[admin@111Lucia] /file> /tool wol 00:19:DB:62:7B:FB
is what I do. Nothing gets captured when I sniff according to the following setup:
[admin@111Lucia] /file> /tool sniffer export
# aug/03/2009 13:20:30 by RouterOS 3.25
# software id = Z6DV-8JR8
set file-limit=1000 file-name=wolcap filter-address1=0.0.0.0/0:0-65535 \
filter-address2=0.0.0.0/0:0-65535 filter-protocol=all-frames \
filter-stream=no interface=ether2 memory-limit=100 only-headers=no \
This command is on opensuse linux using wakeonlan v0.41 according to -v usage or 220.127.116.11 according to the top of the perl program file.
jp@xj13:~> cat /usr/local/mis/bin/e-type
echo E-type has been started.
The capture file is attached from the following command:
tcpdump -n -i eth0 src or dst not 10.0.2.4 -w capture.txt
I was ssh'd in from 10.0.2.4 so that why that's excluded.
Also attached is a screenshot of the wakeup packet from that capture displayed in wireshark.
I wonder if routerOS is sending the command to the wrong interface? My lan is on ether2.
You do not have the required permissions to view the files attached to this post.