Cannot connect to my PlexMediServer hosted on a Linux computer

Hi everyone,

I cannot connect to my Plex media server on any device while it seems to be correctly running on my computer. I tried to connect with an iPad (impossible to detect the server), a Xbox One and the web browser of my Android phone. On these last two devices, the server seems to be detected (the name is correct) but a message error says that no secured connection could be made with the server, while my server is set to “Preferred” in “Settings/Network/Secured Connections”.

I often use Windscribe as a VPN but I checked and it is not connected.

Does anyone has a solution ?

Thanks

Would you please do the following:

  1. Restart PMS
  2. Attempt to connect to it on the server itself (http://127.0.0.1)
  3. Make certain it’s signed in to your username and then let it sit there.
  4. Now connect to it from the iPad
  5. Attempt to browse any one of your media libraries once
  6. Wait about 15 seconds after doing that then:
  7. Settings - Server - Help - Download Logs
  8. Attach the ZIP file it gives you here. I’ll take a look at it

I’m not clear whether your PMS is local or remote. “Hosted on a Linux computer” implies ‘remotely hosted’ but not definitive.

Hi ChuckPA,

Thanks for answering. I am using a laptop computer that runs Linux Lite and PMS is installed and running on this computer.

I did what you asked, but the iPad could not find the PMS. The web browser of my Android smartphone found it but would not connect to it for the same reason as before. Here are the ZIP file you asked for.Plex Media Server Logs_2018-07-28_19-06-15.zip (496.0 KB)

Thanks Brendan,
What is “Linux Lite”? We have a finite list of supported distributions. Linux Lite isn’t in that list but does look to be a Debian/Ubuntu base. Is this correct?

That said, I have a few suggestions and questions in no specific order.

  1. Do you need IPv6? If not, please turn it off in Settings - Server - Network.
  2. I see you’ve started and stopped a few times
  3. I don’t see where anything even attempts to connect other than from the laptop itself (http://127.0.0.1)
  4. Does your Linux have the Firewall enabled? If so, we need to adjust it so the other devices on your LAN can also talk to it. This seems to be the symptom you’re seeing?

The tablets & phones see it by name but can’t get to it?

They see it because your laptop talks to Plex.tv.
They talk to Plex.tv
A firewall (or being on a different subnet… e.g. wired versus wireless or wireless SSID) can make the network addresses such they can’t see each other directly (“Direct” is the key)

How closely does this describe what you’re seeing?

Linux Lite is a distribution based on Ubuntu 16.04.3 LTS.

I turned off IPV6, it was initially disabled and I just tried to enable it to see if it would change anything.

I don’t know if there is a Firewall enabled. The problem might come from there if there is one. How do I check this ?

You’re correct about the description. My computer is connected via WiFi.

1 Like

From the command line, type:

sudo iptables -L

If the output looks like this:

Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

There is no active firewall on your laptop. If your output looks different, please post it.

Also, your WiFi router may segregate connections. You’ll need to look at the router configuration under the WiFi section and look for an option for “WiFi Segregation” - the help text would say something like 'Allow WiFi connected computers to find each other on the local network"

In your GUI, you should have a firewall tool. In there, you should be able to disable it.
I say to disable it because your modem/router to the internet has enough firewall in it already.

If you really feel the need to lock your LAN down, the ports you must allow are listed here
https://support.plex.tv/articles/201543147-what-network-ports-do-i-need-to-allow-through-my-firewall/

The base command is of the forum

sudo ufw allow 32400/tcp 

change ‘32400/tcp’ for each of the ports needed and change ‘tcp’ to ‘udp’ as required also.
You may list multiple specifications on each line when separated by space. (example: )

sudo ufw allow 32400/tcp 1900/udp
1 Like

Hi roberill,

Thanks for your answer. If I understand correctly, then there is an active firewall on my laptop as the output of the command is :


Chain INPUT (policy DROP)
target prot opt source destination
ufw-before-logging-input all – anywhere anywhere
ufw-before-input all – anywhere anywhere
ufw-after-input all – anywhere anywhere
ufw-after-logging-input all – anywhere anywhere
ufw-reject-input all – anywhere anywhere
ufw-track-input all – anywhere anywhere

Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all – anywhere anywhere
ufw-before-forward all – anywhere anywhere
ufw-after-forward all – anywhere anywhere
ufw-after-logging-forward all – anywhere anywhere
ufw-reject-forward all – anywhere anywhere
ufw-track-forward all – anywhere anywhere

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all – anywhere anywhere
ufw-before-output all – anywhere anywhere
ufw-after-output all – anywhere anywhere
ufw-after-logging-output all – anywhere anywhere
ufw-reject-output all – anywhere anywhere
ufw-track-output all – anywhere anywhere

