The summary of ‘Wake-on-LAN and Magic Packet (WoL/WoWLAN/pfSense/Ubiquiti UniFi)’

This summary of the video was created by an AI. It might contain some inaccuracies.

00:00:0000:22:24

The video explores Wake-on-LAN (WoL), which allows computers to be powered on remotely from sleep mode using network messages. Key points include the use of Magic packets containing target machine Mac addresses, testing in different sleep states, monitoring power configurations, and using tools like pfSense. The video demonstrates waking up machines via Ethernet and Wi-Fi, testing LAN and WLAN scenarios. It also covers power management configurations for different sleep modes and highlights the functionality of WoL with different hardware setups. The video concludes by mentioning plans for future discussions on WoL and sleep modes on Windows, Mac OS, and Linux systems.

00:00:00

In this segment of the video, the speaker discusses the concept of Wake-on-LAN (WoL), which allows computers to be turned on from sleep mode by a network message. The video highlights the importance of sleep mode and network messages in WoL. The speaker references a proposal by AMD and HP from 1995 regarding WoL, emphasizing that various factors such as BIOS, CPU architecture, operating system, and network interface card can impact how WoL functions. The speaker mentions plans for follow-up videos on how WoL works on Windows, Mac OS, and Linux systems with different hardware setups. The video also touches on Sleep States defined by ACPI for power management in different operating systems.

00:03:00

In this segment of the video, the focus is on examining how Wake on LAN (WoL) works in S3 and S4 standby modes. The speaker sets up a lab environment with various hardware and operating systems to test WoL using Wi-Fi and Ethernet. They explain that a Magic packet, which is a broadcast frame containing 6 bytes of FF followed by 16 Mac address of the target machine, is essential for WoL to function. The speaker demonstrates that while the Magic packet is typically sent as a UDP datagram to specific ports, the second part number is not always required. Additionally, they show that Magic packets can also work over Wi-Fi networks. Two methods are used to trigger Magic packets: via pfSense’s built-in service and a standalone tool. Testing is conducted on both wired Ethernet and wireless connections in the lab.

00:06:00

In this part of the video, the focus is on preparing the Unify switch to capture magic packets for testing. The Unify network controller with eight ports is set up to mirror Port 7 connected to a Windows target computer. A Mac computer is then connected to Port 6 to capture the same packets. Port mirroring is explained to ensure capturing the exact same data received by the target machine. The video also shows commands run on the Windows machine to check its power configuration and hardware that can wake it from sleep mode, including the network interface controller and Wi-Fi card. The setup is detailed for testing the magic packet functionality on the Windows machine.

00:09:00

In this segment of the video, the speaker discusses how to wake a computer from sleep mode using a magic packet. They explain how to ensure the network interface card is set to allow the device to wake the computer. The demonstration involves sending a magic packet from PFsense to wake the Windows machine. The process involves monitoring the LED light on the computer and checking that both remote desktop and pinging resume successfully. Wireshark is used to capture the magic packet sent to wake the Windows machine, confirming the successful wake-up.

00:12:00

In this segment of the video, the speaker demonstrates the use of a Magic Frame, which is a UDP frame used to wake up a target Windows machine. The frame consists of FF followed by the Mac address of the target machine. The UDP packet is recognized by the target computer as a wake-up signal. The video also shows that sending the magic packet over Wi-Fi to the Windows machine still wakes it up. The captures of the Magic Packets on Wireshark show the same content as when sent from the PFsense machine, confirming the effectiveness of the Magic Frame.

00:15:00

In this segment of the video, the speaker tests Wake On WLAN scenarios. They first successfully test two cases for LAN scenarios and then move on to a WLAN scenario where a Windows machine and a Mac machine are connected to the same AP using Wi-Fi. The command line tools are used to send a magic packet to the Windows machine, successfully waking it up. The last test involves sending a magic packet from pfSense to the Windows machine over Wi-Fi, demonstrating that Wake On WLAN works even when the Windows machine is only connected via Wi-Fi. The speaker mentions the tests are for the S3 sleep state and hints at discussing hibernate and power-off modes for future testing.

00:18:00

In this segment of the video, the presenter discusses power management configurations using an example from AMI BIOS. They show how to enable the “resume online” setting for S4 and S5 modes, explaining that it includes hibernation. The demonstration involves testing hibernate and power-off modes by sending a magic packet to wake the machine. The video proves that Wake on LAN works for both S4 and S5 sleep modes, but not for Wi-Fi cards, which require a different approach.

00:21:00

In this segment of the video, the speaker demonstrates sending a magic packet to the Wi-Fi card from PFS in hibernate mode, successfully waking the computer up. However, when attempting the same in the S5 mode for Wake On WLAN, the computer refuses to wake up, indicating that WOL doesn’t work in S5 mode for this particular PC. The video concludes with a teaser for future videos diving into Wake On LAN and sleep modes for Windows, Mac OS, and Linux.

Scroll to Top