Community discussions

MikroTik App
 
Niffchen
newbie
Topic Author
Posts: 38
Joined: Thu Mar 22, 2018 1:36 pm

Problem with CAPsMAN, wired Yamaha receiver with Spotify Connect and Spotify iOS app on mobile device

Thu Dec 13, 2018 5:43 pm

Hello,

I have a strange problem and hope somebody can help me.
I have a hEX as the central router with VLAN configuration.
For mobile devices I have 3 hAPs/wAPs which are my access points. All hAPs/wAPs are managed by CAPsMAN on my hEX and are connected via cable to the hEX. Wireless network works fine.
I also have a Yamaha Musiccast receiver connected via cable to a ethernet port of one hAP which wireless network is managed by CAPsMAN. I connect the Yamaha to this hAP and configured it for DHCP at the same VLAN like all mobile devices. This is for using Musiccast with the app on my mobile devices managing receiver.

I can manage this wired Yamaha via mobile phone. If I use the spotify app on my mobile device and select the wired Yamaha as speaker the app cannot connect to the "speaker". I don't get a error message.
I also have some "Musiccast Speakers" which are connected via wifi to the same network like my mobile device. In this case I can select this speakers at the spotify app on my mobile device and the speakers are playing music.

I activated the firewall for VLAN on my bridges. If I deactivate the firewall in bridge settings the spotify app can connect the wired Yamaha.
I am only using the default firewall rules!

Do you have any suggestions what is going wrong?

Regards,
Jens
 
whitbread
Member Candidate
Member Candidate
Posts: 119
Joined: Fri Nov 08, 2013 9:55 pm

Re: Problem with CAPsMAN, wired Yamaha receiver with Spotify Connect and Spotify iOS app on mobile device

Sat Dec 15, 2018 10:42 pm

What kinda mobile device u r using?
How u connect to musiccast devices?
More details on your network (vlans, devices, subnets, etc,) plz
 
Niffchen
newbie
Topic Author
Posts: 38
Joined: Thu Mar 22, 2018 1:36 pm

Re: Problem with CAPsMAN, wired Yamaha receiver with Spotify Connect and Spotify iOS app on mobile device

Sun Dec 16, 2018 2:53 pm

What kinda mobile device u r using?
How u connect to musiccast devices?
More details on your network (vlans, devices, subnets, etc,) plz
First more details about my lan devices.
Main router is a hEX. It is conneted via LAN cable to my 3 APs (hAP/wAP). It has CAPsMAN aktivated and the CAPsMAN has a 2GHz and a 5GHz wifi configuration for all CAPs. Every CAP propagates a 2GHz and a 5GHz wifi network for use. The names of both types of wifi networks are different. The 2GHz network has the number 2 at the end of its name and the 5GHz network a 5.
The hEX is also connected to a D-Link Switch which is connected to all other LAN ports, NAS, Raspi etc.
The Raspi is my Zeroconf Raspi. It distributes all Zeroconf and multicast services to all VLANs. It has the VLAN-ID 170 for its physical interface and many virtual interfaces for all existing VLANs. On this way the Raspi distrbutes a DLNA service to all VLANs. This DLNA is also available at VLAN 40.

The wifi networks are using VLAN-ID 40. the ethernet Ports of the hAPs also have VLAN-ID 40. The Yamaha receiver with Musiccast feature is connected to one of this ports.
For this VLAN DHCP is activated.

I have an iPhone as mobile device. I use the Yamaha Musiccast app, Spotify App and another app for streaming music via DLNA.
If I am connected to the wifi network I can stream music via DLNA with Musiccast app directly to the Yamaha receiver, wireless Musiccast speakers and with the DLNA app on my iPhone. I can connect all wireless Musiccast speakers and the wired Yamaha receiver with the iPhone via Airplay. But if I use the spotify app I cannot connect to the wired Yamaha receiver. I don’t have problems with wireless Musiccast speakers. All wireless or wired devices with Spotify Connect feature are listed in the app but I cannot connect to the wired Yamaha receiver with the app. If I disable the FW for VLAN I can connect to it with the Spotify app. If I activate the FW for VLAN again after the Spotify connection has been established everything works fine. Also days later everything works. After rebooting the hEX the connection needs to be activated again with deactivating and activating the FW for VLAN.

