亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? wpa_supplicant.conf.sgml

?? 一個Linux下無線網卡的設置工具
?? SGML
字號:
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN"><refentry>  <refmeta>    <refentrytitle>wpa_supplicant.conf</refentrytitle>    <manvolnum>5</manvolnum>  </refmeta>  <refnamediv>    <refname>wpa_supplicant.conf</refname>    <refpurpose>configuration file for wpa_supplicant</refpurpose>  </refnamediv>  <refsect1>    <title>Overview</title>    <para><command>wpa_supplicant</command> is configured using a text    file that lists all accepted networks and security policies,    including pre-shared keys. See the example configuration file,    probably in <command>/usr/share/doc/wpa_supplicant/</command>, for    detailed information about the configuration format and supported    fields.</para>    <para>All file paths in this configuration file should use full    (absolute, not relative to working directory) path in order to allow    working directory to be changed. This can happen if wpa_supplicant is    run in the background.</para>    <para>Changes to configuration file can be reloaded be sending    SIGHUP signal to <command>wpa_supplicant</command> ('killall -HUP    wpa_supplicant'). Similarly, reloading can be triggered with    'wpa_cli reconfigure' command.</para>    <para>Configuration file can include one or more network blocks,    e.g., one for each used SSID. wpa_supplicant will automatically    select the best betwork based on the order of network blocks in    the configuration file, network security level (WPA/WPA2 is    prefered), and signal strength.</para>  </refsect1>  <refsect1>    <title>Quick Examples</title>    <orderedlist>      <listitem>      <para>WPA-Personal (PSK) as home network and WPA-Enterprise with      EAP-TLS as work network.</para><blockquote><programlisting># allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' groupctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheel## home network; allow all valid ciphersnetwork={	ssid="home"	scan_ssid=1	key_mgmt=WPA-PSK	psk="very secret passphrase"}## work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphersnetwork={	ssid="work"	scan_ssid=1	key_mgmt=WPA-EAP	pairwise=CCMP TKIP	group=CCMP TKIP	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"}</programlisting></blockquote>         </listitem>      <listitem>	<para>WPA-RADIUS/EAP-PEAP/MSCHAPv2 with RADIUS servers that        use old peaplabel (e.g., Funk Odyssey and SBR, Meetinghouse        Aegis, Interlink RAD-Series)</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP	eap=PEAP	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase1="peaplabel=0"	phase2="auth=MSCHAPV2"}</programlisting></blockquote>      </listitem>      <listitem>	<para>EAP-TTLS/EAP-MD5-Challenge configuration with anonymous        identity for the unencrypted use. Real identity is sent only        within an encrypted TLS tunnel.</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP	eap=TTLS	identity="user@example.com"	anonymous_identity="anonymous@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase2="auth=MD5"}</programlisting></blockquote>      </listitem>      <listitem>	<para>IEEE 802.1X (i.e., no WPA) with dynamic WEP keys        (require both unicast and broadcast); use EAP-TLS for        authentication</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="1x-test"	scan_ssid=1	key_mgmt=IEEE8021X	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	eapol_flags=3}</programlisting></blockquote>      </listitem>      <listitem>	<para>Catch all example that allows more or less all        configuration modes. The configuration options are used based        on what security policy is used in the selected SSID. This is        mostly for testing and is not recommended for normal        use.</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE	pairwise=CCMP TKIP	group=CCMP TKIP WEP104 WEP40	psk="very secret passphrase"	eap=TTLS PEAP TLS	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	phase1="peaplabel=0"	ca_cert2="/etc/cert/ca2.pem"	client_cert2="/etc/cer/user.pem"	private_key2="/etc/cer/user.prv"	private_key2_passwd="password"}</programlisting></blockquote>      </listitem>      <listitem>	<para>Authentication for wired Ethernet. This can be used with       'wired' interface (-Dwired on command line).</para><blockquote><programlisting>ctrl_interface=/var/run/wpa_supplicantctrl_interface_group=wheelap_scan=0network={	key_mgmt=IEEE8021X	eap=MD5	identity="user"	password="password"	eapol_flags=0}</programlisting></blockquote>      </listitem>    </orderedlist>  </refsect1>  <refsect1>    <title>Certificates</title>    <para>Some EAP authentication methods require use of    certificates. EAP-TLS uses both server side and client    certificates whereas EAP-PEAP and EAP-TTLS only require the server    side certificate. When client certificate is used, a matching    private key file has to also be included in configuration. If the    private key uses a passphrase, this has to be configured in    wpa_supplicant.conf ("private_key_passwd").</para>    <para>wpa_supplicant supports X.509 certificates in PEM and DER    formats. User certificate and private key can be included in the    same file.</para>    <para>If the user certificate and private key is received in    PKCS#12/PFX format, they need to be converted to suitable PEM/DER    format for wpa_supplicant. This can be done, e.g., with following    commands:</para><blockquote><programlisting># convert client certificate and private key to PEM formatopenssl pkcs12 -in example.pfx -out user.pem -clcerts# convert CA certificate (if included in PFX file) to PEM formatopenssl pkcs12 -in example.pfx -out ca.pem -cacerts -nokeys</programlisting></blockquote>  </refsect1>  <refsect1>    <title>See Also</title>    <para>      <citerefentry>	<refentrytitle>wpa_supplicant</refentrytitle>	<manvolnum>8</manvolnum>      </citerefentry>      <citerefentry>	<refentrytitle>openssl</refentrytitle>	<manvolnum>1</manvolnum>      </citerefentry>    </para>  </refsect1></refentry>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
av成人免费在线| 国产剧情av麻豆香蕉精品| 成人免费视频一区二区| 久久99久久精品| 久久综合一区二区| 一区二区国产视频| 国产精品69久久久久水密桃| 奇米精品一区二区三区在线观看| 亚洲第一福利一区| 狠狠色综合播放一区二区| 国产精品1024| 911精品国产一区二区在线| 久久综合久久鬼色| 悠悠色在线精品| 欧美aaaaa成人免费观看视频| 五月婷婷久久丁香| 99re在线精品| 欧美mv日韩mv国产网站app| 中文字幕av一区二区三区| 日本一二三不卡| 亚洲国产日韩av| 日韩午夜精品视频| 婷婷夜色潮精品综合在线| 五月婷婷欧美视频| 欧美精品一区视频| 久久精品国产一区二区| 国内精品国产三级国产a久久| 99久久99久久精品国产片果冻 | 午夜精品影院在线观看| 国产一区二区视频在线| av福利精品导航| 中文字幕在线不卡一区| 久久国产尿小便嘘嘘| 久久久久国产精品麻豆ai换脸 | www.色综合.com| 精品国产乱码久久久久久免费| 亚洲一区二区在线观看视频| 国产精品一区在线观看乱码 | 捆绑紧缚一区二区三区视频 | 热久久久久久久| 色综合久久综合网欧美综合网 | 粉嫩av亚洲一区二区图片| 欧美伊人久久久久久久久影院 | 欧美一二三区精品| 中文在线一区二区| 日韩精品亚洲专区| eeuss国产一区二区三区| 欧美一区二区福利视频| 亚洲伦在线观看| 国产精品乡下勾搭老头1| 欧美精品vⅰdeose4hd| 国产精品国产a| 国产成人鲁色资源国产91色综 | 久久精品视频在线看| 亚洲国产欧美在线| 99re这里只有精品首页| 国产午夜精品久久久久久免费视| 青青草一区二区三区| 精品婷婷伊人一区三区三| 1024精品合集| 波多野结衣91| 国产欧美日韩亚州综合 | 久久嫩草精品久久久久| 一级女性全黄久久生活片免费| 国产成人免费在线视频| 精品国产91乱码一区二区三区| 日韩中文字幕区一区有砖一区| 在线一区二区观看| 综合久久给合久久狠狠狠97色 | 亚洲一级二级在线| jvid福利写真一区二区三区| 中文字幕av资源一区| 国产成人av影院| 日本一区二区三区电影| 国产91综合网| 国产精品国产精品国产专区不蜜 | 狠狠色2019综合网| 欧美mv日韩mv国产网站| 蜜臀av一区二区三区| 日韩视频中午一区| 蜜臀av一区二区| 久久夜色精品国产欧美乱极品| 国产伦精一区二区三区| 精品国产百合女同互慰| 国产精品一区专区| 1区2区3区国产精品| 欧美视频一区二区| 天堂久久一区二区三区| 欧美成人a在线| 久久国产精品第一页| 久久嫩草精品久久久久| 成人免费观看视频| 亚洲柠檬福利资源导航| 欧美自拍偷拍一区| 日本在线观看不卡视频| 精品国产乱码久久久久久浪潮| 国产精品一区二区不卡| 亚洲婷婷在线视频| 精品视频色一区| 久久国产剧场电影| 亚洲免费在线看| 日韩一区二区视频在线观看| 国产精品2024| 亚洲va在线va天堂| 久久久综合网站| 色婷婷亚洲精品| 韩国v欧美v日本v亚洲v| 亚洲日本乱码在线观看| 日韩一区二区在线免费观看| 懂色av一区二区在线播放| 亚洲成人先锋电影| 国产网站一区二区三区| 欧美特级限制片免费在线观看| 国产一区二区在线看| 樱花影视一区二区| 国产午夜一区二区三区| 欧美日韩激情在线| 国产精品亚洲第一区在线暖暖韩国 | 色综合夜色一区| 美女一区二区三区在线观看| 亚洲精品伦理在线| 精品对白一区国产伦| 欧洲中文字幕精品| 成人午夜激情片| 青椒成人免费视频| 亚洲一区二区免费视频| 日本一区二区三区在线不卡| 日韩欧美国产一二三区| 在线精品视频一区二区| 成人黄色国产精品网站大全在线免费观看| 香蕉久久夜色精品国产使用方法| 久久精品视频一区二区三区| 欧美午夜精品一区二区蜜桃| 本田岬高潮一区二区三区| 免费看黄色91| 亚洲一区二区三区在线| 国产精品不卡在线观看| 国产色一区二区| 久久这里只有精品首页| 欧美欧美午夜aⅴ在线观看| 91丨九色丨蝌蚪丨老版| 成人在线一区二区三区| 日日摸夜夜添夜夜添精品视频| 曰韩精品一区二区| 136国产福利精品导航| 国产精品久久毛片av大全日韩| 制服丝袜激情欧洲亚洲| 在线视频一区二区免费| 粉嫩蜜臀av国产精品网站| 欧美日韩午夜在线视频| 91在线播放网址| 91麻豆自制传媒国产之光| 成人激情综合网站| 国产成+人+日韩+欧美+亚洲| 国产成人激情av| 成人黄动漫网站免费app| 老司机一区二区| 久久国产三级精品| 天堂久久久久va久久久久| 日韩在线卡一卡二| 日韩在线观看一区二区| 六月丁香婷婷久久| 久久精品国产亚洲a| 激情偷乱视频一区二区三区| 国产原创一区二区| 国产成人精品亚洲777人妖| 国产精品一二三四五| 成人ar影院免费观看视频| 国产一区二三区| 成人美女在线视频| 色综合 综合色| 欧美中文字幕不卡| 欧美一区二区三区免费观看视频| 首页欧美精品中文字幕| 午夜不卡av在线| 日本道免费精品一区二区三区| 久久美女艺术照精彩视频福利播放 | 国产亚洲女人久久久久毛片| av中文一区二区三区| 99久久99精品久久久久久| 欧美日韩国产区一| 欧美精品一区二区三区一线天视频| 国产午夜精品一区二区三区嫩草| 国产精品伦理一区二区| 亚洲欧洲日本在线| 日韩在线一二三区| 成人av中文字幕| 欧美一级电影网站| 国产精品免费久久久久| 亚洲最快最全在线视频| 亚洲1区2区3区4区| 国产suv精品一区二区883| 欧美色视频在线| 欧美—级在线免费片| 中文字幕免费一区| 一区二区在线观看免费视频播放| 国产乱妇无码大片在线观看| 欧美无人高清视频在线观看| 久久精品亚洲一区二区三区浴池| 亚洲一区中文在线|