-
-
Save projectgus/5d18fdd40d601eb24a5a to your computer and use it in GitHub Desktop.
LCA2015 SimpleBot/Raspberry Pi Wifi Config
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
* There are two config files further down this page. Place them on the second partition (rootfs, | |
the ext4 partition) of your SimpleBot/Raspberry Pi SD card. | |
* Remember to edit in the correct conference credentials inside the wpa_supplicant.conf | |
file. | |
* Run the 'passwd' command on the Pi to change the pi user's default password - | |
unless you are very generous about who gets to drive your robot (& own your | |
robot's OS). | |
* You should probably also firewall against any services you don't explicitly | |
want. You can start with these commands on the Pi: | |
sudo apt-get install ufw | |
sudo ufw allow ssh | |
sudo ufw allow 5353 | |
sudo ufw enable | |
(It'll warn you when you run 'ufw enable', but as long as you ran the 'allow ssh' | |
step already then all will be OK and you won't lock yourself out.) | |
Once ufw is enabled, if you want to run a new service - ie a web server or something - | |
then you'll need to allow this service name or port via ufw, also. | |
* If you haven't already booted the SD card, remove the line "wifichanged=1" from | |
the "machine.local" file on the first partition (/boot, the FAT partition) if | |
the line is there. After first boot this line is removed so you can skip this. | |
* Feel free to seek me out if I can help you to get this working (I want to see | |
all the SimpleBots on the network!) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This file goes in /etc/network/interfaces | |
auto lo | |
iface lo inet loopback | |
allow-hotplug eth0 | |
iface eth0 inet dhcp | |
auto ra0 | |
allow-hotplug ra0 | |
iface ra0 inet manual | |
wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf | |
iface default inet dhcp |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This file goes in /etc/wpa_supplicant/wpa_supplicant.conf | |
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev | |
update_config=1 | |
network={ | |
scan_ssid=1 | |
ssid="LCA2015" | |
proto=WPA2 | |
key_mgmt=WPA-EAP | |
pairwise=CCMP TKIP | |
group=CCMP TKIP | |
eap=PEAP | |
identity="IDENTITYGOESHERE" | |
password="SUPERSECRETPASSWORDGOESHERE" | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Looks like mdns (avahi) is filtered on the LCA2015 network, how can we tell what IP it gets in order to ssh in?