Document the steps required to setup hostapd/dnsmasq on the BRSKI server/controller node.
These are:
nqm-britannic-brski (secured with WPA2-Personal)
The PSK will be found by following the BRSKI algorithm.
The server node IP address is 192.168.16.1.
nqm-britannic-brski-open (unsecured)
Will be used for BRSKI algorithm.
The server node IP address is 192.168.17.1.
Notes to reviewers
Setting up hostapd/dnsmasq/static IPs, etc. were so complicated that it might have actually been faster for me to use edgesec to create these access points :laughing:
Btw @mereacre, I haven't done any bridging on these access points, so when the devices connect to the WiFi AP, they can only access the BRSKI server/controller node, and nothing else. I think this is better from a security perspective, and it's also one less thing to worry about implementing.
Document the steps required to setup hostapd/dnsmasq on the BRSKI server/controller node.
These are:
nqm-britannic-brski
(secured with WPA2-Personal) The PSK will be found by following the BRSKI algorithm.The server node IP address is
192.168.16.1
.nqm-britannic-brski-open
(unsecured) Will be used for BRSKI algorithm.The server node IP address is
192.168.17.1
.Notes to reviewers
Setting up hostapd/dnsmasq/static IPs, etc. were so complicated that it might have actually been faster for me to use edgesec to create these access points :laughing:
Btw @mereacre, I haven't done any bridging on these access points, so when the devices connect to the WiFi AP, they can only access the BRSKI server/controller node, and nothing else. I think this is better from a security perspective, and it's also one less thing to worry about implementing.