⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 hostapd.conf

📁 最新的Host AP 新添加了许多pcmcia 的驱动
💻 CONF
📖 第 1 页 / 共 3 页
字号:
#ap_max_inactivity=300# Enable/disable internal bridge for packets between associated stations.## When IEEE 802.11 is used in managed mode, packets are usually send through# the AP even if they are from a wireless station to another wireless station.# This functionality requires that the AP has a bridge functionality that sends# frames back to the same interface if their destination is another associated# station. In addition, broadcast/multicast frames from wireless stations will# be sent both to the host system net stack (e.g., to eventually wired network)# and back to the wireless interface.## The internal bridge is implemented within the wireless kernel module and it# bypasses kernel filtering (netfilter/iptables/ebtables). If direct# communication between the stations needs to be prevented, the internal# bridge can be disabled by setting bridge_packets=0.## Note: If this variable is not included in hostapd.conf, hostapd does not# change the configuration and iwpriv can be used to set the value with# 'iwpriv wlan# param 10 0' command. If the variable is in hostapd.conf,# hostapd will override possible iwpriv configuration whenever configuration# file is reloaded.## default: do not control from hostapd (80211.o defaults to 1=enabled)#bridge_packets=1# Maximum allowed Listen Interval (how many Beacon periods STAs are allowed to# remain asleep). Default: 65535 (no limit apart from field size)#max_listen_interval=100##### IEEE 802.11n related configuration ####################################### ieee80211n: Whether IEEE 802.11n (HT) is enabled# 0 = disabled (default)# 1 = enabled#ieee80211n=1# ht_capab: HT capabilities (list of flags)# LDPC coding capability: [LDPC] = supported# Supported channel width set: [HT40-] = both 20 MHz and 40 MHz with secondary#	channel below the primary channel; [HT40+] = both 20 MHz and 40 MHz#	with secondary channel below the primary channel#	(20 MHz only if neither is set)#	Note: There are limits on which channels can be used with HT40- and#	HT40+. Following table shows the channels that may be available for#	HT40- and HT40+ use per IEEE 802.11n Annex J:#	freq		HT40-		HT40+#	2.4 GHz		5-13		1-7 (1-9 in Europe/Japan)#	5 GHz		40,48,56,64	36,44,52,60#	(depending on the location, not all of these channels may be available#	for use)# Spatial Multiplexing (SM) Power Save: [SMPS-STATIC] or [SMPS-DYNAMIC]#	(SMPS disabled if neither is set)# HT-greenfield: [GF] (disabled if not set)# Short GI for 20 MHz: [SHORT-GI-20] (disabled if not set)# Short GI for 40 MHz: [SHORT-GI-40] (disabled if not set)# Tx STBC: [TX-STBC] (disabled if not set)# Rx STBC: [RX-STBC1] (one spatial stream), [RX-STBC12] (one or two spatial#	streams), or [RX-STBC123] (one, two, or three spatial streams); Rx STBC#	disabled if none of these set# HT-delayed Block Ack: [DELAYED-BA] (disabled if not set)# Maximum A-MSDU length: [MAX-AMSDU-7935] for 7935 octets (3839 octets if not#	set)# DSSS/CCK Mode in 40 MHz: [DSSS_CCK-40] = allowed (not allowed if not set)# PSMP support: [PSMP] (disabled if not set)# L-SIG TXOP protection support: [LSIG-TXOP-PROT] (disabled if not set)#ht_capab=[HT40-][SHORT-GI-20][SHORT-GI-40]##### IEEE 802.1X-2004 related configuration ################################### Require IEEE 802.1X authorization#ieee8021x=1# IEEE 802.1X/EAPOL version# hostapd is implemented based on IEEE Std 802.1X-2004 which defines EAPOL# version 2. However, there are many client implementations that do not handle# the new version number correctly (they seem to drop the frames completely).# In order to make hostapd interoperate with these clients, the version number# can be set to the older version (1) with this configuration value.#eapol_version=2# Optional displayable message sent with EAP Request-Identity. The first \0# in this string will be converted to ASCII-0 (nul). This can be used to# separate network info (comma separated list of attribute=value pairs); see,# e.g., RFC 4284.#eap_message=hello#eap_message=hello\0networkid=netw,nasid=foo,portid=0,NAIRealms=example.com# WEP rekeying (disabled if key lengths are not set or are set to 0)# Key lengths for default/broadcast and individual/unicast keys:# 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits)# 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits)#wep_key_len_broadcast=5#wep_key_len_unicast=5# Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once)#wep_rekey_period=300# EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if# only broadcast keys are used)eapol_key_index_workaround=0# EAP reauthentication period in seconds (default: 3600 seconds; 0 = disable# reauthentication).#eap_reauth_period=3600# Use PAE group address (01:80:c2:00:00:03) instead of individual target# address when sending EAPOL frames with driver=wired. This is the most common# mechanism used in wired authentication, but it also requires that the port# is only used by one station.