Like I said, I don't hold out much hope for this. This also may fail if you're router regards your target PC as being "off" when it's in it's quiesced state (ie the router ARP table has aged out.) Then you've got to figure how to create the correct "magic packet" on the source PC to WOL the target PC and get it into the IP packet you want to send through the Internet.Īnd in this scenario, anyone on the Internet will be able to WOL your target PC - so would you really want to? If you test from the home network, your source PC and/or router will figure this out and not send traffic "out and back in again" it will send it direct on the LAN and so not prove anything. However, you MUST test from a physically different network to your home network, or you're not testing the traffic through your router and The "port forwarding" rule opens up a hole in this regime (which you'd want to do if - for example - you had a web server at home.) I'd pick a "UDP" port with an "usual" or unpopular port number. Normally the firewall in home routers doesn't let in any unsolicited traffic from the Intenet. Register your router with DynDNS so that you can always find the public IP address of your router.Ĭreate a "port forwarding" rule in your router so that any traffic it receives from the Internet to it's public IP address is "forwarded" to the private IP address of the host you want to WOL. Turn off DHCP (client) on the host you want to WOL then set it's private IP address etc. ![]() I don't hold out much hope, but you could try the following:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |