diff options
author | CoprDistGit <infra@openeuler.org> | 2024-08-05 02:40:13 +0000 |
---|---|---|
committer | CoprDistGit <infra@openeuler.org> | 2024-08-05 02:40:13 +0000 |
commit | bc31e00f20be36875f0981c7d4b86c19ef54ad50 (patch) | |
tree | 897566e069285feaae6ee4cbb06ef41aa43de0c2 /hostapd.conf.5 | |
parent | 3b860db61e25c0fcc3b72d332798906bbb62e982 (diff) |
automatic import of hostapdopeneuler24.03_LTS
Diffstat (limited to 'hostapd.conf.5')
-rw-r--r-- | hostapd.conf.5 | 127 |
1 files changed, 127 insertions, 0 deletions
diff --git a/hostapd.conf.5 b/hostapd.conf.5 new file mode 100644 index 0000000..3e7e2af --- /dev/null +++ b/hostapd.conf.5 @@ -0,0 +1,127 @@ +.\" Manpage for hostapd.conf. +.\" Original scrape of https://www.daemon-systems.org/man/hostapd.conf.5.html +.\" Contact linville@redhat.com to correct errors or typos. +.TH hostapd.conf 5 "10 Feb 2021" "1.0" "hostapd.conf man page" +.SH NAME +hostapd.conf \- configuration file for hostapd(8) utility +.SH DESCRIPTION +The hostapd.conf utility is an authenticator for IEEE 802.11 networks. +It provides full support for WPA/IEEE 802.11i and can also act as an IEEE +802.1X Authenticator with a suitable backend Authentication Server +(typically FreeRADIUS). +The configuration file consists of global parameters and domain specific +configuration: +.P +\(bu IEEE 802.1X-2004 +.P +\(bu RADIUS client +.P +\(bu RADIUS authentication server +.P +\(bu WPA/IEEE 802.11i +.SH GLOBAL PARAMETERS +The following parameters are recognized: +.SS interface +Interface name. Should be set in "hostap" mode. +.SS debug +Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, +4 = excessive. +.SS dump_file +Dump file for state information (on SIGUSR1). +.SS ctrl_interface +The pathname of the directory in which hostapd(8) creates UNIX +domain socket files for communication with frontend programs such +as hostapd_cli(8). +.SS ctrl_interface_group +A group name or group ID to use in setting protection on the +control interface file. This can be set to allow non-root users +to access the control interface files. If no group is specified, +the group ID of the control interface is not modified and will, +typically, be the group ID of the directory in which the socket +is created. +.SH IEEE 802.1X-2004 PARAMETERS +The following parameters are recognized: +.SS ieee8021x +Require IEEE 802.1X authorization. +.SS eap_message +Optional displayable message sent with EAP Request-Identity. +.SS wep_key_len_broadcast +Key lengths for broadcast keys. +.SS wep_key_len_unicast +Key lengths for unicast keys. +.SS wep_rekey_period +Rekeying period in seconds. +.SS eapol_key_index_workaround +EAPOL-Key index workaround (set bit7) for WinXP Supplicant. +.SS eap_reauth_period +EAP reauthentication period in seconds. To disable +reauthentication, use "0". +.SH RADIUS CLIENT PARAMETERS +The following parameters are recognized: +.SS own_ip_addr +The own IP address of the access point (used as NAS-IP-Address). +.SS nas_identifier +Optional NAS-Identifier string for RADIUS messages. +.SS auth_server_addr, auth_server_port, auth_server_shared_secret +RADIUS authentication server parameters. Can be defined twice +for secondary servers to be used if primary one does not reply to +RADIUS packets. +.SS acct_server_addr, acct_server_port, acct_server_shared_secret +RADIUS accounting server parameters. Can be defined twice for +secondary servers to be used if primary one does not reply to +RADIUS packets. +.SS radius_retry_primary_interval +Retry interval for trying to return to the primary RADIUS server +(in seconds). +.SS radius_acct_interim_interval +Interim accounting update interval. If this is set (larger than +0) and acct_server is configured, hostapd(8) will send interim +accounting updates every N seconds. +.SH RADIUS AUTHENTICATION SERVER PARAMETERS +The following parameters are recognized: +.SS radius_server_clients +File name of the RADIUS clients configuration for the RADIUS +server. If this is commented out, RADIUS server is disabled. +.SS radius_server_auth_port +The UDP port number for the RADIUS authentication server. +.SS radius_server_ipv6 +Use IPv6 with RADIUS server. +.SH WPA/IEEE 802.11i PARAMETERS +The following parameters are recognized: +.SS wpa +Enable WPA. Setting this variable configures the AP to require +WPA (either WPA-PSK or WPA-RADIUS/EAP based on other +configuration). +.SS wpa_psk, wpa_passphrase +WPA pre-shared keys for WPA-PSK. This can be either entered as a +256-bit secret in hex format (64 hex digits), wpa_psk, or as an +ASCII passphrase (8..63 characters) that will be converted to +PSK. This conversion uses SSID so the PSK changes when ASCII +passphrase is used and the SSID is changed. +.SS wpa_psk_file +Optionally, WPA PSKs can be read from a separate text file +(containing a list of (PSK,MAC address) pairs. +.SS wpa_key_mgmt +Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or +both). +.SS wpa_pairwise +Set of accepted cipher suites (encryption algorithms) for +pairwise keys (unicast packets). See the example file for more +information. +.SS wpa_group_rekey +Time interval for rekeying GTK (broadcast/multicast encryption +keys) in seconds. +.SS wpa_strict_rekey +Rekey GTK when any STA that possesses the current GTK is leaving +the BSS. +.SS wpa_gmk_rekey +Time interval for rekeying GMK (master key used internally to +generate GTKs (in seconds). +.SH SEE ALSO +hostapd(8), hostapd_cli(8), /usr/share/examples/hostapd/hostapd.conf +.SH HISTORY +The hostapd.conf manual page and hostapd(8) functionality first appeared +in NetBSD 4.0. +.SH AUTHORS +This manual page is derived from the README and hostapd.conf files in the +hostapd distribution provided by Jouni Malinen <jkmaline@cc.hut.fi>. |