This is only an issue if you start fiddling around with multiple LAN / VLAN'sPlease bring mDNS repeater feature in Rosv7. It is a very important feature for home routers.
Ever home user needs mDNS. Don't know why mikrotik keeps ignoring this.even the edgerouter has a mdns repeater..
I am a home user and do not need it.Ever home user needs mDNS.
I keep my IoT on a separate vlan, I have my smart tv and google home devices on the same IoT vlan. How do I connect the smart tv and google home from my Wifi that is on a separate vlan?I'm a home user, and I do not neet that.Ever home user needs mDNS.
Why you assumption is so absolute?
Is absolute false.
My 4000 contracts (home and business), corresponding to more than 16000 person do not have that, no one single complain about that.
Please explain what critical part of home network do not function without mDNS.
Thanks.
you may want to put your TV or your dishwasher on an IOT VLAN so it can access to internet but not other vlans, and still want make it discoverable for the familly vlan so they can start the dishwasher or lookt at the TV from their devices?(please do not quote on useless way, use "post reply" instead)
>>>I keep my IoT on a separate vlan = VLAN of IoT devices
>>>I have my smart tv and google home devices on the same IoT vlan = TV and Google Home on same VLAN of IoT devices
>>>How do I connect the smart tv and google home from my Wifi that is on a separate vlan?
But on previous description do not are already on same VLAN of IoT devices ???
The mDNS is not the tool for do that...
Solution is extremely simple:
Create one virual wlan for other IoT devices, TV and Google Home, than work on same VLAN of IoT devices...
Do not have any sense make separate VLAN of IoT devices and then set Google and Smart TV on "main" Wi-Fi
to reply to your "Do not have any sense make separate VLAN of IoT devices and then set Google and Smart TV on "main" Wi-Fi" . I may have misunderstood. But as I understand the principle, devices were on IOT vlan but accessed from others. And then you need an MDNS repeater@benoitc why you write that quoting my post?
I.e. network printers in wired network shared with VLAN of wireless clients. Connections to printers are allowed by firewall, but mDNS are not routed so users must enter IP addresses rather than use auto-discovery feature.To those people asking for mDNS, can you give examples where it will be useful?
Hello normis,To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
mDNS is not a NAT or Routing, it simply supplies an addressmDNS repeater is needed in the case that you have an IoT vlan and you need to interact to those devices from your main vlan.
All these devices are studied to be all on same wired/wireless network, not to different VLAN....A phone connected to the main vlan needs to "cast" content to a smart tv on the restricted IoT vlan....
In a business environment, wired printers can often be on their own VLAN, or one separate from Wireless devices. Without mDNS between the networks, the built in discovery tools for printing in a lot of mobile and wireless devices does not work. It prevents printing from some mobile devices to another network. Manual setup of DNS for this is long-winded and does not always work correctly (possibly wide-area bonjour).To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
You understand than mDNS do not do NAT, routing, firewall, etc. but just resolve address?mDNS Repeater is needed to make some services work across vlans, like printing, casting and etc.
nonsense is your posts, if you don't see a reason to use it, does not mean that no one can have a reason to need it.You do not catch the point, (ignore mDNS) why make separate IoT VLAN if than must be continuosly on contact with "MAIN" VLAN?
True nonsense!!!
of course, I know that. I've FW rules to allow the connections in the way that I do.You understand than mDNS do not do NAT, routing, firewall, etc. but just resolve address?mDNS Repeater is needed to make some services work across vlans, like printing, casting and etc.
If you can comunicate between VLANs... the VLANs for this do not have any sense!
Understand?
@normis, basically some users, like me, want to isolate IoT devices by the L2 domain. but still allowing some connections to start from the trusted side.Yes, the question is, why separate the IoT, if you don't really need to separate ?
Perfectly valid point.@normis, basically some users, like me, want to isolate IoT devices by the L2 domain. but still allowing some connections to start from the trusted side.
some times all this Ch***** crap you will never know...
not in the case of using a Routerboard without a switch chip or with a limited one (like RB4011).With that settings I give some clue & hint for someone...
Simply "copy" broadcasted mDNS/SSDP between VLANs.
No something named "mDNS proxy" required...
nmap -sn 192.168.10.0/24
Surely that is one of the necessary precautions.Of course, you can configure the firewall to allow traffic only from VLAN ID 10 to 20, but backward - only within the established connections (btw, it won't work in case of mDNS due to multicast), but IMHO that's overcomplicated.
I have two VLANs one for LAN and one for WLAN. I want to cast my screen from the desktop in the LAN to my smart tv in WLAN. I use mikrotik because I need vlan segregation. Else would have gone with any other ASUS AC/AX router. Thats why I need MDNS.To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
You answer is a nonnse se as well. VLAN N allows different connections profile. Eg. You may not want to have IPV6 RA on a VLAN or use a different addressing for IOTs. You may want to only let 20Mbps throughtput to TVs. You also want IOT devices connected to the net but not allow them to discover other devices in the house. You may also want to only allows 2 VLAN to access to the same devices but let others vlans out.>>>you have an IoT gadget It might not need internet so you want to block internet access for it
Simply do not provide a gateway and DNS on lease
>>>you can use IP firewall filter if you know gadget's IP address
...no...
>>>The later part can be tricky with IPv6 and dynamic addresses...
...no... go out only know/allowed devices, if anonymize MAC, never go out
>>>but you can still filter that according to gadget's MAC address
...ok....
>>>But even that is not fail safe, Apple in particular (and others as well) started to "anonymize" MAC address...
do not buy Apple devices... or filter device with "2nd lower bit set" (000000!0) .. I do not know if is legal to change randomly the MAC (how much random?)
>>> good luck catching that.
...but on this way you still have MAC allowed to out, not a list of blocked MAC....
>>>user might want to restrict access of device to LAN services
why? what can do a device without internet to a light bulb, to a PC? etc.?.
>>>And that's not easy to do if all devices belong to same L2 network.
...really... is easy....
>>>Having separate L2 network for IoT devices solves all above mentioned problems
...yes but... still no see any problem with IoT devices on same L2 network of my PC...
I had to look, but this is apparently not something possible on an iPhone or an iPad :/
It is much easier to assign PC to both VLANs with IP 192.168.10.1/24 and 192.168.20.1/24 for VLAN 10 and 20 respectively and to prevent (by simply not creating) routing between 192.168.10.0/24 and 192.168.20.0/24 networks.
I was just describing the utility of segregating devices none vlan while wanting to access to them from others. (eg. controlling throughput or controlling who is there before anything).@benoitc I think you misunderstood again.
That post is not addressed to you.
I don't want discuss about that.
I just try to help to find one alternative solution UNTIL mDNS is available.
Hi Thanks for asking examples , I bought the MikroTik as extra router behind the router of my provider and defined 2 subnets on it. One for IOT and one for my Home PC's. I moved the IOT devices to the IOT subnet including the Philips HUE. This is not working anymore behind the MikroTIk router. I spend ours googling and wondering why it's traffic was not routed upstreams. Then I found HUE is generating MDNS traffic, I captured some of these packets. I tried to install the igmp-proxy package and see if that would help but no success. Hopfully there can be a solution for this.To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
On a hotspot network with 100 to 1000 or more devices on a network, one usually blocks multicast traffic, and adds client isolation. It would be handy to be able to reach AppleTV's or Chromecasts on a different VLAN, MDNS would be useful for this. This way we can still ensure proper efficiency and security on the main hotspot user VLAN, as well as give them access to the needed media services, without hotspot users being able to access each other.To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
/ip firewall address-list [...] add address=224.0.0.0/4 comment="defconf: multicast" list=no_forward_ipv4 [...] /ip firewall filter [...] add action=drop chain=forward src-address-list=no_forward_ipv4 comment="defconf: drop bad forward IPs" add action=drop chain=forward dst-address-list=no_forward_ipv4 comment="defconf: drop bad forward IPs" [...]
The IANA has reserved the range 224.0.0.0 to 224.0.0.255 for use by network protocols on a local network segment.
Packets with an address in this range are local in scope and are not forwarded by IP routers.
Packets with link local destination addresses are typically sent with a time-to-live (TTL) value of 1 and are not forwarded by a router.
Within this range, reserved link-local addresses provide network protocol functions for which they are reserved.
Network protocols use these addresses for automatic router discovery and to communicate important routing information.
For example, Open Shortest Path First (OSPF) uses the IP addresses 224.0.0.5 and 224.0.0.6 to exchange link-state information.
IANA assigns single multicast address requests for network protocols or network applications out of the 224.0.1.xxx address range.
Multicast routers forward these multicast addresses.
224.0.0.0/4 should be dropped from WAN not LAN@DarkNate, if for some reason you read my posts, you can notice I never suggest to use "drop bogon", except for prevent IP spoofing on WAN,
but this forum, the web, and also some mikrotik guide put 224.0.0.0/4 as bad_ipv4, like must be dropped, IGNORING THE SOURCE, or someone dies...
https://help.mikrotik.com/docs/display/ ... d+Firewall
Toom much copy&paste without know what is doing
from ros guide:ROS HELP code
/ip firewall address-list [...] add address=224.0.0.0/4 comment="defconf: multicast" list=no_forward_ipv4 [...] /ip firewall filter [...] add action=drop chain=forward src-address-list=no_forward_ipv4 comment="defconf: drop bad forward IPs" add action=drop chain=forward dst-address-list=no_forward_ipv4 comment="defconf: drop bad forward IPs" [...]
But on page, you also linked:
224.0.0.251 Multicast DNS (mDNS) address, Routers must not forward these messages outside the subnet from which they originate
The IANA has reserved the range 224.0.0.0 to 224.0.0.255 for use by network protocols on a local network segment.
