You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have encountered an issue when using ONVIF cameras that are located behind a router with NAT (Network Address Translation) in Frigate. When these cameras are queried, they respond with their private IP addresses and internal ports, making it impossible to access them from outside the local network. This is particularly problematic for users with cameras installed behind routers.
This issue has already been effectively addressed in the python-onvif-zeep package by rewriting the xaddrs in the ONVIF response to utilize the external IP address and port provided during the connection setup.
To resolve this in Frigate, I propose implementing a similar solution. I will submit a pull request that rewrites the ONVIF response to ensure the correct external IP address and port are used, especially for cameras behind routers. This will significantly improve connectivity for users in NAT environments, ensuring seamless access to their cameras from outside the local network.
I have tested this solution successfully in Frigate version 14.1, and it works as expected.
This fix will enhance Frigate's ability to handle cameras behind NAT and routers, bringing it in line with the proven solution from the python-onvif-zeep package.
I have created a draft pull request that addresses this issue. It includes the changes necessary to fix ONVIF camera connectivity behind NAT and routers, following the solution already implemented in the python-onvif-zeep package.
Please note that the final formatting with Ruff and the passing of tests have not yet been done. These will be completed before the pull request is finalized.
I have encountered an issue when using ONVIF cameras that are located behind a router with NAT (Network Address Translation) in Frigate. When these cameras are queried, they respond with their private IP addresses and internal ports, making it impossible to access them from outside the local network. This is particularly problematic for users with cameras installed behind routers.
This issue has already been effectively addressed in the
python-onvif-zeep
package by rewriting thexaddrs
in the ONVIF response to utilize the external IP address and port provided during the connection setup.To resolve this in Frigate, I propose implementing a similar solution. I will submit a pull request that rewrites the ONVIF response to ensure the correct external IP address and port are used, especially for cameras behind routers. This will significantly improve connectivity for users in NAT environments, ensuring seamless access to their cameras from outside the local network.
I have tested this solution successfully in Frigate version 14.1, and it works as expected.
This fix will enhance Frigate's ability to handle cameras behind NAT and routers, bringing it in line with the proven solution from the
python-onvif-zeep
package.Reference: FalkTannhaeuser/python-onvif-zeep#75
The text was updated successfully, but these errors were encountered: