Differences between version 7 and revision by previous author of WirelessNetworkSecurityNotes.
Other diffs: Previous Major Revision, Previous Revision, or view the Annotated Edit History
Newer page: | version 7 | Last edited on Thursday, January 27, 2005 5:02:41 pm | by JohnMcPherson | Revert |
Older page: | version 5 | Last edited on Friday, January 21, 2005 2:55:55 pm | by MattBrown | Revert |
@@ -6,9 +6,9 @@
Put your WLAN hosts behind a firewall to protect your wired LAN from wireless intruders. Install [pptpd(8)] on this firewall box and force wireless hosts to securely tunnel into your wired LAN. See the WirelessNetworkSecurityHowto.
!!! WPA
-To use the more secure WPA encryption rather than WEP, install the
+To use the more secure [
WPA]
encryption rather than WEP, install the
__wpasupplicant__ package. This provides a program that encrypts data sent to your wireless card. Unfortunately it can be difficult to set up, partly because it uses a lot of acronyms that you need to understand, and partly because of incompatibilities between wireless equipment.
WPA-PSK means use a __P__re-__S__hared __K__ey - ie both the AccessPoint
and the client know a shared secret.
@@ -55,11 +55,11 @@
</verbatim>
Now after your card is running (but not configured), you can set up your
connection/configuration to use WPA encryption by running
-<verbatim
>
+<pre
>
wpa_supplicant -B -i''ath0'' -D''madwifi''
-</verbatim
>
+</pre
>
replacing ''ath0'' with the correct interface (eth0, eth1, and so on) for
your machine, and ''madwifi'' with the correct driver for your wireless
card. -B means fork and go into the background. "__wpa_supplicant -h__" lists the following supported drivers:
* hostap