<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.networksecuritytoolkit.org/nstwiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rwh</id>
	<title>MediaWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.networksecuritytoolkit.org/nstwiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Rwh"/>
	<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Special:Contributions/Rwh"/>
	<updated>2026-04-19T02:46:39Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.5</generator>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10620</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10620"/>
		<updated>2026-04-15T15:36:32Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Broadcom Chipset Discovery */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network;&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci | rg Network;&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Driver Installation ==&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl reboot;&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10619</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10619"/>
		<updated>2026-04-15T15:36:19Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Broadcom Chipset Discovery */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Driver Installation ==&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl reboot;&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10618</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10618"/>
		<updated>2026-04-15T15:35:47Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Driver Installation = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Driver Installation ==&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl reboot;&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10617</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10617"/>
		<updated>2026-04-15T15:35:21Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Driver Installation = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Driver Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl reboot;&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10616</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10616"/>
		<updated>2026-04-15T15:33:52Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Installation = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Driver Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10615</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10615"/>
		<updated>2026-04-15T15:33:36Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Discovery */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Broadcom Chipset Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10614</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10614"/>
		<updated>2026-04-15T15:33:14Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Recommended */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended Driver ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10613</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10613"/>
		<updated>2026-04-15T15:32:47Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Discovery */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10612</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10612"/>
		<updated>2026-04-15T15:32:30Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Discovery */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Discovery ==&lt;br /&gt;
First determine which Broadcom Chipset you have:&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10611</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10611"/>
		<updated>2026-04-15T15:32:06Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
== Discovery ==&lt;br /&gt;
* First determine which Broadcom Chipset you have:&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
== Recommended ==&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
== Installation ===&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10610</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10610"/>
		<updated>2026-04-15T15:30:39Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* First determine which Broadcom Chipset you have:&lt;br /&gt;
Example: 1 (BCM4360)&lt;br /&gt;
 [root@nst44-mbp ~]# lspci | rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM4360 802.11ac Dual Band Wireless Network Adapter (rev 03)&lt;br /&gt;
&lt;br /&gt;
Example: 2 (BCM43602)&lt;br /&gt;
 [root@ccii-nst42 ~]# lspci|rg Network&lt;br /&gt;
 03:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43602 802.11ac Wireless LAN SoC (rev 01)&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) Use the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10609</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10609"/>
		<updated>2026-04-15T13:31:52Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10608</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10608"/>
		<updated>2026-04-15T13:30:47Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Broadcom Modules Descriptions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10607</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10607"/>
		<updated>2026-04-15T13:28:57Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;br /&gt;
&lt;br /&gt;
== Enable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi on;&lt;br /&gt;
&lt;br /&gt;
== Disable WiFi using nmcli ==&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo nmcli radio wifi off;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10606</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10606"/>
		<updated>2026-04-15T12:25:33Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Broadcom Modules Descriptions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (Optional) — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10605</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10605"/>
		<updated>2026-04-15T12:25:10Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Broadcom Modules Descriptions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl — A metapackage that pulls in a pre-built module for the newest kernel.&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10604</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10604"/>
		<updated>2026-04-15T12:23:51Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;br /&gt;
&lt;br /&gt;
== Broadcom Modules Descriptions ==&lt;br /&gt;
The akmod-wl package is an akmod (Automatic Kernel Module) package from RPM Fusion (non-free repository) that provides the proprietary Broadcom wl (STA) kernel module for certain legacy Broadcom Wi-Fi chipsets.&lt;br /&gt;
&lt;br /&gt;
The wl driver is Broadcom&#039;s official closed-source Linux driver for many older Broadcom wireless cards (e.g., BCM43xx series like BCM4312, BCM4322, BCM43228, BCM4331, etc.).&lt;br /&gt;
Unlike the open-source b43 or brcmfmac drivers in the mainline kernel (which often have limited or no support for these chips), wl offers better performance/features for unsupported hardware.&lt;br /&gt;
akmod-wl does not contain a pre-built module. Instead, it contains the source code and build system so that the akmods framework can automatically compile the wl.ko module for your current (and future) kernel versions whenever you install a new kernel.&lt;br /&gt;
&lt;br /&gt;
These are the related packages:&lt;br /&gt;
&lt;br /&gt;
* broadcom-wl — Provides the license, README, configuration files, and firmware blobs (the actual driver source is in the akmod).&lt;br /&gt;
* kmod-wl (optional) — A metapackage that pulls in a pre-built module for the newest kernel (if available from RPM Fusion).&lt;br /&gt;
* akmods — The build tool itself (and kernel-devel is required for building).&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10603</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10603"/>
		<updated>2026-04-15T12:16:23Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document describes the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Next use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn off the mouse for ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for a bluetooth connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
== How To Remove (Unpair) the Magic Mouse ==&lt;br /&gt;
Use this command to remove the magic mouse from the bluetooth adapter:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 remove A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10602</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10602"/>
		<updated>2026-04-15T02:17:10Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document describes the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Next use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn off the mouse for ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for a bluetooth connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10601</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10601"/>
		<updated>2026-04-15T02:16:27Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document describes the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Next use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn off the mouse for ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10600</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10600"/>
		<updated>2026-04-15T02:15:38Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document describes the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Next use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10599</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10599"/>
		<updated>2026-04-15T02:14:10Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document describes the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10598</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10598"/>
		<updated>2026-04-15T02:13:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document shows the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with your NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10597</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10597"/>
		<updated>2026-04-15T02:13:37Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document shows the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guidelines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10596</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10596"/>
		<updated>2026-04-15T02:12:39Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document shows the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enabled. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10595</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10595"/>
		<updated>2026-04-15T02:12:00Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
This document shows the steps on how to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10594</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10594"/>
		<updated>2026-04-15T02:10:53Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Scrolling Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
To allow a Magic Mouse to scroll add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10593</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10593"/>
		<updated>2026-04-15T02:09:57Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
  Name: RWH Mouse2&lt;br /&gt;
  Alias: RWH Mouse2&lt;br /&gt;
  Class: 0x00000580 (1408)&lt;br /&gt;
  Icon: input-mouse&lt;br /&gt;
  Paired: yes&lt;br /&gt;
  Bonded: yes&lt;br /&gt;
  Trusted: yes&lt;br /&gt;
  Blocked: no&lt;br /&gt;
  Connected: yes&lt;br /&gt;
  WakeAllowed: yes&lt;br /&gt;
  LegacyPairing: no&lt;br /&gt;
  CablePairing: no&lt;br /&gt;
  UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
  Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10592</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10592"/>
		<updated>2026-04-15T02:07:02Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
 quit&lt;br /&gt;
&lt;br /&gt;
* The above sequence should allow for connection. Use the following to check:&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl info A4:E9:75:06:E5:BA&lt;br /&gt;
 Device A4:E9:75:06:E5:BA (public)&lt;br /&gt;
	Name: RWH Mouse2&lt;br /&gt;
	Alias: RWH Mouse2&lt;br /&gt;
	Class: 0x00000580 (1408)&lt;br /&gt;
	Icon: input-mouse&lt;br /&gt;
	Paired: yes&lt;br /&gt;
	Bonded: yes&lt;br /&gt;
	Trusted: yes&lt;br /&gt;
	Blocked: no&lt;br /&gt;
	Connected: yes&lt;br /&gt;
	WakeAllowed: yes&lt;br /&gt;
	LegacyPairing: no&lt;br /&gt;
	CablePairing: no&lt;br /&gt;
	UUID: Human Interface Device... (00001124-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
	UUID: PnP Information           (00001200-0000-1000-8000-00805f9b34fb)&lt;br /&gt;
	Modalias: bluetooth:v004Cp0269d0192&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10591</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10591"/>
		<updated>2026-04-15T02:04:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Control utility: bluetoothctl for trust, pair, bond and connection.&lt;br /&gt;
 [nst@nst44-mbp ~]$ bluetoothctl&lt;br /&gt;
 power on&lt;br /&gt;
 agent on&lt;br /&gt;
 default-agent&lt;br /&gt;
 scan on&lt;br /&gt;
&lt;br /&gt;
* Now put the mouse in pairing mode (i.e., Turn of the mouse ~5sec and then back on.):&lt;br /&gt;
 trust A4:E9:75:06:E5:BA&lt;br /&gt;
 pair A4:E9:75:06:E5:BA&lt;br /&gt;
 connect A4:E9:75:06:E5:BA&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10590</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10590"/>
		<updated>2026-04-15T01:56:28Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Bluetooth Connection Sequence */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
Use the following guild lines to get an Apple Magic Mouse to work with you NST system:&lt;br /&gt;
&lt;br /&gt;
* Start and enable the Bluetooth service:&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl start bluetooth.service;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo systemctl enable bluetooth.service;&lt;br /&gt;
&lt;br /&gt;
* Use the Bluetooth Applet to scan and determine the MAC Address of the mouse (e.g., A4:E9:75:06:E5:BA)&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10589</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10589"/>
		<updated>2026-04-15T01:48:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
How to configure an Apple Magic Mouse using Bluetooth with scrolling. An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Bluetooth Connection Sequence =&lt;br /&gt;
&lt;br /&gt;
= Scrolling Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTos&amp;diff=10588</id>
		<title>HowTos</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTos&amp;diff=10588"/>
		<updated>2026-04-15T01:46:48Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[HowTo Adjust The Display Brightness On A Laptop In Console Mode Using The Command Line]]&lt;br /&gt;
* [[HowTo Adjust The Keyboard Backlight Brightness On A Laptop In Console Mode Using The Command Line]]&lt;br /&gt;
* [[HowTo Backup And Restore The Master Boot Record (MBR)]]&lt;br /&gt;
&amp;lt;!-- * [[HowTo Build NST 2.13.0]] --&amp;gt;&lt;br /&gt;
* [[HowTo BackupPC SSH Key Authentication Setup For rsync Transfer]]&lt;br /&gt;
* [[HowTo Change The LVM Volume Group Name That Includes The Root Partition]]&lt;br /&gt;
* [[HowTo Configure And Run A Ring Buffer Capture Session Using: &amp;quot;nstringbufcap&amp;quot;]]&lt;br /&gt;
* [[HowTo Configure Apache SSL For davfs, subversion, etc.]]&lt;br /&gt;
* [[HowTo Configure The Default Terminal Application for ssh:// For A Browser]]&lt;br /&gt;
* [[HowTo Create A Patch File For A RPM]]&lt;br /&gt;
* [[HowTo Create A GPT Disk With EFI System And exFAT Partitions Using Parted]]&lt;br /&gt;
* [[HowTo Curl Examples]]&lt;br /&gt;
* [[HowTo Fix The rngd.service]]&lt;br /&gt;
* [[HowTo Determine If Hardware Virtualization Is Enabled]]&lt;br /&gt;
* [[HowTo Disable The &amp;quot;relatime&amp;quot; Method For File &amp;quot;atime&amp;quot; Updates]]&lt;br /&gt;
* [[HowTo Download From The Command Line Using: &amp;quot;wget&amp;quot;]]&lt;br /&gt;
* [[HowTo Dual Boot NST With Windows 8.1]]&lt;br /&gt;
* [[HowTo Enable The Gnome Sound Applet]]&lt;br /&gt;
* [[HowTo Configure An Apple Magic Mouse With Scrolling]]&lt;br /&gt;
* [[HowTo Generate a 3D Pie Chart of nDPI Detected Protocols]]&lt;br /&gt;
* [[HowTo Geolocate Data Using The NST WUI]]&lt;br /&gt;
* [[HowTo Headless Intel NUC vPro AMT]]&lt;br /&gt;
* [[HowTo Install Microsoft PowerShell]]&lt;br /&gt;
* [[HowTo Install The MATE (GNOME 2) Desktop]]&lt;br /&gt;
* [[HowTo Install VirtualBox]]&lt;br /&gt;
* [[HowTo Keep Processes Running After Logging Out Using: &amp;quot;setsid&amp;quot;]]&lt;br /&gt;
* [[HowTo Limit Remote Access To &amp;quot;ssh&amp;quot; Connections]]&lt;br /&gt;
* [[HowTo Monitor Network Traffic]]&lt;br /&gt;
* [[HowTo One Liners]]&lt;br /&gt;
* [[HowTo Perform A Security Audit With hping3 (DoS)]]&lt;br /&gt;
* [[HowTo Prevent A Laptop Lid Close Suspension]]&lt;br /&gt;
* [[HowTo Regenerate The TLS (SSL) Certificate For The NST WUI]]&lt;br /&gt;
* [[HowTo Remote Connect to a Mate Desktop Session Using the Vino Server]]&lt;br /&gt;
* [[HowTo Resize The &amp;quot;root&amp;quot; File System Using LVM]]&lt;br /&gt;
* [[HowTo Quickly Get A Project Started With Subversion]]&lt;br /&gt;
* [[HowTo Quickly Setup A VPN Using WireGuard On NST]]&lt;br /&gt;
* [[HowTo Put Multiple Live Images On One USB Memory Stick]]&lt;br /&gt;
* [[HowTo Recreate Grub Install And The Master Boot Record (MBR) If Corrupted]]&lt;br /&gt;
* [[HowTo Run A Script At Boot]]&lt;br /&gt;
* [[OpenVAS | HowTo Setup OpenVAS]]&lt;br /&gt;
* [[HowTo Setup An NST System With Multiple Network Interface Adapters Using: &amp;quot;nstnetcfg&amp;quot;]]&lt;br /&gt;
* [[HowTo Setup Guacamole]]&lt;br /&gt;
* [[HowTo Setup Suricata - A Simple Live Configuration]]&lt;br /&gt;
* [[HowTo Share A Terminal Session Using Screen]]&lt;br /&gt;
* [[HowTo Shutdown NST Using A USB Flash Drive Install For Relocation]]&lt;br /&gt;
* [[Upgrade to NST 20|HowTo Upgrade from NST 18 to NST 20]]&lt;br /&gt;
* [[HowTo Upscale An Image]]&lt;br /&gt;
* [[HowTo Use an Android Phone as a GPSd Source]]&lt;br /&gt;
* [[HowTo Use A Touch Device (iPad) with NST]]&lt;br /&gt;
* [[HowTo Use Gmail API to send emails]]&lt;br /&gt;
* [[HowTo Use The NST CloudShark Upload Manager]]&lt;br /&gt;
* [[HowTo Use The NST Network Tools Widgets]]&lt;br /&gt;
* [[NST Mapping Tools | HowTo Use The NST Map Tools Widgets]]&lt;br /&gt;
* [[HowTo Use The NST Shell Command Console]]&lt;br /&gt;
* [[HowTo Use The NST WUI arp-scan Page To Quickly Locate Hosts]]&lt;br /&gt;
* [[HowTo Use The Scapy: Multi-Traceroute - MTR]]&lt;br /&gt;
* [[Console Output and Serial Terminals | HowTo Setup Console Output and Serial Terminals]]&lt;br /&gt;
* [[DVD_md5sum | HowTo Verify The Md5Sum On An DVD ISO]]&lt;br /&gt;
* [[HowTo Install NST 2.16 on an Asus Zenbook Prime]]&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Enable_Scrolling_With_An_Apple_Magic_Mouse&amp;diff=10587</id>
		<title>HowTo Enable Scrolling With An Apple Magic Mouse</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Enable_Scrolling_With_An_Apple_Magic_Mouse&amp;diff=10587"/>
		<updated>2026-04-15T01:45:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: Rwh moved page HowTo Enable Scrolling With An Apple Magic Mouse to HowTo Configure An Apple Magic Mouse With Scrolling: Renamed for content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[HowTo Configure An Apple Magic Mouse With Scrolling]]&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10586</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10586"/>
		<updated>2026-04-15T01:45:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: Rwh moved page HowTo Enable Scrolling With An Apple Magic Mouse to HowTo Configure An Apple Magic Mouse With Scrolling: Renamed for content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10585</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10585"/>
		<updated>2026-04-15T01:39:55Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Use the following if the built-in WiFi adapter does not appear as a network interface. Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10584</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10584"/>
		<updated>2026-04-15T01:38:53Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;br /&gt;
&lt;br /&gt;
To install the broadcom-wl driver:&lt;br /&gt;
&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo dnf install broadcom-wl akmod-wl kernel-devel-$(uname -r) -y;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo akmods --force;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo depmod -a;&lt;br /&gt;
 [nst@nst44-mbp ~]$ sudo modprobe -v wl;&lt;br /&gt;
&lt;br /&gt;
Reboot.&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10583</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10583"/>
		<updated>2026-04-15T01:35:53Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Apple MacBook Pro Broadcom Wireless Adapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;br /&gt;
&lt;br /&gt;
Common chips on MacBook Pro:&lt;br /&gt;
&lt;br /&gt;
* BCM4360 (many 2013–2015 models) → usually needs broadcom-wl&lt;br /&gt;
* BCM43224 / BCM4331 etc. → also broadcom-wl&lt;br /&gt;
* Newer ones (BCM43602, BCM437x, etc.) sometimes work better with the in-kernel brcmfmac driver.&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10582</id>
		<title>Wireless</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Wireless&amp;diff=10582"/>
		<updated>2026-04-15T01:29:22Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* iwd Replacement for wpa_supplicant with Network Manager */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What Wireless Cards Are Supported? =&lt;br /&gt;
&lt;br /&gt;
Unfortunately, getting a wireless card to work with Linux, can be quite tricky. Often, it comes down to searching the Internet, making your best guess from bits of information, and then purchasing a card and trying it. It doesn&#039;t help that manufacturers like to change chip sets without changing model numbers.&lt;br /&gt;
&lt;br /&gt;
The following lists the manufacturers of WIFI card chip sets that we have had good luck with &#039;&#039;working out of the box&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* [http://www.atheros.com/ Atheros]&lt;br /&gt;
* [http://www.intel.com/network/connectivity/products/wireless/ Intel]&lt;br /&gt;
&lt;br /&gt;
See the &amp;quot;[http://linux-wless.passys.nl/ Linux wireless LAN support]&amp;quot; web site to access a WIFI compatibility database.&lt;br /&gt;
&lt;br /&gt;
= How Do I Get My Broadcom Card Working? =&lt;br /&gt;
&lt;br /&gt;
Since the NST system is based off of Fedora, it comes with a kernel module that can be used to support some Broadcom WIFI cards. The kernel module is named: &#039;&#039;b43&#039;&#039;. Unfortunately, it appears that the required firmware for this module is not provided by Fedora.&lt;br /&gt;
&lt;br /&gt;
Instructions and more information on dealing with Broadcom cards can be found on the &amp;quot;[http://wireless.kernel.org/en/users/Drivers/b43 b43 and b43legacy]&amp;quot; page at the [http://wireless.kernel.org/ Linux Wireless] web site.&lt;br /&gt;
&lt;br /&gt;
= How do I determine the manufacturer of the chip set in my WIFI card? =&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;lspci&#039;&#039;&#039; command is useful in determining who manufacturers the WIFI chip set in your WIFI adapter and what version of the chip set is used. For example:&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# lspci | grep -i network&lt;br /&gt;
 02:00.0 Network controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) (rev 01)&lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The output of the above command suggests that the WIFI card is manufactured by &#039;&#039;Atheros Communications Inc.&#039;&#039; and that it has a model number of &#039;&#039;AR9285&#039;&#039;. This card happens to work well in a NST system, however if it didn&#039;t, a [http://www.google.com/search?q=Atheros+AR9285+Fedora Google search on &amp;quot;Atheros AR9285 Fedora&amp;quot;] would likely provide some clues as to what would need to be done to make it work.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work At Boot? =&lt;br /&gt;
&lt;br /&gt;
It is unlikely that when you boot a live NST system that it will use your wireless card at boot as the default network device. In order for this to occur during a &#039;&#039;Console&#039;&#039; mode boot, all of the following must be true:&lt;br /&gt;
&lt;br /&gt;
* The NST system must recognize and support your WIFI card.&lt;br /&gt;
* The NST system must associate the &#039;&#039;eth0&#039;&#039; interface with your WIFI card (it typically won&#039;t do this if your system has any Ethernet devices).&lt;br /&gt;
* There must be a wireless access point within range that has no authentication/encryption in place.&lt;br /&gt;
&lt;br /&gt;
However, if you boot a live NST system to &#039;&#039;Desktop&#039;&#039; mode instead of &#039;&#039;Console&#039;&#039; mode, the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service will be running. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service tries very hard to determine and establish a connection to networks. If there is a open wireless access point within range of your system, its possible that your NST system will connect to it automatically when you log in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= How Do I Configure My Wireless Card For Network Access? =&lt;br /&gt;
&lt;br /&gt;
== From The GNOME Desktop ==&lt;br /&gt;
&lt;br /&gt;
If you plan on using your WIFI card as your connection to the network, it is recommended to boot your NST system to &#039;&#039;Desktop&#039;&#039; mode, log into the system using the GNOME desktop manager and use the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet. There will be a network icon on the top bar of your desktop you click on to work with the applet. The &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; applet makes it very easy to connect to different WIFI networks and to enter in the necessary key(s) to join encrypted networks.&lt;br /&gt;
