dns-sd -B _ipp._tcp
The key to success For Me using Tiks mDNS implementation was provided by @victorbayas in the following postMy understanding is that mDNS is crucial for facilitating device discovery and communication within local networks without the need for a dedicated DNS server ... but Tik have not explained how that is implemented under RoS ... why introduce a new feature without some form of direction that is not puzzling .... rhetorically stated ...
Thank YOU @victorbayas/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
Well... the VPN does need to support multicast & that's the limiting factor to repeating mDNS. I don't think L2TP work with new mDNS proxy. So off top of my head, that be GRE+IPSec, EoIP+IPSec and ZeroTier - that should work with new mDNS repeater.I'll try with another VPN...
OK, then I'll try with ZeroTier.So off top of my head, that be GRE+IPSec, EoIP+IPSec and ZeroTier - that should work with new mDNS repeater.
Yes you can but it doesn't use the new mDNS repeater function. See this topic. viewtopic.php?t=194842Do you think mDNS could work through a Wireguard tunnel?
Well... that's true. But still need EoIP to add the multicast to WG – but you're right the EoIP can run over an existing WG tunnel (and skip the IPSec stuff that's built in to EoIP).Yes you can but it doesn't use the new mDNS repeater function. See this topic. viewtopic.php?t=194842Do you think mDNS could work through a Wireguard tunnel?
Actually, I wonder, it just might work using the new mDNS repeater if:Well... that's true. But still need EoIP to add the multicast to WG – but you're right the EoIP can run over an existing WG tunnel (and skip the IPSec stuff that's built in to EoIP).
Yes you can but it doesn't use the new mDNS repeater function. See this topic. viewtopic.php?t=194842
I guess theoretically that might work, but it gets confusing. If you just keep both side EoIP bridged, use new /ip/dns/mdns-repeat on EoIP (+ local LAN/VLAN) on each router, and apply more simplified bridge filter to DROP anything NOT port 5353 from over the bridged EoIP+WG link. And you could further tweak it to be a more generic "multicast bridge over WireGuard" (using EoIP connecting over the WG IPs and bridged to desired LANs) by changing the filter rules to allow more/all multicast.* Both ends use EoIP over the Wireguard link (with no IPSEC).
Well... that's true. But still need EoIP to add the multicast to WG – but you're right the EoIP can run over an existing WG tunnel (and skip the IPSec stuff that's built in to EoIP).
* End A connects it's EoIP port to the bridge/VLAN of interest.
* End B *does not* connect it's EoIP port to a bridge - leave it isolated (actually you might need to put a DCHP client on it or set it's IP statically to have an valid IP address for end A's subnet).
* End B uses the new mDNS repeater with the dangling EoIP and a VLAN or Bridge interface as members.
Just a thought experiment but it might work. I'll try this experiment myself later when I have some time.
I have just upgraded my MK to v.7.16, and I'd like to give this new mDNS feature a try.....
I did find that mDNS to be very chatty but that is expected
Yes, I added this rule:Have you opened port 5353?
/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
In my highly restrictive local communication environment I had to add an addition forward rule like following:Code: Select all/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
/ip firewall filter add action=accept chain=forward comment="FORWARD FromDevices ToDevices" dst-address-list=ToDevices src-address-list=FromDevices
I had already added a forward rule between the server and the smart TV in different VLANs. ThanksIn my highly restrictive local communication environment I had to add an addition forward rule like following:Code: Select all/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
In my case I have 2 address lists [FromDevices ] [ToDevices] these lists populate IP address of hosts that need to communicate with each otherCode: Select all/ip firewall filter add action=accept chain=forward comment="FORWARD FromDevices ToDevices" dst-address-list=ToDevices src-address-list=FromDevices
This rule would be placed just above FORWARD Drop all
That enabled multicast to work for the targeted VLANs and the devices in question ...
/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
Nope. The server in which Jellyfin runs is a linux machine (firewall disabled) and the client is a smartv.It works perfectly for me between two VLANs even without the ruleI just created a forward rule to allow traffic between the two devices.Code: Select all/ip firewall filter add action=accept chain=input comment="Allow mDNS" disabled=no dst-address=224.0.0.251 dst-port=5353 log-prefix=mDNS protocol=udp src-port=5353
Are you using Windows for testing?
If so, temporarily disable the firewall.
I am not at all familiar with Jellyfin but in reading some stuff on the web I have hits stating that Jellyfin currently does not support multicasting ...Nope. The server in which Jellyfin runs is a linux machine (firewall disabled) and the client is a smartv.
I don't know. It could.
I am not at all familiar with Jellyfin but in reading some stuff on the web I have hits stating that Jellyfin currently does not support multicasting ...
https://features.jellyfin.org/posts/172 ... ew-a-strea
I know that mDNS works well for me .... I know that most if not all Linux machines support multicasting but Jellyfin apparently does not but I could be wrong.
Ah OK, then why do you use mDNS instead of PIM-SM for DLNA/UPnP?Nope. The server in which Jellyfin runs is a linux machine (firewall disabled) and the client is a smartv.
Using the 2 firewall rules mentioned in my posting here ....
/ip firewall filter add action=accept chain=forward comment="FORWARD FromDevices ToDevices" dst-address-list=ToDevices src-address-list=FromDevices
I gave it a try too. It didn't work.Ah OK, then why do you use mDNS instead of PIM-SM for DLNA/UPnP?Nope. The server in which Jellyfin runs is a linux machine (firewall disabled) and the client is a smartv.
in my situation I only allow one to one communication - nope, local hosts [and/or devices] are completely secure from each other unless permitted,This completely exposes hosts in list, more secure is to allow just needed ports for hosts in list.