SlideShare a Scribd company logo
VT6655/6656 Linux Driver
USER’S GUIDE

Revision v2.0
July 16, 2008

VIA TECHNOLOGIES,INC.
VIA VT6655 and VT6656 linux driver
User’s Guide

Table of Contents
1.

Release Note ……………………………………………………………….……...2
1.1
1.2

2.

Revision History …………………………………………………………………...2
Function ………….………………………………………………………………...2

Features ……………………………………………………………………………..2

2.1 This source code package can be use in Linux version ……….……...………….....2
2.2 Contents of the Subdirectory ……………………………………………………….2

3. Compile and install driver ………………………………………...................... 2
3.1 Compile the driver …………...………………………………………………….....2
3.2 Install the driver …………………………………………………………………....3

4. Driver Configuration /Parameters……………………………..…………..….3
4.1 open mode ……………………………………………………………………….....3
4.2 wep mode ………………………………………………………………………..…3
4.3 WPA-PSK TKIP/AES ……………………………………………………………...4
4.4 WPA2-PSK TKIP/AES ………………………………………………………….…7
4.4.1 WPA2-PSK TKIP ……………………………………………………………...8
4.4.2 WPA2-PSK AES ……………………………………………………………...12

5. Network Manager……………………………………………..…………………15

-1-
VIA VT6655 and VT6656 linux driver
User’s Guide

1. Release Note
1.1

Revision History

Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file.

1.2

Function

Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file.

2. Features
This user manual is applied for VNT6655GMA00, VNT6655GCV00, VNT6655GPV00,
VNT6656GEV00, VNT6656GUA00, VNT6656GUV00, VNT6656G6A10 and VNT6656G
6A40 series models.
This source code package can be use in Linux version :
Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file.

2.2

Contents of the Subdirectory

Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file.

3. Compile and Install driver
Notice: here, I compile and install VT6655_linux_src_v1.18.05_x86, please use your driver
replace it and if you use VT6656 do this, please use vntwusb.ko replace viawget.ko that
appearing in the guide.
Open the computer and run Linux operating system, you must do all the steps here as the
root user. Please make sure your root login. By the way , make sure you have installed
essential compilation tools , build-essential and linux-headers-xxxx.
First, copy the driver package to your directory. Here, I copy the driver to /home directory.
Enter your directory.
cd /home
Then, we unpack the driver source code and openssl-0.9.8a
unzip VT6655_Linux_src_v1.18.05_x86.zip
cd VT6655_Linux_src_v1.18.05_x86/wpa_supplicant
unzip openssl-0.9.8a.zip

3.1 Compile the driver
cd /home/ VT6655_Linux_src_v1.18.05_x86
make clean
make install
cd /home/ VT6655_Linux_src_v1.18.05_x86/wpa_supplicant/openssl-0.9.8a
make install
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
make install

If you execute make clean, and then detect error:
-2-
VIA VT6655 and VT6656 linux driver
User’s Guide
Makefile: 23: *** Linux kernel source not found.
You can execute this instruction for link the source in to the kernels binary directory.
ln -s /usr/src/linux-headers-‘uname –r’ /lib/modules/‘uname –r’/source
3.2 Install the driver
cd /home/ VT6655_Linux_src_v1.18.05_x86/driver
insmod viawget.ko
If you execute insmod, appear insmod: error inserting ‘viawget.ko’:-1 File exists.
Then, remove the driver: rmmod viawget.ko, execute insmod viawget.ko again.

4.

