Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Sonos speakers and applications on different subnets (VLAN's)

    Scheduled Pinned Locked Moved General pfSense Questions
    250 Posts 55 Posters 157.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      Stan
      last edited by

      jimp,

      I just wanted to thanks for your efforts with PIMD. I'm able to use the Sonos app on a secure network with the speakers on a VLAN, after several years of trying on Unifi and Untangle. I'm a recent convert to pfSense, but spent a few days trying to make this work. The key action for me was to reboot pfSense after I set up PIMD.

      I had created extensive Sonos UDP and TCP pass rules following advice on multiple threads. I had enabled Avahi, all to no avail. When I rebooted, things worked. I've disabled Avahi and disabled the firewall UDP and TCP pass rules I have on the Sonos network. I seem to be relying only on PIMD.

      My settings are all default, other than bind to none on the General tab and enabling desired interfaces on the Interfaces Tab. Multiple groups are listed on the Status tab.

      I wish I had rebooted several days ago.

      blasterspikeB 1 Reply Last reply Reply Quote 1
      • blasterspikeB
        blasterspike @Stan
        last edited by

        Hi @stan,
        Thanks for reporting your experience with this.
        I have to replicate what you have done:

        From PIMD:
        General - Default bind: Bind to None
        Interfaces: I have added the 2 interfaces that should talk to each other. In my case LAN, where I have my trusted devices that can access all the other networks, and IOT, where I keep untrusted ones and their access it limite to internet only. For each one I have only selected Interface Binding = Always bind.
        Then you haven't added anything else in "BSR Candidates", "RP Candidates" or "RP Addresses".
        I haven't created any firewall rule as you have suggested.

        Unfortunately this setup is not working for me.
        I initially setup the Sonos devices by connecting to the same WiFi network of IOT but now when I open the Sonos App on my iOS device, I see all grayed out and after few seconds it tells me that there is a problem connecting to the devices.

        I suspect that you have a different configuration somewhere than mine. Any suggestions?

        1 Reply Last reply Reply Quote 0
        • S
          Stan
          last edited by

          Blasterspike, the setup described above worked for awhile, then didn't. I've re-configured to rely only on the firewall rules. I'm not relying on PIMD anymore; in fact, I've removed it from my system. I still do have Avahi running, but that's just to enable guests to access the Sonos speakers with their own Apple Music and Spotify applications.
          I've created two port aliases, Sonos_TCP_Ports and Sonos_UDP_Ports. The firewall rules permit traffic from the subnet with Sonos speakers to the subnets from which I want access the speakers using those ports. I also have a rule on each of the subnets from which I want to access to the speakers to the subnet with the speakers using those ports. These rules also "Allow IP options" (Advanced Options in the rule).
          My port aliases are probably overkill, since I added whatever I found in various comments, but haven't gone to the trouble to try to whittle down the ports to see when it stops working.
          TCP ports: 80, 443, 445, 3400:3401, 3445, 3500, 4070, 4444, 1400, 1443, 7000, 8080, 5000:5001
          UDP ports: 136:139, 1900:1901, 2869, 10243, 10280:10284, 5353, 6969, 3722, 319:320, 32000:60000
          If you do this and it works and if you successfully whittle down the ports, I'd be interested to know what your reduced ports are.
          Screenshot 2021-04-29 145031.png
          Screenshot 2021-04-29 145141.png

          Cloudless Smart HomeC 1 Reply Last reply Reply Quote 1
          • P
            pajinha
            last edited by

            This thread is amazing and helped me get Sonos working with my VLAN's and in the process I learned a bunch of stuff.

            For anyone still struggling with this I will give a warning of something that I am not sure anyone has referenced in the hundreds of replies.

            Make sure that the interface where the VLAN'S is also added to the "enabled" interfaces. So lets say your VLAN is igb1.70, then you must also include igb1 otherwise it won't work.

            Hope that helps.

            Cloudless Smart HomeC 1 Reply Last reply Reply Quote 1
            • T
              trumee @dennypage
              last edited by

              @dennypage I had to use pimd to get HEOS app working on Android. Without PIMD, the app used to hang when I used Music>AV Inputs. The input used to change, but the app used to give an error. This webpage says that multicast traffic is used for HEOS.

              dennypageD 1 Reply Last reply Reply Quote 0
              • dennypageD
                dennypage @trumee
                last edited by

                @trumee That webpage describes UPnP support, which is not required for local network HEOS use. UPnP is generally required for opening ports to allow use/control from outside the local network (WAN).

                Avahi provides mDNS device discovery across local segments, which is all that is necessary for HEOS discovery. It's all point to point after discovery. Unfortunately, I can't speak to why you had an issue in your specific case.

                1 Reply Last reply Reply Quote 0
                • Cloudless Smart HomeC
                  Cloudless Smart Home @Stan
                  last edited by

                  This post is deleted!
                  1 Reply Last reply Reply Quote 0
                  • Cloudless Smart HomeC
                    Cloudless Smart Home @pajinha
                    last edited by

                    @pajinha I don't understand your statement. all my interfaces and vlans are enabled. is that what you mean?

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      He is saying you must also enable the VLAN parent interface in PIMD. I have no way of testing that though.

                      Steve

                      Cloudless Smart HomeC 1 Reply Last reply Reply Quote 0
                      • Cloudless Smart HomeC
                        Cloudless Smart Home @stephenw10
                        last edited by

                        @stephenw10 ok, now that makes sense.

