Changeset d8a7d94 in freewrt
- Timestamp:
- May 19, 2007, 12:36:16 PM (19 years ago)
- Branches:
- freewrt_1_0, freewrt_2_0
- Children:
- cf79cd5
- Parents:
- a9b0a36
- Files:
-
- 3 edited
-
docs/handbook/user/cover.tex (modified) (1 diff)
-
docs/handbook/user/handbook.tex (modified) (12 diffs)
-
target/linux/brcm-2.4/files/etc/network/interfaces (modified) (3 diffs)
Legend:
- Unmodified
- Added
- Removed
-
docs/handbook/user/cover.tex
ra9b0a36 rd8a7d94 18 18 \\ 19 19 \rightline{% 20 Revision 1.0. 1, \svnInfoRevision}20 Revision 1.0.3, \svnInfoRevision} 21 21 \\ 22 22 \rightline{% -
docs/handbook/user/handbook.tex
ra9b0a36 rd8a7d94 611 611 \section{Network Configuration} 612 612 613 <<<<<<< .mine 614 The device names for real network interfaces in Linux are named \code{ethx} (\code{x} is 615 \code{0--9}). If the device has a switch, the different ports are separated via VLAN 616 technology. The vlan interfaces are named \code{ethx.y}. The network configuration in 617 FreeWRT is managed via \app{Busybox}'s \app{ifupdown} implementation. \app{Busybox}'s builtin \app{ip} 618 command configures the network interfaces. There is no \app{ifconfig} or \app{route}, you can activate 619 it in the ADK menue, if you like. 620 621 ======= 613 622 The device names for real network interfaces in Linux are named \code{ethx} 614 623 (\code{x} is \code{0--9}). If the device has a switch, the different ports are … … 617 626 \app{ifupdown} implementation. \app{Busybox}'s builtin \app{ip} command 618 627 configures the network interfaces. There is no \app{ifconfig} or \app{route}. 628 >>>>>>> .r2546 619 629 To show all configured network interfaces use: 620 630 \begin{Verbatim}[label=show IP address] … … 636 646 \end{Verbatim} 637 647 648 <<<<<<< .mine 649 <b>ATTENTION: Be sure you have no whitespaces at the and of any value!</b> 650 651 \code{auto <iface-name>} is optional and, if set, tells the \app{ifup} script to 652 start this interface automatically on bootup. 653 ======= 638 654 \code{auto <iface-name>} is optional and, if set, tells the \app{ifup} script 639 655 to start this interface automatically on bootup. 656 >>>>>>> .r2546 640 657 641 658 Each interface needs a unique name which, depending on the method, represents … … 758 775 Typically this configures the WAN-Port to start a DHCP request on bootup. 759 776 760 \subsection{Bridging}761 762 This is mostly needed to combine LAN and WLAN to a homogeneous network. Be763 sure you have installed the package \app{bridge-utils}.764 765 \begin{Verbatim}[label=\file{/etc/network/interfaces}]766 auto eth0.0767 iface eth0.0 inet manual768 switch-ports 1 2 3 4 5*769 770 auto eth1771 iface eth1 inet manual772 wireless-bridge-if br0773 [... other wifi-settings, see below ...]774 775 auto br0776 iface br0 inet static777 bridge-ifaces eth0.0 eth1778 address 192.168.1.1779 netmask 255.255.255.0780 broadcast +781 \end{Verbatim}782 783 This creates a new bridging interface \code{br0} which combines the VLAN784 interface \code{eth0.0} (representing the LAN-ports 1--4) and the WLAN785 interface \code{eth1} (on some devices like \term{Asus WL500gP} this might be786 \code{eth2}). The bridge interface needs always be the last one, otherwise it787 can not find the interfaces in \code{bridge-ifaces}.788 789 777 \subsection{WLAN} 790 778 A router containing a WLAN interface has an additional ethernet device … … 982 970 \end{longtable} 983 971 984 \subsubsection{Examples} 985 \paragraph{WLAN with WEP128} 972 \subsubsection{Examples for wireless configuration} 973 974 \paragraph{WLAN with WPA1/WPA2 AES+TKIP} 975 976 This combination works with any kind of WPA client implementation. 