I want to use DLNA over VPN network using two Mikrotik devices. We have two networks with one NAS drive each that supports video streaming with DLNA. These two networks are connected over internet with VPN.
We can see the shared folders and copy files bettwen two networks
So far I can see that multicast packets are forwarded from on network to another. I am scanning with my phone via SSDP and I can see the NAS devices (as DLNA service) from both networks. The same happens at the other side.
The problem is that the SmartTV can only “see” the local DLNA (NAS drive) This same thing happens at the other network.
Here is the configuration of the router: The second router has exactly the same configuration with the difference that the subnet is 192.168.1.0
Any ideas ???
here is ym configuration (both routers)
/interface bridge
add fast-forward=no mtu=1500 name=bridge1 protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] comment="HCN Router" name=Internet speed=100Mbps
set [ find default-name=ether2 ] advertise=100M-half,100M-full,1000M-half,1000M-full comment="Samsung Smart TV" name=eth_2
set [ find default-name=ether4 ] advertise=100M-half,100M-full,1000M-half,1000M-full comment="NAS" name=eth_4 speed=100Mbps
/interface list
add exclude=dynamic name=discover
/ip pool
add name=pool1 ranges=192.168.2.10-192.168.2.128
/interface pptp-client
add connect-to=xxx.xxx.xxx.xxx disabled=no mrru=1600 name=pptp-jean password=************* profile=default user=******
/queue type
add kind=pcq name=pcq-to-ip pcq-classifier=dst-address
add kind=pcq name=pcq-from-ip pcq-classifier=src-address
/snmp community
set [ find default=yes ] addresses=0.0.0.0/0
/interface bridge port
add bridge=bridge1 hw=no interface=eth_5
add bridge=bridge1 hw=no interface=eth_4
add bridge=bridge1 hw=no interface=eth_3
add bridge=bridge1 hw=no interface=eth_2
add bridge=bridge1 interface=wireless
/ip neighbor discovery-settings
set discover-interface-list=all
/interface list member
add interface=Internet list=discover
add interface=eth_2 list=discover
add interface=eth_3 list=discover
add interface=eth_4 list=discover
add interface=eth_5 list=discover
add interface=bridge1 list=discover
/ip address
add address=192.168.2.254/24 interface=eth_2 network=192.168.2.0
add address=192.168.100.100/24 interface=Internet network=192.168.100.0
/ip firewall mangle
add action=change-ttl chain=prerouting dst-address-type="" log-prefix=TTL+ new-ttl=set:64 passthrough=yes port=1900 protocol=udp
add action=change-ttl chain=prerouting dst-address-type="" new-ttl=set:64 passthrough=yes protocol=igmp
add action=change-ttl chain=prerouting new-ttl=set:64 passthrough=yes protocol=igmp
/ip firewall nat
add action=accept chain=srcnat out-interface=pptp-jean
add action=masquerade chain=srcnat out-interface=Internet
/ip route
add distance=1 gateway=192.168.100.1
add distance=1 dst-address=192.168.1.0/24 gateway=192.168.99.1
add distance=1 dst-address=224.0.0.0/4 gateway=192.168.99.1
/ip upnp
set allow-disable-external-interface=yes enabled=yes
/ip upnp interfaces
add interface=pptp-jean type=internal
add interface=bridge1 type=internal
/routing pim bsr-candidates
add interface=pptp-jean
/routing pim interface
add interface=pptp-jean
add interface=bridge1
/routing pim rp-candidates
add interface=pptp-jean
/ip firewall address-list
add address=192.168.2.0/24 list=support
add address=0.0.0.0/8 comment="Self-Identification " list=bogons
add address=127.0.0.0/16 comment="Loopback " list=bogons
add address=192.168.2.0/24 comment="Private - CLASS C" list=bogons
/ip firewall filter
add action=passthrough chain=input dst-address-type=multicast dst-port=1900 log=yes log-prefix=in-SSDP protocol=udp
add action=passthrough chain=forward dst-address-type=multicast port=1900,1080,9080 protocol=udp
add action=accept chain=input in-interface=pptp-jean protocol=igmp
add action=accept chain=input protocol=igmp
add action=accept chain=output protocol=igmp
add action=accept chain=forward protocol=igmp