Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
technical:ppsk-hostapd [2024/04/26 09:48] systemtechnical:ppsk-hostapd [2024/04/30 08:22] (current) – [Key specific for VLAN] system
Line 91: Line 91:
 </code>  </code> 
   * A few additional steps are required for the VLAN tagging function of hostapd to work as intended.   * A few additional steps are required for the VLAN tagging function of hostapd to work as intended.
- +  * We need to include a few options to instruct hostapd how to handle the VLANs. 
-<alert type="danger">TO BE COMPLETED</alert+  * Refer to this snippet from /etc/config/wireless 
 +<code bash> 
 +option wpa_psk_file '/etc/hostapd.wpa_psk' 
 +option vlan_file '/etc/hostapd.vlan' 
 +option vlan_tagged_interface 'eth0' 
 +option vlan_bridge 'br-vlan' 
 +option dynamic_vlan '1' 
 +</code
 +  * Then here is an example of hostapd.vlan 
 +<code bash> 
 +# VLAN ID to network interface mapping 
 +1 vlan1 
 +2 vlan2 
 +3 vlan3 
 +4 vlan4 
 +100 guest 
 +# Optional wildcard entry matching all VLAN IDs. The first # in the interface 
 +# name will be replaced with the VLAN ID. The network interfaces are created 
 +# (and removed) dynamically based on the use. 
 +* vlan# 
 +</code> 
 +  * hostapd will create a bridge with each VLAN and automatically create tagged interfaces and make them members of this bridge: 
 +<code bash> 
 +root@OpenWrt:~# brctl show 
 +bridge name     bridge id               STP enabled     interfaces 
 +br-vlan3        8000.4018b1eb3c80       no              vlan3 
 +                                                        eth0.3 
 +br-lan          7fff.4018b1eb3c80       no              eth0 
 +</code>
  
 ------ ------
Line 213: Line 240:
 config wifi-iface 'zero' config wifi-iface 'zero'
         option ifname 'zero0'         option ifname 'zero0'
-        option disabled '0' 
         option encryption 'psk2'         option encryption 'psk2'
         option acct_interval '300'         option acct_interval '300'
-        option isolate '0' 
         option mode 'ap'         option mode 'ap'
 +        option nasid 'a_hosta_53_97'
 +        option acct_server '164.160.89.129'
         option acct_secret 'testing123'         option acct_secret 'testing123'
         option auth_server '164.160.89.129'         option auth_server '164.160.89.129'
 +        option auth_secret 'testing123'  
         option network 'lan'         option network 'lan'
-        option radius_acct_req_attr '126:s:a_hosta_53_97_0_58' 
         option device 'radio0'         option device 'radio0'
-        option nasid 'a_hosta_53_97+        option ssid 'PPSK-APdesk-1           
-        option hidden '0' +        option ppsk '1     
-        option acct_server '164.160.89.129'+
         option vlan_naming '0'         option vlan_naming '0'
         option vlan_tagged_interface 'wan'         option vlan_tagged_interface 'wan'
         option vlan_bridge 'br-ex_vlan'         option vlan_bridge 'br-ex_vlan'
-        option dynamic_vlan '1' +        option dynamic_vlan '1'        
-        option ssid 'PPSK-APdesk-1' +
-        option ppsk '1' +
-        option auth_secret 'testing123' +
-        option radius_auth_req_attr '126:s:a_hosta_53_97_0_58'       +
 </code> </code>
   * RADIUS-based PPSK implementations usually consist of two components:   * RADIUS-based PPSK implementations usually consist of two components:
  • technical/ppsk-hostapd.1714117685.txt.gz
  • Last modified: 2024/04/26 09:48
  • by system