Chain ufw-after-forward (1 references)
target prot opt source destination

Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp – anywhere anywhere udp dpt:netbios-ns
ufw-skip-to-policy-input udp – anywhere anywhere udp dpt:netbios-dgm
ufw-skip-to-policy-input tcp – anywhere anywhere tcp dpt:netbios-ssn
ufw-skip-to-policy-input tcp – anywhere anywhere tcp dpt:microsoft-ds
ufw-skip-to-policy-input udp – anywhere anywhere udp dpt:bootps
ufw-skip-to-policy-input udp – anywhere anywhere udp dpt:bootpc
ufw-skip-to-policy-input all – anywhere anywhere ADDRTYPE match dst-type BROADCAST

Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all – anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all – anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-after-logging-output (1 references)
target prot opt source destination

Chain ufw-after-output (1 references)
target prot opt source destination

Chain ufw-before-forward (1 references)
target prot opt source destination
ACCEPT all – anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT icmp – anywhere anywhere icmp destination-unreachable
ACCEPT icmp – anywhere anywhere icmp source-quench
ACCEPT icmp – anywhere anywhere icmp time-exceeded
ACCEPT icmp – anywhere anywhere icmp parameter-problem
ACCEPT icmp – anywhere anywhere icmp echo-request
ufw-user-forward all – anywhere anywhere

Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all – anywhere anywhere
ACCEPT all – anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-logging-deny all – anywhere anywhere ctstate INVALID
DROP all – anywhere anywhere ctstate INVALID
ACCEPT icmp – anywhere anywhere icmp destination-unreachable
ACCEPT icmp – anywhere anywhere icmp source-quench
ACCEPT icmp – anywhere anywhere icmp time-exceeded
ACCEPT icmp – anywhere anywhere icmp parameter-problem
ACCEPT icmp – anywhere anywhere icmp echo-request
ACCEPT udp – anywhere anywhere udp spt:bootps dpt:bootpc
ufw-not-local all – anywhere anywhere
ACCEPT udp – anywhere 224.0.0.251 udp dpt:mdns
ACCEPT udp – anywhere 239.255.255.250 udp dpt:1900
ufw-user-input all – anywhere anywhere

Chain ufw-before-logging-forward (1 references)
target prot opt source destination

Chain ufw-before-logging-input (1 references)
target prot opt source destination

Chain ufw-before-logging-output (1 references)
target prot opt source destination

Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all – anywhere anywhere
ACCEPT all – anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-user-output all – anywhere anywhere

Chain ufw-logging-allow (0 references)
target prot opt source destination
LOG all – anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "

Chain ufw-logging-deny (2 references)
target prot opt source destination
RETURN all – anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
LOG all – anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "

Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all – anywhere anywhere ADDRTYPE match dst-type LOCAL
RETURN all – anywhere anywhere ADDRTYPE match dst-type MULTICAST
RETURN all – anywhere anywhere ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all – anywhere anywhere limit: avg 3/min burst 10
DROP all – anywhere anywhere

Chain ufw-reject-forward (1 references)
target prot opt source destination

Chain ufw-reject-input (1 references)
target prot opt source destination

Chain ufw-reject-output (1 references)
target prot opt source destination

Chain ufw-skip-to-policy-forward (0 references)
target prot opt source destination
DROP all – anywhere anywhere

Chain ufw-skip-to-policy-input (7 references)
target prot opt source destination
DROP all – anywhere anywhere

Chain ufw-skip-to-policy-output (0 references)
target prot opt source destination
ACCEPT all – anywhere anywhere

Chain ufw-track-forward (1 references)
target prot opt source destination

Chain ufw-track-input (1 references)
target prot opt source destination

Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp – anywhere anywhere ctstate NEW
ACCEPT udp – anywhere anywhere ctstate NEW

Chain ufw-user-forward (1 references)
target prot opt source destination

Chain ufw-user-input (1 references)
target prot opt source destination

Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all – anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
REJECT all – anywhere anywhere reject-with icmp-port-unreachable

Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all – anywhere anywhere

Chain ufw-user-logging-forward (0 references)
target prot opt source destination

Chain ufw-user-logging-input (0 references)
target prot opt source destination

Chain ufw-user-logging-output (0 references)
target prot opt source destination

Chain ufw-user-output (1 references)
target prot opt source destination


What should I do ?

You were right, it was the Firewall of my computer that was the problem. When I disable it, the iPad detects the server and it works perfectly ! Thank you :grinning:

I will try to enable the Firewall and allow the ports using the informations you gave me.

Thanks again !

This topic was automatically closed 90 days after the last reply. New replies are no longer allowed.