Driver Configuration/Parameters

The driver can be configured via two interfaces; 1) command and configuration files 2)
network manager and now we use command and configuration files to run the driver.
In next chapter, we will introduce the network manager.
Notice: Don’t use command mode and network manager at the same time.
4.1
OPEN MODE
You can execute iwconfig instruction to obtain the wireless device interface. If you have
some issue, execute man iwconfig for more information.
iwconfig
Then, we can configurate the ESSID and Network address.
iwconfig interface [essid {desired ssid}]
iwconfig eth1 essid WPSE
ifconfig interface [IP address |up|down]
ifconfig eth1 up
ifconfig eth1 192.168.11.127
Verify whether your wireless device is connected or not.
ping 192.168.11.1
Ok, if this information appearing in the screen. You are successful!
root@jel:/home/VT6655_Linux_src_v1.18.05_x86/driver# ping 192.168.11.1
PING 192.168.11.1 (192.168.11.1) 56(84) bytes of data.
64 bytes from 192.168.11.1: icmp_seq=1 ttl=64 time=6.17 ms
64 bytes from 192.168.11.1: icmp_seq=2 ttl=64 time=0.827 ms
64 bytes from 192.168.11.1: icmp_seq=3 ttl=64 time=1.17 ms
64 bytes from 192.168.11.1: icmp_seq=4 ttl=64 time=1.27 ms
64 bytes from 192.168.11.1: icmp_seq=5 ttl=64 time=0.883 ms
64 bytes from 192.168.11.1: icmp_seq=6 ttl=64 time=1.00 ms
64 bytes from 192.168.11.1: icmp_seq=8 ttl=64 time=0.913 ms
64 bytes from 192.168.11.1: icmp_seq=9 ttl=64 time=1.16 ms
64 bytes from 192.168.11.1: icmp_seq=10 ttl=64 time=0.879 ms

4.2
WEP MODE
May be your wireless router can be configured to shared key wep mode. That is the same as
the open-wep mode.
-3-
VIA VT6655 and VT6656 linux driver
User’s Guide
1. unhidden ssid
We can configurate unhidden ssid or hidden ssid via your wireless router.
ifconfig eth1 down
ifconfig eth1 up
iwconfig eth1 essid WPSE
ifconfig eth1 192.168.11.127
iwconfig eth1 key restricted [1] 1234567890
ping 192.168.11.1
2. hidden ssid
ifconfig eth1 down
ifconfig eth1 up
iwconfig eth1 essid WPSE
ifconfig eth1 192.168.11.127
iwconfig eth1 key restricted [1] 1234567890
ping 192.168.11.1
If you have any issue with iwconfig , please refer to man iwconfig command.
4.3

WPA-PSK TKIP/AES
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
-4-
VIA VT6655 and VT6656 linux driver
User’s Guide
priority=5
}
When you complete the configuration, save and close it. Notice the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notice the red typeface
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
-5-
VIA VT6655 and VT6656 linux driver
User’s Guide
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface, unhidden or hidden ssid depend on if we add this instruction
scan_ssid=1 to the script file.
Then, execute these commands.
ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2

notice the red typeface

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
-6-
VIA VT6655 and VT6656 linux driver
User’s Guide
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=WPA
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Then execute these commands.
ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
4.4

WPA2-PSK TKIP/AES
-7-
VIA VT6655 and VT6656 linux driver
User’s Guide
4.4.1

WPA2-PSK TKIP
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<-----8-
VIA VT6655 and VT6656 linux driver
User’s Guide
Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notice the red typeface.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
-9-
VIA VT6655 and VT6656 linux driver
User’s Guide
###WPA2-PSK ok
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"
- 10 -
VIA VT6655 and VT6656 linux driver
User’s Guide
#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=TKIP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
- 11 -
VIA VT6655 and VT6656 linux driver
User’s Guide
ifconfig eth1 192.168.11.127
ping 192.168.11.1
4.4.2

WPA2-PSK AES
1. unhidden ssid
You must still be in this directory:
VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/
cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8
gedit wpa_supplicant.conf

Configurate wpa_supplicant.conf file.
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

Notice: the red typeface.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
- 12 -
VIA VT6655 and VT6656 linux driver
User’s Guide
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2. hidden ssid
Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain.
gedit wpa_supplicant.conf

configurate wpa_supplicant.conf file. There are two configurations for hidden ssid.
1) ap_scan=1 & scan_ssid=1 notic the red typeface
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP
- 13 -
VIA VT6655 and VT6656 linux driver
User’s Guide
#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
scan_ssid=1
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1
2) ap_scan=2
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=2
- 14 -
VIA VT6655 and VT6656 linux driver
User’s Guide
# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok
#network={
#

ssid="linux"

#

psk="12345678"

#

priority=5

#}
####WPA-PSK ok
#network={
#

ssid="DLINK624"

#

psk="123456789"

#

proto=WPA

#

key_mgmt=WPA-PSK

#

pairwise=CCMP TKIP

#

group=CCMP TKIP WEP104 WEP40

#

priority=5

# }
###WPA2-PSK ok
network={
ssid="WPSE"
psk="1234567890"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP TKIP WEP104 WEP40
priority=5
}
When you complete the configuration, save and close it.

ifconfig eth1 up
./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd
When the information as follows appearing in the screen.
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=]
mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1
Transfer:key_mgmt=2
Transfer:proto=1
Transfer:eap=0
Transfer:authen status=TRUE
mike:wpa announce ok
………………….

Open the other terminal, and execute these instructions.
ifconfig eth1 192.168.11.127
ping 192.168.11.1

5. network manager
Make sure you have installed the driver.
- 15 -
VIA VT6655 and VT6656 linux driver
User’s Guide
Here, I will do these steps on Ubuntu 8.04
1. Open the Network settings window (system menu > administration > network)

2.

Open the wireless connection option

- 16 -
VIA VT6655 and VT6656 linux driver
User’s Guide
3.
4.

When you configured all the option, tip ok.
Open terminal window and ping IP address.
ping 192.168.11.1

- 17 -

More Related Content

What's hot

Linux Hardening - nullhyd
Linux Hardening - nullhydLinux Hardening - nullhyd
Linux Hardening - nullhyd
n|u - The Open Security Community
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
Gireesh Hariharasubramony
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
Saroj Sahu
 
How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan)
Naoto MATSUMOTO
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Saroj Sahu
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
IT Tech
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server Hardening
MyOwn Telco
 
Metasploitable
MetasploitableMetasploitable
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
seolangit4
 
GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-
Naoto MATSUMOTO
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFi
Naoto MATSUMOTO
 
Configure a Riak Cluster
Configure a Riak ClusterConfigure a Riak Cluster
Configure a Riak Cluster
Jeffrey Kirkell
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
Ekaterina Melnik
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
Vladimir Koychev
 
Wpa supplicant introduction
Wpa supplicant introductionWpa supplicant introduction
Wpa supplicant introduction
awkman
 
install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -
Naoto MATSUMOTO
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
angelitoh11
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
Narayana Samy
 
How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)
Saroj Sahu
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
Saroj Sahu
 

What's hot (20)

Linux Hardening - nullhyd
Linux Hardening - nullhydLinux Hardening - nullhyd
Linux Hardening - nullhyd
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
 
How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan) How to twist a IPv6 over Bluetooth (6lowpan)
How to twist a IPv6 over Bluetooth (6lowpan)
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...
 
8 steps to protect your cisco router
8 steps to protect your cisco router8 steps to protect your cisco router
8 steps to protect your cisco router
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server Hardening
 
Metasploitable
MetasploitableMetasploitable
Metasploitable
 
MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
 
GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-GCC ARM nRF51 IoT SDK -cheat sheet-
GCC ARM nRF51 IoT SDK -cheat sheet-
 
How to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFiHow to Connect MQTT Broker on ESP8266 WiFi
How to Connect MQTT Broker on ESP8266 WiFi
 
Configure a Riak Cluster
Configure a Riak ClusterConfigure a Riak Cluster
Configure a Riak Cluster
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
Snort-IPS-Tutorial
Snort-IPS-TutorialSnort-IPS-Tutorial
Snort-IPS-Tutorial
 
Wpa supplicant introduction
Wpa supplicant introductionWpa supplicant introduction
Wpa supplicant introduction
 
install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -install mosquitto-auth-plug - cheat sheet -
install mosquitto-auth-plug - cheat sheet -
 
Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
2.3.1.5 packet tracer configuring rapid pvst+ answer
2.3.1.5 packet tracer   configuring rapid pvst+ answer2.3.1.5 packet tracer   configuring rapid pvst+ answer
2.3.1.5 packet tracer configuring rapid pvst+ answer
 
How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
 

Similar to Vt6655 linux user_guide

OpenWRT manual
OpenWRT manualOpenWRT manual
OpenWRT manual
fosk
 
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Frederic Descamps
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
Shathees Rao
 
Kernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysisKernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysis
Anne Nicolas
 
Advanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suiteAdvanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suite
Kenny Gryp
 
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicHow to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
Circling Cycle
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
Chanaka Lasantha
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commands
ssusere31b5c
 
Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0
Rawntech Mak
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
Eng. Emad Al-Atoum
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
IT Tech
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...
LinuxCon ContainerCon CloudOpen China
 
Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!
All Things Open
 
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
archwisp
 
Linux Crash Dump Capture and Analysis
Linux Crash Dump Capture and AnalysisLinux Crash Dump Capture and Analysis
Linux Crash Dump Capture and Analysis
Paul V. Novarese
 
Control net modules
Control net modulesControl net modules
Control net modules
Jairo German
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
IT Tech
 
Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !
Dobrica Pavlinušić
 
Analisis_avanzado_vmware
Analisis_avanzado_vmwareAnalisis_avanzado_vmware
Analisis_avanzado_vmware
virtualizacionTV
 
Advanced Root Cause Analysis
Advanced Root Cause AnalysisAdvanced Root Cause Analysis
Advanced Root Cause Analysis
Eric Sloof
 

Similar to Vt6655 linux user_guide (20)

OpenWRT manual
OpenWRT manualOpenWRT manual
OpenWRT manual
 
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016Advanced percona xtra db cluster in a nutshell... la suite plsc2016
Advanced percona xtra db cluster in a nutshell... la suite plsc2016
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Kernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysisKernel Recipes 2015 - Kernel dump analysis
Kernel Recipes 2015 - Kernel dump analysis
 
Advanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suiteAdvanced Percona XtraDB Cluster in a nutshell... la suite
Advanced Percona XtraDB Cluster in a nutshell... la suite
 
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicHow to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
 
Free radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmapleFree radius billing server with practical vpn exmaple
Free radius billing server with practical vpn exmaple
 
Important cisco-chow-commands
Important cisco-chow-commandsImportant cisco-chow-commands
Important cisco-chow-commands
 
Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0Smart pos stepbystep-v2-0
Smart pos stepbystep-v2-0
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
 
See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...See what happened with real time kvm when building real time cloud pezhang@re...
See what happened with real time kvm when building real time cloud pezhang@re...
 
Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!Intro to Kernel Debugging - Just make the crashing stop!
Intro to Kernel Debugging - Just make the crashing stop!
 
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
 
Linux Crash Dump Capture and Analysis
Linux Crash Dump Capture and AnalysisLinux Crash Dump Capture and Analysis
Linux Crash Dump Capture and Analysis
 
Control net modules
Control net modulesControl net modules
Control net modules
 
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...How to recover password on the cisco catalyst fixed configuration layer 2&lay...
How to recover password on the cisco catalyst fixed configuration layer 2&lay...
 
Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !Linux+sensor+device-tree+shell=IoT !
Linux+sensor+device-tree+shell=IoT !
 
