Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UPnP and VLANs

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 5 Posters 970 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bearhntrB
      bearhntr
      last edited by

      I have setup a home lab to do 'work related' stuff and separate it from my home. (LAN = 10.9.28.1/24 ... VLAN = 100.9.28.1/24). I have HomeAssistant and WiFi on the 'home LAN'. pfSense is my DHCP/DNS for everything. I do have a Server 2019 DC in the VLAN, but it is using pfSense for DNS and DHCP (IPv4 and IPv6 - on both are unique).

      6809f1c8-fc81-480d-93d2-865e3c3204a0-image.png

      I was going through some stuff over this week and noticed that UPnP was only on the LAN - so I added the VLAN (OPT1), so I enabled it here {see image}

      e9d3bb7d-f8b9-4798-99f2-d7b683a4f021-image.png

      When I did this and went back to dashboard - I see this (service is not running - and will not start, even with a reboot):

      6c40c8f9-d997-4c93-a285-6ae5b7ebd84e-image.png

      Also HomeAssistant (after about 5-10 minutes) shows a UPnP error because it is not running.

      If I go back and remove the OPT1 in the UPnP settings - it goes back to 'running'. I'd like to have UPnP in the VLAN - as I am also looking to move my WiFi into another VLAN (possibly all of HomeAssistant). How do I fix this?

      WAN rules:
      1318f512-4610-4bf3-95f9-055af4bd1ae7-image.png

      LAN rules:
      b12919e9-2ebb-4345-9d47-52c70a889e0c-image.png

      OPT1 (VLAN) rules:
      8befee6c-01d4-4129-a009-bf222ffcd965-image.png

      1 Reply Last reply Reply Quote 1
      • W
        WN1X
        last edited by

        You do realize the 100.0.0.0/12 and 100.16.0.0/14 blocks belong to Verizon and should not be used for your VLAN?

        bearhntrB 1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          What do the logs show when you try to start it?

          bearhntrB 1 Reply Last reply Reply Quote 0
          • bearhntrB
            bearhntr @WN1X
            last edited by

            @WN1X

            I am a Verizon customer... LOL

            It is inside my network - those IPs are not exposed to the Internet. They are subject to change at some point once I get this working.

            1 Reply Last reply Reply Quote 0
            • bearhntrB
              bearhntr @stephenw10
              last edited by

              @stephenw10

              This is all I see in the logs that has to do with MiniUPnP

              8ae60580-34c9-4c03-a4b5-0d7aa50941c4-image.png

              This is GENERAL for when I made the change:

              418a98ab-c639-428b-a64c-d16179cbc2dc-image.png

              Do not know where to look there is nothing under logs which states UPnP

              9235db02-fca4-4f02-b069-3950b335ecbf-image.png

              johnpozJ 1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator @bearhntr
                last edited by johnpoz

                @bearhntr and what are you not understanding about those errors.. Clearly states contains public IP, should contain private.

                100.9.x.x is not some IP range you should be using that is public range.. Use IP range from rfc1918 space - there is lots you can use 192.168/16, 10/8, 172.16/12

                Why would you be using 100.9 on an internal network and want that do UPnP?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                bearhntrB 2 Replies Last reply Reply Quote 1
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Yup, it's thowing an error at the public IP internally. Which is interesting.

                  G 1 Reply Last reply Reply Quote 0
                  • G
                    Gblenn @stephenw10
                    last edited by

                    @stephenw10 UPnP seems to be rather picky about Private vs Public IP...
                    It doesn't work behind an ISP router providing a Private IP towards pfsense WAN. And I never got it to work with the games that require UPnP, using STUN. However, changing to a Public IP range on the upstream router makes it work just fine, as long as pfsense is in DMZ (or the relevant ports are open at least).
                    I wish there was some toggle that would allow bypassing those checks...

                    1 Reply Last reply Reply Quote 1
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yup, code was added upstream for that. Though you can workarund it by manually setting the external address: https://redmine.pfsense.org/issues/10398

                      G 1 Reply Last reply Reply Quote 1
                      • G
                        Gblenn @stephenw10
                        last edited by Gblenn

                        @stephenw10 Hmm, that patch may work but it seems like there is only one person who even tried it, and failed?

                        Anyway, UPnP works fine for me and all gaming right now. BUT, even if there was a simple toggle for the WAN IP check, it will still not work in a failover scenario unfortunately... or is there some way to make it work?

                        I mean, you can't select the failover Group so when WAN 1 is down, UPnP no longer work...

                        1 Reply Last reply Reply Quote 1
                        • bearhntrB
                          bearhntr @johnpoz
                          last edited by

                          @johnpoz

                          I was trying to use something that 'stood out' to me for LAB Addresses - so that I could easily know when I found any traffic - I could say...."Oh, that is the lab". There are many times I have to review (or have reviewed logs by engineers) and wanted to make sure that nothing crazy was in the mix.

