wireless.wifi-iface.json 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188
  1. {
  2. "$id": "https://openwrt.org/wifi.iface.json",
  3. "$schema": "http://json-schema.org/draft-07/schema#",
  4. "description": "OpenWrt WiFi Interface Schema",
  5. "type": "object",
  6. "properties": {
  7. "access_network_type": {
  8. "description": "Interworking Access Network Type",
  9. "type": "number",
  10. "minimum": 0,
  11. "maximum": 15
  12. },
  13. "acct_interval": {
  14. "type": "alias",
  15. "default": "radius_acct_interim_interval"
  16. },
  17. "acct_port": {
  18. "type": "alias",
  19. "default": "acct_server_port"
  20. },
  21. "acct_secret": {
  22. "type": "alias",
  23. "default": "acct_server_shared_secret"
  24. },
  25. "acct_server": {
  26. "type": "alias",
  27. "default": "acct_server_addr"
  28. },
  29. "acct_server_addr": {
  30. "description": "RADIUS accounting server to handle client authentication",
  31. "type": "array",
  32. "items": {
  33. "type": "string"
  34. }
  35. },
  36. "acct_server_port": {
  37. "description": "RADIUS accounting port",
  38. "type": "number",
  39. "default": 1813
  40. },
  41. "acct_server_shared_secret": {
  42. "description": "Shared accounting RADIUS secret",
  43. "type": "string"
  44. },
  45. "airtime_bss_limit": {
  46. "description": "Whether the current BSS should be limited (when airtime_mode=3)",
  47. "type": "boolean"
  48. },
  49. "airtime_bss_weight": {
  50. "description": "Per-BSS airtime weight. In multi-BSS mode, set for each BSS and hostapd will configure station weights to enforce the correct ratio between BSS weights depending on the number of active stations",
  51. "type": "number"
  52. },
  53. "airtime_sta_weight": {
  54. "description": "Static configuration of station weights (when airtime_mode=1). Kernel default weight is 256",
  55. "type": "array",
  56. "items": {
  57. "type": "string"
  58. }
  59. },
  60. "altsubject_match": {
  61. "description": "Semicolon separated string of entries to be matched against the alternative subject name of the authentication server certificate",
  62. "type": "array",
  63. "items": {
  64. "type": "string"
  65. }
  66. },
  67. "altsubject_match2": {
  68. "type": "array"
  69. },
  70. "anonymous_identity": {
  71. "description": "Anonymous identity string for EAP",
  72. "type": "string"
  73. },
  74. "anqp_3gpp_cell_net": {
  75. "description": "3GPP Cellular Network information",
  76. "type": "array",
  77. "items": {
  78. "type": "string"
  79. }
  80. },
  81. "anqp_domain_id": {
  82. "description": "An identifier for a set of APs in an ESS that share the same common ANQP information",
  83. "type": "number",
  84. "minimum": 0,
  85. "maximum": 65535,
  86. "default": 0
  87. },
  88. "ap_isolate": {
  89. "description": "Isolates wireless clients from each other, only applicable in ap mode",
  90. "type": "boolean",
  91. "default": false
  92. },
  93. "ap_max_inactivity": {
  94. "description": "Station inactivity limit in seconds: If a station does not send anything in ap_max_inactivity seconds, an empty data frame is sent to it in order to verify whether it is still in range. If this frame is not ACKed, the station will be disassociated and then deauthenticated",
  95. "type": "number"
  96. },
  97. "ap_pin": {
  98. "description": "Static access point PIN for WPS",
  99. "type": "string"
  100. },
  101. "ap_setup_locked": {
  102. "description": "AP can be configured into a locked state where new WPS Registrar are not accepted",
  103. "type": "boolean"
  104. },
  105. "anqp_elem": {
  106. "description": "Arbitrary ANQP-element configuration",
  107. "type": "array",
  108. "items": {
  109. "type": "string"
  110. }
  111. },
  112. "asra": {
  113. "description": "Additional Step Required for Access",
  114. "type": "boolean",
  115. "default": false
  116. },
  117. "assoc_sa_query_max_timeout": {
  118. "description": "Specifies the 802.11w Association SA Query maximum timeout.",
  119. "type": "number",
  120. "minimum": 1,
  121. "maximum": 4294967295
  122. },
  123. "assoc_sa_query_retry_timeout": {
  124. "description": "Association SA Query retry timeout",
  125. "type": "number",
  126. "minimum": 1,
  127. "maximum": 4294967295
  128. },
  129. "auth": {
  130. "description": "Defines the phase 2 (inner) authentication method, only applicable if eap_type is peap or ttl",
  131. "type": "string"
  132. },
  133. "auth_cache": {
  134. "type": "alias",
  135. "default": "okc"
  136. },
  137. "auth_port": {
  138. "type": "alias",
  139. "default": "auth_server_port"
  140. },
  141. "auth_secret": {
  142. "type": "alias",
  143. "default": "auth_server_shared_secret"
  144. },
  145. "auth_server": {
  146. "type": "alias",
  147. "default": "auth_server_addr"
  148. },
  149. "auth_server_addr": {
  150. "description": "RADIUS authentication server to handle client authentication",
  151. "type": "array",
  152. "items": {
  153. "type": "string"
  154. }
  155. },
  156. "auth_server_port": {
  157. "description": "RADIUS authentication port",
  158. "type": "number",
  159. "default": 1812
  160. },
  161. "auth_server_shared_secret": {
  162. "description": "Shared authentication RADIUS secret",
  163. "type": "string"
  164. },
  165. "basic_rate": {
  166. "type": "array"
  167. },
  168. "beacon_prot": {
  169. "description": "Management frame protection for Beacon frames",
  170. "type": "boolean"
  171. },
  172. "bss_load_update_period": {
  173. "description": "BSS Load update period (in BUs)",
  174. "type": "number",
  175. "default": 60
  176. },
  177. "bss_transition": {
  178. "description": "BSS Transition Management",
  179. "type": "boolean"
  180. },
  181. "bssid": {
  182. "description": "Override the BSSID of the network",
  183. "type": "string"
  184. },
  185. "bssid_blacklist": {
  186. "type": "array"
  187. },
  188. "bssid_whitelist": {
  189. "type": "array"
  190. },
  191. "ca_cert": {
  192. "description": "Specifies the path the CA certificate used for authentication",
  193. "type": "string"
  194. },
  195. "ca_cert2_usesystem": {
  196. "type": "boolean"
  197. },
  198. "ca_cert_usesystem": {
  199. "type": "boolean"
  200. },
  201. "chan_util_avg_period": {
  202. "description": "Channel utilization averaging period (in BUs)",
  203. "type": "number",
  204. "default": 600
  205. },
  206. "civic": {
  207. "description": "The content of a location civic measurement subelement",
  208. "type": "string"
  209. },
  210. "client_cert": {
  211. "description": "File path to client certificate file (PEM/DER)",
  212. "type": "string"
  213. },
  214. "dae_client": {
  215. "type": "alias",
  216. "default": "radius_das_client"
  217. },
  218. "dae_port": {
  219. "type": "alias",
  220. "default": "radius_das_port"
  221. },
  222. "dae_secret": {
  223. "type": "alias",
  224. "default": "radius_das_secret"
  225. },
  226. "default_disabled": {
  227. "type": "alias",
  228. "default": "disabled"
  229. },
  230. "device": {
  231. "description": "Devices to enable this interface on (wifi-device section names)",
  232. "type": "array",
  233. "items": {
  234. "type": "string"
  235. }
  236. },
  237. "device_name": {
  238. "description": "Primary Device Name used by WPS",
  239. "type": "string",
  240. "default": "OpenWrt AP"
  241. },
  242. "device_type": {
  243. "description": "Primary Device Type used by WPS",
  244. "type": "string",
  245. "default": "6-0050F204-1"
  246. },
  247. "disabled": {
  248. "description": "Do not bring the interface up automatically",
  249. "type": "boolean"
  250. },
  251. "disable_dgaf": {
  252. "description": "Disable Downstream Group-Addressed Forwarding",
  253. "type": "boolean",
  254. "default": false
  255. },
  256. "disassoc_low_ack": {
  257. "description": "Disassociate stations based on excessive transmission failures or other indications of connection loss. This depends on the driver capabilities and may not be available with all drivers.",
  258. "type": "boolean",
  259. "default": true
  260. },
  261. "domain_match": {
  262. "type": "array",
  263. "items": {
  264. "type": "string"
  265. }
  266. },
  267. "domain_match2": {
  268. "type": "array"
  269. },
  270. "domain_name" : {
  271. "type": "array",
  272. "items": {
  273. "type": "string"
  274. }
  275. },
  276. "domain_suffix_match": {
  277. "type": "array",
  278. "items": {
  279. "type": "string"
  280. }
  281. },
  282. "domain_suffix_match2": {
  283. "type": "array"
  284. },
  285. "dtim_period": {