Packets with an address in this range are local in scope and are not forwarded by IP routers.
Packets with link local destination addresses are typically sent with a time-to-live (TTL) value of 1 and are not forwarded by a router.
Within this range, reserved link-local addresses provide network protocol functions for which they are reserved.
Network protocols use these addresses for automatic router discovery and to communicate important routing information.
For example, Open Shortest Path First (OSPF) uses the IP addresses 224.0.0.5 and 224.0.0.6 to exchange link-state information.
IANA assigns single multicast address requests for network protocols or network applications out of the 224.0.1.xxx address range.
Multicast routers forward these multicast addresses.
Don't know, I review every rule/config line by line from guides, no blind copy/paste, so never had broken problems before.That's the point: the MikroTik help and other "guides" incorrectly drop all regardless if are needed on LANs...
Have you actually tested it or just blindly linked the wikipedia page? mDNS traffic is marked to never cross the subnet and so that even if you forcefully forward it devices which support the protocol properly will simply ignore it. You need an mDNS proxy/router which is responsible for handling mDNS announcements between subnets.Allow inter-VLAN routing, allow multi-cast routing on LAN, don't block Multicast subnets. Problem solved.
https://en.wikipedia.org/wiki/Multicast_address
I just wanted my guest network to be able to connect to the chromecast on the main network while being able to rate limit the whole guest network by simple queues, this might not be the right way but it was the easiest way for me to do it, I also wanted to setup a network only for IoT devices with no internet access, but further diving into this has only brought me across jank solutions.Yes, the question is, why separate the IoT, if you don't really need to separate ?
Yes, the question is, why separate the IoT, if you don't really need to separate ?
Couldn't agree more, the fact that Ubiquiti has had this feature for years is embarrassing. MikroTik is superior in routing, software,e and hardware, so I don't understand why they are allowing Ubiquiti to have an advantage over them. Mdns is extremely important for pro-sumers, the exact crowd that buys MikroTik for SOHO.Yes, the question is, why separate the IoT, if you don't really need to separate ?
Because the IOT device might have more than one service that its broadcasting. And with a mDNS repeater function, you could chose which services to rebroadcast on another network. And then firewall to only allow the specific features you want. My device broadcasts file server, ssh server, vnc server functionality. It would be great to filter those.
I use mDNS repeaters a lot, for instance for guest access to internal apple-tv airmirror, for printer functions etc...
It is easier to separate the network functions IOT/printer/client/server etc. It is cleaner. It is easier creating firewall rules.
Also, you might want to deny internet access from the IOT LAN.
IOT might have different security policies compared to enterprise LAN...
Do I need to go on?
I dont understand why this needs to be "explained" to mikrotik staff... lol
Right now I do this in my Aerohive AP's instead.
Another example is to put your printer on a vlan for the same reason, you want it upgradable/maintainable remotely . But you want also to make it discoverable easily.
The biggest reason I can think of, is that you might have ethernet connected IoT devices in publicly accessible locations - you don't want your trusted network to be on the end of that cable. (CCTV is more likely than IoT, but the point is still the same)Yes, the question is, why separate the IoT, if you don't really need to separate ?
Please keep all Container related questions and feedback to the specific topic: viewtopic.php?f=1&t=178342&p=878204
It would need to be able to attach docker interfaces to each vlan on the existing bridge (as it needs to be on the same broadcast domain), if possible it could work, but, still not good as a native mDNS repeater / Avahi package for ROS.In v7.1 RC3 docker support is added so anyone who has/ will try implementing mDNS via container?
I haven't done any testing yet but this looks really useful. My workaround from this point has been a VLAN trunk to a raspberry pi with unnumbered interfaces running avahi in reflector mode. I'll report back after I've had a chance to dig into v7 and containers.For those who are interested, I have a simple mDNS reflector developed by myself and running in Docker. It is just hundreds lines of code in C, supporting both ipv4 and ipv6: https://github.com/vfreex/mdns-reflector
Cool, I installed this on a hap ac2, it seems to work ok, and appears to take up very little ram, and the executable is tiny.For those who are interested, I have a simple mDNS reflector developed by myself and running in Docker. It is just hundreds lines of code in C, supporting both ipv4 and ipv6: https://github.com/vfreex/mdns-reflector
For those who are interested, I have a simple mDNS reflector developed by myself and running in Docker. It is just hundreds lines of code in C, supporting both ipv4 and ipv6: https://github.com/vfreex/mdns-reflector
which was forked into a docker (https://github.com/monstrenyatko/docker-mdns-repeater) container mentioned further down the same discussionFinally solved this!
So from Mikrotik perspective, everything was set up properly. You might need IGMP proxy for some devices, but no need for PIM (some suggested that IGMP is not enough, even though every guide says it uses IGMP), just a simple IGMP-Proxy setup will do.
I have switched from avahi to this mdns reflector:
https://github.com/kennylevinsen/mdns-repeater
With RouterOS 7.1rc3 .... would a docker image be usable?
https://github.com/monstrenyatko/docker-mdns-repeater
said in v7.1rc3 adds Docker (TM) compatible container supportWe will re-release container package soon. We wanted to improve security of the package, and make sure it does not have access to things it should not access. We will sandbox it more, re-evaluate all security aspects and will release it soon, when it is ready and completely secure.
Normis, as I'm sure you are aware, IOT devices have a notorious reputation for poor security practices. In order to limit the impact of these security problems, a conscientious network administrator will place these devices on separate VLAN. The VLAN provides an implicit context to apply additional security policies. The expectation that really _any_ IOT device is secure is foolish at best.Yes, the question is, why separate the IoT, if you don't really need to separate ?
Trust.Yes, the question is, why separate the IoT, if you don't really need to separate ?
I spend a lot of time on the Ubiquiti EdgeMAX forums, and there are many noob questions related to getting things to work across vlans.Yes, the question is, why separate the IoT, if you don't really need to separate ?
So you want your guest to be able to cast to another home? Isn't that what you are asking the ability to do, given you have "1 common guest vlan across all 4 homes."I have 4 private vlans for 4 homes and 1 common guest vlan across all 4 homes.
If I tell them that guests simply can not cast to the TVs, They'll most likely end up sharing the private vlan's password with them and I think that's just worse. :/
Anyone who's had their home network locked up by ransomware would see the value in separate VLANs.All this do not change my disbelief on need separation from IoT and home private network.
(On home point of view, business/work is another thing...)
Yes, but this won't remain turned on _forever_. I'll only be turning on this repeater when I have some guests at home. (I am writing a wrapper for the mikrotik API and people in 4 homes will get a simple interface to turn this on/off)So you want your guest to be able to cast to another home? Isn't that what you are asking the ability to do, given you have "1 common guest vlan across all 4 homes."
Care to share? Looking for something similar such the wife/kids can turn on/off a feature without having access to the router.I am writing a wrapper for the mikrotik API and people in 4 homes will get a simple interface to turn this on/off
Guessing your customers are not spoiled as othersI am a home user and do not need it.Ever home user needs mDNS.
Why is your assumption so absolute?
It is absolute-ly false.
My 4,000 contracts (home and business), corresponding to more than 16,000 people,
do not have it and no one has ever complained about it.
Please explain which critical part of the home network does not work without mDNS.
Thanks.
You will suggest everything else to prove that mikrotik doesn't need to implement mDNS. Such a simp!Use Alexa devices...
From my Office I can control devices at my Home (different cities and networks) with vocal commands...
im gonna tell them to change system who cost them 20 000 euro (its more of home automatization then smarthome) but if i have to be honest we switched them to fortigateUse Alexa devices...
From my Office I can control devices at my Home (different cities and networks) with vocal commands...
I've seen this implemented on networks using Aruba APs, specifically with AirGroup. The most common deployment reason I've seen is for AirPrint or AirPlay, ChromeCast to allow these devices in another network to be discovered by guests on other networks. Obviously appropriate firewall is required between the networks, or the segmentation is not as useful.To those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
IoT devices lack security, has vulnerabilities etc. It's always wise to separate them with VLANs.Do not have any sense make separate VLAN of IoT devices and then set Google and Smart TV on "main" Wi-Fi
That's not true. It's called limiting access. For example, say you wanted to expose port 22 to another vlan, but not port 23, you can limit what can communicate.The problem is there is no point separating trusted and untrusted vans when you allow the untrusted one inject an advertisement into the trusted one to get the trusted one to call into it not to mention allowing the untrusted one to see all that is advertised on the trusted one. Very helpful in its quest to pretend being one of them.
It would be nice to be able to copy mDNS entries in to static config on the trusted one though. Sort of like a static ip reservation flow. Pick it from list of what is on untrusted side to add static copy of it on the trusted side.
Exactly. Even Enterprise boxes from Cisco, Juniper and the usual suspects provide mDNS proxies to allow AppleTV based screen sharing among subnets so IThings can be used as sources for projectors and big screens in meeting rooms.That's not true. It's called limiting access. For example, say you wanted to expose port 22 to another vlan, but not port 23, you can limit what can communicate.
https://www.iana.org/assignments/multic ... sses.xhtmlIPv4 Multicast Address Space Registry
The range of addresses between 224.0.0.0 and 224.0.0.255, inclusive,
is reserved for the use of routing protocols and other low-level
topology discovery or maintenance protocols, such as gateway discovery
and group membership reporting. Multicast routers should not forward
any multicast datagram with destination addresses in this range,
regardless of its TTL.
Multicast routers should not forward
any multicast datagram with destination addresses in this range,
regardless of its TTL.
1. Yes, mDNS is an "rfc thing"I They know exactly what this means in regards of VLANs. Its not MTs fault, its Apple fault to use mDNS.
