Difference between revisions of "Beagleboard Black Wireless"
From Teknologisk videncenter
m |
m (→Connect to WPA2 Enterprise) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 22: | Line 22: | ||
TX packets 16 bytes 3540 (3.4 KiB) | TX packets 16 bytes 3540 (3.4 KiB) | ||
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 | TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 | ||
+ | </source> | ||
+ | ==Updating and installing WLAN tools== | ||
+ | <source lang=cli> | ||
+ | apt install wpasupplicant | ||
+ | </source> | ||
+ | ==Connect to WPA== | ||
+ | Example content of ''/etc/network/interfaces'' | ||
+ | <source lang=bash> | ||
+ | # interfaces(5) file used by ifup(8) and ifdown(8) | ||
+ | # Include files from /etc/network/interfaces.d: | ||
+ | source /etc/network/interfaces.d/* | ||
+ | auto wlan0 | ||
+ | iface wlan0 inet dhcp | ||
+ | wpa-key-mgmt WPA-PSK | ||
+ | wpa-group TKIP CCMP | ||
+ | wpa-ssid "MYSSID" | ||
+ | wpa-psk "MYPASSCODE" | ||
+ | </source> | ||
+ | '''Remember:''' To secure file | ||
+ | <source lang=bash> | ||
+ | chmod 600 /etc/network/interfaces | ||
</source> | </source> | ||
− | + | ==Connect to WPA2 Enterprise== | |
− | + | /etc/wpa_supplicant/acme.conf | |
+ | <source lang=bash> | ||
+ | ## Connect to a WPA2 Enterprise network using this command: | ||
+ | ## wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/acme.conf | ||
+ | ## Then run dhclient wlan0 to get an IP Address | ||
+ | network={ | ||
+ | scan_ssid=1 | ||
+ | eap=PEAP | ||
+ | ssid="MYSSID" | ||
+ | key_mgmt=WPA-EAP | ||
+ | identity="MYNAME" | ||
+ | password="MYPASSCODE" | ||
+ | phase1="peaplabel=0" | ||
+ | phase2="auth=MSCHAPV2" | ||
+ | } | ||
+ | </source> | ||
=Links= | =Links= | ||
+ | *[https://7thzero.com/blog/wifi-from-the-cli-in-linux-using-wpa_supplicant Setup a WPA2-Enterprise connection] | ||
*[https://www.fis.gatech.edu/how-to-configure-bbw-wifi/ Wireless Getting Started] (Best) | *[https://www.fis.gatech.edu/how-to-configure-bbw-wifi/ Wireless Getting Started] (Best) | ||
*[https://linuxconfig.org/how-to-connect-to-wifi-from-the-cli-on-debian-10-buster Wireless Getting Started] | *[https://linuxconfig.org/how-to-connect-to-wifi-from-the-cli-on-debian-10-buster Wireless Getting Started] | ||
[[Category:Beagleboard Black]] | [[Category:Beagleboard Black]] |
Latest revision as of 07:45, 27 November 2023
Contents
Basic connecting
Initial Internet access to upgrade and install additional packages. (Connect to open WiFi AP)
iwconfig wlan0 essid Wifi6D50_GUEST
iwconfig wlan0
wlan0 IEEE 802.11 ESSID:"Wifi6D50_GUEST"
Mode:Managed Frequency:2.412 GHz Access Point: 72:D4:53:3F:6D:57
Bit Rate=144.4 Mb/s Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=63/70 Signal level=-47 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
dhclient wlan0
ifconfig wlan0
wlan0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 192.168.2.126 netmask 255.255.255.0 broadcast 192.168.2.255
ether 38:d2:69:d5:dc:3d txqueuelen 1000 (Ethernet)
RX packets 136 bytes 7764 (7.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 3540 (3.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
Updating and installing WLAN tools
apt install wpasupplicant
Connect to WPA
Example content of /etc/network/interfaces
# interfaces(5) file used by ifup(8) and ifdown(8)
# Include files from /etc/network/interfaces.d:
source /etc/network/interfaces.d/*
auto wlan0
iface wlan0 inet dhcp
wpa-key-mgmt WPA-PSK
wpa-group TKIP CCMP
wpa-ssid "MYSSID"
wpa-psk "MYPASSCODE"
Remember: To secure file
chmod 600 /etc/network/interfaces
Connect to WPA2 Enterprise
/etc/wpa_supplicant/acme.conf
## Connect to a WPA2 Enterprise network using this command:
## wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/acme.conf
## Then run dhclient wlan0 to get an IP Address
network={
scan_ssid=1
eap=PEAP
ssid="MYSSID"
key_mgmt=WPA-EAP
identity="MYNAME"
password="MYPASSCODE"
phase1="peaplabel=0"
phase2="auth=MSCHAPV2"
}