TOPEX Bytton (HSPA+ / LTE)
ByttonLTE(full)_genericUsermanual_sw306FAS_revN.1.docx
Page: 96 / 290
# version 2. However, there are many client implementations that do not handle
# the new version number correctly (they seem to drop the frames completely).
#eapol_version=2
# Optional displayable message sent with EAP Request-Identity. The first \0
# in this string will be converted to ASCII-0 (nul). This can be used to
# separate network info (comma separated list of attribute=value pairs); see,
# e.g., draft-adrangi-eap-network-discovery-07.txt.
#eap_message=hello
#eap_message=hello\0networkid=netw,nasid=foo,portid=0,NAIRealms=example.com
# WEP rekeying (disabled if key lengths are not set or are set to 0)
# Key lengths for default/broadcast and individual/unicast keys:
# 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits)
# 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits)
#wep_key_len_broadcast=5
#wep_key_len_unicast=5
# Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once)
#wep_rekey_period=300
# EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if
# only broadcast keys are used)
eapol_key_index_workaround=0
# EAP reauthentication period in seconds (default: 3600 seconds; 0 = disable
# reauthentication).
#eap_reauth_period=3600
# Use PAE group address (01:80:c2:00:00:03) instead of individual target
# address when sending EAPOL frames with driver=wired. This is the most common
# mechanism used in wired authentication, but it also requires that the port
# is only used by one station.
#use_pae_group_addr=1
##### RADIUS client configuration
#############################################
# for IEEE 802.1X with external Authentication Server, IEEE 802.11
# authentication with external ACL for MAC addresses, and accounting
# RADIUS authentication server
#auth_server_addr=127.0.0.1
#auth_server_port=1812
#auth_server_shared_secret=secret
# RADIUS accounting server
#acct_server_addr=127.0.0.1
#acct_server_port=1813
#acct_server_shared_secret=secret
Figure 5-43: Embedded Help for the parameters of 802.1x authentication for EAPOL.
Log examples of 802.11 authentication:
Jun 25 10:58:31 bytton daemon.info hostapd: wlan0: STA 58:1f:aa:dd:e2:f5 IEEE 802.11:
authenticated
Jun 25 10:58:31 bytton daemon.info hostapd: wlan0: STA 58:1f:aa:dd:e2:f5 IEEE 802.11: associated
(aid 2)
Jun 25 10:58:31 bytton daemon.info hostapd: wlan0: STA 58:1f:aa:dd:e2:f5 RADIUS: starting
accounting session 00000023-00000001
Jun 25 10:58:31 bytton daemon.info dnsmasq[1230]: DHCPREQUEST(br0) 10.0.0.14 58:1f:aa:dd:e2:f5
Jun 25 10:58:31 bytton daemon.info dnsmasq[1230]: DHCPACK(br0) 10.0.0.14 58:1f:aa:dd:e2:f5 cPhone-
4
----------------------------------
Jun 25 11:30:46 bytton daemon.info hostapd: wlan0: STA 58:1f:aa:dd:e2:f5 IEEE 802.11:
disassociated