As a hobbyist, this might be a valid point.Its not MTs fault, its Apple fault to use mDNS.
Or, how about just a mDNS listener that shows up in /ip/neighbors to start?in the meantime we wait for the highly desired mDNS repeater/reflector
Always the printers... Didn't mean sound that harsh. It's actually problem: you'd like still find things, like printers, on the entire network, even if you "segment stuff" (e.g. use VLANs/multiple bridges/switch chip).Could agree with your statement, currently using DNS Static for printers, Chromecast etc... but for example mobile phones are not able to the printer using ip or name.
Why have a firewall if you are going to use port forwarding?Yes, the question is, why separate the IoT, if you don't really need to separate ?
I'll just point out reflection and repeaters are NOT in any IETF RFC (at least as AFAIK), for reasons explained below.there is a valid way to implement it that meets "RFC" specs, right?
Multicast DNS [RFC6762] and its companion technology DNS-based
Service Discovery [RFC6763] were created to provide IP networking
with the ease of use and autoconfiguration for which AppleTalk was
well known [RFC6760] [ZC] [ROADMAP].
For a small home network consisting of just a single link (or a few
physical links bridged together to appear as a single logical link
from the point of view of IP), Multicast DNS [RFC6762] is sufficient
for client devices to look up the ".local" host names of peers on the
same home network, and to use Multicast DNS-based Service Discovery
(DNS-SD) [RFC6763] to discover services offered on that home network.
For a larger network consisting of multiple links that are
interconnected using IP-layer routing instead of link-layer bridging,
link-local Multicast DNS alone is insufficient because link-local
Multicast DNS packets, by design, are not propagated onto other
links.
Using link-local multicast packets for Multicast DNS was a conscious
design choice [RFC6762]. Even when limited to a single link,
multicast traffic is still generally considered to be more expensive
than unicast, because multicast traffic impacts many devices instead
of just a single recipient. In addition, with some technologies like
Wi-Fi [IEEE-11], multicast traffic is inherently less efficient and
less reliable than unicast, because Wi-Fi multicast traffic is sent
at lower data rates, and is not acknowledged [MCAST]. Increasing the
amount of expensive multicast traffic by flooding it across multiple
links would make the traffic load even worse.
Partitioning the network into many small links curtails the spread of
expensive multicast traffic but limits the discoverability of
services. At the opposite end of the spectrum, using a very large
local link with thousands of hosts enables better service discovery
but at the cost of larger amounts of multicast traffic.
Performing DNS-based Service Discovery using purely Unicast DNS is
more efficient and doesn't require large multicast domains but does
require that the relevant data be available in the Unicast DNS
namespace. The Unicast DNS namespace in question could fall within a
traditionally assigned globally unique domain name, or it could be
within a private local unicast domain name such as ".home.arpa"
[RFC8375].
In the DNS-SD specification [RFC6763], Section 10 ("Populating the
DNS with Information") discusses various possible ways that a
service's PTR, SRV, TXT, and address records can make their way into
the Unicast DNS namespace, including manual zone file configuration
[RFC1034] [RFC1035], DNS Update [RFC2136] [RFC3007], and proxies of
various kinds.
The veth interface has no firewalling (as far as I know on other systems). So how to make sure that only the requested ports go through the VM?If you have a recent-enough router (one that supports containers) you can use https://github.com/mag1024/mikrotik-doc ... s-repeater to run the repeater directly on the router, without a VM.
So should I declare for a CUPS server? Should I listen to my printer with Wireshark?The TL;DR version is the RFC answer to dealing mDNS needing to span the local network/segment is actually RFC6763, https://www.rfc-editor.org/rfc/rfc6763#page-30 which is SD-DNS part of mDNS. Essentially if you add _whateverservice._tcp... in the "real" DNS, you can always have a device being able to be found. Most mDNS lookups will fall back to unicast (regular) DNS is how that all works. mDNS is really more about dynamically creating SRV records, but if you only have a handful of home things, a few the right static DNS entries save a container full of work.
Just an idea, you could add a bridge's filter to restrict the container's veth to only allow multicast traffic I suppose.The veth interface has no firewalling (as far as I know on other systems). So how to make sure that only the requested ports go through the VM?If you have a recent-enough router (one that supports containers) you can use https://github.com/mag1024/mikrotik-doc ... s-repeater to run the repeater directly on the router, without a VM.
On a Mac, there is a command "dns-sd -Z" that outputs the LAN's DNS records from mDNS broadcast, into a DNS zone file that can be use in a DNS server. I presume some similar tool exists for Win/Linux. Only issue is Mikrotik's DNS doesn't support one of the DNS type (PTR), so those records have to go into some other DNS server (perhaps Pi-Hole, but I haven't tested)So should I declare for a CUPS server? Should I listen to my printer with Wireshark?The TL;DR version... RFC6763, https://www.rfc-editor.org/rfc/rfc6763#page-30 which is SD-DNS part of mDNS. Essentially if you add _whateverservice._tcp... in the "real" DNS, you can always have a device being able to be found. Most mDNS lookups will fall back to unicast (regular) DNS is how that all works. mDNS is really more about dynamically creating SRV records, but if you only have a handful of home things, a few the right static DNS entries save a container full of work.
Did you buy something that you can run a container on? If not then yes you’re going to regret this purchase. It has been made clear certain things mdns, fixing ipv6 on their wireguard implementation etc are just not in the cards. You can of course do it yourself with a container on mikrotik for mdns or like so many things in this ecosystem. Get another device and do the lifting for the nice to have features you won’t find here.I’m new here, just waiting on the arrival of my new Mikrotik router which I was really excited about… am I to understand that in (almost) 2023 mDNS is NOT a feature of Mikrotik routers?? I have a house full of IOT devices and use Home Assistant to bridge everything beautifully to homekit for me. All my IOT devices, cameras etc. My plan was to get a good router and actually segment everything into separate LANs. Im coming from pfsense, am I going to regret this decision?
Brooding it over, mDNS allows information to flow from on vlan to another.I’m new here, just waiting on the arrival of my new Mikrotik router which I was really excited about… am I to understand that in (almost) 2023 mDNS is NOT a feature of Mikrotik routers?? I have a house full of IOT devices and use Home Assistant to bridge everything beautifully to homekit for me. All my IOT devices, cameras etc. My plan was to get a good router and actually segment everything into separate LANs. Im coming from pfsense, am I going to regret this decision?
That didn't prevent MikroTik from supporting port forwarding or UPnP. And evidently MikroTik doesn't even support upnp2 (miniupnpd) which offers more secure options. see this thread UPnP security questionsSeems broken by design to say we won’t support this for security reasons.
using the security card isn't a valid excuse
Did you buy something that you can run a container on? If not then yes you’re going to regret this purchase.
My guess at MT's rational is that it's a lot of work, for what they think are "questionable" use cases.[...] you bought a no-name smart light bulb on eBay and you don't want it to access your NAS and upload its content to the internet. But you want to be able to turn on/off the bulb from your PC/smartphone. Then why not put your PC/smartphone under both IoT and NAS VLANs?
it's a lot of work, for what they think are "questionable" use cases.
I understand the reason why you would want to put IoT devices under a separate VLAN. For instance, you bought a no-name smart light bulb on eBay and you don't want it to access your NAS and upload its content to the internet. But you want to be able to turn on/off the bulb from your PC/smartphone.
Then why not put your PC/smartphone under both IoT and NAS VLANs? Then PC will be able to access both IoT and NAS devices, but IoT cannot access NAS.
What you are trying to do, is to segregate the network on L2 (via VLAN), but then combine it together on L3 (via inter-VLAN routing). Without a firewall, there is no safety here, only an illusion of it. Yes, IoT devices on one VLAN cannot do neighbor discovery, but with inter-VLAN routing, nobody prevents them to scan the routed network (unless a properly configured firewall). For example, your PC VLAN 10 IP 192.168.10.1/24 accesses a spyware light bulb on VLAN 20 IP 192.168.20.31/24, then the bulb scans the source network (e.g.), finds a NAS at 192.168.10.75 and does nasty things with that.Code: Select allnmap -sn 192.168.10.0/24
Of course, you can configure the firewall to allow traffic only from VLAN ID 10 to 20, but backward - only within the established connections (btw, it won't work in case of mDNS due to multicast), but IMHO that's overcomplicated.
It is much easier to assign PC to both VLANs with IP 192.168.10.1/24 and 192.168.20.1/24 for VLAN 10 and 20 respectively and to prevent (by simply not creating) routing between 192.168.10.0/24 and 192.168.20.0/24 networks.
On a Mac, there is a command "dns-sd -Z" that outputs the LAN's DNS records from mDNS broadcast, into a DNS zone file that can be use in a DNS server. I presume some similar tool exists for Win/Linux. Only issue is Mikrotik's DNS doesn't support one of the DNS type (PTR), so those records have to go into some other DNS server (perhaps Pi-Hole, but I haven't tested)
avahi-resolve --name allows to map the hostname to its IP addresses.mdns-scan
...
XXXX._spotify-connect._tcp.local
embeddable Multicast DNS Daemon
This is a standalone mDNS-SD daemon for small systems. Although still
limited in functionality it can announce services like FTP, HTTP, and
SSH and respond to scanning (enumeration) requests from tools like
mdns-scan.
Anyhow I don't know the internal and security implications.docker pull yuxzhu/mdns-reflector:latest
Can somebody make a simple tutorial to demonize any working docker mDNS reflector with two interfaces on ROS7?https://github.com/vfreex/mdns-reflector
is also a good candidate and has Docker files.
Chromecasting and Casing (audio/ video / printer discovery )in general between the vlans, for example cast from the phone that is on the main network to Iot network etcTo those people asking for mDNS, can you give examples where it will be useful?
