Difference between revisions of "Wpa supplicant.conf"

From MS Computech
Jump to: navigation, search
 
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
<pre># Plaintext (no encryption) network
+
<span style="font-family: monospace">/etc/wpa_supplicant.conf </span>
#ctrl_interface=/var/run/wpa_supplicant
+
 
#network={
+
<span style="font-family: monospace">You can use this config for wpa wpa2 CCMP TKIP encryption.</span><br>
# ssid="ZeroDay"
+
<pre># This line enables the use of wpa_cli which is used by rc.wireless
# key_mgmt=NONE
+
# if possible (to check for successful association)
#}</pre><pre>#---------------------------------------------------------</pre><pre># Static WEP keys
+
 
#ctrl_interface=/var/run/wpa_supplicant
 
#network={
 
# ssid="example wep network"
 
# key_mgmt=NONE
 
# wep_key0="abcde"
 
# wep_key1=0102030405
 
# wep_tx_keyidx=0
 
#}</pre><pre>#-----------------------------------------------------------</pre><pre># IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
 
#ctrl_interface=/var/run/wpa_supplicant
 
#network={
 
# ssid="example 802.1x network"
 
# key_mgmt=IEEE8021X
 
# eap=PEAP
 
# phase2="auth=MSCHAPV2"
 
# identity="user name"
 
# password="password"
 
# ca_cert="/etc/cert/ca.pem"
 
#}</pre><pre>#-----------------------------------------------------------</pre><pre># WPA
 
#ctrl_interface=/var/run/wpa_supplicant
 
#ctrl_interface_group=0
 
#eapol_version=1
 
#ap_scan=2
 
#fast_reauth=1
 
#network={
 
#        ssid="ZeroDay"
 
#        proto=WPA
 
#        key_mgmt=WPA-PSK
 
#        pairwise=TKIP
 
#        group=TKIP
 
#        psk="secret_password"
 
#}</pre><pre>#------------------------------------------------------------</pre><pre># WPA_2
 
 
ctrl_interface=/var/run/wpa_supplicant
 
ctrl_interface=/var/run/wpa_supplicant
 +
 +
# By default, only root (group 0) may use wpa_cli
 +
 
ctrl_interface_group=0
 
ctrl_interface_group=0
 +
eapol_version=1
 
ap_scan=1
 
ap_scan=1
network={
+
fast_reauth=1
         ssid="ZeroDay"
+
 
 +
# =================================================================
 +
 
 +
# WPA protected network, supply your own ESSID and WPAPSK here:
 +
 
 +
# network={
 +
# scan_ssid=0
 +
# ssid="your_essid_here"
 +
# proto=WPA
 +
# key_mgmt=WPA-PSK
 +
# pairwise=CCMP TKIP
 +
# group=CCMP TKIP WEP104 WEP40
 +
# psk=your_psk_here
 +
# }
 +
#### Or This Code ####
 +
# network={
 +
# ssid="your_essid"
 +
# proto=WPA
 +
# key_mgmt=WPA-PSK
 +
# pairwise=TKIP
 +
# group=TKIP
 +
# psk="secret_password"
 +
# }
 +
 
 +
# ==================================================================
 +
 
 +
# WPA_2
 +
# ctrl_interface=/var/run/wpa_supplicant
 +
# ctrl_interface_group=0
 +
# ap_scan=1
 +
 
 +
        network={
 +
         ssid="your_essid"
 
         proto=RSN
 
         proto=RSN
 
         key_mgmt=WPA-PSK
 
         key_mgmt=WPA-PSK
 
         pairwise=CCMP TKIP
 
         pairwise=CCMP TKIP
 
         group=CCMP TKIP
 
         group=CCMP TKIP
         psk="astalavista"
+
         psk="secret_password"
}</pre><pre>#------------------------------------------------------------</pre><pre># WPA2-EAP/CCMP using EAP-TLS</pre><pre>#ctrl_interface=/var/run/wpa_supplicant</pre><pre>#network={
+
}
# ssid="example wpa2-eap network"
+
 
# key_mgmt=WPA-EAP
+
# ===================================================================
# proto=WPA2
+
 
# pairwise=CCMP
+
# Plaintext connection (no WPA, no IEEE 802.1X),
# group=CCMP
+
# nice for hotel/airport types of WiFi network
# eap=TLS
+
# You'll need a recent version of wireless-tools for this!
# ca_cert="/etc/cert/ca.pem"
+
 
# private_key="/etc/cert/user.p12"
+
# network={
# private_key_passwd="PKCS#12 passhrase"
+
# ssid="any"
#}</pre><pre>#-------------------------------------------------------------</pre><pre>#For IPW2200
+
# key_mgmt=NONE
# wpa_supplicant -d -c/etc/wpa_supplicant.conf -ieth1 -Dwext
+
# priority=2
#For Madwifi
+
# }
# wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi</pre><pre># Catch all example that allows more or less all configuration modes
+
 
#network={
+
#====================================================================
# ssid="ZeroDay"
+
 
# scan_ssid=1
 
# key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
 
# pairwise=CCMP TKIP
 
# group=CCMP TKIP WEP104 WEP40
 
# psk="astalavista"
 
# eap=TTLS PEAP TLS
 
# identity="[email protected]"
 
# password="Deaw"
 
# ca_cert="/etc/cert/ca.pem"
 
# client_cert="/etc/cert/user.pem"
 
# private_key="/etc/cert/user.prv"
 
# private_key_passwd="password"
 
# phase1="peaplabel=0"
 
#}
 
 
</pre>
 
</pre>

Latest revision as of 14:39, 9 July 2008

/etc/wpa_supplicant.conf

You can use this config for wpa wpa2 CCMP TKIP encryption.

# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)

ctrl_interface=/var/run/wpa_supplicant

# By default, only root (group 0) may use wpa_cli

ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

# ================================================================= 

# WPA protected network, supply your own ESSID and WPAPSK here:

# network={
# scan_ssid=0
# ssid="your_essid_here"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=CCMP TKIP
# group=CCMP TKIP WEP104 WEP40
# psk=your_psk_here
# }
#### Or This Code ####
# network={
# ssid="your_essid"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=TKIP
# group=TKIP
# psk="secret_password"
# }

# ==================================================================

# WPA_2
# ctrl_interface=/var/run/wpa_supplicant
# ctrl_interface_group=0
# ap_scan=1

        network={
        ssid="your_essid"
        proto=RSN
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP
        psk="secret_password"
}

# ===================================================================

# Plaintext connection (no WPA, no IEEE 802.1X),
# nice for hotel/airport types of WiFi network
# You'll need a recent version of wireless-tools for this!

# network={
# ssid="any"
# key_mgmt=NONE
# priority=2
# }

#====================================================================