8. mongodb has been dropped from the stable Debian and Ubuntu repositories. Thanks for responding. The easiest way is to follow steps on the site of Ubiquiti. This saves you having to join your devices to several different networks and allows the APs to intelligently hand devices off to each other as you roam around the house. Instead of using the Unifi Cloud Key device solution, I decided to use one of my existing hardware solutions and self host the controller on my Proxmox VM as a ubuntu 20.04 LTS LXC container. Be sure you are running the latest script. Open up putty and type in the IPv4 address of your server and click open. I don't know the unifi application post installation initialisation process, but it could be that the system.properties file needs time to be generated. I get an architecture error when installing the libssl: After being disappointed to find that Ubiquiti will not allow you to run UniFi protect on your own equipment, I ended up finding an installer file for Ubiquiti Protect that would work on Ubuntu/Debian. Learn how your comment data is processed. I did this on Ubuntu Server 21.04 on arm64 RPi4b, works fine, mongodb 3.6.3 gets installed: I used the pre-installed Raspberry Pi image for Ubuntu 21.04, maybe there is a difference there? or check out the Wireless forum. Also check if the A record is pointing to the right IP address. How should I start MongoDB on a NUMA machine? Log in to your Vultr account, open Products, and click on Deploy Server. Adding the UniFi Repository to Ubuntu 3. Install UniFi Video 3.8.5 on Ubuntu or Debian | Incredigeek Before you install it though, download and install mongodb community version 3.4.23. 4. So essentially I need this: https://ca.store.ui.com/collections/unifi-protect/products/unifi-protect-nvr, which includes NVR and Protect Controller. Step 1 - Install the Vultr VPS. libssl1.1.deb. Yet unifi fails to run without modifying the openjdk 11 installation. Cheers! document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); Disclaimer & Privacy Policy | About us | Contact, How to Setup ExpressVPN on the Raspberry Pi, Installing Mathematica on the Raspberry Pi, Raspberry Pi IRC Server: Setup your own Chat Network, Raspberry Pi Flightradar24: Track Nearby Aircraft, Installing EmulationStation on the Raspberry Pi. Instead of running steps from 7 to 10, you will instead need to do the following. Also had the same problem . The script we will be using will install the latest version. Install prerequisites sudo apt-get install mongodb mongodb-server openjdk-8-jre-headless jsvc Download UniFi Video installer Spice (1) flag Report The latest version Ive found of unifi-video was 3.10.11 3.10.13. Here are my firewall rules and iptable entries To Action From - 22/tcp ALLOW Anywhere 80/tcp ALLOW Anywhere 443/tcp ALLOW Anywhere 19999/tcp ALLOW Anywhere 8443/tcp ALLOW Anywhere 8123/tcp ALLOW Anywhere 1880/tcp ALLOW Anywhere OpenSSH ALLOW Anywhere 22/udp ALLOW Anywhere 53/tcp ALLOW Anywhere 53/udp ALLOW Anywhere 22 ALLOW Anywhere 8080 ALLOW Anywhere 8880 ALLOW Anywhere 8443 ALLOW Anywhere 80 ALLOW Anywhere 443 ALLOW Anywhere 3478/udp ALLOW Anywhere 10001/udp ALLOW Anywhere 6666/udp ALLOW