977 986 978 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 979 auto eth1 987 980 iface eth1 inet static 988 981 address 192.168.10.1 … … 993 986 wireless-mode ap 994 987 wireless-ssid FreeWRT 995 wireless-security wep 996 wireless-key1 11223344556677889900112233 988 wireless-security wpa-psk 989 wireless-authorization psk psk2 990 wireless-encryption aes+tkip 991 wireless-wpa-key 12345678 997 992 wireless-channel 11 998 993 \end{Verbatim} 999 994 995 If you want to do MAC filtering, add the following to the sample above: 996 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 997 wireless-macmode 2 998 wireless-mac 00:01:02:03:04:05 06:07:08:09:0a:0b 999 \end{Verbatim} 1000 this enables the filter and defines the list to contain addresses that should be allowed. 1001 1000 1002 \paragraph{WLAN without encryption} 1003 1004 If you already use VPN to secure your connection, you can just use an unencrypted setup 1005 and setup the firewall on your embedded device. 1006 1001 1007 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1008 auto eth1 1002 1009 iface eth1 inet static 1003 1010 address 192.168.10.1 … … 1012 1019 \end{Verbatim} 1013 1020 1014 \paragraph{WLAN with WPA2 (AES)} 1021 \paragraph{WLAN client with WPA2 (AES)} 1022 1023 This can only be used in routing mode, you can not bridge it with LAN or WAN interfaces. 1024 1015 1025 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1016 iface eth1 inet static 1017 address 192.168.10.1 1018 netmask 255.255.255.0 1019 broadcast + 1020 wireless-type broadcom 1021 wireless-country DE 1022 wireless-mode ap 1023 wireless-ssid FreeWRT 1024 wireless-security wpa-psk 1025 wireless-authorization psk2 1026 wireless-encryption aes 1027 wireless-wpa-key 12345678 1028 wireless-channel 11 1029 \end{Verbatim} 1030 1031 If you want to do MAC filtering, add the following to the sample above: 1032 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1033 wireless-macmode 2 1034 wireless-mac 00:01:02:03:04:05 06:07:08:09:0a:0b 1035 \end{Verbatim} 1036 this enables the filter and defines the list to contain addresses that should 1037 be allowed. 1038 1039 To enhance wireless performance, you can enable some flags like Broadcom's 1040 SpeedBooster. Normally, these flags are not dangerous: 1041 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1042 wireless-gmode performance 1043 wireless-frameburst 1 1044 wireless-afterburner 1 1045 \end{Verbatim} 1046 1047 \paragraph{WLAN client with WPA2 (AES) (\strong{untested})} 1048 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1026 auto eth1 1049 1027 iface eth1 inet static 1050 1028 address 192.168.10.1 … … 1061 1039 \end{Verbatim} 1062 1040 1063 \paragraph{WLAN client with WEP128}1064 \begin{Verbatim}[label=\file{/etc/network/interfaces}]1065 iface eth1 inet dhcp1066 wireless-type broadcom1067 wireless-country DE1068 wireless-mode sta1069 wireless-ssid FreeWRT1070 wireless-security wep1071 wireless-key1 112233445566778899001122331072 \end{Verbatim}1073 1074 1041 WLAN with WDS nodes, the WDS nodes need to have the same 1075 SSID, channel and encryption parameters. 1042 SSID, channel and encryption parameters. The WDS connection is separetely 1043 secured via WPA1 and AES. WPA2 for WDS connection security is \_not\_ working. 1076 1044 1077 1045 WDS node 1 (MAC of Wireless \code{06:05:04:03:02:01}) 1078 1046 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1047 auto br0 1079 1048 iface br0 inet static 1080 1049 bridge-ifaces eth1 … … 1086 1055 wireless-mode wds 1087 1056 wireless-ssid FreeWRT-WDS 1088 wireless-security none 1089 wireless-lazywds 0 1057 wireless-security wpa-psk 1058 wireless-authorization psk psk2 1059 wireless-encryption aes+tkip 1060 wireless-wpa-key apkey 1061 wireless-lazywds 1 1062 wireless-wds-security wpa-psk 1063 wireless-wds-encryption aes 1064 wireless-wds-wpa-key wdskey 1090 1065 wireless-wds 01:02:03:04:05:06 1091 1066 