&lt;br /&gt;
== From The NST WUI ==&lt;br /&gt;
&lt;br /&gt;
If you are not running the &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; service, you can use the NST WUI to setup a secure WPA connection. From the top menu bar on the NST WUI, select: &#039;&#039;Network|Wireless|WPA-PSK Setup&#039;&#039;. This should open up a page in the NST WUI which allows you to select which interface to configure, to scan for available networks and to enter your pre-shared key.&lt;br /&gt;
&lt;br /&gt;
== WIFI From The Command Line (with NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
If you are using NetworkManager to manage your wireless interface, you can use the &#039;&#039;&#039;nmcli&#039;&#039;&#039; (NetworkManager Command Line utility) to connect your wireless card to an access point. It works as follows:&lt;br /&gt;
&lt;br /&gt;
* Scan your system for WIFI cards&lt;br /&gt;
* Scan for access points&lt;br /&gt;
* Connect to the access point&lt;br /&gt;
&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi rescan&lt;br /&gt;
 [root@chimi ~]# nmcli device wifi list&lt;br /&gt;
 *  SSID                             MODE   CHAN  RATE       SIGNAL  BARS  SECURITY  &lt;br /&gt;
    ringo-2.4                        Infra  9     54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
 *  ringo-5.0                        Infra  153   54 Mbit/s  100     ▂▄▆█  WPA2      &lt;br /&gt;
    --                               Infra  9     54 Mbit/s  67      ▂▄▆_  WPA2      &lt;br /&gt;
    HP-Print-88-ENVY 4500 series     Infra  3     54 Mbit/s  52      ▂▄__  WPA2      &lt;br /&gt;
    NETGEAR58                        Infra  10    54 Mbit/s  42      ▂▄__  WPA2      &lt;br /&gt;
    ATT8u3W7d9                       Infra  6     54 Mbit/s  40      ▂▄__  WPA1 WPA2 &lt;br /&gt;
    belkin.d43.guests                Infra  11    54 Mbit/s  30      ▂___  --        &lt;br /&gt;
    belkin.d43                       Infra  11    54 Mbit/s  30      ▂___  WPA1 WPA2 &lt;br /&gt;
    ATT9Zug2Nn                       Infra  4     54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    2WIRE201                         Infra  9     54 Mbit/s  29      ▂___  WPA1 WPA2 &lt;br /&gt;
    MotoVAP_M91427SA0MS8             Infra  108   54 Mbit/s  29      ▂___  WPA2      &lt;br /&gt;
    ATT2IAK24t_guest                 Infra  8     54 Mbit/s  25      ▂___  WPA2      &lt;br /&gt;
    HP-Print-5A-Deskjet 2540 series  Infra  3     54 Mbit/s  24      ▂___  WPA2      &lt;br /&gt;
    NETGEAR58-5G                     Infra  153   54 Mbit/s  19      ▂___  WPA2&lt;br /&gt;
 [root@chimi ~]#     &lt;br /&gt;
 [root@chimi ~]# nmcli device wifi connect ringo-5.0 password WIFI_PASSWORD&lt;br /&gt;
 Device &#039;wlp3s0&#039; successfully activated with &#039;ff3fee57-dbb1-4c04-854a-ee3a3c4f9b75&#039;.&lt;br /&gt;
 [root@chimi ~]#&lt;br /&gt;
&lt;br /&gt;
== WEP From The Command Line (no NetworkManager) ==&lt;br /&gt;
&lt;br /&gt;
We do not recommend using WEP for accessing WIFI networks as WEP does not provide much security. However, if you need to connect your NST system to a wireless access point using WEP, you should be able to use &#039;&#039;&#039;NetworkManager&#039;&#039;&#039; if you&#039;ve logged into a GNOME desktop.&lt;br /&gt;
&lt;br /&gt;
If you need to access WEP from the command line, here are some dated notes from 2005 which might prove useful:&lt;br /&gt;
&lt;br /&gt;
The first problem is to determine the name of the device (eth0, eth1, wlan0, etc) which Linux associates with your wireless card. After inserting your wireless card into your system, you can use the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; command to determine its device name.&lt;br /&gt;
&lt;br /&gt;
 [root@cayenne ~]# iwconfig&lt;br /&gt;
 lo        no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 eth0      no wireless extensions.&lt;br /&gt;
 &lt;br /&gt;
 wlan0     IEEE 802.11bgn  Mode:Managed  Access Point: Not-Associated   &lt;br /&gt;
           Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Encryption key:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
          &lt;br /&gt;
 wlan0mon  IEEE 802.11bgn  Mode:Monitor  Frequency:2.472 GHz  Tx-Power=20 dBm   &lt;br /&gt;
           Retry  long limit:7   RTS thr:off   Fragment thr:off&lt;br /&gt;
           Power Management:off&lt;br /&gt;
           &lt;br /&gt;
 [root@cayenne ~]# &lt;br /&gt;
&lt;br /&gt;
The above shows that &#039;&#039;wlan0&#039;&#039; is the device name associated with a wireless card.&lt;br /&gt;
&lt;br /&gt;
Once you determine the device name of your wireless card, you will need to create the appropriate configuration file under the: &amp;quot;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&amp;quot; directory. The following shows how one could create the necessary configuration for the wireless card and then restart the network drivers to enable the card.&lt;br /&gt;
&lt;br /&gt;
 [root@probe root]# cdnet&lt;br /&gt;
 [root@probe network-scripts]# cp nst-eth0.dhcp ifcfg-wlan0&lt;br /&gt;
 [root@probe network-scripts]# vim ifcfg-wlan0&lt;br /&gt;
 DEVICE=wlan0&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 &lt;br /&gt;
 ESSID=&amp;quot;bogus&amp;quot;&lt;br /&gt;
 MODE=&amp;quot;Managed&amp;quot;&lt;br /&gt;
 RATE=&amp;quot;auto&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
 :wq&lt;br /&gt;
 [root@probe root]# cat &amp;gt;| keys-wlan0&lt;br /&gt;
 KEY=&amp;quot;FEDCBA9876543210123456789A&amp;quot;&lt;br /&gt;
 ^D&lt;br /&gt;
 [root@probe root]# chmod 600 keys-wlan0&lt;br /&gt;
 [root@probe root]# service network restart&lt;br /&gt;
 Shutting down interface wlan0:                             [  OK  ]&lt;br /&gt;
 Shutting down loopback interface:                          [  OK  ]&lt;br /&gt;
 Setting network parameters:                                [  OK  ]&lt;br /&gt;
 Bringing up loopback interface:                            [  OK  ]&lt;br /&gt;
 Bringing up interface wlan0:                               [  OK  ]&lt;br /&gt;
 [root@probe root]#&lt;br /&gt;
&lt;br /&gt;
For your card, you will need to change the values assigned to the &#039;&#039;ESSID&#039;&#039; and &#039;&#039;KEY&#039;&#039; variables above. You may also need to specify something other than &#039;&#039;wlan0&#039;&#039; if the &#039;&#039;&#039;iwconfig&#039;&#039;&#039; output shows your WIFI card having a different device name.&lt;br /&gt;
&lt;br /&gt;
= Will My Wireless Card Work With Kismet and Airsnort? =&lt;br /&gt;
&lt;br /&gt;
Some wireless cards that work perfectly fine for general networking, won&#039;t work with &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;. It turns out that in order for a wireless card to be used by either of these two programs, the driver for the card needs to support &#039;&#039;monitor mode&#039;&#039;. If &#039;&#039;monitor mode&#039;&#039; is not supported, then you won&#039;t be able to use programs such as &#039;&#039;Kismet&#039;&#039; or &#039;&#039;Airsnort&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
The best way to determine whether your WIFI card supports &#039;&#039;monitor mode&#039;&#039; or not is to setup and try using &#039;&#039;Kismet&#039;&#039;. To do this:&lt;br /&gt;
&lt;br /&gt;
* Select &#039;&#039;Network|Wireless|Kismet Server&#039;&#039; from the NST WUI menu bar.&lt;br /&gt;
* Press the &#039;&#039;Setup System To Run Kismet&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Return&#039;&#039; button after setup completes.&lt;br /&gt;
* Press the &#039;&#039;Kismet README&#039;&#039; file to read up on the &#039;&#039;ncsource&#039;&#039; configuration line.&lt;br /&gt;
* Press the &#039;&#039;Edit Kismet Config&#039;&#039; button and check and/or adjust the &#039;&#039;ncsource&#039;&#039; parameter.&lt;br /&gt;
* Press the &#039;&#039;Save &amp;amp; Return&#039;&#039; button.&lt;br /&gt;
* Press the &#039;&#039;Start&#039;&#039; button to start the &#039;&#039;kismet_server&#039;&#039; service.&lt;br /&gt;
* Press the &#039;&#039;Server Log&#039;&#039; button and look for &#039;&#039;ERROR&#039;&#039; messages indicating that &#039;&#039;Kismet&#039;&#039; failed to use your WIFI card or failed to put your WIFI card into &#039;&#039;monitor mode&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
Note for a complete walk through on setting up &#039;&#039;Kismet&#039;&#039;, see: [[HowTo Geolocate kismet Data]] - you can ignore the steps related to setting up a GPS as you don&#039;t have to have a GPS connected to run &#039;&#039;Kismet&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
= Can I Monitor And Use the Wireless Card For Networking? =&lt;br /&gt;
&lt;br /&gt;
Typically you can not use a wireless card for both monitoring and networking at the same time. It is definitely not possible if you enable channel hopping while using the wireless card in monitor mode.&lt;br /&gt;
&lt;br /&gt;
= iwd Replacement for wpa_supplicant with Network Manager =&lt;br /&gt;
[https://wiki.archlinux.org/title/Iwd iwd] is a modern replacement for [https://wiki.archlinux.org/title/Wpa_supplicant wpa_supplicant], offering advantages like a smaller codebase, faster connections, and more intuitive command-line tools. wpa_supplicant is a more traditional and long-standing daemon, while iwd ((iNet wireless daemon) is a wireless daemon for Linux written by Intel) is a newer, faster alternative developed by Intel that uses only kernel functions for security. Both can be used as a backend for connection managers like [https://wiki.archlinux.org/title/NetworkManager NetworkManager], but iwd is generally considered more efficient and user-friendly for modern use cases.&lt;br /&gt;
&lt;br /&gt;
Steps for iwd replacement of wpa_supplicant for a backend wireless daemon with NetworkManager:&lt;br /&gt;
&lt;br /&gt;
* Install the iwd package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install iwd;&lt;br /&gt;
&lt;br /&gt;
* Create a NetworkManager configuration file: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d/iwd.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
 [device]&lt;br /&gt;
 # Use iwd instead of wpa_supplicant&lt;br /&gt;
 wifi.backend=iwd&lt;br /&gt;
&lt;br /&gt;
* Restart the NetworkManager Service:&lt;br /&gt;
 [root@nst42-mbp ~]# systemctl restart NetworkManager.service;&lt;br /&gt;
&lt;br /&gt;
* Check that the iwd daemon is now running:&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i iwd&lt;br /&gt;
 root         894       1  0 Dec03 ?        00:00:00 /usr/libexec/iwd&lt;br /&gt;
 root      173022  172626  0 09:50 pts/1    00:00:00 rg -i iwd&lt;br /&gt;
&lt;br /&gt;
* Make sure the wpa_supplicant daemon has terminated. If not kill the process.&lt;br /&gt;
 [root@nst42-mbp ~]# ps -ef|rg -i wpa&lt;br /&gt;
 root      173017  172626  0 09:50 pts/1    00:00:00 rg -i wpa&lt;br /&gt;
&lt;br /&gt;
= Apple MacBook Pro Broadcom Wireless Adapter =&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10581</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10581"/>
		<updated>2026-03-28T18:50:37Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Then rebuild the grub2 configuration file:&lt;br /&gt;
 [root@nst42-mbp grub2]# nstboot -v --grub2;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10580</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10580"/>
		<updated>2026-03-28T18:48:41Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;&#039;&#039;&#039;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10579</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10579"/>
		<updated>2026-03-28T18:47:58Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
 # --- ------- ----------- ----&lt;br /&gt;
 NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
 NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
 NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
 NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
 NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
 NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
 NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
 idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10578</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10578"/>
		<updated>2026-03-28T18:47:37Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
 &amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
 #&lt;br /&gt;
 # NST Desktop (Graphical) Boot&lt;br /&gt;
 # --- ------- ----------- ----&lt;br /&gt;
 NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
 NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
 NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
 NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
 NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
 NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
 NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
 idx=idx+1;&lt;br /&gt;
  &amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10577</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10577"/>
		<updated>2026-03-28T18:44:41Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Solution */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;screenTitle&amp;quot;&amp;gt;&#039;&#039;Section:&#039;&#039; NST Desktop (Graphical) Boot&amp;lt;/div&amp;gt;&lt;br /&gt;
  &amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST Desktop (Graphical) Boot&lt;br /&gt;
# --- ------- ----------- ----&lt;br /&gt;
NST_SERIAL[idx]=&amp;quot;false&amp;quot;;&lt;br /&gt;
NST_SERIAL_DEV[idx]=&amp;quot;ttyS0&amp;quot;;&lt;br /&gt;
NST_SERIAL_BAUD[idx]=&amp;quot;115200&amp;quot;;&lt;br /&gt;
NST_TITLE[idx]=&amp;quot;Graphical Desktop&amp;quot;;&lt;br /&gt;
NST_GRUB_CMDLINE_LINUX[idx]=&amp;quot;audit=0 systemd.unit=graphical.target hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;;&lt;br /&gt;
NST_GRUB_SAVEDEFAULT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
NST_GRAPHICAL_BOOT[idx]=&amp;quot;true&amp;quot;;&lt;br /&gt;
idx=idx+1;&lt;br /&gt;
  &amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10576</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10576"/>
		<updated>2026-03-28T18:41:38Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
An Apple Magic mouse by default does not have its scrolling enable. One must add Kernel parameters to enable scrolling.&lt;br /&gt;
&lt;br /&gt;
= Solution =&lt;br /&gt;
Add the following parameters to the &amp;quot;&#039;&#039;&#039;/etc/nst/grub2/nst_grub2_defaults&#039;&#039;&#039;&amp;quot; file: &amp;quot;hid_magicmouse.emulate_3button=0 hid_magicmouse.scroll_acceleration=1 hid_magicmouse.scroll_speed=40&amp;quot;.&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10575</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10575"/>
		<updated>2026-03-28T18:36:14Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10574</id>
		<title>HowTo Configure An Apple Magic Mouse With Scrolling</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Configure_An_Apple_Magic_Mouse_With_Scrolling&amp;diff=10574"/>
		<updated>2026-03-28T18:35:39Z</updated>

		<summary type="html">&lt;p&gt;Rwh: Created page with &amp;quot;__toc__&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__toc__&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTos&amp;diff=10573</id>
		<title>HowTos</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTos&amp;diff=10573"/>
		<updated>2026-03-28T18:34:13Z</updated>

		<summary type="html">&lt;p&gt;Rwh: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[HowTo Adjust The Display Brightness On A Laptop In Console Mode Using The Command Line]]&lt;br /&gt;
* [[HowTo Adjust The Keyboard Backlight Brightness On A Laptop In Console Mode Using The Command Line]]&lt;br /&gt;
* [[HowTo Backup And Restore The Master Boot Record (MBR)]]&lt;br /&gt;
&amp;lt;!-- * [[HowTo Build NST 2.13.0]] --&amp;gt;&lt;br /&gt;
* [[HowTo BackupPC SSH Key Authentication Setup For rsync Transfer]]&lt;br /&gt;
* [[HowTo Change The LVM Volume Group Name That Includes The Root Partition]]&lt;br /&gt;
* [[HowTo Configure And Run A Ring Buffer Capture Session Using: &amp;quot;nstringbufcap&amp;quot;]]&lt;br /&gt;
* [[HowTo Configure Apache SSL For davfs, subversion, etc.]]&lt;br /&gt;
* [[HowTo Configure The Default Terminal Application for ssh:// For A Browser]]&lt;br /&gt;
* [[HowTo Create A Patch File For A RPM]]&lt;br /&gt;
* [[HowTo Create A GPT Disk With EFI System And exFAT Partitions Using Parted]]&lt;br /&gt;
* [[HowTo Curl Examples]]&lt;br /&gt;
* [[HowTo Fix The rngd.service]]&lt;br /&gt;
* [[HowTo Determine If Hardware Virtualization Is Enabled]]&lt;br /&gt;
* [[HowTo Disable The &amp;quot;relatime&amp;quot; Method For File &amp;quot;atime&amp;quot; Updates]]&lt;br /&gt;
* [[HowTo Download From The Command Line Using: &amp;quot;wget&amp;quot;]]&lt;br /&gt;
* [[HowTo Dual Boot NST With Windows 8.1]]&lt;br /&gt;
* [[HowTo Enable The Gnome Sound Applet]]&lt;br /&gt;
* [[HowTo Enable Scrolling With An Apple Magic Mouse]]&lt;br /&gt;
* [[HowTo Generate a 3D Pie Chart of nDPI Detected Protocols]]&lt;br /&gt;
* [[HowTo Geolocate Data Using The NST WUI]]&lt;br /&gt;
* [[HowTo Headless Intel NUC vPro AMT]]&lt;br /&gt;
* [[HowTo Install Microsoft PowerShell]]&lt;br /&gt;
* [[HowTo Install The MATE (GNOME 2) Desktop]]&lt;br /&gt;
* [[HowTo Install VirtualBox]]&lt;br /&gt;
* [[HowTo Keep Processes Running After Logging Out Using: &amp;quot;setsid&amp;quot;]]&lt;br /&gt;
* [[HowTo Limit Remote Access To &amp;quot;ssh&amp;quot; Connections]]&lt;br /&gt;
* [[HowTo Monitor Network Traffic]]&lt;br /&gt;
* [[HowTo One Liners]]&lt;br /&gt;
* [[HowTo Perform A Security Audit With hping3 (DoS)]]&lt;br /&gt;
* [[HowTo Prevent A Laptop Lid Close Suspension]]&lt;br /&gt;
* [[HowTo Regenerate The TLS (SSL) Certificate For The NST WUI]]&lt;br /&gt;
* [[HowTo Remote Connect to a Mate Desktop Session Using the Vino Server]]&lt;br /&gt;
* [[HowTo Resize The &amp;quot;root&amp;quot; File System Using LVM]]&lt;br /&gt;
* [[HowTo Quickly Get A Project Started With Subversion]]&lt;br /&gt;
* [[HowTo Quickly Setup A VPN Using WireGuard On NST]]&lt;br /&gt;
* [[HowTo Put Multiple Live Images On One USB Memory Stick]]&lt;br /&gt;
* [[HowTo Recreate Grub Install And The Master Boot Record (MBR) If Corrupted]]&lt;br /&gt;
* [[HowTo Run A Script At Boot]]&lt;br /&gt;
* [[OpenVAS | HowTo Setup OpenVAS]]&lt;br /&gt;
* [[HowTo Setup An NST System With Multiple Network Interface Adapters Using: &amp;quot;nstnetcfg&amp;quot;]]&lt;br /&gt;
* [[HowTo Setup Guacamole]]&lt;br /&gt;
* [[HowTo Setup Suricata - A Simple Live Configuration]]&lt;br /&gt;
* [[HowTo Share A Terminal Session Using Screen]]&lt;br /&gt;
* [[HowTo Shutdown NST Using A USB Flash Drive Install For Relocation]]&lt;br /&gt;
* [[Upgrade to NST 20|HowTo Upgrade from NST 18 to NST 20]]&lt;br /&gt;
* [[HowTo Upscale An Image]]&lt;br /&gt;
* [[HowTo Use an Android Phone as a GPSd Source]]&lt;br /&gt;
* [[HowTo Use A Touch Device (iPad) with NST]]&lt;br /&gt;
* [[HowTo Use Gmail API to send emails]]&lt;br /&gt;
* [[HowTo Use The NST CloudShark Upload Manager]]&lt;br /&gt;
* [[HowTo Use The NST Network Tools Widgets]]&lt;br /&gt;
* [[NST Mapping Tools | HowTo Use The NST Map Tools Widgets]]&lt;br /&gt;
* [[HowTo Use The NST Shell Command Console]]&lt;br /&gt;
* [[HowTo Use The NST WUI arp-scan Page To Quickly Locate Hosts]]&lt;br /&gt;
* [[HowTo Use The Scapy: Multi-Traceroute - MTR]]&lt;br /&gt;
* [[Console Output and Serial Terminals | HowTo Setup Console Output and Serial Terminals]]&lt;br /&gt;
* [[DVD_md5sum | HowTo Verify The Md5Sum On An DVD ISO]]&lt;br /&gt;
* [[HowTo Install NST 2.16 on an Asus Zenbook Prime]]&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22&amp;diff=10572</id>
		<title>HowTo Setup A Server With Multiple Network Interface Adapters Using: &quot;nstnetcfg&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22&amp;diff=10572"/>
		<updated>2026-03-09T15:30:44Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Hot Plug In an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
= &#039;&#039;&#039;Overview&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
This page demonstrates  how to setup networking with an NST server that is configured with &#039;&#039;multiple&#039;&#039; network interface adapters for performing &#039;&#039;simultaneous&#039;&#039; network computing surveillance tasks. The NST script: &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; command line tool was designed to make this task easy to accomplish using the underlying &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service via the &#039;&#039;&#039;nmcli&#039;&#039;&#039; utility.&lt;br /&gt;
&lt;br /&gt;
The diagram below will be used as a reference for setting up a multi-network interface adapter server using &#039;&#039;&#039;NST&#039;&#039;&#039;. The rear panel of a  &#039;&#039;&#039;1U Server&#039;&#039;&#039; is shown with NIC attachments to the network infrastructure. The network security staff for fictitious company: &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; would like to use NST for monitoring different network segments throughout their network. In particular, they would like to monitor traffic entering and leaving their corporation, web server traffic, all client electronic business transactions and remote traffic to and from their satellite offices. They will use a combination of &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; (&#039;&#039;&#039;S&#039;&#039;&#039;witched &#039;&#039;&#039;P&#039;&#039;&#039;ort &#039;&#039;&#039;A&#039;&#039;&#039;nalyzer) ports and a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4 Non-Aggregational Network TAP]&#039;&#039;&#039; to expose network traffic on these segments. &lt;br /&gt;
&lt;br /&gt;
When booting up &amp;quot;&#039;&#039;&#039;[http://sourceforge.net/projects/nst/ NST Live]&#039;&#039;&#039;&amp;quot; or after a hard disk installation, the &amp;quot;&#039;&#039;&#039;[http://projects.gnome.org/NetworkManager/ Network Manager]&#039;&#039;&#039;&amp;quot; service is on by default for managing all network interfaces found on an NST system. &#039;&#039;&#039;Network Manager&#039;&#039;&#039; provides a quick and easy method for setting up networking on a system equipped with a wireless interface that uses &#039;&#039;&#039;DHCP&#039;&#039;&#039; for &#039;&#039;&#039;IPv4 Address &#039;&#039;&#039;configuration. When a system is configured with two or more wired network interfaces or requires a multi-homed network setup, the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script may be a better choice for setting up the network configuration.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; utility can help mitigate some of the error prone tasks necessary by scripting when setting up networking on a NST (Linux) system using the &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgserver.png|1024px|center|A Multi-Network Interface Adapter NST Server Configuration]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The &amp;quot;&#039;&#039;&#039;Sys Admin Network&#039;&#039;&#039;&amp;quot; is an out-of-band network for the management of enterprise servers within this network infrastructure. The &amp;quot;&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Out-of-band_management ILOM]&#039;&#039;&#039;&amp;quot;  (Integrated Lights Out Management) network interface (i.e., &amp;quot;&#039;&#039;&#039;NetMgt&#039;&#039;&#039;&amp;quot;) and the &amp;quot;&#039;&#039;&#039;Serial Console&#039;&#039;&#039;&amp;quot; device (i.e., &amp;quot;&#039;&#039;&#039;ttyS0&#039;&#039;&#039;&amp;quot;) are shown for completeness and are not used by &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Network Interface Setup Configuration Information&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
In this section we will identify each network interface and how it should be setup using the &#039;&#039;&#039;1U Server&#039;&#039;&#039; configuration illustrated in the reference diagram above. Network parameters such as the &#039;&#039;&#039;Subnet Mask&#039;&#039;&#039;, &#039;&#039;&#039;Host Name(s)&#039;&#039;&#039;, &#039;&#039;&#039;Domain Name Servers&#039;&#039;&#039;, &#039;&#039;&#039;Domain Name&#039;&#039;&#039;, &#039;&#039;&#039;Gateway&#039;&#039;&#039; and &#039;&#039;&#039;Default Interface&#039;&#039;&#039; will also be identified. The table below depicts values that will be used by the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script.&lt;br /&gt;
&lt;br /&gt;
 {| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color: lightgray;&amp;quot; |Interface / Parameter&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot;  style=&amp;quot;background-color: lightgray;&amp;quot; |Configuration Values&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot;  style=&amp;quot;background-color: lightgray;&amp;quot; |NetworkManager&amp;lt;br /&amp;gt;Service&lt;br /&gt;
 |-&lt;br /&gt;
 |em0&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;172.30.1.16&#039;&#039;&#039;,  Network Routing Prefix: &#039;&#039;&#039;24&#039;&#039;&#039;, Host Name: &#039;&#039;&#039;nstsurv1-mon&#039;&#039;&#039;, Gateway: &#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&lt;br /&gt;
 |managed&lt;br /&gt;
 |-&lt;br /&gt;
 |em1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;10.221.5.14&#039;&#039;&#039;,  Network Routing Prefix: &#039;&#039;&#039;16&#039;&#039;&#039;, Host Name: &#039;&#039;&#039;nstsurv1&#039;&#039;&#039;, Gateway: &#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&lt;br /&gt;
 |managed&lt;br /&gt;
 |-&lt;br /&gt;
 |em2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |em3&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p2p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p2p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p4p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p4p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p6p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p6p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |Domain Name Servers&lt;br /&gt;
