Hello all,
I run a media share with my family through AirPlayit on iPhone and iPad clients, which used to run until some time ago. I don't know why it stopped, and I have spent months poking at this problem. It worked for a long time on my WRT54GL, stopped, and it still won't work on my RT-N66U. I'm not expert in the area, but I can follow technical instructions or suggestions. :)
I'm running on Tomato Firmware 1.28.0000 MIPSR2-100 K26 USB Mega-VPN-64K.
The server uses port 37218 on TCP, and canyouseeme.org gets timeouts on that port. Visiting 192.168.1.11:37218 while on LAN works fine, so I know AirPlayit works. I'm running DHCP still even though some people suggest using static IP. It used to run on DHCP, hence why I kept it.
I tried multiple reboots, NVRAM flush, my NAT loopback is set to All/MASQUERADE, I tried different ports, forwarding a range of ports, tried connecting to the server via 3G and internal Wifi. I've seen a lot of silly issues fix the problem, eg. MAC addresses, rebooting, other somesuch. I hope it's the same here.
On Proto Src Address Ext Ports Int Port Int Address Description
On TCP 37218 192.168.1.11 Air Playit Server
Here is my output for
iptables -nvL
iptables -t nat -nvL
Chain INPUT (policy DROP 1 packets, 36 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
10080 624K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 shlimit tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
38 2532 ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
131 55943 all -- * * 0.0.0.0/0 0.0.0.0/0 account: network/netmask: 192.168.1.0/255.255.255.0 name: lan
0 0 ACCEPT all -- br0 br0 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
0 0 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
130 55882 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 wanin all -- vlan2 * 0.0.0.0/0 0.0.0.0/0
1 61 wanout all -- * vlan2 0.0.0.0/0 0.0.0.0/0
1 61 ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 upnp all -- vlan2 * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 5270 packets, 43M bytes)
pkts bytes target prot opt in out source destination
Chain shlimit (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 recent: SET name: shlimit side: source
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 recent: UPDATE seconds: 60 hit_count: 4 name: shlimit side: source
Chain upnp (1 references)
pkts bytes target prot opt in out source destination
Chain wanin (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT tcp -- * * 0.0.0.0/0 192.168.1.11 tcp dpt:37218
Chain wanout (1 references)
pkts bytes target prot opt in out source destination
Chain PREROUTING (policy ACCEPT 50 packets, 5113 bytes)
pkts bytes target prot opt in out source destination
0 0 WANPREROUTING all -- * * 0.0.0.0/0 192.168.0.12
0 0 DROP all -- vlan2 * 0.0.0.0/0 192.168.1.0/24
0 0 upnp all -- * * 0.0.0.0/0 192.168.0.12
Chain POSTROUTING (policy ACCEPT 1 packets, 442 bytes)
pkts bytes target prot opt in out source destination
4 265 MASQUERADE all -- * vlan2 0.0.0.0/0 0.0.0.0/0
0 0 SNAT all -- * br0 192.168.1.0/24 192.168.1.0/24 to:192.168.1.1
Chain OUTPUT (policy ACCEPT 4 packets, 646 bytes)
pkts bytes target prot opt in out source destination
Chain WANPREROUTING (1 references)
pkts bytes target prot opt in out source destination
0 0 DNAT icmp -- * * 0.0.0.0/0 0.0.0.0/0 to:192.168.1.1
0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:37218 to:192.168.1.11
Chain upnp (1 references)
pkts bytes target prot opt in out source destination