  286. "description": "Set the DTIM (delivery traffic information message) period. There will be one DTIM per this many beacon frames. This may be set between 1 and 255. This option only has an effect on ap wifi-ifaces.",
  287. "type": "number",
  288. "default": 2,
  289. "minimum": 1,
  290. "maximum": 255
  291. },
  292. "dynamic_ownip": {
  293. "type": "alias",
  294. "default": "dynamic_own_ip_addr"
  295. },
  296. "dynamic_own_ip_addr": {
  297. "type": "boolean"
  298. },
  299. "dynamic_vlan": {
  300. "description": "Allow RADIUS authentication server to decide which VLAN is used for the stations (0 = disabled, 1 = optional, 2 = required)",
  301. "type": "number",
  302. "enum": [ 0, 1, 2 ],
  303. "default": 0
  304. },
  305. "eap_reauth_period": {
  306. "description": "EAP reauthentication period in seconds",
  307. "type": "number"
  308. },
  309. "eap_server": {
  310. "description": "Use integrated EAP server instead of external RADIUS authentication server",
  311. "type": "boolean"
  312. },
  313. "eap_type": {
  314. "type": "string"
  315. },
  316. "eap_user_file": {
  317. "description": "Path for EAP server user database",
  318. "type": "string"
  319. },
  320. "eapol_version": {
  321. "description": "IEEE 802.1X/EAPOL version",
  322. "type": "number",
  323. "enum": [ 1, 2 ]
  324. },
  325. "enable": {
  326. "description": "Enable the interface",
  327. "type": "boolean",
  328. "default": true
  329. },
  330. "encryption": {
  331. "type": "string"
  332. },
  333. "esr": {
  334. "description": "Emergency services reachable",
  335. "type": "boolean",
  336. "default": false
  337. },
  338. "ext_registrar": {
  339. "description": "WPS UPnP interface",
  340. "type": "boolean"
  341. },
  342. "fils": {
  343. "description": "Enable FILS",
  344. "type": "boolean"
  345. },
  346. "fils_dhcp": {
  347. "description": "DHCP server for FILS HLP. Set to '*' for automatic lookup.",
  348. "type": "string"
  349. },
  350. "ft_iface": {
  351. "description": "Inter-AP communication interface for 802.11r",
  352. "type": "string"
  353. },
  354. "ft_over_ds": {
  355. "description": "Whether to enable FT-over-DS",
  356. "type": "boolean",
  357. "default": false
  358. },
  359. "ft_psk_generate_local": {
  360. "description": "Whether to generate FT response locally for PSK networks. This avoids use of PMK-R1 push/pull from other APs with FT-PSK networks as the required information (PSK and other session data) is already locally available.",
  361. "type": "boolean"
  362. },
  363. "ftm_responder": {
  364. "description": "Publish fine timing measurement (FTM) responder functionality",
  365. "type": "boolean"
  366. },
  367. "gas_address3": {
  368. "type": "string"
  369. },
  370. "hidden": {
  371. "type": "alias",
  372. "default": "ignore_broadcast_ssid"
  373. },
  374. "hessid": {
  375. "description": "Homogeneous ESS identifier",
  376. "type": "string"
  377. },
  378. "hostapd_bss_options": {
  379. "description": "Additional raw options to be added",
  380. "type": "array",
  381. "items": {
  382. "type": "string"
  383. }
  384. },
  385. "hs20": {
  386. "description": "Enable Hotspot 2.0 support",
  387. "type": "boolean"
  388. },
  389. "hs20_conn_capab": {
  390. "description": "Connection Capability",
  391. "type": "array",
  392. "items": {
  393. "type": "string"
  394. }
  395. },
  396. "hs20_deauth_req_timeout": {
  397. "description": "Deauthentication request timeout",
  398. "type": "number",
  399. "default": 60
  400. },
  401. "hs20_operating_class": {
  402. "description": "Operating Class Indication",
  403. "type": "string"
  404. },
  405. "hs20_t_c_filename": {
  406. "description": "Terms and Conditions information",
  407. "type": "string"
  408. },
  409. "hs20_t_c_server_url": {
  410. "description": "Terms and Conditions server",
  411. "type": "string"
  412. },
  413. "hs20_t_c_timestamp": {
  414. "description": "Terms and Conditions timestamp",
  415. "type": "string"
  416. },
  417. "hs20_wan_metrics": {
  418. "description": "WAN Metrics",
  419. "type": "string"
  420. },
  421. "identity": {
  422. "description": "Identity string for EAP",
  423. "type": "string"
  424. },
  425. "ieee80211k": {
  426. "description": "Enables Radio Resource Measurement (802.11k) support",
  427. "type": "boolean"
  428. },
  429. "ieee80211r": {
  430. "description": "Enables fast BSS transition (802.11r) support.",
