Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UPnP Port Forwarding with PFsense

    Scheduled Pinned Locked Moved General pfSense Questions
    20 Posts 4 Posters 16.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      If this doesn't work, but I think it will, it may be possible to use the miniSSDPd daemon to proxy upnp requests and announcements across subnets. It doesn't mention that in it's documentation but it seems as though it should be possible. Hmm.

      Steve

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You should have the 'allow packets with IP options' setting checked on the firewall rules on each VLAN.

        You shouldn't have the LAN interface at all!  ;)
        It is presumably still assigned the ethernet card directly which is bad. That can lead to VLAN tagged and non-tagged traffic on the same interface which can cause problems. When you have VLANs on a NIC the NIC itself should be unassigned.

        If it's not causing problems though I'd leave it for now and rearrange stuff later.

        Steve

        1 Reply Last reply Reply Quote 0
        • K
          kcleveland
          last edited by

          I enabled the advanced ip options on every firewall rule (except the wan of course) - but still no luck :(

          I wonder if I need a specific rule for the ssdp multicast address (239.255.255.250)?

          Any other ideas? I wonder how that other guy got it working.

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Are you seeing anything in the firewall logs?
            You may want to try swapping the upstream and downstream interfaces.
            Is this the same wifi access point that previously worked fine when everything was on the same subnet?
            You could change the source address in your firewall rules to 'any'.

            Sometimes you have to clear the states or reboot the box after large changes for everything to come up correctly.
            Diagnostics: States: Reset states:

            Steve

            1 Reply Last reply Reply Quote 0
            • K
              kcleveland
              last edited by

              I went ahead and changed the source address on the rules to any, still no luck.

              Seeing a lot in the logs, looking like it could be blocking it even though the rules are wide open:

              The logs may indicate what you mentioned in that it may need a reboot - it is saying em0 is still 192.168.0.1 and I changed it to 192.168.5.1 several hours ago.

              It is the same access point, and my PC is on it right now - I can ping all VLAN's and other clients on the VLAN's so I'm confident everything is good there - I just think were missing some mundane detail when it comes to the multicasting.

              Edit: I'm going to reboot pfsense and see what happens

              1 Reply Last reply Reply Quote 0
              • K
                kcleveland
                last edited by

                still no luck after a reboot, but the logs are starting to look cleaner.

                I'm officially stuck. This is a bummer!

                Can anyone help Steve and I out here?

                1 Reply Last reply Reply Quote 0
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  @kcleveland:

                  it is saying em0 is still 192.168.0.1 and I changed it to 192.168.5.1 several hours ago.

                  No it isn't. It's saying that packets are arriving on the interface em0 from 192.168.0.1.
                  Possibly because your switch is sending them there. Why is your switch sending untagged packets to em0?
                  That's a good point though. Is your switch handling multicast correctly?

                  This could be one of those problematic situations I mentioned with tagged and untagged traffic on the same interface.

                  Steve

                  1 Reply Last reply Reply Quote 0
                  • marcellocM
                    marcelloc
                    last edited by

                    Just few question to clarify.

                    Do your switch support vlans?
                    Did you configured and applied this vlan setup on switch?

                    Treinamentos de Elite: http://sys-squad.com

                    Help a community developer! ;D

                    1 Reply Last reply Reply Quote 0
                    • K
                      kcleveland
                      last edited by

                      Good point - I fixed that by enabling the "discard all untagged frames" feature on my switch for the trunk port to pfsense - should be good there now.

                      Marcelloc- yes, it does. i have them setup and working, and can ping between all of the vlans and clients within them.  I believe everything is good there - Like I said it all works well, I just need to access the NAS in VLAN20 from the VLAN10 wireless network via apps that "discover" the upnp on the NAS.

                      I think that i need to take another look at the switches multicast config and get back in the morning.

                      Thanks again for all of the excellent help!

                      1 Reply Last reply Reply Quote 0
                      • K
                        kcleveland
                        last edited by

                        Ok so I finally had some time to get back to this, and at this point I'm pretty sure everything is setup correctly for multicast (pfsense and the switch).

                        However, it still doesn't work.

                        In my switch I see an active querier on each VLAN (the IGMP querier being the L3 device, in this case pfsense), on the port that PFsense is at:

                        But it still won't flood multicast traffic between the subnets.

                        I'm all out of ideas at this point.

                        Surely someone out there has had to enable multicast routing between subnets on pfsense - can somebody PLEASE enlighten me on how to do this?  I'm struggling here  :'(

                        Thanks!

                        1 Reply Last reply Reply Quote 0
                        • T
                          trunix
                          last edited by

                          kcleveland - realize it's been awhile, but did you ever get your multicast issues sorted?  I worked on a similar multicast setup, and in addition to enabling the advanced firewall rule to allow packets with IP options to pass, we had to install the Avahi package to get two devices in separate subnets communicating successfully.

                          Might be worth a try if your wife hasn't already thrown her iPhone at you.  Or perhaps because she has.  Ensure Avahi is bound to the two interfaces/VLANs that the phone & NAS are a part of if you want to give this a try.  That's the only Avahi settings I think were needed – it was pretty easy to get running.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            So you are suggesting that the iphone may be using an Apple protocol for device discovery rather than DLNA (IGMP multicast)?
                            Wouldn't that imply it couldn't find DLNA devices?  :-
                            Good suggestion though.

                            Steve

                            Edit: Actually the iphone app. in question is specifically upnp/dlna. You can see in this post the multicast traffic on port 1900 that is part of the SSDP protocol.
                            Still worth trying though.  ;)

                            1 Reply Last reply Reply Quote 0
                            • T
                              trunix
                              last edited by

                              I think it'd be a worth a shot to see if it works.  I suspect there may be some overlap in many of the UPnP/Zeroconf protocols.  I agree that it's a little ironic that we're discussing SSDP in conjunction with an Apple product, as I'd expect to see this protocol more in Microsoft-related gear.  I suppose it's been around long that it's an accepted standard.

                              And while I'm on the topic, I'll personally add that I don't think DLNA is deserving of the title of "standard" or "protocol" or anything that even hints at interoperability.  I think DLNA abuses the term "standard" the same way the financial community abuses the term "security" – misleading to the point of outright lying.  I had to plow through too many software transcoders for a client's video project searching for something to work with their available Sony hardware.  A lesson in frustration as all their hardware & all the available software I came across claimed to support the identical version of DLNA.  I found Conceiva's Mezzmo the best if anyone cares.  I'll stop ranting now since it's not pertinent to the OP's topic & this thread.

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.