6.3 KiB
Network-Level Gateway Routing for SRF Content
This guide explains how to configure network-level routing to direct all SRF-related traffic (including video streams) through your Swiss gateway/proxy at 192.168.1.37.
Overview
Instead of configuring proxy support at the application level, this approach uses Linux policy-based routing to redirect traffic destined for SRF domains through an alternate gateway. This ensures:
- API requests to
il.srgssr.chgo through the gateway - Video stream requests to
srf-vod-amd.akamaized.net(and other CDNs) go through the gateway - ffprobe and ffmpeg automatically use the gateway
- No application configuration needed - transparent to Jellyfin
Prerequisites
- Root access to the Jellyfin server (192.168.1.4)
- Gateway at 192.168.1.37 with IPv4 forwarding enabled
- Both machines on the same network segment
Installation on Jellyfin Server
Step 1: Copy Scripts to Jellyfin Server
From your development machine:
# Copy the routing scripts to Jellyfin server
scp setup-gateway-routing.sh cleanup-gateway-routing.sh user@192.168.1.4:~
Step 2: SSH to Jellyfin Server
ssh user@192.168.1.4
Step 3: Make Scripts Executable
chmod +x setup-gateway-routing.sh cleanup-gateway-routing.sh
Step 4: Run Setup Script
sudo ./setup-gateway-routing.sh
When prompted:
- Gateway IP:
192.168.1.37 - Network interface: Find your interface name first with
ip -br link show(common names:eth0,ens18,enp0s3)
The script will:
- Create a custom routing table named
srf_gateway - Resolve IP addresses for all SRF domains
- Add routes through your gateway (192.168.1.37)
- Create routing rules for policy-based routing
- Set up a systemd service for persistence across reboots
Step 5: Verify Routing
Check that routes are configured:
# Show the custom routing table
ip route show table srf_gateway
# Show routing rules
ip rule show | grep srf_gateway
# Test routing for Integration Layer API
ip route get $(dig +short il.srgssr.ch | head -1)
# Test routing for video CDN
ip route get $(dig +short srf-vod-amd.akamaized.net | head -1)
Step 6: Test from Jellyfin Server
Test that the routing is working:
# Test API access
curl -v "https://il.srgssr.ch/integrationlayer/2.0/mediaComposition/byUrn/urn:srf:video:b84713f0-f81b-460f-9b0f-d0517310fb4f.json" 2>&1 | grep -E "(x-location|HTTP/)"
# Should show: x-location: CH
Step 7: Restart Jellyfin
sudo systemctl restart jellyfin
What Gets Routed
The following domains are routed through the gateway:
il.srgssr.ch- Integration Layer API (metadata)www.srf.ch- Main SRF sitewww.rts.ch- RTS (Radio Télévision Suisse)www.rsi.ch- RSI (Radiotelevisione svizzera)www.rtr.ch- RTR (Radiotelevisiun Svizra Rumantscha)www.swi.ch- SWI (swissinfo)srf-vod-amd.akamaized.net- SRF video CDNrts-vod-amd.akamaized.net- RTS video CDNrsi-vod-amd.akamaized.net- RSI video CDNplay-web.srf.ch- Play web interfaceil-stage.srgssr.ch- Staging environment
How It Works
- DNS Resolution: Domains are resolved to IP addresses
- Routing Table: A custom routing table (
srf_gateway) is created with routes through the gateway - Policy Routing: Rules direct traffic to specific IPs to use the custom routing table
- Persistence: A systemd service ensures routes survive reboots
Disabling Plugin Proxy Configuration
Once network-level routing is working, you can disable the proxy configuration in the plugin:
- Go to Jellyfin Dashboard → Plugins → SRF Play
- Uncheck "Use Proxy"
- Save configuration
- Restart Jellyfin
The plugin will use direct HTTP requests, but the network layer will transparently route them through the gateway.
Troubleshooting
Routes Not Working
Check if gateway is reachable:
ping 192.168.1.37
nc -zv 192.168.1.37 3128
Check routing table:
ip route show table srf_gateway
DNS Changes
If SRF changes their IP addresses, you may need to re-run the setup script:
sudo ./cleanup-gateway-routing.sh
sudo ./setup-gateway-routing.sh
Verify Traffic Path
Use traceroute to see the path:
traceroute $(dig +short il.srgssr.ch | head -1)
# Should show 192.168.1.37 as first hop
Check Systemd Service
systemctl status srf-gateway-routing.service
journalctl -u srf-gateway-routing.service
Removing the Configuration
To completely remove the routing configuration:
sudo ./cleanup-gateway-routing.sh
This will:
- Remove all routing rules
- Flush the custom routing table
- Disable and remove the systemd service
Advantages of This Approach
- Transparent: No application changes needed
- Complete Coverage: All network traffic to SRF domains uses gateway
- Persistent: Survives reboots
- Centralized: Managed at network level
- Debug-Friendly: Can verify with standard network tools
Disadvantages
- DNS Changes: If SRF changes IPs, routing must be updated
- New Domains: New CDN domains require script update
- Static IPs Only: Doesn't work with wildcard domains
Gateway Configuration
Ensure your gateway (192.168.1.37) has:
-
IPv4 Forwarding Enabled:
# On the gateway (192.168.1.37) sudo sysctl net.ipv4.ip_forward=1 # Make permanent echo "net.ipv4.ip_forward=1" | sudo tee -a /etc/sysctl.conf -
Firewall Rules (if using iptables):
# On the gateway (192.168.1.37) sudo iptables -A FORWARD -s 192.168.1.4 -j ACCEPT sudo iptables -A FORWARD -d 192.168.1.4 -m state --state RELATED,ESTABLISHED -j ACCEPT sudo iptables -t nat -A POSTROUTING -s 192.168.1.4 -o <outbound-interface> -j MASQUERADE -
Squid Proxy (if using proxy mode):
- Already configured and accessible at port 3128
- Note: With network-level routing, traffic goes through the gateway's routing, not necessarily the Squid proxy
Testing Complete Data Chain
After setup, test the complete flow:
- Metadata API: Browse shows in Jellyfin - should work
- Video Playback: Try playing a video - should work
- Thumbnails: Images should load
All traffic should be routed through 192.168.1.37, giving you the Swiss location needed to access geo-blocked content.