Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    [SOLVED] Issue with Cell Phone Sending/Receiving MMS

    Scheduled Pinned Locked Moved Firewalling
    19 Posts 5 Posters 8.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • CNLiberalC
      CNLiberal
      last edited by

      When the phone is connected to any other WiFi network (or not connected to any WiFi network) it can send just fine.  It's only on pfSense that it won't send.

      pfSense 2.7.2-RELEASE

      Dell R210 II
      Intel E3-1340 v2
      8GB RAM
      SSD ZFS Mirror
      Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
      1 x Cisco 3850 12XS-S (Core Switch)
      2 x Cisco 3750X PoE Gig Switch (Access Stack)
      3 x Cisco 2802i APs (Mobility Express)

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        Do you have some rules set up on the WAN or LAN that would prevent it?  Does it need uPNP turned on?

        1 Reply Last reply Reply Quote 0
        • CNLiberalC
          CNLiberal
          last edited by

          uPnP was enabled, but the gateway and LAN weren't set.  I've enabled that and we'll see.

          Someone on #pfsense recommended disabling the BOGON block.  I can't imagine that's a good thing to do.

          EDIT:  No go on UPNP.  The only block rules that I have are the RFC 1918 addresses and bogon.  I just tried disabling those, but I have a feeling it won't matter.

          pfSense 2.7.2-RELEASE

          Dell R210 II
          Intel E3-1340 v2
          8GB RAM
          SSD ZFS Mirror
          Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
          1 x Cisco 3850 12XS-S (Core Switch)
          2 x Cisco 3750X PoE Gig Switch (Access Stack)
          3 x Cisco 2802i APs (Mobility Express)

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            Could also be a DNS issue I suppose…  OR it could be that the messages are going out over something that doesn't like re-writing that place.  Maybe you you to assign a static port in outbound NAT?  But which port?

            1 Reply Last reply Reply Quote 0
            • chpalmerC
              chpalmer
              last edited by

              When is the last time you restarted the phone?

              Triggering snowflakes one by one..
              Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

              1 Reply Last reply Reply Quote 0
              • CNLiberalC
                CNLiberal
                last edited by

                Thanks for responding.  I've restarted the phone a few times through this ordeal.  I'll try again.  As far as the ports that I need, these are the APNs that I've been using in the phone:

                **NOTE: All unmentioned fields should read "<not set="">".
                
                APN 1 (Up to 3.5G HSDPA/HSUPA only, 7.2mbps):
                Name: Cingular
                APN: wap.cingular
                Proxy: wireless.cingular.com
                Port: 80
                MMS protocol: WAP 2.0
                MCC: 310
                MNC: 410
                APN type: default,agps,supl,fota,dun
                
                APN 2 (Up to 3.75G HSPA+ only, 21mbps):
                Name: AT&T HSPA+
                APN: phone
                MMS protocol: WAP 2.0
                MCC: 310
                MNC: 410
                APN type: default,agps,supl,dun
                
                APN 3 (LTE, ALL THE mbps):
                Name: AT&T LTE
                APN: pta
                MMS protocol: WAP 2.0
                MCC: 310
                MNC: 410
                APN type: default,agps,supl,hipri,internet
                
                APN 4:
                Name: Cingular MMS
                APN: wap.cingular
                Proxy: wireless.cingular.com
                Port: 80
                MMSC: http://mmsc.cingular.com
                MMS proxy: wireless.cingular.com
                MMS port: 80
                MMS protocol: WAP 2.0
                MCC: 310
                MNC: 410
                APN type: mms
                
                APN 5:
                Name: AT&T LTE MMS
                APN: pta
                MMSC: http://mmsc.mobile.att.net
                MMS proxy: proxy.mobile.att.net
                MMS port: 80
                MMS protocol: WAP 2.0
                MCC: 310
                MNC: 410
                APN type: hipri,mms</not>
                

