Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Setup UPnP->few quick questions? (solved)

    Scheduled Pinned Locked Moved NAT
    solved
    9 Posts 3 Posters 132 Views 3 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 4 Offline
      42
      last edited by 42

      Hi,

      I am using the latest CE.

      I've installed/enabled the mini-upnp package.
      I am using only the UPnP IGD Port Mapping.

      There is zero issues that I can see as it started up just fine.

      My questions are:

      Are there any firewall rules I need to create to allow UPnP to do it's job?
      ----Or will PFSense auto-create those rules as necessary?

      For example: DO I need an outbound rule for this to work?
      Like I had in OPNSense?
      Do I need to allow multicast traffic? (1900,5351,2189)
      ----Or will PFSense take care of all this?

      Tyvm for any responses.

      Cheers everyone.

      John

      S 4 2 Replies Last reply Reply Quote 1
      • S Offline
        SteveITS Rebel Alliance @42
        last edited by

        @yodabug if you still have the default LAN to any rule it’s OK.

        https://docs.netgate.com/pfsense/en/latest/services/upnp.html#upnp-igd-pcp-service-ports

        Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
        Upvote 👍 helpful posts!

        4 1 Reply Last reply Reply Quote 0
        • 4 Offline
          42 @SteveITS
          last edited by

          @SteveITS -tyvm for your response.

          I search the documentation - lol.
          My search sucks i guess :-)

          I'll read that and tyvm once more.

          4 1 Reply Last reply Reply Quote 1
          • 4 Offline
            42 @42
            last edited by

            After a quick read I see that if I am to bridge anything I should have the manually added rules.

            I have future plans and four more ports on my FW so I am wondering, as I don't know much about UPnP except for it was used a ways back to do a bunch of ddos attacks, is there still these kinds of security issues to deal with?

            I won't add anything now, don't need them, but when I end up bridging something, maybe and AP or security camera or some such thing I can add them at that time.

            Either way, ty very, very much for finding what my old man brain did not :-)

            Cheers,

            1 Reply Last reply Reply Quote 1
            • 4 Offline
              42 @42
              last edited by

              I tried to edit my original post to append (solved) to the subject..but I guess that's not allowed after 3600 seconds?

              How do we mark the thread resolved please?

              Thanks a bunch.

              S johnpozJ 2 Replies Last reply Reply Quote 2
              • S Offline
                SteveITS Rebel Alliance @42
                last edited by

                @42 I don’t think you can mark it solved.

                I try to avoid bridging. I’d think it’s the same thing though…make a rule on that interface.

                Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to reboot, or more depending on packages, and device or disk speed.
                Upvote 👍 helpful posts!

                4 1 Reply Last reply Reply Quote 0
                • johnpozJ Offline
                  johnpoz LAYER 8 Global Moderator @42
                  last edited by johnpoz

                  @42 said in Setup UPnP->few quick questions?:

                  How do we mark the thread resolved please?

                  I did it for you - not sure if there is some timeout to edit first post in the thread. I agree you should be able to at least add tags. I took the liberty of doing it for you.

                  You might need 5 rep points would be my guess

                  edit: I gave you some thumbs up, you now have 5 - try editing your first post now.

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 25.07 | Lab VMs 2.8, 25.07

                  4 1 Reply Last reply Reply Quote 1
                  • 4 Offline
                    42 @SteveITS
                    last edited by

                    @SteveITS -OK thank you.

                    I agree about bridging and any other network complicity I am not experienced with.
                    Which is most of them - giggle.

                    I might be able to do it all with firewall rules only but eventually, I want to have a fairly smart home (lights, door bell, other electronics control by remote controller over WIFI, and I want all smart-things/IoT (are they the same thing?) to run over one AP, while 2 -4 APs will cover the rest of the house/property and my internet/LAN will be handled by the SFP's.

                    So, there are a few things I'd like to segregate as much as possible form the rest of the network and as I understand it bridging/firewall rules is one way to do it.

                    I am unsure if FW rules alone can do this?

                    1 Reply Last reply Reply Quote 0
                    • 4 Offline
                      42 @johnpoz
                      last edited by

                      @johnpoz -Yep-that worked just fine Jonpoz. TYVM.

                      1 Reply Last reply Reply Quote 0
                      • First post
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.