## Interfejs wlan i sterownik interface=wlan0 driver=nl80211 bridge=xenbr0 # ## Loggowanie logger_syslog=1 logger_syslog_level=2 logger_stdout=-1 logger_stdout_level=2 wmm_enabled=0 # Dump file for state information (on SIGUSR1) dump_file=/tmp/hostapd.dump # hostapd_cli will use it when trying to connect with hostapd. ctrl_interface=/var/run/hostapd # This variable can be a group name or gid. ctrl_interface_group=0 ## WLAN broadcast settings ssid=tomek dom ignore_broadcast_ssid=1 country_code=US ieee80211d=1 hw_mode=g channel=1 ## jakies inne parametry polaczenia # Beacon interval in kus (1.024 ms) (default: 100; range 15..65535) #beacon_int=100 #dtim_period=2 #rts_threshold=2347 #2347 #preamble=2 ## ACL z macaddresow macaddr_acl=0 # IEEE 802.11 specifies two authentication algorithms. hostapd can be # configured to allow both of these or only one. Open system authentication # should be used with IEEE 802.1X. # Bit fields of allowed authentication algorithms: # bit 0 = Open System Authentication # bit 1 = Shared Key Authentication (requires WEP) auth_algs=1 # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if # only broadcast keys are used) #eapol_key_index_workaround=1 # Use integrated EAP server instead of external RADIUS authentication # server. This is also needed if hostapd is configured to act as a RADIUS # authentication server. #eap_server=0 #wpa2 only wpa=2 #use aes-cbc instead of tkip wpa_pairwise=CCMP #WPA2 PERSONAL wpa_key_mgmt=WPA-PSK wpa_passphrase=1234567890 ## RADIUS SETTINGS #Odpowiada za autoryzacje przy wykorzystaniu 801.1X ! #ieee8021x=0 #wpa_key_mgmt=WPA-EAP #nas_identifier=hostapd #own_ip_addr=172.17.0.2 #RAADIUS SERVERS #auth_server_addr=172.17.0.3 #auth_server_port=1812 #auth_server_shared_secret=asd123 #acct_server_addr=172.17.0.3 #acct_server_port=1813 #acct_server_shared_secret=asd123 # Dynamic VLAN mode; allow RADIUS authentication server to decide which VLAN # is used for the stations. This information is parsed from following RADIUS # attributes based on RFC 3580 and RFC 2868: Tunnel-Type (value 13 = VLAN), # Tunnel-Medium-Type (value 6 = IEEE 802), Tunnel-Private-Group-ID (value # VLANID as a string). vlan_file option below must be configured if dynamic # VLANs are used. Optionally, the local MAC ACL list (accept_mac_file) can be # used to set static client MAC address to VLAN ID mapping. # 0 = disabled (default) # 1 = option; use default interface if RADIUS server does not include VLAN ID # 2 = required; reject authentication if RADIUS server does not include VLAN ID #dynamic_vlan=0 # VLAN interface list for dynamic VLAN mode is read from a separate text file. # This list is used to map VLAN ID from the RADIUS server to a network # interface. Each station is bound to one interface in the same way as with # multiple BSSIDs or SSIDs. Each line in this text file is defining a new # interface and the line must include VLAN ID and interface name separated by # white space (space or tab). #vlan_file=/etc/hostapd/hostapd.vlan # Interface where 802.1q tagged packets should appear when a RADIUS server is # used to determine which VLAN a station is on. hostapd creates a bridge for # each VLAN. Then hostapd adds a VLAN interface (associated with the interface # indicated by 'vlan_tagged_interface') and the appropriate wireless interface # to the bridge. #vlan_tagged_interface=eth0