Rextended provided solutions for the given examples. Maybe there are more examples?
I still can achieve 1Gig end-to-end routing performance inter-VLAN on RB450Gx4, hAP ax2 etc. I don't see what's the problem with losing hardware offloading. As long as you use single bridge per switch chip, bridge fast-foward/fast-path will work:igmp-snooping will disable bridge hardware offloading on many low-end devices, multicast-querier must be disabled on the router?
Thanks
IMO, mDNS repeater is for lazy bums who refuse to learn PIM-SM and/or IGMP Proxy as evident in this group. Hardly any real network engineering efforts are made.@DarkNate, interesting, could you share an example of your configuration?
Thanks
#Router side#
/interface bridge
add frame-types=admit-only-vlan-tagged igmp-snooping=yes igmp-version=3 mld-version=2 name=bridge priority=0x1000 vlan-filtering=yes
add arp=disabled name=loopback protocol-mode=none
/interface vlan
add interface=bridge mtu=9214 name="VLAN40" vlan-id=40
add interface=bridge mtu=9214 name="VLAN30" vlan-id=30
/interface bridge port
#This is the trunk port connected to the L2 switch#
add bridge=bridge edge=no frame-types=admit-only-vlan-tagged interface=ether1 point-to-point=yes
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether2 pvid=40
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether3 pvid=40
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether4 pvid=40
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether5 pvid=40
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether6 pvid=40
add bridge=bridge frame-types=admit-only-untagged-and-priority-tagged interface=ether7 pvid=40
add bridge=bridge edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether8 point-to-point=yes pvid=30
/interface bridge vlan
add bridge=bridge comment="VLAN40 + MGMT VLAN" tagged=bridge,ether1 vlan-ids=30,40
/ip address
add address=100.64.0.1/24 comment="VLAN40" interface="VLAN40" network=100.64.0.0
add address=30.0.0.0 comment="Loopback" interface=loopback network=10.0.0.0
add address=100.64.2.1/25 comment="VLAN30" interface="VLAN30" network=100.64.2.0
/routing igmp-proxy interface
add interface=loopback upstream=yes
add interface="VLAN40"
add interface="VLAN30"
#On L2 switch side#
/interface bridge
add frame-types=admit-only-vlan-tagged igmp-snooping=yes igmp-version=3 mld-version=2 name=bridge priority=0x2000 vlan-filtering=yes
/interface bridge port
#Ether1 is trunk port connected to router#
add bridge=bridge comment=defconf edge=no frame-types=admit-only-vlan-tagged interface=ether1 point-to-point=yes trusted=yes
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether2 pvid=40
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether3 pvid=40
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether4 pvid=40
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=5GHz_1 pvid=40
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=2GHz_1 pvid=40
add bridge=bridge comment=defconf edge=yes frame-types=admit-only-untagged-and-priority-tagged interface=ether5 pvid=30
/interface bridge vlan
add bridge=bridge tagged=ether1,bridge vlan-ids=30
add bridge=bridge tagged=ether1,bridge vlan-ids=40
That's one way to look at it. But why is MikroTik selling hAP ax lite into the home market? Most home users are not network engineers.IMO, mDNS repeater is for lazy bums who refuse to learn PIM-SM and/or IGMP Proxy as evident in this group. Hardly any real network engineering efforts are made.
I appreciate that MikroTik doesn't bend down to lazy-bums' demand for years. One of the few good vendors in that regard.
MikroTik sells hardware running a single version of RouterOS, the same thing found in ISPs, Telcos and Data Centres. Which vendor other than MikroTik sells an AP like ax lite supporting MPLS over IPv6 out of the box? None.That's one way to look at it. But why is MikroTik selling hAP ax lite into the home market? Most home users are not network engineers.
Your argument sounds similar to:
IMO, the nano editor is for lazy bums who refuse to learn vi. ...
Use IGMP Proxy in simple VLAN segregated home networks and call it a day. iPhone in VLAN1 can talk to iPhone in VLAN2 for AirFuckKnowsWhat, no problem.Well I'm not sure using OpenWRT is needed either. If you use just one LAN at a home, that solves the problem too.
And if you're are using VLANs, don't put stuff that needs multicast (e.g. mDNS [AirPrint, etc.]) on different subnets, also solve this. Since there are containers that support mDNS, that's an easy out here for Mikrotik when someone wants to do something non-standard. Or want to get more creative? DarkNate's complex world of multicast routing awaits – for those that just got the hang of VLANs...
But even after 50K views, no one has described how it work in practice, beyond "others vendors do it" or "add X package"... e.g. how would Mikrotik even define the needed mDNS "overlay network" in the RouterOS config? I don't think this is a trivial or easy thing to do.
While not a fan of @DarkNate's tone, have to agree I'm glad Mikrotik has NOT "caved in" to mob here. The standards/RFCs advise against repeating mDNS. And unicast DNS-SD is the RFC approved method for "mDNS" accross subnets/segments.
If mDNS proxy is implemented, the RFC is broken because on RFC mDNS must not be forwarded outside local LAN...
What are you talking about? Multicast is superior for saving resources:"Sorry bro" but unicast is way more efficient than multicast. Not saying don't use IGMP or a container to solve mDNS via milticast... but I can totally see why Mikrotik doesn't add this. e.g.If mDNS proxy is implemented, the RFC is broken because on RFC mDNS must not be forwarded outside local LAN...
I'll give that at some small scale multicast may be more efficient – but you can't IGMP proxy a large enterprise/campus/etc network – exactly where it breaks down is harder to predict. And compared to TTL-based caching of unicast DNS-SD results, I'm not sure even at smaller scales... But certainly multicast isn't friendly to Wi-Fi with duplicative mDNS data taking up airtime...Why do you need mDNS proxy when IGMP Proxy for inter-VLAN multicast routing works fine, to begin with?
It seems you aren't aware that multicast is used in large scale from stock trading which is nanosecond sensitive to TV networks where multicast serves hundreds of millions of users per second, that unicast simply cannot do without choking a 10G or even 100G link.I'll give that at some small scale multicast may be more efficient – but you can't IGMP proxy a large enterprise/campus/etc network – exactly where it breaks down is harder to predict. And compared to TTL-based caching of unicast DNS-SD results, I'm not sure even at smaller scales... But certainly multicast isn't friendly to Wi-Fi with duplicative mDNS data taking up airtime...
But I think we're in agreement: Mikrotik shouldn't blindly ignore the RFCs WRT to how mDNS/DNS-SD works by promoting it to a mDNS redirection/reflection/etc into a built-in feature. If you want to expand the scope of all multicast (e.g. not just mDNS), then certainly PIM and IGMP proxy are valid ways to go. As would a container.
I am not a multicast routing expert. But I work with those who are. None of them are in this thread.@DarkNate
You are little bit arrogant, aren't you?
That you are expert in multicast routing does not mean that everyone else must be too. Good for you, but call anyone else lazy-bum?
Not everyone needs to know multicast routing even if they work in IT.
Mikrotik sells wireless APs on consumer market and with "wizard" for simple setup. Do you think that user who buys mikrotik and uses wizard should be able to setup multicast routing and IGMP proxy?
Mikrotik sells to consumers too and configuration should be simple.
And another point. I got briefly over "Multicast DNS" RFC6762 and on several places it counts with "Multicast DNS Proxy Servers" for example as with duplicate answer suppression.
So I do not see anything wrong or proxy/repeater.
Other vendors, even big names have such feature.
So if Mikrotik still plans to sell on consumer market they should consider this functionality. No consumer will do IGMP proxy, multicast etc.
Why is the bridge upstream? Who told you to do that? I said the loopback needs to be upstream and then the L3 VLANs are separate downstream.@DarkNate, appreciated your help, followed suggestions on the previous post but not working, could be my fault.
Tried setting the bridge as upstream and then the VLAN2, printer was not visible on both cases, connected to VLAN1 and worked immediately.
I'm OK with IGMP Proxy, the MT complicated way instead of the more consumer repeater, I worked for a short time on huge CISCO campus network (but I'm not experienced as you), never had any problem printing or sharing contents on Apple devices between VLANs with the "repeater" function.
In my case I'm a low-end user, I can print with my computer using the static IP of the isolated device, using an iPhone is not possible to set the IP. How can you eventually build a network for a client with this missing feature?
