WOL package over PPTP

Hi,
Have PPTP server enabled and running smoothly on my router (v5.14). PPTP connections are bridged to LAN. How could I forward WOL package from PPTP client to LAN located server?

i dont know about WOL, but pptp is not l2. its a l3 protocol. run l2tp who is l2 to bridge the to VPN routers.

Have some limitation on client side. PPTP available only :frowning:. Will continue to look for solution.

For L2 communication, EoIP+PPTP is required or PPTP+BCP (bridge control protocol supported on both ends),
http://wiki.mikrotik.com/wiki/Manual:BCP_bridging_(PPP_tunnel_bridging)

L2 between two networks should make Wake On LAN feature operational.

But should also work With l2tp Interface in bridge?

Yes, L2TP will work too.

I have found really good tutorials how people make pptp+EOIP in case of two routers:
http://blog.butchevans.com/2008/09/mikrotik_routeros_transparent_bridge_pptp_eoip/
But the problem is I am using android device as client connecting to pptp server. Did any of you guys had a chance to setup something similar? And if you did how did you forward WOL requests from remote location to LAN?

Ok guys, hope you can help me with the issue.

I have L2TP VPN up and running on my ROS. Clients can connect and have access to local resources. But still no go with WOL packages (systems in LAN doesn’t wake up).
When the client is connected to LAN network directly everything working perfectly. What am I doing wrong?

My config:

/ip pool pr
 # NAME                                         RANGES                         
 0 private_pool                                 172.26.104.2-172.26.104.254 

/ip address print 
Flags: X - disabled, I - invalid, D - dynamic 
 #   ADDRESS            NETWORK         INTERFACE                              
 0   172.26.104.1/24    172.26.104.0    Private bridge 

/interface ethernet pr
Flags: X - disabled, R - running, S - slave 
 #    NAME        MTU MAC-ADDRESS       ARP        MASTER-PORT      SWITCH     
 0 R  Wan        1500 [MAC] 		enabled    none             switch1    
 1 R  ether2     1500 [MAC] 		enabled    none             switch2    
 2 RS ether3     1500 [MAC] 		enabled    ether2           switch2    
 3 RS ether4     1500 [MAC] 		enabled    ether2           switch2    
 4  S ether5     1500 [MAC] 		enabled    ether2           switch2    
 5    ether6     1500 [MAC] 		enabled    none             switch1    
 6  S ether7     1500 [MAC] 		enabled    ether6           switch1    
 7  S ether8     1500 [MAC] 		enabled    ether6           switch1    
 8  S ether9     1500 [MAC] 		enabled    ether6           switch1

/interface bridge pr
Flags: X - disabled, R - running 
 0  R name="Private bridge" mtu=1500 l2mtu=1520 arp=proxy-arp 
      mac-address=[MAC] protocol-mode=none priority=0x8000 
      auto-mac=yes admin-mac=00:00:00:00:00:00 max-message-age=20s 
      forward-delay=15s transmit-hold-count=6 ageing-time=5m 

/interface bridge port pr
Flags: X - disabled, I - inactive, D - dynamic 
 #    INTERFACE              BRIDGE              PRIORITY  PATH-COST    HORIZON
 0    ether2                 Private bridge          0x80         10       none
 1 I  ether6                 Private bridge          0x80         10       none
 2 I  Private WLAN        Private bridge          0x80         10       none


/ip ipsec peer print 
Flags: X - disabled 
 0   address=0.0.0.0/0 port=500 auth-method=pre-shared-key secret=[secret]
     generate-policy=yes exchange-mode=main-l2tp send-initial-contact=no 
     nat-traversal=yes my-id-user-fqdn="" hash-algorithm=sha1 
     enc-algorithm=aes-128 dh-group=modp1024 lifetime=1d dpd-interval=2m 
     dpd-maximum-failures=5

/ppp secret
add caller-id="" disabled=no limit-bytes-in=0 limit-bytes-out=0 name=[user_name] \
    password=[password] profile="Private secure" routes="" service=any


/ppp profile
add bridge="Private bridge" change-tcp-mss=default local-address=private_pool \
    name="Private secure" only-one=default remote-address=private_pool \
    use-compression=default use-encryption=yes use-mpls=default \
    use-vj-compression=default


/ip ipsec proposal print 
Flags: X - disabled, * - default 
 0  * name="default" auth-algorithms=md5,sha1 
      enc-algorithms=3des,aes-128,aes-192,aes-256 lifetime=10m 
      pfs-group=modp1024

put your l2tp interface in your bridge. Use the ppp profile bridge parameter.

Done that. Still no go :frowning:

bridge=“Private bridge”

/ppp profile
add bridge="Private bridge" change-tcp-mss=default local-address=private_pool \
    name="Private secure" only-one=default remote-address=private_pool \
    use-compression=default use-encryption=yes use-mpls=default \
    use-vj-compression=default

So I guess no good solution here :frowning:

We dont have problems with WOL over openVPN tunnel(layer 3),PPTP … We are using this app http://www.uloz.to/xTNss92/wakeonlangui-exe (running in Wine too) … Just set right MAC address, right IP address subnet 255.255.255.255 and options internet and right port (7,9)…

Well, I guess that really depends what kind of wol technology you are using on the server side (Magic Package, Broadcast, Multicast, etc). Anyway have a limitation on client it is Android and have used like 5 different application for testing. All of them work fine when the device connected to LAN though. Plus see WOL package capturing the traffic port on router.

Ok, I have continued to dig through and came across this:

http://en.wikipedia.org/wiki/Wake-on-LAN#Subnet_directed_broadcasts

Could it be a problem for WOL (Magic Packet) not reaching destination? And if it so how could I enable SDB on ROS for VPN connection?