Changeset d8a7d94 in freewrt


Ignore:
Timestamp:
May 19, 2007, 12:36:16 PM (19 years ago)
Author:
Waldemar Brodkorb <wbx@…>
Branches:
freewrt_1_0, freewrt_2_0
Children:
cf79cd5
Parents:
a9b0a36
Message:

cleanup WLAN examples

git-svn-id: svn://www.freewrt.org/branches/freewrt_1_0@2547 afb5a338-a214-0410-bd46-81f09a774fd1

Files:
3 edited

Legend:

Unmodified
Added
Removed
  • docs/handbook/user/cover.tex

    ra9b0a36 rd8a7d94  
    1818\\
    1919\rightline{%
    20 Revision 1.0.1, \svnInfoRevision}
     20Revision 1.0.3, \svnInfoRevision}
    2121\\
    2222\rightline{%
  • docs/handbook/user/handbook.tex

    ra9b0a36 rd8a7d94  
    611611\section{Network Configuration}
    612612
     613<<<<<<< .mine
     614The device names for real network interfaces in Linux are named \code{ethx} (\code{x} is
     615\code{0--9}). If the device has a switch, the different ports are separated via VLAN
     616technology. The vlan interfaces are named \code{ethx.y}.  The network configuration in
     617FreeWRT is managed via \app{Busybox}'s \app{ifupdown} implementation. \app{Busybox}'s builtin \app{ip}
     618command configures the network interfaces. There is no \app{ifconfig} or \app{route}, you can activate
     619it in the ADK menue, if you like.
     620
     621=======
    613622The device names for real network interfaces in Linux are named \code{ethx}
    614623(\code{x} is \code{0--9}). If the device has a switch, the different ports are
     
    617626\app{ifupdown} implementation. \app{Busybox}'s builtin \app{ip} command
    618627configures the network interfaces. There is no \app{ifconfig} or \app{route}.
     628>>>>>>> .r2546
    619629To show all configured network interfaces use:
    620630\begin{Verbatim}[label=show IP address]
     
    636646\end{Verbatim}
    637647
     648<<<<<<< .mine
     649<b>ATTENTION: Be sure you have no whitespaces at the and of any value!</b>
     650
     651\code{auto <iface-name>} is optional and, if set, tells the \app{ifup} script to
     652start this interface automatically on bootup.
     653=======
    638654\code{auto <iface-name>} is optional and, if set, tells the \app{ifup} script
    639655to start this interface automatically on bootup.
     656>>>>>>> .r2546
    640657
    641658Each interface needs a unique name which, depending on the method, represents
     
    758775Typically this configures the WAN-Port to start a DHCP request on bootup.
    759776
    760 \subsection{Bridging}
    761 
    762 This is mostly needed to combine LAN and WLAN to a homogeneous network.  Be
    763 sure you have installed the package \app{bridge-utils}.
    764 
    765 \begin{Verbatim}[label=\file{/etc/network/interfaces}]
    766 auto eth0.0
    767 iface eth0.0 inet manual
    768     switch-ports 1 2 3 4 5*
    769 
    770 auto eth1
    771 iface eth1 inet manual
    772     wireless-bridge-if br0
    773     [... other wifi-settings, see below ...]
    774 
    775 auto br0
    776 iface br0 inet static
    777     bridge-ifaces eth0.0 eth1
    778     address 192.168.1.1
    779     netmask 255.255.255.0
    780     broadcast +
    781 \end{Verbatim}
    782 
    783 This creates a new bridging interface \code{br0} which combines the VLAN
    784 interface \code{eth0.0} (representing the LAN-ports 1--4) and the WLAN
    785 interface \code{eth1} (on some devices like \term{Asus WL500gP} this might be
    786 \code{eth2}).  The bridge interface needs always be the last one, otherwise it
    787 can not find the interfaces in \code{bridge-ifaces}.
    788 
    789777\subsection{WLAN}
    790778A router containing a WLAN interface has an additional ethernet device
     
    982970\end{longtable}
    983971
    984 \subsubsection{Examples}
    985 \paragraph{WLAN with WEP128}
     972\subsubsection{Examples for wireless configuration}
     973
     974\paragraph{WLAN with WPA1/WPA2 AES+TKIP}
     975
     976This combination works with any kind of WPA client implementation.
     977
    986978\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     979auto eth1
    987980iface eth1 inet static
    988981        address 192.168.10.1
     
    993986        wireless-mode ap
    994987        wireless-ssid FreeWRT
    995         wireless-security wep
    996         wireless-key1 11223344556677889900112233
     988        wireless-security wpa-psk
     989        wireless-authorization psk psk2
     990        wireless-encryption aes+tkip
     991        wireless-wpa-key 12345678
    997992        wireless-channel 11
    998993\end{Verbatim}
    999994
     995If you want to do MAC filtering, add the following to the sample above:
     996\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     997        wireless-macmode 2
     998        wireless-mac 00:01:02:03:04:05 06:07:08:09:0a:0b
     999\end{Verbatim}
     1000this enables the filter and defines the list to contain addresses that should be allowed.
     1001
    10001002\paragraph{WLAN without encryption}
     1003
     1004If you already use VPN to secure your connection, you can just use an unencrypted setup
     1005and setup the firewall on your embedded device.
     1006
    10011007\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1008auto eth1
    10021009iface eth1 inet static
    10031010        address 192.168.10.1
     
    10121019\end{Verbatim}
    10131020
    1014 \paragraph{WLAN with WPA2 (AES)}
     1021\paragraph{WLAN client with WPA2 (AES)}
     1022
     1023This can only be used in routing mode, you can not bridge it with LAN or WAN interfaces.
     1024
    10151025\begin{Verbatim}[label=\file{/etc/network/interfaces}]
    1016 iface eth1 inet static
    1017         address 192.168.10.1
    1018         netmask 255.255.255.0
    1019         broadcast +
    1020         wireless-type broadcom
    1021         wireless-country DE
    1022         wireless-mode ap
    1023         wireless-ssid FreeWRT
    1024         wireless-security wpa-psk
    1025         wireless-authorization psk2
    1026         wireless-encryption aes
    1027         wireless-wpa-key 12345678
    1028         wireless-channel 11
    1029 \end{Verbatim}
    1030 
    1031 If you want to do MAC filtering, add the following to the sample above:
    1032 \begin{Verbatim}[label=\file{/etc/network/interfaces}]
    1033         wireless-macmode 2
    1034         wireless-mac 00:01:02:03:04:05 06:07:08:09:0a:0b
    1035 \end{Verbatim}
    1036 this enables the filter and defines the list to contain addresses that should
    1037 be allowed.
    1038 
    1039 To enhance wireless performance, you can enable some flags like Broadcom's
    1040 SpeedBooster. Normally, these flags are not dangerous:
    1041 \begin{Verbatim}[label=\file{/etc/network/interfaces}]
    1042         wireless-gmode performance
    1043         wireless-frameburst 1
    1044         wireless-afterburner 1
    1045 \end{Verbatim}
    1046 
    1047 \paragraph{WLAN client with WPA2 (AES) (\strong{untested})}
    1048 \begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1026auto eth1
    10491027iface eth1 inet static
    10501028        address 192.168.10.1
     
    10611039\end{Verbatim}
    10621040
    1063 \paragraph{WLAN client with WEP128}
    1064 \begin{Verbatim}[label=\file{/etc/network/interfaces}]
    1065 iface eth1 inet dhcp
    1066         wireless-type broadcom
    1067         wireless-country DE
    1068         wireless-mode sta
    1069         wireless-ssid FreeWRT
    1070         wireless-security wep
    1071         wireless-key1 11223344556677889900112233
    1072 \end{Verbatim}
    1073 
    10741041WLAN with WDS nodes, the WDS nodes need to have the same
    1075 SSID, channel and encryption parameters.
     1042SSID, channel and encryption parameters. The WDS connection is separetely
     1043secured via WPA1 and AES. WPA2 for WDS connection security is \_not\_ working.
    10761044
    10771045WDS node 1 (MAC of Wireless \code{06:05:04:03:02:01})
    10781046\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1047auto br0
    10791048iface br0 inet static
    10801049        bridge-ifaces eth1
     
    10861055        wireless-mode wds
    10871056        wireless-ssid FreeWRT-WDS
    1088         wireless-security none
    1089         wireless-lazywds 0
     1057        wireless-security wpa-psk
     1058        wireless-authorization psk psk2
     1059        wireless-encryption aes+tkip
     1060        wireless-wpa-key apkey
     1061        wireless-lazywds 1
     1062        wireless-wds-security wpa-psk
     1063        wireless-wds-encryption aes
     1064        wireless-wds-wpa-key wdskey
    10901065        wireless-wds 01:02:03:04:05:06
    10911066        wireless-wds-bridge br0
     
    10931068WDS node 2 (MAC of Wireless \code{01:02:03:04:05:06})
    10941069\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1070auto br0
    10951071iface br0 inet static
    10961072        bridge-ifaces eth1
     
