network_list = uoa default_netname = uoa startup_command = echo "starting xsupplicant on interface %i" first_auth_command = dhclient %i reauth_command = echo "re authenticated user on %i" # When running in daemon, or non-foreground mode, you may want to have the # output of the program. So, define a log file here. Each time XSupplicant # is started, this file will be replaced. So, there is no need to roll the # log file. logfile = /var/log/xsupplicant.log # Defining an interface in "allow_interfaces" will bypass the rules that # xsupplicant uses to determine if an interface is valid. For most people # this setting shouldn't be needed. It is useful for having xsupplicant # attempt to authenticate on interfaces that don't appear to be true # physical interfaces. (i.e. Virtual interfaces such as eth0:1) #allow_interfaces = eth0, wlan0 # Defining an interface in "deny_interfaces" will prevent xsupplicant from # attempting to authenticate on a given interface. This is useful if you # know that you will never do 802.1x on a specific interface. However, # allows will take priority over denies, so defining the same interface in # the allow_interfaces, and deny_interfaces will result in the interface # being used. deny_interfaces = eth0, ppp0 ### NETWORK SECTION uoa { type = wireless allow_types = eap_peap identity = mrea005 eap-peap { ### ### Update the following entries to point to your certificate and key details ### # user_key = /etc/ssl/private/ssh_host_rsa_key user_key = /home/morgan/Desktop/xsupplicant/client.key # user_key_pass = password # root_cert = /usr/lib/ssl/certs/verisign_2028.pem root_cert = /home/morgan/Desktop/xsupplicant/verisign_2028.pem # root_dir = /etc/1x/cert # crl_dir = /etc/ssl/crl ### ### ### chunk_size = 1398 random_file = /dev/urandom #cncheck = myradius.radius.com # Verify the server certificate # has this value in it's CN field. #cnexact = yes # Should it be an exact match? session_resume = yes #Currently 'all' is just mschapv2 #If no allow_types is defined, all is assumed #allow_types = all # where all = MSCHAPv2, MD5, OTP, GTC, SIM #allow_types = all #random_file = /dev/urandom allow_types = eap-mschapv2 ias_quirk = yes eap-mschapv2 { username = mrea005 password = ****** optionally your netaccount password ******** } } }