Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    UPnP and VLANs

    Scheduled Pinned Locked Moved
    General pfSense Questions
    5
    23
    442
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      What do the logs show when you try to start it?

      bearhntrB 1 Reply Last reply Reply Quote 0
      • bearhntrB
        bearhntr @WN1X
        last edited by

        @WN1X

        I am a Verizon customer... LOL

        It is inside my network - those IPs are not exposed to the Internet. They are subject to change at some point once I get this working.

        1 Reply Last reply Reply Quote 0
        • bearhntrB
          bearhntr @stephenw10
          last edited by

          @stephenw10

          This is all I see in the logs that has to do with MiniUPnP

          8ae60580-34c9-4c03-a4b5-0d7aa50941c4-image.png

          This is GENERAL for when I made the change:

          418a98ab-c639-428b-a64c-d16179cbc2dc-image.png

          Do not know where to look there is nothing under logs which states UPnP

          9235db02-fca4-4f02-b069-3950b335ecbf-image.png

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @bearhntr
            last edited by johnpoz

            @bearhntr and what are you not understanding about those errors.. Clearly states contains public IP, should contain private.

            100.9.x.x is not some IP range you should be using that is public range.. Use IP range from rfc1918 space - there is lots you can use 192.168/16, 10/8, 172.16/12

            Why would you be using 100.9 on an internal network and want that do UPnP?

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.03 | Lab VMs 2.7.2, 24.03

            bearhntrB 2 Replies Last reply Reply Quote 1
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Yup, it's thowing an error at the public IP internally. Which is interesting.

              G 1 Reply Last reply Reply Quote 0
              • G
                Gblenn @stephenw10
                last edited by

                @stephenw10 UPnP seems to be rather picky about Private vs Public IP...
                It doesn't work behind an ISP router providing a Private IP towards pfsense WAN. And I never got it to work with the games that require UPnP, using STUN. However, changing to a Public IP range on the upstream router makes it work just fine, as long as pfsense is in DMZ (or the relevant ports are open at least).
                I wish there was some toggle that would allow bypassing those checks...

                1 Reply Last reply Reply Quote 1
                • stephenw10S
                  stephenw10 Netgate Administrator
                  last edited by

                  Yup, code was added upstream for that. Though you can workarund it by manually setting the external address: https://redmine.pfsense.org/issues/10398

                  G 1 Reply Last reply Reply Quote 1
                  • G
                    Gblenn @stephenw10
                    last edited by Gblenn

                    @stephenw10 Hmm, that patch may work but it seems like there is only one person who even tried it, and failed?

                    Anyway, UPnP works fine for me and all gaming right now. BUT, even if there was a simple toggle for the WAN IP check, it will still not work in a failover scenario unfortunately... or is there some way to make it work?

                    I mean, you can't select the failover Group so when WAN 1 is down, UPnP no longer work...

                    1 Reply Last reply Reply Quote 1
                    • bearhntrB
                      bearhntr @johnpoz
                      last edited by

                      @johnpoz

                      I was trying to use something that 'stood out' to me for LAB Addresses - so that I could easily know when I found any traffic - I could say...."Oh, that is the lab". There are many times I have to review (or have reviewed logs by engineers) and wanted to make sure that nothing crazy was in the mix.

                      So that being said, I have a Server 2019 DC in the mix of the lab. 100.9.28.250 - I also cannot get things working 100% the way I want them,

                      For example - when I do this on the DC - I get the following:

                      475e64ee-8c2c-429a-8a8a-8023a135636c-image.png

                      If I do the same on the lab server itself - I get the following (yes, the lab server is joined to the domain and has the DC as the DNS entry #1 for IPv4 and IPv6) -- the masked IP is the IPv6 of the LAN port in pfSense:

                      098e9ab1-e8d9-4b51-b1bd-acb25e57f3d6-image.png

                      The DC is set to use (IPv4 and IPv6) pointing to pfSense as DNS Forwarder, pfSense is set as below:

                      952e0915-dae4-4278-bfb7-08f39ed4a102-image.png

                      1 Reply Last reply Reply Quote 0
                      • bearhntrB
                        bearhntr @johnpoz
                        last edited by

                        @johnpoz

                        I am guessing I am gonna need to completely rebuilt the DC if I make the address something like 10.100.28.1/24

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          You need to change the subnet on that VLAN to something in a private range. That would mean renumbering everything using that interface, yes.

                          bearhntrB 1 Reply Last reply Reply Quote 0
                          • bearhntrB
                            bearhntr @stephenw10
                            last edited by

                            @stephenw10

                            That is gonna be fun - Domain Controllers hate to have their IP changed.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              I mean if you actually own that subnet then you can just route to it and UPnP becomes unnecessary. But....... 😉

                              bearhntrB 1 Reply Last reply Reply Quote 0
                              • bearhntrB
                                bearhntr @stephenw10
                                last edited by

                                @stephenw10

                                Own it? I own it on my home (inside my firewall) network. LOL

                                I am doing this with the lab domain stuff, because at some point I want to possibly put my WiFi on its own segment (for SmartHome stuff) - seeing how people are persuading me not to use the pfSense box as a WiFi controller AP/router, etc.

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @bearhntr
                                  last edited by johnpoz

                                  @bearhntr if you want something that sticks out then use one of the other rfc1918 address schemes from your other networks use 192.168 on your other networks and 10.x.x on the other..

                                  10.20.30.x would standout I would think ;)

                                  Pulling public space out your u know what and using internally - while technically possible, it almost always going to lead do some issue.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.03 | Lab VMs 2.7.2, 24.03

                                  bearhntrB 1 Reply Last reply Reply Quote 1
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    The number of people I've seen using 1.1.1.0/24 still boggles the mind. 🙄

                                    johnpozJ 1 Reply Last reply Reply Quote 1
                                    • bearhntrB
                                      bearhntr @johnpoz
                                      last edited by

                                      @johnpoz

                                      Shame I could not use 10.90.280,xxx LOL

                                      I am still trying to get my head around the IPv6 Private IPs of fdxx:xxxx:xxxx:yyyy:zzzz:zzzz:zzzz:zzzz

                                      I was toying with the idea of fd10:0009:0028:1977:zzzz:zzzz:zzzz:zzzz and let DHCP handle the :zzzz:zzzz:zzzz:zzzz part

                                      I simply do not understand the "Track Interface" to the WAN in the LAN setup well enough to get that part working.

                                      Thanks to you and all others for the input/guidance.

                                      1 Reply Last reply Reply Quote 0
                                      • johnpozJ
                                        johnpoz LAYER 8 Global Moderator @stephenw10
                                        last edited by johnpoz

                                        @stephenw10 yeah, which hey if that is what they do fine. But what bugs me is when the same person comes here and wonders why they can't talk to cloudflare for dns ;)

                                        Still in favor of basic network understanding test to even download pfsense ;)

                                        @bearhntr you could for sure use 10.90.280

                                        You can also use whatever local IPv6 range you want that falls in the link-local range fe80::/10 . -Not going to do you any good if you want those clients talking to the internet.. And using a link-local address has zero to do with tracking what gua prefix you get and using one of the subs on lan side interfaces.

                                        Did you want to use the ULA range? fc00::/7

                                        Personally I would get a handle on IPv4 before messing with IPv6 ;)

                                        If you don't like prefixes that change, or the size of the prefix your isp will give you, or if they will give you one at all.. You can always just run a tunnel from Hurricane Electric - they will give you a /48, that never changes. And you can use whatever prefixes out of you want for your networks.. I match them up so they line up with an octet I use out of my IPv4 range. So I can easy look at the prefix and know what network it is since it lines up with the IPv4 I have on that network.

                                        example my lan is 192.168.9.0/24 my IPv6 on that network is 2001:470:xxxx:9::0/64

                                        And the last number matches, so for example pfsense IP on my lan is 192.168.9.253, while its IPv6 is 2001:470:xxxx:9::253

                                        An intelligent man is sometimes forced to be drunk to spend time with his fools
                                        If you get confused: Listen to the Music Play
                                        Please don't Chat/PM me for help, unless mod related
                                        SG-4860 24.03 | Lab VMs 2.7.2, 24.03

                                        johnpozJ 1 Reply Last reply Reply Quote 1
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @johnpoz
                                          last edited by johnpoz

                                          @johnpoz said in UPnP and VLANs:

                                          @bearhntr you could for sure use 10.90.280

                                          Oh just noticed - sorry no you can't use .280, that isn't a valid octet.. You could use 10.90.255 or maybe 10.90.28. would be better and closer

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.03 | Lab VMs 2.7.2, 24.03

                                          bearhntrB 1 Reply Last reply Reply Quote 0
                                          • bearhntrB
                                            bearhntr @johnpoz
                                            last edited by

                                            @johnpoz and @stephenw10 and @Gblenn and @WN1X

                                            I changed the VLAN to be another 10.xx,xx,xx/24 segment and UPnP starts up with no errors. Thanks everyone for your assistance. I managed to do it all without breaking the DC either.

                                            NSLOOKUP still does not function properly - it never has since I built the DC (well it works on that server - but nothing else in the lab domain). There are FWD and REV Lookup records in DNS on the DC...but they still do not work. :-(

                                            johnpozJ 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post