0% found this document useful (0 votes)
34 views3 pages

Codigos Linux

This document provides instructions to configure a Raspberry Pi as a WiFi router. It includes steps to set a static IP for the wireless interface, install required packages like dnsmasq and hostapd, configure the wireless settings and security, enable IP forwarding, and set up NAT and DHCP services.

Uploaded by

Sebastian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views3 pages

Codigos Linux

This document provides instructions to configure a Raspberry Pi as a WiFi router. It includes steps to set a static IP for the wireless interface, install required packages like dnsmasq and hostapd, configure the wireless settings and security, enable IP forwarding, and set up NAT and DHCP services.

Uploaded by

Sebastian
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

# Conectar a Wifi #

sudo nano /etc/network/interfaces


#Agregar despues de iface wlan0

allow-hotplug wlan0
iface wlan0 inet static

# instalar dhcp
# instalar dnsmasq

# Configuracion de wifi como router #

sudo apt-get install dnsmasq hostapd


sudo nano /etc/dhcpcd.conf

#Agregar al final del archivo: denyinterfaces wlan0


sudo nano /etc/network/interfaces
#Reemplazar wlan0 con:

allow-hotplug wlan0

iface wlan0 inet static


address 172.24.1.1
netmask 255.255.255.0
network 172.24.1.0
broadcast 172.24.1.255
###########################
sudo service dhcpcd restart
sudo ifdown wlan0; sudo ifup wlan0
sudo nano /etc/hostapd/hostapd.conf
#Copiar el siguiente codigo:

# This is the name of the WiFi interface we configured above


interface=wlan0

# Use the nl80211 driver with the brcmfmac driver


driver=nl80211

# This is the name of the network


ssid=Jonathan

# Use the 2.4GHz band


hw_mode=g

# Use channel 6
channel=6

# Enable 802.11n
ieee80211n=1

# Enable WMM
wmm_enabled=1

# Enable 40MHz channels with 20ns guard interval


ht_capab=[HT40][SHORT-GI-20][DSSS_CCK-40]

# Accept all MAC addresses


macaddr_acl=0

# Use WPA authentication


auth_algs=1

# Require clients to know the network name


ignore_broadcast_ssid=0

# Use WPA2
wpa=2

# Use a pre-shared key


wpa_key_mgmt=WPA-PSK

# The network passphrase


wpa_passphrase=Jonathan99

# Use AES, instead of TKIP


rsn_pairwise=CCMP

###########################

sudo nano /etc/default/hostapd


#Reemplazar #DAEMON_CONF="" con: DAEMON_CONF="/etc/hostapd/hostapd.conf"
sudo mv /etc/dnsmasq.conf /etc/dnsmasq.conf.orig
sudo nano /etc/dnsmasq.conf
#Copiar el siguiente codigo:
###########################

interface=wlan0 # Use interface wlan0


listen-address=172.24.1.1 # Explicitly specify the address to listen on
bind-interfaces # Bind to the interface to make sure we aren't sending things
elsewhere
server=8.8.8.8 # Forward DNS requests to Google DNS
domain-needed # Don't forward short names
bogus-priv # Never forward addresses in the non-routed address spaces.
dhcp-range=172.24.1.50,172.24.1.150,12h # Assign IP addresses between 172.24.1.50
and 172.24.1.150 with a 12 hour lease time

###########################

sudo nano /etc/sysctl.conf


#Eliminar el # a la linea: net.ipv4.ip_forward=1

sudo sh -c "echo 1 > /proc/sys/net/ipv4/ip_forward"


sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
sudo iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j
ACCEPT
sudo iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT
sudo sh -c "iptables-save > /etc/iptables.ipv4.nat"
sudo nano /etc/rc.local
#Copiar esta linea sobre o antes de "exit 0": iptables-restore <
/etc/iptables.ipv4.nat
sudo service hostapd start
sudo service dnsmasq start
sudo reboot -n

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy