Ubiquiti Networks


The System tab contains administrative options. This page
enables the administrator to reboot the device, set it
back to factory defaults, upload new firmware, backup or
update the configuration and configure the administrator
Device Name (Host name) is the system wide device
identifier. It is reported by the SNMP Agent to authorized
management stations. Device Name will be represented
in popular Router Operating Systems registration screens
and discovery tools.
Device Name
Specifies the system identity.
Interface Language
Allows you to select the language
displayed in the management interface. English is the
default language.
Additional language profiles may be uploaded.
Refer to our wiki page at the following URL:
Ubiquiti Networks, Inc.
Date Settings
Specifies the timezone according to GMT
(Greenwich Mean Time).
Enable Startup Date
When enabled, you are able to
modify the device’s startup date.

Startup Date
Specifies the device’s startup date. You
can select a date by clicking the Calendar icon or typinh
it in manually. Type the date in the following format:
2 digit month/2 digit day/4 digit year. An example would
be for May 20th, 2010 your would type 05/20/2010
System Accounts
In this section you can modify the administrator password
to protect your device from unauthorized configuration.
The default administrator’s password should be changed
on the very first system setup:
Administrator Username
system user.
Key button
Press this button in order to change the
administrator password.

Current Password
Enter the current password
associated with the administrator account. It is required
to change the Password or Administrator Username.

New Password
Enter the new password for the
administrator account.

Verify New Password
Re-enter the new password for
the administrator account.
Password length is 8 characters maximum,
passwords exceeding 8 characters will be
Enable Read-Only Account
account and configure the username and password to
protect your device from unauthorized access. The default
option is disabled.

Read-Only Username

Key button
Press this button in order to change the
Read-only password.

New Password
New password used for read-only
administrator authentication should be specified.

Check this to display the read-only password
characters you have typed.
Click to save changes to any of the fields on the
System tab.
Chapter 3: AirOS
Specifies the name of the
Click to enable the read-only
Specifies the name of the system


Ubiquiti sells wired and wireless networking products under multiple brand names. The company also sells grid-tied solar kits.

Ubiquiti’s first product line was its «Super Range» mini-PCI radio card series, which was followed by other wireless products.

The company’s Xtreme Range (XR) cards operated on non-standard IEEE 802.11 bands, which reduced the impact of congestion in the 2.4 GHz and 5.8 GHz bands.[citation needed] In August 2007 a group of Italian amateur radio operators set a distance world record for point-to-point links in the 5.8 GHz spectrum. Using two XR5 cards and a pair of 35 dBi dish antennas, the Italian team was able to establish a 304 km (about 188 mi) link at data rates between 4 and 5 Mbit/s.

The company (under its «Ubiquiti Labs» brand) also manufactures a home-oriented wireless mesh network router and access point combination as a consumer-level product, called AmpliFi.

Security issues

U-Boot configuration extraction

In 2013, it was discovered that there was a security issue in the version of the U-Boot shipped on Ubiquiti’s devices. It was possible to extract the plaintext configuration from the device without leaving a trace using Trivial File Transfer Protocol (TFTP) and an Ethernet cable, revealing information such as passwords.

While this issue is fixed in current versions of Ubiquiti hardware, despite many requests and acknowledging that they are using this GPL-protected application, Ubiquiti refused to provide the source code for the GNU General Public License (GPL)-licensed U-Boot. This made it impractical for Ubiquiti’s customers to fix the issue. The GPL-licensed code was released eventually.

Uparte Trojan

It was reported by online reporter Brian Krebs, on June 15, 2015, that «Recently, researchers at the Fujitsu Security Operations Center in Warrington, UK began tracking Upatre being served from hundreds of compromised home routers — particularly routers powered by MikroTik and Ubiquiti’s AirOS». Bryan Campbell of the Fujitsu Security Operations Center in Warrington, UK reported, «We have seen literally hundreds of wireless access points, and routers connected in relation to this botnet, usually AirOS», said Bryan Campbell, lead threat intelligence analyst at Fujitsu. «The consistency in which the botnet is communicating with compromised routers in relation to both distribution and communication leads us to believe known vulnerabilities are being exploited in the firmware which allows this to occur».

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *