Articles on: Router Configuration

Setting Up UniFi Devices for Spotipo Integration (NEW UI)

This guide explains how to set up your UniFi device with Spotipo, including configuring local admin access (for UniFi OS devices only), enabling remote access, and setting up firewall rules (for UniFi gateways only).

While this guide details firewall setup for UniFi devices, the specified IP addresses should also be allowed through any other firewalls in your network.

This guide is written to reflect Spotipo's new User interface. If you're still using the old user interface, check our documentation here.

1. Creating a Local Admin (UniFi OS Devices Only)



If you have a UniFi OS device (UDM, UDM-Pro, Cloud Key Gen2+), you can create a local admin account to use with Spotipo.

Follow this guide to create a local user.

NOTE: This step does not apply to standalone UniFi controllers (Linux, Windows, Docker), as they require a cloud-linked UI.com account.

2. Enable Remote Access (UniFi OS Devices Only)



For UniFi OS devices, enable remote access to allow Spotipo to connect:

Go to Console Settings in the UniFi UI.

Enable Remote Access.



3. Configuring Firewall Rules (UniFi Gateways Only)



🔹 Applies to: UDM, UDM-Pro, UXG-Pro, and similar UniFi Security Gateways.

Spotipo requires access to your UniFi gateway to authorize guests and collect stats. To allow this, configure firewall rules:

**3.1. If Your UDM Is Behind Another Router**



Set up port forwarding on your ISP router for port 443 to your UDM's WAN IP.

If you don’t have a static public IP, enable DDNS.

Guides: Port Forwarding | DDNS

**3.2. Allow Spotipo Servers Through Your Firewall**



The following IP addresses must be allowed through all firewalls on your network to ensure Spotipo can connect properly. This guide details firewall setup for UniFi devices only, but the same rules apply to any other firewall in use.
Under Firewall Rules, press Create New Rule

**For UniFi Gateways (UDM, UXG, etc.)**



Go to Settings > Firewall and Security.

Under Firewall Rules, click Create New Rule.

Configure the rule:

Type: Internet Local

Description: spotipo_allow

Action: Accept

IPv4 Protocol: All

Destination IP & Port Group: Any

Create a New Port/IP Group:

Name: Spotipo_servers

Add these IPs:

107.178.247.148  
35.244.104.229  
35.236.87.84  
104.155.46.61



Finally save the Firewall rule and you should see something like below in your Firewall Rules

🔹 Using UniFi's Zone-Based Firewall? Follow this guide

4. Configuring UniFi Controller in Spotipo



Navigate to Settings -> UniFi Settings


Click on the settings icon to configure the controller.


**4.1. Select the Right Setup Type**



If your controller is self-hosted (Linux, Windows, Docker, etc.): Select "Set installed software".

If your controller is a UniFi OS device (UDM, Cloud Key, UX, etc.): Select "UniFi OS".


**4.2. Connection Type**



If you have a public IP: Select Direct Connection.

If you don’t have a public IP: Use Reverse Proxy and follow this guide.


**4.3. Enter Controller Details**



Controller IP/Hostname:

Self-hosted (Linux, Windows, Docker): Use port 8443 (if public IP) or 443 (if using a reverse tunnel).

UniFi OS devices: Use port 443.



Enter your admin credentials (local account for UniFi OS, UI.com for standalone controllers).

Click Next.



**4.4. Configure SSID for Hotspot**



Select the SSID where you want to enable the hotspot.

Spotipo will automatically configure the Guest Policy.



Verify that the controller is connected by returning to the Unifi controller tab, and the status shows "Online."

Updated on: 28/03/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!