diff options
author | Christian Poessinger <christian@poessinger.com> | 2019-11-20 08:20:57 +0100 |
---|---|---|
committer | Christian Poessinger <christian@poessinger.com> | 2019-11-20 08:20:57 +0100 |
commit | c11f229950ab9a2eb271fbb2ffb32ae41f7e949e (patch) | |
tree | e2124a489c1b091f5fc08bc544fce4f36a11be4a /docs/interfaces/wireless.rst | |
parent | afd4f2b46d8b8f8f75553a6d73ad388592c64750 (diff) | |
download | vyos-documentation-c11f229950ab9a2eb271fbb2ffb32ae41f7e949e.tar.gz vyos-documentation-c11f229950ab9a2eb271fbb2ffb32ae41f7e949e.zip |
wireless: add WPA/WPA2 enterprise with RADIUS auth
Diffstat (limited to 'docs/interfaces/wireless.rst')
-rw-r--r-- | docs/interfaces/wireless.rst | 69 |
1 files changed, 68 insertions, 1 deletions
diff --git a/docs/interfaces/wireless.rst b/docs/interfaces/wireless.rst index c1af9cdc..ceb41b5d 100644 --- a/docs/interfaces/wireless.rst +++ b/docs/interfaces/wireless.rst @@ -87,6 +87,73 @@ to set up a DHCP server to work with that network. You can - of course - also bridge the Wireless interface with any configured bridge (:ref:`bridge`) on the system. +WPA/WPA2 enterprise +******************* + +:abbr:`WPA (Wi-Fi Protected Access)` and WPA2 Enterprise in combination with +802.1x based authentication can be used to authenticate users or computers +in a domain. + +The wireless client (supplicant) authenticates against the RADIUS server +(authentication server) using an :abbr:`EAP (Extensible Authentication +Protocol)` method configured on the RADIUS server. The WAP (also referred +to as authenticator) role is to send all authentication messages between the +supplicant and the configured authentication server, thus the RADIUS server +is responsible for authenticating the users. + +The WAP in this example has the following characteristics: + +* IP address ``192.0.2.1/24`` +* Network ID (SSID) ``Enterprise-TEST`` +* WPA passphrase ``12345678`` +* Use 802.11n protocol +* Wireless channel ``1`` +* RADIUS server at ``192.0.3.10`` with shared-secret ``VyOSPassword`` + +.. code-block:: sh + + set interfaces wireless wlan0 address '192.0.2.1/24' + set interfaces wireless wlan0 type access-point + set interfaces wireless wlan0 channel 1 + set interfaces wireless wlan0 mode n + set interfaces wireless wlan0 ssid 'TEST' + set interfaces wireless wlan0 security wpa mode wpa2 + set interfaces wireless wlan0 security wpa cipher CCMP + set interfaces wireless wlan0 security wpa radius server 192.0.3.10 key 'VyOSPassword' + set interfaces wireless wlan0 security wpa radius server 192.0.3.10 port 1812 + +Resulting in + +.. code-block:: sh + + interfaces { + [...] + wireless wlan0 { + address 192.0.2.1/24 + channel 1 + mode n + security { + wpa { + cipher CCMP + mode wpa2 + radius { + server 192.0.3.10 { + key 'VyOSPassword' + port 1812 + } + } + } + } + ssid "Enterprise-TEST" + type access-point + } + } + system { + [...] + wifi-regulatory-domain DE + } + + Configuring Wireless Station ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -116,7 +183,7 @@ Resulting in } ssid TEST type station - } + } Operational Commands ^^^^^^^^^^^^^^^^^^^^ |