Difference between revisions of "Wpa supplicant.conf"
From MS Computech
Line 10: | Line 10: | ||
eapol_version=1 | eapol_version=1 | ||
ap_scan=1 | ap_scan=1 | ||
− | fast_reauth=1 | + | fast_reauth=1 |
− | + | #================================================================= | |
#WPA protected network, supply your own ESSID and WPAPSK here: | #WPA protected network, supply your own ESSID and WPAPSK here: | ||
− | + | #ctrl_interface=/var/run/wpa_supplicant | |
+ | #ctrl_interface_group=0 | ||
+ | #eapol_version=1 | ||
+ | #ap_scan=2 | ||
+ | #fast_reauth=1 | ||
+ | #network={ | ||
+ | #scan_ssid=0 | ||
+ | #ssid="your_essid_here" | ||
+ | #proto=WPA | ||
+ | #key_mgmt=WPA-PSK | ||
+ | #pairwise=CCMP TKIP | ||
+ | #group=CCMP TKIP WEP104 WEP40 | ||
+ | #psk=your_psk_here | ||
+ | #} | ||
+ | #================================================================== | ||
+ | # WPA_2 | ||
+ | ctrl_interface=/var/run/wpa_supplicant | ||
+ | ctrl_interface_group=0 | ||
+ | ap_scan=1 | ||
network={ | network={ | ||
− | + | ssid="ZeroDay" | |
− | ssid=" | + | proto=RSN |
− | proto= | + | key_mgmt=WPA-PSK |
− | key_mgmt=WPA-PSK | + | pairwise=CCMP TKIP |
− | pairwise=CCMP TKIP | + | group=CCMP TKIP |
− | group=CCMP TKIP | + | psk="astalavista" |
− | psk= | ||
} | } | ||
− | + | #================================================================== | |
#Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network | #Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network | ||
#You'll need a recent version of wireless-tools for this!#network={ | #You'll need a recent version of wireless-tools for this!#network={ | ||
Line 30: | Line 47: | ||
#priority=2 | #priority=2 | ||
#} | #} | ||
+ | |||
</pre> | </pre> |
Revision as of 10:55, 9 July 2008
wpa_supplicant.conf
# This line enables the use of wpa_cli which is used by rc.wireless # if possible (to check for successful association) ctrl_interface=/var/run/wpa_supplicant # By default, only root (group 0) may use wpa_cli ctrl_interface_group=0 eapol_version=1 ap_scan=1 fast_reauth=1 #================================================================= #WPA protected network, supply your own ESSID and WPAPSK here: #ctrl_interface=/var/run/wpa_supplicant #ctrl_interface_group=0 #eapol_version=1 #ap_scan=2 #fast_reauth=1 #network={ #scan_ssid=0 #ssid="your_essid_here" #proto=WPA #key_mgmt=WPA-PSK #pairwise=CCMP TKIP #group=CCMP TKIP WEP104 WEP40 #psk=your_psk_here #} #================================================================== # WPA_2 ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 ap_scan=1 network={ ssid="ZeroDay" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP psk="astalavista" } #================================================================== #Plaintext connection (no WPA, no IEEE 802.1X),nice for hotel/airport types of WiFi network #You'll need a recent version of wireless-tools for this!#network={ #ssid="any" #key_mgmt=NONE #priority=2 #}