• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Filtering bridge and multicast - solved

Scheduled Pinned Locked Moved Routing and Multi WAN
8 Posts 4 Posters 6.4k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J
    Jare
    last edited by Aug 21, 2009, 12:52 PM Aug 17, 2009, 12:10 PM

    Hi,

    I have a following pfsense config:

    WAN(123.123.123.0/24)–--pfsense----DMZ(bridged to WAN)----server(123.123.123.10)
                                             |
                                 LAN(192.168.1.0/24)

    I would like to have iptv availability for the server, but igmp requests don't seem to reach WAN from DMZ. Is multicast supposed to work with filtering bridge?

    1 Reply Last reply Reply Quote 0
    • J
      jimp Rebel Alliance Developer Netgate
      last edited by Aug 17, 2009, 10:56 PM

      It might if you have firewall rules specifically set to allow that traffic, or perhaps an allow all rule (proto any from any to any)

      I know DHCP will traverse a bridge, but you need to specifically allow it from any to any on its related ports.

      Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

      Need help fast? Netgate Global Support!

      Do not Chat/PM for help!

      1 Reply Last reply Reply Quote 0
      • J
        Jare
        last edited by Aug 18, 2009, 9:43 AM Aug 17, 2009, 11:56 PM

        @jimp:

        It might if you have firewall rules specifically set to allow that traffic, or perhaps an allow all rule (proto any from any to any)

        I know DHCP will traverse a bridge, but you need to specifically allow it from any to any on its related ports.

        Well actually i seem to get some IGMP V2 Membership Queries from WAN through the bridge, when i run wireshark on the server. So IGMP from WAN->DMZ seems to be working on some level. I don't understand, why it shouldn't work the other way around as i have a simple allow all rule on DMZ.

        I have tested this with allow any protocol and port from any to any rule on WAN and DMZ and didn't get the iptv stream working. So the firewall shouldn't be a problem, unless there is a some kind of hardcoded blocking rule for this. Could it simply be a routing issue or something? No, it can't be, because client's routing table doesn't change regarding if it's behind the bridge or not. And bridge itself shouldn't mess with routing.

        1 Reply Last reply Reply Quote 0
        • J
          Jare
          last edited by Aug 21, 2009, 1:58 AM

          The problem persists, but I found the reason.

          When VLC generates an IGMPv2 packet, it has a router alert option (http://www.rfc-archive.org/getrfc.php?rfc=2113) enabled in the internet protocol header. This is why the packet won't go through pfsense's bridge. I tested this with Nemesis without the router alert option and the IGMPv2 packets passed the bridge perfectly. Also my iptv immediately started to work, when I injected an IGMPv2 packet without the router alert option to the multicast ip.

          So the question remains, is this a bug or not?

          1 Reply Last reply Reply Quote 0
          • C
            cmb
            last edited by Aug 21, 2009, 2:34 AM

            Not a bug, it's by design of PF. http://www.openbsd.org/faq/pf/filter.html#ipopts

            We have no way in the GUI to accommodate this. You can hack filter.inc as a work around. Feature request opened.
            http://redmine.pfsense.org/issues/show/54

            1 Reply Last reply Reply Quote 0
            • C
              cmb
              last edited by Aug 21, 2009, 8:00 AM

              Actually it's already there in 2.0 now. You should be able to backport that piece of the code without too much trouble if you have any familiarity with PHP.

              1 Reply Last reply Reply Quote 0
              • J
                Jare
                last edited by Aug 21, 2009, 12:49 PM

                Thank you very much! Got it working now. I'll add the changes below, if someone is interested.

                I made two firewall rules to allow igmp packets with ip options pass from my DMZ to WAN. In the rules fxp2 is my DMZ interface and fxp3 is WAN interface. I had to do a bit of testing before I found the right line to add my rules. The default WAN interface out rule will block the packets, if you add the WAN interface rule after it.

                Here are my changes to filter.inc (added 3 lines):

                # let out anything from the firewall host itself and decrypted IPsec traffic
                pass out quick on \$lan proto icmp keep state label "let out anything from firewall host itself"
                pass out quick on \$wan proto icmp keep state label "let out anything from firewall host itself"
                
                # Allow IGMP traffic with ip options from DMZ to WAN
                pass in quick on fxp2  inet proto igmp from any to 224.0.0.0/4 allow-opts keep state
                pass out quick on fxp3 inet proto igmp from any to 224.0.0.0/4 allow-opts keep state
                
                # tcp.closed 5 is a workaround for load balancing, squid and a few other issues.
                # ticket (FEN-857512) in centipede tracker.
                pass out quick on $wanif all keep state ( tcp.closed 5 ) label "let out anything from firewall host itself"
                
                
                1 Reply Last reply Reply Quote 0
                • E
                  Eugene
                  last edited by Aug 25, 2009, 4:13 AM

                  Hmm… it's in my 1.2.2 as well.  :-\

                  http://ru.doc.pfsense.org

                  1 Reply Last reply Reply Quote 0
                  8 out of 8
                  • First post
                    8/8
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                    This community forum collects and processes your personal information.
                    consent.not_received