Difference between revisions of "Wpa supplicant.conf"
From MS Computech
| Line 27: | Line 27: | ||
# psk=your_psk_here | # psk=your_psk_here | ||
# } | # } | ||
| − | + | #### Or This Code #### | |
| − | network={ | + | # network={ |
| − | ssid="ZeroDay" | + | # ssid="ZeroDay" |
| − | proto=WPA | + | # proto=WPA |
| − | key_mgmt=WPA-PSK | + | # key_mgmt=WPA-PSK |
| − | pairwise=TKIP | + | # pairwise=TKIP |
| − | group=TKIP | + | # group=TKIP |
| − | psk="secret_password" | + | # psk="secret_password" |
| − | } | + | # } |
# ================================================================== | # ================================================================== | ||
Revision as of 11:05, 9 July 2008
/etc/wpa_supplicant.conf
You can use this config for wpa wpa2 CCMP TKIP encryption.
# This line enables the use of wpa_cli which is used by rc.wireless
# if possible (to check for successful association)
ctrl_interface=/var/run/wpa_supplicant
# By default, only root (group 0) may use wpa_cli
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1
# =================================================================
# WPA protected network, supply your own ESSID and WPAPSK here:
# network={
# scan_ssid=0
# ssid="your_essid_here"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=CCMP TKIP
# group=CCMP TKIP WEP104 WEP40
# psk=your_psk_here
# }
#### Or This Code ####
# network={
# ssid="ZeroDay"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=TKIP
# group=TKIP
# psk="secret_password"
# }
# ==================================================================
# WPA_2
# ctrl_interface=/var/run/wpa_supplicant
# ctrl_interface_group=0
# ap_scan=1
network={
ssid="ZeroDay"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
psk="astalavista"
}
# ===================================================================
# Plaintext connection (no WPA, no IEEE 802.1X),
# nice for hotel/airport types of WiFi network
# You'll need a recent version of wireless-tools for this!
# network={
# ssid="any"
# key_mgmt=NONE
# priority=2
# }
#====================================================================