Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How can I get this UDP relay package for casting across VLANs?

    Scheduled Pinned Locked Moved pfSense Packages
    123 Posts 21 Posters 57.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      CaptainCathode @Itar
      last edited by CaptainCathode

      Re: How can I get this UDP relay package for casting across VLANs?

      So I just came across this thread after trying for over a day to get Sonos clients on my LAN subnet discovering the Sonos devices on an isolated IOT subnet using the PIMD package as a multicast reflector.

      IOS clients that had previously been connected when everything was on the same subnet continue to work once the relevant firewall rules were setup, but new clients (Mac, Win10) can't discover the Sonos device.

      I've removed PIMD, rebooted and installed the package as per the instructions above. I'm seeing the following error when trying to run the command (as root) with the debug option:

      # udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -d
      ID set to 1
      Port set to 1900
      ID: 1 (DSCP: 1, ToS: 0x04), Port 1900
      igb1: 2 / 172.16.10.1 / 172.16.10.255
      igb2: 3 / 172.16.20.1 / 172.16.20.255
      found 2 interfaces total
      IP_ADD_MEMBERSHIP:		172.16.10.1 239.255.255.250
      IP_ADD_MEMBERSHIP:		172.16.20.1 239.255.255.250
      bind: Address already in use
      rcv bind
      
      

      Not sure what would already be using 239.255.255.250:1900 or how to go about debugging from here.

      Any pointers greatly appreciated

      S 1 Reply Last reply Reply Quote 0
      • QinnQ
        Qinn
        last edited by

        did you do a ps to check if it is already running?

        Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
        Firmware: Latest-stable-pfSense CE (amd64)
        Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

        C 1 Reply Last reply Reply Quote 0
        • C
          CaptainCathode @Qinn
          last edited by CaptainCathode

          There are no other instances of udpbroadcastrelay running but pfTop shows an existing state from the pfsense interface on the IOT subnet.

          pfTop: Up State 1-1/1 (545), View: default, Order: bytes
          PR        DIR SRC                           DEST                                   STATE                AGE       EXP     PKTS    BYTES
          udp       Out 172.16.20.1:52980             239.255.255.250:1900               SINGLE:NO_TRAFFIC   00:02:52  00:00:09      132    62676
          

          I'll try temporarily powering down all other devices on that subnet and see if that helps

          1 Reply Last reply Reply Quote 0
          • QinnQ
            Qinn
            last edited by Qinn

            The way to check if it running and to stop udpbroadcastrelay is using the ps command and kill the process using it's process number (PID)

            [2.5.0-RELEASE][root@pfSense.localdomain]/root: ps
              PID TT  STAT     TIME COMMAND
             7615 u0- S    41:14.27 /usr/local/sbin/pcscd
            60580 u0  Is    0:00.02 login [pam] (login)
            60845 u0  I     0:00.01 -sh (sh)
            61388 u0  I+    0:00.01 /bin/sh /etc/rc.initial
             2456 v0  I     0:00.02 -sh (sh)
             3896 v0  I+    0:00.01 /bin/sh /etc/rc.initial
            99884 v0  Is    0:00.02 login [pam] (login)
              188 v1  Is+   0:00.01 /usr/libexec/getty Pc ttyv1
              330 v2  Is+   0:00.01 /usr/libexec/getty Pc ttyv2
              368 v3  Is+   0:00.01 /usr/libexec/getty Pc ttyv3
              579 v4  Is+   0:00.01 /usr/libexec/getty Pc ttyv4
              592 v5  Is+   0:00.01 /usr/libexec/getty Pc ttyv5
             1002 v6  Is+   0:00.01 /usr/libexec/getty Pc ttyv6
             1293 v7  Is+   0:00.01 /usr/libexec/getty Pc ttyv7
             6730  0  S     0:00.00 udpbroadcastrelay --id 1 --port 1900 --dev igb1.1005 --dev igb1.1007 --multicast 239.255.255.250 -f
             6919  0  R+    0:00.01 ps
            41171  0  Is    0:00.02 -sh (sh)
            41565  0  I     0:00.01 /bin/sh /etc/rc.initial
            45295  0  S     0:00.12 /bin/tcsh
            