  431. "type": "boolean"
  432. },
  433. "ieee80211w": {
  434. "description": "Enables MFP (802.11w) support (0 = disabled, 1 = optional, 2 = required). Requires the 'full' version of wpad/hostapd and support from the Wi-Fi driver",
  435. "type": "number",
  436. "enum": [ 0, 1, 2 ],
  437. "default": 0
  438. },
  439. "ieee80211w_max_timeout": {
  440. "type": "alias",
  441. "default": "assoc_sa_query_max_timeout"
  442. },
  443. "ieee80211w_mgmt_cipher": {
  444. "description": "Group Management cypher",
  445. "type": "string"
  446. },
  447. "ieee80211w_retry_timeout": {
  448. "type": "alias",
  449. "default": "assoc_sa_query_retry_timeout"
  450. },
  451. "ifname": {
  452. "description": "Specifies a custom name for the Wi-Fi interface, which is otherwise automatically named. Maximum length: 15 characters",
  453. "type": "string"
  454. },
  455. "ignore_broadcast_ssid": {
  456. "description": "Disables the broadcasting of beacon frames if set to 1 and, in doing so, hides the ESSID. Where the ESSID is hidden, clients may fail to roam and airtime efficiency may be significantly reduced.",
  457. "type": "boolean",
  458. "default": false
  459. },
  460. "internet": {
  461. "description": "Whether the network provides connectivity to the Internet",
  462. "type": "boolean",
  463. "default": true
  464. },
  465. "isolate": {
  466. "type": "alias",
  467. "default": "ap_isolate"
  468. },
  469. "iw_access_network_type": {
  470. "type": "alias",
  471. "default": "access_network_type"
  472. },
  473. "iw_anqp_3gpp_cell_net": {
  474. "type": "alias",
  475. "default": "anqp_3gpp_cell_net"
  476. },
  477. "iw_anqp_elem": {
  478. "type": "alias",
  479. "default": "anqp_elem"
  480. },
  481. "iw_asra": {
  482. "type": "alias",
  483. "default": "asra"
  484. },
  485. "iw_domain_name": {
  486. "type": "alias",
  487. "default": "domain_name"
  488. },
  489. "iw_enabled": {
  490. "type": "boolean",
  491. "default": false
  492. },
  493. "iw_esr": {
  494. "type": "alias",
  495. "default": "esr"
  496. },
  497. "iw_gas_address3": {
  498. "type": "alias",
  499. "default": "gas_address3"
  500. },
  501. "iw_hessid": {
  502. "type": "alias",
  503. "default": "hessid"
  504. },
  505. "iw_internet": {
  506. "type": "alias",
  507. "default": "internet"
  508. },
  509. "iw_ipaddr_type_availability": {
  510. "type": "number"
  511. },
  512. "iw_nai_realm": {
  513. "type": "alias",
  514. "default": "nai_realm"
  515. },
  516. "iw_network_auth_type": {
  517. "type": "alias",
  518. "default": "network_auth_type"
  519. },
  520. "iw_qos_map_set": {
  521. "type": "alias",
  522. "default": "qos_map_set"
  523. },
  524. "roaming_consortium": {
  525. "type": "alias",
  526. "default": "roaming_consortium"
  527. },
  528. "iw_uesa": {
  529. "type": "alias",
  530. "default": "uesa"
  531. },
  532. "iw_venue_group": {
  533. "type": "alias",
  534. "default": "venue_group"
  535. },
  536. "iw_venue_name": {
  537. "type": "alias",
  538. "default": "venue_name"
  539. },
  540. "iw_venue_type": {
  541. "type": "alias",
  542. "default": "venue_type"
  543. },
  544. "iw_venue_url": {
  545. "type": "alias",
  546. "default": "venue_url"
  547. },
  548. "key": {
  549. "description": "Encryption key",
  550. "type": "string"
  551. },
  552. "lci": {
  553. "description": "The content of a LCI measurement subelement",
  554. "type": "string"
  555. },
  556. "macaddr": {
  557. "description": "Override the BSSID of the network",
  558. "type": "string"
  559. },
  560. "macfile": {
  561. "description": "File containing a list MACs used by the macfilter",
  562. "type": "string"
  563. },
  564. "macfilter": {
  565. "description": "Allow/deny associations based on the clients MAC",
  566. "type": "string",
  567. "enum": [ "allow", "deny" ]
  568. },
  569. "maclist": {
  570. "description": "List of MACs used by the macfilter option",
  571. "type": "array",
  572. "items": {
  573. "type": "string"
  574. }
  575. },
  576. "manufacturer": {
  577. "description": "Manufacturer used by WPS",
  578. "type": "string",
  579. "default": "www.openwrt.org"
  580. },
  581. "max_inactivity": {
  582. "type": "alias",
  583. "default": "ap_max_inactivity"
  584. },
  585. "max_listen_int": {
  586. "type": "alias",
