📄 wpa_supplicant_example.conf
字号:
# wep_key0=1234567890
# wep_key1=0102030405
# wep_key2="1234567890123"
# wep_tx_keyidx=0
# priority=5
#}
# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key
#network={
# ssid="static-wep-test2"
# key_mgmt=NONE
# wep_key0="abcde"
# wep_key1=0102030405
# wep_key2="1234567890123"
# wep_tx_keyidx=0
# priority=5
# auth_alg=SHARED
#}
# ===================== WPA-PSK =====================
# Only WPA-PSK is used. Any valid cipher combination is accepted.
#network={
# ssid="psk-test1"
# proto=WPA
# key_mgmt=WPA-PSK
# pairwise=TKIP
# group=TKIP CCMP
# psk="12345678"
# priority=2
#}
# Only WPA2-PSK is used. Any valid cipher combination is accepted.
#network={
# ssid="psk-test2"
# proto=WPA2
# key_mgmt=WPA-PSK
# pairwise=CCMP
# group=TKIP CCMP
# psk="12345678"
# priority=2
#}
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers
#network={
# ssid="simple"
# psk="very secret passphrase"
# priority=5
#}
# Same as previous, but request SSID-specific scanning (for APs that reject
# broadcast SSID)
#network={
# ssid="second ssid"
# scan_ssid=1
# psk="very secret passphrase"
# priority=2
#}
# ===================== WPA-EAP =====================
# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104
# or WEP40 as the group cipher will not be accepted.
#network={
# ssid="eap-radius-test1"
# proto=WPA
# key_mgmt=WPA-EAP
# pairwise=TKIP
# group=TKIP
# eap=TLS
# identity="wpatest2@wpa.com"
# ca_cert="/etc/cert/root.pem"
# client_cert="/etc/cert/id.pem"
# private_key="/etc/cert/id_key.pem"
# private_key_passwd="test2"
# priority=1
#}
# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the old peaplabel
# (e.g., Radiator)
#network={
# ssid="eap-radius-test2"
# proto=WPA
# key_mgmt=WPA-EAP
# pairwise=CCMP
# group=CCMP TKIP
# eap=PEAP
# identity="wpatest2@wpa.com"
# password="test2"
# ca_cert="/etc/cert/root.pem"
# phase1="peaplabel=0"
# phase2="auth=MSCHAPV2"
# priority=1
#}
# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
#network={
# ssid="example"
# key_mgmt=WPA-EAP
# eap=TTLS
# identity="user@example.com"
# anonymous_identity="anonymous@example.com"
# password="foobar"
# ca_cert="/etc/cert/ca.pem"
# priority=2
#}
# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted
# use. Real identity is sent only within an encrypted TLS tunnel.
#network={
# ssid="example"
# key_mgmt=WPA-EAP
# eap=TTLS
# identity="user@example.com"
# anonymous_identity="anonymous@example.com"
# password="foobar"
# ca_cert="/etc/cert/ca.pem"
# phase2="auth=MSCHAPV2"
#}
# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner
# authentication.
#network={
# ssid="195"
# proto=WPA
# key_mgmt=WPA-EAP
# pairwise=TKIP
# group=TKIP
# eap=TTLS
# Phase1 / outer authentication
# anonymous_identity="2000serv\test1@wifi.com"
# password="test1"
# ca_cert="/etc/cert/root.pem"
# Phase 2 / inner authentication
# phase2="autheap=TLS"
# ca_cert2="/etc/cert/ca2.pem"
# client_cert2="/etc/cer/id.pem"
# private_key2="/etc/cer/id_key.prv"
# private_key2_passwd="test1"
# priority=2
#}
# ===================== IEEE 802.1X =====================
# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using
# EAP-TLS for authentication and key generation; require both unicast and
# broadcast WEP keys.
#network={
# ssid="195"
# key_mgmt=IEEE8021X
# eap=TLS
# identity="wpatest2@wpa.com"
# ca_cert="/etc/cert/root.pem"
# client_cert="/etc/cert/id.pem"
# private_key="/etc/cert/id_key.pem"
# private_key_passwd="test2"
# eapol_flags=3
#}
# IEEE 802.1X/EAPOL dynamically generated WEP keys (i.e., no WPA) using EAP-MD5
#network={# ssid="230"# key_mgmt=IEEE8021X # eap=MD5# wep_key0=1234567890# wep_tx_keyidx=0# identity="MD5"# password="EAPMD5"# auth_alg=OPEN# eapol_flags=0#}
#802.1X for PEAP/MSCHAPV2 old version test; require both unicast and
#broadcast WEP keys.