            
            /root: kill 6730
            
            
            [2.5.0-RELEASE][root@pfSense.localdomain]/root: ps
              PID TT  STAT     TIME COMMAND
             7615 u0- S    41:14.29 /usr/local/sbin/pcscd
            60580 u0  Is    0:00.02 login [pam] (login)
            60845 u0  I     0:00.01 -sh (sh)
            61388 u0  I+    0:00.01 /bin/sh /etc/rc.initial
             2456 v0  I     0:00.02 -sh (sh)
             3896 v0  I+    0:00.01 /bin/sh /etc/rc.initial
            99884 v0  Is    0:00.02 login [pam] (login)
              188 v1  Is+   0:00.01 /usr/libexec/getty Pc ttyv1
              330 v2  Is+   0:00.01 /usr/libexec/getty Pc ttyv2
              368 v3  Is+   0:00.01 /usr/libexec/getty Pc ttyv3
              579 v4  Is+   0:00.01 /usr/libexec/getty Pc ttyv4
              592 v5  Is+   0:00.01 /usr/libexec/getty Pc ttyv5
             1002 v6  Is+   0:00.01 /usr/libexec/getty Pc ttyv6
             1293 v7  Is+   0:00.01 /usr/libexec/getty Pc ttyv7
            37961  0  R+    0:00.00 ps
            41171  0  Is    0:00.02 -sh (sh)
            41565  0  I     0:00.01 /bin/sh /etc/rc.initial
            45295  0  S     0:00.13 /bin/tcsh
            
            

            Hardeware: Intel(R) Celeron(R) J4125 CPU @ 2.00GHz 102 GB mSATA SSD (ZFS)
            Firmware: Latest-stable-pfSense CE (amd64)
            Packages: pfBlockerNG devel-beta (beta tester) - Avahi - Notes - Ntopng - PIMD/udpbroadcastrelay - Service Watchdog - System Patches

            1 Reply Last reply Reply Quote 0
            • S
              sinbox_pfs @CaptainCathode
              last edited by sinbox_pfs

              @captaincathode Would be good to disable other related plugins and/or other firewall rules on you IoT subnet like Avahi etc if you ever had them installled.

              C 1 Reply Last reply Reply Quote 0
              • S
                sinbox_pfs
                last edited by

                Anyone here using HomeKit across VLAN’s? I have Apple’s Home app successfully work to recognise and control many devices on my IoT VLAN’s.

                One minor annoyance I have been having is with a particular smart home device - Meross Garage opener (HomeKit version). Their mobile app works fine over VLAN’s, however via the native Apple Home app(& via Siri) I’m unable to open the garage on the first request (even though the app acknowledges that the request has been successfully completed). The subsequent call / 2nd request always works like a charm and the garage opens up consistently. This means my garage door automations don’t work as expected via the Shortcuts or Home App.

                I’m wondering if that’s due to the nature of VLAN hops and how that specific device works across VLAN’s? Or some other issue related to HomeKit or the Home App on iOS itself? FWIW, I have plenty of other IoT devices(eg Light Bulbs, Sonos speakers etc) connected via HomeBridge all of which work fine (mostly :-)) on the first attempt.

                1 Reply Last reply Reply Quote 0
                • C
                  CaptainCathode @sinbox_pfs
                  last edited by CaptainCathode

                  Getting back to this after nearly two weeks of being too busy to look at it . . .

                  I found that UPnP/NAT-PMP was preventing udpbroadcastrelay from starting. I have an XBox One on the same IOT subnet, and pfSense is configured to allow it to use UPnP.

                  If I stop the UpNP/NAT-PMP daemon (miniupnpd) I can successfully start udpbroadcastrelay and my Sonos controller can now see the devices across subnets.

                  udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -d
                  

                  Of course then I can't start miniupnpd again until the udpbroadcastrelay process is killed, so it seems the two are mutually exclusive, or at least when both are trying to use UDP 1900 (SSDP) on multicast address (239.255.255.250).

                  Other than moving the XBox or Sonos devices into their own VLAN, I can't see a workable solution here, but admittedly my IPv4 multicast knowledge is pretty basic.

                  Any further suggestions welcomed.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes, you can't have two processes listening on the same port like that. You can either relay the SSDP packets or accept and use them with UPnP. Or be more secure and do neither. 😉

                    Steve

                    B 1 Reply Last reply Reply Quote 0
                    • S
                      spaceboy
                      last edited by spaceboy

                      Took a look at this as i was hoping it could help me overcome what PIMD seemingly could not, that is the initial discovery of SONOS devices on other VLANS. My set up was working fine once the controller had been connected to the SONOS VLAN and cached the ip addresses.

                      Unfortunately it does not. Followed what seems to be the fairly straightforward step by step guide by Qinn in post 55 and everything seems to work but nothing is discovered when i restart the pfsense.

