Files: 7a38947d54fe9264b5f5439a6d63342d00ccaae5 / test / networks.txt
876 bytesRaw
1 | fast_reauth=1 |
2 | ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel |
3 | |
4 | # home network; allow all valid ciphers |
5 | network={ |
6 | ssid="home" |
7 | scan_ssid=1 |
8 | key_mgmt=WPA-PSK |
9 | psk="very secret passphrase" |
10 | } |
11 | |
12 | # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers |
13 | network={ |
14 | ssid="work" |
15 | scan_ssid=1 |
16 | key_mgmt=WPA-EAP |
17 | pairwise=CCMP TKIP |
18 | group=CCMP TKIP |
19 | eap=TLS |
20 | identity="user@example.com" |
21 | ca_cert="/etc/cert/ca.pem" |
22 | client_cert="/etc/cert/user.pem" |
23 | private_key="/etc/cert/user.prv" |
24 | private_key_passwd="password" |
25 | } |
26 | |
27 | # 2. WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that use old |
28 | # peaplabel (e.g., Funk Odyssey and SBR, Meetinghouse Aegis, Interlink |
29 | # RAD-Series) |
30 | network={ |
31 | ssid="example" |
32 | scan_ssid=1 |
33 | key_mgmt=WPA-EAP |
34 | eap=PEAP |
35 | identity="user@example.com" |
36 | password="foobar" |
37 | ca_cert="/etc/cert/ca.pem" |
38 | phase1="peaplabel=0" |
39 | phase2="auth=MSCHAPV2" |
40 | } |
41 |
Built with git-ssb-web