  587. "default": "max_listen_interval"
  588. },
  589. "max_listen_interval": {
  590. "description": "How many Beacon periods STAs are allowed to remain asleep",
  591. "type": "number"
  592. },
  593. "max_num_sta": {
  594. "description": "Maximum number of stations allowed in station table",
  595. "type": "number"
  596. },
  597. "maxassoc": {
  598. "type": "alias",
  599. "default": "max_num_sta"
  600. },
  601. "mbo": {
  602. "description": "Multiband Operation",
  603. "type": "boolean"
  604. },
  605. "mcast_rate": {
  606. "description": "Allowed multicast rate",
  607. "type": "number"
  608. },
  609. "mesh_auto_open_plinks": {
  610. "type": "boolean"
  611. },
  612. "mesh_awake_window": {
  613. "type": "number"
  614. },
  615. "mesh_confirm_timeout": {
  616. "type": "number"
  617. },
  618. "mesh_element_ttl": {
  619. "type": "number"
  620. },
  621. "mesh_fwding": {
  622. "description": "Enable 802.11s layer-2 routing and forwarding",
  623. "type": "boolean"
  624. },
  625. "mesh_nolearn": {
  626. "description": "Disable 802.11s path discovery",
  627. "type": "boolean"
  628. },
  629. "mesh_gate_announcements": {
  630. "type": "number"
  631. },
  632. "mesh_holding_timeout": {
  633. "type": "number"
  634. },
  635. "mesh_hwmp_active_path_timeout": {
  636. "type": "number"
  637. },
  638. "mesh_hwmp_active_path_to_root_timeout": {
  639. "type": "number"
  640. },
  641. "mesh_hwmp_confirmation_interval": {
  642. "type": "number"
  643. },
  644. "mesh_hwmp_max_preq_retries": {
  645. "type": "number"
  646. },
  647. "mesh_hwmp_net_diameter_traversal_time": {
  648. "type": "number"
  649. },
  650. "mesh_hwmp_preq_min_interval": {
  651. "type": "number"
  652. },
  653. "mesh_hwmp_rann_interval": {
  654. "type": "number"
  655. },
  656. "mesh_hwmp_root_interval": {
  657. "type": "number"
  658. },
  659. "mesh_hwmp_rootmode": {
  660. "type": "number"
  661. },
  662. "mesh_id": {
  663. "type": "string"
  664. },
  665. "mesh_max_peer_links": {
  666. "type": "number"
  667. },
  668. "mesh_max_retries": {
  669. "type": "number"
  670. },
  671. "mesh_min_discovery_timeout": {
  672. "type": "number"
  673. },
  674. "mesh_path_refresh_time": {
  675. "type": "number"
  676. },
  677. "mesh_plink_timeout": {
  678. "type": "number"
  679. },
  680. "mesh_power_mode": {
  681. "type": "string"
  682. },
  683. "mesh_retry_timeout": {
  684. "type": "number"
  685. },
  686. "mesh_rssi_threshold": {
  687. "type": "number"
  688. },
  689. "mesh_sync_offset_max_neighor": {
  690. "type": "number"
  691. },
  692. "mesh_ttl": {
  693. "type": "number"
  694. },
  695. "mlo": {
  696. "description": "Multi-Link Operation",
  697. "type": "boolean"
  698. },
  699. "mobility_domain": {
  700. "description": "DID is used to indicate a group of APs between which a STA can use Fast BSS Transition.",
  701. "type": "string"
  702. },
  703. "mode": {
  704. "type": "string"
  705. },
  706. "multi_ap": {
  707. "description": "Enable Multi-AP functionality",
  708. "type": "number"
  709. },
  710. "multi_ap_vlanid": {
  711. "description": "Multi-AP Default VLAN ID",
  712. "type": "number"
  713. },
  714. "multi_ap_profile": {
  715. "description": "Multi-AP Profile",
  716. "type": "number"
  717. },
  718. "multi_ap_backhaul_key": {
  719. "type": "string"
  720. },
  721. "multi_ap_backhaul_ssid": {
  722. "description": "Multi-AP backhaul BSS SSID",
  723. "type": "string"
  724. },
  725. "multicast_to_unicast": {
  726. "description": "Request that the AP will do multicast-to-unicast conversion for ARP, IPv4, and IPv6 frames ",
  727. "type": "boolean"
  728. },
  729. "multicast_to_unicast_all": {
  730. "type": "alias",
  731. "default": "multicast_to_unicast"
  732. },
  733. "na_mcast_to_ucast": {
  734. "description": "IPv6 Neighbor Advertisement multicast-to-unicast conversion",
  735. "type": "boolean"
  736. },
  737. "nas_identifier": {
  738. "description": "NAS-Identifier string for RADIUS messages",
  739. "type": "string"
  740. },
  741. "nai_realm": {
  742. "description": "NAI Realm information",
  743. "type": "array",
  744. "items": {
  745. "type": "string"
  746. }
  747. },
  748. "nasid": {
  749. "type": "alias",
  750. "default": "nas_identifier"
  751. },
  752. "network": {
