Difference between revisions of "Wpa supplicant.conf"
From MS Computech
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | <span style="font-family: monospace | + | <span style="font-family: monospace">/etc/wpa_supplicant.conf </span> |
− | <span style="font-family: monospace | + | <span style="font-family: monospace">You can use this config for wpa wpa2 CCMP TKIP encryption.</span><br> |
<pre># This line enables the use of wpa_cli which is used by rc.wireless | <pre># This line enables the use of wpa_cli which is used by rc.wireless | ||
# if possible (to check for successful association) | # if possible (to check for successful association) | ||
Line 27: | Line 27: | ||
# psk=your_psk_here | # psk=your_psk_here | ||
# } | # } | ||
− | + | #### Or This Code #### | |
− | network={ | + | # network={ |
− | ssid=" | + | # ssid="your_essid" |
− | proto=WPA | + | # proto=WPA |
− | key_mgmt=WPA-PSK | + | # key_mgmt=WPA-PSK |
− | pairwise=TKIP | + | # pairwise=TKIP |
− | group=TKIP | + | # group=TKIP |
− | psk="secret_password" | + | # psk="secret_password" |
− | } | + | # } |
# ================================================================== | # ================================================================== | ||
Line 44: | Line 44: | ||
# ap_scan=1 | # ap_scan=1 | ||
− | network={ | + | network={ |
− | ssid=" | + | ssid="your_essid" |
proto=RSN | proto=RSN | ||
key_mgmt=WPA-PSK | key_mgmt=WPA-PSK | ||
pairwise=CCMP TKIP | pairwise=CCMP TKIP | ||
group=CCMP TKIP | group=CCMP TKIP | ||
− | psk=" | + | psk="secret_password" |
} | } | ||
Latest revision as of 14:39, 9 July 2008
/etc/wpa_supplicant.conf
You can use this config for wpa wpa2 CCMP TKIP encryption.
# This line enables the use of wpa_cli which is used by rc.wireless # if possible (to check for successful association) ctrl_interface=/var/run/wpa_supplicant # By default, only root (group 0) may use wpa_cli ctrl_interface_group=0 eapol_version=1 ap_scan=1 fast_reauth=1 # ================================================================= # WPA protected network, supply your own ESSID and WPAPSK here: # network={ # scan_ssid=0 # ssid="your_essid_here" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # psk=your_psk_here # } #### Or This Code #### # network={ # ssid="your_essid" # proto=WPA # key_mgmt=WPA-PSK # pairwise=TKIP # group=TKIP # psk="secret_password" # } # ================================================================== # WPA_2 # ctrl_interface=/var/run/wpa_supplicant # ctrl_interface_group=0 # ap_scan=1 network={ ssid="your_essid" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP psk="secret_password" } # =================================================================== # Plaintext connection (no WPA, no IEEE 802.1X), # nice for hotel/airport types of WiFi network # You'll need a recent version of wireless-tools for this! # network={ # ssid="any" # key_mgmt=NONE # priority=2 # } #====================================================================