wireless-wds-bridge br0 … … 1093 1068 WDS node 2 (MAC of Wireless \code{01:02:03:04:05:06}) 1094 1069 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1070 auto br0 1095 1071 iface br0 inet static 1096 1072 bridge-ifaces eth1 … … 1102 1078 wireless-mode wds 1103 1079 wireless-ssid FreeWRT-WDS 1104 wireless-security none 1105 wireless-lazywds 0 1080 wireless-security wpa-psk 1081 wireless-authorization psk psk2 1082 wireless-encryption aes+tkip 1083 wireless-wpa-key apkey 1084 wireless-lazywds 1 1085 wireless-wds-security wpa-psk 1086 wireless-wds-encryption aes 1087 wireless-wds-wpa-key wdskey 1106 1088 wireless-wds 06:05:04:03:02:01 1107 1089 wireless-wds-bridge br0 1108 1090 \end{Verbatim} 1109 1091 1110 \paragraph{Peer-to-Peer mode (no encryption, IP must be static)}1092 \paragraph{Peer-to-Peer/AdHoc mode (no encryption, IP must be static)} 1111 1093 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1094 auto eth1 1112 1095 iface eth1 inet static 1113 1096 address 192.168.10.1 … … 1121 1104 wireless-channel 11 1122 1105 \end{Verbatim} 1106 1107 \subsection{Bridging} 1108 1109 This is mostly needed to combine LAN and WLAN to a homogeneous network. 1110 Be sure you have installed the package \app{bridge-utils}. 1111 See the example for a bridging setup, WLAN is secured via WPA/WPA2. 1112 1113 \begin{Verbatim}[label=\file{/etc/network/interfaces}] 1114 auto eth0.0 1115 iface eth0.0 inet manual 1116 switch-ports 1 2 3 4 5* 1117 1118 auto eth1 1119 iface eth1 inet manual 1120 wireless-type broadcom 1121 wireless-country DE 1122 wireless-mode ap 1123 wireless-ssid FreeWRT 1124 wireless-channel 11 1125 wireless-security wpa-psk 1126 wireless-authorization psk psk2 1127 wireless-encryption aes+tkip 1128 wireless-wpa-key MyWlanSecret 1129 wireless-bridge-if br0 1130 1131 auto br0 1132 iface br0 inet static 1133 bridge-ifaces eth0.0 eth1 1134 address 192.168.1.1 1135 netmask 255.255.255.0 1136 broadcast + 1137 \end{Verbatim} 1138 1139 This creates a new bridging interface \code{br0} which combines the VLAN 1140 interface \code{eth0.0} (representing the LAN-ports 1--4) and the WLAN interface 1141 \code{eth1} (on some devices like \term{Asus WL500gP} this might be \code{eth2}). 1142 The bridge interface needs always be the last one, otherwise it can not find 1143 the interfaces in \code{bridge-ifaces}. 1123 1144 1124 1145 \subsection{PPP} -
target/linux/brcm-2.4/files/etc/network/interfaces
ra9b0a36 rd8a7d94 74 74 # button-press 75 75 76 # WLAN with WPA2/WPA1 AES+TKIP 76 77 ## 78 ## WLAN with WPA2/WPA1 AES+TKIP (routing mode) 79 ## 77 80 #auto @FWRT_WLAN@ 78 81 #iface @FWRT_WLAN@ inet static … … 90 93 # wireless-wpa-key MyWlanSecret 91 94 92 # Bridging WLAN<->LAN 95 ## 96 ## Bridging WLAN<->LAN 97 ## 93 98 #auto @FWRT_LAN@ 94 99 #iface @FWRT_LAN@ inet manual 95 100 # switch-ports @FWRT_LAN_SWITCH@ 101 # 102 #auto @FWRT_WLAN@ 103 #iface @FWRT_WLAN@ inet manual 104 # wireless-type broadcom 105 # wireless-country DE 106 # wireless-mode ap 107 # wireless-ssid FreeWRT 108 # wireless-channel 11 109 # wireless-security wpa-psk 110 # wireless-authorization psk psk2 111 # wireless-encryption aes+tkip 112 # wireless-wpa-key MyWlanSecret 96 113 # 97 114 # should be always the last configured interface, it depends … … 117 134 # wireless-ssid FreeWRT-WDS 118 135 # wireless-channel 11 119 # wireless-security none 120 # wireless-lazywds 0 136 # wireless-security apa-psk 137 # wireless-authorization psk psk2 138 # wireless-encryption aes+tkip 139 # wireless-wpa-key MyWlanSecret 140 # wireless-lazywds 1 121 141 # wireless-wds-bridge br0 122 142 # wireless-wds 00:01:02:03:04:05 143 # wireless-wds-security wpa-psk 144 # wireless-wds-encryption aes 145 # wireless-wds-wpa-key key4wds 123 146
Note:
See TracChangeset
for help on using the changeset viewer.
