Setting Up UniFi Devices for Spotipo Integration (NEW UI)
This guide explains how to set up your UniFi device with Spotipo, including configuring local admin access (for UniFi OS devices only), enabling remote access, and setting up firewall rules (for UniFi gateways only).
While this guide details firewall setup for UniFi devices, the specified IP addresses should also be allowed through any other firewalls in your network.
This guide is written to reflect Spotipo's new User interface. If you're still using the old user interface, check our documentation here.
If you have a UniFi OS device (UDM, UDM-Pro, Cloud Key Gen2+), you can create a local admin account to use with Spotipo.
Follow this guide to create a local user.
NOTE: This step does not apply to standalone UniFi controllers (Linux, Windows, Docker), as they require a cloud-linked UI.com account.
For UniFi OS devices, enable remote access to allow Spotipo to connect:
Go to Console Settings in the UniFi UI.
Enable Remote Access.

🔹 Applies to: UDM, UDM-Pro, UXG-Pro, and similar UniFi Security Gateways.
Spotipo requires access to your UniFi gateway to authorize guests and collect stats. To allow this, configure firewall rules:
Set up port forwarding on your ISP router for port 443 to your UDM's WAN IP.
If you don’t have a static public IP, enable DDNS.
Guides: Port Forwarding | DDNS
The following IP addresses must be allowed through all firewalls on your network to ensure Spotipo can connect properly. This guide details firewall setup for UniFi devices only, but the same rules apply to any other firewall in use.
Under Firewall Rules, press Create New Rule
Go to Settings > Firewall and Security.
Under Firewall Rules, click Create New Rule.
Configure the rule:
Type: Internet Local
Description: spotipo_allow
Action: Accept
IPv4 Protocol: All
Destination IP & Port Group: Any
Create a New Port/IP Group:
Name: Spotipo_servers
Add these IPs:

Finally save the Firewall rule and you should see something like below in your Firewall Rules
🔹 Using UniFi's Zone-Based Firewall? Follow this guide
Navigate to Settings -> UniFi Settings

Click on the settings icon to configure the controller.

If your controller is self-hosted (Linux, Windows, Docker, etc.): Select "Set installed software".
If your controller is a UniFi OS device (UDM, Cloud Key, UX, etc.): Select "UniFi OS".

If you have a public IP: Select Direct Connection.
If you don’t have a public IP: Use Reverse Proxy and follow this guide.

Controller IP/Hostname:
Self-hosted (Linux, Windows, Docker): Use port 8443 (if public IP) or 443 (if using a reverse tunnel).
UniFi OS devices: Use port 443.

Enter your admin credentials (local account for UniFi OS, UI.com for standalone controllers).
Click Next.

Select the SSID where you want to enable the hotspot.
Spotipo will automatically configure the Guest Policy.

Verify that the controller is connected by returning to the Unifi controller tab, and the status shows "Online."

While this guide details firewall setup for UniFi devices, the specified IP addresses should also be allowed through any other firewalls in your network.
This guide is written to reflect Spotipo's new User interface. If you're still using the old user interface, check our documentation here.
1. Creating a Local Admin (UniFi OS Devices Only)
If you have a UniFi OS device (UDM, UDM-Pro, Cloud Key Gen2+), you can create a local admin account to use with Spotipo.
Follow this guide to create a local user.
NOTE: This step does not apply to standalone UniFi controllers (Linux, Windows, Docker), as they require a cloud-linked UI.com account.
2. Enable Remote Access (UniFi OS Devices Only)
For UniFi OS devices, enable remote access to allow Spotipo to connect:
Go to Console Settings in the UniFi UI.
Enable Remote Access.

3. Configuring Firewall Rules (UniFi Gateways Only)
🔹 Applies to: UDM, UDM-Pro, UXG-Pro, and similar UniFi Security Gateways.
Spotipo requires access to your UniFi gateway to authorize guests and collect stats. To allow this, configure firewall rules:
**3.1. If Your UDM Is Behind Another Router**
Set up port forwarding on your ISP router for port 443 to your UDM's WAN IP.
If you don’t have a static public IP, enable DDNS.
Guides: Port Forwarding | DDNS
**3.2. Allow Spotipo Servers Through Your Firewall**
The following IP addresses must be allowed through all firewalls on your network to ensure Spotipo can connect properly. This guide details firewall setup for UniFi devices only, but the same rules apply to any other firewall in use.
Under Firewall Rules, press Create New Rule
**For UniFi Gateways (UDM, UXG, etc.)**
Go to Settings > Firewall and Security.
Under Firewall Rules, click Create New Rule.
Configure the rule:
Type: Internet Local
Description: spotipo_allow
Action: Accept
IPv4 Protocol: All
Destination IP & Port Group: Any
Create a New Port/IP Group:
Name: Spotipo_servers
Add these IPs:
107.178.247.148
35.244.104.229
35.236.87.84
104.155.46.61

Finally save the Firewall rule and you should see something like below in your Firewall Rules

4. Configuring UniFi Controller in Spotipo
Navigate to Settings -> UniFi Settings

Click on the settings icon to configure the controller.

**4.1. Select the Right Setup Type**
If your controller is self-hosted (Linux, Windows, Docker, etc.): Select "Set installed software".
If your controller is a UniFi OS device (UDM, Cloud Key, UX, etc.): Select "UniFi OS".

**4.2. Connection Type**
If you have a public IP: Select Direct Connection.
If you don’t have a public IP: Use Reverse Proxy and follow this guide.

**4.3. Enter Controller Details**
Controller IP/Hostname:
Self-hosted (Linux, Windows, Docker): Use port 8443 (if public IP) or 443 (if using a reverse tunnel).
UniFi OS devices: Use port 443.

Enter your admin credentials (local account for UniFi OS, UI.com for standalone controllers).
Click Next.

**4.4. Configure SSID for Hotspot**
Select the SSID where you want to enable the hotspot.
Spotipo will automatically configure the Guest Policy.

Verify that the controller is connected by returning to the Unifi controller tab, and the status shows "Online."

Updated on: 28/03/2025
Thank you!