    11021078        wireless-mode wds
    11031079        wireless-ssid FreeWRT-WDS
    1104         wireless-security none
    1105         wireless-lazywds 0
     1080        wireless-security wpa-psk
     1081        wireless-authorization psk psk2
     1082        wireless-encryption aes+tkip
     1083        wireless-wpa-key apkey
     1084        wireless-lazywds 1
     1085        wireless-wds-security wpa-psk
     1086        wireless-wds-encryption aes
     1087        wireless-wds-wpa-key wdskey
    11061088        wireless-wds 06:05:04:03:02:01
    11071089        wireless-wds-bridge br0
    11081090\end{Verbatim}
    11091091
    1110 \paragraph{Peer-to-Peer mode (no encryption, IP must be static)}
     1092\paragraph{Peer-to-Peer/AdHoc mode (no encryption, IP must be static)}
    11111093\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1094auto eth1
    11121095iface eth1 inet static
    11131096        address 192.168.10.1
     
    11211104        wireless-channel 11
    11221105\end{Verbatim}
     1106
     1107\subsection{Bridging}
     1108
     1109This is mostly needed to combine LAN and WLAN to a homogeneous network.
     1110Be sure you have installed the package \app{bridge-utils}.
     1111See the example for a bridging setup, WLAN is secured via WPA/WPA2.
     1112
     1113\begin{Verbatim}[label=\file{/etc/network/interfaces}]
     1114auto eth0.0
     1115iface eth0.0 inet manual
     1116        switch-ports 1 2 3 4 5*
     1117
     1118auto eth1
     1119iface eth1 inet manual
     1120        wireless-type broadcom                                     
     1121        wireless-country DE                                               
     1122        wireless-mode ap                                                 
     1123        wireless-ssid FreeWRT                                             
     1124        wireless-channel 11                                               
     1125        wireless-security wpa-psk                                         
     1126        wireless-authorization psk psk2                                   
     1127        wireless-encryption aes+tkip                                     
     1128        wireless-wpa-key MyWlanSecret               
     1129        wireless-bridge-if br0
     1130
     1131auto br0
     1132iface br0 inet static
     1133        bridge-ifaces eth0.0 eth1
     1134        address 192.168.1.1
     1135        netmask 255.255.255.0
     1136        broadcast +
     1137\end{Verbatim}
     1138
     1139This creates a new bridging interface \code{br0} which combines the VLAN
     1140interface \code{eth0.0} (representing the LAN-ports 1--4) and the WLAN interface
     1141\code{eth1} (on some devices like \term{Asus WL500gP} this might be \code{eth2}).
     1142The bridge interface needs always be the last one, otherwise it can not find
     1143the interfaces in \code{bridge-ifaces}.
    11231144
    11241145\subsection{PPP}
  • target/linux/brcm-2.4/files/etc/network/interfaces

    ra9b0a36 rd8a7d94  
    7474# button-press
    7575
    76 # WLAN with WPA2/WPA1 AES+TKIP
     76
     77##
     78## WLAN with WPA2/WPA1 AES+TKIP (routing mode)
     79##
    7780#auto @FWRT_WLAN@
    7881#iface @FWRT_WLAN@ inet static
     
    9093#       wireless-wpa-key MyWlanSecret
    9194
    92 # Bridging WLAN<->LAN
     95##
     96## Bridging WLAN<->LAN
     97##
    9398#auto @FWRT_LAN@
    9499#iface @FWRT_LAN@ inet manual
    95100#       switch-ports @FWRT_LAN_SWITCH@
     101#
     102#auto @FWRT_WLAN@
     103#iface @FWRT_WLAN@ inet manual
     104#       wireless-type broadcom
     105#       wireless-country DE
     106#       wireless-mode ap
     107#       wireless-ssid FreeWRT
     108#       wireless-channel 11
     109#       wireless-security wpa-psk
     110#       wireless-authorization psk psk2
     111#       wireless-encryption aes+tkip
     112#       wireless-wpa-key MyWlanSecret
    96113#
    97114# should be always the last configured interface, it depends
     
    117134#       wireless-ssid FreeWRT-WDS
    118135#       wireless-channel 11
    119 #       wireless-security none
    120 #       wireless-lazywds 0
     136#       wireless-security apa-psk
     137#       wireless-authorization psk psk2
     138#       wireless-encryption aes+tkip
     139#       wireless-wpa-key MyWlanSecret
     140#       wireless-lazywds 1
    121141#       wireless-wds-bridge br0
    122142#       wireless-wds 00:01:02:03:04:05
     143#       wireless-wds-security wpa-psk
     144#       wireless-wds-encryption aes
     145#       wireless-wds-wpa-key key4wds
    123146
Note: See TracChangeset for help on using the changeset viewer.