Setup wireless connection with wep and knoppix 3.6

Posted on 2004-10-29
Medium Priority
Last Modified: 2012-06-22
I have a laptop running knoppix for fun with a orinoco gold card. I have no problem getting on a non-secured network because knoppix automatically configures everything on bootup. I took my laptop to work where we have a secured network and I know the wep key. I don't know how to configure my connection to get onto the secured network. I have the wireless toolkit installed with knoppix and I have no problem getting on at home or at a cafe, just at work. I would like to find a step by step guide or if all fails then someone to help me through setting up my nic to use a wep key to get on a network. I have some basic linux knowledge but it's limited.

Question by:wgordy
1 Comment

Accepted Solution

john_bindas earned 2000 total points
ID: 12449922
You should have the iw* commands available to you: iwconfig, iwlist, iwspy, iwpriv . The main stay of manupliating wireless settings from the command line is iwconfig. iwconfig is to wireless as ifconfig is to wired. Assuming that Knoppix uses wlan0 for you wireless card the commands look like this:

To set your ssid (just in case):
iwconfig wlan0 essid YOURNET_SSID

To configure a wep key:
iwconfig wlan0 key restricted YOUR_WEP_KEY

To set a key other than the current use [index] before  the key:
iwconfig wlan0 key restricted [2] YOUR_WEP_KEY2
iwconfig wlan0 key restricted [3] YOUR_WEP_KEY3

To set the active key:
iwconfig wlan0 key [2]

To turn wep on (you shouldn't need this, but just to be safe):
iwconfig wlan0 enc on

To turn wep off:
iwconfig wlan0 enc off

IIRC, you can combine iwconfig commands onto one line:
iwconfig wlan0 essid YOUR_SSID key YOUR_WEP_KEY enc on

Then, cross your fingers, you should be able to run your favorite dchp client utility or configure your ip and subnet manually. Check out man iwconfig for more info.


Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
To export Lotus Notes to Outlook PST or Exchange and Domino Server files to Exchange Server or PST files with ease, go for Kernel for Lotus Notes to Outlook conversion tool. Through the video, you can watch the conversion process. A common user with…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question