Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Casting Apple, Google FireTV (mDNS SSPD)

    Scheduled Pinned Locked Moved L2/Switching/VLANs
    14 Posts 2 Posters 843 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CloudNode
      last edited by

      Hello; I was wondering what the best practice to allow Multicast Apple, Google FireTV to work via VLANS.

      I have a LAN vlan (100) and IOT (10) and Guest (99)

      My casting devices are on the IOT vlan (10) and i am trying to cast something while on the LAN vlan (100) but the casting devices are not showing in the list to cast on. I have installed UDP Broadcast Relay and allowed LAN, IOT and GUEST interfaces and allowed port 5353 to 224.0.0.251 and port 1900 to 239.255.255.250.

      Seems to be something in my rules that I need to allow as currently in my IOT rules i have a block to all other networks expect its own and it dont want IOT devices to cross talk and it seems like this is causing the issue but I am not sure how to relax this rule.

      Thank you,

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @CloudNode
        last edited by

        @iptvcld said in Casting Apple, Google FireTV (mDNS SSPD):

        what the best practice to allow Multicast Apple, Google FireTV to work

        The best approach, and simplest is to just cast while on the same network you want to cast too. These discovery and casting were never meant to be across vlans..

        I have my tvs for example on a network, that I call my roku vlan. If I wanted to cast something from my phone or tablet to the TV, I would just connect to this network..

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        C 1 Reply Last reply Reply Quote 0
        • C
          CloudNode @johnpoz
          last edited by CloudNode

          @johnpoz Makes sense, and might be the easiest thing to do but I am thinking what would my Guest do? I want them to be able to cast things while having an event, etc while at the same time them being on the Guest network.

          The only thing I can think of, is to join these casting devices on my LAN vlan, since LAN has rule access to talk to any network. I wanted to keep these casting devices in iot and no cross talk but seems really tough..

          Also it seems like casting works to Apple, Google devices but not TCL, Roku, FireTV

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @CloudNode
            last edited by johnpoz

            @iptvcld said in Casting Apple, Google FireTV (mDNS SSPD):

            seems really tough..

            I would say its more a PITA, and defeats the purpose of isolation in the first place.

            Do you often have guests that come over and want to cast something to your TV? In all my years this has never been the case ever..

            If I did have the need for this, I would just create a different ssid for these sorts of users, that is on the same vlan as my devices they would be casting too. This way you do not have to hand out your ssid you use for your devices, and they can temp while they are casting be on your iot network.

            Possible PPSK, private psk would come in handy here.. Because different users/devices could have their own psk to join the network.. So you could have your devices all auth with same psk, but if the network is a PPSK you could have these guests use a different psk, and you would only need the one ssid to be broadcast.

            In either method you could make this guest used psk simpler to type in, etc. or setup a qr code for them to use.. And if concerned about the complexity of the psk being low.. Just disable this access method when you don't have guest over.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            C 2 Replies Last reply Reply Quote 0
            • C
              CloudNode @johnpoz
              last edited by

              @johnpoz Yeah i have guest that come over for parties and they want to be the "DJ" and use their own device to cast music videos on the TV.

              I found some forums online saying the allowed all these high port numbers from their IOT and the allowed casting to work via VLAN. I tested and it works but it seems just too open still.

              8114085d-b9f0-4020-a097-e79e5bb6e2f6-image.png

              with this UDP Relay tool installed you would think, crossing VLANs with some relaxed rules would allow it. But I dont just want to open it up and at the same time, trying to keep it simple and secure

              1 Reply Last reply Reply Quote 0
              • C
                CloudNode @johnpoz
                last edited by

                @johnpoz What i ended up doing for now is Enabled UDP Broadcast Relay for 5353 and 1900 for LAN, IOT and Guest

                Created an Alias for CastingDevices: added the IPs for all my TVs
                Created an Alias for CastFromNetworks: Added LAN Subnets and Guest Subnets

                Created an allow rule under IOT from CastingDevices to CastFromNetworks

                This allows me to cast while on my main LAN Subnet and also while on the Guest Subnet to the TV IP's i have the in the CastingDevices alias while keeping them from cross talking to my other subnets.

                035c5989-46ed-4fbd-ae99-59b8ec468ec3-image.png

                I left the port as ANY as i am not sure what ports are required or else I would have created an Alias for that as well.

                Does anyone have those ports or a better way for this soloution?

                Thank you

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @CloudNode
                  last edited by johnpoz

                  @iptvcld said in Casting Apple, Google FireTV (mDNS SSPD):

                  and also while on the Guest Subnet t

                  where did you put those rules? How would that allow your guest network.. Your guest network is connecting to your LAN? Not much a guest network if it is.. Did you put that rule in floating tab?

                  What you allow between networks is up to you..

                  Those rules for 1900 and 50k-65k make no sense on the iot network..

                  What rules do you have on your guest network?

                  Rules are evaluated top down, first rule wins, no other rules are evaluated.. On the interface the traffic would enter pfsense from the network pfsense is attached too. To allow guest to cast to iot, the rules would have to be on the guest network.. Not on the iot interface.

                  Your description of your alias makes no sense to me - casting devices makes sense for a source. But cast from for destination does not make sense.. Cast to network would make sense for a destination alias.

