Using UniFi for High-Security Facilities—design patterns, runbooks, and guardrails
Build a defensible, highly available physical security stack with UniFi Access, Protect, Identity, and Network—layered controls, strong MFA, anti-tailgating mantraps, remote operations, and cloud archival.
Goal
Show how to build a defensible, highly available physical security stack on the UniFi ecosystem for high-security sites (data halls, NOCs, cages, loading docks, gates). The design emphasizes layered controls (video + access + intercom + identity), strong MFA, anti-tailgating mantraps, remote operations, and cloud archival—without naming specific SKUs beyond UniFi families (Access, Protect, Identity, Network).
1) Threat model & success criteria
Threats we care about
- Badge cloning and social engineering at exterior doors.
- Tailgating into sensitive areas (data floor, NOC).
- Perimeter breach via gates/roll-ups.
- Insider misuse (over-entitled access, after-hours).
- Evidence loss (tampering with local NVRs).
- Single points of failure in WAN, controllers, or switching.
What “good” looks like
- MFA at the edge: biometric + mobile credential at exterior and key rooms.
- Anti-tailgate mantraps guarding high-value spaces with hard interlocks.
- Gate/intercom with distance-friendly cabling and live operator takeover.
- AI video analytics with alerts and clips for people/vehicle events.
- Carded roll-ups and dock interlocks with full audit.
- HA network core: dual WAN, dual gateways, dual cores, diverse power.
- Cloud assist: remote monitoring and cloud archival for key cameras.
- Least-privilege identity: groups, time/zone policies, requests with approval.
2) Reference architecture (site level)
ASCII overview
[Carrier A] [Carrier B] | | [WAN Switch A] [WAN Switch B] (diverse entries) | \ / | | \ / | [Gateway A] [Gateway B] (active/standby, config-synced) | \ / | | \ / | [Core A]=== [Core B] (10G trunks, dual PDUs) || || Access/Rdr Access/Rdr (exterior doors: biometric + mobile) Mantrap A Mantrap B (interlocked hubs + anti-tailgate sensor) Dock Ctrl Gate + Intercom (long-run ethernet/fiber) Cameras (Protect) -> NVR (on-prem) + Cloud Archive (critical)
3) Doors & credentials (policy and hardware roles)
Credential strategy
- Mobile credentials only (NFC/BLE secure formats). No legacy prox cards.
- Biometric factors enabled on exterior doors and key rooms (data hall, NOC, MMR).
- PIN fallback only for break-glass; must alarm and require supervisor approval.
Door classes
- Exterior doors: biometric + mobile, 2-factor, anti-passback, schedule-aware. Door-facing and overview cameras; after-hours AI alerts.
- High-security doors (data hall, NOC, MMR): Mantrap with interlock; inner stays locked until occupancy verified; anti-tailgate sensor. Cameras on both angles; cloud archival.
- Office/general: mobile-only where suitable; schedules; camera optional with corridor coverage.
- Roll-up/dock doors: badge to arm open; interlocked with pedestrian door; vehicle loop feedback to Access hub; cameras outside/inside.
- Exceptions via Identity “Requests”: temporary access with approval chain; auto-expire and audit logged.
4) Perimeter, gates, and intercoms
- Gate station: video intercom calls to operators; relay wired through an Access hub for unified logging and policy.
- Long runs: long-range Ethernet adapters or fiber from the core for remote gates/turnstiles.
- Visitor workflow: intercom → operator verification → issue time-boxed mobile/QR credential → open gate.
- After hours: intercom routes to 24×7 security; no standalone code boxes.
5) Video & AI analytics
- Exterior detections: person/vehicle (animal where supported or via external analytics + webhooks). Tune rules for fence line, loitering, and no-parking alerts.
- Retention: standard on-prem for general cameras; Cloud Archive for critical viewpoints (entries, mantraps, gates) to protect evidence.
- Privacy: mask neighbor properties and public roads where required; publish retention/access policy.
6) High availability & network hardening
- Dual WAN via diverse demarcs; fan-out switches deliver each provider to both gateways.
- Two gateways (A/B): warm standby with prewired WAN/LAN and a promote-standby runbook.
- Two core switches (A/B), separate rooms and PDUs; spread devices evenly for PoE resiliency.
- VRFs/VLANs: ACCESS, CCTV, NET-MGMT, GUEST, OT; pinholes only via explicit firewall rules.
- OOB/LTE path for break-glass to controllers and hubs; dual NTP; time drift < 1 s.
- Logging: syslog/telemetry exported to dual collectors; mirror door events to SIEM.
- Firewall posture summary: WAN-in deny-all except admin VPN/cloud endpoints; ACCESS/CCTV egress deny by default (allow time/updates); GUEST fully isolated.
7) Mantrap & anti-tailgate logic (implementation notes)
Signals/inputs: outer/inner door contacts, REX sensors, anti-tailgate sensor (overhead or stereo camera), occupancy counter.
- If outer opens → inner forced locked (hardware interlock), timer starts.
- If anti-tailgate triggers or multiple bodies counted → Alarm state: inner stays locked; alert operator; manual reset after visual verification.
- If buffer clear and exactly one person verified → inner may unlock on valid credential. Any door-forced or propped beyond threshold → Alarm and operator review.
- Commission with staged scenarios (single entry, tailgate attempt, badge-and-prop, REX misuse).
8) Identity, Requests & lifecycle
- Directory sync from HRIS/IdP; groups map to areas (Exterior, Office, Data-Hall, NOC, Dock).
- Mobile credential provisioning at onboarding; rotate crypto keys on a schedule.
- Use Identity “Requests” for temporary access; approvers see purpose/time; auto-expire and auto-log.
- Visitors/contractors: pre-register; time-boxed mobile or QR; escort policy for sensitive areas.
- Quarterly automated recertification of entitlements by area owner.
9) Monitoring, alerting, and playbooks
Dashboards
- Door status (forced/propped/offline), mantrap state, intercom calls, failed biometrics, after-hours.
- Camera health (frame rate, storage), Cloud Archive state.
- Gate telemetry (open/close counts, obstruction faults).
Alerts
- P0: mantrap Alarm (inner inhibited) → operator must verify video and reset.
- P1: exterior forced/propped beyond threshold; repeated biometric failures.
- P2: critical door camera offline; NVR storage degraded; WAN A down.
- P3: cloud archival backlog; time drift > 1 s.
Runbooks
- Mantrap Alarm: verify video angles, clear occupancy, reset interlock, document reason.
- Lost device: revoke mobile credential, flag account, check last entries.
- Camera/NVR loss: fail to cloud clips for critical views; dispatch if tamper suspected.
- Gateway promote: follow promote-standby steps; confirm door/video unaffected.
10) Commissioning & acceptance (don’t skip)
- Doors: direction, strike/mag function, REX, contact polarity verified.
- Readers: biometric enrollment quality; mobile credential latency; offline behavior.
- Intercom: audio/video clarity; relay actuation; logging of open events.
- Cameras: face capture FoV, IR at night, privacy masks, tuned AI rules (day/night).
- Network: dual-WAN cutover; gateway promote test; core A/B failure impact (no total loss).
- Evidence: export as-built, door schedules, entitlement matrix, golden test clips.
11) Privacy, safety, and compliance considerations
- Publish policy on video access/reasons/retention; notify on biometrics and mobile credential use.
- Retention: separate general vs critical cameras; enable Cloud Archive for the latter.
- Accessibility: ADA-compliant entry modes; avoid “dead-man” conditions in mantraps; emergency egress wins.
- Life safety: fire panel integration must override interlocks as required and be logged.
12) Common pitfalls (and fixes)
- Keeping legacy prox cards → retire; mobile + biometric only at sensitive doors.
- Single reader on mantrap → both sides require MFA with interlock.
- No operator reset for tailgate → enforce human verification before re-arming.
- Intercom on separate island → integrate via Access hub for unified audit.
- No cloud archival for critical angles → enable at entries/mantraps/gates.
- One core switch, one PDU → always dual-home across A/B cores and PDUs.
13) Example policy snippets (copy/paste)
Exterior door policy
Factors: Biometric + Mobile (both) Schedule: Employees 24x7; Contractors business hours only Anti-passback: Enabled Alerts: 3 failed biometrics in 5 min -> P1 to security + clip
Mantrap policy
Outer open -> inner hard-lock Alarm on >1 detected body (anti-tailgate) Manual operator reset required Attach entry clip to every mantrap access log
Dock / roll-up
Require badge to arm open Interlock: interior pedestrian door locked while roll-up open Alarm on forced open; log vehicle loop and door contact state
14) GridSite tie-in
Deploy with your team—or use the GridSite ecosystem to accelerate and de-risk selection, commissioning, and day-2 ops: reader mix, mantrap hardware/logic, intercom/gate wiring over distance, dual-WAN/gateway failover, AI rule tuning, cloud archival, quarterly access recertifications, and evidence packs for audits.
For help, contact us to discuss templates, commissioning drills, and co-managed ops.