

- #UNIFI CONTROLLER OFFLINE UPGRADE#
- #UNIFI CONTROLLER OFFLINE CODE#
- #UNIFI CONTROLLER OFFLINE PC#
- #UNIFI CONTROLLER OFFLINE FREE#
To access the cloud key locally you'll need to allow the following services from your management PC to the cloud key:
#UNIFI CONTROLLER OFFLINE CODE#
If you're using the FortiGate for DHCP this is a little tricky, as you need to set the Additional DHCP Options to the custom option code of 43, then set the hex value to indicate the sub-type, number of bytes, and IP in hex, like so:Ġ1: suboption 04: length of the payload (4 bytes) c0a80001: 192.168.0.1 in hex Per if you put your Unifi Controller (cloud key in this case) in a different subnet/vlan, you can provide the IP of the controller to other Unifi devices by using DHCP Option 43.

I found that if I moved the cloud key to a new subnet, or from a lab with one public IP to a location with a different public IP, that remote web access would stop working till I used ssh to connect and reboot the cloud key. Note that you can use "exec ssh" from remote/cloud access to the FortiGate to access the cloud key. The switches (and newer APs) can now be set to work with tagged vlans, but make sure they're getting untagged native vlans to start with. The cloud key and other Unifi devices all assume native vlans and DHCP to start.
#UNIFI CONTROLLER OFFLINE FREE#
Hope this is useful, and feel free to post corrections. Let me know if this isn't appropriate for the forum.Īfter setting up a Unifi Cloud Key, switches, and access points behind a FortiGate, with vlan separation between the cloud key (controller used for management) and other Unifi devices, and with remote access to the Unifi system working through the FortiGate, I thought I'd post what I found that worked to save others some time. It is recommended to migrate to PKCS12 which is an industry standard format using "keytool -importkeystore -srckeystore /usr/lib/unifi/data/keystore -destkeystore /usr/lib/unifi/data/keystore -deststoretype pkcs12".Thought I'd post the FortiGate configs to work with some Unifi devices. The JKS keystore uses a proprietary format. Importing keystore /tmp/tmp.dmOOgvoKzr to /usr/lib/unifi/data/keystore. DEBUG: Inserting certificate into UniFi keystore. DEBUG: Removing existing certificate from UniFi protected keystore. DEBUG: Preparing certificate in a format UniFi accepts. DEBUG: Injecting SSL certificate into the controller. Or support in, e.g., GitHub, forums or the Discord chat. Please, share the above information when looking for help System: Home Assistant OS 5.13 (armv7 / raspberrypi4) You are running the latest version of this add-on. Manage your UniFi network using a web browser executing container initialization scripts. ensuring user provided files have correct perms.exited 0. See Addon Debug level log: making user provided files available at /var/run/s6/etc.exited 0. Thought that was strange, but now rollback to restore to the version of yesterday is giving the same issue…Īnyone has any clue what it could be or what I can try? I can SSL into HA through the addon, so it seems like something specific to this addon… not through LAN or the Unify app on my mobile (nor local WIFI or mobile network).
#UNIFI CONTROLLER OFFLINE UPGRADE#
Today I performed the upgrade to version 0.22.0, got the same error as last month, but now I cannot not access the controller anymore. 23:06:32,103 main ERROR Unable to locate appender "InMemoryAppender" for logger config "root"

23:06:30,600 main ERROR Error processing element InMemoryAppender (): CLASS_NOT_FOUND

Upgraded to the latest version today’s day I’m getting this error… funny thing is that all still seems to work fine. Home Assistant Community Add-on: UniFi Controller Home Assistant OS
