Scanning
You can use different tools to scan the wireless network:
To scan with the nmcli tool:
~# nmcli dev wifi rescan ~# nmcli dev wifi list * SSID MODE CHAN RATE SIGNAL BARS SECURITY ap-wlan1-wpa2aes_a Infra 36 54 Mbit/s 69 *** WPA2 Buffalo_AG300H_5_N Infra 36 63 Mbit/s 60 *** WPA2 -- Infra 132 54 Mbit/s 50 ** WPA1 802.1X LINKSYSENG Infra 11 54 Mbit/s 60 *** WPA2 Connect Infra 11 54 Mbit/s 57 *** WPA2 RoamingNetwork Infra 9 54 Mbit/s 49 ** WPA2 DAP-GUEST Infra 11 54 Mbit/s 49 ** WPA1 -- Infra 11 54 Mbit/s 49 ** WPA2 802.1X TP-LINK_26B9 Infra 1 54 Mbit/s 45 ** WPA2 802.1X DAP-GUEST Infra 1 54 Mbit/s 45 ** WPA1 NETGEAR_WPA2AES Infra 11 54 Mbit/s 42 ** WPA2 -- Infra 1 54 Mbit/s 42 ** WPA1 802.1X Orange-f702 Infra 6 54 Mbit/s 35 ** WPA1 WPA2 _AUTO_ONOWiFi Infra 1 54 Mbit/s 24 * WPA1 WPA2 802.1X Cisco_2600_WEP128_HEX4 Infra 5 54 Mbit/s 87 **** WEP Cisco_2600_WEP128_HEX4 Infra 2 54 Mbit/s 79 *** WEP -- Infra 1 54 Mbit/s 47 ** WEP Silicon Labs Thread 1F8A Infra 6 54 Mbit/s 20 * -- * Cisco_1200G_EAP_PEAP Infra 6 54 Mbit/s 61 *** WPA2 802.1X Buffalo_AG300H_24_N Infra 6 63 Mbit/s 62 *** WPA2 802.1X -- Infra 52 54 Mbit/s 57 *** WPA1 802.1X cisco_hb_aes Infra 6 54 Mbit/s 34 ** WPA1 WPA2 Nebraska Infra 6 54 Mbit/s 29 * WPA2 MOVISTAR_0F50 Infra 6 54 Mbit/s 19 * WPA2 ONO0D9C Infra 9 54 Mbit/s 17 * WPA2 SARES_Cisco_1200 Infra 6 54 Mbit/s 15 * WPA2 -- Infra 11 54 Mbit/s 50 ** WEP _ONOWiFi Infra 9 54 Mbit/s 20 * -- * SSID MODE CHAN RATE SIGNAL BARS SECURITY
To scan with the iw tool:
~# iw dev wlan0 scan BSS 84:b5:17:40:a7:c0(on wlan0) -- associated TSF: 546312162668 usec (6d, 07:45:12) freq: 5180 beacon interval: 102 TUs capability: ESS Privacy SpectrumMgmt (0x0111) signal: -11.00 dBm last seen: 0 ms ago Information elements from Probe Response frame: SSID: Cisco_2600_WPA2_AES Supported rates: 6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 HT capabilities: Capabilities: 0x19ee HT20/HT40 SM Power Save disabled RX HT20 SGI RX HT40 SGI TX STBC RX STBC 1-stream Max AMSDU length: 7935 bytes DSSS/CCK HT40 Maximum RX AMPDU length 65535 bytes (exponent: 0x003) Minimum RX AMPDU time spacing: 8 usec (0x06) HT RX MCS rate indexes supported: 0-23 HT TX MCS rate indexes are undefined RSN: * Version: 1 * Group cipher: CCMP * Pairwise ciphers: CCMP * Authentication suites: PSK * Capabilities: 16-PTKSA-RC 16-GTKSA-RC (0x003c) HT operation: * primary channel: 36 * secondary channel offset: no secondary * STA channel width: 20 MHz * RIFS: 1 * HT protection: no * non-GF present: 1 * OBSS non-GF present: 0 * dual beacon: 0 * dual CTS protection: 0 * STBC beacon: 0 * L-SIG TXOP Prot: 0 * PCO active: 0 * PCO phase: 0 WMM: * Parameter version 1 * u-APSD * BE: CW 15-1023, AIFSN 3 * BK: CW 15-1023, AIFSN 7 * VI: CW 7-15, AIFSN 2, TXOP 3008 usec * VO: CW 3-7, AIFSN 2, TXOP 1504 usec BSS 6c:99:89:76:43:9f(on wlan0) (truncated)
