SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
VT6655/6656 Linux Driver
USER’S GUIDE

Revision v2.0
July 16, 2008

VIA TECHNOLOGIES,INC.
VIA VT6655 and VT6656 linux driver
User’s Guide

Table of Contents
1.

Release Note ……………………………………………………………….……...2
1.1
1.2

2.

Revision History …………………………………………………………………...2
Function ………….………………………………………………………………...2

Features ……………………………………………………………………………..2

2.1 This source code package can be use in Linux version ……….……...………….....2
2.2 Contents of the Subdirectory ……………………………………………………….2

3. Compile and install driver ………………………………………...................... 2
3.1 Compile the driver …………...………………………………………………….....2
3.2 Install the driver …………………………………………………………………....3

4. Driver Configuration /Parameters……………………………..…………..….3
4.1 open mode ……………………………………………………………………….....3
4.2 wep mode ………………………………………………………………………..…3
4.3 WPA-PSK TKIP/AES ……………………………………………………………...4
4.4 WPA2-PSK TKIP/AES ………………………………………………………….…7
4.4.1 WPA2-PSK TKIP ……………………………………………………………...8
4.4.2 WPA2-PSK AES ……………………………………………………………...12

5. Network Manager……………………………………………..…………………15

-1-
VIA VT6655 and VT6656 linux driver
User’s Guide

1. Release Note
1.1

Revision History

Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file.

1.2

Function

Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file.

2. Features
This user manual is applied for VNT6655GMA00, VNT6655GCV00, VNT6655GPV00,
VNT6656GEV00, VNT6656GUA00, VNT6656GUV00, VNT6656G6A10 and VNT6656G
6A40 series models.
This source code package can be use in Linux version :
Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file.

2.2

Contents of the Subdirectory

Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file.

3. Compile and Install driver
Notice: here, I compile and install VT6655_linux_src_v1.18.05_x86, please use your driver
replace it and if you use VT6656 do this, please use vntwusb.ko replace viawget.ko that
appearing in the guide.
Open the computer and run Linux operating system, you must do all the steps here as the
root user. Please make sure your root login. By the way , make sure you have installed
essential compilation tools , build-essential and linux-headers-xxxx.
First, copy the driver package to your directory. Here, I copy the driver to /home directory.
Enter your directory.
cd /home
Then, we unpack the driver source code and openssl-0.9.8a
unzip VT6655_Linux_src_v1.18.05_x86.zip
cd VT6655_Linux_src_v1.18.05_x86/wpa_supplicant
unzip openssl-0.9.8a.zip

3.1 Compile the driver
cd /home/ VT6655_Linux_src_v1.18.05_x86
make clean
make install
cd /home/ VT6655_Linux_src_v1.18.05_x86/wpa_supplicant/openssl-0.9.8a
make install
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
make install

If you execute make clean, and then detect error:
-2-
VIA VT6655 and VT6656 linux driver
User’s Guide
Makefile: 23: *** Linux kernel source not found.
You can execute this instruction for link the source in to the kernels binary directory.
ln -s /usr/src/linux-headers-‘uname –r’ /lib/modules/‘uname –r’/source
3.2 Install the driver
cd /home/ VT6655_Linux_src_v1.18.05_x86/driver
insmod viawget.ko
If you execute insmod, appear insmod: error inserting ‘viawget.ko’:-1 File exists.
Then, remove the driver: rmmod viawget.ko, execute insmod viawget.ko again.

4.

