Skip to main content
Sample report. Save the page as PDF or read it inline — same content either way.
SAMPLE · REFERENCE SITE SR-01 · MAY 2026SHIFTCTRL UNIFI HEALTH CHECK · STANDARD TIER · 2 HOURS

UniFi Home Network Review — Sample Report

A read-only, written audit of a fictional Manhattan-area residence running a UniFi network alongside professionally installed Crestron Home automation, Lutron HomeWorks lighting, 2N IP intercoms, and a UniFi Protect camera system. Standard-tier engagement: 2 hours of senior engineering time, written report, 15-minute walkthrough.

§ 01 · Executive summary

The shape of the engagement, at a glance.

This is a remote, read-only audit of the UniFi configuration at the reference site. The hardware foundation is strong — a current-generation UDM Pro gateway, two PoE switches, five WiFi 6 access points, and a UniFi Protect camera system, all on current firmware. The 15 findings below are not hardware failures; they describe how the network is configured to handle remote access, Wi-Fi security, segmentation, and administrative access.

Primary findings requiring attention

  • Three port-forwarding rules to the Crestron processor are open to the entire internet (From: Any), which no longer aligns with Crestron's current published remote-access guidance.¹
  • No LAN remote-access VPN is configured, so there is no immediate substitute for those open ports.
  • All five Wi-Fi SSIDs use WPA2-only security with Protected Management Frames (PMF) disabled — the hardware supports WPA3 / PMF on every AP.
  • All 62 client devices share one flat 192.168.88.0/24 network — personal devices, IoT, intercoms, cameras, and Crestron and Lutron processors are all in the same broadcast domain.
  • The UniFi console's Owner role sits with the AV integrator, and one of their accounts appears to be a shared service account.

None of the findings indicate an active incident — there is no evidence of unauthorized devices in the reviewed client data. Taken together, however, they describe a meaningful gap between the strong hardware foundation already in place and the security posture that hardware is capable of supporting. See § 06 for the prioritized action list, and § 05 for the things that are working well today.

§ 02 · Scope of review

What was reviewed, and what wasn't.

This was a remote, read-only configuration review of the UniFi console. No configuration changes were made. No client passwords were requested. No active scanning or penetration testing was performed.

Areas reviewed

  • Wi-Fi configuration — SSIDs, security mode, PMF, band steering, isolation
  • Networks and VLANs — segmentation, DHCP, DNS, IPv6 posture
  • Internet / WAN — uplink, DDNS, smart queues, UPnP
  • Firewall and policy engine — ACLs, traffic rules, NAT
  • Port-forwarding rules — source restrictions, protocol scope, target
  • VPN — server, client, site-to-site
  • CyberSecure — Intrusion Prevention, Content Filter, Encrypted DNS, Region Blocking, Honeypot
  • Gateway and infrastructure resilience — uplink status, device health, update posture
  • Admin / identity — accounts, roles, last activity, MFA-enforcement posture
  • Device inventory — gateway, switches, access points, cameras (firmware, status)
  • Client device inventory — visible client population, vendor identification, network membership

Items not verifiable in this scope

  • Each administrator's specific MFA method (held privately at the Ubiquiti SSO level — MFA itself is enforced by default)
  • Gateway backup cadence and remote-restore readiness
  • Whether any current AV-integrator remote-tool depends on existing port-forwards
§ 03 · Network environment

The site, as inventoried.

Site
Reference Site SR-01 (Manhattan-area private residence)
Gateway
UniFi Dream Machine Pro (UDM-Pro), UniFi OS 4.x · Network app 9.x
Switches
USW Pro 24 PoE (Layer 3) · USW 16 PoE (Layer 2, uplinked off Pro)
Access points
5 total — U6-Pro × 3 (living, master, dining) · U6-LR × 2 (rack, study) — all WiFi 6
Cameras
UniFi Protect — 8 cameras (G4 Pro × 2, G4 Bullet × 4, G4 Doorbell × 2) on a CK-G2-Plus NVR
AV / automation
Crestron Home processor (CP4-R) at 192.168.88.20 · Lutron HomeWorks Processor at 192.168.88.30 · 2N IP Verso intercom · Sonos zones
ISP / WAN
Verizon FiOS Gigabit, single uplink (illustrative public IP 198.51.100.42, no IPv6)
LAN
Single network 'Default' — 192.168.88.0/24, DHCP 100–250, ~55 leases in use
Wi-Fi SSIDs
5 total — 'House', 'House-Guest', 'House-IoT', 'House-AV', 'House-Service' — all bound to Native Network, all WPA2
Clients
62 total (54 online, 8 offline) — 38 wired, 24 wireless
Admin accounts
5 total — 2 homeowner (Super Admin) · 3 AV integrator (1 Owner + 2 Custom)
Remote access
3 port-forward rules to 192.168.88.20 (Crestron) on external 8443→443, 50001→50001, 41796→41796 · 'From: Any' · no VPN configured
§ 04 · Findings & recommendations

Grouped by severity. Severity reflects impact on this environment.

