Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    mDNS or Multicast Traffice Not Passing Between Multiple Vlans

    Scheduled Pinned Locked Moved General pfSense Questions
    23 Posts 6 Posters 551 Views 6 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      ayansaari @dennypage
      last edited by

      @dennypage Pfsense Vlans.jpg
      Aliens1.png
      Ports.png
      FetServer Unable to discover printer.png
      FetServer vlan rule.png
      Avahi 11.png
      Avahi 12.png
      Avahi logs.png
      No printer discover.png

      dennypageD 1 Reply Last reply Reply Quote 0
      • GertjanG Gertjan referenced this topic
      • dennypageD Offline
        dennypage @ayansaari
        last edited by

        @ayansaari Two things I told you previously:

        Please re-read my posts above.

        As I said previously, firewall rules are not used to forward mDNS. The firewall rule forwarding port 5353 has absolutely no purpose. Avahi does not forward packets from the source network to the destination network -- it sends packets that it creates to the destination containing information gathered from packets it receives in the source network.

        Also as I said previously, remove every entry you have in the Service list for Avahi Reflection Filtering, and do not add any entries to the Service list until you have successfully tested. And again, disable Avahi Publishing -- having this enabled is a bad idea, especially if you do not understand the basics of mDNS.

        A 1 Reply Last reply Reply Quote 2
        • A Offline
          ayansaari @dennypage
          last edited by

          @dennypage I’ve tried almost everything to resolve this issue, but I’m still unable to find a solution. I also asked you to give me a few minutes to check it remotely, but unfortunately, you didn’t respond to my request.

          Sometimes, live support is necessary—please try to understand.

          Just for remote access
          +92 321 4050 320
          ayansaari@gmail.com

          dennypageD 1 Reply Last reply Reply Quote 0
          • stephenw10S Online
            stephenw10 Netgate Administrator
            last edited by

            Why not just add the printer by IP address and forget about mDNS?

            But if you must did you try an mDNS browser to see what is being advertised?

            A 1 Reply Last reply Reply Quote 2
            • dennypageD Offline
              dennypage @ayansaari
              last edited by

              @ayansaari said in mDNS or Multicast Traffice Not Passing Between Multiple Vlans:

              I also asked you to give me a few minutes to check it remotely, but unfortunately, you didn’t respond to my request.

              Are you asking to hire me as a consultant to fix your firewall via remote login? I don't think that is a particularly good choice, not only for security reasons, but also for cost reasons -- I am very, very expensive. 🤠

              I recommend you hire someone locally who has pfSense experience instead. Failing that, I believe Netgate offers professional services. I don't know what countries they offer services in or what their rates are, so you would have to contact them and ask.

              A 1 Reply Last reply Reply Quote 0
              • A Offline
                ayansaari @stephenw10
                last edited by

                @stephenw10 dear I was tried by giving IP Address of the printer and no chance to discover it

                I think Pfsense is not have the ability to multicast traffic between vlans

                1 Reply Last reply Reply Quote 0
                • stephenw10S Online
                  stephenw10 Netgate Administrator
                  last edited by

                  If you add the device by IP address then mDNS is not involved at all. No multicast traffic is required. The firewall just routes traffic between the subnets like any other traffic.

                  Now you may not be able to add things by IP because for some reason developers like to remove that option in order to somehow make it.... easier I guess. 🙄
                  But if you can, like in Windows, it should just work.

                  1 Reply Last reply Reply Quote 0
                  • A Offline
                    ayansaari @dennypage
                    last edited by

                    @dennypage dear as you give suggestions I done at and still unable to discover devices from the other vlans

                    so I think pfsense is not have the ability to manage multiple vlans
                    I think it is a good firewall when we have a single subnet

                    stephenw10S M 2 Replies Last reply Reply Quote 0
                    • stephenw10S Online
                      stephenw10 Netgate Administrator @ayansaari
                      last edited by

                      @ayansaari said in mDNS or Multicast Traffice Not Passing Between Multiple Vlans:

                      I think pfsense is not have the ability to manage multiple vlans

                      Of course it does. Most pfSense deployments include multiple subnets.

                      So when you used an mDNS/Bonjour browser tool to discover advertised services what did it show?

                      1 Reply Last reply Reply Quote 1
                      • M Offline
                        MoonKnight @ayansaari
                        last edited by MoonKnight

                        @ayansaari

                        This is my setup and this is the IoT VLAN where the printer is located, and this VLAN is isolated:
                        ed31d50f-4d61-4112-b5a1-1232aff599d2-image.png

                        This is the only VLAN where I created a rule to allow access to the printer:
                        4a0840d1-6657-482b-adde-6f6c8189fba9-image.png
                        and is isolated too.
                        ed282440-1204-4331-93eb-0bd84b15d763-image.png

                        From my LAN network, I can access the printer without creating any rules. My computer discovers the printer on the IoT VLAN.

                        c362020b-05e3-4289-9e7f-48df047cf3f5-image.png

                        But I do have mDNS rule active under Floating rule:
                        4fc051e6-780e-4150-bf85-cd349e57e3cf-image.png
                        The interfaces is: LAN, FAM and IOT
                        And I have Avahi installed with the same interfaces active
                        652fc3f7-c7f5-4787-b210-7f3ed3ef7351-image.png

                        --- 25.07.1 ---
                        Intel(R) Xeon(R) CPU D-1518 @ 2.20GHz
                        Kingston DDR4 2666MHz 16GB ECC
                        2 x HyperX Fury SSD 120GB (ZFS-mirror)
                        2 x Intel i210 (ports)
                        4 x Intel i350 (ports)

                        1 Reply Last reply Reply Quote 1
                        • stephenw10S Online
                          stephenw10 Netgate Administrator
                          last edited by

                          Yeah, just to prove it out I ran a simple test. Since I don't have anything I can easily use that advertises mDNS I just turned on Publishing in Avahi itself on 4 firewalls:

                          steve@steve-NUC9i9QNX:~$ mdns-scan
                          + 4860 [00:08:a2:xx.xx.xx]._workstation._tcp.local
                          + 4860._ssh._tcp.local
                          + 4860._sftp-ssh._tcp.local
                          + fw1 [00:08:a2:xx.xx.xx]._workstation._tcp.local
                          + fw1._ssh._tcp.local
                          + fw1._sftp-ssh._tcp.local
                          + pfsense [00:01:21:xx.xx.xx]._workstation._tcp.local
                          + pfsense._sftp-ssh._tcp.local
                          + pfsense._ssh._tcp.local
                          + 1100-3 [f0:ad:4e:xx.xx.xx]._workstation._tcp.local
                          + 1100-3._sftp-ssh._tcp.local
                          + 1100-3._ssh._tcp.local
                          

                          In that result 4860 is in the same subnet as the client I'm testing from. fw1 is the router on that subnet. pfsense and 1100-3 are other firewalls in different subnets connected to fw1.

                          You can see the scan tool is able to see all of them no problem.

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.