                  You can setup discovery with like mdns or upnp.. But for the actual traffic I would only allow the port it would be casting too, and that sure wouldn't be all the ports between 50k and 65k.. That seems insane.... I would think its either port 8008 or maybe 8009 as the destination port to the chromecast IP..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  C 2 Replies Last reply Reply Quote 0
                  • C
                    CloudNode @johnpoz
                    last edited by CloudNode

                    @johnpoz My rule description looks like this. CastFromNetwork just means while on those 2 networks, i am able to cast. Now, if i knew more on what to put in for the destination then i would have closed it down some more but i am not sure what ports it needs.
                    41d85ab5-619c-45ef-bf78-4bd87c1ab611-image.png

                    My guest FW has this
                    c4c26afc-e5d9-40bc-b617-00a8521bb0cd-image.png

                    Allowing guest to the casting devices only

                    5f7401f2-84da-4a9e-b79c-8c1af1c37823-image.png

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • C
                      CloudNode @johnpoz
                      last edited by

                      @johnpoz said in Casting Apple, Google FireTV (mDNS SSPD):

                      Rules are evaluated top down, first rule wins, no other rules are evaluated.. On the interface the traffic would enter pfsense from the network pfsense is attached too. To allow guest to cast to iot, the rules would have to be on the guest network.. Not on the iot interface.

                      this is my IOT rules - i had to put this allow at the top as i dont allow cross talk to other networks.
                      e905f60d-45e8-43f2-aa97-e0565ddcb40f-image.png

                      1 Reply Last reply Reply Quote 0
                      • johnpozJ
                        johnpoz LAYER 8 Global Moderator @CloudNode
                        last edited by johnpoz

                        @iptvcld said in Casting Apple, Google FireTV (mDNS SSPD):

                        CastFromNetwork just means while on those 2 networks

                        That wouldn't be the "destination" that would be the source.

                        Why would your casting player in your IOT subnet be making unsolicated connections to your casting device?

                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                        If you get confused: Listen to the Music Play
                        Please don't Chat/PM me for help, unless mod related
                        SG-4860 24.11 | Lab VMs 2.8, 24.11

                        C 1 Reply Last reply Reply Quote 0
                        • C
                          CloudNode @johnpoz
                          last edited by

                          @johnpoz Maybe my description is off but my casting devices are all in the IOT network so i had to allow all the casting devices to be able to talk to the networks i want to cast from. So from TV1 to LAN Subnets and Guest SUbnets

                          johnpozJ 1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator @CloudNode
                            last edited by johnpoz

                            @iptvcld that top rule on your iot network allows any of those casting devices to talk to anything on the 2 networks you have listed in castfrom.. They can do anything they want to any IP in those networks.

                            With such a rule, you sure are not Isolating your iot network.. Such rules pretty much make segmenting pointless and you might as well just run 1 flat network.

                            Wouldn't it be must more secure to just let your guest dj connect to your IOT network.. And lot less messy.. And then you can actually isolate your IOT network ;)

                            You understand as well that rule in that order allows anything in your IOT to talk to the pfsense webgui on those networks as well.

                            The only thing you should have to allow is your guest network to discover stuff on your iot.. And then 8008-8009 for v2 cast, and maybe 10008 for mirroring..

                            I have not looked into the details or sniff traffic while casting.. Because I would never setup such access.. If something wants to cast to my casting destination, I would put that something on the network of the casting destination.. Not create all kinds of holes in my L2 barrier for discover and then create some rule that wide opens up access into a network.. Which defeats the whole point of isolation in the first place.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                            C 1 Reply Last reply Reply Quote 0
                            • C
                              CloudNode @johnpoz
                              last edited by

                              @johnpoz I know its a bummer, i was really trying to make it work this way but yeah i can see that those casting devices (my TV's) can now cross talk to my LAN subnet which I really dont want them do.

                              There has to be a better way without providing my guest the password for iOT. If i had the port for casting then i can someone lock it down as then those TVs will have access to LAN subnet but only to those ports.

                              johnpozJ 1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator @CloudNode
                                last edited by johnpoz

                                @iptvcld said in Casting Apple, Google FireTV (mDNS SSPD):

                                There has to be a better way without providing my guest the password for iOT.

                                Already went over how you can do that, create a different PSK for a different SSID that on your iot vlan. Or setup private psk (PPSK) that allows different psk for the same ssid.

                                Private or Personal PSK, is somewhat new and can differ in implementation for different vendors.. So simpler solution would be to just create another SSID with a guestpassword for the psk that is also attached to your iot network.

                                Now you can just turn that network on or off depending if you have guest djs over, and you could even change this psk between parties.. Much easier to lock that down to be honest..

                                What exactly are you using for your wifi? Some old wifi router, or an actual AP that supports vlans?

                                edit: Macgyver way to do it if your wifi APs don't support vlans would be to just use another wifi router as AP that is connected to your iot network and uses a different SSID than your normal iot psk. This could be done cheap with any old wifi router you have laying about, or just buying some 20$ wifi router off amazon. Nice thing with that, is you could just turn it off when not in use ;)

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.8, 24.11

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.