Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How can I get this UDP relay package for casting across VLANs?

    Scheduled Pinned Locked Moved pfSense Packages
    123 Posts 21 Posters 57.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      Itar @tman222
      last edited by

      Ahhhhh,

      /usr/bin/nohup /usr/local/sbin/udpbroadcastrelay --id 1 --port 5353 --dev igb0 --dev igb1 --multicast 224.0.0.251 -s 1.1.1.1 -f > /dev/null

      is working! šŸ‘

      Thanks!

      C 1 Reply Last reply Reply Quote 0
      • C
        CaptainCathode @Itar
        last edited by CaptainCathode

        Re: How can I get this UDP relay package for casting across VLANs?

        So I just came across this thread after trying for over a day to get Sonos clients on my LAN subnet discovering the Sonos devices on an isolated IOT subnet using the PIMD package as a multicast reflector.

        IOS clients that had previously been connected when everything was on the same subnet continue to work once the relevant firewall rules were setup, but new clients (Mac, Win10) can't discover the Sonos device.

        I've removed PIMD, rebooted and installed the package as per the instructions above. I'm seeing the following error when trying to run the command (as root) with the debug option:

        # udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -d
        ID set to 1
        Port set to 1900
        ID: 1 (DSCP: 1, ToS: 0x04), Port 1900
        igb1: 2 / 172.16.10.1 / 172.16.10.255
        igb2: 3 / 172.16.20.1 / 172.16.20.255
        found 2 interfaces total
        IP_ADD_MEMBERSHIP:		172.16.10.1 239.255.255.250
        IP_ADD_MEMBERSHIP:		172.16.20.1 239.255.255.250
        bind: Address already in use
        rcv bind
        
        

        Not sure what would already be using 239.255.255.250:1900 or how to go about debugging from here.

        Any pointers greatly appreciated

        S 1 Reply Last reply Reply Quote 0
        • QinnQ
          Qinn
          last edited by

          did you do a ps to check if it is already running?

          Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
          Firmware: Latest-stable-pfSense CE (amd64)
          Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

          C 1 Reply Last reply Reply Quote 0
          • C
            CaptainCathode @Qinn
            last edited by CaptainCathode

            There are no other instances of udpbroadcastrelay running but pfTop shows an existing state from the pfsense interface on the IOT subnet.

            pfTop: Up State 1-1/1 (545), View: default, Order: bytes
            PR        DIR SRC                           DEST                                   STATE                AGE       EXP     PKTS    BYTES
            udp       Out 172.16.20.1:52980             239.255.255.250:1900               SINGLE:NO_TRAFFIC   00:02:52  00:00:09      132    62676
            

            I'll try temporarily powering down all other devices on that subnet and see if that helps

            1 Reply Last reply Reply Quote 0
            • QinnQ
              Qinn
              last edited by Qinn

              The way to check if it running and to stop udpbroadcastrelay is using the ps command and kill the process using it's process number (PID)

              [2.5.0-RELEASE][root@pfSense.localdomain]/root: ps
                PID TT  STAT     TIME COMMAND
               7615 u0- S    41:14.27 /usr/local/sbin/pcscd
              60580 u0  Is    0:00.02 login [pam] (login)
              60845 u0  I     0:00.01 -sh (sh)
              61388 u0  I+    0:00.01 /bin/sh /etc/rc.initial
               2456 v0  I     0:00.02 -sh (sh)
               3896 v0  I+    0:00.01 /bin/sh /etc/rc.initial
              99884 v0  Is    0:00.02 login [pam] (login)
                188 v1  Is+   0:00.01 /usr/libexec/getty Pc ttyv1
                330 v2  Is+   0:00.01 /usr/libexec/getty Pc ttyv2
                368 v3  Is+   0:00.01 /usr/libexec/getty Pc ttyv3
                579 v4  Is+   0:00.01 /usr/libexec/getty Pc ttyv4
                592 v5  Is+   0:00.01 /usr/libexec/getty Pc ttyv5
               1002 v6  Is+   0:00.01 /usr/libexec/getty Pc ttyv6
               1293 v7  Is+   0:00.01 /usr/libexec/getty Pc ttyv7
               6730  0  S     0:00.00 udpbroadcastrelay --id 1 --port 1900 --dev igb1.1005 --dev igb1.1007 --multicast 239.255.255.250 -f
               6919  0  R+    0:00.01 ps
              41171  0  Is    0:00.02 -sh (sh)
              41565  0  I     0:00.01 /bin/sh /etc/rc.initial
              45295  0  S     0:00.12 /bin/tcsh
              
              
              /root: kill 6730
              
              
              [2.5.0-RELEASE][root@pfSense.localdomain]/root: ps
                PID TT  STAT     TIME COMMAND
               7615 u0- S    41:14.29 /usr/local/sbin/pcscd
              60580 u0  Is    0:00.02 login [pam] (login)
              60845 u0  I     0:00.01 -sh (sh)
              61388 u0  I+    0:00.01 /bin/sh /etc/rc.initial
               2456 v0  I     0:00.02 -sh (sh)
               3896 v0  I+    0:00.01 /bin/sh /etc/rc.initial
              99884 v0  Is    0:00.02 login [pam] (login)
                188 v1  Is+   0:00.01 /usr/libexec/getty Pc ttyv1
                330 v2  Is+   0:00.01 /usr/libexec/getty Pc ttyv2
                368 v3  Is+   0:00.01 /usr/libexec/getty Pc ttyv3
                579 v4  Is+   0:00.01 /usr/libexec/getty Pc ttyv4
                592 v5  Is+   0:00.01 /usr/libexec/getty Pc ttyv5
               1002 v6  Is+   0:00.01 /usr/libexec/getty Pc ttyv6
               1293 v7  Is+   0:00.01 /usr/libexec/getty Pc ttyv7
              37961  0  R+    0:00.00 ps
              41171  0  Is    0:00.02 -sh (sh)
              41565  0  I     0:00.01 /bin/sh /etc/rc.initial
              45295  0  S     0:00.13 /bin/tcsh
              
              

              Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
              Firmware: Latest-stable-pfSense CE (amd64)
              Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

              1 Reply Last reply Reply Quote 0
              • S
                sinbox_pfs @CaptainCathode
                last edited by sinbox_pfs

                @captaincathode Would be good to disable other related plugins and/or other firewall rules on you IoT subnet like Avahi etc if you ever had them installled.

                C 1 Reply Last reply Reply Quote 0
                • S
                  sinbox_pfs
                  last edited by

                  Anyone here using HomeKit across VLAN’s? I have Apple’s Home app successfully work to recognise and control many devices on my IoT VLAN’s.

                  One minor annoyance I have been having is with a particular smart home device - Meross Garage opener (HomeKit version). Their mobile app works fine over VLAN’s, however via the native Apple Home app(& via Siri) I’m unable to open the garage on the first request (even though the app acknowledges that the request has been successfully completed). The subsequent call / 2nd request always works like a charm and the garage opens up consistently. This means my garage door automations don’t work as expected via the Shortcuts or Home App.

                  I’m wondering if that’s due to the nature of VLAN hops and how that specific device works across VLAN’s? Or some other issue related to HomeKit or the Home App on iOS itself? FWIW, I have plenty of other IoT devices(eg Light Bulbs, Sonos speakers etc) connected via HomeBridge all of which work fine (mostly :-)) on the first attempt.

                  1 Reply Last reply Reply Quote 0
                  • C
                    CaptainCathode @sinbox_pfs
                    last edited by CaptainCathode

                    Getting back to this after nearly two weeks of being too busy to look at it . . .

                    I found that UPnP/NAT-PMP was preventing udpbroadcastrelay from starting. I have an XBox One on the same IOT subnet, and pfSense is configured to allow it to use UPnP.

                    If I stop the UpNP/NAT-PMP daemon (miniupnpd) I can successfully start udpbroadcastrelay and my Sonos controller can now see the devices across subnets.

                    udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -d
                    

                    Of course then I can't start miniupnpd again until the udpbroadcastrelay process is killed, so it seems the two are mutually exclusive, or at least when both are trying to use UDP 1900 (SSDP) on multicast address (239.255.255.250).

                    Other than moving the XBox or Sonos devices into their own VLAN, I can't see a workable solution here, but admittedly my IPv4 multicast knowledge is pretty basic.

                    Any further suggestions welcomed.

                    1 Reply Last reply Reply Quote 0
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Yes, you can't have two processes listening on the same port like that. You can either relay the SSDP packets or accept and use them with UPnP. Or be more secure and do neither. šŸ˜‰

                      Steve

                      B 1 Reply Last reply Reply Quote 0
                      • S
                        spaceboy
                        last edited by spaceboy

                        Took a look at this as i was hoping it could help me overcome what PIMD seemingly could not, that is the initial discovery of SONOS devices on other VLANS. My set up was working fine once the controller had been connected to the SONOS VLAN and cached the ip addresses.

                        Unfortunately it does not. Followed what seems to be the fairly straightforward step by step guide by Qinn in post 55 and everything seems to work but nothing is discovered when i restart the pfsense.

                        Shellcmd per below
                        19402587-9712-4b73-8b4e-b8cab4e18648-image.png

                        is there any way i can check it is properly running? other than SONOS detection working :)

                        C 1 Reply Last reply Reply Quote 0
                        • C
                          CaptainCathode @spaceboy
                          last edited by

                          @spaceboy - a few suggestions based on my trial and error experiences.

                          SSH to the console and check if the process is running:

                          [2.5.1-RELEASE][user@pf.internal.xxx.net]/home/user sudo ps | grep udpbroadcastrelay
                          13600 u0- S    0:02.44 /usr/local/sbin/udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -f
                          

                          Check the path to the udbbroadcastrelay executable:

                          find / -name updbroadcastrelay
                          

                          My working shellcmd entry is:

                          /usr/bin/nohup /usr/local/sbin/udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -f > /dev/null
                          

                          Run pfTop From the diagnostics menu and filter on port 1900. You should be able to see your Sonos devices periodically connecting:
                          Screenshot 2021-04-29 104221.jpg

                          Also check that you don't have anything else on pfSense running a process bound to UDP/1900 on the same subnet/vlan. I initially had UPnP/NAT-PMP running for the XBox that's on the same subnet as my Sonos devices. That stopped udpbroadcastrelay from working so I made an executive decision that my kids could live without being able to host games and disabled UPnP for the Xbox šŸ™‚

                          Hope that helps

                          S 1 Reply Last reply Reply Quote 1
                          • S
                            spaceboy @CaptainCathode
                            last edited by

                            @captaincathode thanks for the pointers, i think it helped a bit. linux doesnt really like me much so took me a little while to work through this.

                            i think its running on the pfsense now. in the console i see 371a09e0-0aa2-4755-b04f-9f33a3bc7d27-image.png

                            for me executing that command to check the path to the udbbroadcastrelay executable returns nothing but i don't know if this is some result of me ssh'ing via admin or what? i also noticed the sudo command wasnt needed on the previous and i understand just enough to know thats related to the admin account.

                            I moved the executable from /root to /usr/local/sbin to match yours but i kept it in a subfolder so my shellcmd is
                            da42bfcb-96a0-418d-bc07-b6aef9fb2095-image.png

                            and in pftop i see6bbce1c2-6d29-49b0-9394-7c78a87f94fb-image.png
                            which seems to me to be good.

                            but the result is still the same. nothing found by controllers on either windows, android or ios. so i guess whatever the problem is it was probably the same for pimd and that was working too.

                            my uneducated thought process says there must be something else on the network blocking the broadcast. i have a few switches and a unifi controller running the wireless AP's. is it possible any one of these could be blocking the multicast?

                            1 Reply Last reply Reply Quote 0
                            • ?
                              A Former User
                              last edited by

                              @spaceboy you’re saying you have Unifi deployed. Do you by chance have the ā€œAuto Optimizeā€ function or ā€œBlock LAN to WLAN multicast and broadcastā€ enabled? These might be the culprit.

                              Otherwise, you might want to look into:

                              • Whether your interfaces (vlans) match in the shellcmd command
                              • Firewall rules that block communication
                              S 1 Reply Last reply Reply Quote 1
                              • S
                                spaceboy @A Former User
                                last edited by

                                @mg85 thanks, i do have Auto Optimize enabled but not the second.

                                Also i previously had this working under PIMD once the SONOS controller cached the SONOS devices ip addresses so i don't think its firewall rules.

                                To be honest i have given up on this for now. I believe i did try with my Sonos One wired into one of the switches to try and determine whether unifi was to blame and i don't think it worked. So i feel it may be more than unifi.

                                I'm also questioning whether IOT stuff and Sonos devices need seperate VLANs anyway. it was a nice little project but i'm not certain its worth the effort given the large number of ports i have seen people posting about need to have open even once multicast is working. Actually on that point, i'd be interested in understanding people's driver for segregating SONOS devices like this.

                                Hope to give this another try at some point. Ta

                                1 Reply Last reply Reply Quote 0
                                • bitrotB
                                  bitrot @burntoc
                                  last edited by bitrot

                                  This was an immensely helpful thread for me. Yet I had problems still with discovery. It turns out that I needed to do additional work because I have Captive Portal setup on my IoT VLAN
                                  I resolved that issue here: https://forum.netgate.com/topic/164733/captive-portal-causing-sendto-permission-denied-errors-with-udpbroadcastrelay
                                  Leaving a reference to it here. Maybe it'll help someone else.

