Difference between revisions of "Wpa supplicant.conf"

From MS Computech
Jump to: navigation, search
(New page: # Plaintext (no encryption) network<br>#ctrl_interface=/var/run/wpa_supplicant<br>#network={<br># ssid="ZeroDay"<br># key_mgmt=NONE<br>#} #------------------------------------------------...)
 
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
# Plaintext (no encryption) network<br>#ctrl_interface=/var/run/wpa_supplicant<br>#network={<br># ssid="ZeroDay"<br># key_mgmt=NONE<br>#}
+
<span style="font-family: monospace">/etc/wpa_supplicant.conf </span>
  
#---------------------------------------------------------
+
<span style="font-family: monospace">You can use this config for wpa wpa2 CCMP TKIP encryption.</span><br>
 +
<pre># This line enables the use of wpa_cli which is used by rc.wireless
 +
# if possible (to check for successful association)
  
# Static WEP keys<br>#ctrl_interface=/var/run/wpa_supplicant<br>#network={<br># ssid="example wep network"<br># key_mgmt=NONE<br># wep_key0="abcde"<br># wep_key1=0102030405<br># wep_tx_keyidx=0<br>#}
+
ctrl_interface=/var/run/wpa_supplicant
  
#-----------------------------------------------------------
+
# By default, only root (group 0) may use wpa_cli
  
# IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2<br>#ctrl_interface=/var/run/wpa_supplicant<br>#network={<br># ssid="example 802.1x network"<br># key_mgmt=IEEE8021X<br># eap=PEAP<br># phase2="auth=MSCHAPV2"<br># identity="user name"<br># password="password"<br># ca_cert="/etc/cert/ca.pem"<br>#}
+
ctrl_interface_group=0
 +
eapol_version=1
 +
ap_scan=1
 +
fast_reauth=1
  
#-----------------------------------------------------------
+
# =================================================================
  
# WPA<br>#ctrl_interface=/var/run/wpa_supplicant<br>#ctrl_interface_group=0<br>#eapol_version=1<br>#ap_scan=2<br>#fast_reauth=1<br>#network={<br># ssid="ZeroDay"<br># proto=WPA<br># key_mgmt=WPA-PSK<br># pairwise=TKIP<br># group=TKIP<br># psk="secret_password"<br>#}
+
# WPA protected network, supply your own ESSID and WPAPSK here:
  
#------------------------------------------------------------
+
# network={
 +
# scan_ssid=0
 +
# ssid="your_essid_here"
 +
# proto=WPA
 +
# key_mgmt=WPA-PSK
 +
# pairwise=CCMP TKIP
 +
# group=CCMP TKIP WEP104 WEP40
 +
# psk=your_psk_here
 +
# }
 +
#### Or This Code ####
 +
# network={
 +
# ssid="your_essid"
 +
# proto=WPA
 +
# key_mgmt=WPA-PSK
 +
# pairwise=TKIP
 +
# group=TKIP
 +
# psk="secret_password"
 +
# }
  
# WPA_2<br>ctrl_interface=/var/run/wpa_supplicant<br>ctrl_interface_group=0<br>ap_scan=1<br>network={<br> ssid="ZeroDay"<br> proto=RSN<br> key_mgmt=WPA-PSK<br> pairwise=CCMP TKIP<br> group=CCMP TKIP<br> psk="astalavista"<br>}
+
# ==================================================================
  
#------------------------------------------------------------
+
# WPA_2
 +
# ctrl_interface=/var/run/wpa_supplicant
 +
# ctrl_interface_group=0
 +
# ap_scan=1
  
# WPA2-EAP/CCMP using EAP-TLS
+
        network={
 +
        ssid="your_essid"
 +
        proto=RSN
 +
        key_mgmt=WPA-PSK
 +
        pairwise=CCMP TKIP
 +
        group=CCMP TKIP
 +
        psk="secret_password"
 +
}
  
#ctrl_interface=/var/run/wpa_supplicant
+
# ===================================================================
  
#network={<br># ssid="example wpa2-eap network"<br># key_mgmt=WPA-EAP<br># proto=WPA2<br># pairwise=CCMP<br># group=CCMP<br># eap=TLS<br># ca_cert="/etc/cert/ca.pem"<br># private_key="/etc/cert/user.p12"<br># private_key_passwd="PKCS#12 passhrase"<br>#}
+
# Plaintext connection (no WPA, no IEEE 802.1X),
 +
# nice for hotel/airport types of WiFi network
 +
# You'll need a recent version of wireless-tools for this!
  
#-------------------------------------------------------------
+
# network={
 +
# ssid="any"
 +
# key_mgmt=NONE
 +
# priority=2
 +
# }
  
#For IPW2200<br># wpa_supplicant -d -c/etc/wpa_supplicant.conf -ieth1 -Dwext<br>#For Madwifi<br># wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi
+
#====================================================================
  
# Catch all example that allows more or less all configuration modes<br>#network={<br># ssid="ZeroDay"<br># scan_ssid=1<br># key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE<br># pairwise=CCMP TKIP<br># group=CCMP TKIP WEP104 WEP40<br># psk="astalavista"<br># eap=TTLS PEAP TLS<br># identity="[email protected]"<br># password="Deaw"<br># ca_cert="/etc/cert/ca.pem"<br># client_cert="/etc/cert/user.pem"<br># private_key="/etc/cert/user.prv"<br># private_key_passwd="password"<br># phase1="peaplabel=0"<br>#}<br>
+
</pre>

Latest revision as of 14:39, 9 July 2008

/etc/wpa_supplicant.conf

You can use this config for wpa wpa2 CCMP TKIP encryption.

# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)

ctrl_interface=/var/run/wpa_supplicant

# By default, only root (group 0) may use wpa_cli

ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

# ================================================================= 

# WPA protected network, supply your own ESSID and WPAPSK here:

# network={
# scan_ssid=0
# ssid="your_essid_here"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=CCMP TKIP
# group=CCMP TKIP WEP104 WEP40
# psk=your_psk_here
# }
#### Or This Code ####
# network={
# ssid="your_essid"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=TKIP
# group=TKIP
# psk="secret_password"
# }

# ==================================================================

# WPA_2
# ctrl_interface=/var/run/wpa_supplicant
# ctrl_interface_group=0
# ap_scan=1

        network={
        ssid="your_essid"
        proto=RSN
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP
        psk="secret_password"
}

# ===================================================================

# Plaintext connection (no WPA, no IEEE 802.1X),
# nice for hotel/airport types of WiFi network
# You'll need a recent version of wireless-tools for this!

# network={
# ssid="any"
# key_mgmt=NONE
# priority=2
# }

#====================================================================