Driver Configuration/Parameters

The driver can be configured via two interfaces; 1) command and configuration files 2)
network manager and now we use command and configuration files to run the driver.
In next chapter, we will introduce the network manager.
Notice: Don’t use command mode and network manager at the same time.
4.1
OPEN MODE
You can execute iwconfig instruction to obtain the wireless device interface. If you have
some issue, execute man iwconfig for more information.
iwconfig
Then, we can configurate the ESSID and Network address.
iwconfig interface [essid {desired ssid}]
iwconfig eth1 essid WPSE
ifconfig interface [IP address |up|down]
ifconfig eth1 up
ifconfig eth1 192.168.11.127
Verify whether your wireless device is connected or not.
ping 192.168.11.1
Ok, if this information appearing in the screen. You are successful!
root@jel:/home/VT6655_Linux_src_v1.18.05_x86/driver# ping 192.168.11.1
PING 192.168.11.1 (192.168.11.1) 56(84) bytes of data.
64 bytes from 192.168.11.1: icmp_seq=1 ttl=64 time=6.17 ms
64 bytes from 192.168.11.1: icmp_seq=2 ttl=64 time=0.827 ms
64 bytes from 192.168.11.1: icmp_seq=3 ttl=64 time=1.17 ms
64 bytes from 192.168.11.1: icmp_seq=4 ttl=64 time=1.27 ms
64 bytes from 192.168.11.1: icmp_seq=5 ttl=64 time=0.883 ms
64 bytes from 192.168.11.1: icmp_seq=6 ttl=64 time=1.00 ms
64 bytes from 192.168.11.1: icmp_seq=8 ttl=64 time=0.913 ms
64 bytes from 192.168.11.1: icmp_seq=9 ttl=64 time=1.16 ms
64 bytes from 192.168.11.1: icmp_seq=10 ttl=64 time=0.879 ms

4.2
WEP MODE
May be your wireless router can be configured to shared key wep mode. That is the same as
the open-wep mode.
-3-
VIA VT6655 and VT6656 linux driver
User’s Guide
1. unhidden ssid
We can configurate unhidden ssid or hidden ssid via your wireless router.
ifconfig eth1 down
ifconfig eth1 up
iwconfig eth1 essid WPSE
ifconfig eth1 192.168.11.127
iwconfig eth1 key restricted [1] 1234567890
ping 192.168.11.1
2. hidden ssid
ifconfig eth1 down
ifconfig eth1 up
iwconfig eth1 essid WPSE
ifconfig eth1 192.168.11.127
iwconfig eth1 key restricted [1] 1234567890
ping 192.168.11.1
If you have any issue with iwconfig , please refer to man iwconfig command.
4.3

WPA-PSK TKIP/AES
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
-4-
VIA VT6655 and VT6656 linux driver
User’s Guide
priority=5
}
When you complete the configuration, save and close it. Notice the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notice the red typeface
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
-5-
VIA VT6655 and VT6656 linux driver
User’s Guide
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface, unhidden or hidden ssid depend on if we add this instruction
scan_ssid=1 to the script file.
Then, execute these commands.
ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2

notice the red typeface

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
-6-
VIA VT6655 and VT6656 linux driver
User’s Guide
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Then execute these commands.
ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
4.4

WPA2-PSK TKIP/AES
-7-
VIA VT6655 and VT6656 linux driver
User’s Guide
4.4.1

WPA2-PSK TKIP
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<-----8-
VIA VT6655 and VT6656 linux driver
User’s Guide
Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notice the red typeface.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
-9-
VIA VT6655 and VT6656 linux driver
User’s Guide
###WPA2-PSK ok
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"
- 10 -
VIA VT6655 and VT6656 linux driver
User’s Guide
#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
- 11 -
VIA VT6655 and VT6656 linux driver
User’s Guide
ifconfig eth1 192.168.11.127
ping 192.168.11.1
4.4.2

WPA2-PSK AES
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
- 12 -
VIA VT6655 and VT6656 linux driver
User’s Guide
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notic the red typeface
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP
- 13 -
VIA VT6655 and VT6656 linux driver
User’s Guide
#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
- 14 -
VIA VT6655 and VT6656 linux driver
User’s Guide
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
………………….

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1

5. network manager
Make sure you have installed the driver.
- 15 -
VIA VT6655 and VT6656 linux driver
User’s Guide
Here, I will do these steps on Ubuntu 8.04
1. Open the Network settings window (system menu > administration > network)

2.

Open the wireless connection option

- 16 -
VIA VT6655 and VT6656 linux driver
User’s Guide
3.
4.

