summaryrefslogtreecommitdiff
path: root/src/conf_mode/interfaces-wireless.py
AgeCommit message (Collapse)Author
2020-03-23ifconfig: T2154: fixing failure to start-stop-daemonThomas Mangin
2020-03-23wireless: T2151: switch to iw when adding and deleting interfacesChristian Poessinger
2020-03-23Merge pull request #258 from thomas-mangin/31-vrfChristian Poessinger
tunnel: T31: fix vrf deletion, add support for vrf on tunnels
2020-03-23ifconfig: T31: convert all interface to set_vrf apiThomas Mangin
2020-03-22wireless: T2151: calculate MAC address only if not deletedChristian Poessinger
Calculation of the locally administered MAC address should only be performed when the interface is not deleted.
2020-03-22wireless: T2151: rename dict member from type to op_modeChristian Poessinger
2020-03-22wireless: T2151: calculate locally administered MAC address per SSIDChristian Poessinger
According to http://wiki.stocksy.co.uk/wiki/Multiple_SSIDs_with_hostapd every SSID served by access-point should run on its own, locally administered MAC address. Take the phy's interface MAC address as base and calculate a per interface locally administered MAC address.
2020-03-22wireless: T1627: add validator on physical-interfaceChristian Poessinger
A physical (phy) interface is mandatory for WiFi to work.
2020-03-22wireless: T1627: bugfix reading physical-interface to configChristian Poessinger
2020-03-08vrf: T31: add missing import netifaces.interfacesChristian Poessinger
2020-03-08wireless: T1627: configure own_ip_addr to be compliant with the RADIUS protocolChristian Poessinger
2020-03-08wireless: radius: T2110: aupport server disable optionChristian Poessinger
2020-03-08vrf: T31: fix invalid variable referenceChristian Poessinger
With commit d61cab4 ("vrf: T31: enable vrf support for wireless interface") an unknown variable has been referenced.
2020-03-08vrf: T31: enable vrf support for wireless interfaceChristian Poessinger
2020-03-08vrf: T31: support VRF usage on VLAN/VIF interfacesChristian Poessinger
2020-03-07wireless: T2107: fix connecting to networks without passphraseChristian Poessinger
2020-03-06wireless: T2105: Add check interface stateDmitriyEshenko
2020-03-03interfaces: T1579: fix c/p error when evaluating ↵Christian Poessinger
os.environ['VYOS_TAGNODE_VALUE'] This has been only a theoretical problem but then the error condition was triggered - only an error has been printed instead of raising an Exception.
2020-02-17wireless: T2048: fix wrong verify() logic when type is monitorChristian Poessinger
2020-01-03ifconfig: T1939: provide abstraction for interface "ip" optionChristian Poessinger
Provide an XML/Python abstraction to * ip disable-arp-filter * ip enable-arp-accept * ip enable-arp-announce * ip enable-arp-ignore The old implementation can co-exist until the last interfaces have been migrated.
2020-01-02ifconfig: T1557: refactor apply_vlan_config() functionChristian Poessinger
instead of providing three copies of the same method in bonding, ethernet and wireless, make a common function in vyos.ifconfig_vlan.apply_vlan_config().
2019-11-23wireless: T1627: support station modeChristian Poessinger
Tested using: ------------- set interfaces wireless wlan0 address 'dhcp' set interfaces wireless wlan0 channel '0' set interfaces wireless wlan0 description '1' set interfaces wireless wlan0 physical-device 'phy0' set interfaces wireless wlan0 security wpa passphrase '12345678' set interfaces wireless wlan0 ssid 'VyOS-TEST' set interfaces wireless wlan0 type 'station'
2019-11-23wireless: T1627: RADIUS servers must have a key specifiedChristian Poessinger
2019-11-23wireless: T1627: change RADIUS CLI syntaxChristian Poessinger
Adopt RADIUS configuration and harmonize it with the rest of VyOS. Move the following configuration block: security { wpa { cipher CCMP mode wpa2 radius-server 172.16.100.10 { port 1812 secret secretkey } radius-server 172.16.100.11 { port 1812 secret secretkey } } } to the harmonized version of: security { wpa { cipher CCMP mode wpa2 radius { server 172.16.100.10 { port 1812 secret secretkey } server 172.16.100.11 { port 1812 secret secretkey } } } } And add the new "set interfaces wireless wlan0 security wpa radius source-address" CLI command to specify the origin of any RADIUS query on systems having multiple IP addresses.
2019-11-23wireless: T1627: re-order WPA key in hostapd configChristian Poessinger
2019-11-23wireless: T1627: fix generated ht_capab and vht_capabChristian Poessinger
If no capabilities are configured on the CLI - there should also be no ht_capab or vht_capab entry in the resulting hostapd.conf
2019-11-23wireless: T1627: initial rewrite in XML/Python styleChristian Poessinger
Working: - Wireless modes b, g, n, ac - WPA/WPA2 psk and RADIUS (tested using Microsoft NPS)