDM-Pro, switches, and NVR if not already in place — a graceful shutdown during a power blip protects SSDs and avoids the Protect database recovery cycle.
- If the Lutron HomeWorks Processor moves onto a dedicated Automation VLAN as part of F-05, verify the Lutron app continues to reach it via the Smart Bridge cloud relay (no inbound port-forwarding required by design³).
- When AP hardware is next refreshed, plan for WiFi 6E / WiFi 7 APs and tighten WPA3 + PMF further on the modern radios.
The same content, in homeowner-readable terms.
The big picture
Your network hardware is in great shape — a current-generation UDM-Pro gateway, two PoE switches, five WiFi 6 access points, eight cameras, all online and on current firmware. The findings in this report are not about broken gear; they describe how the network is configured to handle remote access, Wi-Fi security, and how devices are grouped together.
The most important thing
There are three “doors” open on the public internet pointing at your Crestron control system. Crestron itself — the manufacturer — now publishes documentation telling installers to switch to a cloud relay for the homeowner's mobile app and to use a private VPN tunnel for installer setup tools. The conversation to have with the integrator is collaborative: “Can we work together to bring the system in line with Crestron's current remote-access guidance — cloud relay for the app, VPN for the setup tool — and retire these inbound ports?”
About Wi-Fi
Your five Wi-Fi names are all using the older WPA2 encryption mode. WPA3 (newer) is supported by every modern phone, laptop, and tablet and by every access point you own. We recommend a mixed WPA2/WPA3 mode so older devices keep working and newer ones get the stronger encryption. We also recommend turning on “Protected Management Frames,” which prevents a nuisance attack that can knock devices off the Wi-Fi.
About all the different devices on one network
Right now your phones, computers, IP intercoms, Crestron processor, Lutron processor, cameras, Sonos, printer, and smart-home devices are all on the same digital street. The five Wi-Fi names (House, Guest, IoT, AV, Service) suggest separation, but they are all bound to the same underlying network — the separation is in name only. The fix is to give each Wi-Fi name its own actual lane (a VLAN), with rules that prevent the smart-home and IoT lanes from reaching personal devices.
About admin access
Five people can log in to manage this network. Ubiquiti already requires two-factor authentication on every account by default, so the basic protection is in place. A small upgrade worth doing when convenient: each person can enroll a stronger second factor on their Ubiquiti account — an authenticator app or a passkey — instead of relying on email codes. The shared service account at the integrator should be replaced with per-technician accounts, so it's clear who did what and access can be removed person-by-person when staff change.
What we did not change
We only read settings — we did not change any configuration. Every recommendation in this report is something you, your IT person, or the integrator can review and apply on your schedule.
// REFERENCES
- [1]Crestron Home Documentation — Remote System Access. Documents the current cloud-relay model for the homeowner mobile app, VPN guidance for system configuration, and the explicit recommendation to remove port mapping from the router after secure remote access is set up. docs.crestron.com/en-us/8525/Content/CP4R/Appendix/Enable-Remote-System-Access.htm
- [2]Crestron Home Documentation — Ports Used by Crestron Home. Documents the protocol scope of each port — TLS over TCP for 443, 41796 (Secure CIP), 50001 (Crestron Home App), and others. docs.crestron.com/en-us/8525/Content/Ports.htm
- [3]Lutron Support — Caséta / Smart Bridge connection FAQ. Documents that the Lutron app connects to the Smart Bridge via the cloud, and the Smart Bridge makes outbound connections only — no inbound port-forwarding is required. support.lutron.com — Caséta Smart Bridge connection FAQ
- [4]Control4 — 4Sight Services. Documents 4Sight as a cloud-based subscription enabling remote access, with the note that 4Sight is available for systems installed before April 23, 2024; for systems installed after that date, Control4 Connect is the replacement service. docs.control4.com/o/4sight-services
- [5]Savant Support — Savant Pro knowledge base. Documents Savant Home Manager as a cloud application providing system access, monitoring, and dealer remote-management features. support.savant.com/pro
- [6]IEEE Registration Authority. The 802 standards family defines the 48-bit MAC address format, including the Individual/Group (I/G) and Universal/Locally-administered (U/L) flag bits in the first octet. The U/L bit is bit 1 (second-least-significant) of that octet. standards.ieee.org/products-programs/regauth/
- [7]IETF RFC 7858 — Specification for DNS over Transport Layer Security (TLS). The standards-track specification for encrypted DNS that gateways (including UniFi) reference when offering an Encrypted DNS option. datatracker.ietf.org/doc/html/rfc7858
- [8]IETF RFC 2132 — DHCP Options and BOOTP Vendor Extensions. Defines option 55 (Parameter Request List), option 60 (Vendor Class Identifier), and option 12 (Host Name). These option fields are what network controllers use to fingerprint a client's vendor and model independent of its MAC address. datatracker.ietf.org/doc/html/rfc2132
- [9]Apple Support — Use private Wi-Fi addresses on iPhone, iPad, Apple Watch, and Vision Pro. Documents the Private Wi-Fi Address feature, the OS versions on which it ships, and the per-network toggle that turns it off where stable identification is required. support.apple.com/en-us/102509