RehrigPacific/WiFiRepeater

From VentureResearchWiki
Jump to navigation Jump to search

WiFi Repeater Installation

Review of Existing Files[edit | edit source]

root@vr-f53c76:~# cat /etc/NetworkManager/system-connections/Wi-Fi-AP
[connection]
id=Wi-Fi-AP
uuid=78c4beb6-ec9a-4a21-8d55-a8e1f818f9ca
type=802-11-wireless
autoconnect=false

[802-11-wireless]
ssid=VR-AP-LJWM
mode=ap
bssid=48:65:EE:70:0D:08
mac-address=48:65:EE:70:0D:08
security=802-11-wireless-security

[802-11-wireless-security]
key-mgmt=wpa-psk
psk=rfid4ever_ap

[ipv4]
method=manual
address1=10.10.10.10/24,0.0.0.0

[ipv6]
method=auto
root@vr-f53c76:~# cat /etc/NetworkManager/system-connections/Wi-Fi
[connection]
id=Wi-Fi
uuid=78a2e364-3ff9-4f31-8dba-3b904e74cdde
type=802-11-wireless
 
[802-11-wireless]
ssid=VR_Devic
mode=infrastructure
security=802-11-wireless-security

[802-11-wireless-security]
key-mgmt=wpa-psk
psk=02910291FF

[ipv4]
method=auto

[ipv6]
method=auto

Opkg Update / Install new VR Connection Manager[edit | edit source]

This step is critical, to ensure that the Wi-Fi connection is not used by default, respecting the never-default configuration below, or it will never connect over cellular again!!!

Make sure to update to the new VR Connection Manager >= 1.1.2 !!!

opkg update
root@vr-f53c76:~# opkg install vr-connection-manager
Upgrading vr-connection-manager from 1.1.0-r5686.0 to 1.1.2-r7198.0 on root.
Downloading http://embedded.ventureresearch.com/yocto/fido/ipk/vr-am33v2-linuxboard/vr-connection-manager_1.1.2-r7198.0_vr_am33v2_linuxboard.ipk.
Configuring vr-connection-manager.

Edit new wifi conf file[edit | edit source]

Edit the WiFi file to reflect the SSID corresponding to the Repeater, and the IP address 10.10.10.10 (repeater is 10.10.10.5)

Also, add the never-default line to make sure this connection is not used by default by VR Connection Manager.

Make sure that the never-default=true line is there!!!

root@vr-f53c76:~# cat /etc/NetworkManager/system-connections/Wi-Fi
[connection]
id=Wi-Fi
uuid=78a2e364-3ff9-4f31-8dba-3b904e74cdde
type=802-11-wireless

[802-11-wireless]
ssid=VR-AP-1234                     <<<<<<<<<<<<<<<<< this is the old/default value used for setup of the WiFi repeater
mode=infrastructure
security=802-11-wireless-security

[802-11-wireless-security]
key-mgmt=wpa-psk
psk=rfid4ever_ap

[ipv4]
method=manual
never-default=true
address1=10.10.10.10/24,0.0.0.0

[ipv6]
method=auto

Disable existing wifi ap network[edit | edit source]

Now, double check the config files per above. Then, stop the vr-wifi-ap service.

systemctl disable vr-wifi-ap
systemctl stop vr-wifi-ap
nmcli con down id Wi-Fi-AP

Make really sure that there is no wlan0-ap on the reader.

root@vr-f53c76:~# iw dev wlan0-ap del

Connect WiFi to AP[edit | edit source]

Now you can connect the WiFi to the AP.

=== Update AP to new SSID

Change the WiFi Repeater SSID to reflect the desired SSID of the cameras.

root@vr-f53c76:~# ssh 10.10.10.5 -l root -p 22
The authenticity of host '10.10.10.5 (10.10.10.5)' can't be established.
RSA key fingerprint is f3:63:cc:2b:8e:d7:8f:b9:63:95:6d:f1:13:a8:54:af.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.10.10.5' (RSA) to the list of known hosts.
root@10.10.10.5's password:
Permission denied, please try again.
root@10.10.10.5's password:


AP-T565#
AP-T565#show run

Building configuration...
Current configuration: 2201 bytes

version AP_FSOS 11.9(6)W1S7, Release(09232106)
!
fair-schedule
rldp enable
sntp interval 7200
sntp server 10.10.10.10
sntp enable
wids
!
black-white-list
!
web-auth acct-update-interval 1
!
enable service web-server http
enable service web-server https
webmaster level 0 username admin password 7 14024b1f350b7a7c54
!
no service password-encryption
!
dot11 wlan 1
 ssid VR-AP-1234                  <<<<<<<<<<<<<<<<< this is the old/default value used for setup
 ssid-code utf-8
!
link-check disable
!
nfpp
!
wlocation
!
enable secret 5 $1$7eyy$ywruzr65z80zwz7D
enable service ssh-server
no enable service telnet-server
vlan 1
 name ap#outsideNetwork
!
interface GigabitEthernet 0/1
 encapsulation dot1Q 1
 rldp port loop-detect warning
!
interface GigabitEthernet 0/2
 encapsulation dot1Q 1
 rldp port loop-detect warning
!
interface Dot11radio 1/0
 no ofdma enable
 country-code US
 radio-type 802.11b
 no mu-mimo enable
 no txbf enable
 rate-set 11b mandatory 1 2 5 11
 rate-set 11g mandatory 1 2 5 11
 rate-set 11g support 6 9 12 18 24 36 48 54
 rate-set 11n mcs-support 15
 rate-set 11ac mcs-support 19
 rate-set 11ax mcs-support 23
 no ampdu-rts
 no 11axsupport enable
 no 11acsupport enable
 power local 80
 channel 1
 chan-width 20
 station-role root-ap
!
interface Dot11radio 1/0.1
 encapsulation dot1Q 1
 wlan-id 1
!
interface Dot11radio 2/0
 shutdown
 country-code US
 no short-preamble
 radio-type 802.11a
 no mu-mimo enable
 no txbf enable
 rate-set 11a mandatory 6 12 24
 rate-set 11a support 9 18 36 48 54
 rate-set 11n mcs-support 15
 rate-set 11ac mcs-support 19
 rate-set 11ax mcs-support 23
 no ampdu-rts
 11axsupport enable
 11acsupport enable
 channel 149
 chan-width 40
 station-role root-ap
!
interface BVI 1
 ip address 10.10.10.5 255.255.255.0
!
wlansec 1
 security rsn enable
 security rsn ciphers aes enable
 security rsn akm psk enable
 security rsn akm psk set-key ascii rfid4ever_ap
 security wpa enable
 security wpa ciphers aes enable
 security wpa akm psk enable
 security wpa akm psk set-key ascii rfid4ever_ap
!
no offline-detect
!
line console 0
 login
 password admin
line vty 0 35
 privilege level 15
 login
 password party101
!
end
AP-T565#

I didn't capture this, the commands are something like:

configure
dot11 wlan 1
 ssid VR-AP-1234  
<<ctrl+d>>


Update reader to new SSID that you just set[edit | edit source]

Now, switch the Wi-Fi file to the new SSID (the one for the cameras)

Commit AP to new SSID (write)[edit | edit source]

Once you are connected to the new SSID and repeater, make sure the cameras are also there:

root@vr-f53c76:~# ping 10.10.10.30
PING 10.10.10.30 (10.10.10.30) 56(84) bytes of data.
64 bytes from 10.10.10.30: icmp_seq=1 ttl=64 time=3.84 ms
64 bytes from 10.10.10.30: icmp_seq=2 ttl=64 time=41.4 ms
^C
--- 10.10.10.30 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 3.842/22.663/41.484/18.821 ms
root@vr-f53c76:~# ping 10.10.10.31
PING 10.10.10.31 (10.10.10.31) 56(84) bytes of data.
64 bytes from 10.10.10.31: icmp_seq=1 ttl=64 time=55.6 ms
64 bytes from 10.10.10.31: icmp_seq=2 ttl=64 time=78.4 ms
^C
--- 10.10.10.31 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 55.623/67.038/78.454/11.418 ms

If everything looks good, write the new settings to the WiFi repeater:

root@vr-f53c76:~# ssh 10.10.10.5 -l root -p22
root@10.10.10.5's password:
Permission denied, please try again.
root@10.10.10.5's password:


AP-T565#write

Building configuration...

[OK]
AP-T565#exit
Connection to 10.10.10.5 closed.
root@vr-f53c76:~#

Done[edit | edit source]

Done ! Here are the final files:

root@vr-f53c76:~# cat /etc/NetworkManager/system-connections/Wi-Fi
[connection]
id=Wi-Fi
uuid=78a2e364-3ff9-4f31-8dba-3b904e74cdde
type=802-11-wireless

[802-11-wireless]
ssid=VR-AP-LJWM
mode=infrastructure
security=802-11-wireless-security

[802-11-wireless-security]
key-mgmt=wpa-psk
psk=rfid4ever_ap

[ipv4]
method=manual
address1=10.10.10.10/24,0.0.0.0
never-default=true

[ipv6]
method=ignore
root@vr-f53c76:~# cat /etc/NetworkManager/system-connections/Wi-Fi-AP
[connection]
id=Wi-Fi-AP
uuid=78c4beb6-ec9a-4a21-8d55-a8e1f818f9ca
type=802-11-wireless
autoconnect=false

[802-11-wireless]
ssid=VR-AP-LJWM-X
mode=ap
bssid=48:65:EE:70:0D:08
mac-address=48:65:EE:70:0D:08
security=802-11-wireless-security

[802-11-wireless-security]
key-mgmt=wpa-psk
psk=rfid4ever_ap

[ipv4]
method=manual
address1=10.10.20.10/24,0.0.0.0

[ipv6]
method=auto
root@vr-f53c76:~# ifconfig
can0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          UP RUNNING NOARP  MTU:16  Metric:1
          RX packets:969 errors:0 dropped:0 overruns:0 frame:0
          TX packets:959 errors:0 dropped:1 overruns:0 carrier:1
          collisions:0 txqueuelen:50
          RX bytes:4763 (4.6 KiB)  TX bytes:4980 (4.8 KiB)
          Interrupt:68

eth0      Link encap:Ethernet  HWaddr 34:14:b5:f5:3c:76
          UP BROADCAST MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
          Interrupt:56

lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:17962 errors:0 dropped:0 overruns:0 frame:0
          TX packets:17962 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:2753313 (2.6 MiB)  TX bytes:2753313 (2.6 MiB)

tun0      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
          inet addr:172.19.53.202  P-t-P:172.19.48.1  Mask:255.255.255.255
          UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
          RX packets:4366 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3169 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:100
          RX bytes:320311 (312.8 KiB)  TX bytes:388763 (379.6 KiB)

wlan0     Link encap:Ethernet  HWaddr 48:65:ee:70:0d:07
          inet addr:10.10.10.10  Bcast:10.10.10.255  Mask:255.255.255.0
          inet6 addr: fe80::4a65:eeff:fe70:d07/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:845 errors:0 dropped:0 overruns:0 frame:0
          TX packets:821 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:232067 (226.6 KiB)  TX bytes:95254 (93.0 KiB)

wwan1     Link encap:Ethernet  HWaddr e6:54:43:14:cd:f0
          inet addr:10.6.101.103  Bcast:10.6.101.111  Mask:255.255.255.240
          inet6 addr: fe80::e454:43ff:fe14:cdf0/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:8462 errors:0 dropped:0 overruns:0 frame:0
          TX packets:8743 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:2587442 (2.4 MiB)  TX bytes:1899826 (1.8 MiB)

root@vr-f53c76:~#
root@vr-f53c76:~# arp -an
? (10.10.10.5) at 64:9d:99:d2:8f:83 [ether] on wlan0
? (10.10.10.30) at ec:2e:98:57:b6:55 [ether] on wlan0
? (10.6.101.104) at 02:50:f3:00:08:00 [ether] on wwan1
? (10.10.10.31) at ec:2e:98:57:9c:bd [ether] on wlan0

root@vr-f53c76:~# ping 10.10.10.30
PING 10.10.10.30 (10.10.10.30) 56(84) bytes of data.
64 bytes from 10.10.10.30: icmp_seq=1 ttl=64 time=59.3 ms
64 bytes from 10.10.10.30: icmp_seq=2 ttl=64 time=82.4 ms
64 bytes from 10.10.10.30: icmp_seq=3 ttl=64 time=105 ms
^C
--- 10.10.10.30 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2001ms
rtt min/avg/max/mdev = 59.333/82.375/105.295/18.765 ms

root@vr-f53c76:~# ping 10.10.10.31
PING 10.10.10.31 (10.10.10.31) 56(84) bytes of data.
64 bytes from 10.10.10.31: icmp_seq=1 ttl=64 time=88.6 ms
64 bytes from 10.10.10.31: icmp_seq=2 ttl=64 time=108 ms
64 bytes from 10.10.10.31: icmp_seq=3 ttl=64 time=30.4 ms
64 bytes from 10.10.10.31: icmp_seq=4 ttl=64 time=56.6 ms
^C
--- 10.10.10.31 ping statistics ---
4 packets transmitted, 4 received, 0% packet loss, time 3001ms
rtt min/avg/max/mdev = 30.464/71.158/108.853/29.963 ms
root@vr-f53c76:~#