Anywhere 47763/udp ALLOW Anywhere Anywhere ALLOW 192.168.15.0/24 8880/udp ALLOW Anywhere 8843/udp ALLOW Anywhere 6789/tcp ALLOW Anywhere 1900/udp ALLOW Anywhere 5514/udp ALLOW Anywhere 9080/tcp ALLOW Anywhere 22/tcp (v6) ALLOW Anywhere (v6) 80/tcp (v6) ALLOW Anywhere (v6) 443/tcp (v6) ALLOW Anywhere (v6) 19999/tcp (v6) ALLOW Anywhere (v6) 8443/tcp (v6) ALLOW Anywhere (v6) 8123/tcp (v6) ALLOW Anywhere (v6) 1880/tcp (v6) ALLOW Anywhere (v6) OpenSSH (v6) ALLOW Anywhere (v6) 22/udp (v6) ALLOW Anywhere (v6) 53/tcp (v6) ALLOW Anywhere (v6) 53/udp (v6) ALLOW Anywhere (v6) 22 (v6) ALLOW Anywhere (v6) 8080 (v6) ALLOW Anywhere (v6) 8880 (v6) ALLOW Anywhere (v6) 8443 (v6) ALLOW Anywhere (v6) 80 (v6) ALLOW Anywhere (v6) 443 (v6) ALLOW Anywhere (v6) 3478/udp (v6) ALLOW Anywhere (v6) 10001/udp (v6) ALLOW Anywhere (v6) 6666/udp (v6) ALLOW Anywhere (v6) 47763/udp (v6) ALLOW Anywhere (v6) 8880/udp (v6) ALLOW Anywhere (v6) 8843/udp (v6) ALLOW Anywhere (v6) 6789/tcp (v6) ALLOW Anywhere (v6) 1900/udp (v6) ALLOW Anywhere (v6) 5514/udp (v6) ALLOW Anywhere (v6) 9080/tcp (v6) ALLOW Anywhere (v6), # Generated by iptables-save v1.8.4 on Thu Dec 23 20:07:24 2021 *nat :PREROUTING ACCEPT [1295:112217] :INPUT ACCEPT [739:57570] :OUTPUT ACCEPT [126:8077] :POSTROUTING ACCEPT [75:4620] -A POSTROUTING -o enp1s0 -j MASQUERADE COMMIT # Completed on Thu Dec 23 20:07:24 2021 # Generated by iptables-save v1.8.4 on Thu Dec 23 20:07:24 2021 *filter :INPUT DROP [153:9095] :FORWARD DROP [1:344] :OUTPUT ACCEPT [4:168] :ufw-after-forward [0:0] :ufw-after-input [0:0] :ufw-after-logging-forward [0:0] :ufw-after-logging-input [0:0] :ufw-after-logging-output [0:0] :ufw-after-output [0:0] :ufw-before-forward [0:0] :ufw-before-input [0:0] :ufw-before-logging-forward [0:0] :ufw-before-logging-input [0:0] :ufw-before-logging-output [0:0] :ufw-before-output [0:0] :ufw-logging-allow [0:0] :ufw-logging-deny [0:0] :ufw-not-local [0:0] :ufw-reject-forward [0:0] :ufw-reject-input [0:0] :ufw-reject-output [0:0] :ufw-skip-to-policy-forward [0:0] :ufw-skip-to-policy-input [0:0] :ufw-skip-to-policy-output [0:0] :ufw-track-forward [0:0] :ufw-track-input [0:0] :ufw-track-output [0:0] :ufw-user-forward [0:0] :ufw-user-input [0:0] :ufw-user-limit [0:0] :ufw-user-limit-accept [0:0] :ufw-user-logging-forward [0:0] :ufw-user-logging-input [0:0] :ufw-user-logging-output [0:0] :ufw-user-output [0:0] -A INPUT -i lo -j ACCEPT -A INPUT -i enp2s0 -j ACCEPT -A INPUT -i enp1s0 -m conntrack ctstate RELATED,ESTABLISHED -j ACCEPT -A INPUT -j ufw-before-logging-input -A INPUT -j ufw-before-input -A INPUT -j ufw-after-input -A INPUT -j ufw-after-logging-input -A INPUT -j ufw-reject-input -A INPUT -j ufw-track-input -A FORWARD -i enp2s0 -o enp1s0 -j ACCEPT -A FORWARD -i enp1s0 -o enp2s0 -m conntrack ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -j ufw-before-logging-forward -A FORWARD -j ufw-before-forward -A FORWARD -j ufw-after-forward -A FORWARD -j ufw-after-logging-forward -A FORWARD -j ufw-reject-forward -A FORWARD -j ufw-track-forward -A OUTPUT -j ufw-before-logging-output -A OUTPUT -j ufw-before-output -A OUTPUT -j ufw-after-output -A OUTPUT -j ufw-after-logging-output -A OUTPUT -j ufw-reject-output -A OUTPUT -j ufw-track-output -A ufw-after-input -p udp -m udp dport 137 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp dport 138 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp dport 139 -j ufw-skip-to-policy-input -A ufw-after-input -p tcp -m tcp dport 445 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp dport 67 -j ufw-skip-to-policy-input -A ufw-after-input -p udp -m udp dport 68 -j ufw-skip-to-policy-input -A ufw-after-input -m addrtype dst-type BROADCAST -j ufw-skip-to-policy-input -A ufw-after-logging-forward -m limit limit 3/min limit-burst 10 -j LOG log-prefix [UFW BLOCK] -A ufw-after-logging-input -m limit limit 3/min limit-burst 10 -j LOG log-prefix [UFW BLOCK] -A ufw-before-forward -m conntrack ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-forward -p icmp -m icmp icmp-type 3 -j ACCEPT -A ufw-before-forward -p icmp -m icmp icmp-type 11 -j ACCEPT -A ufw-before-forward -p icmp -m icmp icmp-type 12 -j ACCEPT -A ufw-before-forward -p icmp -m icmp icmp-type 8 -j ACCEPT -A ufw-before-forward -j ufw-user-forward -A ufw-before-input -i lo -j ACCEPT -A ufw-before-input -m conntrack ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-input -m conntrack ctstate INVALID -j ufw-logging-deny -A ufw-before-input -m conntrack ctstate INVALID -j DROP -A ufw-before-input -p icmp -m icmp icmp-type 3 -j ACCEPT -A ufw-before-input -p icmp -m icmp icmp-type 11 -j ACCEPT -A ufw-before-input -p icmp -m icmp icmp-type 12 -j ACCEPT -A ufw-before-input -p icmp -m icmp icmp-type 8 -j ACCEPT -A ufw-before-input -p udp -m udp sport 67 dport 68 -j ACCEPT -A ufw-before-input -j ufw-not-local -A ufw-before-input -d 224.0.0.251/32 -p udp -m udp dport 5353 -j ACCEPT -A ufw-before-input -d 239.255.255.250/32 -p udp -m udp dport 1900 -j ACCEPT -A ufw-before-input -j ufw-user-input -A ufw-before-output -o lo -j ACCEPT -A ufw-before-output -m conntrack ctstate RELATED,ESTABLISHED -j ACCEPT -A ufw-before-output -j ufw-user-output -A ufw-logging-allow -m limit limit 3/min limit-burst 10 -j LOG log-prefix [UFW ALLOW] -A ufw-logging-deny -m conntrack ctstate INVALID -m limit limit 3/min limit-burst 10 -j RETURN -A ufw-logging-deny -m limit limit 3/min limit-burst 10 -j LOG log-prefix [UFW BLOCK] -A ufw-not-local -m addrtype dst-type LOCAL -j RETURN -A ufw-not-local -m addrtype dst-type MULTICAST -j RETURN -A ufw-not-local -m addrtype dst-type BROADCAST -j RETURN -A ufw-not-local -m limit limit 3/min limit-burst 10 -j ufw-logging-deny -A ufw-not-local -j DROP -A ufw-skip-to-policy-forward -j DROP -A ufw-skip-to-policy-input -j DROP -A ufw-skip-to-policy-output -j ACCEPT -A ufw-track-output -p tcp -m conntrack ctstate NEW -j ACCEPT -A ufw-track-output -p udp -m conntrack ctstate NEW -j ACCEPT -A ufw-user-input -p tcp -m tcp dport 19999 -j ACCEPT -A ufw-user-limit -m limit limit 3/min -j LOG log-prefix [UFW LIMIT BLOCK] -A ufw-user-limit -j REJECT reject-with icmp-port-unreachable -A ufw-user-limit-accept -j ACCEPT COMMIT # Completed on Thu Dec 23 20:07:24 2021.
Zack Courts Wife,
Statistics On Technology Use In Schools Australia 2020,
100326429907810847e507c565dcd6e Daytona Grande Oceanfront Restaurant Menu,
Shuli Natan Jerusalem Of Gold,
Articles I