 |&#039;&#039;&#039;10.221.1.10&#039;&#039;&#039;, &#039;&#039;&#039;10.221.1.11&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Domain Name&lt;br /&gt;
 |&#039;&#039;&#039;txycorp.com&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Virtual Host (ssl.conf)&lt;br /&gt;
 |&#039;&#039;&#039;*:443&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Server Name (ssl.conf)&lt;br /&gt;
 |&#039;&#039;&#039;nstsurv1.txycorp.com:443&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Network Interface Configuration: nstnetcfg&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
The NST script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; will now be used for setting up networking on this server. This script will &#039;&#039;enable&#039;&#039; the &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service when setting up a static &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; (&#039;&#039;--mode ipv4&#039;&#039;).  The &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service will also be &#039;&#039;enabled&#039;&#039; at boot time.  Use the sequence of &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; invocations below to &#039;&#039;serve&#039;&#039; as an example for setting up networking on your particular server with NST. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The reader is encouraged to review the man page for  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; as reference material prior to its use. One can also use the &amp;quot;&#039;&#039;&#039;--verbose&#039;&#039;&#039;&amp;quot; output parameter for greater visibility on the progress of &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; during its configuration stages.&lt;br /&gt;
&lt;br /&gt;
[[Image:Warning.png‎]]  The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script should only be run on a &#039;&#039;&#039;Serial Console&#039;&#039;&#039; or a &#039;&#039;&#039;Desktop Terminal&#039;&#039;&#039; due to the fact that the &amp;quot;&#039;&#039;&#039;IPv4 Addressing&#039;&#039;&#039;&amp;quot; for this NST system will most likely change.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Initialize All Network Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;init&#039;&#039;&#039;&amp;quot; will put the networking setup posture in a known &#039;&#039;initialized&#039;&#039; state. The &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service will be &#039;&#039;enabled&#039;&#039; all network adapters and assciated configuration files set to a default initialization state with no binding layer 3 addressing. The &amp;quot;&#039;&#039;&#039;LoopBack&#039;&#039;&#039;&amp;quot; interface device is never &#039;&#039;removed&#039;&#039; and &#039;&#039;reset&#039;&#039; to the factory default state with this mode. The &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Name_Service_Switch Name Service Switch]&#039;&#039;&#039; configuration file: &amp;quot;&#039;&#039;&#039;/etc/nsswitch.conf&#039;&#039;&#039;&amp;quot; will have its &#039;&#039;&#039;hosts&#039;&#039;&#039; entry set to: &amp;quot;&#039;&#039;&#039;files dns&#039;&#039;&#039;&amp;quot;. It is best practice to first use this mode &#039;&#039;prior&#039;&#039; to setting up networking so that any &#039;&#039;lingering&#039;&#039;  &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; configuration files will &amp;lt;u&amp;gt;Not&amp;lt;/u&amp;gt; interfere with the use of the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; operation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode init;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Static IPv4 Configured Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The example NST server shown above uses a &amp;quot;&#039;&#039;&#039;Multi-Home&#039;&#039;&#039;&amp;quot; configuration with network interface devices: &amp;quot;&#039;&#039;&#039;em0&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot; set with static &#039;&#039;&#039;IPv4 Addresses:&#039;&#039;&#039; &#039;&#039;&#039;172.30.1.16&#039;&#039;&#039; and &#039;&#039;&#039;10.221.5.14&#039;&#039;&#039; respectively.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot; interface device is network attached to the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; Intranet. This network provides name services and external access to the Internet. The &amp;quot;&#039;&#039;&#039;Host Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Domain Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Name Servers&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;Gateway&#039;&#039;&#039;&amp;quot; values are set accordingly. A host name entry for &amp;quot;&#039;&#039;&#039;nstsurv1&#039;&#039;&#039;&amp;quot; will be added to the &#039;&#039;&#039;Hosts&#039;&#039;&#039; file: &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot;, the system host name will be set to: &amp;quot;&#039;&#039;&#039;nstsurv1&#039;&#039;&#039;&amp;quot;.  A &amp;quot;&#039;&#039;&#039;16&#039;&#039;&#039;&amp;quot; network routing prefix (&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing CIDR]&#039;&#039;&#039; - Format) will be used. The configuration for this interface is shown below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ipv4 --interface em1 --ipv4-addr-prefix 10.221.5.14/16 --gateway 10.221.1.1 --host-name nstsurv1 --domain-name txycorp.com --name-servers &amp;quot;10.221.1.10,10.221.1.11&amp;quot;;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em0&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;em0&#039;&#039;&#039;&amp;quot; network interface is connected to the &amp;quot;&#039;&#039;&#039;Security Network&#039;&#039;&#039;&amp;quot; for performing network surveillance tasks using the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot; and the large collection of NST network security applications and tools. The &amp;quot;&#039;&#039;&#039;--hosts-file-only&#039;&#039;&#039;&amp;quot; setting is used so that only the &#039;&#039;&#039;Hosts&#039;&#039;&#039; file: &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot; will be updated with a host name entry for: &amp;quot;&#039;&#039;&#039;nstserv1-mon&#039;&#039;&#039;&amp;quot;. Note that there is &amp;lt;u&amp;gt;No&amp;lt;/u&amp;gt; &amp;quot;&#039;&#039;&#039;--gateway&#039;&#039;&#039;&amp;quot; parameter used with this interface because there is only one default gateway (i.e., &amp;quot;&#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&amp;quot;) for this &#039;&#039;&#039;Multi-Home&#039;&#039;&#039; example configuration.  It is not necessary to again set the system &amp;quot;&#039;&#039;&#039;Host Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Domain Name&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;Name Servers&#039;&#039;&#039;&amp;quot; values since these were specified in the configuration for network interface &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot;.  A &amp;quot;&#039;&#039;&#039;24&#039;&#039;&#039;&amp;quot; network routing prefix (&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing CIDR]&#039;&#039;&#039; - Format) will be used.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ipv4 --interface em0 --ipv4-addr-prefix 172.30.1.16/24 --host-name nstsurv1-mon --hosts-file-only;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;NetworkManager Ignore Certain Devices - Unmanaged&#039;&#039;&#039; ==&lt;br /&gt;
See this reference on how to configure NetworkManager to ignore certain devices: &amp;quot;&#039;&#039;&#039;[https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/configuring-networkmanager-to-ignore-certain-devices_configuring-and-managing-networking Configuring NetworkManager to ignore certain devices]&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Stealth Configured Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; network interfaces (i.e., An interface in the &amp;quot;&#039;&#039;&#039;UP&#039;&#039;&#039;&amp;quot; state with &amp;lt;u&amp;gt;No&amp;lt;/u&amp;gt; binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;) will now be configured. These interfaces are strategically network attached throughout the network infrastructure for surveillance monitoring.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;em2&#039;&#039;&#039;&amp;quot; is used to monitor the Transmit Data: &amp;quot;&#039;&#039;&#039;TxD&#039;&#039;&#039;&amp;quot; port on a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4  Network TAP]&#039;&#039;&#039; (&#039;&#039;&#039;T&#039;&#039;&#039;est &#039;&#039;&#039;A&#039;&#039;&#039;ccess &#039;&#039;&#039;P&#039;&#039;&#039;oint) for all traffic &#039;&#039;leaving&#039;&#039; (egress) the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; corporation at the &#039;&#039;&#039;Firewall Dirty Side&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface em2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em3&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;em3&#039;&#039;&#039;&amp;quot; is used to monitor the Receive Data: &amp;quot;&#039;&#039;&#039;RxD&#039;&#039;&#039;&amp;quot; port on a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4  Network TAP]&#039;&#039;&#039; for all traffic &#039;&#039;entering&#039;&#039; (ingress) the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; corporation at the &#039;&#039;&#039;Firewall Dirty Side&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface em3;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p2p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;p2p1&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Web Server&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; (&#039;&#039;&#039;S&#039;&#039;&#039;witched &#039;&#039;&#039;P&#039;&#039;&#039;ort &#039;&#039;&#039;A&#039;&#039;&#039;nalyzer) port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p2p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p2p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;p2p2&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Web Server&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p2p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p4p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This &#039;&#039;&#039;[https://en.wikipedia.org/wiki/10-gigabit_Ethernet 10 Gigabit Ethernet]&#039;&#039;&#039; network interface: &amp;quot;&#039;&#039;&#039;p4p1&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Business Transaction&#039;&#039;&#039;&amp;quot; data packets on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p4p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p4p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This  &#039;&#039;&#039;[https://en.wikipedia.org/wiki/10-gigabit_Ethernet 10 Gigabit Ethernet]&#039;&#039;&#039; network interface: &amp;quot;&#039;&#039;&#039;p4p2&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Business Transaction&#039;&#039;&#039;&amp;quot; data packets on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p4p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p6p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;p6p1&amp;quot; is used to monitor specific  &amp;quot;&#039;&#039;&#039;Remote Office&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p6p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p6p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;p6p2&amp;quot; is used to monitor specific  &amp;quot;&#039;&#039;&#039;Remote Office&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p6p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Stealth Interface Combo Setting Command&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The output below is a compact way of using a &#039;&#039;&#039;[https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash]&#039;&#039;&#039; &amp;quot;&#039;&#039;for loop&#039;&#039; &amp;quot; statement to configure all &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; interfaces in one command line invocation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;for i in em2 em3 p2p1 p2p2 p4p1 p4p2 p6p1 p6p2; do nstnetcfg --mode stealth --interface ${i}; done&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Apache SSL Configuration For Proper HTTPS NST WUI Access&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
If the &amp;quot;&#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;&amp;quot; on an NST system is changed, the &#039;&#039;&#039;[http://httpd.apache.org/ Apache Web Server]&#039;&#039;&#039; &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Secure_Sockets_Layer SSL]&#039;&#039;&#039; configuration file: &amp;quot;&#039;&#039;&#039;/etc/httpd/conf.d/ssl.conf&#039;&#039;&#039;&amp;quot; needs to be modified for proper &#039;&#039;&#039;[http://en.wikipedia.org/wiki/HTTP_Secure HTTPS]&#039;&#039;&#039; &#039;&#039;access&#039;&#039; to the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot;. The following &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; command uses the &amp;quot;&#039;&#039;&#039;ssl&#039;&#039;&#039;&amp;quot; mode to allow all hosts &amp;quot;&#039;&#039;&#039;HTTPS&#039;&#039;&#039;&amp;quot; access to the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;Server Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;nstsurv1.txycorp.com&#039;&#039;&#039;&amp;quot;. A new &amp;quot;&#039;&#039;&#039;SSL&#039;&#039;&#039;&amp;quot; certificate and key file will also be &#039;&#039;generated&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ssl --interface em1 --virtual-host *:443 --server-name nstsurv1.txycorp.com:443;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Using A Bash Script With &amp;quot;nstnetcfg&amp;quot;&#039;&#039;&#039; ==&lt;br /&gt;
It may be better to use a &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Bash Bash]&#039;&#039;&#039; script given the numerous invocations of &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; with this &#039;&#039;&#039;NST&#039;&#039;&#039; network configuration setup. A good location to store your script would be in directory: &amp;quot;&#039;&#039;&#039;/etc/nst&#039;&#039;&#039;&amp;quot;. This will allow one to &#039;&#039;easily&#039;&#039; make changes to your network configuration by editing the script and running it. An example script below is shown for: &amp;quot;&#039;&#039;&#039;/etc/nst/net_cfg.sh&amp;quot;&#039;&#039;&#039; using the above invocations of &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;. One can copy and paste this script as a starter template file for your usage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre class=&amp;quot;programListing&amp;quot;&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Script: &amp;quot;net_cfg.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Description: Helper script for setting up the configuration of network interfaces&lt;br /&gt;
#              on Server: &amp;quot;nstsurv1&amp;quot; using: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Short Usage: &amp;quot;nstnetcfg&amp;quot;&lt;br /&gt;
#&lt;br /&gt;
#   nstnetcfg [-m|--mode TEXT] [-i|--interface DEVICE]&lt;br /&gt;
#          [-a|--ipv4-addr-prefix IPv4ADDR/PREFIX] [-g|--gateway IPv4ADDR]&lt;br /&gt;
#          [--mac-addr MACADDR] [--host-name TEXT] [--domain-name TEXT]&lt;br /&gt;
#          [--name-servers IPv4ADDRLIST] [--hosts-file-only [true]|false]&lt;br /&gt;
#          [--virtual-host TEXT] [--server-name TEXT]&lt;br /&gt;
#          [-h|--help [true]|false] [-H|--help-long [true]|false]&lt;br /&gt;
#          [-v|--verbose [true]|false] [--version [true]|false]&lt;br /&gt;
#&lt;br /&gt;
#   Available Modes: ipv4, dhcp, ssl, stealth, netmgr, rmint, init, show&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Uncomment to enable verbosity &lt;br /&gt;
#VERBOSE=&amp;quot; --verbose&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: Initialization&lt;br /&gt;
/usr/bin/nstnetcfg --mode init${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em1&lt;br /&gt;
/usr/bin/nstnetcfg --mode ipv4 --interface em1 --ipv4-addr-prefix 10.221.5.14/16 --gateway 10.221.1.1 \&lt;br /&gt;
  --host-name nstsurv1 --domain-name txycorp.com --name-servers &amp;quot;10.221.1.10,10.221.1.11&amp;quot;${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em0&lt;br /&gt;
/usr/bin/nstnetcfg --mode ipv4 --interface em0 --ipv4-addr-prefix 172.30.1.16/24 --host-name nstsurv1-mon \&lt;br /&gt;
  --hosts-file-only${VERBOSE}; &lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface em2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em3&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface em3${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p2p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p2p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p2p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p2p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p4p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p4p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p4p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p4p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p6p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p6p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p6p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p6p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Uncomment for using a Stealth Interface Combo Setting&lt;br /&gt;
#for i in em2 em3 p2p1 p2p2 p4p1 p4p2 p6p1 p6p2;&lt;br /&gt;
#  do /usr/sbin/nstnetcfg --mode stealth --interface ${i};&lt;br /&gt;
#done&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Apache SSL Configuration&lt;br /&gt;
/usr/bin/nstnetcfg --mode ssl --interface em1 --virtual-host *:443 --server-name nstsurv1.txycorp.com:443${VERBOSE};&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Script Invocation&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
Make sure the script has it&#039;s &#039;&#039;&#039;execute&#039;&#039;&#039; permissions set:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;chmod +x &amp;quot;/etc/nst/net_cfg.sh&amp;quot;;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Execute the script:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/etc/nst/net_cfg.sh;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;List All Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can be used to list all available network interface devices on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
em0&lt;br /&gt;
em1&lt;br /&gt;
em2&lt;br /&gt;
em3&lt;br /&gt;
p2p1&lt;br /&gt;
p2p2&lt;br /&gt;
p4p1&lt;br /&gt;
p4p2&lt;br /&gt;
p6p1&lt;br /&gt;
p6p2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All &#039;Virtual&#039; Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D --virtual;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All &#039;Physical&#039; Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D --physical;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
em0&lt;br /&gt;
em1&lt;br /&gt;
em2&lt;br /&gt;
em3&lt;br /&gt;
p2p1&lt;br /&gt;
p2p2&lt;br /&gt;
p4p1&lt;br /&gt;
p4p2&lt;br /&gt;
p6p1&lt;br /&gt;
p6p2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Renaming A Network Interface Device&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 30&amp;lt;br /&amp;gt; SVN: 11210&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to rename a &#039;&#039;&#039;Network Interface Device&#039;&#039;&#039; thus providing a predictable Network Interface Name that is stable and available after each successive system reboot. In this section we will demonstrate how to &#039;&#039;rename&#039;&#039; a network interface device from: &amp;quot;&#039;&#039;&#039;eno16777984&#039;&#039;&#039;&amp;quot; to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot; using the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility.  This utility&#039;s &#039;&#039;&#039;rename&#039;&#039;&#039; mode generates a &#039;&#039;&#039;udev&#039;&#039;&#039; rules file that is used by &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Systemd systemd/udev]&#039;&#039;&#039; at system boot time to automatically assign the predictable, stable network interface name for local Ethernet, WLAN and/or WWAN network interfaces.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The current Network Interface Devices available are shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
eno16777984&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The current IP Address configuration:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno16777984: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 00:0c:29:e2:38:0b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.120/24 brd 10.222.222.255 scope global dynamic net0&lt;br /&gt;
       valid_lft 75211sec preferred_lft 75211sec&lt;br /&gt;
    inet6 fe80::20c:29ff:fee2:380b/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility will now be used to &#039;&#039;rename&#039;&#039; the network interface device from: &amp;quot;&#039;&#039;&#039;eno16777984&#039;&#039;&#039;&amp;quot; to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot;. Notice the creation and content of the generated custom &#039;&#039;&#039;udev&#039;&#039;&#039; network rules file: &amp;quot;&#039;&#039;&#039;/etc/udev/rules.d/79-my-net-name-slot.rules&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script should only be run on a &#039;&#039;&#039;Serial Console&#039;&#039;&#039; or a &#039;&#039;&#039;Desktop Terminal&#039;&#039;&#039; when changing the name of the &#039;&#039;&#039;Primary&#039;&#039;&#039; Network Interface Device. Otherwise, network connectivity may be lost if remotely connected to this NST system while performing this task.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  Try to use simple network device names (e.g. &#039;&#039;&#039;net0&#039;&#039;&#039;, &#039;&#039;&#039;netfw&#039;&#039;&#039;, &#039;&#039;&#039;Net_DMZ&#039;&#039;&#039; or &#039;&#039;&#039;NetRt1&#039;&#039;&#039;). Avoid using &#039;&#039;&#039;hyphen&#039;&#039;&#039; (&#039;&#039;&#039;&#039;-&#039;&#039;&#039;&#039;) or &#039;&#039;&#039;space&#039;&#039;&#039; (&#039;&amp;amp;nbsp;&#039;) characters in the new network interface device name. Instead, use the &#039;&#039;&#039;underscore&#039;&#039;&#039; (&#039;&#039;&#039;&#039;_&#039;&#039;&#039;&#039;) character or &#039;&#039;&#039;CamelCase&#039;&#039;&#039; for separation clarity in your device naming convention.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  By default the NetworkManager service will randomize Wifi MAC Addresses. If this occurs using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; to rename a Wifi Network Interface will fail. One can disable this Network Manager feature using the following configuration directive. Create a file in directory: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d&#039;&#039;&#039;&amp;quot; containing the configuration &amp;quot;&#039;&#039;&#039;wifi.scan-rand-mac-address=no&#039;&#039;&#039;&amp;quot; directive. Below is an example file to &#039;&#039;disable&#039;&#039; Wifi MAC Address randomizing by the NetworkManager service:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@E6440 ~]# &amp;lt;/span&amp;gt;cat /etc/NetworkManager/conf.d/wifi-static-mac.conf&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
[device]&lt;br /&gt;
wifi.scan-rand-mac-address=no&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@E6440 ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode rename --rename net0 --interface eno16777984 --verbose;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generating a new/updated custom &#039;udev&#039; network rules file: &amp;quot;/etc/udev/rules.d/79-my-net-name-slot.rules&amp;quot;:&lt;br /&gt;
ACTION==&amp;quot;add&amp;quot;, SUBSYSTEM==&amp;quot;net&amp;quot;, ATTR{address}==&amp;quot;00:0c:29:e2:38:0b&amp;quot;, NAME=&amp;quot;net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Renaming Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-eno16777984&amp;quot; to &amp;quot;/etc/sysconfig/network-scripts/ifcfg-net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Labeling Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-net0&amp;quot; - NAME=&amp;quot;net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The Network Interface Device rename from: &amp;quot;eno16777984&amp;quot; to &amp;quot;net0&amp;quot; will take effect on the next system reboot.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now perform a system reboot:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl reboot;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After a system &#039;&#039;&#039;Reboot&#039;&#039;&#039;, the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility is now run to verify the &#039;&#039;generated&#039;&#039; &#039;&#039;&#039;udev&#039;&#039;&#039; rules file: &amp;quot;&#039;&#039;&#039;/etc/udev/rules.d/79-my-net-name-slot.rules&#039;&#039;&#039;&amp;quot; which internally uses the &#039;&#039;&#039;[http://linux.die.net/man/8/udevadm udevadm]&#039;&#039;&#039; tool.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode testudev --interface net0 --verbose;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
/bin/udevadm test &amp;quot;/sys/class/net/net0&amp;quot;;&lt;br /&gt;
calling: test&lt;br /&gt;
version 208&lt;br /&gt;
This program is for debugging only, it does not run any program&lt;br /&gt;
specified by a RUN key. It may show incorrect results, because&lt;br /&gt;
some values may be different, or not available at a simulation run.&lt;br /&gt;
&lt;br /&gt;
=== trie on-disk ===&lt;br /&gt;
tool version:          208&lt;br /&gt;
file size:         5882628 bytes&lt;br /&gt;
header size             80 bytes&lt;br /&gt;
strings            1299372 bytes&lt;br /&gt;
nodes              4583176 bytes&lt;br /&gt;
load module index&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/10-dm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/11-dm-lvm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/13-dm-disk.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/40-libgphoto2.rules&lt;br /&gt;
