Difference between revisions of "Beagleboard Black Wireless"
From Teknologisk videncenter
m |
m (→Updating and installing WLAN tools) |
||
Line 26: | Line 26: | ||
<source lang=cli> | <source lang=cli> | ||
apt install wpasupplicant | apt install wpasupplicant | ||
− | + | </source> | |
==Connect to WPA== | ==Connect to WPA== | ||
− | |||
Example content of ''/etc/network/interfaces'' | Example content of ''/etc/network/interfaces'' | ||
<source lang=bash> | <source lang=bash> | ||
Line 45: | Line 44: | ||
chmod 600 /etc/network/interfaces | chmod 600 /etc/network/interfaces | ||
</source> | </source> | ||
+ | |||
==Connect to WPA2 Enterprise== | ==Connect to WPA2 Enterprise== | ||
/etc/wpa_supplicant/acme.conf | /etc/wpa_supplicant/acme.conf |
Revision as of 07:37, 27 November 2023
Contents
Basic connecting
Initial Internet access to upgrade and install additional packages. (Connect to open WiFi AP)
iwconfig wlan0 essid Wifi6D50_GUEST
iwconfig wlan0
wlan0 IEEE 802.11 ESSID:"Wifi6D50_GUEST"
Mode:Managed Frequency:2.412 GHz Access Point: 72:D4:53:3F:6D:57
Bit Rate=144.4 Mb/s Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=63/70 Signal level=-47 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
dhclient wlan0
ifconfig wlan0
wlan0: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 192.168.2.126 netmask 255.255.255.0 broadcast 192.168.2.255
ether 38:d2:69:d5:dc:3d txqueuelen 1000 (Ethernet)
RX packets 136 bytes 7764 (7.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 16 bytes 3540 (3.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
Updating and installing WLAN tools
apt install wpasupplicant
Connect to WPA
Example content of /etc/network/interfaces
# interfaces(5) file used by ifup(8) and ifdown(8)
# Include files from /etc/network/interfaces.d:
source /etc/network/interfaces.d/*
auto wlan0
iface wlan0 inet dhcp
wpa-key-mgmt WPA-PSK
wpa-group TKIP CCMP
wpa-ssid "MYSSID"
wpa-psk "MYPASSCODE"
Remember: To secure file
chmod 600 /etc/network/interfaces
Connect to WPA2 Enterprise
/etc/wpa_supplicant/acme.conf
## Connect to a WPA2 Enterprise network using this command:
## wpa_supplicant -B -i wlan0 -c /etc/acme.conf
## Then run dhclient wlan0 to get an IP Address
network={
scan_ssid=1
eap=PEAP
ssid="MYSSID"
key_mgmt=WPA-EAP
identity="MYNAME"
password="MYPASSCODE"
phase1="peaplabel=0"
phase2="auth=MSCHAPV2"
}