Analisis_avanzado_vmware
Analisis_avanzado_vmwareAnalisis_avanzado_vmware
Analisis_avanzado_vmware
 
Advanced Root Cause Analysis
Advanced Root Cause AnalysisAdvanced Root Cause Analysis
Advanced Root Cause Analysis
 

Recently uploaded

原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
mul1kv5w
 
The Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy townThe Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy town
John Emmett
 
The Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job OpportunitiesThe Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job Opportunities
LetsFAME
 
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen StageAbraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
DiaDan Holdings Ltd
 
Anasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award WinnerAnasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award Winner
Diwitya Bajwa
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
etycev
 
Top IPTV UK Providers of A Comprehensive Review.pdf
Top IPTV UK Providers of A Comprehensive Review.pdfTop IPTV UK Providers of A Comprehensive Review.pdf
Top IPTV UK Providers of A Comprehensive Review.pdf
Xtreame HDTV
 
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptxFrom Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
Swing Street Radio
 
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting SagaThe Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
greendigital
 
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite GameLeonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
greendigital
 
DIGIDEVTV A New area of OTT Distribution
DIGIDEVTV  A New area of OTT DistributionDIGIDEVTV  A New area of OTT Distribution
DIGIDEVTV A New area of OTT Distribution
joeqsm
 
From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28
get joys
 
University of Western Sydney degree offer diploma Transcript
University of Western Sydney degree offer diploma TranscriptUniversity of Western Sydney degree offer diploma Transcript
University of Western Sydney degree offer diploma Transcript
soxrziqu
 
Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23
get joys
 
The Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling cityThe Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling city
John Emmett
 
Odia New Web Series at your fingerprint.
Odia New Web Series at your fingerprint.Odia New Web Series at your fingerprint.
Odia New Web Series at your fingerprint.
mikedanoffice
 
Divertidamente SLIDE muito lindo e criativo, pptx
Divertidamente SLIDE muito lindo e criativo, pptxDivertidamente SLIDE muito lindo e criativo, pptx
Divertidamente SLIDE muito lindo e criativo, pptx
lunaemel03
 
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
sh8tjqt6
 
Emcee Profile_ Subbu from Bangalore .pdf
Emcee Profile_ Subbu from Bangalore .pdfEmcee Profile_ Subbu from Bangalore .pdf
Emcee Profile_ Subbu from Bangalore .pdf
subran
 
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate PortfolioLeonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
greendigital
 

Recently uploaded (20)

原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
原版制作(Mercer毕业证书)摩斯大学毕业证在读证明一模一样
 
The Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy townThe Enigmatic Portrait, In the heart of a sleepy town
The Enigmatic Portrait, In the heart of a sleepy town
 
The Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job OpportunitiesThe Future of Independent Filmmaking Trends and Job Opportunities
The Future of Independent Filmmaking Trends and Job Opportunities
 
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen StageAbraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
Abraham Laboriel Records ‘The Bass Walk’ at Evergreen Stage
 
Anasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award WinnerAnasuya Sengupta Cannes 2024 Award Winner
Anasuya Sengupta Cannes 2024 Award Winner
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证如何办理
 
Top IPTV UK Providers of A Comprehensive Review.pdf
Top IPTV UK Providers of A Comprehensive Review.pdfTop IPTV UK Providers of A Comprehensive Review.pdf
Top IPTV UK Providers of A Comprehensive Review.pdf
 
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptxFrom Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
From Swing Music to Big Band Fame_ 5 Iconic Artists.pptx
 
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting SagaThe Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
The Unbelievable Tale of Dwayne Johnson Kidnapping: A Riveting Saga
 
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite GameLeonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
Leonardo DiCaprio Super Bowl: Hollywood Meets America’s Favorite Game
 
DIGIDEVTV A New area of OTT Distribution
DIGIDEVTV  A New area of OTT DistributionDIGIDEVTV  A New area of OTT Distribution
DIGIDEVTV A New area of OTT Distribution
 
From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28From Teacher to OnlyFans: Brianna Coppage's Story at 28
From Teacher to OnlyFans: Brianna Coppage's Story at 28
 
