- Disable generate_psk by default to prevent issues with PSK roaming on VLANs
- Set message_exchange to 'ds' for SAE/WPA3 RADIUS roaming
Signed-off-by: John Crispin <john@phrozen.org>
creating a meshpoint interface with no batman-adv tunnel being present generates
an invalid configuration.
Signed-off-by: Aditya-Rai-25 <aditya21.rai@routerarchitects.com>
Since PSE Power on/off Control needs to be done through the ucentral config file, multiple config nodes and corresponding ucodes have been added.
Poe is placed under the ethernet node.
Fixes: WIFI-14724
Signed-off-by: jackcybertan <jack.tsai@cybertan.com.tw>
1. Extend ucentral schema & state for HaLow
2. Refine "system" into "sysinfo" to avoid confliction with system trace in state.uc
Fixes: WIFI-14436
Signed-off-by: Ian Chen <ian77_chen@accton.com>
Use same keyword "dhcp-inject" in config file in both services and interfaces->ssids->services
Fixes: WIFI-14573
Signed-off-by: alex18_huang <alex18_huang@accton.com>
This option specifies the maximum time (in seconds) a client can remain idle before it gets disconnected.
It can be configured under ssids in the config.
Signed-off-by: Venkat Chimata <venkata@shasta.cloud>
Add a new encryption type to specify MPSK AAA for 6GHz.
mpsk-radius encryption means:
- psk2-radius for 2.4GHz, 5GHz
- sae for 6GHz
Signed-off-by: Marek Kwaczynski <marek@shasta.cloud>
When configuring an SSID for 6G + 5G and/or 2G, it's possible to use
WPA3-Transition mode which is configured in the uCentral schema using
the 'sae-mixed' value. When this is converted into the UCI
configuration, the 6G PHY ssid entry must be configured for 'sae' while
the other band(s) stay with 'sae-mixed'
Signed-off-by: Paul White <paul@shasta.cloud>
When using dynamic (dhcp) addressing for IPv4, allow the vendor-class
and list of requested options to be configured, along with specific
defaults:
vendor-class default is "OpenLAN"
requested options default is [ 43, 60, 224 ]
These defaults enable support for cloud discovery FQDN (224) and the
DHCP-VSI feature (43, 60)
Fixes: WIFI-14271
Signed-off-by: Paul White <paul@shasta.cloud>
Do not validate encryption against bands supported by the phy, but
against the band in use by getting the cross-section of ssid bands and
phy bands.
Fixes no default wireless configuration being generated if the phy is
both 5G and 6G capable, as all 6G encryption constraints are applied
even if the radio isn't configured for the 6G band.
Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
We treated ssid.encryption.proto = "none" in validate_encryption() as no
encryption, we should do the same in match_ieee80211w().
Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>