Each finding includes the observation, why it matters, the recommendation, and a downtime / risk note where applicable. Severity is rated against this specific environment — a home network — not a generic enterprise threat model.

Critical· 1 finding

F-01

Crestron port-forwards are reachable from the entire internet and no longer align with Crestron's current remote-access guidance

Critical
Observation

Three port-forwarding rules on the UDM-Pro expose ports on the Crestron processor at 192.168.88.20 to the public internet: external 8443 → internal 443 (HTTPS), external 50001 → internal 50001 (Crestron Home App), and external 41796 → internal 41796 (Secure CIP, Crestron Home Setup app). The From field on all three rules is Any, meaning any source IP on the internet is permitted.

Why it matters

Crestron Home's official documentation now states the following about port mapping for remote access:¹

“Remote system access for the Crestron Home app on mobile devices has been replaced with a secure, cloud-based remote access service. Port mapping is not required.”— docs.crestron.com, Remote System Access
“To connect remotely for system configuration, set up a secure VPN connection to the customers house.”— docs.crestron.com, Remote System Access
“After setting up secure remote access, remove port mapping from the router.”— docs.crestron.com, Remote System Access

The current configuration is one generation behind Crestron's recommended deployment model. Automation controllers and embedded systems have historically been attractive targets when reachable directly from the internet, and a successful authentication here grants access onto the same flat LAN as personal devices and IP intercoms (see F-05).

For context

Adjacent AV-control vendors have converged on the same architecture — outbound cloud relay for the homeowner app, VPN for installer config, no inbound port-forwarding required:

Vendor
Remote-access model in 2026
Crestron Home
Cloud relay for mobile app · VPN for installer setup · port mapping no longer required¹
Lutron HomeWorks / Caséta
Cloud relay via Lutron Smart Bridge — outbound only; the Smart Bridge documentation states that since no inbound connections are made, no ports need to be forwarded³
Control4 (4Sight / Control4 Connect)
Cloud relay — 4Sight (for systems installed before April 23, 2024) and Control4 Connect (its replacement for newer systems) both provide remote access through the vendor cloud
Savant Pro
Cloud relay — Savant Home Manager runs in the vendor cloud
Recommendation

Retire all three port-forwards, in line with Crestron's current guidance:

  1. Move the homeowner's mobile Crestron Home app to Crestron's cloud-based remote-access service. That removes the need for the 50001 port-forward entirely.
  2. Provide AV-integrator technician access to the processor through a UniFi WireGuard VPN (F-02). That removes the need for the 8443 and 41796 port-forwards.
  3. As an interim measure while the VPN is being set up, tighten each port-forward's From field from Any to the integrator's known public IP range.
  4. After the cloud + VPN substitutes are verified end to end, remove the port-forwards entirely.
Downtime / risk

Low-to-medium. The retire-and-replace sequence above is staged, not flash-cut. The mobile app may need to be reauthorized once against the cloud relay.

High· 2 findings

F-02

No LAN remote-access VPN configured

High
Observation

Settings → VPN shows no VPN Server, VPN Client, or Site-to-Site VPN configured. UniFi cloud access to the controller itself is independent of this — the gap here is specifically that there is no VPN tunnel into the LAN.

Why it matters

Without a VPN, every remote-access requirement turns into another open port on the WAN. This is the direct cause of F-01's exposure, and it blocks any clean path to retiring the open Crestron rules. Crestron's own current guidance for installer config explicitly names VPN as the substitute.¹

Recommendation

Stand up a UniFi VPN server. WireGuard is the recommended choice on UDM-Pro — modern, fast, and supported by macOS / Windows / iOS / Android clients. Once the VPN is verified end-to-end (the AV-integrator technician successfully reaches the Crestron processor through the tunnel), proceed with the Phase 2 work in F-01.

F-03

One UniFi Protect camera retains a default administrative password

High
Observation

One G4 Bullet (driveway-facing) was adopted and is reachable on the local management network, but the controller flags it with a 'Default Password In Use' advisory. The other seven cameras have rotated passwords managed through the Protect application.

Why it matters

Cameras retaining default credentials are widely abused by automated tools. Although the camera is not directly internet-exposed today, the flat LAN (F-05) means any compromised LAN device could attempt to reach it on the management network.

Recommendation

Rotate the camera password from the Protect application's device-management screen and verify the 'Default Password In Use' advisory clears.

Medium· 5 findings

F-04

All Wi-Fi SSIDs are WPA2-only with Protected Management Frames disabled

Medium
Observation

All five SSIDs are set to Security Protocol = WPA2. Protected Management Frames (PMF) is set to Disabled on all five.

Why it matters

WPA2 without PMF is susceptible to deauthentication and beacon-spoofing techniques that can knock clients offline or push them onto a malicious AP. PMF support is defined in IEEE 802.11w and is standard on every modern client. All five APs in this deployment are WiFi 6 (U6-Pro / U6-LR), which support WPA2/WPA3 transition mode and PMF Optional natively.

Recommendation

Move each SSID to WPA2/WPA3 transition mode with PMF = Optional. Test one SSID first (the IoT SSID is the lowest-risk place to start since IoT clients are typically more rigid about Wi-Fi security than personal devices, so any compatibility issues will surface fastest there).

F-05

Flat LAN — no VLAN segmentation between personal, IoT, intercom, automation, and camera devices

Medium
Observation

Only one logical network exists: 'Default' on 192.168.88.0/24. The 62 client devices include personal computers and phones, Crestron Home processor, Lutron HomeWorks processor, 2N IP intercoms, Sonos zones, UniFi Protect cameras, and a printer — all sharing the same broadcast domain.

Why it matters

If any one device on the LAN is compromised (an unpatched IoT device, a malicious app on a phone), it can directly reach every other device. IoT and home-automation devices in particular often ship with weak or hard-coded credentials. Camera systems and access-control intercoms should be on isolated management networks.

Recommendation

Introduce at least four logical networks:

  • Trusted personal — laptops, phones, tablets
  • Home automation — Crestron, Lutron, intercoms (allowed to reach the internet and their named cloud endpoints; cannot initiate connections into Trusted)
  • IoT / smart-home — Sonos, lighting accessories, printer, etc.
  • Camera management — Protect NVR + cameras (locked to that VLAN; outbound only to Ubiquiti cloud)

Multicast / mDNS reflection can be enabled selectively where Apple / Chromecast / Sonos discovery needs to cross zones.

F-06

Console Owner sits with the AV integrator; one integrator account is a shared service account

Medium
Observation

The Owner role on the UniFi console is held by an AV-integrator email of the form service@<integrator>.example. The mailbox pattern (a role-named mailbox rather than a named individual) suggests it is a shared service account used by multiple technicians. Two further integrator accounts hold Custom roles tied to identifiable individuals; two homeowner accounts hold Super Admin.

Why it matters

Owner-on-integrator is a common pattern in professionally installed AV systems and is not in itself a problem — but it has two consequences. First, if the homeowner ever changes integrators, control of the network sits outside the household. Second, a shared service account makes MFA enforcement and offboarding harder (anyone with the credentials retains access), and makes audit attribution impossible.

Recommendation

Decide deliberately whether console Ownership should remain with the integrator or transfer to a homeowner-controlled account — there is no single right answer, but the decision should be made. Replace the shared service account with per-individual technician accounts under least-privilege Custom roles, so MFA and offboarding can actually be enforced.

F-07

UPnP is enabled on the WAN interface

Medium
Observation

Internet → WAN → UPnP is On. The current rule table shows two auto-opened mappings created via UPnP requests from internal devices.

Why it matters

UPnP lets any internal device punch holes in the firewall without administrator review. On a network that already exposes Crestron via static port-forwards (F-01) and lives on a flat LAN (F-05), additional dynamic port-openings widen the attack surface in ways the homeowner cannot see or audit.

Recommendation

Disable UPnP. Any service that genuinely needs an inbound port should be configured explicitly as a port-forward (and ideally moved behind the VPN per F-02 once that's in place).

F-08

Port-forwards use TCP/UDP combined where TCP-only is appropriate

Medium
Observation

All three Crestron port-forwards in F-01 are configured with Protocol = TCP/UDP. HTTPS (443) is TCP-only. The Crestron control ports (50001, 41796) are documented as TCP/TLS services² — UDP is not required.

Why it matters

Forwarding UDP on these ports needlessly broadens the exposed attack surface and adds amplification / scan opportunities for UDP-based probes.

Recommendation

Set each rule's Protocol explicitly to TCP. This change is reversible in seconds and has no functional impact on the documented Crestron services.

Low· 3 findings

F-09

Multiple SSIDs are used as soft segregation but are not actually segmented

Low
Observation

The five SSIDs ('House', 'House-Guest', 'House-IoT', 'House-AV', 'House-Service') are all bound to the same Native Network. The SSID names suggest segmentation, but the underlying network is shared — clients on each SSID land in the same 192.168.88.0/24 broadcast domain.

Why it matters

The intended segmentation is illusory. A compromised IoT device on House-IoT has the same network reach as a laptop on House.

Recommendation

This is a natural starting point for the VLAN work in F-05. Keep the SSID names, but bind each to its own VLAN with explicit allow/deny rules between them. Rotate the PSK on the Service SSID after each major integrator visit, since it is shared with technicians by design.

F-10

DNS and content filtering are at ISP defaults

Low
Observation

WAN and Default network DNS are set to Auto, which uses the ISP's DNS resolvers. Encrypted DNS is Off. No CyberSecure Content Filter is bound to the LAN.

Why it matters

ISP DNS may offer fewer privacy, security-filtering, and policy-control options than dedicated resolvers (e.g., Cloudflare 1.1.1.1, Quad9 9.9.9.9). DNS over TLS (RFC 7858) and DNS over HTTPS provide a meaningful confidentiality layer over plaintext DNS, particularly on a network that already lacks VLAN isolation.

Recommendation

Set Encrypted DNS to Cloudflare or Quad9 on the WAN, and apply the Basic Content Filter to the IoT VLAN once F-05 is in place. Quality-of-life and minor-security improvement; not urgent on its own.

F-11

No Dynamic DNS configured against a dynamic public IP

Low
Observation

The WAN IPv4 is obtained via DHCP from the ISP; the WAN IP field in port-forward rules carries the standard warning that the IP may change. No DDNS service is bound to WAN1.

Why it matters

If the public IP changes, any remote-access workflow that hard-codes it will silently break. For a VPN-based remote-access model (F-02), a stable hostname is operationally preferable.

Recommendation

When WireGuard is stood up per F-02, configure DDNS on WAN1 with a service the integrator already manages (No-IP, DynDNS, etc.) and reference the hostname in the VPN client config rather than a literal IP.

Informational· 4 findings

F-12

Firmware, Network application, and Protect application are current

Info
Observation

UDM-Pro and Network application are on the Official channel with auto-update enabled. All 16 UniFi infrastructure devices show as Up to date. Protect application is current.

Recommendation

Maintain. Keep the Official channel and auto-update enabled; consider scheduling auto-updates for low-impact hours.

F-13

All access points are WiFi 6 generation (802.11ax)

Info
Observation

Five APs total — three U6-Pro and two U6-LR, all on 802.11ax (WiFi 6). All five support WPA3 and PMF natively, which is why F-04 is recommended as a software-only change rather than a hardware refresh.

Recommendation

None at hardware level. At next AP refresh cycle, evaluate WiFi 6E / 7 APs (U7-Pro / U7-Pro Max) for 6 GHz support if client density rises significantly.

F-14

Defensive controls correctly in place — IPS, Region Blocking, Rogue DHCP, RSTP

Info
Observation

CyberSecure IPS is On, Detection Mode = Notify-and-Block, all categories selected. Region Blocking is enabled. Rogue DHCP Server Detection is On. Spanning Tree is RSTP. Single WAN is in Failover-Only mode. IPS signatures updated within the last 24 hours.

Recommendation

Maintain. These are appropriate defaults for this environment and represent meaningful active protection. Effectiveness improves further once F-01 / F-07 are addressed.

F-15

Locally-administered MAC addresses in the client list are consistent with Apple's Private Wi-Fi Address feature

Info
Observation

The controller's tracked-client list contains six locally-administered MAC addresses — the first hex digit's lower nibble indicates the U/L bit is set. All six are fingerprinted by the controller (DHCP option 55 / vendor class identifier / mDNS hostnames per RFC 2132) as Apple devices.

Why it matters

None observed. The observed pattern is consistent with Apple's Private Wi-Fi Address feature, which generates a software-defined MAC for Wi-Fi networks; some configurations rotate it on a recurring basis, which produces 'new client' entries in the controller as the address changes.

Recommendation

No action required for security. If the homeowner wants the client list to stop showing repeated 'new device' entries, the setting is per-network on each Apple device. See the companion article The mystery MACs on your UniFi network.

§ 05 · What is working well

The findings list is not the whole picture.

The following aspects of the deployment are correctly configured today and worth noting alongside the findings above.

  • Firmware is current — UDM-Pro, Network application, Protect application, and all 16 infrastructure devices on the Official channel with auto-update on.
  • WAN health is excellent — Verizon FiOS Gigabit uplink with low-double-digit-millisecond latency to the first ISP hop and no observed loss in the visible window.
  • Intrusion Prevention is enabled and active — CyberSecure IPS in Notify-and-Block mode with all categories selected; signatures current.
  • Region Blocking is doing measurable work — inbound flows from blocked regions are being dropped at the gateway and surfacing in the logs.
  • WAN mode is appropriate — single WAN set to Failover-Only (correct for a single-ISP deployment).
  • Rogue DHCP detection is on — the gateway will alert if another device on the LAN starts handing out leases.
  • Spanning Tree is correctly configured — RSTP enabled on switches, which prevents loops if a cable is miswired.
  • WiFi 6 hardware is current — every AP supports WPA3 / PMF natively, which is why F-04 is a software-only change.
  • UniFi Protect is on a dedicated NVR — the camera workload is not competing with the gateway for compute or storage.
§ 06 · Priority action list

Sequenced to maximize security gain per unit of disruption.

#
Severity
Action
Effort / risk
1
Critical
Follow Crestron's current guidance and retire the three open port-forwards. Phase 1: tighten From to integrator's public IP range. Phase 2: cloud relay for homeowner app + VPN for installer setup; remove port-forwards.
P1: Low / Low
P2: Med / Low
2
High
Stand up a UniFi WireGuard VPN on the UDM-Pro. Required precursor for Phase 2 of item 1.
Medium / Low
3
High
Rotate the password on the G4 Bullet flagged with 'Default Password In Use'.
Low / Low
4
Medium
Move Wi-Fi to WPA2/WPA3 transition mode and PMF = Optional. Verify on the IoT SSID first.
Low / Low
5
Medium
Introduce VLAN segmentation. Promote the existing soft-segregation SSIDs into real VLANs (Trusted / Automation / IoT / Camera).
High / Medium
6
Medium
Decide Owner-of-console (homeowner vs integrator). Replace the shared service account with per-individual technician accounts.
Low / Low
7
Medium
Disable UPnP on the WAN interface.
Low / Low
8
Medium
Tighten port-forward protocol from TCP/UDP to TCP only on rules that remain during Phase 1 of item 1.
Low / Low
9
Low
After VLANs are in place (item 5), rotate the PSK on the Service SSID and adopt a cadence for rotating it after each major service visit.
Low / Low
§ 07 · Optional next steps

Not findings — but worth a conversation.

  • Schedule a gateway configuration backup cadence (UniFi Site Manager → Backups) so that any configuration drift after these changes is recoverable.
  • Consider a UPS on the equipment rack housing the UDM-Pro, switches, and NVR if not already in place — a graceful shutdown during a power blip protects SSDs and avoids the Protect database recovery cycle.
  • If the Lutron HomeWorks Processor moves onto a dedicated Automation VLAN as part of F-05, verify the Lutron app continues to reach it via the Smart Bridge cloud relay (no inbound port-forwarding required by design³).
  • When AP hardware is next refreshed, plan for WiFi 6E / WiFi 7 APs and tighten WPA3 + PMF further on the modern radios.
§ 08 · Plain-English walkthrough

The same content, in homeowner-readable terms.

The big picture

Your network hardware is in great shape — a current-generation UDM-Pro gateway, two PoE switches, five WiFi 6 access points, eight cameras, all online and on current firmware. The findings in this report are not about broken gear; they describe how the network is configured to handle remote access, Wi-Fi security, and how devices are grouped together.

