Raspberry pi 3 als W-Lan Access Point

Check if W-Lan-Adapter is doing AP.
iw list | grep AP
  sudo apt-get install dnsmasq hostapd vi /etc/dhcpcd.conf add denyinterfaces wlan0   vi /etc/network/interfaces
allow-hotplug wlan0

iface wlan0 inet static
    address 192.168.6.1
    netmask 255.255.255.248
    network 192.168.6.0
    broadcast 192.168.6.7
  service dhcpcd restart ifdown wlan0; ifup wlan0

CONFIGURE HOSTAPD

vi /etc/hostapd/hostapd.conf
# Schnittstelle und Treiber
interface=wlan0
#driver=nl80211

# WLAN-Konfiguration
ssid=MYNAME
channel=1
hw_mode=g
wmm_enabled=1
country_code=DE
ieee80211d=1
ignore_broadcast_ssid=0
auth_algs=1

# WLAN-Verschlüsselung
wpa=2
wpa_key_mgmt=WPA-PSK
rsn_pairwise=CCMP
wpa_passphrase=MEINEPASSPHRASE
  vi /etc/default/hostapd
DAEMON_CONF="/etc/hostapd/hostapd.conf"
  service hostapd restart vi /etc/dnsmasq.conf
# DHCP-Server aktiv für WLAN-Interface
interface=wlan0

# DHCP-Server nicht aktiv für bestehendes Netzwerk
no-dhcp-interface=eth0

# IPv4-Adressbereich und Lease-Time
dhcp-range=192.168.6.2,192.168.6.6,24h

# DNS
dhcp-option=option:dns-server,192.168.6.1
  vi /etc/network/interfaces
# NAT und Masquerading aktivieren
up /sbin/iptables -A FORWARD -o eth0 -i wlan0 -m conntrack --ctstate NEW -j ACCEPT
up /sbin/iptables -A FORWARD -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
up /sbin/iptables -t nat -F POSTROUTING
up /sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

# IP-Forwarding aktivieren
up sysctl -w net.ipv4.ip_forward=1
up sysctl -w net.ipv6.conf.all.forwarding=1

Kommentar hinterlassen