IMPORT found builtin &#039;usb_id --export %%p&#039;, replacing /usr/lib/udev/rules.d/40-libgphoto2.rules:11&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/40-usb_modeswitch.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/42-usb-hid-pm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/50-udev-default.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/56-hpmud.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-cdrom_id.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-drm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-ffado.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-fprint-autosuspend.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-keyboard.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-net.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-pcmcia.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-alsa.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-input.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-serial.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-storage-tape.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-storage.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-v4l.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-raw.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/61-accelerometer.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/62-multipath.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/63-md-raid-arrays.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/64-btrfs.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/64-md-raid-assembly.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/65-libwacom.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/65-md-incremental.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-cd-sensors.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-dm-lvm-metad.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-libmtp.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-pilot-link.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-xorg-vmmouse.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-power-switch.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-printers.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-spice-vdagentd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-touchpad-quirks.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-uaccess.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-wacom.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/71-biosdevname.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/71-seat.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/73-seat-late.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-net-description.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-probe_mtd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-tty-description.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-ericsson-mbm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-huawei-net-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-longcheer-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-nokia-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-pcmcia-device-blacklist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-platform-serial-whitelist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-simtech-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-telit-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-usb-device-blacklist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-usb-serial-adapters-greylist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-x22x-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-zte-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-nm-olpc-mesh.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/78-sound-card.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/79-my-net-name-slot.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-drivers.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-mm-candidate.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-net-name-slot.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-udisks.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-udisks2.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/85-regulatory.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/85-usbmuxd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-alsa-restore.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-alsa-tools-firmware.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-pulseaudio.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/91-drm-modeset.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-cd-devices.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-dm-notify.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-udev-late.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-dell.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-fujitsu.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-gateway.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-ibm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-lenovo.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-toshiba.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-csr.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-hid.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-wup.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/98-kexec.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/99-gpsd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/99-qemu-guest-agent.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/99-systemd.rules&lt;br /&gt;
rules contain 393216 bytes tokens (32768 * 12 bytes), 32346 bytes strings&lt;br /&gt;
29283 strings (243715 bytes), 26259 de-duplicated (214394 bytes), 3025 trie nodes used&lt;br /&gt;
PROGRAM &#039;/lib/udev/rename_device&#039; /usr/lib/udev/rules.d/60-net.rules:1&lt;br /&gt;
starting &#039;/lib/udev/rename_device&#039;&lt;br /&gt;
&#039;/lib/udev/rename_device&#039; [2075] exit with return code 0&lt;br /&gt;
PROGRAM &#039;/sbin/biosdevname --policy physical -i net0&#039; /usr/lib/udev/rules.d/71-biosdevname.rules:22&lt;br /&gt;
starting &#039;/sbin/biosdevname --policy physical -i net0&#039;&lt;br /&gt;
&#039;/sbin/biosdevname --policy physical -i net0&#039; [2076] exit with return code 4&lt;br /&gt;
IMPORT builtin &#039;net_id&#039; /usr/lib/udev/rules.d/75-net-description.rules:6&lt;br /&gt;
IMPORT builtin &#039;hwdb&#039; /usr/lib/udev/rules.d/75-net-description.rules:12&lt;br /&gt;
NAME &#039;net0&#039; /etc/udev/rules.d/79-my-net-name-slot.rules:1&lt;br /&gt;
RUN &#039;/usr/lib/systemd/systemd-sysctl --prefix=/proc/sys/net/ipv4/conf/$name --prefix=/proc/sys/net/ipv4/neigh/$name --prefix=/proc/sys/net/ipv6/conf/$name --prefix=/proc/sys/net/ipv6/neigh/$name&#039; /usr/lib/udev/rules.d/99-systemd.rules:52&lt;br /&gt;
ACTION=add&lt;br /&gt;
DEVPATH=/devices/pci0000:00/0000:00:15.0/0000:03:00.0/net/net0&lt;br /&gt;
ID_BUS=pci&lt;br /&gt;
ID_MM_CANDIDATE=1&lt;br /&gt;
ID_MODEL_FROM_DATABASE=VMXNET3 Ethernet Controller&lt;br /&gt;
ID_MODEL_ID=0x07b0&lt;br /&gt;
ID_NET_LABEL_ONBOARD=enEthernet0&lt;br /&gt;
ID_NET_NAME_MAC=enx000c29e2380b&lt;br /&gt;
ID_NET_NAME_ONBOARD=eno16777984&lt;br /&gt;
ID_NET_NAME_PATH=enp3s0&lt;br /&gt;
ID_NET_NAME_SLOT=ens160&lt;br /&gt;
ID_OUI_FROM_DATABASE=VMware, Inc.&lt;br /&gt;
ID_PCI_CLASS_FROM_DATABASE=Network controller&lt;br /&gt;
ID_PCI_SUBCLASS_FROM_DATABASE=Ethernet controller&lt;br /&gt;
ID_VENDOR_FROM_DATABASE=VMware&lt;br /&gt;
ID_VENDOR_ID=0x15ad&lt;br /&gt;
IFINDEX=2&lt;br /&gt;
INTERFACE=net0&lt;br /&gt;
SUBSYSTEM=net&lt;br /&gt;
SYSTEMD_ALIAS=/sys/subsystem/net/devices/net0&lt;br /&gt;
TAGS=:systemd:&lt;br /&gt;
USEC_INITIALIZED=78468&lt;br /&gt;
run: &#039;/usr/lib/systemd/systemd-sysctl --prefix=/proc/sys/net/ipv4/conf/net0 --prefix=/proc/sys/net/ipv4/neigh/net0 --prefix=/proc/sys/net/ipv6/conf/net0 --prefix=/proc/sys/net/ipv6/neigh/net0&#039;&lt;br /&gt;
unload module index&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One can see that the Network Interface device has been changed to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
net0&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The IP Address configuration after the device rename is shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: net0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 00:0c:29:e2:38:0b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.120/24 brd 10.222.222.255 scope global dynamic net0&lt;br /&gt;
       valid_lft 75211sec preferred_lft 75211sec&lt;br /&gt;
    inet6 fe80::20c:29ff:fee2:380b/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing IPv4 Secondary Addressing&#039;&#039;&#039; ==&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 30&amp;lt;br /&amp;gt; SVN: 11210&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to &#039;&#039;Create&#039;&#039; and &#039;&#039;Delete&#039;&#039; (i.e., &#039;&#039;Manage&#039;&#039;) &#039;&#039;&#039;IPv4 Secondary Addressing&#039;&#039;&#039;. By example we will &#039;&#039;Add&#039;&#039;, &#039;&#039;Display&#039;&#039; and &#039;&#039;Remove&#039;&#039; &#039;&#039;&#039;IPv4 Secondary Addresses:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039; and &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system (e.g., &#039;&#039;&#039;striker&#039;&#039;&#039;) on &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot;.  This example is shown in the sections below.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
=== &#039;&#039;&#039;Adding IPv4 Secondary Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;add&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039;&amp;quot; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state on &#039;&#039;&#039;NST&#039;&#039;&#039; system: &amp;quot;&#039;&#039;&#039;striker&#039;&#039;&#039;&amp;quot; is shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.111/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Secondary Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;add&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.241/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;bound&#039; IPv4 secondary Address: &amp;quot;10.222.222.241/24&amp;quot;&lt;br /&gt;
to Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the second &#039;&#039;&#039;IPv4 Secondary Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;add&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.242/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;bound&#039; IPv4 secondary Address: &amp;quot;10.222.222.242/24&amp;quot;&lt;br /&gt;
to Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is now shown with the two (2) &#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039; added:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip a;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.111/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List IPv4 Primary / Secondary Addresses Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can also be used to display all &#039;&#039;&#039;IPv4 Addresses&#039;&#039;&#039; including &#039;&#039;&#039;IP Secondary Addresses&#039;&#039;&#039; bound to &#039;&#039;&#039;Network Interface: &amp;quot;lan0&amp;quot;&#039;&#039;&#039; in CIDR notation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;getipaddr --interface lan0 --ip-secondary --ip-address-cidr --net-int-devices;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lan0 10.222.222.111/24&lt;br /&gt;
lan0 10.222.222.241/24 secondary&lt;br /&gt;
lan0 10.222.222.242/24 secondary&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Removing IPv4 Secondary Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;remove&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039;&amp;quot; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, we remove all &#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039; bound to Network Interface: &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary remove -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;remove&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.241/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;unbound&#039; the IPv4 secondary Address: &amp;quot;10.222.222.241/24&amp;quot;&lt;br /&gt;
associated with Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.242/24 --secondary remove -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;remove&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.242/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;unbound&#039; the IPv4 secondary Address: &amp;quot;10.222.222.242/24&amp;quot;&lt;br /&gt;
associated with Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally we display the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state on NST system: &#039;&#039;&#039;striker&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;ip a;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing IPv4 Alias Addresses&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;[[Image:Warning.png‎]]  &#039;&#039;&#039;IPv4 Alias Addressing&#039;&#039;&#039; is no longer supported by script: &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; start with &#039;&#039;&#039;NST 30&#039;&#039;&#039;.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5663&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to &#039;&#039;Create&#039;&#039; and &#039;&#039;Delete&#039;&#039; (i.e., &#039;&#039;Manage&#039;&#039;) &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;. By example we will &#039;&#039;Add&#039;&#039; and &#039;&#039;Remove&#039;&#039; &#039;&#039;&#039;IPv4 Alias Addresses:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039; and &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system on &#039;&#039;&#039;IPv4 Alias Network Interfaces:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; respectively.  This example is shown in the sections below. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; You can not manage IPv4 aliases for interfaces which are under NetworkManager control (the interface must be managed by the network service). In addition, you may need to review/update your routing after adding your aliases.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Adding IPv4 Alias Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;add&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;&amp;quot; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; using the &#039;&#039;&#039;Gateway:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.1&#039;&#039;&#039;&amp;quot; and &#039;&#039;&#039;Host Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;probe-a1&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m ipv4 -i p5p1:a1 -a 10.222.222.241/24 -g 10.222.222.1 --host-name probe-a1 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&amp;quot; for IPv4 Alias Network Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the second &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; using the &#039;&#039;&#039;Gateway:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.1&#039;&#039;&#039;&amp;quot; and &#039;&#039;&#039;Host Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;probe-a2&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m ipv4 -i p5p1:a2 -a 10.222.222.242/24 -g 10.222.222.1 --host-name probe-a2 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&amp;quot; for IPv4 Alias Network Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is now shown with the two (2) &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; added:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary p5p1:a1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary p5p1:a2&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; wil also be configured in the hosts file &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;cat /etc/hosts;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
127.0.0.1	localhost.localdomain localhost&lt;br /&gt;
::1		localhost6.localdomain6 localhost6&lt;br /&gt;
&lt;br /&gt;
10.222.222.10    striker.nst.net striker&lt;br /&gt;
10.222.222.141   probe-a1&lt;br /&gt;
10.222.222.142   probe-a2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; A network configuration file in directory: &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&#039;&amp;quot; was created for both &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; above (i.e., &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&#039;&#039;&#039;&amp;quot;). This will allow the &#039;&#039;&#039;IPv4 Alias Address&#039;&#039;&#039; configuration to survive a system reboot. &amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All Installed Network Interface Devices Including IP Alias Interfaces Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can also be used to list all available network interface devices including &#039;&#039;&#039;IP Alias Network Interfaces&#039;&#039;&#039; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -D --ip-alias;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
p1p1&lt;br /&gt;
p1p2&lt;br /&gt;
p5p1&lt;br /&gt;
p5p1:a1&lt;br /&gt;
p5p1:a2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Display all &#039;&#039;&#039;IPv4 Addresses&#039;&#039;&#039; including &#039;&#039;&#039;IP Alias Addresses&#039;&#039;&#039; bound to &#039;&#039;&#039;Network Interface: &amp;quot;p5p1&amp;quot;&#039;&#039;&#039; in CIDR notation:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -i p5p1 -D --ip-alias --ip-network-address-cidr;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
p5p1 10.222.222.10/24&lt;br /&gt;
p5p1:a1 10.222.222.241/24&lt;br /&gt;
p5p1:a2 10.222.222.242/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Removing IPv4 Alias Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;remove&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;&amp;quot; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system with configured &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary p5p1:a1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary p5p1:a2&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; is now &#039;&#039;removed&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg  -m rmint -i p5p1:a1 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Clean all IPv4 Address entries: &amp;quot;10.222.222.241&amp;quot; in Hosts file: &amp;quot;/etc/hosts&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds:&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; is now &#039;&#039;removed&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg  -m rmint -i p5p1:a2 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Clean all IPv4 Address entries: &amp;quot;10.222.222.242&amp;quot; in Hosts file: &amp;quot;/etc/hosts&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds:&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system with all &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; &#039;&#039;removed&#039;&#039;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; also shows that no &#039;&#039;&#039;IP Alias Network Interfaces&#039;&#039;&#039; are configured on the &#039;&#039;&#039;NST&#039;&#039;&#039; demo system. &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -D --ip-alias;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
p1p1&lt;br /&gt;
p1p2&lt;br /&gt;
p5p1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Promiscuous Mode Control&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 22&amp;lt;br /&amp;gt; SVN: 7000&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Overview&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; state of a network interface device can be &#039;&#039;manually&#039;&#039; controlled by the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script. Promiscuous mode allows a network interface device to intercept and read each network packet that arrives in its entirety which is essential for capturing all traffic received. One can also use the systemd service: &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; for &#039;&#039;automatically&#039;&#039; setting the Promiscuous state &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for one or more network interface devices at system boot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; One may not be able to set the Promiscuous state &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; if another network application like &#039;&#039;&#039;[https://wiki.wireshark.org/ wireshark]&#039;&#039;&#039; or &#039;&#039;&#039;[https://en.wikipedia.org/wiki/Tcpdump tcpdump]&#039;&#039;&#039; is active and in capture mode. A counter is used by each &#039;&#039;&#039;Kernel&#039;&#039;&#039; network driver module and incremented for each application that requests the Promiscuous mode to be set &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for the network interface device. Until these applications have all set the Promiscuous state &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039;, can one control the device&#039;s Promiscuous mode with the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Manual Mode&#039;&#039;&#039; ===&lt;br /&gt;
This section will demonstrate how to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode for a network interface using either the interface method or the promiscuous configuration file method. &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Interface Method&#039;&#039;&#039; ====&lt;br /&gt;
The current &#039;&#039;&#039;Network Interface Devices&#039;&#039;&#039; available are shown for demonstration in this section.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lan0&lt;br /&gt;
lo&lt;br /&gt;
netmon0&lt;br /&gt;
netmon1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
How to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode of network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; state:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode promiscon -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;On&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;On&#039;:&lt;br /&gt;
/sbin/ip link set promisc on netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
How to to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode of network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; state:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode promiscoff -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;Off&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;Off&#039;:&lt;br /&gt;
/sbin/ip link set promisc off netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Promiscuous Configuration File Method&#039;&#039;&#039; ====&lt;br /&gt;
Alternatively, one could add the network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;NST&#039;&#039;&#039; promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot; using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; mode: &amp;quot;&#039;&#039;&#039;promisccfg&#039;&#039;&#039;&amp;quot; and then control the &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; state using the following command sequence:&lt;br /&gt;
&lt;br /&gt;
First configure the network Interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; in the &#039;&#039;&#039;NST&#039;&#039;&#039; promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promisccfg --promisc add -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using Promiscuous configuration operation mode: &amp;quot;add&amp;quot; for Network Interface device: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Adding Network Interface device: &amp;quot;netmon0&amp;quot; to the Promiscuous configuration file.&lt;br /&gt;
&lt;br /&gt;
Updated Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Content of Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
==================================================================&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
#&lt;br /&gt;
# Configuration file for a list Network Interface Adapters&lt;br /&gt;
# that can have their promiscuous mode enabled or disabled&lt;br /&gt;
# by the NST Script: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
#&lt;br /&gt;
# Typically the NST script: &amp;quot;nstnetcfg&amp;quot; modes:&lt;br /&gt;
# &#039;promiscon, promiscoff or promisccfg&#039; use or configure this file.&lt;br /&gt;
# Use a space character as the delimiter when multiple interfaces&lt;br /&gt;
# are specificied.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Example for Network Interface Adapters: netmon0 and netmon1&lt;br /&gt;
# PROMISCINTS=&amp;quot;netmon1 netmon2&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
PROMISCINTS=&amp;quot;netmon0&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting Promiscuous mode &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; using the promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promiscon -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Found Network Interface(s): &amp;quot;netmon0&amp;quot; in promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;On&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;On&#039;:&lt;br /&gt;
/sbin/ip link set promisc on netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Setting Promiscuous mode &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; for network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; using the promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promiscoff -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Found Network Interface(s): &amp;quot;netmon0&amp;quot; in promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;Off&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;Off&#039;:&lt;br /&gt;
/sbin/ip link set promisc off netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Automatic At System Boot&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; systemd &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; service can be used to &#039;&#039;enable&#039;&#039; the &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode on one or more network interface adapters during a system boot. The content of this service unit is shown below:&lt;br /&gt;
