How to configure WOL (Wake On LAN) on TP-Link SafeStream Router using the new GUI
TL-R600VPN( V4 ) , TL-ER6120( V2 V3 ) , TL-ER6020( V2 ) , ER605 , TL-ER5120( V3 V4 ) , TL-R480T+( V9 ) , TL-R470T+( V6 )
Recent updates may have expanded access to feature(s) discussed in this FAQ. Visit your product's support page, select the correct hardware version for your device and check either the Datasheet or the firmware section for the latest improvements added to your product.
You can use WOL (Wake on LAN) to boot up your PC from a remote place by sending a Magic Packet via the internet.
- Network Topology
In the diagram below, PC A is connected to the internet via the router. It is required that PC B can wake up PC A by sending a Magic Packet via the internet.
- Configuration Scheme
Before configuring WOL, you should do the following preparation:
- Make sure that the motherboard of PC A supports WOL. In BIOS setup of PC A, enable Power On By PCIE or Wake Up On LAN.
- Make sure that the network card of PC A supports WOL. In network card properties configuration of PC A, allow the network card to wake up the PC, forbid the PC to turn off the network card to save power, and enable Wake on Magic Packet.
- PC A should be powered off normally and the power supply is normal.
- Make sure the WAN port of the router is routable from PC B.
To achieve this requirement, you can configure the router as follows:
- Bind MAC and IP Address of PC A
- Reserve the IP address for PC A
- Configure Virtual Server.
After you complete the configuration, you can use a WOL software to wake up PC A on PC B.
- Configuration Procedure
Follow the steps below to configure the router.
Step 1 Bind MAC and IP Address of PC A
There are three methods to do IP-MAC binding: bind in the ARP list, bind in ARP scanning result, or add IP-MAC Binding list entry manually.
- Bind in the ARP List
Choose the menu Firewall > Anti ARP Spoofing > ARP List to load the following page. If the desired entry is in the list, click the corresponding to bind MAC and IP address of PC A.
- Bind in ARP Scanning Result
Choose the menu Firewall > Anti ARP Spoofing > ARP Scanning to load the following page. In the general section, specify the scanning IP range according to the DHCP address pool. Click Scan. Wait a minute until the scanning is completed.
In the Scanning Result section, click the corresponding to bind MAC and IP address of PC A.
- Add IP-MAC Binding List Entry Manually
Choose the menu Firewall > Anti ARP Spoofing > IP-MAC Binding to load the following page. In the IP-MAC Binding List section, click to load the following page. Enter the IP address and MAC address of PC A. Enable Export to DHCP Address Reservation. Check Enable for Status. Click OK.
Step 2 Reserve the IP Address for PC A
Choose the menu Network > LAN > Address Reservation to load the following page. Check if the desired IP address is reserved for PC A.
If there is not a desired entry, click to load the following page. Enter the IP address and MAC address of PC A. Enable Export to IP-MAC Binding. Check Enable for Status. Click OK.
Step 3 Configure Virtual Server
Choose the menu Transmission > NAT > Virtual Servers and click to load the following page. Enter a name for the entry. Specify the WAN port according to the network environment. Specify the external port and internal port as 7, which is used to receive Magic Packets. Specify the internal server IP as 192.168.0.100, which is the IP address of PC A. Select the protocol as UDP. Check Enable for Status. Click OK.
After the above configuration, you can now launch a third-party WOL software on PC B and send a Magic Packet to boot up PC A.
Is this faq useful?
Your feedback helps improve this site.
What’s your concern with this article?
- Dissatisfied with product
- Too Complicated
- Confusing Title
- Does not apply to me
- Too Vague
- Other
We'd love to get your feedback, please let us know how we can improve this content.
Thank you
We appreciate your feedback.
Click here to contact TP-Link technical support.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy . Don’t show again
This website uses cookies to improve website navigation, analyze online activities and have the best possible user experience on our website. You can object to the use of cookies at any time. You can find more information in our privacy policy . Don’t show again
Basic Cookies
These cookies are necessary for the website to function and cannot be deactivated in your systems.
TP-Link
SESSION, JSESSIONID, accepted_local_switcher, tp_privacy_base, tp_privacy_marketing, tp_smb-select-product_scence, tp_smb-select-product_scenceSimple, tp_smb-select-product_userChoice, tp_smb-select-product_userChoiceSimple, tp_smb-select-product_userInfo, tp_smb-select-product_userInfoSimple, tp_top-banner, tp_popup-bottom, tp_popup-center, tp_popup-right-middle, tp_popup-right-bottom, tp_productCategoryType
Youtube
id, VISITOR_INFO1_LIVE, LOGIN_INFO, SIDCC, SAPISID, APISID, SSID, SID, YSC, __Secure-1PSID, __Secure-1PAPISID, __Secure-1PSIDCC, __Secure-3PSID, __Secure-3PAPISID, __Secure-3PSIDCC, 1P_JAR, AEC, NID, OTZ
Zendesk
OptanonConsent, __cf_bm, __cfruid, _cfuvid, _help_center_session, _pendo___sg__.<container-id>, _pendo_meta.<container-id>, _pendo_visitorId.<container-id>, _zendesk_authenticated, _zendesk_cookie, _zendesk_session, _zendesk_shared_session, ajs_anonymous_id, cf_clearance
Analysis and Marketing Cookies
Analysis cookies enable us to analyze your activities on our website in order to improve and adapt the functionality of our website.
The marketing cookies can be set through our website by our advertising partners in order to create a profile of your interests and to show you relevant advertisements on other websites.
Google Analytics & Google Tag Manager
_gid, _ga_<container-id>, _ga, _gat_gtag_<container-id>
Google Ads & DoubleClick
test_cookie, _gcl_au