aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/hostapd/patches/510-bring_down_interface.patch
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2013-08-06 18:55:30 +0000
committerFelix Fietkau <nbd@openwrt.org>2013-08-06 18:55:30 +0000
commit388917caf95296a1e2a2a0dedeb8c83ed231326c (patch)
tree3b84f740e50e8dc6c38b1c11300e99fcafa2ff87 /package/network/services/hostapd/patches/510-bring_down_interface.patch
parent485af0c163b39d6b35484528f39a1fcae669d44b (diff)
downloadupstream-388917caf95296a1e2a2a0dedeb8c83ed231326c.tar.gz
upstream-388917caf95296a1e2a2a0dedeb8c83ed231326c.tar.bz2
upstream-388917caf95296a1e2a2a0dedeb8c83ed231326c.zip
hostapd: Settings for DAE/CoA server
hostapd supports "Dynamic Authorization Extensions", making it possible to forcibly disconnect a user by sending it a RADIUS "Disconnect-Request" packet. I've added three new variables to enable setting of the "radius_das_client" and "radius_das_port" variables in the hostapd configuration, which enable these extensions. * dae_client - IP of the client that can send disconnect requests * dae_secret - shared secret for DAE packets These are combined into the "radius_das_client" option in hostapd.conf To enable the server, both dae_client and dae_secret must be set. * dae_port - optional, default value is 3799 as specified in RFC 5176 Signed-off-by: Martijn van de Streek <martijn@vandestreek.net> git-svn-id: svn://svn.openwrt.org/openwrt/trunk@37734 3c298f89-4303-0410-b956-a3cf2f4a3e73
Diffstat (limited to 'package/network/services/hostapd/patches/510-bring_down_interface.patch')
0 files changed, 0 insertions, 0 deletions