1 ##### hostapd configuration file ##############################################
2 # Empty lines and lines starting with # are ignored
4 # AP netdevice name (without 'ap' prefix, i.e., wlan0 uses wlan0ap for
8 # In case of madwifi driver, an additional configuration parameter, bridge,
9 # must be used to notify hostapd if the interface is included in a bridge. This
10 # parameter is not used with Host AP driver.
13 # Driver interface type (hostap/wired/madwifi; default: hostap)
16 # hostapd event logger configuration
18 # Two output method: syslog and stdout (only usable if not forking to
21 # Module bitfield (ORed bitfield of modules that will be logged; -1 = all
23 # bit 0 (1) = IEEE 802.11
24 # bit 1 (2) = IEEE 802.1X
27 # bit 4 (16) = driver interface
30 # Levels (minimum value for logged events):
31 # 0 = verbose debugging
33 # 2 = informational messages
42 # Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = excessive
45 # Dump file for state information (on SIGUSR1)
46 dump_file=/tmp/hostapd.dump
49 ##### IEEE 802.11 related configuration #######################################
51 # SSID to be used in IEEE 802.11 management frames
54 ##### IEEE 802.1X-REV related configuration ###################################
56 # Require IEEE 802.1X authorization
59 # Optional displayable message sent with EAP Request-Identity. The first \0
60 # in this string will be converted to ASCII-0 (nul). This can be used to
61 # separate network info (comma separated list of attribute=value pairs); see,
62 # e.g., draft-adrangi-eap-network-discovery-07.txt.
64 #eap_message=hello\0networkid=netw,nasid=foo,portid=0,NAIRealms=example.com
66 # WEP rekeying (disabled if key lengths are not set or are set to 0)
67 # Key lengths for default/broadcast and individual/unicast keys:
68 # 5 = 40-bit WEP (also known as 64-bit WEP with 40 secret bits)
69 # 13 = 104-bit WEP (also known as 128-bit WEP with 104 secret bits)
70 #wep_key_len_broadcast=5
71 #wep_key_len_unicast=5
72 # Rekeying period in seconds. 0 = do not rekey (i.e., set keys only once)
75 # EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if
76 # only broadcast keys are used)
77 eapol_key_index_workaround=0
79 # EAP reauthentication period in seconds (default: 3600 seconds; 0 = disable
81 #eap_reauth_period=3600
84 ##### Integrated EAP server ###################################################
86 # Optionally, hostapd can be configured to use an integrated EAP server
87 # to process EAP authentication locally without need for an external RADIUS
88 # server. This functionality can be used both as a local authentication server
89 # for IEEE 802.1X/EAPOL and as a RADIUS server for other devices.
91 # Use integrated EAP server instead of external RADIUS authentication
92 # server. This is also needed if hostapd is configured to act as a RADIUS
93 # authentication server.
96 # Path for EAP server user database
97 #eap_user_file=/etc/hostapd.eap_user
99 # CA certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
100 #ca_cert=/etc/hostapd.ca.pem
102 # Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS
103 #server_cert=/etc/hostapd.server.pem
105 # Private key matching with the server certificate for EAP-TLS/PEAP/TTLS
106 # This may point to the same file as server_cert if both certificate and key
107 # are included in a single file. PKCS#12 (PFX) file (.p12/.pfx) can also be
108 # used by commenting out server_cert and specifying the PFX file as the
110 #private_key=/etc/hostapd.server.prv
112 # Passphrase for private key
113 #private_key_passwd=secret passphrase
115 # Enable CRL verification.
116 # Note: hostapd does not yet support CRL downloading based on CDP. Thus, a
117 # valid CRL signed by the CA is required to be included in the ca_cert file.
118 # This can be done by using PEM format for CA certificate and CRL and
119 # concatenating these into one file. Whenever CRL changes, hostapd needs to be
120 # restarted to take the new CRL into use.
121 # 0 = do not verify CRLs (default)
122 # 1 = check the CRL of the user certificate
123 # 2 = check all CRLs in the certificate path
126 # Configuration data for EAP-SIM database/authentication gateway interface.
127 # This is a text string in implementation specific format. The example
128 # implementation in eap_sim_db.c uses this as the file name for the GSM
129 # authentication triplets.
130 #eap_sim_db=/etc/hostapd.sim_db
133 ##### IEEE 802.11f - Inter-Access Point Protocol (IAPP) #######################
135 # Interface to be used for IAPP broadcast packets
139 ##### RADIUS client configuration #############################################
140 # for IEEE 802.1X with external Authentication Server, IEEE 802.11
141 # authentication with external ACL for MAC addresses, and accounting
143 # The own IP address of the access point (used as NAS-IP-Address)
144 own_ip_addr=127.0.0.1
146 # Optional NAS-Identifier string for RADIUS messages. When used, this should be
147 # a unique to the NAS within the scope of the RADIUS server. For example, a
148 # fully qualified domain name can be used here.
149 #nas_identifier=ap.example.com
151 # RADIUS authentication server
152 #auth_server_addr=127.0.0.1
153 #auth_server_port=1812
154 #auth_server_shared_secret=secret
156 # RADIUS accounting server
157 #acct_server_addr=127.0.0.1
158 #acct_server_port=1813
159 #acct_server_shared_secret=secret
161 # Secondary RADIUS servers; to be used if primary one does not reply to
162 # RADIUS packets. These are optional and there can be more than one secondary
164 #auth_server_addr=127.0.0.2
165 #auth_server_port=1812
166 #auth_server_shared_secret=secret2
168 #acct_server_addr=127.0.0.2
169 #acct_server_port=1813
170 #acct_server_shared_secret=secret2
172 # Retry interval for trying to return to the primary RADIUS server (in
173 # seconds). RADIUS client code will automatically try to use the next server
174 # when the current server is not replying to requests. If this interval is set,
175 # primary server will be retried after configured amount of time even if the
176 # currently used secondary server is still working.
177 #radius_retry_primary_interval=600
180 # Interim accounting update interval
181 # If this is set (larger than 0) and acct_server is configured, hostapd will
182 # send interim accounting updates every N seconds. Note: if set, this overrides
183 # possible Acct-Interim-Interval attribute in Access-Accept message. Thus, this
184 # value should not be configured in hostapd.conf, if RADIUS server is used to
185 # control the interim interval.
186 # This value should not be less 600 (10 minutes) and must not be less than
188 #radius_acct_interim_interval=600
191 ##### RADIUS authentication server configuration ##############################
193 # hostapd can be used as a RADIUS authentication server for other hosts. This
194 # requires that the integrated EAP authenticator is also enabled and both
195 # authentication services are sharing the same configuration.
197 # File name of the RADIUS clients configuration for the RADIUS server. If this
198 # commented out, RADIUS server is disabled.
199 #radius_server_clients=/etc/hostapd.radius_clients
201 # The UDP port number for the RADIUS authentication server
202 #radius_server_auth_port=1812
204 # Use IPv6 with RADIUS server (IPv4 will also be supported using IPv6 API)
205 #radius_server_ipv6=1
208 ##### WPA/IEEE 802.11i configuration ##########################################
210 # Enable WPA. Setting this variable configures the AP to require WPA (either
211 # WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either
212 # wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.
213 # For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),
214 # RADIUS authentication server must be configured, and WPA-EAP must be included
216 # This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)
217 # and/or WPA2 (full IEEE 802.11i/RSN):
219 # bit1 = IEEE 802.11i/RSN (WPA2) (dot11RSNAEnabled)
222 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
223 # secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase
224 # (8..63 characters) that will be converted to PSK. This conversion uses SSID
225 # so the PSK changes when ASCII passphrase is used and the SSID is changed.
226 # wpa_psk (dot11RSNAConfigPSKValue)
227 # wpa_passphrase (dot11RSNAConfigPSKPassPhrase)
228 #wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
229 #wpa_passphrase=secret passphrase
231 # Optionally, WPA PSKs can be read from a separate text file (containing list
232 # of (PSK,MAC address) pairs. This allows more than one PSK to be configured.
233 # Use absolute path name to make sure that the files can be read on SIGHUP
234 # configuration reloads.
235 #wpa_psk_file=/etc/hostapd.wpa_psk
237 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
238 # entries are separated with a space.
239 # (dot11RSNAConfigAuthenticationSuitesTable)
240 #wpa_key_mgmt=WPA-PSK WPA-EAP
242 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
243 # (unicast packets). This is a space separated list of algorithms:
244 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]
245 # TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]
246 # Group cipher suite (encryption algorithm for broadcast and multicast frames)
247 # is automatically selected based on this configuration. If only CCMP is
248 # allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,
249 # TKIP will be used as the group cipher.
250 # (dot11RSNAConfigPairwiseCiphersTable)
251 #wpa_pairwise=TKIP CCMP
253 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
254 # seconds. (dot11RSNAConfigGroupRekeyTime)
257 # Rekey GTK when any STA that possesses the current GTK is leaving the BSS.
258 # (dot11RSNAConfigGroupRekeyStrict)
261 # Time interval for rekeying GMK (master key used internally to generate GTKs
265 # Enable IEEE 802.11i/RSN/WPA2 pre-authentication. This is used to speed up
266 # roaming be pre-authenticating IEEE 802.1X/EAP part of the full RSN
267 # authentication and key handshake before actually associating with a new AP.
268 # (dot11RSNAPreauthenticationEnabled)
271 # Space separated list of interfaces from which pre-authentication frames are
272 # accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all
273 # interface that are used for connections to other APs. This could include
274 # wired interfaces and WDS links. The normal wireless data interface towards
275 # associated stations (e.g., wlan0) should not be added, since
276 # pre-authentication is only used with APs other than the currently associated
278 #rsn_preauth_interfaces=eth0