#network={
# ssid="195"
# key_mgmt=IEEE8021X
# eap=PEAP
# identity="wpatest2@wpa.com"
# password="test2"
# ca_cert="/etc/cert/root.pem"
# phase1="peaplable=0"
# phase2="auth=MSCHAPV2"
# eapol_flags=3
#}
# ===================== Adhoc Mode =====================
# Note: set ap_scan=2 in adhoc mode
# IBSS/ad-hoc network with OPEN WEP
#network={
# ssid="adhoc-wep-test"
# mode=1
# key_mgmt=NONE
# wep_key0=1234567890
# wep_key1=0102030405
# wep_key2="1234567890123"
# wep_tx_keyidx=0
# priority=5
#}
# IBSS/ad-hoc network with WPA-NONE/TKIP/CCMP.
#network={
# ssid="adhoc-wpa-test"
# mode=1
# proto=WPA
# key_mgmt=WPA-NONE
# pairwise=NONE
# group=TKIP
# psk="12345678"
#}
# ===================== Mixed key mgmt =====================
# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and
# group cipher.
#network={
# ssid="example"
# bssid=00:11:22:33:44:55
# proto=WPA RSN
# key_mgmt=WPA-PSK WPA-EAP
# pairwise=CCMP
# group=CCMP
# psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb
#}
# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP
# and all valid ciphers.
#network={
# ssid=00010203
# psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f
#}
# Catch all example that allows more or less all configuration modes
#network={
# ssid="example"
# scan_ssid=1
# key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE
# pairwise=CCMP TKIP
# group=CCMP TKIP WEP104 WEP40
# psk="very secret passphrase"
# eap=TTLS PEAP TLS
# identity="user@example.com"
# password="foobar"
# ca_cert="/etc/cert/ca.pem"
# client_cert="/etc/cert/user.pem"
# private_key="/etc/cert/user.prv"
# private_key_passwd="password"
# phase1="peaplabel=0"
#}
# ===================== Others =====================
# EAP-SIM with a GSM SIM or USIM
#network={
# ssid="eap-sim-test"
# key_mgmt=WPA-EAP
# eap=SIM
# pin="1234"
# pcsc=""
#}
# EAP-PSK
#network={
# ssid="eap-psk-test"
# key_mgmt=WPA-EAP
# eap=PSK
# identity="eap_psk_user"
# eappsk=06b4be19da289f475aa46a33cb793029
# nai="eap_psk_user@example.com"
#}
# LEAP with dynamic WEP keys
#network={
# ssid="leap-example"
# key_mgmt=IEEE8021X
# eap=LEAP
# identity="user"
# password="foobar"
#}
# EAP-FAST with WPA (WPA or WPA2)
#network={
# ssid="eap-fast-test"
# key_mgmt=WPA-EAP
# eap=FAST
# anonymous_identity="FAST-000102030405"
# identity="username"
# password="password"
# phase1="fast_provisioning=1"
# pac_file="/etc/wpa_supplicant.eap-fast-pac"
#}
# EAP-FAST with WPA (WPA or WPA2)
#network={
# ssid="eap-fast-test"
# key_mgmt=WPA-EAP
# eap=FAST
# anonymous_identity="FAST-000102030405"
# identity="username"
# password="password"
# phase1="fast_provisioning=1"
# pac_file="blob://eap-fast-pac"
#}
# Example of EAP-TLS with smartcard (openssl engine)
#network={
# ssid="example"
# key_mgmt=WPA-EAP
# eap=TLS
# proto=RSN
# pairwise=CCMP TKIP
# group=CCMP TKIP
# identity="user@example.com"
# ca_cert="/etc/cert/ca.pem"
# client_cert="/etc/cert/user.pem"
# engine=1
# The engine configured here must be available. Look at
# OpenSSL engine support in the global section.
# The key available through the engine must be the private key
# matching the client certificate configured above.
# use the opensc engine
#engine_id="opensc"
#key_id="45"
# use the pkcs11 engine
# engine_id="pkcs11"
# key_id="id_45"
# Optional PIN configuration; this can be left out and PIN will be
# asked through the control interface
# pin="1234"
#}
# Example configuration showing how to use an inlined blob as a CA certificate
# data instead of using external file
#network={
# ssid="example"
# key_mgmt=WPA-EAP
# eap=TTLS
# identity="user@example.com"
# anonymous_identity="anonymous@example.com"
# password="foobar"
# ca_cert="blob://exampleblob"
# priority=20
#}
#blob-base64-exampleblob={
#SGVsbG8gV29ybGQhCg==
#}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -