JODY-W2 - System integration manual
UBX-18068879 - R14
Software
Page 53 of 84
C1 - Public
To set up the SSID and the encryption mechanisms:
To assign an IP to the interface:
Additionally, we can run a DHCP server on the interface to automatically assign IP addresses to the
connected clients.
Command to start the DHCP server:
☞
By providing the -f option in the command, the server will run in the foreground with logs.
3.11.7.2
Using hostapd
Hostapd
is an open-source configuration manager used to bring up the access point. Sources can be
found in the location:
Here is a sample command used to create access point:
☞
If the command is used with
-dddt
option,
hostapd
generates detailed logs.
Here
hostapd.conf
is used as a configuration file that has all the information related to the channel,
security etc. A sample of file which can be used is given below.
The access point is configured with an SSID value “
jody-w2
” with the passphrase
12345678
for WPA2
based encryption. It operates in channel 36 with 80 MHz bandwidth.
./uaputl.exe
–
i uap0 sys_cfg_80211d state 1 country DE
./uaputl.exe -i uap0 sys_cfg_rates 0x8c 0x98 0xb0 0x12 0x24 0x48 0x60 0x6c
./uaputl.exe -i uap0 sys_cfg_channel 36 2
./uaputl.exe -i uap0 httxcfg 0x16f
./uaputl.exe -i uap0 sys_cfg_11n 1 0x16f 3 0x09E1E008 0xff
./uaputl.exe -i uap0 vhtcfg 2 3 1 0x33c07130 0xfffe 0xfffe
./uaputl.exe -i uap0 sys_cfg_protocol 32
./uaputl.exe -i uap0 sys_cfg_cipher 8 8
./uaputl.exe -i uap0 sys_cfg_wpa_passphrase 12345678
./uaputl.exe -i uap0 sys_cfg_ssid jody-w2
./uaputl.exe -i uap0 bss_start
ifconfig uap0 192.168.1.1
File: udhcpd.conf
interface uap0
start 192.168.1.10
end 192.168.1.200
option subnet 255.255.255.0
udhcpd udhcpd.conf
./hostapd ./hostapd.conf -B