Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Sonos speakers and applications on different subnets (VLAN's)

    Scheduled Pinned Locked Moved General pfSense Questions
    250 Posts 55 Posters 157.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      He is saying you must also enable the VLAN parent interface in PIMD. I have no way of testing that though.

      Steve

      Cloudless Smart HomeC 1 Reply Last reply Reply Quote 0
      • Cloudless Smart HomeC
        Cloudless Smart Home @stephenw10
        last edited by

        @stephenw10 ok, now that makes sense.

        1 Reply Last reply Reply Quote 0
        • S
          somerino
          last edited by

          I've read almost the whole thread and now I'm unsure, if the effort is worth it.
          Of course I like the idea of separating the clients from iot devices.

          But from a security POV, is it necessary to do that?
          Is enabling broadcasting and multicasting over VLANS safer, than just putting Sonos and Clients in the same network with the right rules?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            It is safer. Is it necessary? Only you can decide that really.

            It's not designed to work across subnets. I would guess the vast majority of Sonos users have one subnet with servers and clients on it and don't see issues.

            The question is if some firmware update suddenly added all your smart speakers to a bot net what other things on your network would that expose? And what sort of risk is that?

            Steve

            S 1 Reply Last reply Reply Quote 1
            • S
              somerino @stephenw10
              last edited by somerino

              @stephenw10
              Thanks Stephe for the reply.

              I'm a little bit overwhelmed by the thread itself. I don't know which solution works. Whether it's PIMPD, Avahi or the UDP relay.
              I think the relay looks promising, but isn't in the package manager yet: https://redmine.pfsense.org/issues/10818 Will this be a thing?

              @stephenw10 said in Sonos speakers and applications on different subnets (VLAN's):

              Only you can decide that really

              For myself, I'd be thrilled to work this out somehow. But sadly my company network has way bigger security holes to close :( I'll comeback to this thread, when I've time!

              EDIT: I tried it with IGMP-Proxy, doesn't work 🍕

              1 Reply Last reply Reply Quote 0
              • QinnQ
                Qinn
                last edited by

                I can only speak for myself and I don't like IoT's that are closed source, be it cam's, Sonos, smart power plugs etc. I have no idea what so ever what they (can) do and how well there operating system is maintained. As an example I have video door cam that has a telnet service running, no idea why this should be and why telnet is chosen and not SSH.

                It's like your home, some use a burglar alarm system others only have lock, so each to his own ;)

                Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                Firmware: Latest-stable-pfSense CE (amd64)
                Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                S 1 Reply Last reply Reply Quote 2
                • S
                  somerino @Qinn
                  last edited by

                  @qinn

                  I totaly agree. To be honest, I wish I could trust some companies to do their homework. I can't and don't want to control everything by myself.

                  1 Reply Last reply Reply Quote 0
                  • QinnQ
                    Qinn
                    last edited by Qinn

                    That's why I like and use pfSense, I want to control the rulez, so what do you (dis)allow to go where. That's why by default every subnet (apart from the LAN) created can go nowhere.

                    Although a cheap router/fw (albeit from you supermarket) has good ingress block, you have almost no control over the traffic. In pfSense I decide what goes where.

                    Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                    Firmware: Latest-stable-pfSense CE (amd64)
                    Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                    1 Reply Last reply Reply Quote 0
                    • S
                      Stan
                      last edited by

                      @wellcomefit
                      For what it's worth, I've given up. I've solved the problem three times. Each time it worked for a few months, then stopped working with that solution. I didn't want to devote more time and effort.
                      I have a Sonos subnet. I've moved my smartphones to that and created rules for their access to other nets where needed. Not much is needed. Access to a NAS from smartphones for storage of pictures and access from the Sonos speakers to the NAS (limited to TCP port 445) for the music library. I use a firewall on the NAS and ACL on the NAS to control what the smartphones can get to.
                      It's also easy to switch the smartphones to my main data network when I want to get to other things. But I haven't had that need. This is a home environment, not a business environment, so your situation may be more complicated.

                      S 1 Reply Last reply Reply Quote 0
                      • S
                        somerino @Stan
                        last edited by

                        @stan

                        Thank you Stan for the feedback.
                        I decided for myself that, it's not worth the effort right now. UDP_Relay sounds really promising and if this ever comes officially to Pfsense. I'm willing to give it a try :) Until then, I'll go with your solution and just create a separate VLAN for it and not connect the client and sonos network.