To scan with the wpa_cli tool:
~# wpa_cli -iwlan0 scan ~# wpa_cli -iwlan0 scan_results bssid / frequency / signal level / flags / ssid 84:b5:17:40:a7:c0 5180 -11 [WPA2-PSK-CCMP][ESS] Cisco_2600_WPA2_AES 84:b5:17:40:a7:c0 5180 -11 [WPA2-PSK-CCMP][ESS] \x00 6c:99:89:76:43:92 2462 -70 [WPA-PSK-CCMP+TKIP][ESS] DAP-GUEST 58:6d:8f:ea:0e:7a 2462 -71 [WPA2-PSK-CCMP][WPS][ESS] LINKSYSENG d8:eb:97:ab:11:20 5240 -81 [WPA2-PSK-CCMP][ESS] RoamingNetwork_A 6c:99:89:76:43:90 2462 -75 [WPA2-EAP-CCMP][ESS] \x00 68:7f:74:17:cc:c4 2437 -75 [WPA2-PSK-CCMP][ESS] WRT610N 6c:99:89:76:43:9f 5260 -82 [WPA2-EAP-CCMP][ESS] \x00 6c:99:89:76:43:9e 5260 -82 [WPA-EAP-TKIP][ESS] \x00 a4:2b:b0:de:26:b9 2437 -82 [WPA-PSK-CCMP][WPA2-PSK-CCMP][WPS][ESS] TP-LINK_26B9 e0:0e:da:38:c1:cf 5320 -91 [WPA2-EAP-CCMP][ESS] \x00 6c:99:89:76:43:93 2462 -70 [WEP][ESS] \x00 e0:0e:da:38:c1:c3 2412 -78 [WEP][ESS] \x00 ec:e1:a9:9a:66:50 5580 -83 [ESS] cisco_me_open_5g 00:90:4c:91:00:01 2462 -84 [ESS] Connect
Connect
You can use NetworkManager to connect to a wireless network. Run nmcli with parameter '-a' to be prompted for any missing parameters, like Wi-Fi password:
~# nmcli dev wifi connect TP-LINK_2A39_5G -a Password: Device 'wlan0' successfully activated with '26130be0-7ac4-49f7-a97e-bf68ef8c443b'. ~#
Link status
You can use different tools to get information about the status of the Wi-Fi interfaces:
To get the status of all devices managed by NetworkManager, use the nmcli tool:
~# nmcli dev status DEVICE TYPE STATE CONNECTION eth1 ethernet connected eth1 wlan0 wifi connected wlan0 eth0 ethernet unavailable -- can0 can unmanaged -- lo loopback unmanaged -- sit0 sit unmanaged -- wlan1 wifi unmanaged --
To get the status with the iw tool:
~# iw dev wlan0 link Connected to 84:b5:17:40:a7:c0 (on wlan0) SSID: Cisco_2600_WPA2_AES freq: 5180 RX: 14188 bytes (110 packets) signal: -11 dBm tx bitrate: 72.2 MBit/s MCS 7 short GI
To get the status with the wpa_cli tool:
~# wpa_cli -iwlan0 status bssid=84:b5:17:40:a7:c0 freq=5180 ssid=Cisco_2600_WPA2_AES id=0 mode=station pairwise_cipher=CCMP group_cipher=CCMP key_mgmt=WPA2-PSK wpa_state=COMPLETED ip_address=192.168.43.30 p2p_device_address=00:40:9d:98:a6:84 address=00:40:9d:98:a6:84 uuid=883ffae7-742b-59c4-9422-ab29a4b2ab6a
Link capabilities
Use the following command to get a list of wireless link capabilities:
~# iw list