When you configured all the option, tip ok.
Open terminal window and ping IP address.
ping 192.168.11.1

- 17 -

Mais conteúdo relacionado

Mais procurados

How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 Saroj Sahu
 
How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) Naoto MATSUMOTO
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Saroj Sahu
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco routerIT Tech
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server HardeningMyOwn Telco
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guideseolangit4
 
GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-Naoto MATSUMOTO
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiNaoto MATSUMOTO
 
Configure a Riak Cluster
Configure a Riak ClusterConfigure a Riak Cluster
Configure a Riak ClusterJeffrey Kirkell
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяEkaterina Melnik
 
Wpa supplicant introduction
Wpa supplicant introductionWpa supplicant introduction
Wpa supplicant introductionawkman
 
install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -Naoto MATSUMOTO
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pixangelitoh11
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answerNarayana Samy
 
How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)Saroj Sahu
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SANSaroj Sahu
 

Mais procurados (20)

Linux Hardening - nullhyd
Linux Hardening - nullhydLinux Hardening - nullhyd
Linux Hardening - nullhyd
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
 
How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan)
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server Hardening
 
Metasploitable
MetasploitableMetasploitable
Metasploitable
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
 
GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFi
 
Configure a Riak Cluster
Configure a Riak ClusterConfigure a Riak Cluster
Configure a Riak Cluster
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Wpa supplicant introduction
Wpa supplicant introductionWpa supplicant introduction
Wpa supplicant introduction
 
install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
 

Semelhante a Vt6655 linux user_guide

OpenWRT manual
OpenWRT manualOpenWRT manual
OpenWRT manualfosk
 
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Frederic Descamps
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guideShathees Rao
 
Kernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysisKernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysisAnne Nicolas
 
Advanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suiteAdvanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suiteKenny Gryp
 
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicHow to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicCircling Cycle
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleChanaka Lasantha
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commandsssusere31b5c
 
Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0Rawntech Mak
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...IT Tech
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...LinuxCon ContainerCon CloudOpen China
 
Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!All Things Open
 
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardeningarchwisp
 
Linux Crash Dump Capture and Analysis
Linux Crash Dump Capture and AnalysisLinux Crash Dump Capture and Analysis
Linux Crash Dump Capture and AnalysisPaul V. Novarese
 
Control net modules
Control net modulesControl net modules
Control net modulesJairo German
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...IT Tech
 
Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Dobrica Pavlinušić
 
Advanced Root Cause Analysis
Advanced Root Cause AnalysisAdvanced Root Cause Analysis
Advanced Root Cause AnalysisEric Sloof
 

Semelhante a Vt6655 linux user_guide (20)

OpenWRT manual
OpenWRT manualOpenWRT manual
OpenWRT manual
 
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Kernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysisKernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysis
 
Advanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suiteAdvanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suite
 
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicHow to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commands
 
Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...
 
Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!
 
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
 
Linux Crash Dump Capture and Analysis
Linux Crash Dump Capture and AnalysisLinux Crash Dump Capture and Analysis
Linux Crash Dump Capture and Analysis
 
Control net modules
Control net modulesControl net modules
Control net modules
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
 
Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !
 
Advanced Root Cause Analysis
Advanced Root Cause AnalysisAdvanced Root Cause Analysis
Advanced Root Cause Analysis
 
Analisis_avanzado_vmware
Analisis_avanzado_vmwareAnalisis_avanzado_vmware
Analisis_avanzado_vmware
 

Último

(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...Riya Pathan
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
2k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 92055419142k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 9205541914Delhi Call girls
 
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...anamikaraghav4
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448ont65320
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Apsara Of India
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Apsara Of India
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...ritikasharma
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolRiya Pathan
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...Neha Kaur
 

Último (20)

(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
 
2k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 92055419142k Shot Call girls Laxmi Nagar Delhi 9205541914
2k Shot Call girls Laxmi Nagar Delhi 9205541914
 
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in  Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Malviya Nagar, (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
 
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
Beyond Bar & Club Udaipur CaLL GiRLS 09602870969
 
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
 
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goaGoa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
 
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Manjri Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
 
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service AsansolVIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
VIP Call Girls Asansol Ananya 8250192130 Independent Escort Service Asansol
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
 
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
VIP Call Girls Darjeeling Aaradhya 8250192130 Independent Escort Service Darj...
 