                          So that being said, I have a Server 2019 DC in the mix of the lab. 100.9.28.250 - I also cannot get things working 100% the way I want them,

                          For example - when I do this on the DC - I get the following:

                          475e64ee-8c2c-429a-8a8a-8023a135636c-image.png

                          If I do the same on the lab server itself - I get the following (yes, the lab server is joined to the domain and has the DC as the DNS entry #1 for IPv4 and IPv6) -- the masked IP is the IPv6 of the LAN port in pfSense:

                          098e9ab1-e8d9-4b51-b1bd-acb25e57f3d6-image.png

                          The DC is set to use (IPv4 and IPv6) pointing to pfSense as DNS Forwarder, pfSense is set as below:

                          952e0915-dae4-4278-bfb7-08f39ed4a102-image.png

                          1 Reply Last reply Reply Quote 0
                          • bearhntrB
                            bearhntr @johnpoz
                            last edited by

                            @johnpoz

                            I am guessing I am gonna need to completely rebuilt the DC if I make the address something like 10.100.28.1/24

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              You need to change the subnet on that VLAN to something in a private range. That would mean renumbering everything using that interface, yes.

                              bearhntrB 1 Reply Last reply Reply Quote 0
                              • bearhntrB
                                bearhntr @stephenw10
                                last edited by

                                @stephenw10

                                That is gonna be fun - Domain Controllers hate to have their IP changed.

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  I mean if you actually own that subnet then you can just route to it and UPnP becomes unnecessary. But....... 😉

                                  bearhntrB 1 Reply Last reply Reply Quote 0
                                  • bearhntrB
                                    bearhntr @stephenw10
                                    last edited by

                                    @stephenw10

                                    Own it? I own it on my home (inside my firewall) network. LOL

                                    I am doing this with the lab domain stuff, because at some point I want to possibly put my WiFi on its own segment (for SmartHome stuff) - seeing how people are persuading me not to use the pfSense box as a WiFi controller AP/router, etc.

                                    johnpozJ 1 Reply Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @bearhntr
                                      last edited by johnpoz

                                      @bearhntr if you want something that sticks out then use one of the other rfc1918 address schemes from your other networks use 192.168 on your other networks and 10.x.x on the other..

                                      10.20.30.x would standout I would think ;)

                                      Pulling public space out your u know what and using internally - while technically possible, it almost always going to lead do some issue.

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      bearhntrB 1 Reply Last reply Reply Quote 1
                                      • stephenw10S
                                        stephenw10 Netgate Administrator
                                        last edited by

                                        The number of people I've seen using 1.1.1.0/24 still boggles the mind. 🙄

                                        johnpozJ 1 Reply Last reply Reply Quote 1
                                        • bearhntrB
                                          bearhntr @johnpoz
                                          last edited by

                                          @johnpoz

                                          Shame I could not use 10.90.280,xxx LOL

                                          I am still trying to get my head around the IPv6 Private IPs of fdxx:xxxx:xxxx:yyyy:zzzz:zzzz:zzzz:zzzz

                                          I was toying with the idea of fd10:0009:0028:1977:zzzz:zzzz:zzzz:zzzz and let DHCP handle the :zzzz:zzzz:zzzz:zzzz part

                                          I simply do not understand the "Track Interface" to the WAN in the LAN setup well enough to get that part working.

                                          Thanks to you and all others for the input/guidance.

                                          1 Reply Last reply Reply Quote 0
                                          • johnpozJ
                                            johnpoz LAYER 8 Global Moderator @stephenw10
                                            last edited by johnpoz

                                            @stephenw10 yeah, which hey if that is what they do fine. But what bugs me is when the same person comes here and wonders why they can't talk to cloudflare for dns ;)

                                            Still in favor of basic network understanding test to even download pfsense ;)

                                            @bearhntr you could for sure use 10.90.280

                                            You can also use whatever local IPv6 range you want that falls in the link-local range fe80::/10 . -Not going to do you any good if you want those clients talking to the internet.. And using a link-local address has zero to do with tracking what gua prefix you get and using one of the subs on lan side interfaces.

                                            Did you want to use the ULA range? fc00::/7

                                            Personally I would get a handle on IPv4 before messing with IPv6 ;)

                                            If you don't like prefixes that change, or the size of the prefix your isp will give you, or if they will give you one at all.. You can always just run a tunnel from Hurricane Electric - they will give you a /48, that never changes. And you can use whatever prefixes out of you want for your networks.. I match them up so they line up with an octet I use out of my IPv4 range. So I can easy look at the prefix and know what network it is since it lines up with the IPv4 I have on that network.

                                            example my lan is 192.168.9.0/24 my IPv6 on that network is 2001:470:xxxx:9::0/64

                                            And the last number matches, so for example pfsense IP on my lan is 192.168.9.253, while its IPv6 is 2001:470:xxxx:9::253

                                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                                            If you get confused: Listen to the Music Play
                                            Please don't Chat/PM me for help, unless mod related
                                            SG-4860 24.11 | Lab VMs 2.8, 24.11

                                            johnpozJ 1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.