                      Shellcmd per below
                      19402587-9712-4b73-8b4e-b8cab4e18648-image.png

                      is there any way i can check it is properly running? other than SONOS detection working :)

                      C 1 Reply Last reply Reply Quote 0
                      • C
                        CaptainCathode @spaceboy
                        last edited by

                        @spaceboy - a few suggestions based on my trial and error experiences.

                        SSH to the console and check if the process is running:

                        [2.5.1-RELEASE][user@pf.internal.xxx.net]/home/user sudo ps | grep udpbroadcastrelay
                        13600 u0- S    0:02.44 /usr/local/sbin/udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -f
                        

                        Check the path to the udbbroadcastrelay executable:

                        find / -name updbroadcastrelay
                        

                        My working shellcmd entry is:

                        /usr/bin/nohup /usr/local/sbin/udpbroadcastrelay --id 1 --port 1900 --dev igb1 --dev igb2 --multicast 239.255.255.250 -f > /dev/null
                        

                        Run pfTop From the diagnostics menu and filter on port 1900. You should be able to see your Sonos devices periodically connecting:
                        Screenshot 2021-04-29 104221.jpg

                        Also check that you don't have anything else on pfSense running a process bound to UDP/1900 on the same subnet/vlan. I initially had UPnP/NAT-PMP running for the XBox that's on the same subnet as my Sonos devices. That stopped udpbroadcastrelay from working so I made an executive decision that my kids could live without being able to host games and disabled UPnP for the Xbox 🙂

                        Hope that helps

                        S 1 Reply Last reply Reply Quote 1
                        • S
                          spaceboy @CaptainCathode
                          last edited by

                          @captaincathode thanks for the pointers, i think it helped a bit. linux doesnt really like me much so took me a little while to work through this.

                          i think its running on the pfsense now. in the console i see 371a09e0-0aa2-4755-b04f-9f33a3bc7d27-image.png

                          for me executing that command to check the path to the udbbroadcastrelay executable returns nothing but i don't know if this is some result of me ssh'ing via admin or what? i also noticed the sudo command wasnt needed on the previous and i understand just enough to know thats related to the admin account.

                          I moved the executable from /root to /usr/local/sbin to match yours but i kept it in a subfolder so my shellcmd is
                          da42bfcb-96a0-418d-bc07-b6aef9fb2095-image.png

                          and in pftop i see6bbce1c2-6d29-49b0-9394-7c78a87f94fb-image.png
                          which seems to me to be good.

                          but the result is still the same. nothing found by controllers on either windows, android or ios. so i guess whatever the problem is it was probably the same for pimd and that was working too.

                          my uneducated thought process says there must be something else on the network blocking the broadcast. i have a few switches and a unifi controller running the wireless AP's. is it possible any one of these could be blocking the multicast?

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User
                            last edited by

                            @spaceboy you’re saying you have Unifi deployed. Do you by chance have the “Auto Optimize” function or “Block LAN to WLAN multicast and broadcast” enabled? These might be the culprit.

                            Otherwise, you might want to look into:

                            • Whether your interfaces (vlans) match in the shellcmd command
                            • Firewall rules that block communication
                            S 1 Reply Last reply Reply Quote 1
                            • S
                              spaceboy @A Former User
                              last edited by

                              @mg85 thanks, i do have Auto Optimize enabled but not the second.

                              Also i previously had this working under PIMD once the SONOS controller cached the SONOS devices ip addresses so i don't think its firewall rules.

                              To be honest i have given up on this for now. I believe i did try with my Sonos One wired into one of the switches to try and determine whether unifi was to blame and i don't think it worked. So i feel it may be more than unifi.

                              I'm also questioning whether IOT stuff and Sonos devices need seperate VLANs anyway. it was a nice little project but i'm not certain its worth the effort given the large number of ports i have seen people posting about need to have open even once multicast is working. Actually on that point, i'd be interested in understanding people's driver for segregating SONOS devices like this.

                              Hope to give this another try at some point. Ta

                              1 Reply Last reply Reply Quote 0
                              • bitrotB
                                bitrot @burntoc
                                last edited by bitrot

                                This was an immensely helpful thread for me. Yet I had problems still with discovery. It turns out that I needed to do additional work because I have Captive Portal setup on my IoT VLAN
                                I resolved that issue here: https://forum.netgate.com/topic/164733/captive-portal-causing-sendto-permission-denied-errors-with-udpbroadcastrelay
                                Leaving a reference to it here. Maybe it'll help someone else.

