The 'g' in Supports Wake-on: pumbg indicates that wake-on-lan by using a 'magic packet' is indeed supported. Next, you need to make sure that wake-on-lan support is enabled in the BIOS (although, this does not seem to be necessary for my motherboard). In addition, you need to tell your network card to enable wake-on-lan: # ethtool -s eth0 wol g. Supports Wake-on: pumbg Wake-on: g. Means and how i can tell the network-card (on board or else) only to switch on the comnputer if there is a magic packet received.
- Supports Wake On Lan Pumbg
- Proxmox 6 Wake On Lan
- Linux Wake On Lan
- Supports Wake-on: Pubg
- Proxmox Enable Wake On Lan
- Centos Wake On Lan
- Supports Wake On Pumbg
Today, we continue our series on readying the homelab for unattended access. Previously, we set up a Raspberry Pi to allow us to remote into our network via a reverse SSH tunnel. That's useful by itself, especially as a backup if our normal route of access (VPN) is down, but we can also use that same reverse SSH tunnel to do some other incredibly useful things such as waking up other devices on the network with wake-on-LAN (WOL). Today's tutorial will focus on precisely that: enabling our servers to be woken up on LAN, and configuring our RPi sleeper cell to wake those servers up. Let's begin!
Enable Server for Wake-On-LAN (WOL):
1. On your server, install ethtool:
ethtool allows us to verify that our NIC can support wake-on-lan. It is also used to enable wake-on-LAN on Ubuntu.
2. Find the name of the network adapter you are currently using with the following command:
If you don't already have ifconfig, you can install it with:
If you need help figuring out which network adapter you are currently using, look for the one with an IP address assigned. You can also look at which network adapter has had traffic go through it (the RX and TX packets line will have non-blank values):
In my case, eth0 is the network adapter in use, and chances are it probably is for you too. If you need help with this, feel free to ask me in the comments/forum.
3. While you're here, record the address next to ether (highlighted above). That's your MAC address and that's how we will ultimately address the server when we are ready to wake it up.
4. Check to see if wake-on-LAN is available on your NIC with ethtool:
In my case that command would be:
If WOL is available on your card, you should see a line that appears as so:
We really only care to see that this line contains a 'g', indicating a that it will accept a 'magic packet' (the mechanism by which wake-on-LAN works).
N.B.: If you don't see it, all hope is not lost, you may just need to enable 'Wake-On-LAN' in the BIOS. This varies from motherboard to motherboard but almost all have this setting so look for it.
5. Enable the system for Wake-On-LAN:
Don't forget to replace eth0 with the adapter you're using if you have a different one.
![Pumbg Pumbg](/uploads/1/1/9/7/119759916/597431452.png)
6. Create the script to insure that WOL is always enabled:
Now, there's an unpleasant little 'feature' in OS's where the above setting gets reset after every reboot.
If you're using unRAID, this easily handled with the User Scripts plugin. Just create a user script with the following content and set it to run 'At startup of array' (make sure you have the array set to always start):
If you're using Ubuntu, we'll need to create a system service:
In this add the following:
Again, don't forget to replace eth0 with whatever network adapter you're using.
Enable the service:
That's it for setting everything up on the server side. Now, let's set everything up on our RPi (or whatever other device you have the reverse SSH tunnel set up on).
Install Etherwake on RPi:
7. Super easy job here. Just install etherwake on the RPi with:
That's all!
Test Everything Out:
8. Shutdown your server so we can test waking it up.
9. SSH (reverse SSH if working remotely) into your RPi.
10. Just like we did in Step 2 above, identify the network device in use on your RPi.
This is where A LOT of people trip up and why they fail to get wake-on-LAN/etherwake working. By default, etherwake attempts to send out the WOL magic packet on eth0 of the device it's being run on. If eth0 isn't in use, you'll get the following error message:
11. Send the WOL magic packet with the following command using the MAC address you found in Step 2/3 above and the RPi network device you found in step 10 above:
Example:
At this point, you should hear your server kick on and boot up!
As always, let me know if you run into any problems or have any questions in the comments below!
Interested in this topic and others like it? Join our community and join in the discussion! We currently have a need for moderators so if you can help out it would be much appreciated!