Vt6655 linux user_guide

  • 1. VT6655/6656 Linux Driver USER’S GUIDE Revision v2.0 July 16, 2008 VIA TECHNOLOGIES,INC.
  • 2. VIA VT6655 and VT6656 linux driver User’s Guide Table of Contents 1. Release Note ……………………………………………………………….……...2 1.1 1.2 2. Revision History …………………………………………………………………...2 Function ………….………………………………………………………………...2 Features ……………………………………………………………………………..2 2.1 This source code package can be use in Linux version ……….……...………….....2 2.2 Contents of the Subdirectory ……………………………………………………….2 3. Compile and install driver ………………………………………...................... 2 3.1 Compile the driver …………...………………………………………………….....2 3.2 Install the driver …………………………………………………………………....3 4. Driver Configuration /Parameters……………………………..…………..….3 4.1 open mode ……………………………………………………………………….....3 4.2 wep mode ………………………………………………………………………..…3 4.3 WPA-PSK TKIP/AES ……………………………………………………………...4 4.4 WPA2-PSK TKIP/AES ………………………………………………………….…7 4.4.1 WPA2-PSK TKIP ……………………………………………………………...8 4.4.2 WPA2-PSK AES ……………………………………………………………...12 5. Network Manager……………………………………………..…………………15 -1-
  • 3. VIA VT6655 and VT6656 linux driver User’s Guide 1. Release Note 1.1 Revision History Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file. 1.2 Function Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file. 2. Features This user manual is applied for VNT6655GMA00, VNT6655GCV00, VNT6655GPV00, VNT6656GEV00, VNT6656GUA00, VNT6656GUV00, VNT6656G6A10 and VNT6656G 6A40 series models. This source code package can be use in Linux version : Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file. 2.2 Contents of the Subdirectory Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file. 3. Compile and Install driver Notice: here, I compile and install VT6655_linux_src_v1.18.05_x86, please use your driver replace it and if you use VT6656 do this, please use vntwusb.ko replace viawget.ko that appearing in the guide. Open the computer and run Linux operating system, you must do all the steps here as the root user. Please make sure your root login. By the way , make sure you have installed essential compilation tools , build-essential and linux-headers-xxxx. First, copy the driver package to your directory. Here, I copy the driver to /home directory. Enter your directory. cd /home Then, we unpack the driver source code and openssl-0.9.8a unzip VT6655_Linux_src_v1.18.05_x86.zip cd VT6655_Linux_src_v1.18.05_x86/wpa_supplicant unzip openssl-0.9.8a.zip 3.1 Compile the driver cd /home/ VT6655_Linux_src_v1.18.05_x86 make clean make install cd /home/ VT6655_Linux_src_v1.18.05_x86/wpa_supplicant/openssl-0.9.8a make install cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 make install If you execute make clean, and then detect error: -2-
  • 4. VIA VT6655 and VT6656 linux driver User’s Guide Makefile: 23: *** Linux kernel source not found. You can execute this instruction for link the source in to the kernels binary directory. ln -s /usr/src/linux-headers-‘uname –r’ /lib/modules/‘uname –r’/source 3.2 Install the driver cd /home/ VT6655_Linux_src_v1.18.05_x86/driver insmod viawget.ko If you execute insmod, appear insmod: error inserting ‘viawget.ko’:-1 File exists. Then, remove the driver: rmmod viawget.ko, execute insmod viawget.ko again. 4. Driver Configuration/Parameters The driver can be configured via two interfaces; 1) command and configuration files 2) network manager and now we use command and configuration files to run the driver. In next chapter, we will introduce the network manager. Notice: Don’t use command mode and network manager at the same time. 4.1 OPEN MODE You can execute iwconfig instruction to obtain the wireless device interface. If you have some issue, execute man iwconfig for more information. iwconfig Then, we can configurate the ESSID and Network address. iwconfig interface [essid {desired ssid}] iwconfig eth1 essid WPSE ifconfig interface [IP address |up|down] ifconfig eth1 up ifconfig eth1 192.168.11.127 Verify whether your wireless device is connected or not. ping 192.168.11.1 Ok, if this information appearing in the screen. You