                                G 1 Reply Last reply Reply Quote 1
                                • G
                                  grillp @bitrot
                                  last edited by

                                  Super helpful thread!

                                  I have aVLAN for IoT devices and found this thread to help setup the "Bonjour/Chromcast/mDNS" broadcast between my main vlan and IOT vlan.

                                  After starting the udpbroadczatrelay I was seeing devices on my vLAN appear, albeit slowly, and periodically disappearing. I used Bonjour Browser (Discovery app from the OSX App store) on my Mac to monitor it. I also ran avahi-browse -a on a wired LAN device to watch the comings and goings of the iOT devices.

                                  One minute they were there, the next they were gone and did not come back.

                                  I also could not use the <my_iot_device>.local dns lookups for those IOT devices from my main LAN (.local look up also use mDNS).

                                  I then put udpbroadcastrelay into debug mode (-d) and only saw traffic going LAN vlan -> my IOT vlan, but not the other way around. So no broadcast traffic being received into updbroadcastrelay from the IOT vlan.

                                  I then added a rule to my firewall in Firewall > Rules > IOT (where IOT is my vlan interface) to allow incoming traffic to the IOT vlan Interface, from the IOT net, with destination being the broadcast IP (224.0.0.251) and the broadcast port (5353):

                                  b9a65ceb-95e7-4fc8-9d43-7e1fa7756909-image.png

                                  And everything started working! All my devices are now rock solidly discoverable, and the .local look ups work fine!

                                  It still does not explain why without the rule the devices were showing up intermittently, but it all seems to work now!
                                  Thanks to everyone that added to this thread!

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    What rules did you have there before? I assume you were seeing blocked traffic on IOT?

                                    I expect to need the IP options flag set in a rule for multicast traffic like that.

                                    Steve

                                    G 1 Reply Last reply Reply Quote 0
                                    • G
                                      grillp @stephenw10
                                      last edited by grillp

                                      @stephenw10 said in How can I get this UDP relay package for casting across VLANs?:

                                      I assume you were seeing blocked traffic on IOT

                                      I had a rule which allowed UDP traffic on port 5353 on the IOT interface, but the destination was an RFC1918 alias (Non Routeable IP Addresses), which I then changed to to 244.0.0.251 to make it work.

                                      I wonder if mDNS clients also send out to other multicast addresses at times, which is why some slipped through?

                                      Now I have:
                                      9de1ed3b-29d9-4021-b563-bf8381897f53-image.png

                                      DNS rule required to get my MQTT adddress through DNS.

                                      Then the invisible, default DROP Everything rule, so I could not see what else was being blocked.

                                      bitrotB 1 Reply Last reply Reply Quote 0
                                      • bitrotB
                                        bitrot @grillp
                                        last edited by bitrot

                                        @grillp

                                        The UDP relay package is only one part of this puzzle. It helps the secure LAN side "discover" your Bonjour/Chromecast/mDNS/Sonos/SSDP/etc devices.

                                        But in addition to that, you are going to have to punch some holes into your firewall so that those devices can communicate with stuff that's on your secure LAN.

                                        This post helped me with Sonos stuff but can also be used as a basis for anything else.: https://www.reddit.com/r/Ubiquiti/comments/gu19sa/iot_vlan_settings_specific_to_sonos/

                                        Here's what the end result looks like in the firewall rules on my IoT interface
                                        son is an alias containing the IPs of Sonos hosts
                                        Sonos_TCP0, Sonos_UDP0, Sonos_TCP1, and Sonos_UDP1 are aliases for the ports needed, as outlined in the Reddit thread specific to Sonos. These might not apply to your situation. But remember, your IoT devices might require being allowed to initiate some traffic to your LAN devices. Unless you open up the ports required, things might not work right.

                                        60a861cb-7295-480c-8883-c951772c5dba-image.png

                                        1 Reply Last reply Reply Quote 3
                                        • B
                                          brswattt @stephenw10
                                          last edited by

                                          @stephenw10 Hey stephen, I know this is an old thread but I didn't want to PM you.

                                          I have this same scenario. UPnp was nice for online services like Xbox, Call of Duty, etc.
                                          You mention accepting and using the SSDP packets with UPnP. How is something like this achieved?

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            Can you clarify that? The UPnP service in pfSense only supports the Internet Gateway Device part of the protocol.

                                            Steve

                                            B 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.