diff options
| author | Christian Poessinger <christian@poessinger.com> | 2019-11-20 08:20:57 +0100 | 
|---|---|---|
| committer | Christian Poessinger <christian@poessinger.com> | 2019-11-20 08:20:57 +0100 | 
| commit | c11f229950ab9a2eb271fbb2ffb32ae41f7e949e (patch) | |
| tree | e2124a489c1b091f5fc08bc544fce4f36a11be4a /docs | |
| parent | afd4f2b46d8b8f8f75553a6d73ad388592c64750 (diff) | |
| download | vyos-documentation-c11f229950ab9a2eb271fbb2ffb32ae41f7e949e.tar.gz vyos-documentation-c11f229950ab9a2eb271fbb2ffb32ae41f7e949e.zip | |
wireless: add WPA/WPA2 enterprise with RADIUS auth
Diffstat (limited to 'docs')
| -rw-r--r-- | docs/interfaces/wireless.rst | 69 | 
1 files changed, 68 insertions, 1 deletions
| diff --git a/docs/interfaces/wireless.rst b/docs/interfaces/wireless.rst index c1af9cdc..ceb41b5d 100644 --- a/docs/interfaces/wireless.rst +++ b/docs/interfaces/wireless.rst @@ -87,6 +87,73 @@ to set up a DHCP server to work with that network. You can - of course - also  bridge the Wireless interface with any configured bridge (:ref:`bridge`) on  the system. +WPA/WPA2 enterprise +******************* + +:abbr:`WPA (Wi-Fi Protected Access)` and WPA2 Enterprise in combination with +802.1x based authentication can be used to authenticate users or computers +in a domain. + +The wireless client (supplicant) authenticates against the RADIUS server +(authentication server) using an :abbr:`EAP (Extensible Authentication +Protocol)`  method configured on the RADIUS server. The WAP (also referred +to as authenticator) role is to send all authentication messages between the +supplicant and the configured authentication server, thus the RADIUS server +is responsible for authenticating the users. + +The WAP in this example has the following characteristics: + +* IP address ``192.0.2.1/24`` +* Network ID (SSID) ``Enterprise-TEST`` +* WPA passphrase ``12345678`` +* Use 802.11n protocol +* Wireless channel ``1`` +* RADIUS server at ``192.0.3.10`` with shared-secret ``VyOSPassword`` + +.. code-block:: sh + +  set interfaces wireless wlan0 address '192.0.2.1/24' +  set interfaces wireless wlan0 type access-point +  set interfaces wireless wlan0 channel 1 +  set interfaces wireless wlan0 mode n +  set interfaces wireless wlan0 ssid 'TEST' +  set interfaces wireless wlan0 security wpa mode wpa2 +  set interfaces wireless wlan0 security wpa cipher CCMP +  set interfaces wireless wlan0 security wpa radius server 192.0.3.10 key 'VyOSPassword' +  set interfaces wireless wlan0 security wpa radius server 192.0.3.10 port 1812 + +Resulting in + +.. code-block:: sh + +  interfaces { +    [...] +    wireless wlan0 { +          address 192.0.2.1/24 +          channel 1 +          mode n +          security { +              wpa { +                  cipher CCMP +                  mode wpa2 +                  radius { +                      server 192.0.3.10 { +                          key 'VyOSPassword' +                          port 1812 +                      } +                  } +              } +          } +          ssid "Enterprise-TEST" +          type access-point +      } +  } +  system { +    [...] +    wifi-regulatory-domain DE +  } + +  Configuring Wireless Station  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -116,7 +183,7 @@ Resulting in        }        ssid TEST        type station -	} +    }  Operational Commands  ^^^^^^^^^^^^^^^^^^^^ | 
