Wake On LAN (WOL) is a computing standard by which computers that are asleep can be sent a message through the network to wake them up. Wake on LAN is supported on all Microsoft Windows operating systems. Machines can be awoken when in Sleep, Hibernate or Stand by modes.
|
Note: Wake on LAN is only supported from Sleep or Hibernation states in Windows 8.1. Refer to Microsoft KB Article 2776718 for more information. |
The only requirement for WOL is a computer with a NIC and Bios that supports WOL. There are usually 2 settings in the BIOS to support this. In the BIOS enable the PXE setting, and/or depending on the computer hardware in the BIOS - Power Management, enable Wake On LAN.
As well as turning on WOL in the BIOS, the OS must also be configured to support WOL. On client machines, go to the LAN Connection properties and click the Configure button. On the Power Management tab, enable the "Allow this device to wake the computer" (Windows 7).
Desktop Authority's implementation of WOL consists of beacon machines that are used to send out packets to wake specified computers. A beacon is defined as any computer managed by Desktop Authority that validates for a Wake on LAN element. Once a machine validates for a WOL element, it becomes a beacon and begins sending out packets to each computer specified in the WOL settings. Since a computer can only send out packets when it is powered on and awake, ensure that computers designated as beacons will be on at the time the WOL element is scheduled to execute.
Figure 21: Wake on LAN graphical overview
Once a beacon is determined by passing validation logic for a WOL element, the machine will send out special WOL "magic" packets to all machines specified in the WOL element's settings.
Add a custom entry to the WOL List by Machine name, IP address, MAC address or by Excluded MAC address.
Select a computer from a list of machines discovered by Data Collection. Computer can be selected by Machine names, IP addresses, MAC addresses or by Excluded MAC addresses. All available items in the system inventory will be listed and will be available for selection
Select one or more elements from the WOL list and click the Remove button.
Click Import to import a list of Machine names, IP addresses, MAC addresses, or Excluded MAC addresses.
When importing, the import file must be a .CSV file containing one column of one or more Machine Names, IP Addresses, MAC Addresses, or Excluded MAC Addresses exclusively.
Example:
ACME.Machine1 |
ACME.Machine2 |
ACME.Machine3 |
The above example list provides the following result when imported:
Retrieve a complete list of all MAC addresses that this beacon will send the "magic" packet to. MAC addresses are retrieved from the Hardware inventory database. If a MAC address cannot be retrieved for a computer, it will not be woken up when the WOL element is executed.
|
Note: Some routers and switches may filter out magic packets resulting in the inability to wake the target machines. Therefore, it is recommended to select a beacon that resides on the same subnet as the target machine(s). |
Select the Timing tab to configure when this element will be executed. Computer Management objects can execute at computer Startup, Shutdown, defined Refresh intervals or based on customized Schedules.
Select the Validation Logic tab to set the validation rules for this element.
Select the Notes tab to create any additional notes needed to document the profile element.
When adding or modifying a profile object element, the description appears above the settings tab. Enter a description to annotate the element. The default value for new profile elements can be changed by going to the system Preferences.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center