Closed edoput closed 7 years ago
Always for a station
configuration with WPA2-psk
wpasupplicant.status=enabled
wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi # new
wpasupplicant.device.1.devname=ath0 # new
wpasupplicant.profile.1.name=AUTO
# network 1
wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2
wpasupplicant.profile.1.network.1.eap.1.status=disabled
wpasupplicant.profile.1.network.1.psk=#the psk in clear text
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid=ubnt
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-PSK
# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
station
configuration for WPA-eap
wpasupplicant.status=enabled
wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi
wpasupplicant.device.1.devname=ath0
wpasupplicant.profile.1.name=AUTO
# network 1
wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2
wpasupplicant.profile.1.network.1.eap.1.name=TTLS
wpasupplicant.profile.1.network.1.eap.1.status=enabled
wpasupplicant.profile.1.network.1.password# the password in clear text
wpasupplicant.profile.1.network.1.identity# eap identity
wpasupplicant.profile.1.network.1.anonymous_identity# eap anonymous identity
wpasupplicant.profile.1.network.1.psk # the network password in clear text
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid # from netjson
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-EAP
# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
There is no difference between changing wireless mode from station
to station ptmp
wpasupplicant.status=enabled
# device
wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi
wpasupplicant.device.1.devname=ath0
wpasupplicant.profile.1.name=AUTO
# network 1
wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2
wpasupplicant.profile.1.network.1.eap.1.status=disabled
wpasupplicant.profile.1.network.1.psk
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid=ubnt
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-PSK
# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
Now the only remaining bits are configuring EAP
for wpa2_enterprise
Keys to evaluate with defaults
The only supported encryption are
WPA2-AES
orNone
WPA2-AES
the authentication can be either
PSK
orEAP
and maps topersonal
andenterprise
in our schema definitionsI don't really have an idea of what this is and what doest it configure.
I found most of these keys on a
station
configuration