#use_pae_group_addr=1##### Integrated EAP server #################################################### Optionally, hostapd can be configured to use an integrated EAP server# to process EAP authentication locally without need for an external RADIUS# server. This functionality can be used both as a local authentication server# for IEEE 802.1X/EAPOL and as a RADIUS server for other devices.# Use integrated EAP server instead of external RADIUS authentication# server. This is also needed if hostapd is configured to act as a RADIUS# authentication server.eap_server=0# Path for EAP server user database#eap_user_file=/etc/hostapd.eap_user# CA certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS#ca_cert=/etc/hostapd.ca.pem# Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS#server_cert=/etc/hostapd.server.pem# Private key matching with the server certificate for EAP-TLS/PEAP/TTLS# This may point to the same file as server_cert if both certificate and key# are included in a single file. PKCS#12 (PFX) file (.p12/.pfx) can also be# used by commenting out server_cert and specifying the PFX file as the# private_key.#private_key=/etc/hostapd.server.prv# Passphrase for private key#private_key_passwd=secret passphrase# Enable CRL verification.# Note: hostapd does not yet support CRL downloading based on CDP. Thus, a# valid CRL signed by the CA is required to be included in the ca_cert file.# This can be done by using PEM format for CA certificate and CRL and# concatenating these into one file. Whenever CRL changes, hostapd needs to be# restarted to take the new CRL into use.# 0 = do not verify CRLs (default)# 1 = check the CRL of the user certificate# 2 = check all CRLs in the certificate path#check_crl=1# dh_file: File path to DH/DSA parameters file (in PEM format)# This is an optional configuration file for setting parameters for an# ephemeral DH key exchange. In most cases, the default RSA authentication does# not use this configuration. However, it is possible setup RSA to use# ephemeral DH key exchange. In addition, ciphers with DSA keys always use# ephemeral DH keys. This can be used to achieve forward secrecy. If the file# is in DSA parameters format, it will be automatically converted into DH# params. This parameter is required if anonymous EAP-FAST is used.# You can generate DH parameters file with OpenSSL, e.g.,# "openssl dhparam -out /etc/hostapd.dh.pem 1024"#dh_file=/etc/hostapd.dh.pem# Configuration data for EAP-SIM database/authentication gateway interface.# This is a text string in implementation specific format. The example# implementation in eap_sim_db.c uses this as the UNIX domain socket name for# the HLR/AuC gateway (e.g., hlr_auc_gw). In this case, the path uses "unix:"# prefix.#eap_sim_db=unix:/tmp/hlr_auc_gw.sock# Encryption key for EAP-FAST PAC-Opaque values. This key must be a secret,# random value. It is configured as a 16-octet value in hex format. It can be# generated, e.g., with the following command:# od -tx1 -v -N16 /dev/random | colrm 1 8 | tr -d ' '#pac_opaque_encr_key=000102030405060708090a0b0c0d0e0f# EAP-FAST authority identity (A-ID)# A-ID indicates the identity of the authority that issues PACs. The A-ID# should be unique across all issuing servers. In theory, this is a variable# length field, but due to some existing implementations required A-ID to be# 16 octets in length, it is strongly recommended to use that length for the# field to provided interoperability with deployed peer implementation. This# field is configured in hex format.#eap_fast_a_id=101112131415161718191a1b1c1d1e1f# EAP-FAST authority identifier information (A-ID-Info)# This is a user-friendly name for the A-ID. For example, the enterprise name# and server name in a human-readable format. This field is encoded as UTF-8.#eap_fast_a_id_info=test server# Enable/disable different EAP-FAST provisioning modes:#0 = provisioning disabled#1 = only anonymous provisioning allowed#2 = only authenticated provisioning allowed#3 = both provisioning modes allowed (default)#eap_fast_prov=3# EAP-FAST PAC-Key lifetime in seconds (hard limit)#pac_key_lifetime=604800# EAP-FAST PAC-Key refresh time in seconds (soft limit on remaining hard# limit). The server will generate a new PAC-Key when this number of seconds# (or fewer) of the lifetime remains.#pac_key_refresh_time=86400# EAP-SIM and EAP-AKA protected success/failure indication using AT_RESULT_IND# (default: 0 = disabled).#eap_sim_aka_result_ind=1# Trusted Network Connect (TNC)# If enabled, TNC validation will be required before the peer is allowed to# connect. Note: This is only used with EAP-TTLS and EAP-FAST. If any other# EAP method is enabled, the peer will be allowed to connect without TNC.