前言:
Linux系統(tǒng)下,可以配置無線網(wǎng)卡的工具和方法有很多,比如,nmcli,iw,wap_supplicant,hostapd?或者直接安裝桌面,圖形化配置等等
這些工具比較多,但基本都是一個共同的流程:先利用工具掃描到AP,然后設(shè)置無線網(wǎng)卡的連接方式,最后無線網(wǎng)卡連接無線路由,完成WiFi連接
那么在最近的無線網(wǎng)卡安裝學(xué)習(xí)中,感覺有一些地方自己還是比較糊涂,對于wap_supplicant這個工具的了解也不是太深,因此,本文對該工具的使用做一個總結(jié),也算是給自己留一個筆記吧。
一,
wpa_supplicant是什么工具?有什么特點?哪里獲取該工具?
網(wǎng)絡(luò)配置管理工具wpa_supplicant,該工具更多的用在無線網(wǎng)絡(luò)配置管理上,雖然此工具也支持有線網(wǎng)絡(luò)的配置和管理
其次,wpa_supplicant這個工具并不是所有的驅(qū)動都支持,最后wpa_supplicant目前只能連接到那些你已經(jīng)配置好ESSID的無線網(wǎng)絡(luò)。wireless-tools支持幾乎所有的無線網(wǎng)卡和驅(qū)動,但它不能連接到那些只支持WPA的AP
wpa_supplicant 被設(shè)計成一個“守護程序”,在后臺運行充當(dāng)控制無線連接的后端,主要實現(xiàn)與WPA 身份驗證器的秘鑰協(xié)商,并控制wlan驅(qū)動程序的漫游和IEEE802.11身份驗證/關(guān)聯(lián)
wpa_supplicant?具體支持哪些功能?
WPA-PSK (“WPA-Personal”)
帶有 EAP 的 WPA(例如,使用 RADIUS 身份驗證服務(wù)器)(“WPA-Enterprise”)
CCMP、TKIP、WEP104、WEP40 的密鑰管理
WPA 和完整的 IEEE 802.11i/RSN/WPA2
RSN:PMKSA 緩存、預(yù)身份驗證
IEEE 802.11r
IEEE 802.11w
Wi-Fi 保護設(shè)置 (WPS)
wpa_supplicant主要是以下三個命令構(gòu)成,依次是客戶端,密碼管理,服務(wù)端
[root@centos10 network-scripts]# wpa_
wpa_cli wpa_passphrase wpa_supplicant
例如,我已經(jīng)配置好的無線網(wǎng)卡使用iwlist掃描到的WiFi:
無線網(wǎng)卡的名稱是wls35u2,?ESSID?就是AP?名稱是mywife,驗證方式是WPA2-PSK
[root@centos10 ~]# iwlist wls35u2 scan
wls35u2 Scan completed :
Cell 01 - Address: 50:33:F0:CD:21:D9
ESSID:"mywifi"
Protocol:IEEE 802.11bgn
Mode:Master
Frequency:2.432 GHz (Channel 5)
Encryption key:on
Bit Rates:867 Mb/s
Extra:rsn_ie=30140100000fac040100000fac040100000fac020000
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
IE: Unknown: DD9F0050F204104A0001101044000102103B00010310470010BC329E001DD811B286015033F0CD21D81021001852616C696E6B20546563686E6F6C6F67792C20436F72702E1023001C52616C696E6B20576972656C6573732041636365737320506F696E74102400065254323836301042000831323334353637381054000800060050F20400011011000B52616C696E6B4150535F3010080002008C103C000101
Quality=96/100 Signal level=34/100
Extra:fm=0003
一般的Linux發(fā)行版都有wpa_supplicant這個工具,無需編譯安裝,例如centos,本地倉庫配置好后,直接yum就可以安裝了:
下面是在本地倉庫找這個wpa_supplicant,可以看到介紹WPA/WPA2/IEEE 802.1X Supplicant,說明這個軟件主要是無線網(wǎng)絡(luò)用的
[root@centos10 ~]# yum search wpa_supplicant
Loaded plugins: fastestmirror
Repository 'local' is missing name in configuration, using id
Loading mirror speeds from cached hostfile
================================================================================================================ N/S matched: wpa_supplicant ================================================================================================================
wpa_supplicant.x86_64 : WPA/WPA2/IEEE 802.1X Supplicant
Name and summary matches only, use "search all" for everything.
二,
wpa_supplicant配置無線網(wǎng)絡(luò)的步驟
1,
無線和藍牙內(nèi)核是否禁用
[root@centos10 ~]# rfkill list
5: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
7: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
?內(nèi)核禁用WiFi和啟用WiFi
[root@centos10 network-scripts]# rfkill block wifi
[root@centos10 network-scripts]# rfkill list
5: hci0: Bluetooth
Soft blocked: no
Hard blocked: no
7: phy0: Wireless LAN
Soft blocked: yes
Hard blocked: no
[root@centos10 network-scripts]# rfkill unblock wifi
?2,
wpa_supplicant掃描WiFi熱點
嚴(yán)重注意:wpa_cli?運行需要有服務(wù)端,也就是wpa_supplicant?-D nl80211 -i wls35u2 ?-c /etc/wpa_supplicant/wpa_supplicant.conf? ,該命令必須先運行,不管是在前臺還是在后臺(后臺運行是加參數(shù) -B),否則?
wpa_cli?將會報錯,這里說的no?such?file通常指的是/var/run/wpa_supplicant/wls35u2
[root@centos10 ~]# wpa_cli -i wls35u2 status
Failed to connect to non-global ctrl_ifname: wls35u2 error: No such file or directory
?wpa_supplicant?前臺運行后,如下輸出:
[root@centos10 ~]# wpa_supplicant -D nl80211 -i wls35u2 -c /etc/wpa_supplicant/wpa_supplicant.conf
Successfully initialized wpa_supplicant
wls35u2: Trying to associate with 50:33:f0:cd:21:d9 (SSID='mywifi' freq=2432 MHz)
wls35u2: Associated with 50:33:f0:cd:21:d9
wls35u2: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
wls35u2: CTRL-EVENT-REGDOM-CHANGE init=COUNTRY_IE type=COUNTRY alpha2=CN
wls35u2: WPA: Key negotiation completed with 50:33:f0:cd:21:d9 [PTK=CCMP GTK=CCMP]
wls35u2: CTRL-EVENT-CONNECTED - Connection to 50:33:f0:cd:21:d9 completed [id=0 id_str=]
看到有Connection后,才可以執(zhí)行下面的掃描:?
[root@centos10 ~]# wpa_cli -i wls35u2 scan
OK
[root@centos10 ~]# wpa_cli -i wls35u2 scan_result
bssid / frequency / signal level / flags / ssid
50:33:f0:cd:21:d9 2432 -65 [WPA2-PSK-CCMP][WPS][ESS] mywifi
52:33:f0:2d:21:d9 2432 -64 [WPA2-PSK-CCMP][WPS][ESS] mywifi-WiFi5
52:33:f0:7d:21:d9 2432 -65 [WPA2-PSK-CCMP][WPS][ESS]
f8:cd:c8:90:bc:32 2432 -76 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][WPS][ESS] ChinaNet-gTUm
74:05:a5:dc:86:c2 2412 -77 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS] YBJ
7c:b5:9b:82:f6:8b 2462 -83 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS] KaiHome_2.4
7e:b5:9b:92:f6:8b 2462 -84 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS] TPGuest_F68B
f4:32:3d:98:9a:39 2412 -80 [WPA-PSK-CCMP+TKIP][ESS] ChinaNet-6b4R
0a:10:7b:70:7e:21 2447 -81 [WPA2-PSK-CCMP][ESS]
52:a0:30:bd:d3:f8 2412 -86 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
56:ae:86:7a:bc:0e 2412 -87 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS]
52:33:f0:7d:21:a5 2422 -87 [WPA2-PSK-CCMP][WPS][ESS]
52:33:f0:7c:1f:11 2422 -87 [WPA2-PSK-CCMP][WPS][ESS]
08:10:7b:f0:7e:21 2447 -83 [WPA2-PSK-CCMP][WPS][ESS] zhwww