University of Western Sydney degree offer diploma Transcript
University of Western Sydney degree offer diploma TranscriptUniversity of Western Sydney degree offer diploma Transcript
University of Western Sydney degree offer diploma Transcript
 
Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23Sara Saffari: Turning Underweight into Fitness Success at 23
Sara Saffari: Turning Underweight into Fitness Success at 23
 
The Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling cityThe Gallery of Shadows, In the heart of a bustling city
The Gallery of Shadows, In the heart of a bustling city
 
Odia New Web Series at your fingerprint.
Odia New Web Series at your fingerprint.Odia New Web Series at your fingerprint.
Odia New Web Series at your fingerprint.
 
Divertidamente SLIDE muito lindo e criativo, pptx
Divertidamente SLIDE muito lindo e criativo, pptxDivertidamente SLIDE muito lindo e criativo, pptx
Divertidamente SLIDE muito lindo e criativo, pptx
 
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
原版制作(MUN毕业证书)纽芬兰纪念大学毕业证PDF成绩单一模一样
 
Emcee Profile_ Subbu from Bangalore .pdf
Emcee Profile_ Subbu from Bangalore .pdfEmcee Profile_ Subbu from Bangalore .pdf
Emcee Profile_ Subbu from Bangalore .pdf
 
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate PortfolioLeonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
Leonardo DiCaprio House: A Journey Through His Extravagant Real Estate Portfolio
 

Vt6655 linux user_guide

  • 1. VT6655/6656 Linux Driver USER’S GUIDE Revision v2.0 July 16, 2008 VIA TECHNOLOGIES,INC.
  • 2. VIA VT6655 and VT6656 linux driver User’s Guide Table of Contents 1. Release Note ……………………………………………………………….……...2 1.1 1.2 2. Revision History …………………………………………………………………...2 Function ………….………………………………………………………………...2 Features ……………………………………………………………………………..2 2.1 This source code package can be use in Linux version ……….……...………….....2 2.2 Contents of the Subdirectory ……………………………………………………….2 3. Compile and install driver ………………………………………...................... 2 3.1 Compile the driver …………...………………………………………………….....2 3.2 Install the driver …………………………………………………………………....3 4. Driver Configuration /Parameters……………………………..…………..….3 4.1 open mode ……………………………………………………………………….....3 4.2 wep mode ………………………………………………………………………..…3 4.3 WPA-PSK TKIP/AES ……………………………………………………………...4 4.4 WPA2-PSK TKIP/AES ………………………………………………………….…7 4.4.1 WPA2-PSK TKIP ……………………………………………………………...8 4.4.2 WPA2-PSK AES ……………………………………………………………...12 5. Network Manager……………………………………………..…………………15 -1-
  • 3. VIA VT6655 and VT6656 linux driver User’s Guide 1. Release Note 1.1 Revision History Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file. 1.2 Function Refer to /VT665x_Linux_src_v1.1x_x86/codechangeindex.txt file. 2. Features This user manual is applied for VNT6655GMA00, VNT6655GCV00, VNT6655GPV00, VNT6656GEV00, VNT6656GUA00, VNT6656GUV00, VNT6656G6A10 and VNT6656G 6A40 series models. This source code package can be use in Linux version : Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file. 2.2 Contents of the Subdirectory Refer to /VT665x_Linux_src_v1.1x_x86/linux.txt file. 3. Compile and Install driver Notice: here, I compile and install VT6655_linux_src_v1.18.05_x86, please use your driver replace it and if you use VT6656 do this, please use vntwusb.ko replace viawget.ko that appearing in the guide. Open the computer and run Linux operating system, you must do all the steps here as the root user. Please make sure your root login. By the way , make sure you have installed essential compilation tools , build-essential and linux-headers-xxxx. First, copy the driver package to your directory. Here, I copy the driver to /home directory. Enter your directory. cd /home Then, we unpack the driver source code and openssl-0.9.8a unzip VT6655_Linux_src_v1.18.05_x86.zip cd VT6655_Linux_src_v1.18.05_x86/wpa_supplicant unzip openssl-0.9.8a.zip 3.1 Compile the driver cd /home/ VT6655_Linux_src_v1.18.05_x86 make clean make install cd /home/ VT6655_Linux_src_v1.18.05_x86/wpa_supplicant/openssl-0.9.8a make install cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 make install If you execute make clean, and then detect error: -2-
  • 4. VIA VT6655 and VT6656 linux driver User’s Guide Makefile: 23: *** Linux kernel source not found. You can execute this instruction for link the source in to the kernels binary directory. ln -s /usr/src/linux-headers-‘uname –r’ /lib/modules/‘uname –r’/source 3.2 Install the driver cd /home/ VT6655_Linux_src_v1.18.05_x86/driver insmod viawget.ko If you execute insmod, appear insmod: error inserting ‘viawget.ko’:-1 File exists. Then, remove the driver: rmmod viawget.ko, execute insmod viawget.ko again. 4. Driver Configuration/Parameters The driver can be configured via two interfaces; 1) command and configuration files 2) network manager and now we use command and configuration files to run the driver. In next chapter, we will introduce the network manager. Notice: Don’t use command mode and network manager at the same time. 4.1 OPEN MODE You can execute iwconfig instruction to obtain the wireless device interface. If you have some issue, execute man iwconfig for more information. iwconfig Then, we can configurate the ESSID and Network address. iwconfig interface [essid {desired ssid}] iwconfig eth1 essid WPSE ifconfig interface [IP address |up|down] ifconfig eth1 up ifconfig eth1 192.168.11.127 Verify whether your wireless device is connected or not. ping 192.168.11.1 Ok, if this information appearing in the screen. You are successful! root@jel:/home/VT6655_Linux_src_v1.18.05_x86/driver# ping 192.168.11.1 PING 192.168.11.1 (192.168.11.1) 56(84) bytes of data. 64 bytes from 192.168.11.1: icmp_seq=1 ttl=64 time=6.17 ms 64 bytes from 192.168.11.1: icmp_seq=2 ttl=64 time=0.827 ms 64 bytes from 192.168.11.1: icmp_seq=3 ttl=64 time=1.17 ms 64 bytes from 192.168.11.1: icmp_seq=4 ttl=64 time=1.27 ms 64 bytes from 192.168.11.1: icmp_seq=5 ttl=64 time=0.883 ms 64 bytes from 192.168.11.1: icmp_seq=6 ttl=64 time=1.00 ms 64 bytes from 192.168.11.1: icmp_seq=8 ttl=64 time=0.913 ms 64 bytes from 192.168.11.1: icmp_seq=9 ttl=64 time=1.16 ms 64 bytes from 192.168.11.1: icmp_seq=10 ttl=64 time=0.879 ms 4.2 WEP MODE May be your wireless router can be configured to shared key wep mode. That is the same as the open-wep mode. -3-
  • 5. VIA VT6655 and VT6656 linux driver User’s Guide 1. unhidden ssid We can configurate unhidden ssid or hidden ssid via your wireless router. ifconfig eth1 down ifconfig eth1 up iwconfig eth1 essid WPSE ifconfig eth1 192.168.11.127 iwconfig eth1 key restricted [1] 1234567890 ping 192.168.11.1 2. hidden ssid ifconfig eth1 down ifconfig eth1 up iwconfig eth1 essid WPSE ifconfig eth1 192.168.11.127 iwconfig eth1 key restricted [1] 1234567890 ping 192.168.11.1 If you have any issue with iwconfig , please refer to man iwconfig command. 4.3 WPA-PSK TKIP/AES 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok network={ ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 -4-
  • 6. VIA VT6655 and VT6656 linux driver User’s Guide priority=5 } When you complete the configuration, save and close it. Notice the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notice the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok -5-
  • 7. VIA VT6655 and VT6656 linux driver User’s Guide network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface, unhidden or hidden ssid depend on if we add this instruction scan_ssid=1 to the script file. Then, execute these commands. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 notice the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 -6-
  • 8. VIA VT6655 and VT6656 linux driver User’s Guide # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok network={ ssid="WPSE" psk="1234567890" proto=WPA key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Then execute these commands. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 4.4 WPA2-PSK TKIP/AES -7-
  • 9. VIA VT6655 and VT6656 linux driver User’s Guide 4.4.1 WPA2-PSK TKIP 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<-----8-
  • 10. VIA VT6655 and VT6656 linux driver User’s Guide Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notice the red typeface. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } -9-
  • 11. VIA VT6655 and VT6656 linux driver User’s Guide ###WPA2-PSK ok network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" - 10 -
  • 12. VIA VT6655 and VT6656 linux driver User’s Guide # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=TKIP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. - 11 -
  • 13. VIA VT6655 and VT6656 linux driver User’s Guide ifconfig eth1 192.168.11.127 ping 192.168.11.1 4.4.2 WPA2-PSK AES 1. unhidden ssid You must still be in this directory: VT6656_Linux_src_v1.18.05_x86/wpa_supplicant/wpa_supplicant-0.5.8/ cd /home/ VT6655_Linux_src_v1.18.05_x86/ wpa_supplicant/wpa_supplicant-0.5.8 gedit wpa_supplicant.conf Configurate wpa_supplicant.conf file. ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. Notice: the red typeface. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. - 12 -
  • 14. VIA VT6655 and VT6656 linux driver User’s Guide State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2. hidden ssid Make sure you still be in wpa_supplicant-0.5.8 subdirectory remain. gedit wpa_supplicant.conf configurate wpa_supplicant.conf file. There are two configurations for hidden ssid. 1) ap_scan=1 & scan_ssid=1 notic the red typeface ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=1 # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP - 13 -
  • 15. VIA VT6655 and VT6656 linux driver User’s Guide # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ scan_ssid=1 ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: startWhen --> 0 Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 2) ap_scan=2 ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 eapol_version=1 ap_scan=2 - 14 -
  • 16. VIA VT6655 and VT6656 linux driver User’s Guide # Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphers ok #network={ # ssid="linux" # psk="12345678" # priority=5 #} ####WPA-PSK ok #network={ # ssid="DLINK624" # psk="123456789" # proto=WPA # key_mgmt=WPA-PSK # pairwise=CCMP TKIP # group=CCMP TKIP WEP104 WEP40 # priority=5 # } ###WPA2-PSK ok network={ ssid="WPSE" psk="1234567890" proto=RSN key_mgmt=WPA-PSK pairwise=CCMP group=CCMP TKIP WEP104 WEP40 priority=5 } When you complete the configuration, save and close it. ifconfig eth1 up ./wpa_supplicant –c wpa_supplicant.conf –i eth1 –Dviawget –dd When the information as follows appearing in the screen. State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 00:16:01:f0:24:8b completed (auth) [id=0 id_str=] mike:hello!!!------>wpa_supplicant<----Transfer:device name=eth1 Transfer:key_mgmt=2 Transfer:proto=1 Transfer:eap=0 Transfer:authen status=TRUE mike:wpa announce ok …………………. Open the other terminal, and execute these instructions. ifconfig eth1 192.168.11.127 ping 192.168.11.1 5. network manager Make sure you have installed the driver. - 15 -
  • 17. VIA VT6655 and VT6656 linux driver User’s Guide Here, I will do these steps on Ubuntu 8.04 1. Open the Network settings window (system menu > administration > network) 2. Open the wireless connection option - 16 -
  • 18. VIA VT6655 and VT6656 linux driver User’s Guide 3. 4. When you configured all the option, tip ok. Open terminal window and ping IP address. ping 192.168.11.1 - 17 -