  753. "description": "Specifies one or multiple logical network interfaces declared in the network configuration, each one should be a L3 bridge to be able to attach this L2 wireless interface.",
  754. "type": "array",
  755. "items": {
  756. "type": "string"
  757. }
  758. },
  759. "network_auth_type": {
  760. "description": "Network Authentication Type",
  761. "type": "string"
  762. },
  763. "no_probe_resp_if_max_sta": {
  764. "description": "Do not answer probe requests if iface_max_num_sta was reached",
  765. "type": "boolean"
  766. },
  767. "ocv": {
  768. "description": "Operating Channel Validation",
  769. "type": "number",
  770. "minimum": 0,
  771. "maximum": 15
  772. },
  773. "okc": {
  774. "description": "PMKSA and Opportunistic Key Caching",
  775. "type": "boolean"
  776. },
  777. "owe_transition": {
  778. "description": "Indicate that an OWE BSS shall automatically add an unencrypted transition interface",
  779. "type": "boolean"
  780. },
  781. "owe_transition_bssid": {
  782. "description": "Pointer to the matching open/OWE BSS",
  783. "type": "string"
  784. },
  785. "owe_transition_ifname": {
  786. "description": "Alternatively, OWE transition mode BSSID/SSID can be configured with a reference to a BSS operated by this hostapd process.",
  787. "type": "string"
  788. },
  789. "owe_transition_ssid": {
  790. "description": "The SSID used by the OWE transition device",
  791. "type": "string"
  792. },
  793. "ownip": {
  794. "type": "alias",
  795. "default": "own_ip_addr"
  796. },
  797. "own_ip_addr": {
  798. "description": "The own IP address of the access point",
  799. "type": "string"
  800. },
  801. "password:wpakey": {
  802. "type": "string"
  803. },
  804. "pbc_in_m1": {
  805. "description": "WPS capability discovery workaround for PBC with Windows 7",
  806. "type": "boolean"
  807. },
  808. "per_sta_vif": {
  809. "description": "Per-Station AP_VLAN interface mode",
  810. "type": "boolean"
  811. },
  812. "pmk_r1_push": {
  813. "description": "Whether PMK-R1 push is enabled at R0KH",
  814. "type": "boolean",
  815. "default": false
  816. },
  817. "port:port": {
  818. "type": "number"
  819. },
  820. "powersave": {
  821. "type": "boolean"
  822. },
  823. "ppsk": {
  824. "description": "Lookup PSK2 Keys up via a Radius server",
  825. "type": "boolean"
  826. },
  827. "preamble": {
  828. "description": "Short Preamble",
  829. "type": "boolean",
  830. "default": true
  831. },
  832. "priv_key": {
  833. "type": "string"
  834. },
  835. "priv_key_pwd": {
  836. "type": "string"
  837. },
  838. "private_key": {
  839. "description": "Private key matching with the server certificate for EAP-TLS/PEAP/TTLS",
  840. "type": "string"
  841. },
  842. "private_key_passwd": {
  843. "description": "Passphrase for private key",
  844. "type": "string"
  845. },
  846. "proxy_arp": {
  847. "description": "Proxy ARP",
  848. "type": "boolean"
  849. },
  850. "qos_map_set": {
  851. "description": "QoS Map Set configuration",
  852. "type": "string",
  853. "default": "0,0,2,16,1,1,255,255,18,22,24,38,40,40,44,46,48,56"
  854. },
  855. "r0_key_lifetime": {
  856. "description": "Default lifetime of the PMK-R0 in seconds",
  857. "type": "number"
  858. },
  859. "r0kh": {
  860. "description": "List of R0KHs in the same Mobility Domain",
  861. "type": "array",
  862. "items": {
  863. "type": "string"
  864. }
  865. },
  866. "r1_key_holder": {
  867. "description": "PMK-R1 Key Holder identifier",
  868. "type": "string"
  869. },
  870. "r1kh": {
  871. "description": "List of R1KHs in the same Mobility Domain",
  872. "type": "array",
  873. "items": {
  874. "type": "string"
  875. }
  876. },
  877. "radios": {
  878. "type": "array",
  879. "items": {
  880. "type": "string"
  881. }
  882. },
  883. "radius_acct_interim_interval": {
  884. "description": "Interim accounting update interval",
  885. "type": "number"
  886. },
  887. "radius_acct_req_attr": {
  888. "description": "Additional Accounting-Request attributes",
  889. "type": "array",
  890. "items": {
  891. "type": "string"
  892. }
  893. },
  894. "radius_auth_req_attr": {
  895. "description": "Additional Access-Request attributes",
  896. "type": "array",
  897. "items": {
  898. "type": "string"
  899. }
  900. },
  901. "radius_client_addr": {