The most important thing

There are three “doors” open on the public internet pointing at your Crestron control system. Crestron itself — the manufacturer — now publishes documentation telling installers to switch to a cloud relay for the homeowner's mobile app and to use a private VPN tunnel for installer setup tools. The conversation to have with the integrator is collaborative: “Can we work together to bring the system in line with Crestron's current remote-access guidance — cloud relay for the app, VPN for the setup tool — and retire these inbound ports?”

About Wi-Fi

Your five Wi-Fi names are all using the older WPA2 encryption mode. WPA3 (newer) is supported by every modern phone, laptop, and tablet and by every access point you own. We recommend a mixed WPA2/WPA3 mode so older devices keep working and newer ones get the stronger encryption. We also recommend turning on “Protected Management Frames,” which prevents a nuisance attack that can knock devices off the Wi-Fi.

About all the different devices on one network

Right now your phones, computers, IP intercoms, Crestron processor, Lutron processor, cameras, Sonos, printer, and smart-home devices are all on the same digital street. The five Wi-Fi names (House, Guest, IoT, AV, Service) suggest separation, but they are all bound to the same underlying network — the separation is in name only. The fix is to give each Wi-Fi name its own actual lane (a VLAN), with rules that prevent the smart-home and IoT lanes from reaching personal devices.

About admin access

Five people can log in to manage this network. Ubiquiti already requires two-factor authentication on every account by default, so the basic protection is in place. A small upgrade worth doing when convenient: each person can enroll a stronger second factor on their Ubiquiti account — an authenticator app or a passkey — instead of relying on email codes. The shared service account at the integrator should be replaced with per-technician accounts, so it's clear who did what and access can be removed person-by-person when staff change.

What we did not change

We only read settings — we did not change any configuration. Every recommendation in this report is something you, your IT person, or the integrator can review and apply on your schedule.

// REFERENCES

  1. [1]Crestron Home Documentation — Remote System Access. Documents the current cloud-relay model for the homeowner mobile app, VPN guidance for system configuration, and the explicit recommendation to remove port mapping from the router after secure remote access is set up. docs.crestron.com/en-us/8525/Content/CP4R/Appendix/Enable-Remote-System-Access.htm
  2. [2]Crestron Home Documentation — Ports Used by Crestron Home. Documents the protocol scope of each port — TLS over TCP for 443, 41796 (Secure CIP), 50001 (Crestron Home App), and others. docs.crestron.com/en-us/8525/Content/Ports.htm
  3. [3]Lutron Support — Caséta / Smart Bridge connection FAQ. Documents that the Lutron app connects to the Smart Bridge via the cloud, and the Smart Bridge makes outbound connections only — no inbound port-forwarding is required. support.lutron.com — Caséta Smart Bridge connection FAQ
  4. [4]Control4 — 4Sight Services. Documents 4Sight as a cloud-based subscription enabling remote access, with the note that 4Sight is available for systems installed before April 23, 2024; for systems installed after that date, Control4 Connect is the replacement service. docs.control4.com/o/4sight-services
  5. [5]Savant Support — Savant Pro knowledge base. Documents Savant Home Manager as a cloud application providing system access, monitoring, and dealer remote-management features. support.savant.com/pro
  6. [6]IEEE Registration Authority. The 802 standards family defines the 48-bit MAC address format, including the Individual/Group (I/G) and Universal/Locally-administered (U/L) flag bits in the first octet. The U/L bit is bit 1 (second-least-significant) of that octet. standards.ieee.org/products-programs/regauth/
  7. [7]IETF RFC 7858 — Specification for DNS over Transport Layer Security (TLS). The standards-track specification for encrypted DNS that gateways (including UniFi) reference when offering an Encrypted DNS option. datatracker.ietf.org/doc/html/rfc7858
  8. [8]IETF RFC 2132 — DHCP Options and BOOTP Vendor Extensions. Defines option 55 (Parameter Request List), option 60 (Vendor Class Identifier), and option 12 (Host Name). These option fields are what network controllers use to fingerprint a client's vendor and model independent of its MAC address. datatracker.ietf.org/doc/html/rfc2132
  9. [9]Apple Support — Use private Wi-Fi addresses on iPhone, iPad, Apple Watch, and Vision Pro. Documents the Private Wi-Fi Address feature, the OS versions on which it ships, and the per-network toggle that turns it off where stable identification is required. support.apple.com/en-us/102509