                        1 Reply Last reply Reply Quote 0
                        • S
                          somerino
                          last edited by

                          I've read almost the whole thread and now I'm unsure, if the effort is worth it.
                          Of course I like the idea of separating the clients from iot devices.

                          But from a security POV, is it necessary to do that?
                          Is enabling broadcasting and multicasting over VLANS safer, than just putting Sonos and Clients in the same network with the right rules?

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            It is safer. Is it necessary? Only you can decide that really.

                            It's not designed to work across subnets. I would guess the vast majority of Sonos users have one subnet with servers and clients on it and don't see issues.

                            The question is if some firmware update suddenly added all your smart speakers to a bot net what other things on your network would that expose? And what sort of risk is that?

                            Steve

                            S 1 Reply Last reply Reply Quote 1
                            • S
                              somerino @stephenw10
                              last edited by somerino

                              @stephenw10
                              Thanks Stephe for the reply.

                              I'm a little bit overwhelmed by the thread itself. I don't know which solution works. Whether it's PIMPD, Avahi or the UDP relay.
                              I think the relay looks promising, but isn't in the package manager yet: https://redmine.pfsense.org/issues/10818 Will this be a thing?

                              @stephenw10 said in Sonos speakers and applications on different subnets (VLAN's):

                              Only you can decide that really

                              For myself, I'd be thrilled to work this out somehow. But sadly my company network has way bigger security holes to close :( I'll comeback to this thread, when I've time!

                              EDIT: I tried it with IGMP-Proxy, doesn't work 🍕

                              1 Reply Last reply Reply Quote 0
                              • QinnQ
                                Qinn
                                last edited by

                                I can only speak for myself and I don't like IoT's that are closed source, be it cam's, Sonos, smart power plugs etc. I have no idea what so ever what they (can) do and how well there operating system is maintained. As an example I have video door cam that has a telnet service running, no idea why this should be and why telnet is chosen and not SSH.

                                It's like your home, some use a burglar alarm system others only have lock, so each to his own ;)

                                Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                                Firmware: Latest-stable-pfSense CE (amd64)
                                Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                                S 1 Reply Last reply Reply Quote 2
                                • S
                                  somerino @Qinn
                                  last edited by

                                  @qinn

                                  I totaly agree. To be honest, I wish I could trust some companies to do their homework. I can't and don't want to control everything by myself.

                                  1 Reply Last reply Reply Quote 0
                                  • QinnQ
                                    Qinn
                                    last edited by Qinn

                                    That's why I like and use pfSense, I want to control the rulez, so what do you (dis)allow to go where. That's why by default every subnet (apart from the LAN) created can go nowhere.

                                    Although a cheap router/fw (albeit from you supermarket) has good ingress block, you have almost no control over the traffic. In pfSense I decide what goes where.

                                    Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                                    Firmware: Latest-stable-pfSense CE (amd64)
                                    Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      Stan
                                      last edited by

                                      @wellcomefit
                                      For what it's worth, I've given up. I've solved the problem three times. Each time it worked for a few months, then stopped working with that solution. I didn't want to devote more time and effort.
                                      I have a Sonos subnet. I've moved my smartphones to that and created rules for their access to other nets where needed. Not much is needed. Access to a NAS from smartphones for storage of pictures and access from the Sonos speakers to the NAS (limited to TCP port 445) for the music library. I use a firewall on the NAS and ACL on the NAS to control what the smartphones can get to.
                                      It's also easy to switch the smartphones to my main data network when I want to get to other things. But I haven't had that need. This is a home environment, not a business environment, so your situation may be more complicated.

                                      S 1 Reply Last reply Reply Quote 0
                                      • S
                                        somerino @Stan
                                        last edited by

                                        @stan

                                        Thank you Stan for the feedback.
                                        I decided for myself that, it's not worth the effort right now. UDP_Relay sounds really promising and if this ever comes officially to Pfsense. I'm willing to give it a try :) Until then, I'll go with your solution and just create a separate VLAN for it and not connect the client and sonos network.

                                        1 Reply Last reply Reply Quote 0
                                        • P
                                          packetperson99
                                          last edited by packetperson99

                                          just chiming in to thank @Qinn here for pushing this all forward, across a few different threads qinn was involved in, I was able to get this up and running in a few hours. I needed pimd, avahi, (both just from the package manager) and four firewall rules (in attached pics), setting an RP address in pimd was also required.
                                          LAN interface Rules
                                          6a41ec90-a500-4ae9-827b-273862b429ca-image.png

                                          78184b26-f614-496f-8b90-1f53da3576bb-image.png
                                          NOTRUST interface rules (where sonos lives)
                                          afe4eb4b-272f-4d83-a6ae-460d801281ca-image.png
                                          I might end up moving my sonos system to a sort of intermediary network, originally I put it on the same net as the rest of my iot stuff, but having to grant more trust to the sonos system than the rest of my iot systems.
                                          maybe this helps someone, but really just meaning to say thanks for the forums here! pfsense is pretty cool 😎

                                          QinnQ 1 Reply Last reply Reply Quote 4
                                          • QinnQ
                                            Qinn @packetperson99
                                            last edited by Qinn

                                            @packetperson99 Thanks ;) maybe also share your GUI PIMD settings?

                                            Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                                            Firmware: Latest-stable-pfSense CE (amd64)
                                            Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.