Hi! Some general question + Wifi USB Realtek RTL8191S

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby matzi » Sat Nov 02, 2013 8:12 pm

which location to save the *.co file?
matzi
Donator VIP
Donator VIP
 
Posts: 253
Joined: Wed Jul 06, 2011 8:08 am
Location: Hannover Germany

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sat Nov 02, 2013 8:14 pm

you must put the 8712u.ko file in /lib/modules/3.9.5
and then perform
Code: Select all
modprobe 8712u
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby matzi » Sat Nov 02, 2013 8:44 pm

The new driver works! :applause :applause :applause


The connection loss after unplugging lan cable is still there.

It does not successful execute the startup commands in rcS anymore. Have to do it manually in a ssh window. is there a better location later in the boot process?

Edit:
wpa_supplicant has some complaints:
root@fvdwsl-base:/ # wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -B
Successfully initialized wpa_supplicant
rfkill: Cannot open RFKILL control device
ioctl[SIOCSIWAP]: Operation not permitted


Not sure if it matters?
matzi
Donator VIP
Donator VIP
 
Posts: 253
Joined: Wed Jul 06, 2011 8:08 am
Location: Hannover Germany

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sat Nov 02, 2013 8:58 pm

:punk

insert the module can be done in the insert-modules scipt in /etc/init.d

bringing it up should require commands like this

Code: Select all
ifconfig wlan0 up
wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -B
udhcpc -b -i wlan0 -q -s /etc/simple.script


the content of the wpa-supplicant.conf should be like this

Code: Select all
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=root
update_config=1

network={
ssid="your-sid"
psk="your-passkey"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP TKIP
group=CCMP TKIP
}


simple scipt I attched to this post

To kill it you should use this
Code: Select all
wpa_cli disconnect
wpa_cli terminate


two questions,
does it get now an ip address ?
is it visible in your router as client on wireless network

ps running wpa-supplicant with -d option instead of -B will enable debug mode and gives lots of info what is going on
You do not have the required permissions to view the files attached to this post.
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sat Nov 02, 2013 9:02 pm

about these two messages form wpa_supplicant, yes I saw these on the internet,
they monetion that we can ignore them but I am not sure. Also check dmesg I think wpa_supplicant may cause some oops errors
From what I read on the internet it seems we need to use an older version of wpa-supplicant.
I will try to compile the one included in your driver package

But at least the dongle works also with these error messages :mrgreen:
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby matzi » Sat Nov 02, 2013 9:28 pm

wpa_supplicant output:

root@fvdwsl-base:/ # wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf -d
wpa_supplicant v2.0
random: Trying to read entropy from /dev/random
Successfully initialized wpa_supplicant
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='DIR=/var/run/wpa_supplicant GROUP=root'
update_config=1
Priority group 0
id=0 ssid='Great Balls of Fire'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy0
rfkill: Cannot open RFKILL control device
WEXT: RFKILL status not available
SIOCGIWRANGE: WE(compiled)=22 WE(source)=16 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0x1f flags 0x0
ioctl[SIOCSIWAP]: Operation not permitted
WEXT: Failed to clear BSSID selection on disconnect
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: 00:0d:81:aa:25:7e
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 07 b6 c0 8c 52 38 59 10 ae 23 4c 81 2b 8a 5a dc
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
ctrl_interface_group=0 (from group name 'root')
wlan0: Added interface wlan0
wlan0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
wlan0: State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=19):
47 72 65 61 74 20 42 61 6c 6c 73 20 6f 66 20 46 Great Balls of F
69 72 65 ire
wlan0: Starting AP scan for wildcard SSID (Interleave with specific)
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 494 bytes of scan results (2 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 00:24:fe:a3:73:14 SSID 'Great Balls of Fire'
wlan0: BSS: Add new id 1 BSSID bc:05:43:d0:7a:29 SSID 'JACK'
BSS: last_scan_res_used=2/32 last_scan_full=0
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:24:fe:a3:73:14 ssid='Great Balls of Fire' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 level=100
wlan0: selected based on RSN IE
wlan0: selected BSS 00:24:fe:a3:73:14 ssid='Great Balls of Fire'
wlan0: Request association: reassociate: 0 selected: 00:24:fe:a3:73:14 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
wlan0: Trying to associate with 00:24:fe:a3:73:14 (SSID='Great Balls of Fire' freq=2417 MHz)
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID 00:24:fe:a3:73:14
RSN: No PMKSA cache entry found
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Limit connection to BSSID 00:24:fe:a3:73:14 freq=2417 MHz based on scan results (bssid_set=0)
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 494 bytes of scan results (2 BSSes)
wlan0: BSS: Start scan result update 2
BSS: last_scan_res_used=2/32 last_scan_full=0
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:24:fe:a3:73:14 ssid='Great Balls of Fire' wpa_ie_len=22 rsn_ie_len=20 caps=0x11 level=100
wlan0: selected based on RSN IE
wlan0: selected BSS 00:24:fe:a3:73:14 ssid='Great Balls of Fire'
wlan0: Already associated with the selected AP
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=27
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:24:fe:a3:73:14
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=00:24:fe:a3:73:14
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 00:24:fe:a3:73:14
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
wlan0: RX EAPOL from 00:24:fe:a3:73:14
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: EAPOL-Key type=2
wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): eb bc 22 c1 a2 0c c5 04 99 11 d8 b8 c2 fa 9e 23 1c a8 d6 6a da 57 46 b6 8b 64 40 70 17 69 31 0a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 00:24:fe:a3:73:14 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): a0 b5 d5 47 6a a0 49 cf 8b 48 4b 37 83 5d 29 b1 77 bd fa b9 cb d3 28 b6 2f 10 88 7e 62 35 eb a9
WPA: PTK derivation - A1=00:0d:81:aa:25:7e A2=00:24:fe:a3:73:14
WPA: Nonce1 - hexdump(len=32): a0 b5 d5 47 6a a0 49 cf 8b 48 4b 37 83 5d 29 b1 77 bd fa b9 cb d3 28 b6 2f 10 88 7e 62 35 eb a9
WPA: Nonce2 - hexdump(len=32): eb bc 22 c1 a2 0c c5 04 99 11 d8 b8 c2 fa 9e 23 1c a8 d6 6a da 57 46 b6 8b 64 40 70 17 69 31 0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 37 6c 4a 23 68 0f ae 43 c2 16 93 c5 3f 00 b7 60
wlan0: RX EAPOL from 00:24:fe:a3:73:14
wlan0: IEEE 802.1X RX: version=2 type=3 length=167
wlan0: EAPOL-Key type=2
wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0: key_length=16 key_data_length=72
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): eb bc 22 c1 a2 0c c5 04 99 11 d8 b8 c2 fa 9e 23 1c a8 d6 6a da 57 46 b6 8b 64 40 70 17 69 31 0a
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 38 06 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): d5 cc b7 f4 3e d7 9b 24 10 91 be 59 ea 2b 46 c6
RSN: encrypted key data - hexdump(len=72): 44 6e eb a3 6a 78 ec a6 86 6d c5 20 a1 b5 cd c3 5c 44 09 19 fd 92 d4 b0 d1 8e a9 8a b0 03 97 e2 b0 78 df d7 bd 95 c2 f5 10 5b e7 4f 02 34 f3 23 b1 d7 65 c6 57 d9 d7 44 0a e2 06 43 44 0e d7 ab 97 b6 3f c5 55 01 9e 58
WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 00:24:fe:a3:73:14 (ver=2)
WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 4f e1 52 dd e6 af 60 02 fc 9f da 84 92 c7 03 5e b4 08 c5 49 de ce 95 05 62 c6 d9 a5 3f 31 fc f9 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): f2 ad 4b c2 ff 0f f8 83 cc 58 1c 33 00 c5 b6 64
wlan0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32)
WPA: RSC - hexdump(len=6): 38 06 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
wlan0: WPA: Key negotiation completed with 00:24:fe:a3:73:14 [PTK=CCMP GTK=TKIP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: CTRL-EVENT-CONNECTED - Connection to 00:24:fe:a3:73:14 completed [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick


Pay attention to the last line. It does not finish - The prompt does not show up. I have to use control c to break it.

udhcpc does not work. Even when I use it manually. No lease assgigned. But may be a consequence of the missed wpa_supplicant call?
matzi
Donator VIP
Donator VIP
 
Posts: 253
Joined: Wed Jul 06, 2011 8:08 am
Location: Hannover Germany

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sat Nov 02, 2013 9:49 pm

in debug mode (-d) you won't get a prompt it will continue to run (it should0
When running it with -B option it goes in daemon mode and that why you get with that command the prompt.
In fact in then still runs in the background (as it should, I think)

You can open a second ssh window to give other commands.
To see the status of your dongle the command
Code: Select all
wpa_cli status

it should show wpa_state=COMPLETED
(amongst others)
if it mentions scanning then the dongle is not scanning the wireless networks, but not connected.
Then probably you have error in you wpa config file
ps be aware the ssid name is case sensitive.

also the command
Code: Select all
iwlist wlan0 scanning

is very informative it will show you what wireless networks it found...
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sat Nov 02, 2013 9:52 pm

here output what I get from wpa-cli status
Code: Select all
root@nwsp2-5:/ # wpa_cli status
Selected interface 'wlan0'
bssid=00:24:01:28:ac:5d
ssid=wiel2
id=0
mode=station
pairwise_cipher=CCMP
group_cipher=TKIP
key_mgmt=WPA2-PSK
wpa_state=COMPLETED
ip_address=192.168.1.165
address=64:d1:a3:18:e5:cd
root@nwsp2-5:/ #


the fact that udhcpc doesn't work and get no lease indicates that the dongle has no connection with the wireless lan server
For that reason also the connection is lost when disconnecting the lan cable.
So I *think* you still have a connection problem (most likely the wpa conf file)
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby matzi » Sat Nov 02, 2013 11:16 pm

You were right, something went wrong with my encrypted passphrase. Corrected it and got the connection and the lease by udhcpc back. But there is still the unplug cable issue.

I have connection when I run udhcpc and manual assignment. Without manual assignment it has an ip6 adress but no ip4.
matzi
Donator VIP
Donator VIP
 
Posts: 253
Joined: Wed Jul 06, 2011 8:08 am
Location: Hannover Germany

Re: Hi! Some general question + Wifi USB Realtek RTL8191S

Postby fvdw » Sun Nov 03, 2013 8:45 am

how do you do the manual assignment then ?
iit should be like this
Code: Select all
ifconfig wlan0 192.168.x.y 255.255.255.0 255.255.255.255

also just
Code: Select all
ifconfig wlan0 192.168.x.y

should work. It are the commands the "simple.script" also uses. On top of that scrip adds some routes as explained by Jocko

About unplugging the cable.
If you first do ifconfig eth0 down then it won't happen. Still need to find out why that is.
The funny thing is that even with the cable disconnected the old ip it had on that is reachable. It must be via the wireless dongle. It seems the nas still response to packets for that ip number. I can stop door assigning another ip to eth0 when it is down.
So still some
fvdw
Site Admin - expert
 
Posts: 13471
Joined: Tue Apr 12, 2011 2:30 pm
Location: Netherlands

PreviousNext

Return to Development

Who is online

Users browsing this forum: No registered users and 10 guests