/interface bridge filter
add action=accept chain=forward dst-address=224.0.0.251/32 dst-mac-address=\
01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 ip-protocol=udp \
mac-protocol=ip out-interface=EoIP src-port=5353 comment=mDNS
add action=accept chain=forward comment=SSDP dst-address=239.255.255.250/32 \
dst-mac-address=01:00:5E:7F:FF:FA/FF:FF:FF:FF:FF:FF dst-port=1900 \
ip-protocol=udp log-prefix=SSDP mac-protocol=ip out-interface=EoIP
add action=drop chain=output out-interface=EoIP
add action=drop chain=forward out-interface=EoIP
/interface bridge
add comment="Main Bridge VLAN filtering runs on" frame-types=admit-only-vlan-tagged name=BridgeMain protocol-mode=none pvid=999 vlan-filtering=yes
add comment="Bridge for linking VLANs with filtering" name=BridgeVLANs protocol-mode=none
/interface ethernet
set [ find default-name=ether2 ] comment="Eth PVID100"
set [ find default-name=ether3 ] comment="Eth PVID200"
/interface vlan
add comment="VLAN100 on main bridge" interface=BridgeMain name=VLAN100 vlan-id=100
add comment="VLAN200 on main bridge" interface=BridgeMain name=VLAN200 vlan-id=200
/interface bridge filter
add action=accept chain=forward comment="Allow VLAN100 mDNS traffic out" dst-address=224.0.0.251/32 dst-mac-address=\
01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 out-interface=VLAN100 ip-protocol=udp mac-protocol=ip src-port=5353
add action=accept chain=forward comment="Allow VLAN200 mDNS traffic out" dst-address=224.0.0.251/32 dst-mac-address=\
01:00:5E:00:00:FB/FF:FF:FF:FF:FF:FF dst-port=5353 out-interface=VLAN200 ip-protocol=udp mac-protocol=ip src-port=5353
add action=drop chain=forward comment="VLAN100 drop all other forwarding" out-interface=VLAN100
add action=drop chain=output comment="VLAN100 drop all output" out-interface=VLAN100
add action=drop chain=forward comment="VLAN200 drop all other forwarding" out-interface=VLAN200
add action=drop chain=output comment="VLAN200 drop all output" out-interface=VLAN200
/interface bridge port
add bridge=BridgeVLANs comment="VLAN100 Port" interface=VLAN100
add bridge=BridgeVLANs comment="VLAN200 port" interface=VLAN200
add bridge=BridgeMain comment="Eth PVID100" frame-types=admit-only-untagged-and-priority-tagged interface=ether2 pvid=100
add bridge=BridgeMain comment="Eth PVID200" frame-types=admit-only-untagged-and-priority-tagged interface=ether3 pvid=200
/interface bridge settings
set use-ip-firewall=yes use-ip-firewall-for-vlan=yes
/interface bridge vlan
add bridge=BridgeMain comment="VLAN100 port definitions" tagged=BridgeMain vlan-ids=100
add bridge=BridgeMain comment="VLAN200 port definitions" tagged=BridgeMain vlan-ids=200
/ip address
add address=172.16.200.254/24 comment="VLAN200 interface address" interface=VLAN200 network=172.16.200.0
add address=172.16.100.254/24 comment="VLAN100 interface address" interface=VLAN100 network=172.16.100.0
Darknate is correct but let me add context.Just deploy IGMP Proxy correctly:
https://help.mikrotik.com/docs/display/ROS/IGMP+Proxy
IGMP Proxy is closest to an internet standard than mDNS reflector/Avahi bullshit is. IGMP Proxy also handles stuff unrelated to mDNS, therefore allow ALL multicast traffic to work correctly across VLANs.That being, neither IGMP Proxy nor mDNS reflection with Avahi is "correct". They're both "as bad as each other" in regards to the mDNS RFC. Pick one, make it work, and knock yourself out.
The more you fight against mDNS reflector/proxy the more it is ridiculous.
This is not for regular users and not easy to set up.
If you check RFC for mDNS, you will see it counts with reflection, gateways even if it itself does not define proxying.
Anyway other vendors do this (even Cisco) so it is just Mikrotik's decision.
VLANs + mDNS containers hacks takes like 10 minutes total for a noob.If you've gone done the road of subnetting your LAN, IGMP Proxy should not be a huge leap. And if it was, maybe you should re-think segmenting your network in the first place?
Let's see if this second attempt will be the good one...it's only two-three lines of config to get it working:
viewtopic.php?t=174354#p982910
/interface bridge add frame-types=admit-only-vlan-tagged igmp-snooping=yes igmp-version=3 mld-version=2 name=Bridge protocol-mode=mstp vlan-filtering=yes
/ip address add address=192.168.10.1/24 interface=LAN network=192.168.10.0
/ip address add address=192.168.20.1/26 interface=IoT network=192.168.20.0
/ip address add address=192.168.30.1/28 interface=NAS network=192.168.30.0
/routing igmp-proxy interface add alternative-subnets=192.168.20.1/26,192.168.30.1/28 interface=LAN upstream=yes
/routing igmp-proxy interface add interface=IoT
/routing igmp-proxy interface add interface=NAS
Why do you keep insisting on doing the complete opposite of my config example here?Let's see if this second attempt will be the good one
Code: Select all/interface bridge add frame-types=admit-only-vlan-tagged igmp-snooping=yes igmp-version=3 mld-version=2 name=Bridge protocol-mode=mstp vlan-filtering=yes /ip address add address=192.168.10.1/24 interface=LAN network=192.168.10.0 /ip address add address=192.168.20.1/26 interface=IoT network=192.168.20.0 /ip address add address=192.168.30.1/28 interface=NAS network=192.168.30.0 /routing igmp-proxy interface add alternative-subnets=192.168.20.1/26,192.168.30.1/28 interface=LAN upstream=yes /routing igmp-proxy interface add interface=IoT /routing igmp-proxy interface add interface=NAS
Wrong argument. The same you could say about IGMP proxy - so no need to look for IGMP RFCs.Wrong. 239.0.0.0/8 are defined to be per interface in RFC2365, so there no need to look at mDNS RFCs.
Wrong argument. The same you could say about IGMP proxy - so no need to look for IGMP RFCs.Wrong. 239.0.0.0/8 are defined to be per interface in RFC2365, so there no need to look at mDNS RFCs.
Doesn't work. Used your specific example, including adding ipv6 GUA on the loopback, still no packets traverse the IGMP ProxyUse IGMP Proxy in simple VLAN segregated home networks and call it a day. iPhone in VLAN1 can talk to iPhone in VLAN2 for AirFuckKnowsWhat, no problem.
Unicast DNS-SD defeats the whole purpose of multicast aka saving computing resources on L2 and L3.
without "idiotic" requests, you wouldn't have an easy to use interface like winbox.VLANs + mDNS containers hacks takes like 10 minutes total for a noob.If you've gone done the road of subnetting your LAN, IGMP Proxy should not be a huge leap. And if it was, maybe you should re-think segmenting your network in the first place?
IGMP Proxy, takes 5 seconds to configure for all VLANs.
Not sure why these experts keep demanding MikroTik for mDNS repeater crap.
@MikroTik should continue as they are and never succumb to idiotic requests.
For the record, IoT devices work perfectly fine with IGMP Proxy in home use cases.
In production, we use PIM not IGMP Proxy or mDNS bs.
You didn't correctly configure it, and you are even hiding the config from the public in this forum just to make my solution look bad. And you need to be extra stupid to set a VLAN interface as upstream, unless a single multicast server like IPTV is running behind VLAN10.I've tested your solution for IGMP Proxy, and that doesn't work for mdns. No packets traverse the proxy. If I set the loopback as the upstream... 0 packets recieved / transmitted on either of the 3 interfaces.
If I set the vlan10 as the upstream, RX packets are seen on that interface, but not anywhere else.
interface bridge mdb print
As already explained, since you're expert I suggest you talk to official MikroTik support, packet count will be zero in IGMP Proxy when it is working correctly. Why? Ask them, you're the expert in this conversation clearly.Doesn't work. Used your specific example, including adding ipv6 GUA on the loopback, still no packets traverse the IGMP Proxy
IGMP Proxy, takes 5 seconds to configure for all VLANs.
For the record, IoT devices work perfectly fine with IGMP Proxy in home use cases.
The guy is the toxic avenger. He may have some experience, but how he has been allowed to touch big networks with such a bad attitude is just horrible. These forums (and other places) are meant to help people with Mikrotik, not belittle others. I never claimed to be an expert, yet he starts with nasty attitude with everyone. Calling everyone lazy for wanting a convenience feature is such a bad attitude.For posters here........... Do not mind Darknate's lack of personal communication skills (probably why he has more dates with large networks than real people ) and of course the rampant narcissism.
He has a lot of experience with many large networks that is invaluable to other large network users!
How that translates to smaller home or SOHO setups is not always clear or necessarily possible.
Very pragmatic 'to the point' advice, (and expect some pushback if you keep ignoring the advice provided or keep applying it wrong after repeated attempts/time to help)
why would someone need to have that? worse, why even relay such network noise?Ever home user needs mDNS. Don't know why mikrotik keeps ignoring this.even the edgerouter has a mdns repeater..
That's the existential question here. Butwhy would someone need to have that? worse, why even relay such network noise?
And... it sounds like this could be resolved by better docs on IGMP Proxy for those that want to go this route. An example there would go a long way.[...] at the end it is Mikrotik's pure business decision [...]
If you know solution without mDNS repeater on ROS for case in my previous post I will be glad to try it. Case is that VPN is L3 tunnel between devices because client device (iOS) doesn't allow sandboxed VPN apps to create interfaces which can handle L2.why would someone need to have that? worse, why even relay such network noise?
This solution is:Maybe para 5 ( which at the bottom has a link to another solution ). - viewtopic.php?t=194646
IOT. This category of devices is now more prolific than every before. In homes, smb, and enterprises. We’re looking for tools to allow us to segregate these devices, yet interact the way that is convenient to those that are paying IT/Network support/engineers.why would someone need to have that? worse, why even relay such network noise?
Ever home user needs mDNS. Don't know why mikrotik keeps ignoring this.
Exactly. Give us a working example to get chromecast/airplay working using the IGMP Proxy and all of this noise goes away.That's the existential question here. Butwhy would someone need to have that? worse, why even relay such network noise?And... it sounds like this could be resolved by better docs on IGMP Proxy for those that want to go this route. An example there would go a long way.[...] at the end it is Mikrotik's pure business decision [...]
But specific the troubles in making IGMP working may involve the firewall. Both the multicast discovery and the resulting unicast traffic once a device was discovered need to be allowed. If you block inter-VLAN forwarding, the IGMP proxy follows those rules too.
By the looks of it, L2 segregation for the mentioned above cases is an illusion of safety.
So you want to cut-and-paste without understanding what it does? If you can't troubleshoot it, you shouldn't use it.Exactly. Give us a working example to get chromecast/airplay working using the IGMP Proxy and all of this noise goes away.
/interface bridge filter
add action=accept chain=forward comment="Allow mDNS" dst-address=224.0.0.251/32 mac-protocol=ip
add action=drop chain=forward comment="Drop all other multicast" dst-address=224.0.0.0/4 mac-protocol=ip
And if you want smartphone to see Samsung TV from WAN?Don't want your Samsung TV (for example) to "see" your Samsung smartphone? What do you care for? Both devices are already full of Samsung spionage...
Yes, WG or OpenVPN (tun)Are you really asking how to make a VPN that puts the remote device in the same L2 domain?
On that case the problem is not "mDSN or not", it's another one...
Yeah, but this is not exact real time, and it involves additional actions while working, It is more convenient to have screen mirror...Send the video via whatsapp, anyway the video must be transferred... and the person at home sees it on TV or smartphone as they like...
Working or at home?[…] involves additional actions while working […]
I did replied to him regarding that. viewtopic.php?p=992311#p992285@anav already do that... (if I do not have rad bad...) search his topic...
Well this is in scope of mDNS discovery (AirPlay/Chromecast).But please remain ontopic, for mDNS.
Working at any location...Working or at home?
No physical office exists in my case, home is only static physical location with ROS... Someone one can be at home and I want to share screen to that someone from any location.If you are working exist thousand of methoids to link two office on L2, if is just your vacation video, you can have a videocall during the proiection of already sended video...
Ok, I was seeking solutions for WG or tun ovpn.Send mDNS over WAN? (can happen...)
I think you solve with IPsec and L2TP on your case (or also by other VPN), but this is offtopic.
Actually OP is "Please bring mDNS repeater feature in Rosv7. It is a very important feature for home routers.", network topology is not specified.The intention of the main argument is to have mDNS to unnecessarily divide the home LAN into multiple VLANs,
and then allow the various devices to see each other as if they are in the same LAN/VLAN...
Yes, understand, he integrate it's need, and why, on successive post:Actually OP is "Please bring mDNS repeater feature in Rosv7. It is a very important feature for home routers.", network topology is not specified.
Security is done in layers.I liked this quote from Mikrotik:By the looks of it, L2 segregation for the mentioned above cases is an illusion of safety.
But...So you want to cut-and-paste without understanding what it does? If you can't troubleshoot it, you shouldn't use it.Exactly. Give us a working example to get chromecast/airplay working using the IGMP Proxy and all of this noise goes away.
If IGMP Proxy isn't working, Mikrotik has /tool/torch that might help with what's going on. See https://www.youtube.com/watch?v=45E2uwI3xhc and 224.0.0.251 as the dst-address and/or port 5353 to find mDNS (and you might want to change time out to 1:00 from 00:03).
Also, if one wanted limit IGMP proxy to limit to just mDNS etc. this should work
But didn't setup/test – I think rebroadcasting mDNS across subnets is a bad idea – but this would at least limit the scope of the IGMP proxy.Code: Select all/interface bridge filter add action=accept chain=forward comment="Allow mDNS" dst-address=224.0.0.251/32 mac-protocol=ip add action=drop chain=forward comment="Drop all other multicast" dst-address=224.0.0.0/4 mac-protocol=ip
Also @DarkNate recommends a loopback, but the upstream could be the VLAN where you your doing the browsing from ("main"/base/mgmt/etc) and the "IoT VLANs" point to that "main VLAN" and that might be more friendly to the default firewall than adding a loopback bridge.
Glad that you understand, I will see if I will open another topic for issue with my case, need to investigate if this even possible on this network layer.I specify, however, that I am neither for, nor against the request.
I am against things made without sense, dividing everything and then having the needs to leave the devices communicate with each other again...
In a certain sense, what you asked for, even if it is resolved in another way, seems to me much more logical and useful....
Then you can get argument that putting security and mDNS reflector in same sentence is oxymoron since someone on another network can do mitm attack and send discovery responses to services on bogus device. See: https://www.ieee-security.org/TC/SP2021 ... slides.pdf I think for home networks this is not concern.In such networks you want to achieve connectivity and keep segmentation due to security reasons and mDNS reflector/proxy is an option how to do it.
Just to then punch holes in those layers? And just ignoring the vendors advice (e.g. the "illusion of security") here, which be okay if you understood the underlying network protocols risks. But cut-and-paste other peoples configuration you don't understand doesn't seem very safe/secure to me. Just keeping the VLAN-as-security myth alive.keep segmentation due to security reasons
Don't we punch holes into firewalls EVERYDAY with port forwarding? How about UPnP? GEOIP blocking? Content filtering? The OOTB experience with any CCR isn't 'secure'. It's what you make of it, and you have make compromises otherwise everything would be 0 trust and the world would be air gapped.Just to then punch holes in those layers? And just ignoring the vendors advice (e.g. the "illusion of security") here, which be okay if you understood the underlying network protocols risks. But cut-and-paste other peoples configuration you don't understand doesn't seem very safe/secure to me. Just keeping the VLAN-as-security myth alive.keep segmentation due to security reasons
Use QuickSet, and then add any bridge filter drop rules you want. That actually give you all the fine-grain control between devices to implement whatever rules you want to block things... And to me seems like a better approach with your level of expertise here as that's pretty simple. No VLANs required. No IGMP Proxy. Just whatever "/interface/bridge/filter add action=drop" you want.
I do actually, from home user perspective, like myself, if you have complete control of your network clients and you don't expect elite hackers as your home guests, as I wrote at the end - no concern. My comment was that you can expect argument from someone related to enterprise/business network security perspective since you mentioned "Enteprises".@optio, Amm0
I guess you understand it wrong from my perspective.
The concern may depend on a user.I do actually, from home user perspective, like myself, if you have complete control of your network clients and you don't expect elite hackers as your home guests, as I wrote at the end - no concern
---BOF---
###R1###
/interface bridge
add igmp-snooping=yes igmp-version=3 ingress-filtering=no mld-version=2 name=LANBridge priority=0x1000 vlan-filtering=yes
add arp=disabled name=loopback protocol-mode=none
#This is the trunk port connected to the a set of CRS Switches via MLAG#
/interface bridge port add bridge=LANBridge interface=LACPtoSwitches trusted=yes
/interface bridge port add bridge=LANBridge interface=ether5 pvid=69
#VLAN 69 is IOT Chromecast vlan - VLAN 75 is main vlan#
/interface bridge vlan add bridge=LANBridge tagged=LANBridge,LACPtoSwitches vlan-ids=75
/interface bridge vlan add bridge=LANBridge tagged=LANBridge,LACPtoSwitches vlan-ids=69
#IP ADDRESSES#
/ip address add address=10.69.69.1/24 comment="IOT" interface=v69 network=10.69.69.0
/ip address add address=10.69.75.1/24 comment="main network" interface=v75 network=10.69.75.0
/ip address add address=10.0.0.1 interface=loopback network=10.0.0.1
#DHCP SERVERS#
/ip pool add name=69pool ranges=10.69.69.51-10.69.69.200
/ip dhcp-server add address-pool=69pool dhcp-option-set=voice interface=v69 lease-time=5h55m name=v69_dhcp
/ip dhcp-server network add address=10.69.69.0/24 dns-server=10.69.69.1 gateway=10.69.69.1
/ip pool add name=75pool ranges=10.69.75.51-10.69.75.254
/ip dhcp-server add address-pool=75pool interface=v75 lease-time=1h10m name=v75_dhcp
/ip dhcp-server network add address=10.69.75.0/24 dns-server=10.69.75.1 gateway=10.69.75.1
#IGMP Proxy #
/routing igmp-proxy interface add interface=v75
/routing igmp-proxy interface add interface=v69
/routing igmp-proxy interface add interface=loopback upstream=yes
#On BOTH CRS3X Switches#
#SW1#
/interface bridge add dhcp-snooping=yes igmp-snooping=yes igmp-version=3 ingress-filtering=no mld-version=2 name=MLAG-BRIDGE vlan-filtering=yes
/interface ethernet set [ find default-name=ether23 ] comment="POE SW LACP LegA"
/interface ethernet set [ find default-name=ether24 ] comment="R1 LACP LegA"
/interface ethernet set [ find default-name=sfp-sfpplus1 ] comment="ICC LACP Leg1"
/interface ethernet set [ find default-name=sfp-sfpplus2 ] comment="ICC LACP Leg2"
#SW2#
/interface bridge add dhcp-snooping=yes igmp-snooping=yes igmp-version=3 ingress-filtering=no mld-version=2 name=MLAG-BRIDGE vlan-filtering=yes
/interface ethernet set [ find default-name=ether23 ] comment="POE SW LACP LegB"
/interface ethernet set [ find default-name=ether24 ] comment="R1 LACP LegB"
/interface ethernet set [ find default-name=sfp-sfpplus1 ] comment="ICC LACP Leg1"
/interface ethernet set [ find default-name=sfp-sfpplus2 ] comment="ICC LACP Leg2"
#Both Switches Match below#
/interface bridge mlag set bridge=MLAG-BRIDGE peer-port=ICC-BOND
/interface bridge port add bridge=MLAG-BRIDGE interface=ICC-BOND pvid=99 trusted=yes
/interface bridge port add bridge=MLAG-BRIDGE interface=POE-SW-BOND trusted=yes
/interface bridge port add bridge=MLAG-BRIDGE interface=R1-BOND trusted=yes
/interface bridge port add bridge=MLAG-BRIDGE interface=ether2 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether3 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether4 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether5 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether6 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether7 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether8 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether9 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether10 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether11 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether12 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether13 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether14 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether15 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether16 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether17 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether18 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether19 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether20 pvid=69
/interface bridge port add bridge=MLAG-BRIDGE interface=ether21 pvid=69
/interface bridge vlan add bridge=MLAG-BRIDGE tagged=ICC-BOND,R1-BOND,POE-SW-BOND,SERVER1-BOND vlan-ids=75
/interface bridge vlan add bridge=MLAG-BRIDGE tagged=ICC-BOND,POE-SW-BOND,R1-BOND,SERVER1-BOND vlan-ids=69
#HP2520G config#
HP2520G-SW1# show ip igmp config
IGMP Service Config
Control unknown multicast [Yes] : Yes
Forced fast leave timeout [0] : 4
Delayed flush timeout [0] : 0
VLAN ID VLAN Name IGMP Enabled Querier Allowed Querier Interval
------- ------------ ------------ --------------- ----------------
1 vlan1 No Yes 125
69 IOT Yes Yes 125
75 Main Yes Yes 125
##CAP AC AP - Connected to HP POE Switch##
/interface wireless set [ find default-name=TestIOT ] band=2ghz-g/n country="united states" disabled=no frequency=auto mode=ap-bridge multicast-helper=full radio-name=Cap2-2G security-profile=s2gwifipass ssid=TestIOT station-roaming=enabled vlan-id=69 vlan-mode=use-tag wps-mode=disabled
/interface wireless add disabled=no keepalive-frames=disabled mac-address=CE:2D:E0:47:9B:EA master-interface=TestIOT multicast-buffering=disabled multicast-helper=full name=Main security-profile=s2gwifipass ssid=s2gwifi vlan-id=75 vlan-mode=use-tag wds-cost-range=0 wds-default-cost=0 wps-mode=disabled
/interface bridge add comment=defconf igmp-snooping=yes igmp-version=3 mld-version=2 name=lanBridge
/interface bridge port add bridge=lanBridge comment=defconf ingress-filtering=no interface=ether1
/interface bridge port add bridge=lanBridge comment=defconf ingress-filtering=no interface=ether2
/interface bridge port add bridge=lanBridge interface=wlan1
/interface bridge port add bridge=lanBridge interface=TestIOT
---EOF---
You can use the same config as mine, simply replace both VLANs from my example with your two bridges in IGMP Proxy, that's it. Each bridge is a separate broadcast domain, same thing as VLAN, only bridge is untagged traffic.I'm interested into how this IGMP proxy works because it might fix my issue hopefully.
I have a server which runs on a subnet (192.168.3.0/24) and other devices on another one (10.10.10.0/24). No VLANs, just two subnets set up on two bridges.
I installed jellyfin on the server, and it happens now that a client (my smart TV) is on the subnet 10.10.10.0/24 and it should get access to the jellyfin app running on the server and its contents via DLNA I guess. I had already set a few firewall rules on my MK device to allow a couple of devices on 10.10.10.0/24 to acces my server, like my tv, and my laptop when I'm on the other subnet. They works. However, I didn't manage to make my tv see jellyfin contents on the server, I thought that IGMP or mDNS might have something to do with it.
I'm not a computer networking expert so I am aware that I might have said something stupid.
Could you help me figure it out?
Thanks
My dude, I work with MikroTik on daily basis, at home as well or in home use cases.The guy is the toxic avenger. He may have some experience, but how he has been allowed to touch big networks with such a bad attitude is just horrible. These forums (and other places) are meant to help people with Mikrotik, not belittle others. I never claimed to be an expert, yet he starts with nasty attitude with everyone. Calling everyone lazy for wanting a convenience feature is such a bad attitude.
He then goes on to say 'contact support'. There is virtually no support for anyone that doesn't have a contact at Mikrotik. Forums and other venues like reddit and my discord are one of the very few places people can get help on MIkrotik topics.
People want it because they like flooding their networks at home with BUM. No clue why.why would someone need to have that? worse, why even relay such network noise?
Advanced use case for IGMP Proxy is possible as long as you have RSTP handling L2 loops, otherwise you will need PIM, it simply needs better examples from MikroTik. For inter-VLAN firewalling, you'll need to be careful with firewalling of multicast groups, better to ensure you permit all multicast in firewall on all LAN interfaces (all VLANs etc).That's the existential question here. Butwhy would someone need to have that? worse, why even relay such network noise?And... it sounds like this could be resolved by better docs on IGMP Proxy for those that want to go this route. An example there would go a long way.[...] at the end it is Mikrotik's pure business decision [...]
But specific the troubles in making IGMP working may involve the firewall. Both the multicast discovery and the resulting unicast traffic once a device was discovered need to be allowed. If you block inter-VLAN forwarding, the IGMP proxy follows those rules too.
I'm using iPhone etc, smart TVs etc on different VLANs. IGMP Proxy works fine, as per my example, nothing special is configured.IOT. This category of devices is now more prolific than every before. In homes, smb, and enterprises. We’re looking for tools to allow us to segregate these devices, yet interact the way that is convenient to those that are paying IT/Network support/engineers.
With how much iPhone , bonjour, AirPlay,, chromecast has been made the norm, sometimes it’s not always possible to say ‘no’.
It's just L2/2.5 talk between Samsung TV and phone, instead of them relaying traffic over a TURN server, or downloading updates, one device can download and push via multicast to all devices.The fact is another, the problem is the absolute trust that is given to smartphones and computers,
which are seen as ultra-secure and without any espionage problems...
Instead the "IoT", which are products that come from exactly the same manufacturers, just from another brand, are the devil.
Well, it is precisely this blindness that causes most of the problems...
Don't want your Samsung TV (for example) to "see" your Samsung smartphone? What do you care for? Both devices are already full of Samsung spionage...
This situation is borderline comical, in own home separate the network because otherwise WHAT?
And I'm not talking about the "guest" who wants to print on our printer, since the latest printers already does it on their own without even using the Internet or home wlan...
All this effort for NOTHING. That's what the truth is for me.
I repeat, for me, then being an opinion, it is not said that it is an absolute truth that, only a few Than here on the forum Oven's truth,
it's like religious people, you're just an idiot, only they (religious people) know the truth and we can't tell it, we wouldn't understand it, we are inept...
Upstream can be a VLAN, only if you want that VLAN to serve multicast traffic, this means everything else like iPhone AirDrop on other VLANs or on the same VLANs will follow BUM flood everywhere on every port.Also @DarkNate recommends a loopback, but the upstream could be the VLAN where you your doing the browsing from ("main"/base/mgmt/etc) and the "IoT VLANs" point to that "main VLAN" and that might be more friendly to the default firewall than adding a loopback bridge.
Config looks fine. But possibly, I could've missed something. Run a torch/packet sniffer and perform analysis on what happens when you try Chromecast. Something, somewhere is dropping the packet. Multicast-querier should remain disabled on the bridges/HP switch.Here is my config for following Nate's suggestion. Both Airplay and Chromecast still don't work.
ok, is there something I can digest to better understand where Multicast-querier should be disabled? I currently see it querier enabled for those vlans on the AP switch. (I've now disabled those, tested, issue remains).Config looks fine. But possibly, I could've missed something. Run a torch/packet sniffer and perform analysis on what happens when you try Chromecast. Something, somewhere is dropping the packet. Multicast-querier should remain disabled on the bridges/HP switch.
I don't know how to debug mdns / IGMP Proxy.If you're advanced enough to use MLAG and VLANs, you should be advanced enough to debug.
Thank you for the recommendation, I'll verify that the bridge priority is setup properly on all the switches/router.And unrelated but important, you should ensure bridge priority is correctly configured on all the network routers/switches to ensure RSTP/BPDUs work correctly. Refer to vendor docs on that, from MikroTik and HP.
Doesn't Chromecast actually use SSDP? If so, same story, but 239.255.255.250 port 1900 is what you'd need to look at if it does use SSDP.When I torch the vlan69, and test ccast, i do not see any traffic for port 5353.
Yep, ingress-filtering is already set to no.Doesn't Chromecast actually use SSDP? If so, same story, but 239.255.255.250 port 1900 is what you'd need to look at if it does use SSDP.When I torch the vlan69, and test ccast, i do not see any traffic for port 5353.
Also, didn't study the config very carefully, maybe covered...but "ingress-filtering=no" on your main bridge might allow those evil IoT device pass tagged traffic since the bridge won't enforce the VLAN tagging rules (except for PVID).
Very good. I'll try it. Thank you
You can use the same config as mine, simply replace both VLANs from my example with your two bridges in IGMP Proxy, that's it. Each bridge is a separate broadcast domain, same thing as VLAN, only bridge is untagged traffic.
Hello @DarkNate, apologies for not having followed your example, it was not clear that the "loopback" interface was the one that did the trick.What is the reason for your fear of loopback interface to correctly set the upstream interface?
