@cayars said:
OK so lets start over. Do you have multiple NICs or just a NIC with multiple VLANs setup on it? What you originally described as 2 NICS with only one having external access is a bit strange since if a device is in the same IP pool it could be reached by any subnet that they both share. Metric won’t come into play since you’re not “routing” anything.
Sorry it was unclear - it’s one physical NIC but divided up into two interfaces, and for all intents and purposes NetworkManager and Linux seem them as separate. The two do not share an IP pool: the VLAN with access to Internet [eno2.10] is 10.0.1.0/24 and the private VLAN [eno2] is 10.0.10.0/24.
Do you not want all your devices to be able to talk to your Plex server?
Devices on both VLANs should be able to talk to Plex locally, which is why I have assigned the host an IP on each VLAN interface/subnet. Autodiscovery/mDNS works is distinct per VLAN, so hosts on each discover and reach out to the Plex server’s IP that belongs in their subnet (10.0.x.210).
If so and you want multiple VLANs then you have to rethink your setup. Plex is a server and should be setup on a machine with ONE VLAN only (with internet access). It can be it’s own VLAN. Then in your router you will need to setup routes for any other VLAN that needs to talk to the Plex server. Essentially you could think of it as a server DMZ that is accessible from the outside and inside VLANs but only on port 32400 (setup via router/firewall).
Are you saying in general, or specifically due to the way Plex works? I have the setup described above working with a bunch of other daemons (incl. some with remote access). mDNS works and remote access too, so long as I port forward to the 10.0.1.x IP, since packet replies will come from that address which I can confirm with ip route get 8.8.8.8.
Despite the routing table indicating that any non-LAN hosts should be routed out via src=10.0.1.210 and dev=eno2.10, Plex tries to reach out to plex.tv using 10.0.10.210 over using the interface used for the private LAN (eno2).
BTW, Plex should work fine if you setup your subnets with a default gateway only on ONE subnet. If you have default gateways on multiple subnets then it will just use the first it discovers. I’m assuming you do not have routes setup between your different VLANs otherwise there is little point in using the VLANs since the IPs can still talk (although slower with congestion).
Correct, the separation is intentional.
If that’s the case you probably shouldn’t have multiple gateways. Your gateway is usually the router who knows how to communicate with the outside world.
Isn’t this an incorrect assumption? It should be fine to have multiple gateways or routers, but multiple default/outgoing routes to them is what’s bad (although AFAIK both Windows and Linux are both OK with it, and pick the route with the lowest metric).
If Plex isn’t going to honour routing tables then IMO it should be possible to ask Plex to listen on a specific interface for remote access, like most other daemons which would solve this easily without having to resorting to blocking ports, staggering the order I bring interfaces online or deleting gateways.
Understood that listening on an interface != routing, the reason I keep circling back to it is that it’s plex.tv, for remote access, reporting 10.0.10.210 – and that’s incorrect. According to the routing table, no packets should be going out to the Internet from 10.0.10.0/24.