Thoughts on UDM Pro Market Fit

A lot of folks online are being critical of Ubiquiti about releasing the UDM Pro with the features it has and the hardware it’s configured with, because they feel it does not have the same obvious market fit that most of their other hardware has always had prior to it.

I believe that the UDM Pro makes big economic sense for Ubiquiti, and will likely carry their “Gen2” products onwards to be their most successful lineup so far.

The UDM Pro is priced competitively ($379 USD) against their own Security Gateway Pro ($344 USD) while also being physically more powerful in every way. Nearly everyone is going to choose the newest one for $55 more over the older one (which is obsolete anyways) for the power capabilities alone.

Ubiquiti’s goal with the UDM Pro is to give everyone an appliance that can easily run Protect, Access, and Talk at the same time, to help them get a basic understanding of what they are and how they work (and inevitably outgrow them) at which point they can up-sell you to their dedicated Protect, Access, and Talk appliances. The UNVR for Protect is the only one of those available in the Early Access store, and I’m assuming dedicated Access and Talk controllers are in the pipeline.

If the UDM Pro were more expensive – say $500 USD, the value proposition against the USGP alone wouldn’t make much sense anymore, especially if you don’t need 10G and don’t care about having the newest hardware.

And if the UDM Pro were simply an upgraded Gateway without the hard drive bay and 8 port switch, it wouldn’t also replace their CloudKey appliances and wouldn’t be able to run Protect, Access, or Talk.

In my observations, the people being the most critical are the ones who should be the most excited: professional installers. They don’t seem to see (or care) how huge of an up-sell opportunity Ubiquiti has handed everyone with the UDM Pro being what it is. Now every networking client that asks “hey how about cameras/phones/nfc readers” already has what they need to get started and room to expand later.

On paper, the UDM Pro is not the most powerful device of its kind when compared to some Cisco or pfSense alternatives, but I think Ubiquiti is taking a page from the Apple playbook here, and trusting that their tight software integration will be enough of a draw to win people over, and I believe this will work out positively for them in the long run.

My UDM Pro will arrive this afternoon via UPS (shout out to our super cool UPS driver!) and I’m excited for it to replace the USGP and Raspberry Pi 3 in my server rack.

Home Ubiquiti

Unifi Network – Fixing WPA Authentication Timeout/Failure

Does this look familiar?

9650 failures?! Holy schmoly!

If you’re like me, then you probably searched the web for a clue, maybe found some threads in the Community Forums, but ultimately left feeling pretty uneducated about what it number means and anything you should do about it.

Good news! This number being high isn’t going to negatively impact the performance of your network, but it also isn’t good. It’s the equivalent of a denial-of-service attack. Some wireless device is trying and failing to connect to your network, over and over again.

This happened to me and my home network after tuning my WiFi Access Point channels and Hue Bridge channels, trying to avoid as much interference between them as possible. After a few hours of RF scans and reconfigurations triggering reboots, I saw this number skyrocket from single-digits to over 10k eventually. (Keep in mind that I’d only switched WiFi channels, and did not rename the SSID or password, and didn’t enable or disable any 2.4 or 5 gigahertz bands.)

What happened?

The SSID and Passwords on all devices in my home were set and working totally fine before, so why all of a sudden would rebooting a few access points cause problems? My best guess is that something related to DTIM simply prevented a properly configured wireless client from successfully reconnecting to the network, but I’m honestly not really sure.

What should I do?

If you are in control of the wireless devices that connect to your network (like a home network or a small office) then this is completely within your power to fix.

All you need to do is figure out which wireless device(s) are trying and failing.

The Unifi Network Controller software does not give you any tools or logs to help you here. You’ll simply need to deduce on your own what they are.

Depending on the number and types of devices on your network, this deduction/elimination process may not be super simple. I started with problematic devices first, but resetting them didn’t help. I used the Unifi Network Controller Client list to go through them one at a time and check them manually.

My iPad Pro was successfully connected to my wireless network according to Network Controller, and that iPad was showing up as a connected HomeKit hub on Standby, so clearly it’s connecting, right?

The first time I had this happen, it was a Nintendo 3DS XL. But recently, it was that darned iPad Pro! Touching the screen revealed it was connected to LTE, and not WiFi. I opened the Settings app and went to WiFi, but connecting to the SSID for my home failed, and prompted me to update the password. Typing in the same password did not allow the device to connect either time. I needed to delete the SSID from the settings, and add it back in.

This was tricky on the iPad Pro, because the WiFi networks you connect your devices to get saved in your iCloud account. Removing it from one device removes it from others, which meant I needed to reconnect my iPhone and my laptop too.

Having done so, this number has reduced itself down to a more reasonable value:

It would be nice if the Network Controller logged failed attempts to access the network somewhere. I get that this could probably be easily spammed, but it isn’t a super good experience to show off some huge scary number without any indication as to what is going wrong or what to do about it.

Maybe a future version will open this up for us!

Home Ubiquiti

Get snap.jpeg from UniFi Protect Cameras

How to get the correct username & password for a UniFi camera that has already been adopted by UniFi Protect:

  • Get into Protect UI
  • Select NVR you’d like to use
  • On left bottom corner click the Settings gear
  • Click Advanced
  • On the right side, you’ll see Device password, click REVEAL
  • Copy the password
  • Connect to the Camera IP through https, e.g.
  • Login with username ubnt and password from above
  • Skip device setup, keep it in Unifi Video mode
  • Enable the “Anonymous Snapshot” on the camera
  • From there you should be able to access