This is the configuration of the hEX:
caps-man channel
add band=2ghz-g/n control-channel-width=\
    20mhz extension-channel=XX \
    frequency=2412,2427 name=\
    "2GHz Auswahlliste"
add band=5ghz-n/ac \
    control-channel-width=20mhz \
    extension-channel=XX frequency=\
    5180,5260,5280,5300,5320 name=\
    "5GHz Auswahlliste"
add frequency=2472 name=3
add frequency=5180 name=36
add frequency=5200 name=40
add frequency=5220 name=44
add frequency=5240 name=48
add frequency=5260 name=52
add frequency=5280 name=56
add frequency=5300 name=60
add frequency=5320 name=64
add frequency=5500 name=100
add frequency=5520 name=104
add frequency=5540 name=108
add frequency=5560 name=112
add frequency=5580 name=116
add frequency=5600 name=120
add frequency=5620 name=124
add frequency=5600 name=128
add frequency=5660 name=132
add frequency=5680 name=136
add frequency=5700 name=140
/caps-man configuration
add channel.band=2ghz-g/n \
    channel.extension-channel=eC \
    channel.frequency=2472 \
    channel.skip-dfs-channels=yes \
    country=germany \
    datapath.client-to-client-forwarding=\
    no name=Config2GHz_Woodroot_Outdoor \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot tx-chains=0,1,2
/interface bridge
add admin-mac=CC:2D:E0:68:3D:3E \
    auto-mac=no comment=defconf name=\
    MainBridge pvid=5 vlan-filtering=yes
add admin-mac=CC:2D:E0:68:3D:3D \
    auto-mac=no name=SubBridge \
    protocol-mode=none
/interface ethernet
set [ find default-name=ether1 ] speed=\
    100Mbps
set [ find default-name=ether2 ] \
    poe-out=off speed=100Mbps
set [ find default-name=ether3 ] \
    poe-out=forced-on speed=100Mbps
set [ find default-name=ether4 ] speed=\
    100Mbps
set [ find default-name=ether5 ] speed=\
    100Mbps
set [ find default-name=sfp1 ] \
    advertise="10M-half,10M-full,100M-hal\
    f,100M-full,1000M-half,1000M-full" \
    disabled=yes
/interface pptp-client
add allow=mschap2 connect-to=\
    185.244.212.172 disabled=no \
    keepalive-timeout=disabled name=\
    PPTP-ORF user=31274003_v8Tx9pPkEY
/interface vlan
add interface=MainBridge name=VLAN5 \
    vlan-id=5
add interface=MainBridge name=VLAN40 \
    vlan-id=40
add interface=MainBridge name=VLAN110 \
    vlan-id=110
add interface=MainBridge name=VLAN120 \
    vlan-id=120
add interface=MainBridge name=VLAN130 \
    vlan-id=130
add interface=MainBridge name=VLAN140 \
    vlan-id=140
add interface=MainBridge name=VLAN150 \
    vlan-id=150
add interface=MainBridge name=VLAN160 \
    vlan-id=160
add interface=MainBridge name=VLAN170 \
    vlan-id=170
/caps-man datapath
add bridge=SubBridge \
    client-to-client-forwarding=yes \
    l2mtu=1500 local-forwarding=no name=\
    datapathSubBridgeWlan
/caps-man configuration
add channel.band=5ghz-n/ac \
    channel.extension-channel=eC \
    channel.frequency=5320 \
    channel.skip-dfs-channels=yes \
    country=germany datapath=\
    datapathSubBridgeWlan \
    datapath.client-to-client-forwarding=\
    no name=\
    Config5GHz_Woodroot_Wohnzimmer \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot5 tx-chains=0,1,2
add channel.band=2ghz-g/n \
    channel.extension-channel=Ce \
    channel.frequency=2412 \
    channel.skip-dfs-channels=yes \
    country=germany datapath=\
    datapathSubBridgeWlan \
    datapath.client-to-client-forwarding=\
    no name=\
    Config2GHz_Woodroot_Wohnzimmer \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot tx-chains=0,1,2
add channel.band=2ghz-g/n \
    channel.extension-channel=eC \
    channel.frequency=2472 \
    channel.skip-dfs-channels=yes \
    country=germany datapath=\
    datapathSubBridgeWlan \
    datapath.client-to-client-forwarding=\
    no name=\
    Config2GHz_Woodroot_Balkonzimmer \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot tx-chains=0,1,2
add channel.band=5ghz-n/ac \
    channel.extension-channel=Ce \
    channel.frequency=5180 \
    channel.skip-dfs-channels=yes \
    country=germany datapath=\
    datapathSubBridgeWlan \
    datapath.client-to-client-forwarding=\
    no name=\
    Config5GHz_Woodroot_Balkonzimmer \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot5 tx-chains=0,1,2
add channel.band=5ghz-n/ac \
    channel.extension-channel=Ce \
    channel.frequency=5260 \
    channel.skip-dfs-channels=yes \
    country=germany datapath=\
    datapathSubBridgeWlan \
    datapath.client-to-client-forwarding=\
    no name=Config5GHz_Woodroot_Outdoor \
    rx-chains=0,1,2 \
    security.authentication-types=\
    wpa2-psk security.encryption=aes-ccm \
    security.group-key-update=2h ssid=\
    Woodroot5 tx-chains=0,2
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] \
    supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=\
    192.168.88.10-192.168.88.254
add name=dhcp_pool1 ranges=\
    192.168.110.150-192.168.110.200
add name=dhcp_pool2 ranges=\
    192.168.120.150-192.168.120.200
add name=dhcp_pool3 ranges=\
    192.168.130.150-192.168.130.200
add name=dhcp_pool4 ranges=\
    192.168.140.150-192.168.140.200
add name=dhcp_pool5 ranges=\
    192.168.150.150-192.168.150.200
add name=dhcp_pool6 ranges=\
