← Back to Videos
Networking

Configure the Ubiquiti Dream Machine Pro in 10 minutes!

Basic configuration of the UDM Pro. Set up VLANs, wifi networks, and basic security in only 10 minutes.

Networking 9:24 1.2K views

About this video

With the UDM Pro connected, the next step is configuring the network the right way for a smart home. The default single-VLAN setup puts every device — your laptop, your IoT sensors, your cameras, and any guest — on the same network, where they can all talk to each other. This video walks through fixing that: adopting a Ubiquiti access point, changing the default IP range, creating separate VLANs for different device types, building wireless networks tied to specific VLANs, and enabling isolation on a guest network. By the end, you have a properly segmented network with real access policies.

Key takeaways

  • The default single-VLAN setup gives every device access to every other device, including your router. Segment this as soon as possible.
  • Change the default network from 192.168.x.x to the 10.x.x.x range to avoid IP conflicts with factory-default device addresses.
  • Match your VLAN ID to your third octet (VLAN 2 = 10.20.2.0/24). A simple convention that makes your network far easier to manage.
  • Guest network isolation prevents guests from reaching internal devices or other VLANs. Enable it and disable multicast DNS on any network you don't control.
  • Segmenting IoT devices to their own VLAN limits the blast radius if a device is compromised and reduces broadcast traffic on your primary network.

Video walkthrough

  1. Adopt your first access point — Plug in the AP (using the PoE injector if your UDM Pro doesn't have PoE on LAN ports), navigate to UniFi Devices, click Adopt, and wait for it to complete. New wireless configuration sections appear in the UI once adoption finishes.
  2. Understand the default network problem — Out of the box, everything lands on a single 192.168.0.0/24 VLAN. Your laptop, IoT sensors, cameras, and any guest device are on the same subnet and can all reach each other — and your router. That's a security and reliability problem.
  3. Change the default network IP range — Edit the default VLAN, change the host address to something in the 10.x.x.x private range (e.g. 10.20.0.1/24). This avoids IP conflicts with factory-default device addresses. After applying, reconnect your laptop to get a new address.
  4. Create additional VLANs — IoT VLAN: 10.20.2.1/24, VLAN ID 2. Guest VLAN: 10.20.3.1/24, VLAN ID 3. Match the third octet to the VLAN ID — it makes management significantly easier as your network grows.
  5. Configure wireless networks per VLAN — Create an IoT SSID assigned to the IoT VLAN. Create a Guest SSID assigned to the Guest VLAN. On the guest network, enable Network Isolation and disable multicast DNS — this prevents guests from discovering or reaching your internal devices.
  6. Verify firewall policies — After enabling guest isolation, confirm the auto-generated firewall rules block VLAN 3 from reaching other VLANs. The UDM Pro creates these automatically — verify they look correct in the Policies view.