  902. "description": "RADIUS client forced local IP address for the access point",
  903. "type": "string"
  904. },
  905. "radius_das_client": {
  906. "description": "DAS client (the host that can send Disconnect/CoA requests)",
  907. "type": "string"
  908. },
  909. "radius_das_port": {
  910. "description": "Dynamic Authorization Extensions port",
  911. "type": "number"
  912. },
  913. "radius_das_secret": {
  914. "description": "Dynamic Authorization Extensions secret",
  915. "type": "string"
  916. },
  917. "radius_request_cui" :{
  918. "description": "Request Chargeable-User-Identity (RFC 4372)",
  919. "type": "boolean"
  920. },
  921. "reassociation_deadline": {
  922. "description": "Reassociation deadline in time units",
  923. "type": "number",
  924. "minimum": 1000,
  925. "maximum": 65535,
  926. "default": 20000
  927. },
  928. "request_cui": {
  929. "type": "alias",
  930. "default": "radius_request_cui"
  931. },
  932. "rrm_beacon_report": {
  933. "description": "Enable beacon report via radio measurements",
  934. "type": "boolean"
  935. },
  936. "rrm_neighbor_report": {
  937. "description": "Enable neighbor report via radio measurements",
  938. "type": "boolean"
  939. },
  940. "rnr": {
  941. "description": "Enable reduced neighbor reporting",
  942. "type": "boolean"
  943. },
  944. "roaming_consortium": {
  945. "description": "Roaming Consortium List",
  946. "type": "array",
  947. "items": {
  948. "type": "string"
  949. }
  950. },
  951. "rsn_preauth": {
  952. "type": "boolean"
  953. },
  954. "rsn_override": {
  955. "type": "number",
  956. "description": "Use RSNE override IE WPA3 compatibility (0: disabled, 1: enabled, 2:force WPA2 for older devices)",
  957. "default": 1
  958. },
  959. "sae_password_file": {
  960. "description": "External file containing VLAN SAE MAC address triplets",
  961. "type": "string"
  962. },
  963. "sae_pwe": {
  964. "description": "SAE mechanism for PWE derivation",
  965. "type": "number",
  966. "enum": [ 0, 1, 2 ]
  967. },
  968. "sae_require_mfp": {
  969. "description": "Require MFP for all associations using SAE",
  970. "type": "boolean"
  971. },
  972. "sae_track_password": {
  973. "description": "Tracking of SAE password use",
  974. "type": "number"
  975. },
  976. "server:host": {
  977. "type": "string"
  978. },
  979. "server_cert": {
  980. "description": "Server certificate (PEM or DER file) for EAP-TLS/PEAP/TTLS",
  981. "type": "string"
  982. },
  983. "server_id": {
  984. "description": "Server identity",
  985. "type": "string"
  986. },
  987. "short_preamble": {
  988. "type": "alias",
  989. "default": "preamble"
  990. },
  991. "skip_inactivity_poll": {
  992. "description": "The inactivity polling can be disabled to disconnect stations based on inactivity timeout so that idle stations are more likely to be disconnected even if they are still in range of the AP",
  993. "type": "boolean",
  994. "default": false
  995. },
  996. "spp_amsdu": {
  997. "description": "Signaling and Payload Protected A-MSDU",
  998. "type": "boolean"
  999. },
  1000. "ssid": {
  1001. "type": "string"
  1002. },
  1003. "ssid:string": {
  1004. "type": "string"
  1005. },
  1006. "start_disabled": {
  1007. "type": "number"
  1008. },
  1009. "subject_match": {
  1010. "description": "Substring to be matched against the subject of the authentication server certificate",
  1011. "type": "string"
  1012. },
  1013. "subject_match2": {
  1014. "type": "string"
  1015. },
  1016. "supported_rates": {
  1017. "type": "array"
  1018. },
  1019. "tdls_prohibit": {
  1020. "description": "Prohibit use of TDLS in this BSS",
  1021. "type": "boolean"
  1022. },
  1023. "time_advertisement": {
  1024. "description": "Time advertisement",
  1025. "type": "number",
  1026. "enum": [ 0, 2 ]
  1027. },
  1028. "time_zone": {
  1029. "description": "Local time zone as specified in 8.3 of IEEE Std 1003.1-2004",
  1030. "type": "string"
  1031. },
  1032. "uapsd": {
  1033. "type": "alias",
  1034. "default": "uapsd_advertisement_enabled"
  1035. },
  1036. "uapsd_advertisement_enabled": {
  1037. "description": "WMM-PS Unscheduled Automatic Power Save Delivery [U-APSD]",
  1038. "type": "boolean",
  1039. "default": true
  1040. },
  1041. "uesa": {
  1042. "description": "Unauthenticated emergency service accessible",
  1043. "type": "boolean",
  1044. "default": false
  1045. },
  1046. "utf8_ssid": {
  1047. "description": "Whether the SSID is to be interpreted using UTF-8 encoding",
  1048. "type": "boolean",
  1049. "default": true
  1050. },
  1051. "vendor_elements": {
  1052. "description": "Additional vendor specific elements for Beacon and Probe Response frames",
  1053. "type": "array",
  1054. "items": {
  1055. "type": "string"
  1056. }
  1057. },
  1058. "venue_group": {
  1059. "type": "string"
  1060. },
  1061. "venue_name": {
  1062. "description": "Venue Name information",
  1063. "type": "array",
  1064. "items": {
  1065. "type": "string"
  1066. }
  1067. },
  1068. "venue_type": {
  1069. "type": "string"
  1070. },
  1071. "venue_url": {
  1072. "description": "Venue URL information",
  1073. "type": "array",
  1074. "items": {
  1075. "type": "string"
  1076. }
  1077. },
  1078. "vlan_bridge": {
  1079. "description": "Bridge (prefix) to add the wifi and the tagged interface to.",
  1080. "type": "string"
  1081. },
  1082. "vlan_file": {
  1083. "type": "string"
  1084. },
  1085. "vlan_naming": {
  1086. "description": "When hostapd creates a VLAN interface on vlan_tagged_interfaces, it needs to know how to name it.",
  1087. "type": "boolean",
  1088. "default": true
  1089. },
  1090. "vlan_no_bridge": {
  1091. "description": "To not setup a bridge for dynamic vlans",
  1092. "type": "boolean"
  1093. },
  1094. "vlan_tagged_interface": {
  1095. "type": "string"
  1096. },
  1097. "wds": {
  1098. "type": "boolean"
  1099. },
  1100. "wds_bridge": {
  1101. "description": "If bridge parameter is set, the WDS STA interface will be added to the same bridge by default",
  1102. "type": "string"
  1103. },
  1104. "wds_sta": {
  1105. "description": "If bridge parameter is set, the WDS STA interface will be added to the same bridge by default",
  1106. "type": "boolean"
  1107. },
  1108. "wnm_sleep_mode": {
  1109. "description": "WNM-Sleep Mode (extended sleep mode for stations)",
  1110. "type": "boolean"
  1111. },
  1112. "wnm_sleep_mode_no_keys": {
  1113. "description": "WNM-Sleep Mode GTK/IGTK workaround",
  1114. "type": "boolean"
  1115. },
  1116. "wpa_disable_eapol_key_retries": {
  1117. "description": "Workaround for key reinstallation attacks",
  1118. "type": "boolean",
  1119. "default": false
  1120. },
  1121. "wpa_gmk_rekey": {
  1122. "description": "Time interval for rekeying GMK (master key used internally to generate GTKs)",
  1123. "type": "number"
  1124. },
  1125. "wpa_group_rekey": {
  1126. "description": "Time interval for rekeying GTK (broadcast/multicast encryption keys)",
  1127. "type": "number"
  1128. },
  1129. "wpa_master_rekey": {
  1130. "type": "alias",
  1131. "default": "wpa_gmk_rekey"
  1132. },
  1133. "wpa_pair_rekey": {
  1134. "type": "alias",
  1135. "default": "wpa_ptk_rekey"
  1136. },
  1137. "wpa_psk_file": {
  1138. "description": "External file conatining VLAN PSK MAC address triplets",
  1139. "type": "string"
  1140. },
  1141. "wpa_ptk_rekey": {
  1142. "description": "Maximum lifetime for PTK in seconds",
  1143. "type": "number"
  1144. },
  1145. "wpa_strict_rekey": {
  1146. "description": "Rekey GTK when any STA that possesses the current GTK is leaving the BSS",
  1147. "type": "boolean"
  1148. },
  1149. "wps_ap_setup_locked": {
  1150. "type": "alias",
  1151. "default": "ap_setup_locked"
  1152. },
  1153. "wps_device_name": {
  1154. "type": "alias",
  1155. "default": "device_name"
  1156. },
  1157. "wps_device_type": {
  1158. "type": "alias",
  1159. "default": "device_type"
  1160. },
  1161. "wps_independent": {
  1162. "description": "Whether to manage this interface independently from other WPS interfaces",
  1163. "type": "number",
  1164. "default": true
  1165. },
  1166. "wps_label": {
  1167. "description": "Support WPS labels",
  1168. "type": "boolean"
  1169. },
  1170. "wps_manufacturer": {
  1171. "type": "alias",
  1172. "default": "manufacturer"
  1173. },
  1174. "wps_pbc_in_m1": {
  1175. "type": "alias",
  1176. "default": "pbc_in_m1"
  1177. },
  1178. "wps_pin": {
  1179. "type": "alias",
  1180. "default": "ap_pin"
  1181. },
  1182. "wps_pushbutton": {
  1183. "description": "Support WPS pushbutton",
  1184. "type": "boolean"
  1185. }
  1186. }
  1187. }