Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Unable to open port 8883 for MyQ garage opener

    Scheduled Pinned Locked Moved Firewalling
    32 Posts 6 Posters 5.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @cheapie408
      last edited by

      @cheapie408 said in Unable to open port 8883 for MyQ garage opener:

      Still looking for a solution to this. :(

      Solution to what exactly.. There are no inbound traffic needed for this, there is no UPnP needed for this.. The chamberlin hub makes outbound connections on that port..

      I just looked and here is mine

      hub.jpg

      3.99 is my hub IP..

      There is nothing in pfsense that would prevent this out of the box. Been working for years on pfsense for me - zero to do.. So unless you are blocking outbound traffic, there is nothing to do. Are you running IPS, or using block lists for ips in pfblocker?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 1
      • C
        cheapie408
        last edited by

        I google this issue and there seems to be several other people with the exact issue.

        For kicks, I added a DMZ VLAN on PFSense and Created a seperate network assigned to the DMZ VLan I only have the MyQ device on this and it has been working for the past hour.

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @cheapie408
          last edited by johnpoz

          @cheapie408 so your saying on the lan with any any rule it doesn't work, but on a new network say 192.168.2/24 instead of 192.168.1/24 and any any rules it works without any problems??

          Think about that for like .2 seconds - does that even possible remotely sound like it could happen?

          Are you routing traffic out a vpn? Have you messed with outbound nat other then automatic?

          This works for years for me - even linked to article how this works. There is nothing special going on there - this is like your browser going to www.google.com - its just a different port.. Pfsense doesn't care what port your talking on outbound.. tcp is tcp is tcp, etc..

          Maybe you had a duplicate IP setup for what IP your hub was? Without some actual specifics from you it is impossible what odd thing you had going on.. But there is nothing special you have to do in pfsense to allow that device to work.. That would work straight out of the box..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          C 1 Reply Last reply Reply Quote 0
          • C
            cheapie408 @johnpoz
            last edited by

            @johnpoz

            Here's what my rule looks like. I honestly don't know I've been doing so many different things and the only thing that works on setting up a DMZ VLAN
            alt text

            alt text

            alt text

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @cheapie408
              last edited by johnpoz

              @cheapie408 those rules are pretty pointless.. You sure and the hell do not need anything on wan for it to work... Again there is NO INBOUND traffic needed for this tor work. And those rules on wan only come into play if you actually had a port forward setup..

              Your lan rules are default out of the box any any rule..

              Your bottom 3 rules on your dmz are pointless, since the rule above them is any any rule so they will never even be evaluated.

              And the top rule is pretty pointless on dmz with tcp only, when your going to have a any any rule..

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              R 1 Reply Last reply Reply Quote 0
              • R
                rcoleman-netgate Netgate @johnpoz
                last edited by

                @johnpoz Not to mention DNS is 53UDP, not 53TCP.

                @cheapie408 Removing all the WAN rules is a good start, and then verifying if you REALLY need those devices public to the internet without filtering... and then, from there, setting up a VPN to access them.

                I used to open all the things I wanted out in the wild before I realized I was best suited making the VPN. Rarely do I need them on my phone and even more rarely do I find myself on a network that is blocking IPsec traffic.

                Ryan
                Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                Requesting firmware for your Netgate device? https://go.netgate.com
                Switching: Mikrotik, Netgear, Extreme
                Wireless: Aruba, Ubiquiti

                C johnpozJ 2 Replies Last reply Reply Quote 0
                • C
                  cheapie408 @rcoleman-netgate
                  last edited by

                  @rcoleman-netgate

                  I'll let it run like this for half a day or so to see if there are any hickup on the app then I'll start removing all the rules to see what's the affect.

                  I followed some guide online for the DMZ setup

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    rcoleman-netgate Netgate @cheapie408
                    last edited by

                    @cheapie408 Having your devices open from the public internet is not a good idea in any situation.

                    And, again, TCP 53 does nothing for DNS. DNS is a UDP service.

                    Ryan
                    Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                    Requesting firmware for your Netgate device? https://go.netgate.com
                    Switching: Mikrotik, Netgear, Extreme
                    Wireless: Aruba, Ubiquiti

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @rcoleman-netgate
                      last edited by johnpoz

                      @rcoleman-netgate said in Unable to open port 8883 for MyQ garage opener:

                      Not to mention DNS is 53UDP, not 53TCP.

                      Yeah - its nonsense rule I agree.. There is no way no hell that device would ever need 53 inbound, and sure and not tcp 53..

                      Lets just state this yet again, like we did way back when when this thread started. That my chamberlin hub requires ZERO inbound ports to open..

                      I am sorry that their support is crappy ;) And sorry there is junk info on the internet.. Users trying to help users.. But I have a chamberlin hub, and can say for FACT there is ZERO inbound traffic needed to work. I get notified any time it opens or closes, and I can open it from my phone anywhere..Just from being signed into the MyQ app..

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      C 1 Reply Last reply Reply Quote 0
                      • C
                        cheapie408 @johnpoz
                        last edited by cheapie408

                        So MyQ has been working for the past 24 hours on the 2nd vlan the only thing I have enabled on it is the rules below

                        alt text

                        I disabled all the unnecessary rules on the LAN and moved the MyQ to it and it almost immediately reported to be offline. I have no clue what can be causing this.

                        alt text
                        ![alt text](bbe19830-9218-4328-9689-a4ebe525e1ec-image.png image url)

                        DerelictD 1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate @cheapie408
                          last edited by Derelict

                          @cheapie408 MyQ doesn't require anything special. At least not the MyQ devices I have. They connect outbound to the MyQ infrastructure and so does the phone app.

                          This is my half-hearted attempt to isolate the IOT VLAN here. I have a few MyQ devices there, the generac, a rachio irrigation controller, a thermostat, etc.

                          Nothing is required inbound.

                          Screen Shot 2022-08-07 at 2.25.02 PM.png

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          DerelictD 1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate @Derelict
                            last edited by Derelict

                            And always pass both TCP and UDP for DNS (like that ☝) or you can get spurious, almost-impossible-to-diagnose failures when DNS switches to TCP to avoid fragmenting long responses, zone transfers, etc. Look at your unbound. It's listening on tcp/*.53 for a reason.

                            This article looks like it covers the basics pretty well.

                            ETA: This also illustrates why you should Reject instead of Block rules for connections from inside hosts. If you did limit outbound DNS connections to UDP-only and a client tried to make a TCP connection to a blocked server you would want it to receive an immediate RST (Connection refused) instead of sitting there waiting to time out again and again and again.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.