    192.168.160.150-192.168.160.200
add name=dhcp_pool7 ranges=\
    192.168.170.150-192.168.170.200
add name=dhcp_pool8 ranges=\
    192.168.40.150-192.168.40.200
add name=hs-pool-7 ranges=\
    192.168.5.156-192.168.5.200
/ip dhcp-server
add address-pool=dhcp_pool1 disabled=no \
    interface=VLAN110 name=dhcp1
add address-pool=dhcp_pool2 disabled=no \
    interface=VLAN120 name=dhcp2
add address-pool=dhcp_pool3 disabled=no \
    interface=VLAN130 name=dhcp3
add address-pool=dhcp_pool4 disabled=no \
    interface=VLAN140 name=dhcp4
add address-pool=dhcp_pool5 disabled=no \
    interface=VLAN150 name=dhcp5
add address-pool=dhcp_pool6 disabled=no \
    interface=VLAN160 name=dhcp6
add address-pool=dhcp_pool7 disabled=no \
    interface=VLAN170 name=dhcp7
add address-pool=dhcp_pool8 disabled=no \
    interface=SubBridge lease-time=\
    23h59m name=dhcp8
add address-pool=hs-pool-7 disabled=no \
    interface=MainBridge lease-time=1h \
    name=dhcp9
/caps-man aaa
set mac-mode=as-username-and-password
/caps-man access-list
add action=accept \
    allow-signal-out-of-range=1s \
    disabled=no interface=any \
    signal-range=-85..120 ssid-regexp="" \
    time=\
    0s-1d,sun,mon,tue,wed,thu,fri,sat
add action=reject \
    allow-signal-out-of-range=10s \
    disabled=no interface=any \
    signal-range=-120..-86 ssid-regexp=\
    "" time=\
    0s-1d,sun,mon,tue,wed,thu,fri,sat
/caps-man manager
set enabled=yes
/caps-man manager interface
add
add interface=VLAN40
add forbid=yes interface=MainBridge
add interface=SubBridge
/caps-man provisioning
add action=create-dynamic-enabled \
    hw-supported-modes=gn \
    identity-regexp=\
    MikroTik-AP-Wohnzimmer \
    master-configuration=\
    Config2GHz_Woodroot_Wohnzimmer
add action=create-dynamic-enabled \
    hw-supported-modes=gn \
    identity-regexp=MikroTik-AP-Outdoor \
    master-configuration=\
    Config2GHz_Woodroot_Outdoor
add action=create-dynamic-enabled \
    hw-supported-modes=gn \
    identity-regexp=\
    MikroTik-Balkonzimmer \
    master-configuration=\
    Config2GHz_Woodroot_Balkonzimmer
add action=create-dynamic-enabled \
    hw-supported-modes=ac \
    identity-regexp=\
    MikroTik-AP-Wohnzimmer \
    master-configuration=\
    Config5GHz_Woodroot_Wohnzimmer
add action=create-dynamic-enabled \
    hw-supported-modes=ac \
    identity-regexp=\
    MikroTik-Balkonzimmer \
    master-configuration=\
    Config5GHz_Woodroot_Balkonzimmer
add action=create-dynamic-enabled \
    hw-supported-modes=ac \
    identity-regexp=MikroTik-AP-Outdoor \
    master-configuration=\
    Config5GHz_Woodroot_Outdoor
/interface bridge port
add bridge=MainBridge comment=defconf \
    interface=ether2 pvid=5
add bridge=MainBridge comment=defconf \
    hw=no interface=ether3 pvid=5
add bridge=MainBridge comment=defconf \
    interface=ether5
add bridge=MainBridge comment=defconf \
    hw=no interface=sfp1 pvid=5
add bridge=SubBridge interface=VLAN40 \
    pvid=40
add bridge=MainBridge interface=ether4
/interface bridge settings
set allow-fast-path=no
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface bridge vlan
add bridge=MainBridge tagged="MainBridge,\
    ether2,ether5,ether3,ether4" \
    vlan-ids=40
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=110
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=120
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=130
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=140
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=150
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=160
add bridge=MainBridge tagged=\
    ether2,MainBridge vlan-ids=170
add bridge=MainBridge tagged=\
    ether2,ether3,ether4,ether5 \
    vlan-ids=5
/interface list member
add comment=defconf interface=MainBridge \
    list=LAN
add comment=defconf interface=ether1 \
    list=WAN
add interface=ether4 list=LAN
add interface=VLAN110 list=LAN
add interface=VLAN120 list=LAN
add interface=VLAN130 list=LAN
add interface=VLAN140 list=LAN
add interface=VLAN150 list=LAN
add interface=VLAN160 list=LAN
add interface=VLAN170 list=LAN
add interface=VLAN5 list=LAN
add interface=ether2 list=LAN
add interface=ether3 list=LAN
add interface=ether5 list=LAN
add interface=SubBridge list=LAN
add interface=VLAN40 list=LAN
add interface=cap1 list=LAN
add interface=cap2 list=LAN
add interface=cap3 list=LAN
add interface=cap4 list=LAN
add interface=cap5 list=LAN
add interface=cap6 list=LAN
/ip address
add address=192.168.15.15/24 disabled=\
    yes interface=ether4 network=\
    192.168.15.0
add address=192.168.40.1/24 disabled=yes \
    interface=VLAN40 network=\
    192.168.40.0
add address=192.168.110.1/24 interface=\
    VLAN110 network=192.168.110.0
add address=192.168.120.1/24 interface=\
    VLAN120 network=192.168.120.0
add address=192.168.130.1/24 interface=\
    VLAN130 network=192.168.130.0
add address=192.168.140.1/24 interface=\
    VLAN140 network=192.168.140.0
add address=192.168.150.1/24 interface=\
    VLAN150 network=192.168.150.0
add address=192.168.160.1/24 interface=\
    VLAN160 network=192.168.160.0
add address=192.168.170.1/24 interface=\