are successful! root@jel:/home/VT6655_Linux_src_v1.18.05_x86/driver# ping 192.168.11.1 PING 192.168.11.1 (192.168.11.1) 56(84) bytes of data. 64 bytes from 192.168.11.1: icmp_seq=1 ttl=64 time=6.17 ms 64 bytes from 192.168.11.1: icmp_seq=2 ttl=64 time=0.827 ms 64 bytes from 192.168.11.1: icmp_seq=3 ttl=64 time=1.17 ms 64 bytes from 192.168.11.1: icmp_seq=4 ttl=64 time=1.27 ms 64 bytes from 192.168.11.1: icmp_seq=5 ttl=64 time=0.883 ms 64 bytes from 192.168.11.1: icmp_seq=6 ttl=64 time=1.00 ms 64 bytes from 192.168.11.1: icmp_seq=8 ttl=64 time=0.913 ms 64 bytes from 192.168.11.1: icmp_seq=9 ttl=64 time=1.16 ms 64 bytes from 192.168.11.1: icmp_seq=10 ttl=64 time=0.879 ms 4.2 WEP MODE May be your wireless router can be configured to shared key wep mode. That is the same as the open-wep mode. -3-
  • 5. VIA VT6655 and VT6656 linux driver User’s Guide 1. unhidden ssid We can configurate unhidden ssid or hidden ssid via your wireless router. ifconfig eth1 down ifconfig eth1 up iwconfig eth1 essid WPSE ifconfig eth1 192.168.11.127 iwconfig eth1 key restricted [1] 1234567890 ping 192.168.11.1 2. hidden ssid ifconfig eth1 down ifconfig eth1 up iwconfig eth1 essid WPSE ifconfig eth1 192.168.11.127 iwconfig eth1 key restricted [1] 1234567890 ping 192.168.11.1 If you have any issue with iwconfig , please refer to man iwconfig command. 4.3 WPA-PSK TKIP/AES 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok network={ ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 -4-
  • 6. VIA VT6655 and VT6656 linux driver User’s Guide priority=5 } When you complete the configuration, save and close it. Notice the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notice the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok -5-
  • 7. VIA VT6655 and VT6656 linux driver User’s Guide network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface, unhidden or hidden ssid depend on if we add this instruction scan_ssid=1 to the script file. Then, execute these commands. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 notice the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 -6-
  • 8. VIA VT6655 and VT6656 linux driver User’s Guide # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok network={ ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Then execute these commands. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 4.4 WPA2-PSK TKIP/AES -7-
  • 9. VIA VT6655 and VT6656 linux driver User’s Guide 4.4.1 WPA2-PSK TKIP 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<-----8-
  • 10. VIA VT6655 and VT6656 linux driver User’s Guide Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notice the red typeface. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } -9-
  • 11. VIA VT6655 and VT6656 linux driver User’s Guide ###WPA2-PSK ok network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" - 10 -
  • 12. VIA VT6655 and VT6656 linux driver User’s Guide # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. - 11 -
  • 13. VIA VT6655 and VT6656 linux driver User’s Guide ifconfig eth1 192.168.11.127 ping 192.168.11.1 4.4.2 WPA2-PSK AES 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. - 12 -
  • 14. VIA VT6655 and VT6656 linux driver User’s Guide State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notic the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP - 13 -
  • 15. VIA VT6655 and VT6656 linux driver User’s Guide # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 - 14 -
  • 16. VIA VT6655 and VT6656 linux driver User’s Guide # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok …………………. Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 5. network manager Make sure you have installed the driver. - 15 -
  • 17. VIA VT6655 and VT6656 linux driver User’s Guide Here, I will do these steps on Ubuntu 8.04 1. Open the Network settings window (system menu > administration > network) 2. Open the wireless connection option - 16 -
  • 18. VIA VT6655 and VT6656 linux driver User’s Guide 3. 4. When you configured all the option, tip ok. Open terminal window and ping IP address. ping 192.168.11.1 - 17 -