Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


Lias

5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

#284123 1-Apr-2021 11:25
Send private message

My housemates were getting increasingly frustrated with our HG659 locking up under load (whole different thread) so I wanted to replace it with my ERL3, but getting multicast for the T-Box working through the ERL3 was giving me headaches.

 

There are some old threads on the topic here, the Ubiquiti documentation, some generic IGMP proxy threads on the Ubiquiti forums, etc. But I couldn't find a 'complete picture' anywhere and I ran into some issues (and went down some rabbit holes) so I figured even thou the T-box's are being EOL'd I'd post there here in case it's useful to anyone else.

 

It didn't look that hard, configure the IGMP proxy with a few commands, configure the firewall, it should just work, right? Famous last words. 

 

I ran into two main issues, the first of which was simple human error on my part, my UFB connection is VLAN 10 tagged and I forget to configure the IGMP proxy to use the VLAN sub interface in my config.

 

The biggest gotcha for me however was that the IGMP proxy service kept refusing to load. Turns out, the IGMP proxy service won't start if your WAN interface doesn't have a current IP. As I was trying to test my ERL3 configuration in a disconnected state before putting it 'into production' this caused me no end of grief before I finally dug deep enough to get an error message that led me to a solution.

 

Enable IGMP Proxy

 

Config example:


protocols {
    igmp-proxy {
        interface eth0.10 {
            alt-subnet 0.0.0.0/0
            role upstream
            threshold 1
        }
        interface eth2 {
            alt-subnet 0.0.0.0/0
            role downstream
            threshold 1
        }
    }
}

 

Change <wan> to the name of your WAN interface, change <lan> to the name of your WAN interface

 

commands:


set protocols igmp-proxy interface <wan> alt-subnet 0.0.0.0/0
set protocols igmp-proxy interface <wan> role upstream
set protocols igmp-proxy interface <wan> threshold 1
set protocols igmp-proxy interface <lan> alt-subnet 0.0.0.0/0
set protocols igmp-proxy interface <lan> role downstream
set protocols igmp-proxy interface <lan> threshold 1

 

Create firewall rules:

 

You need to have rules to allow UDP Multicast and IGMP and accepted wisdom seems to be they should be placed ahead of any other rules to avoid stuttering issues.
Assuming you are using the default WAN_IN and WAN_LOCAL rules, your configuration should be something like this:

 

config example:


name WAN_IN {
    default-action drop
    description "WAN to internal"
    rule 10 {
        action accept
        description "Allow UDP Multicast"
        destination {
            address 224.0.0.0/4
        }
        log disable
        protocol udp
        source {
            address 203.167.247.45/32
        }
    }
    rule 20 {
        action accept
        description "Allow IGMP"
        log disable
        protocol igmp
    }
    rule 30 {
        action accept
        description "Allow established/related"
        state {
            established enable
            related enable
        }
    }
    rule 40 {
        action drop
        description "Drop invalid state"
        state {
            invalid enable
        }
    }
}
name WAN_LOCAL {
    default-action drop
    description "WAN to router"
    rule 10 {
        action accept
        description "Allow UDP Multicast"
        destination {
            address 224.0.0.0/4
        }
        log disable
        protocol udp
        source {
            address 203.167.247.45/32
        }
    }
    rule 20 {
        action accept
        description "Allow IGMP"
        log disable
        protocol igmp
    }
    rule 30 {
        action accept
        description "Allow established/related"
        state {
            established enable
            related enable
        }
    }
    rule 40 {
        action drop
        description "Drop invalid state"
        state {
            invalid enable
        }
    }
}

 

commands:


set firewall name WAN_IN rule 10 action accept
set firewall name WAN_IN rule 10 description 'Allow UDP Multicast'
set firewall name WAN_IN rule 10 destination address 224.0.0.0/4
set firewall name WAN_IN rule 10 log disable
set firewall name WAN_IN rule 10 protocol udp
set firewall name WAN_IN rule 10 source address 203.167.247.45/32
set firewall name WAN_IN rule 20 action accept
set firewall name WAN_IN rule 20 description 'Allow IGMP'
set firewall name WAN_IN rule 20 log disable
set firewall name WAN_IN rule 20 protocol igmp
set firewall name WAN_IN rule 30 action accept
set firewall name WAN_IN rule 30 description 'Allow established/related'
set firewall name WAN_IN rule 30 state established enable
set firewall name WAN_IN rule 30 state related enable
set firewall name WAN_IN rule 40 action drop
set firewall name WAN_IN rule 40 description 'Drop invalid state'
set firewall name WAN_IN rule 40 state invalid enable
set firewall name WAN_LOCAL rule 10 action accept
set firewall name WAN_LOCAL rule 10 description 'Allow UDP Multicast'
set firewall name WAN_LOCAL rule 10 destination address 224.0.0.0/4
set firewall name WAN_LOCAL rule 10 log disable
set firewall name WAN_LOCAL rule 10 protocol udp
set firewall name WAN_LOCAL rule 10 source address 203.167.247.45/32
set firewall name WAN_LOCAL rule 20 action accept
set firewall name WAN_LOCAL rule 20 description 'Allow IGMP'
set firewall name WAN_LOCAL rule 20 log disable
set firewall name WAN_LOCAL rule 20 protocol igmp
set firewall name WAN_LOCAL rule 30 action accept
set firewall name WAN_LOCAL rule 30 description 'Allow established/related'
set firewall name WAN_LOCAL rule 30 state established enable
set firewall name WAN_LOCAL rule 30 state related enable
set firewall name WAN_LOCAL rule 40 action drop
set firewall name WAN_LOCAL rule 40 description 'Drop invalid state'
set firewall name WAN_LOCAL rule 40 state invalid enable





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.


Create new topic
freitasm
BDFL - Memuneh
79250 posts

Uber Geek

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

  #2685287 1-Apr-2021 11:55
Send private message

Good stuff, thanks for the insights.

 

A bit moot as this is being retired now...





Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSyncBackblaze backup




SpartanVXL
1306 posts

Uber Geek


  #2685318 1-Apr-2021 13:23
Send private message

Glad to see you got it working! +1

Lias

5589 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #2685370 1-Apr-2021 14:57
Send private message

freitasm:

 

Good stuff, thanks for the insights.

 

A bit moot as this is being retired now...

 

 

Yeah I know, but it sounds like those of us with T-boxes and UFB have to wait at least another few months to get them replaced, so it might be of use to someone else. It's so nice being on the ERL3 instead of the HG659 now, no having to reset the router constantly now. It was bearable when it was only once a day but it was starting to be every hour or two. 





I'm a geek, a gamer, a dad, a Quic user, and an IT Professional. I have a full rack home lab, size 15 feet, an epic beard and Asperger's. I'm a bit of a Cypherpunk, who believes information wants to be free and the Net interprets censorship as damage and routes around it. If you use my Quic signup you can also use the code R570394EKGIZ8 for free setup.




Apsattv
2388 posts

Uber Geek


  #2685631 2-Apr-2021 02:11
Send private message

This is the info i had several years ago

 

channels

 

start at udp://@233.18.160.1:5501
end at udp://@233.18.160.152:5652

 

I wont bother posting the 2nd range most likely its shut off already

 

you can test a  Free channel

 

udp://@233.18.160.28:5528

 

 

 

 

 

 


Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.