                                  G 1 Reply Last reply Reply Quote 1
                                  • G
                                    grillp @bitrot
                                    last edited by

                                    Super helpful thread!

                                    I have aVLAN for IoT devices and found this thread to help setup the "Bonjour/Chromcast/mDNS" broadcast between my main vlan and IOT vlan.

                                    After starting the udpbroadczatrelay I was seeing devices on my vLAN appear, albeit slowly, and periodically disappearing. I used Bonjour Browser (Discovery app from the OSX App store) on my Mac to monitor it. I also ran avahi-browse -a on a wired LAN device to watch the comings and goings of the iOT devices.

                                    One minute they were there, the next they were gone and did not come back.

                                    I also could not use the <my_iot_device>.local dns lookups for those IOT devices from my main LAN (.local look up also use mDNS).

                                    I then put udpbroadcastrelay into debug mode (-d) and only saw traffic going LAN vlan -> my IOT vlan, but not the other way around. So no broadcast traffic being received into updbroadcastrelay from the IOT vlan.

                                    I then added a rule to my firewall in Firewall > Rules > IOT (where IOT is my vlan interface) to allow incoming traffic to the IOT vlan Interface, from the IOT net, with destination being the broadcast IP (224.0.0.251) and the broadcast port (5353):

                                    b9a65ceb-95e7-4fc8-9d43-7e1fa7756909-image.png

                                    And everything started working! All my devices are now rock solidly discoverable, and the .local look ups work fine!

                                    It still does not explain why without the rule the devices were showing up intermittently, but it all seems to work now!
                                    Thanks to everyone that added to this thread!

                                    1 Reply Last reply Reply Quote 0
                                    • stephenw10S
                                      stephenw10 Netgate Administrator
                                      last edited by

                                      What rules did you have there before? I assume you were seeing blocked traffic on IOT?

                                      I expect to need the IP options flag set in a rule for multicast traffic like that.

                                      Steve

                                      G 1 Reply Last reply Reply Quote 0
                                      • G
                                        grillp @stephenw10
                                        last edited by grillp

                                        @stephenw10 said in How can I get this UDP relay package for casting across VLANs?:

                                        I assume you were seeing blocked traffic on IOT

                                        I had a rule which allowed UDP traffic on port 5353 on the IOT interface, but the destination was an RFC1918 alias (Non Routeable IP Addresses), which I then changed to to 244.0.0.251 to make it work.

                                        I wonder if mDNS clients also send out to other multicast addresses at times, which is why some slipped through?

                                        Now I have:
                                        9de1ed3b-29d9-4021-b563-bf8381897f53-image.png

                                        DNS rule required to get my MQTT adddress through DNS.

                                        Then the invisible, default DROP Everything rule, so I could not see what else was being blocked.

                                        bitrotB 1 Reply Last reply Reply Quote 0
                                        • bitrotB
                                          bitrot @grillp
                                          last edited by bitrot

                                          @grillp

                                          The UDP relay package is only one part of this puzzle. It helps the secure LAN side "discover" your Bonjour/Chromecast/mDNS/Sonos/SSDP/etc devices.

                                          But in addition to that, you are going to have to punch some holes into your firewall so that those devices can communicate with stuff that's on your secure LAN.

                                          This post helped me with Sonos stuff but can also be used as a basis for anything else.: https://www.reddit.com/r/Ubiquiti/comments/gu19sa/iot_vlan_settings_specific_to_sonos/

                                          Here's what the end result looks like in the firewall rules on my IoT interface
                                          son is an alias containing the IPs of Sonos hosts
                                          Sonos_TCP0, Sonos_UDP0, Sonos_TCP1, and Sonos_UDP1 are aliases for the ports needed, as outlined in the Reddit thread specific to Sonos. These might not apply to your situation. But remember, your IoT devices might require being allowed to initiate some traffic to your LAN devices. Unless you open up the ports required, things might not work right.

                                          60a861cb-7295-480c-8883-c951772c5dba-image.png

                                          1 Reply Last reply Reply Quote 3
                                          • B
                                            brswattt @stephenw10
                                            last edited by

                                            @stephenw10 Hey stephen, I know this is an old thread but I didn't want to PM you.

                                            I have this same scenario. UPnp was nice for online services like Xbox, Call of Duty, etc.
                                            You mention accepting and using the SSDP packets with UPnP. How is something like this achieved?

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.