09-26-2014
WakeOnLan, tcp packet
I'd like to use SPARC Solaris10 to 'wake up' an old PC on same LAN.
what is the simplest way of doing it? (preferably without installing new software)
thanks.
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
Is there any way that i can directly take out the IP packet and see its contents.
Waiting for your answer ..............
Bye (4 Replies)
Discussion started by: manjunath
4 Replies
2. IP Networking
Hello,
I'm having an issue with TCP sockets.
When the TCP connection is terminated on one end, TCP packet with RST flag set is being sent to the sender. All the packets sent so far were carrying the DSCP 'AF21' set by me. But packet with RST flag is carrying DSCP '0'.
Is this expected or... (0 Replies)
Discussion started by: Solace
0 Replies
3. Programming
Hi all,
I need to change the source port number of an outgoing TCP packet. First I have to bind the socket to a particular port(suppose 9001) but when I send the TCP packet I want to change the source port number lets say to 9002 still letting the socket to be bound to the same old port (9001).... (0 Replies)
Discussion started by: anuragrai134
0 Replies
4. Programming
can anyone tell me how can i capture the packets. i have tried ethernet software to capture them but its not doing what i want it to do it (1 Reply)
Discussion started by: dazdseg
1 Replies
5. IP Networking
Hi, wondering if anyone can suggest a tool to me that will let me either cut & paste hex or type it in for packet decoding.
I want to be able to decode a packet as done with tcpdump or wireshark, but I want to be able to manually input the hex myself. (2 Replies)
Discussion started by: Breakology
2 Replies
6. IP Networking
Hi!
I'm writing an application (using BSD sockets on a Linux host) which communicates over TCP/IP with an embedded device. This embedded device has an old and real slow integrated circuit (Epson S1S6000) which handles all of the TCP/IP communication for it.
Problem is, this circuit (S1S6000)... (7 Replies)
Discussion started by: olle
7 Replies
7. Cybersecurity
Exercise:
Protection of WEB and DNS servers using the context-free rules for packet filtering:
- Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns.
- Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies
8. Homework & Coursework Questions
Exercise:
Protection of WEB and DNS servers using the context-free rules for packet filtering:
- Protect your WEB-server, so that would be for him can be accessed by browsers, and could go to dns.
- Protect your primary DNS-server so that it could be to contact clients and secondary servers.... (1 Reply)
Discussion started by: numeracy
1 Replies
9. AIX
(5 Replies)
Discussion started by: Vishal_dba
5 Replies
10. Solaris
I have problem with oracle solaris 10 running on oracle sparc T4-2 server.
Os information: 5.10 Generic_150400-03 sun4v sparc sun4v
Output from tcpstat.d script
TCP bytes: out outRetrans in inDup inUnorder
6833763 7300 98884 0... (2 Replies)
Discussion started by: insatiable1610
2 Replies
WOL(1) wol WOL(1)
NAME
wol - Wake On LAN client
SYNOPSIS
wol [OPTION] ... MAC-ADDRESS ...
DESCRIPTION
This manual gives you an introduction into "wol", the Wake On LAN client. It remotely turns on computers that supports Magic Packet
technology (also known as Wake On LAN).
Some workstations support SecureON password feature. These machines only wake up if you provide the correct password. "wol" also provides
this feature.
OPTIONS
--help
Print a summary of the command line options.
-V
--version
Print the version number of "wol".
-h HOST
--host=HOST
-i HOST
--ipaddr=HOST
Broadcast packet to this IP address or hostname. This is important if your wol client is a multihomed host and you want to send only to
one subnet (default IP address is 255.255.255.255).
-p NUM
--port=NUM
Send packet with this destination port NUM. This option is important if your packet filter would block the default destination port
40000.
-f FILE
--file=FILE
Read hardware addresses, IP addresses/hostnames, optional ports and SecureON password from file FILE. If FILE is - "wol" reads from
stdin.
- Read hardware addresses, IP addresses, optional ports and optional SecureON password from stdin. So you can extract MAC-ADDRESSES from
any source and pipe the data into "wol" so.
-v
--verbose
Turns on verbose output.
-w NUM
--wait=NUM
Waits NUM milliseconds between Magic Packets. Also known as fuse health pack.
--passwd[=PASS]
Send a magic packet with SecureON password feature. PASS is written as x-x-x-x-x-x, where x is a hexadecimal number between 0 and ff
which represents one byte of the password.
If you don't provide PASS "wol" prompts you for a password.
To set the password of your SecureON capable NIC, you can use "ethtool" (<http://www.sourceforge.net/projects/gkernel/>).
BUGS
Please report bugs to <krennwallner@aon.at>. Feel free to send bug reports, translations, improvement suggestions and patches to this email
address.
SEE ALSO
GNU info entry for wol.
AUTHOR
Written by Thomas Krennwallner <krennwallner@aon.at>.
COPYRIGHT
Copyright (C) 2001,2002,2003,2004 Thomas Krennwallner <krennwallner@aon.at>
This document may be distributed and modified under the terms of the GNU General Public License.
This manual is free software; you may redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2, or (at your option) any later version.
This manual is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of
merchantability or fitness for a particular purpose. See the GNU General Public License for more details.
A copy of the GNU General Public License is available on the World Wide Web at the GNU website. You can also obtain it by writing to the
Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
wol 0.7.1 2010-07-05 WOL(1)