                From what I can see, I just need port 80 open outbound, which is already open as I am pretty sure I have no ports blocked outgoing.

                pfSense 2.7.2-RELEASE

                Dell R210 II
                Intel E3-1340 v2
                8GB RAM
                SSD ZFS Mirror
                Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
                1 x Cisco 3850 12XS-S (Core Switch)
                2 x Cisco 3750X PoE Gig Switch (Access Stack)
                3 x Cisco 2802i APs (Mobility Express)

                1 Reply Last reply Reply Quote 0
                • CNLiberalC
                  CNLiberal
                  last edited by

                  OK, I'm in FIREWALL:RULES.  Choosing the WAN side, this is basically the setup:

                  ```
                      Protocol          Source  Port    Destination        Port      Gateway      Queue

                   IPv4 TCP	 *	 *	MediaServer_Int	 9090	 *	 none	  
                  
                  
                  This is the same for all the open ports I have.  There are _no_ blocks listed on that tab.
                  
                  On the LAN tab:
                  
                  

                  ID Proto Source Port Destination Port Gateway Queue Schedule
                  * * * LAN Address 443,80,22 * *
                        IPv4      * * *         * * * none

                  
                  Those are my rules.  I can't see anywhere that this is being blocked.  I'm not even blocking Bogon networks at this point.

                  pfSense 2.7.2-RELEASE

                  Dell R210 II
                  Intel E3-1340 v2
                  8GB RAM
                  SSD ZFS Mirror
                  Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
                  1 x Cisco 3850 12XS-S (Core Switch)
                  2 x Cisco 3750X PoE Gig Switch (Access Stack)
                  3 x Cisco 2802i APs (Mobility Express)

                  1 Reply Last reply Reply Quote 0
                  • G
                    georgeman
                    last edited by

                    +1 to the outbound NAT static ports. Some services do not like to have their ports rewritten, and that is something that most likely "all your friends' firewall" cannot and don't do.

                    If it ain't broke, you haven't tampered enough with it

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      Well - It doesn't have to be blocked to be broken.  Static ports are assigned under NAT > Manual outbound (vs automatic)

                      I'm not sure if it will help to assign static to whichever port your phone needs (port 80 or 443 perhaps) but it might.

                      The only time I have to do that is with port 5060 UDP for my sip server.

                      1 Reply Last reply Reply Quote 0
                      • G
                        georgeman
                        last edited by

                        LogMeIn Hamachi also needs UDP ports to be static for it work properly

                        If it ain't broke, you haven't tampered enough with it

                        1 Reply Last reply Reply Quote 0
                        • CNLiberalC
                          CNLiberal
                          last edited by

                          I have finally solved the issue.  I'm so happy it's fixed.  For those that happen upon this thread, here's what I did:

                          Since I had nothing blocked in the firewall rules, and I had Outbound Manual NAT enabled that wasn't the issue.  I was in the #pfsense channel, and someone happened to come in complaining about not a ping not resolving.  Specifically, he was trying to ping:

                          ping some_DNS_name_on_internet
                          

                          It was supposed to resolve to a PRIVATE IP address, in his case, 10.0.0.1.  I could get it to resolve from my work connection (not behind pfSense).  So I began pinging the MMSC and MMS addresses in the APNs I listed earlier.  All of them resolved and/or responded, except one:

                          proxy.mobile.att.net

                          Behind the pfSense 2.1 firewall, it wouldn't resolve.  From anywhere else (from the phone disconnected from WiFi, from my office network) that address would resolve:

                          $ ping proxy.mobile.att.net
                          PING proxy.mobile.att.net (172.26.39.1) 56(84) bytes of data.
                          ^C
                          --- proxy.mobile.att.net ping statistics ---
                          2 packets transmitted, 0 received, 100% packet loss, time 1007ms
                          
                          

                          But look at the address it was resolving to!  I thought that since I had disabled blocking RFC1918 on my WAN port and LAN port, the address would have resolved.  It didn't.  The user in #pfsense said that it's not a bug, but a feature of dnsmasq and that pfSense was "protecting us from ourselves".  Very strange I thought.  But what's even stranger, was the fact that AT&T was deliberately resolving a DNS name to an RFC 1918 address on the PUBLIC internet.  My only guess is that the phone will try the WiFi first, find that this address resolves to 172.26.39.1 address, then use it's LTE radio to connect to the address since it's all on AT&T's network anyway.  Probably a static route on the LTE radio?  No idea.

