Translation

(itstool) path: callout/para
This field indicates the network name (<acronym>SSID</acronym>).
54/640
Context English Turkish (tr_TR) State
Or, try to configure the interface manually using the information in <filename>/etc/wpa_supplicant.conf</filename>: Veya <filename> /etc/wpa_supplicant.conf </filename> içindeki bilgileri kullanarak arayüzü el ile yapılandırmayı deneyin:
<prompt>#</prompt> <userinput>wpa_supplicant -i <replaceable>wlan0</replaceable> -c /etc/wpa_supplicant.conf</userinput>
Trying to associate with 00:11:95:c3:0d:ac (SSID='freebsdap' freq=2412 MHz)
Associated with 00:11:95:c3:0d:ac
WPA: Key negotiation completed with 00:11:95:c3:0d:ac [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:11:95:c3:0d:ac completed (auth) [id=0 id_str=]
<prompt>#</prompt> <userinput>wpa_supplicant -i <replaceable>wlan0</replaceable> -c /etc/wpa_supplicant.conf</userinput>
Trying to associate with 00:11:95:c3:0d:ac (SSID='freebsdap' freq=2412 MHz)
Associated with 00:11:95:c3:0d:ac
WPA: Key negotiation completed with 00:11:95:c3:0d:ac [PTK=CCMP GTK=CCMP]
CTRL-EVENT-CONNECTED - Connection to 00:11:95:c3:0d:ac completed (auth) [id=0 id_str=]
The next operation is to launch <citerefentry><refentrytitle>dhclient</refentrytitle><manvolnum>8</manvolnum></citerefentry> to get the <acronym>IP</acronym> address from the <acronym>DHCP</acronym> server: Bir sonraki işlem, <acronym> DHCP </ kısaltmasından <acronym> IP </acronym> adresini almak için <citerefentry><refentrytitle>dhclient</refentrytitle><manvolnum>8</manvolnum> </citerefentry> 'i başlatmaktır. > sunucu:
<prompt>#</prompt> <userinput>dhclient <replaceable>wlan0</replaceable></userinput>
DHCPREQUEST on wlan0 to 255.255.255.255 port 67
DHCPACK from 192.168.0.1
bound to 192.168.0.254 -- renewal in 300 seconds.
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable></userinput>
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.254 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet OFDM/36Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
<prompt>#</prompt> <userinput>dhclient <replaceable>wlan0</replaceable></userinput>
DHCPREQUEST on wlan0 to 255.255.255.255 port 67
DHCPACK from 192.168.0.1
bound to 192.168.0.254 -- renewal in 300 seconds.
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable></userinput>
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.254 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet OFDM/36Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
If <filename>/etc/rc.conf</filename> has an <literal>ifconfig_wlan0="DHCP"</literal> entry, <citerefentry><refentrytitle>dhclient</refentrytitle><manvolnum>8</manvolnum></citerefentry> will be launched automatically after <citerefentry><refentrytitle>wpa_supplicant</refentrytitle><manvolnum>8</manvolnum></citerefentry> associates with the access point. <filename> /etc/rc.conf </filename> bir <literal> ifconfig_wlan0 = "DHCP" </literal> girişine sahipse, <citerefentry><refentrytitle>dhclient</refentrytitle> <manvolnum> 8 </manvolnum> < / citerefentry>, <citerefentry><refentrytitle>wpa_supplicant</refentrytitle><manvolnum>8</manvolnum> </citerefentry> erişim noktasıyla ilişkilendirildikten sonra otomatik olarak başlatılacaktır.
If <acronym>DHCP</acronym> is not possible or desired, set a static <acronym>IP</acronym> address after <citerefentry><refentrytitle>wpa_supplicant</refentrytitle><manvolnum>8</manvolnum></citerefentry> has authenticated the station: <acronym> DHCP </acronym> mümkün değilse veya istenmiyorsa, <citerefentry><refentrytitle>wpa_supplicant</refentrytitle> <manvolnum> 8 </manvolnum> </ citerefentry'den sonra statik bir <acronym> IP </acronym> adresi ayarlayın > istasyonun kimliğini doğruladı:
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable> inet <replaceable>192.168.0.100</replaceable> netmask <replaceable>255.255.255.0</replaceable></userinput>
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable></userinput>
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.100 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet OFDM/36Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable> inet <replaceable>192.168.0.100</replaceable> netmask <replaceable>255.255.255.0</replaceable></userinput>
<prompt>#</prompt> <userinput>ifconfig <replaceable>wlan0</replaceable></userinput>
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.100 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet OFDM/36Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
When <acronym>DHCP</acronym> is not used, the default gateway and the nameserver also have to be manually set: <acronym> DHCP </acronym> kullanılmadığında, varsayılan ağ geçidi ve ad sunucusu da manuel olarak ayarlanmalıdır:
