Difference between revisions of "Wpa supplicant.conf"

From MS Computech
Jump to: navigation, search
Line 1: Line 1:
<pre># Plaintext (no encryption) network
+
# This line enables the use of wpa_cli which is used by rc.wireless
#ctrl_interface=/var/run/wpa_supplicant
+
# if possible (to check for successful association)
#network={
 
# ssid="ZeroDay"
 
# key_mgmt=NONE
 
#}</pre><pre>#---------------------------------------------------------</pre><pre># Static WEP keys
 
#ctrl_interface=/var/run/wpa_supplicant
 
#network={
 
# ssid="example wep network"
 
# key_mgmt=NONE
 
# wep_key0="abcde"
 
# wep_key1=0102030405
 
# wep_tx_keyidx=0
 
#}</pre><pre>#-----------------------------------------------------------</pre><pre># IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
 
#ctrl_interface=/var/run/wpa_supplicant
 
#network={
 
# ssid="example 802.1x network"
 
# key_mgmt=IEEE8021X
 
# eap=PEAP
 
# phase2="auth=MSCHAPV2"
 
# identity="user name"
 
# password="password"
 
# ca_cert="/etc/cert/ca.pem"
 
#}</pre><pre>#-----------------------------------------------------------</pre><pre># WPA
 
#ctrl_interface=/var/run/wpa_supplicant
 
#ctrl_interface_group=0
 
#eapol_version=1
 
#ap_scan=2
 
#fast_reauth=1
 
#network={
 
#        ssid="ZeroDay"
 
#        proto=WPA
 
#        key_mgmt=WPA-PSK
 
#        pairwise=TKIP
 
#        group=TKIP
 
#        psk="secret_password"
 
#}</pre><pre>#------------------------------------------------------------</pre><pre># WPA_2
 
 
ctrl_interface=/var/run/wpa_supplicant
 
ctrl_interface=/var/run/wpa_supplicant
 +
# By default, only root (group 0) may use wpa_cli
 
ctrl_interface_group=0
 
ctrl_interface_group=0
 +
eapol_version=1
 
ap_scan=1
 
ap_scan=1
 +
fast_reauth=1
 +
 +
# WPA protected network, supply your own ESSID and WPAPSK here:
 
network={
 
network={
        ssid="ZeroDay"
+
  scan_ssid=0
        proto=RSN
+
  ssid="your_essid_here"
        key_mgmt=WPA-PSK
+
  proto=WPA
        pairwise=CCMP TKIP
+
  key_mgmt=WPA-PSK
        group=CCMP TKIP
+
  pairwise=CCMP TKIP
        psk="astalavista"
+
  group=CCMP TKIP WEP104 WEP40
}</pre><pre>#------------------------------------------------------------</pre><pre># WPA2-EAP/CCMP using EAP-TLS</pre><pre>#ctrl_interface=/var/run/wpa_supplicant</pre><pre>#network={
+
  psk=your_psk_here
# ssid="example wpa2-eap network"
+
}
# key_mgmt=WPA-EAP
+
 
# proto=WPA2
+
# Plaintext connection (no WPA, no IEEE 802.1X),
# pairwise=CCMP
+
# nice for hotel/airport types of WiFi network.
# group=CCMP
+
# You'll need a recent version of wireless-tools for this!
# eap=TLS
+
network={
# ca_cert="/etc/cert/ca.pem"
+
  ssid="any"
# private_key="/etc/cert/user.p12"
+
  key_mgmt=NONE
# private_key_passwd="PKCS#12 passhrase"
+
  priority=2
#}</pre><pre>#-------------------------------------------------------------</pre><pre>#For IPW2200
+
}
# wpa_supplicant -d -c/etc/wpa_supplicant.conf -ieth1 -Dwext
 
#For Madwifi
 
# wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0 -Dmadwifi</pre><pre># Catch all example that allows more or less all configuration modes
 
#network={
 
# ssid="ZeroDay"
 
# scan_ssid=1
 
# key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
 
# pairwise=CCMP TKIP
 
# group=CCMP TKIP WEP104 WEP40
 
# psk="astalavista"
 
# eap=TTLS PEAP TLS
 
# identity="[email protected]"
 
# password="Deaw"
 
# ca_cert="/etc/cert/ca.pem"
 
# client_cert="/etc/cert/user.pem"
 
# private_key="/etc/cert/user.prv"
 
# private_key_passwd="password"
 
# phase1="peaplabel=0"
 
#}
 
</pre>
 

Revision as of 10:42, 9 July 2008

  1. This line enables the use of wpa_cli which is used by rc.wireless
  2. if possible (to check for successful association)

ctrl_interface=/var/run/wpa_supplicant

  1. By default, only root (group 0) may use wpa_cli

ctrl_interface_group=0 eapol_version=1 ap_scan=1 fast_reauth=1

  1. WPA protected network, supply your own ESSID and WPAPSK here:

network={

 scan_ssid=0
 ssid="your_essid_here"
 proto=WPA
 key_mgmt=WPA-PSK
 pairwise=CCMP TKIP
 group=CCMP TKIP WEP104 WEP40
 psk=your_psk_here

}

  1. Plaintext connection (no WPA, no IEEE 802.1X),
  2. nice for hotel/airport types of WiFi network.
  3. You'll need a recent version of wireless-tools for this!

network={

 ssid="any"
 key_mgmt=NONE
 priority=2

}