Difference between revisions of "Wpa supplicant.conf"

From MS Computech
Jump to: navigation, search
Line 10: Line 10:
 
eapol_version=1
 
eapol_version=1
 
ap_scan=1
 
ap_scan=1
fast_reauth=1  
+
fast_reauth=1
 
+
#=================================================================
 
#WPA protected network, supply your own ESSID and WPAPSK here:
 
#WPA protected network, supply your own ESSID and WPAPSK here:
 
+
#ctrl_interface=/var/run/wpa_supplicant
 +
#ctrl_interface_group=0
 +
#eapol_version=1
 +
#ap_scan=2
 +
#fast_reauth=1
 +
#network={
 +
#scan_ssid=0
 +
#ssid="your_essid_here"
 +
#proto=WPA
 +
#key_mgmt=WPA-PSK
 +
#pairwise=CCMP TKIP
 +
#group=CCMP TKIP WEP104 WEP40
 +
#psk=your_psk_here
 +
#}
 +
#==================================================================
 +
# WPA_2
 +
ctrl_interface=/var/run/wpa_supplicant
 +
ctrl_interface_group=0
 +
ap_scan=1
 
network={
 
network={
scan_ssid=0
+
        ssid="ZeroDay"
ssid="your_essid_here"
+
        proto=RSN
proto=WPA
+
        key_mgmt=WPA-PSK
key_mgmt=WPA-PSK
+
        pairwise=CCMP TKIP
pairwise=CCMP TKIP
+
        group=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
+
        psk="astalavista"
psk=your_psk_here
 
 
}
 
}
 
+
#==================================================================
 
#Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network
 
#Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network
 
#You'll need a recent version of wireless-tools for this!#network={
 
#You'll need a recent version of wireless-tools for this!#network={
Line 30: Line 47:
 
#priority=2
 
#priority=2
 
#}
 
#}
 +
 
</pre>
 
</pre>

Revision as of 10:55, 9 July 2008

wpa_supplicant.conf

# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)

ctrl_interface=/var/run/wpa_supplicant

# By default, only root (group 0) may use wpa_cli

ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
#================================================================= 
#WPA protected network, supply your own ESSID and WPAPSK here:
#ctrl_interface=/var/run/wpa_supplicant
#ctrl_interface_group=0
#eapol_version=1
#ap_scan=2
#fast_reauth=1
#network={
#scan_ssid=0
#ssid="your_essid_here"
#proto=WPA
#key_mgmt=WPA-PSK
#pairwise=CCMP TKIP
#group=CCMP TKIP WEP104 WEP40
#psk=your_psk_here
#}
#==================================================================
# WPA_2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
ap_scan=1
network={
        ssid="ZeroDay"
        proto=RSN
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP
        psk="astalavista"
}
#==================================================================
#Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network
#You'll need a recent version of wireless-tools for this!#network={
#ssid="any"
#key_mgmt=NONE
#priority=2
#}