                          Since it was clear that pfSense wasn't resolving this address correctly, I decided to put a "Host Over Ride" in the Services: DNS Forwarder.  I added this:

                          proxy 	 mobile.att.net 	 172.26.39.1 	 AT&T MMS Proxy 
                          

                          Once I did that, everything worked as expected.  She can send and receive MMS.  It was amazing.  I've been struggling with this for a week, and now it's working.  That also means I can go buy me the same phone :-)

                          I really hope that my struggles can help someone in the future.

                          pfSense 2.7.2-RELEASE

                          Dell R210 II
                          Intel E3-1340 v2
                          8GB RAM
                          SSD ZFS Mirror
                          Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
                          1 x Cisco 3850 12XS-S (Core Switch)
                          2 x Cisco 3750X PoE Gig Switch (Access Stack)
                          3 x Cisco 2802i APs (Mobility Express)

                          1 Reply Last reply Reply Quote 0
                          • K
                            kejianshi
                            last edited by

                            172.26.39.1  ???

                            Someone at ATT is on crack…

                            If you have registered your domain name lately, or if you move it from one provider to another, here you can check if the name www.yourdomain.com already is know by the world and if it works correctly.
                            Type in your domain name (like www.yourdomain.com) here and press the button, to see the results.
                            Resolution of proxy.mobile.att.net is 172.26.39.1

                            You are right - They hijacked a private space.  haha.

                            I've seen people on this forum hijack public space, but I've not seen a behemoth like ATT be that dumb before.
                            For me, its a first.  Never would have figured it out.

                            1 Reply Last reply Reply Quote 0
                            • R
                              razzfazz
                              last edited by

                              An alternative solution is to check "disable DNS rebinding checks" in system -> advanced.

                              1 Reply Last reply Reply Quote 1
                              • CNLiberalC
                                CNLiberal
                                last edited by

                                @kejianshi:

                                172.26.39.1  ???

                                Someone at ATT is on crack…

                                If you have registered your domain name lately, or if you move it from one provider to another, here you can check if the name www.yourdomain.com already is know by the world and if it works correctly.
                                Type in your domain name (like www.yourdomain.com) here and press the button, to see the results.
                                Resolution of proxy.mobile.att.net is 172.26.39.1

                                You are right - They hijacked a private space.  haha.

                                I've seen people on this forum hijack public space, but I've not seen a behemoth like ATT be that dumb before.
                                For me, its a first.  Never would have figured it out.

                                Thanks for sticking with me during this extremely odd situation.  You were the only one giving me good feedback during this ordeal.  Luckily, that guy happened to pop into #pfsense at the same time I was there and reported the same issue.

                                pfSense 2.7.2-RELEASE

                                Dell R210 II
                                Intel E3-1340 v2
                                8GB RAM
                                SSD ZFS Mirror
                                Intel X520-DA2, RJ45 SFP+ (WAN) and 10Gb SFP+ DAC (LAN)
                                1 x Cisco 3850 12XS-S (Core Switch)
                                2 x Cisco 3750X PoE Gig Switch (Access Stack)
                                3 x Cisco 2802i APs (Mobility Express)

                                1 Reply Last reply Reply Quote 0
                                • K
                                  kejianshi
                                  last edited by

                                  Well - Of course the best fix for this has nothing to do with pfsense.
                                  The best fix would be for ATT to get an IP for their proxy in the public range.

                                  Maybe give them a call and tell them what you think?

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.