58:c6:7e:fb:4f:38 2427 -84 [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS] ChinaNet-wfJ9
46:f9:71:2d:a0:b6 2462 -84 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
f4:32:3d:98:b6:a1 2447 -86 [WPA-PSK-CCMP+TKIP][ESS] ChinaNet-Y3Th
44:f9:71:0d:a0:b6 2462 -86 [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS] MIQI
a0:cf:f5:e2:ce:18 2447 -88 [WPA-PSK-CCMP+TKIP][WPA2-PSK-CCMP+TKIP][ESS] CMCC-DXk7
2a:77:77:3d:ff:30 2457 -89 [WPA-PSK-CCMP][WPA2-PSK-CCMP][ESS]
5c:e5:0c:cb:4e:c3 2412 -87 [ESS] MiDeskLamp1S-4EC2-CB4EC2
此時查看網(wǎng)絡(luò)狀態(tài)和wpa_supplicant的狀態(tài):
wpa的狀態(tài),注意,這里wpa的狀態(tài)是COMPLETED
[root@centos10 ~]# wpa_cli -i wls35u2 status
bssid=50:33:f0:cd:21:d9
freq=2432
ssid=mywifi
id=0
mode=station
pairwise_cipher=CCMP
group_cipher=CCMP
key_mgmt=WPA2-PSK
wpa_state=COMPLETED
p2p_device_address=00:5c:c2:ce:dc:24
address=00:5c:c2:ce:dc:24
uuid=9437e8d3-f5a2-5382-8425-e6753f8d72ee
網(wǎng)絡(luò)狀態(tài),只有ipv6:
[root@centos10 ~]# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 1000
link/ether 00:0c:29:e8:89:a2 brd ff:ff:ff:ff:ff:ff
inet 192.168.123.20/24 brd 192.168.123.255 scope global noprefixroute ens33
valid_lft forever preferred_lft forever
inet6 fd15:4ba5:5a2b:1008:162e:7500:4e67:2fb1/64 scope global noprefixroute dynamic
valid_lft 86386sec preferred_lft 14386sec
inet6 fe80::523b:7d77:34e9:fa42/64 scope link noprefixroute
valid_lft forever preferred_lft forever
3: wls35u2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:5c:c2:ce:dc:24 brd ff:ff:ff:ff:ff:ff
inet6 240e:348:378:4020:25c:c2ff:fece:dc24/64 scope global mngtmpaddr dynamic
valid_lft 6959sec preferred_lft 3359sec
inet6 fe80::25c:c2ff:fece:dc24/64 scope link
valid_lft forever preferred_lft forever
wpa_states的取值如下。
- WPA_DISCONNECTED: 表示當(dāng)前未連接到任何無線網(wǎng)絡(luò)。
- WPA_INTERFACE_DISABLED: 代表當(dāng)前此wpa_supplicant所使用的網(wǎng)絡(luò)設(shè)備
被禁用。- WPA_INACTIVE: 代表當(dāng)前此wpa_supplicant沒有可連接的無線網(wǎng)絡(luò)。 這種情況
包括周圍沒有無線網(wǎng)絡(luò), 以及有無線網(wǎng)絡(luò), 但是因為沒有配置信息( 如沒有設(shè)置密碼等) 而
不能發(fā)起認(rèn)證及關(guān)聯(lián)請求的情況。- WPA_SCANNING、 WPA_AUTHENTICATING、 WPA_ASSOCIATING: 分別
表示當(dāng)前wpa_supplicant正處于掃描無線網(wǎng)絡(luò)、 身份驗證、 關(guān)聯(lián)過程中。- WPA_ASSOCIATED: 表明此wpa_supplicant成功關(guān)聯(lián)到某個AP。
- WPA_4WAY_HANDSHAKE: 表明此wpa_supplicant處于四次握手處理過程中。當(dāng)使用PSK( 即WPA/WPA2-Personal) 策略時, STA收到第一個EAPOL-Key數(shù)據(jù)包則
進入此狀態(tài)。 當(dāng)使用WPA/WPA2-Enterprise方法時, 當(dāng)STA完成和RAIDUS身份驗證后
則進入此狀態(tài)。- WPA_GROUP_HANDSHAKE: 表明STA處于組密鑰握手協(xié)議處理過程中。 當(dāng)STA
完成四次握手協(xié)議并收到組播密鑰交換第一幀數(shù)據(jù)后即進入此狀態(tài)( 或者四次握手協(xié)議中攜
帶了GTK信息, 也會進入此狀態(tài)。 詳情見4.5.5節(jié)EAPOL-Key交換流程分析) 。- WPA_COMPLETED: 所有認(rèn)證過程完成, wpa_supplicant正式加入某個無線網(wǎng)
絡(luò)?
此時,給網(wǎng)卡wls35u2通過DHCP增加ipv4地址,該網(wǎng)卡就可以使用了:
一般,這個命令會非??炀屯瓿桑绻ㄗ『荛L時間,通常是wpa_supplicant?服務(wù)端報錯了
dhclient wls35u2
?上面的命令執(zhí)行完畢后,查看wpa的狀態(tài),有ipv4地址了:
[root@centos10 ~]# wpa_cli -i wls35u2 status
bssid=50:33:f0:cd:21:d9
freq=2432
ssid=mywifi
id=0
mode=station
pairwise_cipher=CCMP
group_cipher=CCMP
key_mgmt=WPA2-PSK
wpa_state=COMPLETED
ip_address=192.168.2.7
p2p_device_address=00:5c:c2:ce:dc:24
address=00:5c:c2:ce:dc:24
uuid=9437e8d3-f5a2-5382-8425-e6753f8d72ee
?去掉ipv4地址:
[root@centos10 ~]# dhclient wls35u2 -r
[root@centos10 ~]# ifconfig wls35u2
wls35u2: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet6 240e:348:378:4020:25c:c2ff:fece:dc24 prefixlen 64 scopeid 0x0<global>
inet6 fe80::25c:c2ff:fece:dc24 prefixlen 64 scopeid 0x20<link>
ether 00:5c:c2:ce:dc:24 txqueuelen 1000 (Ethernet)
RX packets 847 bytes 85582 (83.5 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 34 bytes 4384 (4.2 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
二,
wpa_supplicant的配置文件
上面的掃描已經(jīng)說了,必須要有配置文件,那么配置文件如何寫呢?
1.
利用wpa_passphrase?指定WiFi名稱和?WiFi的密碼重定向到wpa_supplicant的主配置文件
wpa_passphrase mywife AP的密碼 >/etc/wpa_supplicant/wpa_supplicant.conf
2,
WiFi的安全標(biāo)準(zhǔn)和wpa_supplicant服務(wù)的配置文件
- IEEE 802.11 所制定的是技術(shù)性標(biāo)準(zhǔn) ,Wi-Fi 聯(lián)盟所制定的是商業(yè)化標(biāo)準(zhǔn) , 而 Wi-Fi 所制定的商業(yè)化標(biāo)準(zhǔn)基本上也都符合 IEEE 所制定的技術(shù)性標(biāo)準(zhǔn)。
- WEP 是1999年9月通過的 IEEE 802.11 標(biāo)準(zhǔn)的一部分;WPA(Wi-Fi Protected Access) 事實上就是由 Wi-Fi 聯(lián)盟所制定的安全性標(biāo)準(zhǔn) , 這個商業(yè)化標(biāo)準(zhǔn)存在的目的就是為了要支持 IEEE 802.11i 這個以技術(shù)為導(dǎo)向的安全性標(biāo)準(zhǔn);而 WPA2 其實就是 WPA 的第二個版本。直觀點說,WEP是較老的認(rèn)證方法它有好幾個弱點,因此在2003年被WPA淘汰,WPA又在2004年由完整的 IEEE 802.11i 標(biāo)準(zhǔn)(又稱為 WPA2)所取代。
- ? WEP(Wired Equivalent Privacy),采用名為RC4的RSA加密技術(shù)
- WPA(Wi-Fi Protected Access) ,采用新的TKIP算法,TKIP算法保留了RC4所以也有其弱點,但是這個時候更好的CCMP還沒完成,所以先在WPA上用TKIP技術(shù)
- WPA2是WPA的第2個版本,采用CCMP加密協(xié)定(在有些路由器等設(shè)備上設(shè)定加密協(xié)定或者加密算法的時候,可能會用類似AES之類的字眼替代CCMP)。所以WPA2+AES是安全性最強的。
? 另外,在有些無線網(wǎng)路設(shè)備的參數(shù)中會看到像 WPA-Enterprise / WPA2-Enterprise 以及 WPA-Personal / WPA2-Personal 的字眼 , 其實 WPA-Enterprise / WPA2-Enterprise 就是 WPA / WPA2 ; WPA-Personal / WPA2-Personal 其實就是 WPA-PSK / WPA2-PSK, 也就是以 ”pre-share key” 或 ” passphrase” 的驗證 (authentication) 模式來代替 IEEE 802.1X/EAP 的驗證模式 ,PSK 模式下不須使用驗證服務(wù)器 ( 例如 RADIUS Server), 所以特別適合家用或 SOHO 的使用者。
? 還有,wep是舊的加密方式,工作于802.11B/G模式下而802.11N草案并不支持此加密方式,所以如果802.11N的設(shè)備采用wep加密方式后,它也只會工作在802.11b/g模式下,N的性能發(fā)揮不出來。
在本例中,mywif查詢出來的 是? ? ? ? ?50:33:f0:cd:21:d9?? ?2432?? ?-65?? ?[WPA2-PSK-CCMP][WPS][ESS]? ? ,因此,我的無線路由使用的是WPA2
3,
wpa_supplicant主配置文件:
cat /etc/wpa_supplicant/wpa_supplicant.conf
# WPA-PSK/TKIP
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="example wpa-psk network"
key_mgmt=WPA-PSK
proto=WPA
pairwise=TKIP
group=TKIP
psk="secret passphrase"
}
?在本例中ssid是mywifi,psk是WiFi的密碼,因此,本例使用的配置文件如下,主要是認(rèn)證方式key_mgmt=WPA-PSK:
[root@centos10 ~]# cat /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=/var/run/wpa_supplicant/
network={
ssid="mywifi"
psk="WiFi密碼"
key_mgmt=WPA-PSK
#psk=0093d6fd4ee9d59e1c19c5468969b916ecdd3ab9011c766e8ae0761f706b0f6d
}
帶證書的EAP:
# WPA2-EAP/CCMP using EAP-TLS
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="example wpa2-eap network"
key_mgmt=WPA-EAP
proto=WPA2
pairwise=CCMP
group=CCMP
eap=TLS
ca_cert="/etc/cert/ca.pem"
private_key="/etc/cert/user.p12"
private_key_passwd="PKCS#12 passhrase"
}
?IEEE 802.1X:
# IEEE 802.1X with dynamic WEP keys using EAP-PEAP/MSCHAPv2
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="example 802.1x network"
key_mgmt=IEEE8021X
eap=PEAP
phase2="auth=MSCHAPV2"
identity="user name"
password="password"
ca_cert="/etc/cert/ca.pem"
}
三,
WiFi自動連接的設(shè)置
編輯/etc/sysconfig/wpa_supplicant這個文件,該文件是wpa_supplicant服務(wù)的環(huán)境變量文件,文件內(nèi)容如下:
(wls35u2是無線網(wǎng)卡名稱,ip a?命令可以看到的那個? -D?nl80211是該無線網(wǎng)卡的驅(qū)動)
# Use the flag "-i" before each of your interfaces, like so:
# INTERFACES="-ieth1 -iwlan0"
INTERFACES="-iwls35u2"
# Use the flag "-D" before each driver, like so:
# DRIVERS="-Dwext"
DRIVERS="-D nl80211"
# Other arguments
# -u Enable the D-Bus interface (required for use with NetworkManager)
# -f Log to /var/log/wpa_supplicant.log
# -P Write pid file to /var/run/wpa_supplicant.pid
# required to return proper codes by init scripts (e.g. double "start" action)
# -B to daemonize that has to be used together with -P is already in wpa_supplicant.init.d
OTHER_ARGS="-P /var/run/wpa_supplicant.pid"
?編輯文件/usr/lib/systemd/system/wpa_supplicant.service?
cat /usr/lib/systemd/system/wpa_supplicant.service
[Unit]
Description=WPA Supplicant daemon
Before=network.target
After=syslog.target
[Service]
Type=dbus
BusName=fi.w1.wpa_supplicant1
EnvironmentFile=-/etc/sysconfig/wpa_supplicant
ExecStart=/usr/sbin/wpa_supplicant -u -f /var/log/wpa_supplicant.log -c /etc/wpa_supplicant/wpa_supplicant.conf $INTERFACES $DRIVERS $OTHER_ARGS && ifconfig wls35u2 up && dhclient wls35u2
[Install]
WantedBy=multi-user.target
編輯/etc/rc.local?這個文件,在末尾添加如下命令:
[root@centos10 ~]# cat /etc/rc.local
#!/bin/bash
# THIS FILE IS ADDED FOR COMPATIBILITY PURPOSES
#
# It is highly advisable to create own systemd services or udev rules
# to run scripts during boot instead of using this file.
#
# In contrast to previous versions due to parallel execution during boot
# this script will NOT be run after all other services.
#
# Please note that you must run 'chmod +x /etc/rc.d/rc.local' to ensure
# that this script will be executed during boot.
touch /var/lock/subsys/local
ifconfig wls35u2 up&&ifconfig wls35u2 up&ifconfig wls35u2 up&&sleep 40&&systemctl restart wpa_supplicant && ifconfig wls35u2 up && dhclient wls35u2
給這個文件/etc/rc.local?執(zhí)行權(quán)限:
chmod a+x /etc/rc.local
?重啟服務(wù)器后,將會自動發(fā)現(xiàn)無線網(wǎng)卡并通過DHCP自動分配ip地址:文章來源:http://www.zghlxwxcb.cn/news/detail-816648.html
[root@centos10 ~]# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens33: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UNKNOWN group default qlen 1000
link/ether 00:0c:29:e8:89:a2 brd ff:ff:ff:ff:ff:ff
inet 192.168.123.20/24 brd 192.168.123.255 scope global noprefixroute ens33
valid_lft forever preferred_lft forever
inet6 fd15:4ba5:5a2b:1008:162e:7500:4e67:2fb1/64 scope global noprefixroute dynamic
valid_lft 86378sec preferred_lft 14378sec
inet6 fe80::523b:7d77:34e9:fa42/64 scope link noprefixroute
valid_lft forever preferred_lft forever
3: wls35u2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
link/ether 00:5c:c2:ce:dc:24 brd ff:ff:ff:ff:ff:ff
inet 192.168.2.7/24 brd 192.168.2.255 scope global dynamic wls35u2
valid_lft 604670sec preferred_lft 604670sec
inet6 240e:348:378:4020:25c:c2ff:fece:dc24/64 scope global mngtmpaddr dynamic
valid_lft 7067sec preferred_lft 3467sec
inet6 fe80::25c:c2ff:fece:dc24/64 scope link
valid_lft forever preferred_lft forever
?文章來源地址http://www.zghlxwxcb.cn/news/detail-816648.html
到了這里,關(guān)于Linux|centos7操作系統(tǒng)|無線WiFi的命令行配置---wpa_supplicant詳解的文章就介紹完了。如果您還想了解更多內(nèi)容,請在右上角搜索TOY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!