&amp;lt;pre class=&amp;quot;programListing&amp;quot; style=&amp;quot; word-break: break-word;&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Network Interface Promiscuous Mode Control&lt;br /&gt;
Documentation=man:nstnetcfg(1)&lt;br /&gt;
Documentation=http://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22#Promiscuous_Mode_Control&lt;br /&gt;
Wants=network-online.target&lt;br /&gt;
After=network-online.target&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
Type=oneshot&lt;br /&gt;
RemainAfterExit=yes&lt;br /&gt;
ExecStart=/usr/bin/nstnetcfg --mode promiscon&lt;br /&gt;
ExecStop=/usr/bin/nstnetcfg --mode promiscoff&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=multi-user.target&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One can see the use of the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script for &#039;&#039;starting&#039;&#039; and &#039;&#039;stopping&#039;&#039; the service. Make sure you use mode: &amp;quot;&#039;&#039;&#039;--mode promisccfg&#039;&#039;&#039;&amp;quot; with the corresponding network interface that you are interested in &#039;&#039;enabling&#039;&#039; the promiscuous mode at system boot time. Then enable the &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; service. Below is an example for network interface device: &amp;quot;&#039;&#039;&#039;netmon1&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg -m promisccfg -i netmon1 --promisc add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using Promiscuous configuration operation mode: &amp;quot;add&amp;quot; for Network Interface device: &amp;quot;netmon1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Adding Network Interface device: &amp;quot;netmon1&amp;quot; to the Promiscuous configuration file.&lt;br /&gt;
&lt;br /&gt;
Updated Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Content of Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
==================================================================&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
#&lt;br /&gt;
# Configuration file for a list Network Interface Adapters&lt;br /&gt;
# that can have their promiscuous mode enabled or disabled&lt;br /&gt;
# by the NST Script: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
#&lt;br /&gt;
# Typically the NST script: &amp;quot;nstnetcfg&amp;quot; modes:&lt;br /&gt;
# &#039;promiscon, promiscoff or promisccfg&#039; use or configure this file.&lt;br /&gt;
# Use a space character as the delimiter when multiple interfaces&lt;br /&gt;
# are specificied.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Example for Network Interface Adapters: netmon0 and netmon1&lt;br /&gt;
# PROMISCINTS=&amp;quot;netmon1 netmon2&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
PROMISCINTS=&amp;quot;netmon1&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl enable promisc.service;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
Created symlink from /etc/systemd/system/multi-user.target.wants/promisc.service to /usr/lib/systemd/system/promisc.service.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl reboot;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing a &#039;Bonding&#039; Network Interface&#039;&#039;&#039; ==&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5765&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]In this section we will use &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; to &#039;&#039;create&#039;&#039; a &#039;&#039;&#039;&#039;Bond Master&#039;&#039;&#039;&#039; Network Interface device: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; by aggregating 2 (two) &#039;&#039;&#039;NIC&#039;&#039;&#039; adapters&amp;quot; &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; into a single interface. Behind the scene, the Linux bonding driver is performing the actual mechanism for creating and managing the bond device.&lt;br /&gt;
A bond interface device may be useful when working with an &amp;quot;&#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4 Non-Aggregational Network Tap]&#039;&#039;&#039;&amp;quot;. By combining the non-aggregational ports of the TAP back into a single interface allows both &#039;&#039;&#039;Transmit&#039;&#039;&#039; and &#039;&#039;&#039;Receive&#039;&#039;&#039; network traffic to be seen by a listening network analysis or monitoring application. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The network diagram shown below will be used for the example bonding configuration demonstrated in this section. The &#039;&#039;&#039;NST WUI Ntopng IPv4 Hosts&#039;&#039;&#039; application is performing &#039;&#039;surveillance monitoring&#039;&#039; on the firewall dirty side using the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgbonding.png|1024px|center|A NST &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; Bonding Configuration with Monitoring]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The network traffic monitored on the [http://www.dual-comm.com/etap3105-aggregation-and-non-aggregation-tap.htm Dualcomm ETAP 3105 10/100/1000Base-T  Regeneration Network TAP] Aggregational Port: &amp;quot;&#039;&#039;&#039;3&#039;&#039;&#039;&amp;quot; (NST Probe Port: &amp;quot;&#039;&#039;&#039;p5p1&#039;&#039;&#039;&amp;quot;) may be equal to or less than the traffic monitored on the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; that is created in this section. If the combined effective data rate on the &amp;quot;&#039;&#039;&#039;Slave&#039;&#039;&#039;&amp;quot; Network Interfaces: &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; exceeds &#039;&#039;1Gb/sec&#039;&#039;, then Aggregational Port: &amp;quot;&#039;&#039;&#039;3&#039;&#039;&#039;&amp;quot; (NST Probe Port: &amp;quot;&#039;&#039;&#039;p5p1&#039;&#039;&#039;&amp;quot;) will start to buffer and eventually lose packets where as the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; will not.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Network Interface Bond Creation&#039;&#039;&#039; ===&lt;br /&gt;
First lets show the current network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p5p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:22:17 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; NIC adapters connected to the non-aggregational Network TAP (Ports: &amp;quot;&#039;&#039;&#039;4&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;5&#039;&#039;&#039;&amp;quot; respectively) will now be bonded into a single interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;bonding&#039;&#039;&#039;&amp;quot;. The bond interface is now in &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; mode since it has no binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode bonding --interface bond0  --bonding-slave-ints p1p1,p1p2 --bonding-opts &amp;quot;mode=balance-rr,miimon=100&amp;quot; -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to configure &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Master&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility is now shown after the creation of the &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; device:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p5p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:22:17 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
18: bond0: &amp;lt;BROADCAST,MULTICAST,MASTER,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP group default &lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link tentative dadfailed &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notice that the network interfaces: &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; have the &amp;quot;&#039;&#039;&#039;SLAVE&#039;&#039;&#039;&amp;quot; flag set and the bond network interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; has the &amp;quot;&#039;&#039;&#039;MASTER&#039;&#039;&#039;&amp;quot; flag set. Network traffic can now be monitored or captured on this new Bonded Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Network Interface Bond Removal&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will remove the bonding network interface: &amp;quot;&#039;&#039;&#039;bond&#039;&#039;&#039;&amp;quot; using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; mode: &amp;quot;&#039;&#039;&#039;rmbonding&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode rmbonding --interface bond0  -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to remove &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Removing the &amp;quot;Linux Bonding Driver&amp;quot; module.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Master&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Slave&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;Initialize&#039; Network Interface: &amp;quot;p1p2&amp;quot; to a &#039;Unmanaged&#039; state.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot; for Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up an &#039;Unmanaged&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Slave&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;Initialize&#039; Network Interface: &amp;quot;p1p1&amp;quot; to a &#039;Unmanaged&#039; state.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot; for Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up an &#039;Unmanaged&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Binding an IPv4 Address to a  &#039;Bonding&#039; Network Interface&#039;&#039;&#039; ===&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5765&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]In this section we will use &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; to bind an &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; to a &#039;&#039;&#039;Bonded&#039;&#039;&#039; Network Interface. This method can also use one of the available Linux bonding driver modes to increase the &#039;&#039;effective&#039;&#039; bandwidth  from the NST system to the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The network diagram shown below will be used for the example &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; binding to the &#039;Bonded&#039; Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.  A Quad Gigabit NIC Adapter with ports:  &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p3&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p4&#039;&#039;&#039;&amp;quot; will be bound together to form a new &#039;Bonding Master&#039; Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgipv4bonding.png|1024px|center| Binding an IPv4 Address to a &#039;Bonded&#039; Network Interface Using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Network Interface Bond Creation&#039;&#039;&#039; ====&lt;br /&gt;
First lets show the current network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.224.2.33/16 brd 10.224.255.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:52 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:53 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p1p3: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:54 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
6: p1p4: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:55 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p3&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p4&#039;&#039;&#039;&amp;quot; NIC LAN ports are now &#039;&#039;bonded&#039;&#039; into a single interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;bonding&#039;&#039;&#039;&amp;quot;. The bond interface is now currently in &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; mode with no binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode bonding --interface bond0  --bonding-slave-ints p1p1,p1p2,p1p3,p1p4 --bonding-opts &amp;quot;mode=balance-tlb,miimon=100&amp;quot; -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to configure &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p3&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p4&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Master&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Linux bonding driver is configured for mode: &#039;&#039;&#039;Adaptive Transmit Load Balancing&#039;&#039;&#039;. This mode creates a channel bond that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each &amp;quot;&#039;&#039;&#039;Slave&#039;&#039;&#039;&amp;quot; Interface. Incoming traffic is received by the current slave.  If the receiving slave fails, another slave takes over the &#039;&#039;&#039;MAC Address&#039;&#039;&#039; of the failed receiving slave.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;IPv4 Address Binding to the Bond Interface&#039;&#039;&#039; ====&lt;br /&gt;
Next the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; utility is now used to &#039;&#039;bind&#039;&#039; the IPv4 Address: &amp;quot;&#039;&#039;&#039;172.18.1.11&#039;&#039;&#039;&amp;quot; to the &#039;Bond Master&#039; Virtual network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode ipv4 --interface bond0 -a 172.18.1.11/24 -g 10.224.1.1 --hosts-file-only --host-name striker-bond -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
Configuring a static IPv4 Address: &amp;quot;172.18.1.11/24&amp;quot; for &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot; for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Updating the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot; in 5 seconds.&lt;br /&gt;
Successfully brought &#039;Up&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the network configuration is now shown using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; utility with IPv4 Address: &amp;quot;&#039;&#039;&#039;172.18.1.11&#039;&#039;&#039;&amp;quot; bound to the &#039;Bonding Master&#039; Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.224.2.33/16 brd 10.222.255.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state Up group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:52 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:53 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p1p3: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state Up group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:54 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
6: p1p4: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:55 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
12: bond0: &amp;lt;BROADCAST,MULTICAST,MASTER,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP group default &lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 172.18.1.11/24 brd 172.18.1.255 scope global bond0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Hot Plug In an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro&#039;&#039;&#039; ==&lt;br /&gt;
If you hot plug in an Apple Thunderbolt Gigabit Ethernet Adapter it needs to be registered as an authorized device using the &#039;&#039;&#039;boltctl&#039;&#039;&#039; utility. &#039;&#039;&#039;boltctl&#039;&#039;&#039; is part of the bolt RPM package. If you reboot the system with the adapter plugged in, one does not have to register the device. This is handled during the system boot process.&lt;br /&gt;
&lt;br /&gt;
The following is an example of hot plugging in an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro for immediate use without rebooting:&lt;br /&gt;
&lt;br /&gt;
* Install the bolt package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install bolt;&lt;br /&gt;
&lt;br /&gt;
* Plug in the adapter and list all connected devices: &lt;br /&gt;
 [root@nst42-mbp ~]# boltctl list;&lt;br /&gt;
 ● Apple Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ type:          peripheral&lt;br /&gt;
   ├─ name:          Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ vendor:        Apple, Inc.&lt;br /&gt;
   ├─ uuid:          903d9407-0200-0100-ffff-ffffffffffff&lt;br /&gt;
   ├─ generation:    Thunderbolt 1&lt;br /&gt;
   ├─ status:        connected&lt;br /&gt;
   │  ├─ domain:     e0eec615-0a00-0100-ffff-ffffffffffff&lt;br /&gt;
   │  ├─ rx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  ├─ tx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  └─ authflags:  none&lt;br /&gt;
   ├─ connected:     Mon 09 Mar 2026 02:46:57 PM UTC&lt;br /&gt;
   └─ stored:        no&lt;br /&gt;
&lt;br /&gt;
* Current Network Device list - The Gigabit Ethernet Adapter does not appear. Device: &#039;&#039;&#039;enp2s0f0&#039;&#039;&#039; is the native built in Gigabit Adapter on this MacBook Pro:&lt;br /&gt;
 [root@nst42-mbp ~]# nmcli d;&lt;br /&gt;
 DEVICE    TYPE      STATE                   CONNECTION    &lt;br /&gt;
 wlp3s0    wifi      connected               UTLNET_5_0GHZ &lt;br /&gt;
 lo        loopback  connected (externally)  lo            &lt;br /&gt;
 enp2s0f0  ethernet  unavailable             --            &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Now authorize the Thunderbolt Gigabit adapter with its UUID:&lt;br /&gt;
 [root@nst42-mbp ~]# boltctl authorize 903d9407-0200-0100-ffff-ffffffffffff;&lt;br /&gt;
 [root@nst42-mbp ~]# boltctl list;&lt;br /&gt;
 ● Apple Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ type:          peripheral&lt;br /&gt;
   ├─ name:          Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ vendor:        Apple, Inc.&lt;br /&gt;
   ├─ uuid:          903d9407-0200-0100-ffff-ffffffffffff&lt;br /&gt;
   ├─ generation:    Thunderbolt 1&lt;br /&gt;
   ├─ status:        authorized&lt;br /&gt;
   │  ├─ domain:     e0eec615-0a00-0100-ffff-ffffffffffff&lt;br /&gt;
   │  ├─ rx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  ├─ tx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  └─ authflags:  none&lt;br /&gt;
   ├─ authorized:    Mon 09 Mar 2026 02:48:26 PM UTC&lt;br /&gt;
   ├─ connected:     Mon 09 Mar 2026 02:46:57 PM UTC&lt;br /&gt;
   └─ stored:        no&lt;br /&gt;
&lt;br /&gt;
* The Gigabit Adapter now appears in the Device list as &#039;&#039;&#039;ens9&#039;&#039;&#039;:&lt;br /&gt;
 [root@nst42-mbp ~]# nmcli d;&lt;br /&gt;
 DEVICE    TYPE      STATE                   CONNECTION    &lt;br /&gt;
 wlp3s0    wifi      connected               UTLNET_5_0GHZ &lt;br /&gt;
 lo        loopback  connected (externally)  lo            &lt;br /&gt;
 enp2s0f0  ethernet  unavailable             --            &lt;br /&gt;
 ens9      ethernet  unavailable             --&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
	<entry>
		<id>https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22&amp;diff=10571</id>
		<title>HowTo Setup A Server With Multiple Network Interface Adapters Using: &quot;nstnetcfg&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22&amp;diff=10571"/>
		<updated>2026-03-09T15:30:01Z</updated>

		<summary type="html">&lt;p&gt;Rwh: /* Hot Plug In an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
= &#039;&#039;&#039;Overview&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
This page demonstrates  how to setup networking with an NST server that is configured with &#039;&#039;multiple&#039;&#039; network interface adapters for performing &#039;&#039;simultaneous&#039;&#039; network computing surveillance tasks. The NST script: &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; command line tool was designed to make this task easy to accomplish using the underlying &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service via the &#039;&#039;&#039;nmcli&#039;&#039;&#039; utility.&lt;br /&gt;
&lt;br /&gt;
The diagram below will be used as a reference for setting up a multi-network interface adapter server using &#039;&#039;&#039;NST&#039;&#039;&#039;. The rear panel of a  &#039;&#039;&#039;1U Server&#039;&#039;&#039; is shown with NIC attachments to the network infrastructure. The network security staff for fictitious company: &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; would like to use NST for monitoring different network segments throughout their network. In particular, they would like to monitor traffic entering and leaving their corporation, web server traffic, all client electronic business transactions and remote traffic to and from their satellite offices. They will use a combination of &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; (&#039;&#039;&#039;S&#039;&#039;&#039;witched &#039;&#039;&#039;P&#039;&#039;&#039;ort &#039;&#039;&#039;A&#039;&#039;&#039;nalyzer) ports and a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4 Non-Aggregational Network TAP]&#039;&#039;&#039; to expose network traffic on these segments. &lt;br /&gt;
&lt;br /&gt;
When booting up &amp;quot;&#039;&#039;&#039;[http://sourceforge.net/projects/nst/ NST Live]&#039;&#039;&#039;&amp;quot; or after a hard disk installation, the &amp;quot;&#039;&#039;&#039;[http://projects.gnome.org/NetworkManager/ Network Manager]&#039;&#039;&#039;&amp;quot; service is on by default for managing all network interfaces found on an NST system. &#039;&#039;&#039;Network Manager&#039;&#039;&#039; provides a quick and easy method for setting up networking on a system equipped with a wireless interface that uses &#039;&#039;&#039;DHCP&#039;&#039;&#039; for &#039;&#039;&#039;IPv4 Address &#039;&#039;&#039;configuration. When a system is configured with two or more wired network interfaces or requires a multi-homed network setup, the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script may be a better choice for setting up the network configuration.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; utility can help mitigate some of the error prone tasks necessary by scripting when setting up networking on a NST (Linux) system using the &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgserver.png|1024px|center|A Multi-Network Interface Adapter NST Server Configuration]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The &amp;quot;&#039;&#039;&#039;Sys Admin Network&#039;&#039;&#039;&amp;quot; is an out-of-band network for the management of enterprise servers within this network infrastructure. The &amp;quot;&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Out-of-band_management ILOM]&#039;&#039;&#039;&amp;quot;  (Integrated Lights Out Management) network interface (i.e., &amp;quot;&#039;&#039;&#039;NetMgt&#039;&#039;&#039;&amp;quot;) and the &amp;quot;&#039;&#039;&#039;Serial Console&#039;&#039;&#039;&amp;quot; device (i.e., &amp;quot;&#039;&#039;&#039;ttyS0&#039;&#039;&#039;&amp;quot;) are shown for completeness and are not used by &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Network Interface Setup Configuration Information&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
In this section we will identify each network interface and how it should be setup using the &#039;&#039;&#039;1U Server&#039;&#039;&#039; configuration illustrated in the reference diagram above. Network parameters such as the &#039;&#039;&#039;Subnet Mask&#039;&#039;&#039;, &#039;&#039;&#039;Host Name(s)&#039;&#039;&#039;, &#039;&#039;&#039;Domain Name Servers&#039;&#039;&#039;, &#039;&#039;&#039;Domain Name&#039;&#039;&#039;, &#039;&#039;&#039;Gateway&#039;&#039;&#039; and &#039;&#039;&#039;Default Interface&#039;&#039;&#039; will also be identified. The table below depicts values that will be used by the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script.&lt;br /&gt;
&lt;br /&gt;
 {| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background-color: lightgray;&amp;quot; |Interface / Parameter&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot;  style=&amp;quot;background-color: lightgray;&amp;quot; |Configuration Values&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot;  style=&amp;quot;background-color: lightgray;&amp;quot; |NetworkManager&amp;lt;br /&amp;gt;Service&lt;br /&gt;
 |-&lt;br /&gt;
 |em0&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;172.30.1.16&#039;&#039;&#039;,  Network Routing Prefix: &#039;&#039;&#039;24&#039;&#039;&#039;, Host Name: &#039;&#039;&#039;nstsurv1-mon&#039;&#039;&#039;, Gateway: &#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&lt;br /&gt;
 |managed&lt;br /&gt;
 |-&lt;br /&gt;
 |em1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;10.221.5.14&#039;&#039;&#039;,  Network Routing Prefix: &#039;&#039;&#039;16&#039;&#039;&#039;, Host Name: &#039;&#039;&#039;nstsurv1&#039;&#039;&#039;, Gateway: &#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&lt;br /&gt;
 |managed&lt;br /&gt;
 |-&lt;br /&gt;
 |em2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |em3&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p2p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p2p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p4p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p4p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p6p1&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |p6p2&lt;br /&gt;
 |IPv4 Address: &#039;&#039;&#039;stealth&#039;&#039;&#039;&lt;br /&gt;
 |unmanaged&lt;br /&gt;
 |-&lt;br /&gt;
 |Domain Name Servers&lt;br /&gt;
 |&#039;&#039;&#039;10.221.1.10&#039;&#039;&#039;, &#039;&#039;&#039;10.221.1.11&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Domain Name&lt;br /&gt;
 |&#039;&#039;&#039;txycorp.com&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Virtual Host (ssl.conf)&lt;br /&gt;
 |&#039;&#039;&#039;*:443&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |Server Name (ssl.conf)&lt;br /&gt;
 |&#039;&#039;&#039;nstsurv1.txycorp.com:443&#039;&#039;&#039;&lt;br /&gt;
 |N/A&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
= &#039;&#039;&#039;Network Interface Configuration: nstnetcfg&#039;&#039;&#039; =&lt;br /&gt;
&lt;br /&gt;
The NST script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; will now be used for setting up networking on this server. This script will &#039;&#039;enable&#039;&#039; the &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service when setting up a static &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; (&#039;&#039;--mode ipv4&#039;&#039;).  The &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service will also be &#039;&#039;enabled&#039;&#039; at boot time.  Use the sequence of &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; invocations below to &#039;&#039;serve&#039;&#039; as an example for setting up networking on your particular server with NST. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The reader is encouraged to review the man page for  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; as reference material prior to its use. One can also use the &amp;quot;&#039;&#039;&#039;--verbose&#039;&#039;&#039;&amp;quot; output parameter for greater visibility on the progress of &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; during its configuration stages.&lt;br /&gt;
&lt;br /&gt;
[[Image:Warning.png‎]]  The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script should only be run on a &#039;&#039;&#039;Serial Console&#039;&#039;&#039; or a &#039;&#039;&#039;Desktop Terminal&#039;&#039;&#039; due to the fact that the &amp;quot;&#039;&#039;&#039;IPv4 Addressing&#039;&#039;&#039;&amp;quot; for this NST system will most likely change.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Initialize All Network Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;init&#039;&#039;&#039;&amp;quot; will put the networking setup posture in a known &#039;&#039;initialized&#039;&#039; state. The &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; service will be &#039;&#039;enabled&#039;&#039; all network adapters and assciated configuration files set to a default initialization state with no binding layer 3 addressing. The &amp;quot;&#039;&#039;&#039;LoopBack&#039;&#039;&#039;&amp;quot; interface device is never &#039;&#039;removed&#039;&#039; and &#039;&#039;reset&#039;&#039; to the factory default state with this mode. The &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Name_Service_Switch Name Service Switch]&#039;&#039;&#039; configuration file: &amp;quot;&#039;&#039;&#039;/etc/nsswitch.conf&#039;&#039;&#039;&amp;quot; will have its &#039;&#039;&#039;hosts&#039;&#039;&#039; entry set to: &amp;quot;&#039;&#039;&#039;files dns&#039;&#039;&#039;&amp;quot;. It is best practice to first use this mode &#039;&#039;prior&#039;&#039; to setting up networking so that any &#039;&#039;lingering&#039;&#039;  &amp;quot;&#039;&#039;&#039;NetworkManager&#039;&#039;&#039;&amp;quot; configuration files will &amp;lt;u&amp;gt;Not&amp;lt;/u&amp;gt; interfere with the use of the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; operation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode init;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Static IPv4 Configured Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The example NST server shown above uses a &amp;quot;&#039;&#039;&#039;Multi-Home&#039;&#039;&#039;&amp;quot; configuration with network interface devices: &amp;quot;&#039;&#039;&#039;em0&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot; set with static &#039;&#039;&#039;IPv4 Addresses:&#039;&#039;&#039; &#039;&#039;&#039;172.30.1.16&#039;&#039;&#039; and &#039;&#039;&#039;10.221.5.14&#039;&#039;&#039; respectively.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot; interface device is network attached to the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; Intranet. This network provides name services and external access to the Internet. The &amp;quot;&#039;&#039;&#039;Host Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Domain Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Name Servers&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;Gateway&#039;&#039;&#039;&amp;quot; values are set accordingly. A host name entry for &amp;quot;&#039;&#039;&#039;nstsurv1&#039;&#039;&#039;&amp;quot; will be added to the &#039;&#039;&#039;Hosts&#039;&#039;&#039; file: &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot;, the system host name will be set to: &amp;quot;&#039;&#039;&#039;nstsurv1&#039;&#039;&#039;&amp;quot;.  A &amp;quot;&#039;&#039;&#039;16&#039;&#039;&#039;&amp;quot; network routing prefix (&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing CIDR]&#039;&#039;&#039; - Format) will be used. The configuration for this interface is shown below.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ipv4 --interface em1 --ipv4-addr-prefix 10.221.5.14/16 --gateway 10.221.1.1 --host-name nstsurv1 --domain-name txycorp.com --name-servers &amp;quot;10.221.1.10,10.221.1.11&amp;quot;;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em0&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;em0&#039;&#039;&#039;&amp;quot; network interface is connected to the &amp;quot;&#039;&#039;&#039;Security Network&#039;&#039;&#039;&amp;quot; for performing network surveillance tasks using the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot; and the large collection of NST network security applications and tools. The &amp;quot;&#039;&#039;&#039;--hosts-file-only&#039;&#039;&#039;&amp;quot; setting is used so that only the &#039;&#039;&#039;Hosts&#039;&#039;&#039; file: &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot; will be updated with a host name entry for: &amp;quot;&#039;&#039;&#039;nstserv1-mon&#039;&#039;&#039;&amp;quot;. Note that there is &amp;lt;u&amp;gt;No&amp;lt;/u&amp;gt; &amp;quot;&#039;&#039;&#039;--gateway&#039;&#039;&#039;&amp;quot; parameter used with this interface because there is only one default gateway (i.e., &amp;quot;&#039;&#039;&#039;10.221.1.1&#039;&#039;&#039;&amp;quot;) for this &#039;&#039;&#039;Multi-Home&#039;&#039;&#039; example configuration.  It is not necessary to again set the system &amp;quot;&#039;&#039;&#039;Host Name&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;Domain Name&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;Name Servers&#039;&#039;&#039;&amp;quot; values since these were specified in the configuration for network interface &amp;quot;&#039;&#039;&#039;em1&#039;&#039;&#039;&amp;quot;.  A &amp;quot;&#039;&#039;&#039;24&#039;&#039;&#039;&amp;quot; network routing prefix (&#039;&#039;&#039;[http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing CIDR]&#039;&#039;&#039; - Format) will be used.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ipv4 --interface em0 --ipv4-addr-prefix 172.30.1.16/24 --host-name nstsurv1-mon --hosts-file-only;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;NetworkManager Ignore Certain Devices - Unmanaged&#039;&#039;&#039; ==&lt;br /&gt;
See this reference on how to configure NetworkManager to ignore certain devices: &amp;quot;&#039;&#039;&#039;[https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/configuring-networkmanager-to-ignore-certain-devices_configuring-and-managing-networking Configuring NetworkManager to ignore certain devices]&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Stealth Configured Interfaces&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; network interfaces (i.e., An interface in the &amp;quot;&#039;&#039;&#039;UP&#039;&#039;&#039;&amp;quot; state with &amp;lt;u&amp;gt;No&amp;lt;/u&amp;gt; binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;) will now be configured. These interfaces are strategically network attached throughout the network infrastructure for surveillance monitoring.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;em2&#039;&#039;&#039;&amp;quot; is used to monitor the Transmit Data: &amp;quot;&#039;&#039;&#039;TxD&#039;&#039;&#039;&amp;quot; port on a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4  Network TAP]&#039;&#039;&#039; (&#039;&#039;&#039;T&#039;&#039;&#039;est &#039;&#039;&#039;A&#039;&#039;&#039;ccess &#039;&#039;&#039;P&#039;&#039;&#039;oint) for all traffic &#039;&#039;leaving&#039;&#039; (egress) the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; corporation at the &#039;&#039;&#039;Firewall Dirty Side&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface em2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: em3&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;em3&#039;&#039;&#039;&amp;quot; is used to monitor the Receive Data: &amp;quot;&#039;&#039;&#039;RxD&#039;&#039;&#039;&amp;quot; port on a &#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4  Network TAP]&#039;&#039;&#039; for all traffic &#039;&#039;entering&#039;&#039; (ingress) the &amp;quot;&#039;&#039;&#039;TxyCorp&#039;&#039;&#039;&amp;quot; corporation at the &#039;&#039;&#039;Firewall Dirty Side&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface em3;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p2p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;p2p1&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Web Server&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; (&#039;&#039;&#039;S&#039;&#039;&#039;witched &#039;&#039;&#039;P&#039;&#039;&#039;ort &#039;&#039;&#039;A&#039;&#039;&#039;nalyzer) port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p2p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p2p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;&#039;&#039;&#039;p2p2&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Web Server&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p2p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p4p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This &#039;&#039;&#039;[https://en.wikipedia.org/wiki/10-gigabit_Ethernet 10 Gigabit Ethernet]&#039;&#039;&#039; network interface: &amp;quot;&#039;&#039;&#039;p4p1&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Business Transaction&#039;&#039;&#039;&amp;quot; data packets on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p4p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p4p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This  &#039;&#039;&#039;[https://en.wikipedia.org/wiki/10-gigabit_Ethernet 10 Gigabit Ethernet]&#039;&#039;&#039; network interface: &amp;quot;&#039;&#039;&#039;p4p2&#039;&#039;&#039;&amp;quot; is used to monitor specific &amp;quot;&#039;&#039;&#039;Business Transaction&#039;&#039;&#039;&amp;quot; data packets on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p4p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p6p1&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;p6p1&amp;quot; is used to monitor specific  &amp;quot;&#039;&#039;&#039;Remote Office&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p6p1;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Interface: p6p2&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
This network interface: &amp;quot;p6p2&amp;quot; is used to monitor specific  &amp;quot;&#039;&#039;&#039;Remote Office&#039;&#039;&#039;&amp;quot; traffic on a &#039;&#039;&#039;[http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml#backinfo SPAN]&#039;&#039;&#039; port.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode stealth --interface p6p2;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Stealth Interface Combo Setting Command&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
The output below is a compact way of using a &#039;&#039;&#039;[https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash]&#039;&#039;&#039; &amp;quot;&#039;&#039;for loop&#039;&#039; &amp;quot; statement to configure all &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; interfaces in one command line invocation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;for i in em2 em3 p2p1 p2p2 p4p1 p4p2 p6p1 p6p2; do nstnetcfg --mode stealth --interface ${i}; done&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Apache SSL Configuration For Proper HTTPS NST WUI Access&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
If the &amp;quot;&#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;&amp;quot; on an NST system is changed, the &#039;&#039;&#039;[http://httpd.apache.org/ Apache Web Server]&#039;&#039;&#039; &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Secure_Sockets_Layer SSL]&#039;&#039;&#039; configuration file: &amp;quot;&#039;&#039;&#039;/etc/httpd/conf.d/ssl.conf&#039;&#039;&#039;&amp;quot; needs to be modified for proper &#039;&#039;&#039;[http://en.wikipedia.org/wiki/HTTP_Secure HTTPS]&#039;&#039;&#039; &#039;&#039;access&#039;&#039; to the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot;. The following &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; command uses the &amp;quot;&#039;&#039;&#039;ssl&#039;&#039;&#039;&amp;quot; mode to allow all hosts &amp;quot;&#039;&#039;&#039;HTTPS&#039;&#039;&#039;&amp;quot; access to the &amp;quot;&#039;&#039;&#039;NST WUI&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;Server Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;nstsurv1.txycorp.com&#039;&#039;&#039;&amp;quot;. A new &amp;quot;&#039;&#039;&#039;SSL&#039;&#039;&#039;&amp;quot; certificate and key file will also be &#039;&#039;generated&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode ssl --interface em1 --virtual-host *:443 --server-name nstsurv1.txycorp.com:443;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Using A Bash Script With &amp;quot;nstnetcfg&amp;quot;&#039;&#039;&#039; ==&lt;br /&gt;
It may be better to use a &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Bash Bash]&#039;&#039;&#039; script given the numerous invocations of &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; with this &#039;&#039;&#039;NST&#039;&#039;&#039; network configuration setup. A good location to store your script would be in directory: &amp;quot;&#039;&#039;&#039;/etc/nst&#039;&#039;&#039;&amp;quot;. This will allow one to &#039;&#039;easily&#039;&#039; make changes to your network configuration by editing the script and running it. An example script below is shown for: &amp;quot;&#039;&#039;&#039;/etc/nst/net_cfg.sh&amp;quot;&#039;&#039;&#039; using the above invocations of &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;. One can copy and paste this script as a starter template file for your usage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre class=&amp;quot;programListing&amp;quot;&amp;gt;&lt;br /&gt;
#!/bin/bash&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Script: &amp;quot;net_cfg.sh&amp;quot;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Description: Helper script for setting up the configuration of network interfaces&lt;br /&gt;
#              on Server: &amp;quot;nstsurv1&amp;quot; using: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Short Usage: &amp;quot;nstnetcfg&amp;quot;&lt;br /&gt;
#&lt;br /&gt;
#   nstnetcfg [-m|--mode TEXT] [-i|--interface DEVICE]&lt;br /&gt;
#          [-a|--ipv4-addr-prefix IPv4ADDR/PREFIX] [-g|--gateway IPv4ADDR]&lt;br /&gt;
#          [--mac-addr MACADDR] [--host-name TEXT] [--domain-name TEXT]&lt;br /&gt;
#          [--name-servers IPv4ADDRLIST] [--hosts-file-only [true]|false]&lt;br /&gt;
#          [--virtual-host TEXT] [--server-name TEXT]&lt;br /&gt;
#          [-h|--help [true]|false] [-H|--help-long [true]|false]&lt;br /&gt;
#          [-v|--verbose [true]|false] [--version [true]|false]&lt;br /&gt;
#&lt;br /&gt;
#   Available Modes: ipv4, dhcp, ssl, stealth, netmgr, rmint, init, show&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Uncomment to enable verbosity &lt;br /&gt;
#VERBOSE=&amp;quot; --verbose&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: Initialization&lt;br /&gt;
/usr/bin/nstnetcfg --mode init${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em1&lt;br /&gt;
/usr/bin/nstnetcfg --mode ipv4 --interface em1 --ipv4-addr-prefix 10.221.5.14/16 --gateway 10.221.1.1 \&lt;br /&gt;
  --host-name nstsurv1 --domain-name txycorp.com --name-servers &amp;quot;10.221.1.10,10.221.1.11&amp;quot;${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em0&lt;br /&gt;
/usr/bin/nstnetcfg --mode ipv4 --interface em0 --ipv4-addr-prefix 172.30.1.16/24 --host-name nstsurv1-mon \&lt;br /&gt;
  --hosts-file-only${VERBOSE}; &lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface em2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: em3&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface em3${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p2p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p2p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p2p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p2p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p4p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p4p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p4p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p4p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p6p1&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p6p1${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Network Interface: p6p2&lt;br /&gt;
/usr/bin/nstnetcfg --mode stealth --interface p6p2${VERBOSE};&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Uncomment for using a Stealth Interface Combo Setting&lt;br /&gt;
#for i in em2 em3 p2p1 p2p2 p4p1 p4p2 p6p1 p6p2;&lt;br /&gt;
#  do /usr/sbin/nstnetcfg --mode stealth --interface ${i};&lt;br /&gt;
#done&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Apache SSL Configuration&lt;br /&gt;
/usr/bin/nstnetcfg --mode ssl --interface em1 --virtual-host *:443 --server-name nstsurv1.txycorp.com:443${VERBOSE};&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Script Invocation&#039;&#039;&#039; ===&lt;br /&gt;
&lt;br /&gt;
Make sure the script has it&#039;s &#039;&#039;&#039;execute&#039;&#039;&#039; permissions set:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;chmod +x &amp;quot;/etc/nst/net_cfg.sh&amp;quot;;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Execute the script:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/etc/nst/net_cfg.sh;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;List All Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can be used to list all available network interface devices on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
em0&lt;br /&gt;
em1&lt;br /&gt;
em2&lt;br /&gt;
em3&lt;br /&gt;
p2p1&lt;br /&gt;
p2p2&lt;br /&gt;
p4p1&lt;br /&gt;
p4p2&lt;br /&gt;
p6p1&lt;br /&gt;
p6p2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All &#039;Virtual&#039; Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D --virtual;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All &#039;Physical&#039; Installed Network Interface Devices Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D --physical;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
em0&lt;br /&gt;
em1&lt;br /&gt;
em2&lt;br /&gt;
em3&lt;br /&gt;
p2p1&lt;br /&gt;
p2p2&lt;br /&gt;
p4p1&lt;br /&gt;
p4p2&lt;br /&gt;
p6p1&lt;br /&gt;
p6p2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Renaming A Network Interface Device&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 30&amp;lt;br /&amp;gt; SVN: 11210&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to rename a &#039;&#039;&#039;Network Interface Device&#039;&#039;&#039; thus providing a predictable Network Interface Name that is stable and available after each successive system reboot. In this section we will demonstrate how to &#039;&#039;rename&#039;&#039; a network interface device from: &amp;quot;&#039;&#039;&#039;eno16777984&#039;&#039;&#039;&amp;quot; to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot; using the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility.  This utility&#039;s &#039;&#039;&#039;rename&#039;&#039;&#039; mode generates a &#039;&#039;&#039;udev&#039;&#039;&#039; rules file that is used by &#039;&#039;&#039;[http://en.wikipedia.org/wiki/Systemd systemd/udev]&#039;&#039;&#039; at system boot time to automatically assign the predictable, stable network interface name for local Ethernet, WLAN and/or WWAN network interfaces.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The current Network Interface Devices available are shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
eno16777984&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The current IP Address configuration:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno16777984: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 00:0c:29:e2:38:0b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.120/24 brd 10.222.222.255 scope global dynamic net0&lt;br /&gt;
       valid_lft 75211sec preferred_lft 75211sec&lt;br /&gt;
    inet6 fe80::20c:29ff:fee2:380b/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility will now be used to &#039;&#039;rename&#039;&#039; the network interface device from: &amp;quot;&#039;&#039;&#039;eno16777984&#039;&#039;&#039;&amp;quot; to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot;. Notice the creation and content of the generated custom &#039;&#039;&#039;udev&#039;&#039;&#039; network rules file: &amp;quot;&#039;&#039;&#039;/etc/udev/rules.d/79-my-net-name-slot.rules&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  The &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script should only be run on a &#039;&#039;&#039;Serial Console&#039;&#039;&#039; or a &#039;&#039;&#039;Desktop Terminal&#039;&#039;&#039; when changing the name of the &#039;&#039;&#039;Primary&#039;&#039;&#039; Network Interface Device. Otherwise, network connectivity may be lost if remotely connected to this NST system while performing this task.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  Try to use simple network device names (e.g. &#039;&#039;&#039;net0&#039;&#039;&#039;, &#039;&#039;&#039;netfw&#039;&#039;&#039;, &#039;&#039;&#039;Net_DMZ&#039;&#039;&#039; or &#039;&#039;&#039;NetRt1&#039;&#039;&#039;). Avoid using &#039;&#039;&#039;hyphen&#039;&#039;&#039; (&#039;&#039;&#039;&#039;-&#039;&#039;&#039;&#039;) or &#039;&#039;&#039;space&#039;&#039;&#039; (&#039;&amp;amp;nbsp;&#039;) characters in the new network interface device name. Instead, use the &#039;&#039;&#039;underscore&#039;&#039;&#039; (&#039;&#039;&#039;&#039;_&#039;&#039;&#039;&#039;) character or &#039;&#039;&#039;CamelCase&#039;&#039;&#039; for separation clarity in your device naming convention.&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Warning.png‎]]  By default the NetworkManager service will randomize Wifi MAC Addresses. If this occurs using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; to rename a Wifi Network Interface will fail. One can disable this Network Manager feature using the following configuration directive. Create a file in directory: &amp;quot;&#039;&#039;&#039;/etc/NetworkManager/conf.d&#039;&#039;&#039;&amp;quot; containing the configuration &amp;quot;&#039;&#039;&#039;wifi.scan-rand-mac-address=no&#039;&#039;&#039;&amp;quot; directive. Below is an example file to &#039;&#039;disable&#039;&#039; Wifi MAC Address randomizing by the NetworkManager service:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@E6440 ~]# &amp;lt;/span&amp;gt;cat /etc/NetworkManager/conf.d/wifi-static-mac.conf&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
[device]&lt;br /&gt;
wifi.scan-rand-mac-address=no&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@E6440 ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode rename --rename net0 --interface eno16777984 --verbose;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Generating a new/updated custom &#039;udev&#039; network rules file: &amp;quot;/etc/udev/rules.d/79-my-net-name-slot.rules&amp;quot;:&lt;br /&gt;
ACTION==&amp;quot;add&amp;quot;, SUBSYSTEM==&amp;quot;net&amp;quot;, ATTR{address}==&amp;quot;00:0c:29:e2:38:0b&amp;quot;, NAME=&amp;quot;net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Renaming Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-eno16777984&amp;quot; to &amp;quot;/etc/sysconfig/network-scripts/ifcfg-net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Labeling Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-net0&amp;quot; - NAME=&amp;quot;net0&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The Network Interface Device rename from: &amp;quot;eno16777984&amp;quot; to &amp;quot;net0&amp;quot; will take effect on the next system reboot.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now perform a system reboot:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl reboot;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After a system &#039;&#039;&#039;Reboot&#039;&#039;&#039;, the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; utility is now run to verify the &#039;&#039;generated&#039;&#039; &#039;&#039;&#039;udev&#039;&#039;&#039; rules file: &amp;quot;&#039;&#039;&#039;/etc/udev/rules.d/79-my-net-name-slot.rules&#039;&#039;&#039;&amp;quot; which internally uses the &#039;&#039;&#039;[http://linux.die.net/man/8/udevadm udevadm]&#039;&#039;&#039; tool.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode testudev --interface net0 --verbose;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
/bin/udevadm test &amp;quot;/sys/class/net/net0&amp;quot;;&lt;br /&gt;
calling: test&lt;br /&gt;
version 208&lt;br /&gt;
This program is for debugging only, it does not run any program&lt;br /&gt;
specified by a RUN key. It may show incorrect results, because&lt;br /&gt;
some values may be different, or not available at a simulation run.&lt;br /&gt;
&lt;br /&gt;
=== trie on-disk ===&lt;br /&gt;
tool version:          208&lt;br /&gt;
file size:         5882628 bytes&lt;br /&gt;
header size             80 bytes&lt;br /&gt;
strings            1299372 bytes&lt;br /&gt;
nodes              4583176 bytes&lt;br /&gt;
load module index&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/10-dm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/11-dm-lvm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/13-dm-disk.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/40-libgphoto2.rules&lt;br /&gt;
IMPORT found builtin &#039;usb_id --export %%p&#039;, replacing /usr/lib/udev/rules.d/40-libgphoto2.rules:11&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/40-usb_modeswitch.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/42-usb-hid-pm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/50-udev-default.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/56-hpmud.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-cdrom_id.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-drm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-ffado.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-fprint-autosuspend.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-keyboard.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-net.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-pcmcia.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-alsa.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-input.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-serial.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-storage-tape.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-storage.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-persistent-v4l.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/60-raw.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/61-accelerometer.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/62-multipath.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/63-md-raid-arrays.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/64-btrfs.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/64-md-raid-assembly.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/65-libwacom.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/65-md-incremental.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-cd-sensors.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-dm-lvm-metad.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-libmtp.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-pilot-link.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/69-xorg-vmmouse.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-power-switch.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-printers.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-spice-vdagentd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-touchpad-quirks.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-uaccess.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/70-wacom.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/71-biosdevname.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/71-seat.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/73-seat-late.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-net-description.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-probe_mtd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/75-tty-description.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-ericsson-mbm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-huawei-net-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-longcheer-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-nokia-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-pcmcia-device-blacklist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-platform-serial-whitelist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-simtech-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-telit-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-usb-device-blacklist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-usb-serial-adapters-greylist.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-x22x-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-mm-zte-port-types.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/77-nm-olpc-mesh.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/78-sound-card.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/79-my-net-name-slot.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-drivers.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-mm-candidate.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-net-name-slot.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-udisks.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/80-udisks2.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/85-regulatory.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/85-usbmuxd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-alsa-restore.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-alsa-tools-firmware.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/90-pulseaudio.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/91-drm-modeset.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-cd-devices.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-dm-notify.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-udev-late.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-dell.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-fujitsu.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-gateway.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-ibm.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-lenovo.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-battery-recall-toshiba.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-csr.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-hid.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/95-upower-wup.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/98-kexec.rules&lt;br /&gt;
read rules file: /etc/udev/rules.d/99-gpsd.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/99-qemu-guest-agent.rules&lt;br /&gt;
read rules file: /usr/lib/udev/rules.d/99-systemd.rules&lt;br /&gt;
rules contain 393216 bytes tokens (32768 * 12 bytes), 32346 bytes strings&lt;br /&gt;
29283 strings (243715 bytes), 26259 de-duplicated (214394 bytes), 3025 trie nodes used&lt;br /&gt;
PROGRAM &#039;/lib/udev/rename_device&#039; /usr/lib/udev/rules.d/60-net.rules:1&lt;br /&gt;
starting &#039;/lib/udev/rename_device&#039;&lt;br /&gt;
&#039;/lib/udev/rename_device&#039; [2075] exit with return code 0&lt;br /&gt;
PROGRAM &#039;/sbin/biosdevname --policy physical -i net0&#039; /usr/lib/udev/rules.d/71-biosdevname.rules:22&lt;br /&gt;
starting &#039;/sbin/biosdevname --policy physical -i net0&#039;&lt;br /&gt;
&#039;/sbin/biosdevname --policy physical -i net0&#039; [2076] exit with return code 4&lt;br /&gt;
IMPORT builtin &#039;net_id&#039; /usr/lib/udev/rules.d/75-net-description.rules:6&lt;br /&gt;
IMPORT builtin &#039;hwdb&#039; /usr/lib/udev/rules.d/75-net-description.rules:12&lt;br /&gt;
NAME &#039;net0&#039; /etc/udev/rules.d/79-my-net-name-slot.rules:1&lt;br /&gt;
RUN &#039;/usr/lib/systemd/systemd-sysctl --prefix=/proc/sys/net/ipv4/conf/$name --prefix=/proc/sys/net/ipv4/neigh/$name --prefix=/proc/sys/net/ipv6/conf/$name --prefix=/proc/sys/net/ipv6/neigh/$name&#039; /usr/lib/udev/rules.d/99-systemd.rules:52&lt;br /&gt;
ACTION=add&lt;br /&gt;
DEVPATH=/devices/pci0000:00/0000:00:15.0/0000:03:00.0/net/net0&lt;br /&gt;
ID_BUS=pci&lt;br /&gt;
ID_MM_CANDIDATE=1&lt;br /&gt;
ID_MODEL_FROM_DATABASE=VMXNET3 Ethernet Controller&lt;br /&gt;
ID_MODEL_ID=0x07b0&lt;br /&gt;
ID_NET_LABEL_ONBOARD=enEthernet0&lt;br /&gt;
ID_NET_NAME_MAC=enx000c29e2380b&lt;br /&gt;
ID_NET_NAME_ONBOARD=eno16777984&lt;br /&gt;
ID_NET_NAME_PATH=enp3s0&lt;br /&gt;
ID_NET_NAME_SLOT=ens160&lt;br /&gt;
ID_OUI_FROM_DATABASE=VMware, Inc.&lt;br /&gt;
ID_PCI_CLASS_FROM_DATABASE=Network controller&lt;br /&gt;
ID_PCI_SUBCLASS_FROM_DATABASE=Ethernet controller&lt;br /&gt;
ID_VENDOR_FROM_DATABASE=VMware&lt;br /&gt;
ID_VENDOR_ID=0x15ad&lt;br /&gt;
IFINDEX=2&lt;br /&gt;
INTERFACE=net0&lt;br /&gt;
SUBSYSTEM=net&lt;br /&gt;
SYSTEMD_ALIAS=/sys/subsystem/net/devices/net0&lt;br /&gt;
TAGS=:systemd:&lt;br /&gt;
USEC_INITIALIZED=78468&lt;br /&gt;
run: &#039;/usr/lib/systemd/systemd-sysctl --prefix=/proc/sys/net/ipv4/conf/net0 --prefix=/proc/sys/net/ipv4/neigh/net0 --prefix=/proc/sys/net/ipv6/conf/net0 --prefix=/proc/sys/net/ipv6/neigh/net0&#039;&lt;br /&gt;
unload module index&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One can see that the Network Interface device has been changed to: &amp;quot;&#039;&#039;&#039;net0&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
net0&lt;br /&gt;
lo&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The IP Address configuration after the device rename is shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: net0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 00:0c:29:e2:38:0b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.120/24 brd 10.222.222.255 scope global dynamic net0&lt;br /&gt;
       valid_lft 75211sec preferred_lft 75211sec&lt;br /&gt;
    inet6 fe80::20c:29ff:fee2:380b/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing IPv4 Secondary Addressing&#039;&#039;&#039; ==&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 30&amp;lt;br /&amp;gt; SVN: 11210&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to &#039;&#039;Create&#039;&#039; and &#039;&#039;Delete&#039;&#039; (i.e., &#039;&#039;Manage&#039;&#039;) &#039;&#039;&#039;IPv4 Secondary Addressing&#039;&#039;&#039;. By example we will &#039;&#039;Add&#039;&#039;, &#039;&#039;Display&#039;&#039; and &#039;&#039;Remove&#039;&#039; &#039;&#039;&#039;IPv4 Secondary Addresses:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039; and &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system (e.g., &#039;&#039;&#039;striker&#039;&#039;&#039;) on &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot;.  This example is shown in the sections below.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
=== &#039;&#039;&#039;Adding IPv4 Secondary Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;add&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039;&amp;quot; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state on &#039;&#039;&#039;NST&#039;&#039;&#039; system: &amp;quot;&#039;&#039;&#039;striker&#039;&#039;&#039;&amp;quot; is shown:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.111/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Secondary Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;add&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.241/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;bound&#039; IPv4 secondary Address: &amp;quot;10.222.222.241/24&amp;quot;&lt;br /&gt;
to Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the second &#039;&#039;&#039;IPv4 Secondary Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;add&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.242/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;bound&#039; IPv4 secondary Address: &amp;quot;10.222.222.242/24&amp;quot;&lt;br /&gt;
to Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is now shown with the two (2) &#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039; added:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip a;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.111/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List IPv4 Primary / Secondary Addresses Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can also be used to display all &#039;&#039;&#039;IPv4 Addresses&#039;&#039;&#039; including &#039;&#039;&#039;IP Secondary Addresses&#039;&#039;&#039; bound to &#039;&#039;&#039;Network Interface: &amp;quot;lan0&amp;quot;&#039;&#039;&#039; in CIDR notation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;getipaddr --interface lan0 --ip-secondary --ip-address-cidr --net-int-devices;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lan0 10.222.222.111/24&lt;br /&gt;
lan0 10.222.222.241/24 secondary&lt;br /&gt;
lan0 10.222.222.242/24 secondary&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Removing IPv4 Secondary Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;remove&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039;&amp;quot; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, we remove all &#039;&#039;&#039;IPv4 Secondary Addresses&#039;&#039;&#039; bound to Network Interface: &amp;quot;&#039;&#039;&#039;lan0&#039;&#039;&#039;&amp;quot;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.241/24 --secondary remove -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;remove&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.241/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;unbound&#039; the IPv4 secondary Address: &amp;quot;10.222.222.241/24&amp;quot;&lt;br /&gt;
associated with Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;nstnetcfg -m secondary -i lan0 -a 10.222.222.242/24 --secondary remove -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using IPv4 secondary Address binding operation mode: &amp;quot;remove&amp;quot; with&lt;br /&gt;
Network Interface device: &amp;quot;lan0&amp;quot; for IPv4 Address: &amp;quot;10.222.222.242/24&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;connect&#039; device: &amp;quot;lan0&amp;quot; using nmcli.&lt;br /&gt;
Device &#039;lan0&#039; successfully activated with &#039;ed61d84c-2f87-4cba-bb2a-42bbd7c7b998&#039;.&lt;br /&gt;
&lt;br /&gt;
Successfully &#039;unbound&#039; the IPv4 secondary Address: &amp;quot;10.222.222.242/24&amp;quot;&lt;br /&gt;
associated with Network Interface device: &amp;quot;lan0&amp;quot;.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally we display the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state on NST system: &#039;&#039;&#039;striker&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;ip a;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000&lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: lan0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc fq_codel state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global noprefixroute lan0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::94cd:ea04:55fe:ee9a/64 scope link noprefixroute &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: netmon0: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: netmon1: &amp;lt;BROADCAST,MULTICAST&amp;gt; mtu 1500 qdisc noop state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@striker ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing IPv4 Alias Addresses&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;[[Image:Warning.png‎]]  &#039;&#039;&#039;IPv4 Alias Addressing&#039;&#039;&#039; is no longer supported by script: &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; start with &#039;&#039;&#039;NST 30&#039;&#039;&#039;.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5663&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; can also be used to &#039;&#039;Create&#039;&#039; and &#039;&#039;Delete&#039;&#039; (i.e., &#039;&#039;Manage&#039;&#039;) &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;. By example we will &#039;&#039;Add&#039;&#039; and &#039;&#039;Remove&#039;&#039; &#039;&#039;&#039;IPv4 Alias Addresses:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039; and &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system on &#039;&#039;&#039;IPv4 Alias Network Interfaces:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; respectively.  This example is shown in the sections below. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; You can not manage IPv4 aliases for interfaces which are under NetworkManager control (the interface must be managed by the network service). In addition, you may need to review/update your routing after adding your aliases.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Adding IPv4 Alias Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;add&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;&amp;quot; to an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; using the &#039;&#039;&#039;Gateway:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.1&#039;&#039;&#039;&amp;quot; and &#039;&#039;&#039;Host Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;probe-a1&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m ipv4 -i p5p1:a1 -a 10.222.222.241/24 -g 10.222.222.1 --host-name probe-a1 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&amp;quot; for IPv4 Alias Network Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the second &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; using the &#039;&#039;&#039;Gateway:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.1&#039;&#039;&#039;&amp;quot; and &#039;&#039;&#039;Host Name:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;probe-a2&#039;&#039;&#039;&amp;quot; is now &#039;&#039;added&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m ipv4 -i p5p1:a2 -a 10.222.222.242/24 -g 10.222.222.1 --host-name probe-a2 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&amp;quot; for IPv4 Alias Network Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is now shown with the two (2) &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; added:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary p5p1:a1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary p5p1:a2&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; wil also be configured in the hosts file &amp;quot;&#039;&#039;&#039;/etc/hosts&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;cat /etc/hosts;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
127.0.0.1	localhost.localdomain localhost&lt;br /&gt;
::1		localhost6.localdomain6 localhost6&lt;br /&gt;
&lt;br /&gt;
10.222.222.10    striker.nst.net striker&lt;br /&gt;
10.222.222.141   probe-a1&lt;br /&gt;
10.222.222.142   probe-a2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; A network configuration file in directory: &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts&#039;&#039;&#039;&amp;quot; was created for both &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; above (i.e., &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&#039;&#039;&#039;&amp;quot;). This will allow the &#039;&#039;&#039;IPv4 Alias Address&#039;&#039;&#039; configuration to survive a system reboot. &amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;List All Installed Network Interface Devices Including IP Alias Interfaces Using: &amp;quot;getipaddr&amp;quot;&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; can also be used to list all available network interface devices including &#039;&#039;&#039;IP Alias Network Interfaces&#039;&#039;&#039; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -D --ip-alias;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
p1p1&lt;br /&gt;
p1p2&lt;br /&gt;
p5p1&lt;br /&gt;
p5p1:a1&lt;br /&gt;
p5p1:a2&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Display all &#039;&#039;&#039;IPv4 Addresses&#039;&#039;&#039; including &#039;&#039;&#039;IP Alias Addresses&#039;&#039;&#039; bound to &#039;&#039;&#039;Network Interface: &amp;quot;p5p1&amp;quot;&#039;&#039;&#039; in CIDR notation:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -i p5p1 -D --ip-alias --ip-network-address-cidr;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
p5p1 10.222.222.10/24&lt;br /&gt;
p5p1:a1 10.222.222.241/24&lt;br /&gt;
p5p1:a2 10.222.222.242/24&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Removing IPv4 Alias Addresses&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will show how the &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; script can be used to &#039;&#039;remove&#039;&#039; &amp;quot;&#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;&amp;quot; on an &#039;&#039;&#039;NST&#039;&#039;&#039; system.&lt;br /&gt;
&lt;br /&gt;
First, the current &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system with configured &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.241/24 brd 10.222.222.255 scope global secondary p5p1:a1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet 10.222.222.242/24 brd 10.222.222.255 scope global secondary p5p1:a2&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.241/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a1&#039;&#039;&#039;&amp;quot; is now &#039;&#039;removed&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg  -m rmint -i p5p1:a1 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a1&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Clean all IPv4 Address entries: &amp;quot;10.222.222.241&amp;quot; in Hosts file: &amp;quot;/etc/hosts&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds:&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Next, the first &#039;&#039;&#039;IPv4 Alias Address:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;10.222.222.242/24&#039;&#039;&#039;&amp;quot; bound to  &#039;&#039;&#039;IPv4 Alias Network Interface:&#039;&#039;&#039; &amp;quot;&#039;&#039;&#039;p5p1:a2&#039;&#039;&#039;&amp;quot; is now &#039;&#039;removed&#039;&#039; to the &#039;&#039;&#039;NST&#039;&#039;&#039; system:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg  -m rmint -i p5p1:a2 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p5p1&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p5p1:a2&amp;quot; for IPv4 Alias Interface: &amp;quot;p5p1:a2&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Clean all IPv4 Address entries: &amp;quot;10.222.222.242&amp;quot; in Hosts file: &amp;quot;/etc/hosts&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot; in 5 seconds:&lt;br /&gt;
Successfully brought &#039;Up&#039; Network Interface: &amp;quot;p5p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the &#039;&#039;&#039;IP Address&#039;&#039;&#039; state is shown on our demo &#039;&#039;&#039;NST&#039;&#039;&#039; system with all &#039;&#039;&#039;IPv4 Alias Addresses&#039;&#039;&#039; &#039;&#039;removed&#039;&#039;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: p5p1: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global p5p1&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
4: p1p2: &amp;lt;NO-CARRIER,BROADCAST,MULTICAST,UP&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; script:  &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/getipaddr.html getipaddr]&#039;&#039;&#039;&amp;quot; also shows that no &#039;&#039;&#039;IP Alias Network Interfaces&#039;&#039;&#039; are configured on the &#039;&#039;&#039;NST&#039;&#039;&#039; demo system. &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;getipaddr -D --ip-alias;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lo&lt;br /&gt;
p1p1&lt;br /&gt;
p1p2&lt;br /&gt;
p5p1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Promiscuous Mode Control&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 22&amp;lt;br /&amp;gt; SVN: 7000&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Overview&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; state of a network interface device can be &#039;&#039;manually&#039;&#039; controlled by the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script. Promiscuous mode allows a network interface device to intercept and read each network packet that arrives in its entirety which is essential for capturing all traffic received. One can also use the systemd service: &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; for &#039;&#039;automatically&#039;&#039; setting the Promiscuous state &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for one or more network interface devices at system boot. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; One may not be able to set the Promiscuous state &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; if another network application like &#039;&#039;&#039;[https://wiki.wireshark.org/ wireshark]&#039;&#039;&#039; or &#039;&#039;&#039;[https://en.wikipedia.org/wiki/Tcpdump tcpdump]&#039;&#039;&#039; is active and in capture mode. A counter is used by each &#039;&#039;&#039;Kernel&#039;&#039;&#039; network driver module and incremented for each application that requests the Promiscuous mode to be set &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for the network interface device. Until these applications have all set the Promiscuous state &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039;, can one control the device&#039;s Promiscuous mode with the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Manual Mode&#039;&#039;&#039; ===&lt;br /&gt;
This section will demonstrate how to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode for a network interface using either the interface method or the promiscuous configuration file method. &lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Interface Method&#039;&#039;&#039; ====&lt;br /&gt;
The current &#039;&#039;&#039;Network Interface Devices&#039;&#039;&#039; available are shown for demonstration in this section.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/getipaddr -D;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
lan0&lt;br /&gt;
lo&lt;br /&gt;
netmon0&lt;br /&gt;
netmon1&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
How to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode of network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; state:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode promiscon -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;On&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;On&#039;:&lt;br /&gt;
/sbin/ip link set promisc on netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
How to to use the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; script to &#039;&#039;manually&#039;&#039; set the  &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode of network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; state:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg --mode promiscoff -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;Off&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;Off&#039;:&lt;br /&gt;
/sbin/ip link set promisc off netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Promiscuous Configuration File Method&#039;&#039;&#039; ====&lt;br /&gt;
Alternatively, one could add the network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; to the &#039;&#039;&#039;NST&#039;&#039;&#039; promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot; using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; mode: &amp;quot;&#039;&#039;&#039;promisccfg&#039;&#039;&#039;&amp;quot; and then control the &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; state using the following command sequence:&lt;br /&gt;
&lt;br /&gt;
First configure the network Interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; in the &#039;&#039;&#039;NST&#039;&#039;&#039; promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promisccfg --promisc add -i netmon0 -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using Promiscuous configuration operation mode: &amp;quot;add&amp;quot; for Network Interface device: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Adding Network Interface device: &amp;quot;netmon0&amp;quot; to the Promiscuous configuration file.&lt;br /&gt;
&lt;br /&gt;
Updated Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Content of Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
==================================================================&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
#&lt;br /&gt;
# Configuration file for a list Network Interface Adapters&lt;br /&gt;
# that can have their promiscuous mode enabled or disabled&lt;br /&gt;
# by the NST Script: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
#&lt;br /&gt;
# Typically the NST script: &amp;quot;nstnetcfg&amp;quot; modes:&lt;br /&gt;
# &#039;promiscon, promiscoff or promisccfg&#039; use or configure this file.&lt;br /&gt;
# Use a space character as the delimiter when multiple interfaces&lt;br /&gt;
# are specificied.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Example for Network Interface Adapters: netmon0 and netmon1&lt;br /&gt;
# PROMISCINTS=&amp;quot;netmon1 netmon2&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
PROMISCINTS=&amp;quot;netmon0&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setting Promiscuous mode &#039;&#039;&#039;&#039;On&#039;&#039;&#039;&#039; for network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; using the promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promiscon -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Found Network Interface(s): &amp;quot;netmon0&amp;quot; in promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;On&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;On&#039;:&lt;br /&gt;
/sbin/ip link set promisc on netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Setting Promiscuous mode &#039;&#039;&#039;&#039;Off&#039;&#039;&#039;&#039; for network interface: &amp;quot;&#039;&#039;&#039;netmon0&#039;&#039;&#039;&amp;quot; using the promiscuous configuration file: &amp;quot;&#039;&#039;&#039;/etc/nst/promisc.conf&#039;&#039;&#039;&amp;quot;&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;nstnetcfg -m promiscoff -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Found Network Interface(s): &amp;quot;netmon0&amp;quot; in promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Setting the Promiscuous state &#039;Off&#039; for Network Interface: &amp;quot;netmon0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
First make sure the Network Interface: &amp;quot;netmon0&amp;quot; is up:&lt;br /&gt;
/sbin/ip link set up netmon0;&lt;br /&gt;
&lt;br /&gt;
Next set the Promiscuous state: &#039;Off&#039;:&lt;br /&gt;
/sbin/ip link set promisc off netmon0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Automatic At System Boot&#039;&#039;&#039; ===&lt;br /&gt;
The &#039;&#039;&#039;NST&#039;&#039;&#039; systemd &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; service can be used to &#039;&#039;enable&#039;&#039; the &#039;&#039;&#039;Promiscuous&#039;&#039;&#039; mode on one or more network interface adapters during a system boot. The content of this service unit is shown below:&lt;br /&gt;
&amp;lt;pre class=&amp;quot;programListing&amp;quot; style=&amp;quot; word-break: break-word;&amp;quot;&amp;gt;&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
&lt;br /&gt;
[Unit]&lt;br /&gt;
Description=Network Interface Promiscuous Mode Control&lt;br /&gt;
Documentation=man:nstnetcfg(1)&lt;br /&gt;
Documentation=http://wiki.networksecuritytoolkit.org/nstwiki/index.php/HowTo_Setup_A_Server_With_Multiple_Network_Interface_Adapters_Using:_%22nstnetcfg%22#Promiscuous_Mode_Control&lt;br /&gt;
Wants=network-online.target&lt;br /&gt;
After=network-online.target&lt;br /&gt;
&lt;br /&gt;
[Service]&lt;br /&gt;
Type=oneshot&lt;br /&gt;
RemainAfterExit=yes&lt;br /&gt;
ExecStart=/usr/bin/nstnetcfg --mode promiscon&lt;br /&gt;
ExecStop=/usr/bin/nstnetcfg --mode promiscoff&lt;br /&gt;
&lt;br /&gt;
[Install]&lt;br /&gt;
WantedBy=multi-user.target&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
One can see the use of the &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; script for &#039;&#039;starting&#039;&#039; and &#039;&#039;stopping&#039;&#039; the service. Make sure you use mode: &amp;quot;&#039;&#039;&#039;--mode promisccfg&#039;&#039;&#039;&amp;quot; with the corresponding network interface that you are interested in &#039;&#039;enabling&#039;&#039; the promiscuous mode at system boot time. Then enable the &amp;quot;&#039;&#039;&#039;promisc.service&#039;&#039;&#039;&amp;quot; service. Below is an example for network interface device: &amp;quot;&#039;&#039;&#039;netmon1&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg -m promisccfg -i netmon1 --promisc add -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Using Promiscuous configuration operation mode: &amp;quot;add&amp;quot; for Network Interface device: &amp;quot;netmon1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Adding Network Interface device: &amp;quot;netmon1&amp;quot; to the Promiscuous configuration file.&lt;br /&gt;
&lt;br /&gt;
Updated Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Content of Promiscuous configuration file: &amp;quot;/etc/nst/promisc.conf&amp;quot;&lt;br /&gt;
==================================================================&lt;br /&gt;
#&lt;br /&gt;
# NST: 2015&lt;br /&gt;
#&lt;br /&gt;
# Configuration file for a list Network Interface Adapters&lt;br /&gt;
# that can have their promiscuous mode enabled or disabled&lt;br /&gt;
# by the NST Script: &amp;quot;nstnetcfg&amp;quot;.&lt;br /&gt;
#&lt;br /&gt;
# Typically the NST script: &amp;quot;nstnetcfg&amp;quot; modes:&lt;br /&gt;
# &#039;promiscon, promiscoff or promisccfg&#039; use or configure this file.&lt;br /&gt;
# Use a space character as the delimiter when multiple interfaces&lt;br /&gt;
# are specificied.&lt;br /&gt;
&lt;br /&gt;
#&lt;br /&gt;
# Example for Network Interface Adapters: netmon0 and netmon1&lt;br /&gt;
# PROMISCINTS=&amp;quot;netmon1 netmon2&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
PROMISCINTS=&amp;quot;netmon1&amp;quot;;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl enable promisc.service;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
Created symlink from /etc/systemd/system/multi-user.target.wants/promisc.service to /usr/lib/systemd/system/promisc.service.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/systemctl reboot;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Managing a &#039;Bonding&#039; Network Interface&#039;&#039;&#039; ==&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5765&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]In this section we will use &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; to &#039;&#039;create&#039;&#039; a &#039;&#039;&#039;&#039;Bond Master&#039;&#039;&#039;&#039; Network Interface device: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; by aggregating 2 (two) &#039;&#039;&#039;NIC&#039;&#039;&#039; adapters&amp;quot; &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; into a single interface. Behind the scene, the Linux bonding driver is performing the actual mechanism for creating and managing the bond device.&lt;br /&gt;
A bond interface device may be useful when working with an &amp;quot;&#039;&#039;&#039;[http://www.networksecuritytoolkit.org/nstpro/order/dualcomm-singletap-nst-combo.html#usecase4 Non-Aggregational Network Tap]&#039;&#039;&#039;&amp;quot;. By combining the non-aggregational ports of the TAP back into a single interface allows both &#039;&#039;&#039;Transmit&#039;&#039;&#039; and &#039;&#039;&#039;Receive&#039;&#039;&#039; network traffic to be seen by a listening network analysis or monitoring application. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The network diagram shown below will be used for the example bonding configuration demonstrated in this section. The &#039;&#039;&#039;NST WUI Ntopng IPv4 Hosts&#039;&#039;&#039; application is performing &#039;&#039;surveillance monitoring&#039;&#039; on the firewall dirty side using the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgbonding.png|1024px|center|A NST &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; Bonding Configuration with Monitoring]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;centerBlock&amp;quot;&amp;gt;&amp;lt;div class=&amp;quot;noteMessage&amp;quot;&amp;gt;&#039;&#039;&#039;Note:&#039;&#039;&#039; The network traffic monitored on the [http://www.dual-comm.com/etap3105-aggregation-and-non-aggregation-tap.htm Dualcomm ETAP 3105 10/100/1000Base-T  Regeneration Network TAP] Aggregational Port: &amp;quot;&#039;&#039;&#039;3&#039;&#039;&#039;&amp;quot; (NST Probe Port: &amp;quot;&#039;&#039;&#039;p5p1&#039;&#039;&#039;&amp;quot;) may be equal to or less than the traffic monitored on the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; that is created in this section. If the combined effective data rate on the &amp;quot;&#039;&#039;&#039;Slave&#039;&#039;&#039;&amp;quot; Network Interfaces: &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; exceeds &#039;&#039;1Gb/sec&#039;&#039;, then Aggregational Port: &amp;quot;&#039;&#039;&#039;3&#039;&#039;&#039;&amp;quot; (NST Probe Port: &amp;quot;&#039;&#039;&#039;p5p1&#039;&#039;&#039;&amp;quot;) will start to buffer and eventually lose packets where as the Bonded Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; will not.&amp;lt;/div&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Network Interface Bond Creation&#039;&#039;&#039; ===&lt;br /&gt;
First lets show the current network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6b brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p5p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:22:17 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; NIC adapters connected to the non-aggregational Network TAP (Ports: &amp;quot;&#039;&#039;&#039;4&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;5&#039;&#039;&#039;&amp;quot; respectively) will now be bonded into a single interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;bonding&#039;&#039;&#039;&amp;quot;. The bond interface is now in &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; mode since it has no binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode bonding --interface bond0  --bonding-slave-ints p1p1,p1p2 --bonding-opts &amp;quot;mode=balance-rr,miimon=100&amp;quot; -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to configure &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Master&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility is now shown after the creation of the &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; device:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.222.222.10/24 brd 10.222.222.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p5p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:22:17 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
18: bond0: &amp;lt;BROADCAST,MULTICAST,MASTER,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP group default &lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link tentative dadfailed &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notice that the network interfaces: &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot; have the &amp;quot;&#039;&#039;&#039;SLAVE&#039;&#039;&#039;&amp;quot; flag set and the bond network interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; has the &amp;quot;&#039;&#039;&#039;MASTER&#039;&#039;&#039;&amp;quot; flag set. Network traffic can now be monitored or captured on this new Bonded Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Network Interface Bond Removal&#039;&#039;&#039; ===&lt;br /&gt;
In this section we will remove the bonding network interface: &amp;quot;&#039;&#039;&#039;bond&#039;&#039;&#039;&amp;quot; using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot; mode: &amp;quot;&#039;&#039;&#039;rmbonding&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode rmbonding --interface bond0  -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to remove &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Removing the &amp;quot;Linux Bonding Driver&amp;quot; module.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Master&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Slave&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;Initialize&#039; Network Interface: &amp;quot;p1p2&amp;quot; to a &#039;Unmanaged&#039; state.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot; for Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up an &#039;Unmanaged&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the &#039;Bonding Slave&#039; Network Interface configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to &#039;Initialize&#039; Network Interface: &amp;quot;p1p1&amp;quot; to a &#039;Unmanaged&#039; state.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Slave Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Removing the previous Network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot; for Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up an &#039;Unmanaged&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Binding an IPv4 Address to a  &#039;Bonding&#039; Network Interface&#039;&#039;&#039; ===&lt;br /&gt;
[[File:Thunderbolt.png|frame|left|&#039;&#039;&#039;[[Feature Release Symbol | &amp;lt;center&amp;gt;NST 20&amp;lt;br /&amp;gt; SVN: 5765&amp;lt;/center&amp;gt;]]&#039;&#039;&#039;]]In this section we will use &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; to bind an &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; to a &#039;&#039;&#039;Bonded&#039;&#039;&#039; Network Interface. This method can also use one of the available Linux bonding driver modes to increase the &#039;&#039;effective&#039;&#039; bandwidth  from the NST system to the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
The network diagram shown below will be used for the example &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039; binding to the &#039;Bonded&#039; Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.  A Quad Gigabit NIC Adapter with ports:  &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p3&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p4&#039;&#039;&#039;&amp;quot; will be bound together to form a new &#039;Bonding Master&#039; Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
[[Image:Nstnetcfgipv4bonding.png|1024px|center| Binding an IPv4 Address to a &#039;Bonded&#039; Network Interface Using &amp;quot;&#039;&#039;&#039;nstnetcfg&#039;&#039;&#039;&amp;quot;]]&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;Network Interface Bond Creation&#039;&#039;&#039; ====&lt;br /&gt;
First lets show the current network configuration using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; network utility:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,PROMISC,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.224.2.33/16 brd 10.224.255.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:52 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:53 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p1p3: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:54 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
6: p1p4: &amp;lt;BROADCAST,MULTICAST,PROMISC&amp;gt; mtu 1500 qdisc mq state DOWN group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:55 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;&#039;&#039;&#039;p1p1&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p2&#039;&#039;&#039;&amp;quot;, &amp;quot;&#039;&#039;&#039;p1p3&#039;&#039;&#039;&amp;quot; and &amp;quot;&#039;&#039;&#039;p1p4&#039;&#039;&#039;&amp;quot; NIC LAN ports are now &#039;&#039;bonded&#039;&#039; into a single interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot; using &#039;&#039;&#039;nstnetcfg&#039;&#039;&#039; mode: &amp;quot;&#039;&#039;&#039;bonding&#039;&#039;&#039;&amp;quot;. The bond interface is now currently in &amp;quot;&#039;&#039;&#039;Stealth&#039;&#039;&#039;&amp;quot; mode with no binding &#039;&#039;&#039;IPv4 Address&#039;&#039;&#039;.&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode bonding --interface bond0  --bonding-slave-ints p1p1,p1p2,p1p3,p1p4 --bonding-opts &amp;quot;mode=balance-tlb,miimon=100&amp;quot; -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Attempting to configure &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Stopping the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p1&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p1&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p2&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p2&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p3&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p3&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Slave&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-p1p4&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;p1p4&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up a &#039;Bonding Master&#039; network configuration file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot;&lt;br /&gt;
for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Starting up the &amp;quot;network&amp;quot; service.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Linux bonding driver is configured for mode: &#039;&#039;&#039;Adaptive Transmit Load Balancing&#039;&#039;&#039;. This mode creates a channel bond that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each &amp;quot;&#039;&#039;&#039;Slave&#039;&#039;&#039;&amp;quot; Interface. Incoming traffic is received by the current slave.  If the receiving slave fails, another slave takes over the &#039;&#039;&#039;MAC Address&#039;&#039;&#039; of the failed receiving slave.&lt;br /&gt;
&lt;br /&gt;
==== &#039;&#039;&#039;IPv4 Address Binding to the Bond Interface&#039;&#039;&#039; ====&lt;br /&gt;
Next the &amp;quot;&#039;&#039;&#039;[http://nst.sourceforge.net/nst/docs/scripts/nstnetcfg.html nstnetcfg]&#039;&#039;&#039;&amp;quot; utility is now used to &#039;&#039;bind&#039;&#039; the IPv4 Address: &amp;quot;&#039;&#039;&#039;172.18.1.11&#039;&#039;&#039;&amp;quot; to the &#039;Bond Master&#039; Virtual network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;: &lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/bin/nstnetcfg --mode ipv4 --interface bond0 -a 172.18.1.11/24 -g 10.224.1.1 --hosts-file-only --host-name striker-bond -v;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
Configuring a static IPv4 Address: &amp;quot;172.18.1.11/24&amp;quot; for &#039;Bonding Master&#039; Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Down&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
Successfully brought &#039;Down&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Setting up the &#039;Static IPv4 Address&#039; network configuration&lt;br /&gt;
file: &amp;quot;/etc/sysconfig/network-scripts/ifcfg-bond0&amp;quot; for Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Updating the hosts file: &amp;quot;/etc/hosts&amp;quot; with the IPv4 Address &amp;amp; Host Name.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;network&amp;quot; service is already running, skip trying to &#039;start&#039;.&lt;br /&gt;
&lt;br /&gt;
Enabling the &amp;quot;network&amp;quot; service at system boot time.&lt;br /&gt;
&lt;br /&gt;
Attempting to bring &#039;Up&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot; in 5 seconds.&lt;br /&gt;
Successfully brought &#039;Up&#039; Bonding Master Network Interface: &amp;quot;bond0&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Finally, the network configuration is now shown using the &amp;quot;&#039;&#039;&#039;[http://www.policyrouting.org/iproute2.doc.html ip]&#039;&#039;&#039;&amp;quot; utility with IPv4 Address: &amp;quot;&#039;&#039;&#039;172.18.1.11&#039;&#039;&#039;&amp;quot; bound to the &#039;Bonding Master&#039; Virtual Network Interface: &amp;quot;&#039;&#039;&#039;bond0&#039;&#039;&#039;&amp;quot;:&lt;br /&gt;
&amp;lt;div class=&amp;quot;screen&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;/usr/sbin/ip addr show;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;pre class=&amp;quot;computerOutput&amp;quot;&amp;gt;&lt;br /&gt;
1: lo: &amp;lt;LOOPBACK,UP,LOWER_UP&amp;gt; mtu 65536 qdisc noqueue state UNKNOWN group default &lt;br /&gt;
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00&lt;br /&gt;
    inet 127.0.0.1/8 scope host lo&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 ::1/128 scope host &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
2: eno0: &amp;lt;BROADCAST,MULTICAST,UP,LOWER_UP&amp;gt; mtu 1500 qdisc pfifo_fast state UP group default qlen 1000&lt;br /&gt;
    link/ether 30:85:a9:44:7e:37 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 10.224.2.33/16 brd 10.222.255.255 scope global eno0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::3285:a9ff:fe44:7e37/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
3: p1p1: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state Up group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:52 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
4: p1p2: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:53 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
5: p1p3: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state Up group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:54 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
6: p1p4: &amp;lt;BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP&amp;gt; mtu 1500 qdisc mq master bond0 state UP group default qlen 1000&lt;br /&gt;
    link/ether a0:36:9f:00:71:55 brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
12: bond0: &amp;lt;BROADCAST,MULTICAST,MASTER,UP,LOWER_UP&amp;gt; mtu 1500 qdisc noqueue state UP group default &lt;br /&gt;
    link/ether a0:36:9f:00:69:6a brd ff:ff:ff:ff:ff:ff&lt;br /&gt;
    inet 172.18.1.11/24 brd 172.18.1.255 scope global bond0&lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
    inet6 fe80::a236:9fff:fe00:696a/64 scope link &lt;br /&gt;
       valid_lft forever preferred_lft forever&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;userInput&amp;quot;&amp;gt;&amp;lt;span class=&amp;quot;prompt&amp;quot;&amp;gt;[root@probe ~]# &amp;lt;/span&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Hot Plug In an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro&#039;&#039;&#039; ==&lt;br /&gt;
If you hot plug in an Apple Thunderbolt Gigabit Ethernet Adapter it needs to be registered as an authorized device using the &#039;&#039;&#039;boltctl&#039;&#039;&#039; utility. &#039;&#039;&#039;boltctl&#039;&#039;&#039; is part of the bolt RPM package. If you reboot the system with the adapter plugged in, one does not have to register the device. This is handled during the system boot process.&lt;br /&gt;
&lt;br /&gt;
The following is an example of hot plugging in an Apple Thunderbolt Gigabit Ethernet Adapter on a MacBook Pro for immediate use without rebooting:&lt;br /&gt;
&lt;br /&gt;
* Install the bolt package:&lt;br /&gt;
 [root@nst42-mbp ~]# dnf install bolt;&lt;br /&gt;
&lt;br /&gt;
* Plug in the adapter and list all connected devices: &lt;br /&gt;
 [root@nst42-mbp ~]# boltctl list;&lt;br /&gt;
 ● Apple Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ type:          peripheral&lt;br /&gt;
   ├─ name:          Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ vendor:        Apple, Inc.&lt;br /&gt;
   ├─ uuid:          903d9407-0200-0100-ffff-ffffffffffff&lt;br /&gt;
   ├─ generation:    Thunderbolt 1&lt;br /&gt;
   ├─ status:        connected&lt;br /&gt;
   │  ├─ domain:     e0eec615-0a00-0100-ffff-ffffffffffff&lt;br /&gt;
   │  ├─ rx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  ├─ tx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  └─ authflags:  none&lt;br /&gt;
   ├─ connected:     Mon 09 Mar 2026 02:46:57 PM UTC&lt;br /&gt;
   └─ stored:        no&lt;br /&gt;
&lt;br /&gt;
* Current Network Device list - The Gigabit Ethernet Adapter does not appear. Device: &#039;&#039;&#039;enp2s0f0&#039;&#039;&#039; is the native built in Gigabit Adapter on this MacBook Pro:&lt;br /&gt;
 [root@nst42-mbp ~]# nmcli d;&lt;br /&gt;
 DEVICE    TYPE      STATE                   CONNECTION    &lt;br /&gt;
 wlp3s0    wifi      connected               UTLNET_5_0GHZ &lt;br /&gt;
 lo        loopback  connected (externally)  lo            &lt;br /&gt;
 enp2s0f0  ethernet  unavailable             --            &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Now authorize the Thunderbolt Gigabit adapter with its UUID:&lt;br /&gt;
 [root@nst42-mbp ~]# boltctl authorize 903d9407-0200-0100-ffff-ffffffffffff;&lt;br /&gt;
 [root@nst42-mbp ~]# boltctl list;&lt;br /&gt;
 ● Apple Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ type:          peripheral&lt;br /&gt;
   ├─ name:          Thunderbolt to Gigabit Ethernet Adapter&lt;br /&gt;
   ├─ vendor:        Apple, Inc.&lt;br /&gt;
   ├─ uuid:          903d9407-0200-0100-ffff-ffffffffffff&lt;br /&gt;
   ├─ generation:    Thunderbolt 1&lt;br /&gt;
   ├─ status:        authorized&lt;br /&gt;
   │  ├─ domain:     e0eec615-0a00-0100-ffff-ffffffffffff&lt;br /&gt;
   │  ├─ rx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  ├─ tx speed:   10 Gb/s = 1 lanes * 10 Gb/s&lt;br /&gt;
   │  └─ authflags:  none&lt;br /&gt;
   ├─ authorized:    Mon 09 Mar 2026 02:48:26 PM UTC&lt;br /&gt;
   ├─ connected:     Mon 09 Mar 2026 02:46:57 PM UTC&lt;br /&gt;
   └─ stored:        no&lt;br /&gt;
&lt;br /&gt;
* Now the Gigabit Adapter appears in the Device list as &#039;&#039;&#039;ens9&#039;&#039;&#039;:&lt;br /&gt;
 [root@nst42-mbp ~]# nmcli d;&lt;br /&gt;
 DEVICE    TYPE      STATE                   CONNECTION    &lt;br /&gt;
 wlp3s0    wifi      connected               UTLNET_5_0GHZ &lt;br /&gt;
 lo        loopback  connected (externally)  lo            &lt;br /&gt;
 enp2s0f0  ethernet  unavailable             --            &lt;br /&gt;
 ens9      ethernet  unavailable             --&lt;/div&gt;</summary>
		<author><name>Rwh</name></author>
	</entry>
</feed>