Difference between revisions of "Wpa supplicant.conf"
From MS Computech
m |
|||
| Line 1: | Line 1: | ||
| − | <span style="font-family: monospace;">/etc/wpa_supplicant.conf </span> | + | <span style="font-family: monospace;">/etc/wpa_supplicant.conf </span> |
<span style="font-family: monospace;">You can use this config for wpa wpa2 CCMP TKIP encryption.</span><br> | <span style="font-family: monospace;">You can use this config for wpa wpa2 CCMP TKIP encryption.</span><br> | ||
| Line 18: | Line 18: | ||
#WPA protected network, supply your own ESSID and WPAPSK here: | #WPA protected network, supply your own ESSID and WPAPSK here: | ||
| − | #network={ | + | # network={ |
| − | #scan_ssid=0 | + | # scan_ssid=0 |
| − | #ssid="your_essid_here" | + | # ssid="your_essid_here" |
| − | #proto=WPA | + | # proto=WPA |
| − | #key_mgmt=WPA-PSK | + | # key_mgmt=WPA-PSK |
| − | #pairwise=CCMP TKIP | + | # pairwise=CCMP TKIP |
| − | #group=CCMP TKIP WEP104 WEP40 | + | # group=CCMP TKIP WEP104 WEP40 |
| − | #psk=your_psk_here | + | # psk=your_psk_here |
| − | #} | + | # } |
#================================================================== | #================================================================== | ||
| Line 47: | Line 47: | ||
# Plaintext connection (no WPA, no IEEE 802.1X), | # Plaintext connection (no WPA, no IEEE 802.1X), | ||
# nice for hotel/airport types of WiFi network | # nice for hotel/airport types of WiFi network | ||
| − | # You'll need a recent version of wireless-tools for this! | + | # You'll need a recent version of wireless-tools for this! |
| + | # network={ | ||
# ssid="any" | # ssid="any" | ||
# key_mgmt=NONE | # key_mgmt=NONE | ||
Revision as of 10:59, 9 July 2008
/etc/wpa_supplicant.conf
You can use this config for wpa wpa2 CCMP TKIP encryption.
# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)
ctrl_interface=/var/run/wpa_supplicant
# By default, only root (group 0) may use wpa_cli
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
#=================================================================
#WPA protected network, supply your own ESSID and WPAPSK here:
# network={
# scan_ssid=0
# ssid="your_essid_here"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=CCMP TKIP
# group=CCMP TKIP WEP104 WEP40
# psk=your_psk_here
# }
#==================================================================
# WPA_2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
ap_scan=1
network={
ssid="ZeroDay"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
psk="astalavista"
}
#===================================================================
# Plaintext connection (no WPA, no IEEE 802.1X),
# nice for hotel/airport types of WiFi network
# You'll need a recent version of wireless-tools for this!
# network={
# ssid="any"
# key_mgmt=NONE
# priority=2
# }
#====================================================================