#tnc=1##### IEEE 802.11f - Inter-Access Point Protocol (IAPP) ######################## Interface to be used for IAPP broadcast packets#iapp_interface=eth0##### RADIUS client configuration ############################################## for IEEE 802.1X with external Authentication Server, IEEE 802.11# authentication with external ACL for MAC addresses, and accounting# The own IP address of the access point (used as NAS-IP-Address)own_ip_addr=127.0.0.1# Optional NAS-Identifier string for RADIUS messages. When used, this should be# a unique to the NAS within the scope of the RADIUS server. For example, a# fully qualified domain name can be used here.# When using IEEE 802.11r, nas_identifier must be set and must be between 1 and# 48 octets long.#nas_identifier=ap.example.com# RADIUS authentication server#auth_server_addr=127.0.0.1#auth_server_port=1812#auth_server_shared_secret=secret# RADIUS accounting server#acct_server_addr=127.0.0.1#acct_server_port=1813#acct_server_shared_secret=secret# Secondary RADIUS servers; to be used if primary one does not reply to# RADIUS packets. These are optional and there can be more than one secondary# server listed.#auth_server_addr=127.0.0.2#auth_server_port=1812#auth_server_shared_secret=secret2##acct_server_addr=127.0.0.2#acct_server_port=1813#acct_server_shared_secret=secret2# Retry interval for trying to return to the primary RADIUS server (in# seconds). RADIUS client code will automatically try to use the next server# when the current server is not replying to requests. If this interval is set,# primary server will be retried after configured amount of time even if the# currently used secondary server is still working.#radius_retry_primary_interval=600# Interim accounting update interval# If this is set (larger than 0) and acct_server is configured, hostapd will# send interim accounting updates every N seconds. Note: if set, this overrides# possible Acct-Interim-Interval attribute in Access-Accept message. Thus, this# value should not be configured in hostapd.conf, if RADIUS server is used to# control the interim interval.# This value should not be less 600 (10 minutes) and must not be less than# 60 (1 minute).#radius_acct_interim_interval=600# Dynamic VLAN mode; allow RADIUS authentication server to decide which VLAN# is used for the stations. This information is parsed from following RADIUS# attributes based on RFC 3580 and RFC 2868: Tunnel-Type (value 13 = VLAN),# Tunnel-Medium-Type (value 6 = IEEE 802), Tunnel-Private-Group-ID (value# VLANID as a string). vlan_file option below must be configured if dynamic# VLANs are used. Optionally, the local MAC ACL list (accept_mac_file) can be# used to set static client MAC address to VLAN ID mapping.# 0 = disabled (default)# 1 = option; use default interface if RADIUS server does not include VLAN ID# 2 = required; reject authentication if RADIUS server does not include VLAN ID#dynamic_vlan=0# VLAN interface list for dynamic VLAN mode is read from a separate text file.# This list is used to map VLAN ID from the RADIUS server to a network# interface. Each station is bound to one interface in the same way as with# multiple BSSIDs or SSIDs. Each line in this text file is defining a new# interface and the line must include VLAN ID and interface name separated by# white space (space or tab).#vlan_file=/etc/hostapd.vlan# Interface where 802.1q tagged packets should appear when a RADIUS server is# used to determine which VLAN a station is on.  hostapd creates a bridge for# each VLAN.  Then hostapd adds a VLAN interface (associated with the interface# indicated by 'vlan_tagged_interface') and the appropriate wireless interface# to the bridge.#vlan_tagged_interface=eth0##### RADIUS authentication server configuration ############################### hostapd can be used as a RADIUS authentication server for other hosts. This# requires that the integrated EAP server is also enabled and both# authentication services are sharing the same configuration.# File name of the RADIUS clients configuration for the RADIUS server. If this# commented out, RADIUS server is disabled.#radius_server_clients=/etc/hostapd.radius_clients# The UDP port number for the RADIUS authentication server#radius_server_auth_port=1812# Use IPv6 with RADIUS server (IPv4 will also be supported using IPv6 API)#radius_server_ipv6=1##### WPA/IEEE 802.11i configuration ########################################### Enable WPA. Setting this variable configures the AP to require WPA (either# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),# RADIUS authentication server must be configured, and WPA-EAP must be included# in wpa_key_mgmt.# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)# and/or WPA2 (full IEEE 802.11i/RSN):# bit0 = WPA# bit1 = IEEE 802.11i/RSN (WPA2) (dot11RSNAEnabled)#wpa=1# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase# (8..63 characters) that will be converted to PSK. This conversion uses SSID# so the PSK changes when ASCII passphrase is used and the SSID is changed.# wpa_psk (dot11RSNAConfigPSKValue)# wpa_passphrase (dot11RSNAConfigPSKPassPhrase)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -