From 4c2889b6444a8a1e6cdd0ec672d208a19dba95be Mon Sep 17 00:00:00 2001 From: Marc Fonvieille Date: Fri, 5 Mar 2004 20:13:02 +0000 Subject: [PATCH] One s/network/-net/ I forgot in my previous commit. In Wireless section: - Use of replaceable, literal, and command tags where needed - Use of note tags instead of "Note:" - Some little rewordings - Use of lowercase for some role attributes - Punctuation fixes --- .../handbook/advanced-networking/chapter.sgml | 40 +++++++++---------- 1 file changed, 20 insertions(+), 20 deletions(-) diff --git a/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.sgml b/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.sgml index 17e26bbdaf..0d5ef489cb 100644 --- a/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.sgml +++ b/en_US.ISO8859-1/books/handbook/advanced-networking/chapter.sgml @@ -532,7 +532,7 @@ default 10.0.0.1 UGS 0 49378 xl0 RouterA's routing table using 192.168.1.2 as the next hop. - &prompt.root; route add network 192.168.2.0/24 192.168.1.2 + &prompt.root; route add -net 192.168.2.0/24 192.168.1.2 Now RouterA can reach any hosts on the 192.168.2.0/24 @@ -894,13 +894,13 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 You will need to know a few things about the wireless network you are joining before you start. In this example, we are joining a network that has a name of - my_net, and encryption turned off. + my_net, and encryption turned off. - Note: In this example, we are not using encryption, which + In this example, we are not using encryption, which is a dangerous situation. In the next section, you will learn - how to turn on encryption, and why it is important to do so, + how to turn on encryption, why it is important to do so, and why some encryption technologies still do not completely - protect you. + protect you. Make sure your card is recognized by FreeBSD: @@ -916,13 +916,13 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 channel 10 authmode OPEN powersavemode OFF powersavesleep 100 wepmode OFF weptxkey 1 - Now, we will set the card to the correct settings for our + Now, we can set the card to the correct settings for our network: - &prompt.root; ifconfig wi0 inet 192.168.0.20 netmask 255.255.255.0 ssid my_net + &prompt.root; ifconfig wi0 inet 192.168.0.20 netmask 255.255.255.0 ssid my_net - Replace 192.168.0.20 and - 255.255.255.0 with a valid IP + Replace 192.168.0.20 and + 255.255.255.0 with a valid IP address and netmask on your wired network. Remember, our access point is bridging the data between the wireless network, and the wired network, so it will appear to the other @@ -942,8 +942,8 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 should return some information, and you should see: status: associated - If it does not show associated, then you may be out of - range of the access point, do not have encryption on, or + If it does not show associated, then you may be out of + range of the access point, have encryption on, or possibly have a configuration problem. @@ -966,7 +966,7 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 of the air. The two most common ways to encrypt the data between your - client and the access point, are WEP, and &man.ipsec.4;. + client and the access point are WEP, and &man.ipsec.4;. WEP @@ -981,13 +981,13 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 It is better than nothing, so use the following to turn on WEP on your new FreeBSD access point: - &prompt.root; ifconfig wi0 inet up ssid my_net wepmode on wepkey 0x1234567890 media DS/11Mbps mediaopt hostap + &prompt.root; ifconfig wi0 inet up ssid my_net wepmode on wepkey 0x1234567890 media DS/11Mbps mediaopt hostap And you can turn on WEP on a client with this command: - &prompt.root; ifconfig wi0 inet 192.168.0.20 netmask 255.255.255.0 ssid my_net wepmode on wepkey 0x1234567890 + &prompt.root; ifconfig wi0 inet 192.168.0.20 netmask 255.255.255.0 ssid my_net wepmode on wepkey 0x1234567890 - Note that you should replace the 0x1234567890 with a more unique key. + Note that you should replace the 0x1234567890 with a more unique key. @@ -1020,7 +1020,7 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 The bsd-airtools utilities can be installed from the net/bsd-airtools port. Information on - installing ports can be found in of the + installing ports can be found in of this handbook. The program dstumbler is the packaged @@ -1038,9 +1038,9 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 - The <application>wicontrol</application>, <application>ancontrol</application> and <application>raycontrol</application> Utilities + The <command>wicontrol</command>, <command>ancontrol</command> and <command>raycontrol</command> Utilities - These are the tools you use to control how your wireless + These are the tools you can use to control how your wireless card behaves on the wireless network. In the examples above, we have chosen to use &man.wicontrol.8;, since our wireless card is a wi0 interface. If you had a Cisco @@ -1051,10 +1051,10 @@ wi0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 - The <application>ifconfig</application> Command + The <command>ifconfig</command> Command ifconfig - &man.ifconfig.8; can be used to do many of the same options + The &man.ifconfig.8; command can be used to do many of the same options as &man.wicontrol.8;, however it does lack a few options. Check &man.ifconfig.8; for command line parameters and options.