The Status Report tab in Firebox System Manager contains the Firebox Status Report. This report includes information about all the currently active processes on your Firebox, the ARP table, interface and routing metrics, and other information about the current status and configuration of your device. You can use the Status Report to monitor the performance of your Firebox and the traffic through the device. You can also use the Status Report when you work with WatchGuard Technical Support to troubleshoot issues.
![Supports wake on pumbg Supports wake on pumbg](/uploads/1/1/9/7/119759916/837478281.jpg)
The sections in this example are from a WatchGuard XTM 1050 Status Report. If you have a different Firebox model, or have different features enabled on your device, your Status Report can include different information.
Uptime, Version, and Serial Number Information
At the top of the Status Report, the system time, uptime for the Firebox, and the version numbers of the major software components appear. The serial number and model number of the device are also included.
Firebox Components Status
In this example, the modules are version 11.9.
Logging
The Log Configuration section contains information about whether logging is enabled to a syslog server or WatchGuard Log Server, and the IP addresses of any configured Log Servers.
To configure these settings, from Policy Manager, select Setup > Logging.
If your device is configured to send log messages to a syslog server, because the traffic from the device to the syslog server is sent only one way, and because the connection to the syslog server is not confirmed by the device, the Status setting that appears is always Connected.
If your device is configured to send log messages to a WatchGuard Log Server, the Status only appears as Connected if the connection to the WatchGuard Log Server or Dimension is active and the Log Server accepts the log messages sent from the device. If a WatchGuard Log Server is configured for your device but the Status that appears is Disconnected, the IP address or authentication key specified in the device configuration for the Log Server might be incorrect.
Process List
The Process List section of the Status Report contains information about all the current processes on the Firebox.
The example below is a partial list. Your Status Report might include information about more processes.
Each line in the process list includes this information:
PID
The process ID.
ST
Process status codes. These are the possible status codes:
D — Uninterruptible sleep (usually IO)
R — Runnable (on run queue)
S — Sleeping
T — Traced or stopped
Z — A defunct ('zombie') process
W — Has no resident pages
< — High-priority process
N — Low-priority task
L — Has pages locked into memory (for real-time and custom IO)
I — Uninterruptible idle (does not contribute to load average)
The percentage of CPU capacity used by this process.
VSS
Virtual memory usage.
RSS
Real memory usage.
SHARED
Shared memory usage.
STARTED
What time the process started.
TIME
The total CPU time this process used.
COMMAND
The name of the process or command.
Memory
The amount of Firebox memory currently in use appears in the Memory info section of the Status Report.
To understand how much available memory your Firebox has, review these memory statistics, available in the Status Report:
MemTotal
This is the total amount of memory available on your device.
MemFree
This is the amount of memory that is not reserved or currently in use.
Buffers
This is the amount of memory the Firebox has reserved for temporary use by all Firebox processes.
Cached
This is the amount of memory that is reserved by device processes, but not currently in use. A high Cached value does not indicate a memory problem.
A low MemFree value does not indicate a problem with Firebox performance or resources. The total available memory for the Firebox is the combined value of MemFree, Cached, and Buffers.
To improve system performance, Fireware allocates most available memory to buffers and cache. If a process requires more memory, Fireware automatically frees up memory used by buffers and cache.
Load Average
The Load Average section contains statistics about average process load over time.
The Load Average shows the number of jobs in the processor core run-queue, or the run-queue length. The run-queue length is the total number of processes currently running, plus the number of processes that are on hold in the run-queue. If the Load Average values are high, the system is under heavy use and the response time is correspondingly slow.
1-min
This number is the average load for the last minute.
5-min
This number is the average load for the last 5 minutes.
15-min
This number is the average load for the last 15 minutes.
run-proc
This statistic has two numbers: the first number is the number of processes in the run state; the second number is the total number of processes on the device. In this example, the run-proc is 2/52, which means there are 2 current processes from a total of 52 on the Firebox .
last-pid
This value is the PID (process ID) that is assigned to the next process.
For example, if your Firebox has eight cores and a Load Average of 4.0, the device would not be under heavier use than a device with one core and a Load Average of .5.
IPv6 Network Hop Limit
The IPv6 Network Hop Limit section includes the current IPv6 hop limit settings configured for the interfaces on your device. The hop limit is the number of network segments a packet can travel over before it is discarded by a router. The default value is 64.
Network Configuration
The status of physical network interfaces on the Firebox appears in the Network Configuration section.
For each interface, the Status Report indicates whether the interface is enabled, the name of the interface, and the IP address. It also shows the Maximum Transmission Unit (MTU), the status of the interface (up or down), and whether the IP address assignment is static or dynamic.
Enabled
Yes or No. This indicates whether the interface is currently enabled in the Firebox or XTM configuration
IF-#
This is the number assigned to the interface. A wireless interface ath1, physical interface eth1, and virtual interface vlan1 can all be assigned the number 1.
Dev-Name
The name of the interface as it appears in Fireware OS. The interface name also appears in some Event and Debug log messages.
- eth# — A physical interface on the Firebox.
- ath# — A wireless interface on the Firebox. This only applies to wireless interfaces on the Firebox, not interfaces with a connected AP device.
- vlan# — A Virtual LAN interface and the VLAN ID number.
- bond# — A Link Aggregation interface.
- br# — A bridge interface on the Firebox.
Name
The name specified for the interface. This is included in traffic log messages in Traffic Monitor.
Address
The primary IP address of the interface, in CIDR format. Secondary IP addresses do not appear in this section.
Zone*/MTU
The network zone, such as TR (trusted), EX (external), or OP (optional), and the MTU value configured for the interface.
Status
up or down. This indicates the status of the physical link or Multi-WAN interface.
IP-Assignment
static, dhcp, or pppoe. This shows how the interface is assigned an IP address.
Interfaces
Configuration information and traffic statistics for each Firebox network interface appear in this section.
If a colon (:) appears in an interface number, it indicates a secondary network (interface alias). A period (.) in an interface number, indicates a VLAN interface. The number after the period(.) is the VLAN ID number.
Interfaces that appear in your report with names such as br1 and br2 are bridges (virtual interfaces) associated with the two VLANs on eth3,1 and eth3, 2.
A lo interface is a loopback virtual interface. This interface has the standard loopback IP address of 127.0.0.1. Packets destined for this network loop back to the Firebox .
An interface such as tun0 is a Point-to-Point VPN tunnel virtual interface.
An interface such as bond0 is a link aggregation interface.
An interface such as ath0 is a wireless interface.
An interface such as gre0 is a virtual interface related to Branch Office VPN tunnels.
An interface such as sw10 is a virtual switch interface which is used by some Firebox models to manage physical interfaces.
Each line of the status for each interface includes this information:
Interface description
Interface name, interface type, MAC address
IP Address information
Interface IP address, broadcast IP address, IP netmask
Interface status information
Interface status flags (this includes: UP, BROADCAST, MULTICAST, and others)
Interface MTU (in bytes)
Interface metric (priority)
Received packet statistics
Number of received packets
Number of receive errors (this includes jabber, CRC, buffer overrun, runt frames, and others)
Number of dropped RX packets (these are rare)
Number of FIFO overruns (these are rare)
Number of frame errors (see note below)
Transmit packet statistics
Number of transmitted packets
Number of transmit errors (generally only transceiver problems)
Number of dropped packets (these are uncommon)
Number of FIFO overruns (these are uncommon)
Number of carrier errors (generally indicate bad Ethernet hardware or bad cabling)
Collisions statistics and transmit queue length
Number of collisions and transmit queue length
Transmit and receive byte counts
Number of bytes transmitted and received
Interrupt and memory
Interrupt and memory address for this interface
A high number of errors (greater than .1% of total packets) can be caused by bad Ethernet connectivity between the Firebox and what it is connected to, or it can be caused by hardware failure.
Frame errors are Ethernet errors that fail the Cyclic Redundancy Check (CRC) of the Ethernet receiver. These errors indicate damaged frames. There can be many causes for frame errors. For example, bad wiring, broken Ethernet hardware, and cable runs that are too long.
Physical Interfaces Link Status
The Physical Interfaces Link Status section includes link information for each interface on your device.
Other areas that can appear in the Physical Interfaces Link Status section of the report include:
Wireless
This section includes the wireless options enabled for each wireless adapter on your Firebox, and the interface information for any active wireless network on your device. The interface information should correspond to the wireless interfaces enabled on your device.
Bridges
This section shows the bridges enabled to the interfaces on your device, and includes any VLANs and the interface name.
For example, if your device has a wireless network bridged to a physical interface, an entry like this could appear in the Bridges section:
Bridge MACs
This sections includes the MAC address for each member interface on your device that is configured as a LAN bridge. Bridges from a wireless network to an interface are not included in this section.
Routes
Routes are included in two separate tables: IPv4 Routes and IPv6 routes.
For more information about route tables, see Read the Firebox Route Tables.
IPv4 Routes
The IPv4 Routes section includes this information for the first 100 IPv4 routes:
- Destination — The destination IP address for the route
- Gateway — The IP address of the gateway the route uses.
- Genmask — The subnet mask for the destination IP address
- Flags — Route flags that indicate characteristics of the route.
- Metric — The routing metric, or cost for the route. A lower number indicates a lower cost and higher route priority.
- Interface — The interface to which packets for this route will be sent. For example, eth0 for interface 0.
This information appears for IPv4 static, dynamic, connected, and BOVPN virtual interface routes.
IPv6 Routes
The IPv6 Routes section includes this information for the first 100 IPv6 routes:
- Destination — The destination IP address for the route
- Next Hop — The IP address of the next hop for the route.
- Flags — Route flags that indicate characteristics of the route.
- Metric — The routing metric, or cost for the route. A lower number indicates a lower cost and higher route priority.
- Interface — The interface to which packets for this route will be sent. For example, eth0 for interface 0.
This information appears for IPv6 static, dynamic, connected, and BOVPN virtual interface routes.
ARP Table
The ARP table maps IP addresses to the MAC address of each interface.
The ARP table on a Firebox is unique, because the device can do proxy ARP. Proxy ARP enables the device to use the same IP address on three interfaces and to route between them properly. The device does this with a special routing table and proxy ARP requests, which it uses to determine what interface certain IP addresses are connected to.
Flags in the ARP table:
Supports Wake On Lan Pumbg
C — Complete entry
M — Permanent entry
P — Published entry
- — If a dash (-) appears in the Mask column, the ARP request/response failed. This could indicate bad cabling, bad Ethernet hardware, or a host that has been removed from the network before the Firebox has removed the host ARP table entry.
An ARP entry usually has a C flag. For a drop-in configuration, ARP entries are usually flagged CMP. If the device is configured in drop-in mode, there are three ARP table entries for each IP address. When a host on any of the networks makes a request for which there is already an ARP entry, the device responds with its own MAC address, then forwards the packet to the correct IP address on one of the other interfaces.
If the HW address is 00:00:00:00:00:00, that indicates that the Firebox was not able to get an ARP response for the IP address. A large number of IP addresses with this IP address can indicate an incorrect interface configuration, or a problem in the network.
Multi-WAN
Information about multi-WAN configuration settings and interface link status appear in these two sections.
DHCP Leases
The DHCP Leases section includes Information about the DHCP client leases on the Firebox that have completed negotiations. The DHCP lease time is the UTC time listed at the start of the report.
In Fireware v12.6.2 or higher, the DHCP Leases section also includes:
- Number of DHCP leases in use
- Total number of DHCP leases available in the configuration
DHCPv6 Leases
If you have enabled DHCP for a trusted or optional interface that uses an IPv6 address, information about the leases for those interfaces appears in this section.
Proxmox 6 Wake On Lan
Domain Name Servers
Linux Wake On Lan
The Domain Name Servers section includes the IP addresses of the DNS servers configured on your Firebox.
Dynamic Routing
If you have configured dynamic routing protocols (RIP, OSPF, or BGP) on your Firebox, configuration and status information appears in these sections.
In this example, no dynamic routing protocols are configured on the Firebox .
IPSec Routes
This section includes details about the destination and source IP addresses for the IPSec routes on your Firebox.
The example for this Firebox does not include any IPSec routes.
If the Status Report for your Firebox does include information about the IPSec routes on the device, the value on the left is the destination subnet and the value on the right is the source address.
Supports Wake-on: Pubg
For example:
In this example, there is one active route. When you troubleshoot problems with your VPNs, if the VPN does not operate correctly, or operates only intermittently, you might have reached the maximum number of allowed tunnel routes for your device.
Proxy Connection Statistics
This section contains Information on enabled proxies and their connection statistics.
Proxmox Enable Wake On Lan
FireCluster
If your Firebox is included in a FireCluster, information about the FireCluster appears in this section.
In this example, the Firebox is not a member of a FireCluster.
Centos Wake On Lan
Device System Health
Supports Wake On Pumbg
The System Health section includes status and connection delay information for each of the processes that run on your Firebox .