    VLAN170 network=192.168.170.0
add address=192.168.5.1/24 interface=\
    MainBridge network=192.168.5.0
add address=192.168.40.1/24 interface=\
    SubBridge network=192.168.40.0
add address=192.168.2.10/24 interface=\
    ether1 network=192.168.2.0
add address=192.168.5.10/24 disabled=yes \
    interface=VLAN5 network=192.168.5.0
/ip dhcp-server lease
add address=192.168.40.163 client-id=\
    1:2c:f0:a2:40:bb:99 mac-address=\
    2C:F0:A2:40:BB:99 server=dhcp8
add address=192.168.40.154 client-id=\
    1:d0:d2:b0:7f:2c:59 mac-address=\
    D0:D2:B0:7F:2C:59 server=dhcp8
/ip dhcp-server network
add address=192.168.5.0/24 comment=\
    "hotspot network" gateway=\
    192.168.5.1
add address=192.168.40.0/24 dns-server=\
    192.168.40.1,192.168.2.1 gateway=\
    192.168.40.1
add address=192.168.110.0/24 dns-server=\
    192.168.110.1,192.168.2.1 gateway=\
    192.168.110.1
add address=192.168.120.0/24 dns-server=\
    192.168.120.1,192.168.2.1 gateway=\
    192.168.120.1
add address=192.168.130.0/24 dns-server=\
    192.168.130.1,192.168.2.1 gateway=\
    192.168.130.1
add address=192.168.140.0/24 dns-server=\
    192.168.140.1,192.168.2.1 gateway=\
    192.168.140.1
add address=192.168.150.0/24 dns-server=\
    192.168.150.1,192.168.2.1 gateway=\
    192.168.150.1
add address=192.168.160.0/24 dns-server=\
    192.168.160.1,192.168.2.1 gateway=\
    192.168.160.1
add address=192.168.170.0/24 dns-server=\
    192.168.170.1,192.168.2.1 gateway=\
    192.168.170.1
/ip dns
set allow-remote-requests=yes servers=\
    192.168.2.1
/ip firewall filter
add action=accept chain=input comment="de\
    fconf: accept established,related,unt\
    racked" connection-state=\
    established,related,untracked
add action=drop chain=input comment=\
    "defconf: drop invalid" \
    connection-state=invalid
add action=drop chain=input \
    icmp-options=8:0 in-interface-list=\
    WAN protocol=icmp
add action=drop chain=forward \
    icmp-options=8:0 in-interface-list=\
    WAN protocol=icmp
add action=accept chain=input comment=\
    "defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defc\
    onf: drop all not coming from LAN" \
    disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment=\
    "defconf: accept in ipsec policy" \
    ipsec-policy=in,ipsec
add action=accept chain=forward comment=\
    "defconf: accept out ipsec policy" \
    ipsec-policy=out,ipsec
add action=fasttrack-connection chain=\
    forward comment="defconf: fasttrack" \
    connection-state=established,related
add action=accept chain=forward comment="\
    defconf: accept established,related, \
    untracked" connection-state=\
    established,related,untracked
add action=drop chain=forward comment=\
    "defconf: drop invalid" \
    connection-state=invalid
/ip firewall mangle
add action=mark-routing chain=prerouting \
    dst-address=194.232.0.0/16 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=91.215.0.0/16 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.85.0.0/16 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=\
    213.90.1.0-213.90.127.255 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=81.16.144.0/20 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    disabled=yes new-routing-mark=PPTP \
    passthrough=yes src-address=\
    192.168.110.150
add action=mark-routing chain=prerouting \
    dst-address=185.106.248.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=\
    83.68.136.1-83.68.159.255 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=109.70.96.0/21 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=130.0.68.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.14.52.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.106.248.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.14.52.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.143.180.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.144.160.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.158.24.0/24 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.158.26.0/24 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.245.64.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.254.140.0/22 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.57.51.0/24 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=185.67.108.0/23 \
    new-routing-mark=PPTP passthrough=\
    yes
add action=mark-routing chain=prerouting \
    dst-address=194.0.72.0/24 \
    new-routing-mark=PPTP passthrough=\
    yes
/ip firewall nat
add action=masquerade chain=srcnat \
    comment="defconf: masquerade" \
    ipsec-policy=out,none \
    out-interface-list=WAN
add action=masquerade chain=srcnat \
    out-interface=PPTP-ORF
/ip route
add distance=1 gateway=PPTP-ORF \
    routing-mark=PPTP
add distance=1 gateway=192.168.2.1
/system clock
set time-zone-name=Europe/Berlin
/system identity
set name=MikroTik-Keller2
/system logging
add topics=wireless,debug
/system ntp client
set enabled=yes primary-ntp=\
    192.53.103.108 secondary-ntp=\
    44.225.94.177
/system ntp server
set enabled=yes
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
 
Hank42
just joined
Posts: 2
Joined: Tue Nov 30, 2021 1:01 am

Re: Problem with CAPsMAN, wired Yamaha receiver with Spotify Connect and Spotify iOS app on mobile device

Tue Jul 12, 2022 2:43 am

I know this is an old thread, but I had a similar issue and thought I'd post for anyone banging their head against the wall for a solution. I resolved it by configuring the following two settings in the CAPs

Configuration Datapath tab:
ARP: proxy-arp
Client To Client Forwarding: [checked]

Everything started working immediately after applying those settings.
I can now see all 4 Yamaha Musiccast devices in my app where previously, I could only see one or two, and they couldn't "see" each other.

I suppose if your not using CAPs but have a similar issue, the proxy-arp and client forwarding settings under wlan configuration is something to look at.
 
MarekM80
just joined
Posts: 1
Joined: Sat Oct 01, 2022 9:29 pm

Re: Problem with CAPsMAN, wired Yamaha receiver with Spotify Connect and Spotify iOS app on mobile device

Sat Oct 01, 2022 9:36 pm

Configuration Datapath tab:
ARP: proxy-arp
Client To Client Forwarding: [checked]
Thank you! This configuration is so simple and it works immediately!!

I use AudioCast device instead Yamaha receiver but I had the same problem with Spotify Connect.
Last edited by MarekM80 on Sat Oct 01, 2022 9:39 pm, edited 1 time in total.

Who is online

Users browsing this forum: anav, gigabyte091, GoogleOther [Bot], loloski, Michiganbroadband, tjr and 89 guests