How to set up Ubuntu as wireless accesspoint?

Just how can I set up my WiFi to be made use of as wireless access point on Ubuntu Server?

I have a neighborhood Ubuntu Server, it has a wireless card in it (802.11 a/b/g/ n ) and also I actually intend to set it up as an 802.11 n accessibility factor given that my regular accessibility factor does not sustain N.

It requires to function as a button too so I can connect and also get DHPC via.

Modify : I do not see Network Manager as an excellent remedy given that it relies on a great deal of X11 plans, and also i do not desire that on a server.

0
2019-05-07 12:42:42
Source Share
Answers: 3

Click on your NetworkManager symbol in the panel, and also pick "Create Wireless network ..." You need to have the ability to set this up as a "System" (in contrast to "User") link.

You claim that this gets on a server, so probably you're accessing the server via SSH just. Because instance, you can attempt some remote X link ; or attempt to set up NetworkManager via the command line, which need to be feasible, if non - unimportant.

0
2019-05-09 07:58:10
Source

I located a good thread. It needs to operate in Ubuntu 10.04 no worry. Additionally it is CLI so it does not require any kind of X libs in all. :)

0
2019-05-08 15:09:29
Source

This is a respectable (if a little obsolete [if 2006 is obsoleted ]) write-up which lays out just how to do this from the command line.

http://www.linux.com/archive/feed/55617

Assuming your wireless tool functions OK you can possibly dive right in at the linking area concerning midway down.


Wi - Fi Protected Access variation 2 (WPA2) is coming to be the de facto criterion for safeguarding wireless networks, and also a required attribute for all new Wi - Fi items licensed by the Wi-Fi Alliance. Most of us recognize the security weak points of its precursor, WEP ; this moment they obtained it right. Below's just how to implement the WPA2 method on a Linux host and also create a safe and secure wireless access point (WAP) for your network.

The majority of customer - quality business WAPs run in the very same straightforward fashion : they create a bridge in between a wired (Ethernet) network user interface and also a wireless one. That's specifically what we'll do also. The WAP component will certainly be taken care of by the hostapd daemon, so you have to select a wireless user interface it sustains. Amongst the sustained NICs are those with Prism 2/2.5/ 3, Atheros ar521x, and also Prism GT/Duette/Indigo chipsets ; a checklist is readily available on the hostapd homepage, in addition to web links for Linux vehicle drivers for each and every chipset. I have an Atheros AR5212 - based PCI card mounted on my WAP, which is sustained by hostapd. Although any kind of Pentium (or more recent) system will certainly function, some PCI wireless cards call for PCI 2.2 to run, so see to it to examine your system's motherboard requirements prior to acquiring. You will certainly additionally require an Ethernet user interface that's sustained by Linux for attaching your WAP to the LAN ; most on - board user interfaces will certainly function simply great.

My arrangement is based upon Debian Testing (Etch), yet any kind of GNU/Linux circulation with a current 2.6 bit will certainly function. The bit has to sustain 802.1 d Ethernet Bridging (CONFIG_BRIDGE) and also Wireless LAN (CONFIG_NET_RADIO). The majority of default supply bits have these attributes made it possible for, yet if you favor to construct your very own bit, see to it to include these alternatives. The only various other plans you require to install, besides hostapd, are bridge-utils and also wireless-tools. Significant GNU/Linux circulations supply binary plans for all these programs, yet if you favor to construct them from resource, you can locate even more details on their homepages.

Prior to linking with each other both user interfaces we have to place the wireless user interface (in my instance ath0 ; readjust it to match your arrangement) in hostap or Master setting. Generally this is as straightforward as running iwconfig ath0 setting Master, yet given that wlan assistance in Linux is not yet standard, some vehicle drivers might require added arrangement. If you have an Atheros - based user interface you additionally require to run the adhering to : wlanconfig ath0 destroy; wlanconfig ath0 create wlandev wifi0 wlanmode ap prior to the iwconfig command. Afterwards, running iwconfig ath0 will certainly return mode:Master, to name a few.

Currently allow's create the bridge. We'll think that the Ethernet user interface is eth0 :

ifconfig eth0 0.0.0.0 up
ifconfig ath0 0.0.0.0 up
brctl addbr br0
brctl addif br0 eth0
brctl addif br0 ath0

And also for quiting the bridge, you need to run :

ifconfig br0 down
ifconfig eth0 0.0.0.0 down
ifconfig ath0 0.0.0.0 down
brctl delif br0 eth0
brctl delif br0 ath0
brctl delbr br0

You can additionally offer an IP address to the br0 user interface if you intend to access the WAP host from the network, making use of as an example SSH. Each circulation supplies its very own means to set up the network ; if you make use of Debian (or any kind of Debian - based circulation, such as Ubuntu) you can complete all the previous commands by merely including the complying with to your /etc/network/interfaces documents :

auto ath0 br0

iface ath0 inet manual
        pre-up wlanconfig ath0 destroy
        pre-up wlanconfig ath0 create wlandev wifi0 wlanmode ap
        post-down wlanconfig ath0 destroy
        wireless-mode master

iface br0 inet manual
        bridge_ports eth0 ath0

Keep in mind that ifupdown takes care of eth0 instantly, so you do not require a different verse for it in /etc/network/interfaces. To validate that the bridge is set up appropriately, run brctl show. You need to get something similar to this in return :

bridge name     bridge id               STP enabled     interfaces
br0             8000.00032f2481f0       no              ath0
                                                        eth0

Prior to beginning to tinker hostapd we require a pass expression for WPA2. Similar to all passwords, it needs to be arbitrary and also hence tough to presume. A wonderful means to get an arbitrary pass expression is to see Gibson Research Corp.'s Ultra High Security Password Generator and also make use of the 3rd password it develops-- the one labelled 63 arbitrary alpha - numerical personalities (a - z, A - Z, 0 - 9). Having a passphrase that consists of non - alpha - numerical ASCII personalities (as an example!, @, etc) could be alluring, yet some customers - - particularly Windows XP - - do not appear to like them.

Currently create a new message documents called /etc/hostapd/wpa_psk and also paste your pass expression as :

00:00:00:00:00:00 PASSPHRASE

The first get rid of the absolutely nos suggests 'match all MAC addresses,' and also does specifically that. You can additionally make use of various passphrases for each and every customer by adding a new line to the documents with each customer's MAC address and also its passphrase. See to it that just origin has accessibility to that documents by running chmod 600 /etc/hostapd/wpa_psk.

Currently create a back-up of hostapd's major arrangement documents, /etc/hostapd/hostapd.conf, and also maintain it as a reference by running mv /etc/hostapd/hostapd.conf /etc/hostapd/hostapd.conf.orig. Create a new hostapd.conf documents and also paste the adhering to lines right into it :

interface=ath0
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
debug=0
dump_file=/tmp/hostapd.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ssid=My_Secure_WLAN
#macaddr_acl=1
#accept_mac_file=/etc/hostapd/accept
auth_algs=3
eapol_key_index_workaround=0
eap_server=0
wpa=3
wpa_psk_file=/etc/hostapd/wpa_psk
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
stakey=0

Change the components in italics with details that matches your arrangement. If you intend to permit just details customers to connect, remove the # personality from both lines over and also replicate the MAC addresses of those customers to /etc/hostapd/accept, and also make this documents obtainable just by origin (chmod 600). For additional information concerning the alternatives made use of, read the remarks in the back-up documents you developed formerly (hostapd.conf.orig).

Start the hostapd daemon (/etc/init.d/hostapd start) and also examine /var/log/daemon.log to validate that it functions. If the daemon does not show up, increase the debug degree (option debug= in hostapd.conf) to 4 and also attempt once more.

Currently if you check for readily available wireless networks from a customer, you need to see your ESSID. To connect to the WAP from a Linux customer, you require to install wpa_supplicant and also create an arrangement documents, wpa_supplicant. conf (in Debian, mounted in /etc/wpa_supplicant/) like the adhering to :

update_config=1
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

network={
        ssid="My_Secure_WLAN"
        proto=RSN
        key_mgmt=WPA-PSK
        pairwise=CCMP
        group=CCMP
        psk="PASSPHRASE"
        priority=5
}

Once more change the components in italics to match your arrangement and also run wpa_supplicant -i eth1 -D wext -c /etc/wpa_supplicant/wpa_supplicant.conf (changing eth1 with your wlan user interface name and also wext with the ideal vehicle driver for your card ; run wpa_supplicant with no alternatives for additional information). This command begins wpa_supplicant in the foreground and also attempts to connect to the WAP. If the result resembles the adhering to, you're ready :

Trying to associate with 00:11:22:33:44:55 (SSID='My_Secure_WLAN' freq=0 MHz)
Associated with 00:11:22:33:44:55
WPA: Key negotiation completed with 00:11:22:33:44:55 [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:11:22:33:44:55 completed (auth) [id=0 id_str=]

Offer a fixed IP address to your wireless user interface (or run a DHCP customer) and also attempt to sound a host inside your LAN to validate that the link functions.

Congratulations, you've simply constructed on your own a very personalized wireless access point. Although this arrangement is excellent for residence or tiny workplace use, you require something extra durable in the venture, with verification with a RADIUS server, or perhaps much better, a VPN.

0
2019-05-08 14:29:20
Source