                        1 Reply Last reply Reply Quote 0
                        • P
                          packetperson99
                          last edited by packetperson99

                          just chiming in to thank @Qinn here for pushing this all forward, across a few different threads qinn was involved in, I was able to get this up and running in a few hours. I needed pimd, avahi, (both just from the package manager) and four firewall rules (in attached pics), setting an RP address in pimd was also required.
                          LAN interface Rules
                          6a41ec90-a500-4ae9-827b-273862b429ca-image.png

                          78184b26-f614-496f-8b90-1f53da3576bb-image.png
                          NOTRUST interface rules (where sonos lives)
                          afe4eb4b-272f-4d83-a6ae-460d801281ca-image.png
                          I might end up moving my sonos system to a sort of intermediary network, originally I put it on the same net as the rest of my iot stuff, but having to grant more trust to the sonos system than the rest of my iot systems.
                          maybe this helps someone, but really just meaning to say thanks for the forums here! pfsense is pretty cool 😎

                          QinnQ 1 Reply Last reply Reply Quote 4
                          • QinnQ
                            Qinn @packetperson99
                            last edited by Qinn

                            @packetperson99 Thanks ;) maybe also share your GUI PIMD settings?

                            Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
                            Firmware: Latest-stable-pfSense CE (amd64)
                            Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

                            1 Reply Last reply Reply Quote 0
                            • P
                              packetperson99
                              last edited by

                              03371856-0107-4032-afd5-0774682a895f-image.png
                              0ac7a020-9119-43f2-ae02-a80febbf9f16-image.png
                              21bfe96f-0e85-48c5-8232-322d204f82bd-image.png
                              192.168.40.109 is a sonos speaker

                              1 Reply Last reply Reply Quote 5
                              • S
                                Stan
                                last edited by

                                @packetperson99; @qinn; @wellcomefit
                                Oh heck, I couldn't help myself. I've tried the solution above and it works. When I first open the Sonos app, it takes about 9 seconds to find the Sonos system. I'm not sure of whether I can stand the repeated anxiety of wondering whether it's going to connect during those nine seconds, so not sure whether I'm going to stick with this solution or go back to having things on the same network.
                                I do have a question, though. Of the four firewall rules, two are repeats of the other two, just in the different interface. I'm not sure what is accomplished by having a version of the LAN to NOTRUST rule on the NOTRUST interface, and by having a copy of the NOTRUST to LAN rule on the LAN interface. I set it up with all four rules. Then I disabled those two rules and it still works.
                                I'm not an expert. I'd be interested to understand what the rules do on a different interface.

                                Cloudless Smart HomeC 1 Reply Last reply Reply Quote 0
                                • Cloudless Smart HomeC
                                  Cloudless Smart Home @Stan
                                  last edited by

                                  This post is deleted!
                                  1 Reply Last reply Reply Quote 0
                                  • Cloudless Smart HomeC
                                    Cloudless Smart Home
                                    last edited by Cloudless Smart Home

                                    Just to chime in, I don't have anything under RP Addresses and my 5 Ikea SYMFONISK speakers have been working reliably for over a couple of months on my IOT vlan. I guess if I ever have trouble in the future, I will try adding it.

                                    1 Reply Last reply Reply Quote 0
                                    • P
                                      packetperson99
                                      last edited by

                                      @Stan i think youre right, i tested this pretty extensively as I moved my sonos systems to an intermediary network, I organized the rules by egress on the interface, also discovered i needed another rule for the 239.255.255.250:1900 traffic, so i ended up with two rules on the controller interface and three rules on the player interface

                                      1 Reply Last reply Reply Quote 0
                                      • S
                                        Stan
                                        last edited by

                                        Since this solution worked, it prompted me to again find a solution for AirPlay to Sonos for the Apple Music app. That is now working for me as well.
                                        A part of the AirPlay solution is to add (UDP) ports 319 and 320. With those ports, the Sonos app started up very quickly after it had been closed. This resolved my anxiety issue (see above). I'd recommend adding those ports just for the Sonos app.
                                        The additional ports I'm using for Airplay are 7000 and 32000:65535. The high range is needed on the No_Trust to LAN rule for AirPlay to work. I added 319, 320, and 7000 to both rules and am not sure if they're needed in both directions.
                                        If anyone fine tunes these additional ports (limiting them to one or the other direction), please post that here.

                                        S 1 Reply Last reply Reply Quote 0
                                        • Z
                                          zageyiff
                                          last edited by

                                          @packetperson99 @Qinn thank you for creating this thread with how to make the Sonos speakers (ikea symfonisk in my case) work in diff vlans.

                                          I've followed along, I have pfsense 2.5.0 with PIMD and Avahi from package manager, created the rules for the ports on both vlans.

                                          What I was missing was allowing these ephemeral ports (30000:65535) open from sonos device into the secure vlan and the PIMD RP addresses. After that, everything started to work.

                                          Finally after 3 days of reading many posts and trying different things, this is the one worked, and I consider the most up to date thread.

                                          1 Reply Last reply Reply Quote 1
                                          • Cloudless Smart HomeC
                                            Cloudless Smart Home
                                            last edited by

                                            This post is deleted!
                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.