/interface bridge add arp=disabled name=loopback protocol-mode=none
/ip address add address=10.0.0.0 comment="Loopback" interface=loopback network=10.0.0.0
/routing igmp-proxy interface add interface=loopback upstream=yes ([i]then also added the LAN subnet + 192.168.1.0/24[/i])
/routing igmp-proxy interface add interface=LAN
/interface bridge
# ok on your
add arp=disabled name=loopback protocol-mode=none
# not present on your, keeped relevant parts only
add […] igmp-snooping=yes igmp-version=3 mld-version=2 […]
/routing igmp-proxy interface
# this is present
add interface=loopback upstream=yes
# this are not LANs, are VLANs
add interface="Main VLAN"
add interface="Management VLAN"
/interface bridge # on RouterOS v6 remove mld-version=2 and set it on Winbox. For some reason the parameter can not be set on CLI. add igmp-snooping=yes igmp-version=3 mld-version=2 name=bridge protocol-mode=none add arp=disabled name=loopbridge protocol-mode=none # missing on DarkNathan example /interface vlan add interface=bridge name="VLAN 20" vlan-id=20 add interface=bridge name="VLAN 30" vlan-id=30 add interface=bridge name="VLAN 40" vlan-id=40 add interface=bridge name="MGMT VLAN" vlan-id=10 /interface bridge port add bridge=bridge interface=ether2 pvid=20 add bridge=bridge interface=ether3 pvid=30 add bridge=bridge interface=ether4 pvid=40 add bridge=bridge interface=ether5 pvid=10 /interface bridge vlan add bridge=bridge tagged=bridge vlan-ids=20,30,40,10 /ip address add address=10.0.0.0/32 interface=loopbridge add address=10.20.0.1/24 interface="VLAN 20" add address=10.30.0.1/24 interface="VLAN 30" add address=10.40.0.1/24 interface="VLAN 40" add address=10.10.0.1/24 interface="MGMT VLAN" /routing igmp-proxy interface add interface=loopbridge upstream=yes add interface="VLAN 20" add interface="VLAN 30" add interface="VLAN 40" add interface="MGMT VLAN"
I didn't forget to add. This whole thread is about inter-VLAN routing, I expect people already configured the VLANs, wtf do I need to teach them basic VLAN config? It's already here:Probably DarkNathan forget to export the VLANs and is why his config do not work for others that blindly copy & paste without understand what are doing…
What is this? "(then also added the LAN subnet + 192.168.1.0/24)"Hello @DarkNate, apologies for not having followed your example, it was not clear that the "loopback" interface was the one that did the trick.
This is what I tested without success, maybe due to a misconfig on my side:Code: Select all/interface bridge add arp=disabled name=loopback protocol-mode=none /ip address add address=10.0.0.0 comment="Loopback" interface=loopback network=10.0.0.0 /routing igmp-proxy interface add interface=loopback upstream=yes ([i]then also added the LAN subnet + 192.168.1.0/24[/i]) /routing igmp-proxy interface add interface=LAN
But don't fool us all...I didn't forget to add. […] I've edited my post to make it a bit more clear
Will you stop offending forum users?[…]
but like I said somewhere else, stupidity can only be cured by medical treatment, hopefully.
[…]
ain't that common sense from grade 1 in school, maths class? 1+1=3 from your friend's notes?
[…]
Not sure what you mean about fooling? Why should VLAN config be required for IGMP Proxy to work, if there's no VLANs on a network? If there are then the original post already made it clear.But don't fool us all...
Will you stop offending forum users?[…]
but like I said somewhere else, stupidity can only be cured by medical treatment, hopefully.
[…]
ain't that common sense from grade 1 in school, maths class? 1+1=3 from your friend's notes?
[…]
I'm not the first to complain about how you answer and your know-it-all attitude "I studied, you are stupid and that's it"...It's not offensive if it is a fact.
he wanted to mark it ITALIC inside a
What is this? "(then also added the LAN subnet + 192.168.1.0/24)"
code
code block text with [i]italic fomating [/i]inside
maybe "metti ordine in casa tua" might be suitable here...Will you stop offending forum users?
No they can never learn. A newbie/curious person on the other hand can:An ignoramus can always learn, the know-it-all cannot.
The important thing is not to stop questioning. Curiosity has its own reason for existing. One cannot help but be in awe when one contemplates the mysteries of eternity, of life, of the marvellous structure of reality. It is enough if one tries to comprehend only a little of this mystery every day.
- Albert Einstein
Since IPv6 is enabled by default...easy to imagine Chromecast etc might very well prefer IPv6 if it find it on the network. I guess you might want to disable IPv6 as a result if you go down IGMP Proxy'ing.But IPv6 (MLD) does not. And this could impact apps that explicitly rely only on IPv6 Multicast or prefer IPv6, so of course you're not going to see it working.
The experts in this thread should demand for IPv6 MLD support in IGMP Proxy instead of mDNS repeater crap hacks.
???could you maybe stick to the topic? for the sake of users which might want/"need" mDNS aid
good advice
Well this might be helpful if you want to go off the deep end of understanding mDNS, this presentation is from the IETF "summarizing" (takes an ~1 hour) the various RFCs:I don't mind reading some digestible information about it.
???And he still thinks he has some mod authority in the forums, when the whole world knows he was dishonourably stripped of his mod privilege by MikroTik staff. What a
Oh... ok, that's fine, I'll abstain from answering him completely, except for technical questions that are relevant for everyone, all right?@rextended, @DarkNate - your bickering […]
Hello @DarkNate, I can not be smart like you Sir but I did my best to have the device config working at the best following all official guides (I mean Bridges, VLANs, etc...), waited some days after your initial answer just to make a couple of tests and not just answer "not working for me" and lose your time.What is this? "(then also added the LAN subnet + 192.168.1.0/24)"
Any suggestions for my case?I did a PCAP on my end.
So IPv4 (IGMP) does get queried by the proxy/MikroTik. But IPv6 (MLD) does not. And this could impact apps that explicitly rely only on IPv6 Multicast or prefer IPv6, so of course you're not going to see it working.
The experts in this thread should demand for IPv6 MLD support in IGMP Proxy instead of mDNS repeater crap hacks.
Reach out to MikroTik support. Give them the supout export file. This needs to be solved by them, not me.Any suggestions for my case?
I'm not sure what I'm missing.
"container", "simplifies" and "newbies" on same line....[…] container […] simplifies […] newbies […]
i created an extended container image
Alpine Linux is a very lean and productive platform
Perhaps I'm misunderstanding you
Ok, I will reach out to Tik support and report back.Reach out to MikroTik support. Give them the supout export file. This needs to be solved by them, not me.
I'm writing this as the current maintainer of the Fossil container which uses similar techniques to provide a distributed version control system...
Lean and mean, I like!
@rextended, @DarkNate - your bickering may just cause Mikrotik to add this feature out of spite.
MikroTik is working on mDNS repeater [...]
Reading the tea leaves... that means discovery should work across BOTH WG/VPNs and VLANs, efficiently and without tricks. Looking forward to seeing how this comes out.[...] that will come together with a global DNS overhaul [...]
I don't think that we need to wait so long...
With Mikrotik and CAPSMAN1 you can cordon off Wifi devices without using VLANs to their own bridge as long as you don't use local-forwarding for that SSID. This would be fine for many IOT cases which generally are low bandwidth. Multiple bridges combined with bridge firewall are really nice tools.Unless you are an advanced networking user or engineer, I agree. Using VLANs at home makes no sense for the added complexity and bullshit hacks required.
Ty. Keep it upIt worked sooooooo!!!!
Capsman2 (the non wifiwave2) versions does allow known local forward. Under datapath. Capsman3 (wifi-wave2) is different.With Mikrotik and CAPSMAN1 you can cordon off Wifi devices without using VLANs to their own bridge as long as you don't use local-forwarding for that SSID. This would be fine for many IOT cases which generally are low bandwidth. Multiple bridges combined with bridge firewall are really nice tools.Unless you are an advanced networking user or engineer, I agree. Using VLANs at home makes no sense for the added complexity and bullshit hacks required.
NORMIS ->>> It's a real shame CAPSMAN2 doesn't allow !local-forward. You've lost a powerful feature there.
Would be great if you fixed the IGMP Proxy problem with:MikroTik is working on mDNS repeater, but that will come together with a global DNS overhaul, and it will be an improvement in all areas, not just this one. This is also why it takes some time to make.
looking forward to see
I'll get my documentation together and post a new thread so its easily findable.
I'm surprised it didn't work and then started working. What changes in the config was made before/after?Today, I've been able to get IGMP Proxy working with Chromecast cross vlans.
I'll get my documentation together and post a new thread so its easily findable.
Thank you to Nate for provided the basis of this solution. I don't understand quite how it works as the IGMP Proxy doesn't show much under the MFC, but it works.
me toolooking forward to see
I'll get my documentation together and post a new thread so its easily findable.
please do shareToday, I've been able to get IGMP Proxy working with Chromecast cross vlans.
I'll get my documentation together and post a new thread so its easily findable.
Thank you to Nate for provided the basis of this solution. I don't understand quite how it works as the IGMP Proxy doesn't show much under the MFC, but it works.
Anav, rextended and all the other experts in this thread have quietly disappeared after people started mentioning my IGMP Proxy approach works perfectly fine.@DarkNate: Thank you for sharing your IGMP Proxy expertise.
It works well in my setup for all IoT devices, making them visible in all “allowed” VLANs.
Also, thank you for hinting that the counters are broken.
And just like you mentioned, using Torch proved that it was working.
“Tip of the hat!”
It seems to me that someone else has disappeared....Anav, rextended and all the other experts in this thread have quietly disappeared after people started mentioning my IGMP Proxy approach works perfectly fine.
This is why you should never trust people who lack computer science fundamentals education for best practices type approach in networking or tech in general.
Eh don't lower yourself by pandering to anyone's badgering. Given the total lack of documentation we don't know why IGMP proxy is working for some or what it's doing - no-one here wrote the code. It says *IGMP* proxy - why the hell would anyone assume it's going to relay mDNS or any other multicast frame without any context?On a serious note, I will endeavour to learn a bit about them before asking my usual 20 questions that will drive you bonkers.......
most of the time IGMP traffic is multicast - so there comes the connection i guess ... still, as you wrote, the documentation is poor indeedEh don't lower yourself by pandering to anyone's badgering. Given the total lack of documentation we don't know why IGMP proxy is working for some or what it's doing - no-one here wrote the code. It says *IGMP* proxy - why the hell would anyone assume it's going to relay mDNS or any other multicast frame without any context?On a serious note, I will endeavour to learn a bit about them before asking my usual 20 questions that will drive you bonkers.......