<prompt>#</prompt> <userinput>route add default <replaceable>your_default_router</replaceable></userinput>
<prompt>#</prompt> <userinput>echo "nameserver <replaceable>your_DNS_server</replaceable>" &gt;&gt; /etc/resolv.conf</userinput>
<prompt>#</prompt> <userinput>route add default <replaceable>your_default_router</replaceable></userinput>
<prompt>#</prompt> <userinput>echo "nameserver <replaceable>your_DNS_server</replaceable>" &gt;&gt; /etc/resolv.conf</userinput>
<acronym>WPA</acronym> with <acronym>EAP-TLS</acronym> <acronym>WPA</acronym> ile <acronym>EAP-TLS</acronym>
The second way to use <acronym>WPA</acronym> is with an 802.1X backend authentication server. In this case, <acronym>WPA</acronym> is called <acronym>WPA</acronym> Enterprise to differentiate it from the less secure <acronym>WPA</acronym> Personal. Authentication in <acronym>WPA</acronym> Enterprise is based on the Extensible Authentication Protocol (<acronym>EAP</acronym>). <acronym> WPA </acronym> 'ı kullanmanın ikinci yolu 802.1X arka uç kimlik doğrulama sunucusudur. Bu durumda, onu daha az güvenli olan <acronym> WPA </acronym> Personal'dan ayırmak için <acronym> WPA </acronym> <acronym> WPA </acronym> girişim olarak adlandırılır. <acronym> WPA </acronym> girişim içindeki kimlik doğrulama, Genişletilebilir Kimlik Doğrulama Protokolü'ne (<acronym> EAP </acronym>) dayanır
<acronym>EAP</acronym> does not come with an encryption method. Instead, <acronym>EAP</acronym> is embedded inside an encrypted tunnel. There are many <acronym>EAP</acronym> authentication methods, but <acronym>EAP-TLS</acronym>, <acronym>EAP-TTLS</acronym>, and <acronym>EAP-PEAP</acronym> are the most common. <acronym> EAP </acronym> bir şifreleme yöntemiyle gelmez. Bunun yerine, <acronym> EAP </acronym> şifreli bir tünelin içine yerleştirilir. Birçok <acronym> EAP </acronym> kimlik doğrulama yöntemi vardır, ancak <acronym> EAP-TLS </acronym>, <acronym> EAP-TTLS </acronym> ve <acronym> EAP-PEAP </acronym> en yaygın.
EAP with Transport Layer Security (<acronym>EAP-TLS</acronym>) is a well-supported wireless authentication protocol since it was the first <acronym>EAP</acronym> method to be certified by the <link xlink:href="http://www.wi-fi.org/">Wi-Fi Alliance</link>. <acronym>EAP-TLS</acronym> requires three certificates to run: the certificate of the Certificate Authority (<acronym>CA</acronym>) installed on all machines, the server certificate for the authentication server, and one client certificate for each wireless client. In this <acronym>EAP</acronym> method, both the authentication server and wireless client authenticate each other by presenting their respective certificates, and then verify that these certificates were signed by the organization's <acronym>CA</acronym>. Aktarım Katmanı Güvenliği ile EAP (<acronym> EAP-TLS </acronym>), <link xlink: href = tarafından onaylanan ilk <acronym> EAP </acronym> yöntemi olduğundan iyi desteklenen bir kablosuz kimlik doğrulama protokolüdür. "http://www.wi-fi.org/">WiFi İttifakı </link>. <acronym> EAP-TLS </acronym> çalıştırmak için üç sertifika gerektirir: tüm makinelerde yüklü Sertifika Yetkilisi (<acronym> CA </acronym>), kimlik doğrulama sunucusu için sunucu sertifikası ve her kablosuz istemci. Bu <acronym> EAP </acronym> yönteminde, hem kimlik doğrulama sunucusu hem de kablosuz istemci, ilgili sertifikalarını sunarak birbirlerinin kimliğini doğrular ve ardından bu sertifikaların kuruluşun <acronym> CA </acronym> tarafından imzalandığını doğrular.
As previously, the configuration is done via <filename>/etc/wpa_supplicant.conf</filename>: Daha önce olduğu gibi, yapılandırma <filename> /etc/wpa_supplicant.conf </filename> ile yapılır:
network={
ssid="freebsdap" <co xml:id="co-tls-ssid"/>
proto=RSN <co xml:id="co-tls-proto"/>
key_mgmt=WPA-EAP <co xml:id="co-tls-kmgmt"/>
eap=TLS <co xml:id="co-tls-eap"/>
identity="loader" <co xml:id="co-tls-id"/>
ca_cert="/etc/certs/cacert.pem" <co xml:id="co-tls-cacert"/>
client_cert="/etc/certs/clientcert.pem" <co xml:id="co-tls-clientcert"/>
private_key="/etc/certs/clientkey.pem" <co xml:id="co-tls-pkey"/>
private_key_passwd="freebsdmallclient" <co xml:id="co-tls-pwd"/>
}
network={
ssid="freebsdap" <co xml:id="co-tls-ssid"/>
proto=RSN <co xml:id="co-tls-proto"/>
key_mgmt=WPA-EAP <co xml:id="co-tls-kmgmt"/>
eap=TLS <co xml:id="co-tls-eap"/>
identity="loader" <co xml:id="co-tls-id"/>
ca_cert="/etc/certs/cacert.pem" <co xml:id="co-tls-cacert"/>
client_cert="/etc/certs/clientcert.pem" <co xml:id="co-tls-clientcert"/>
private_key="/etc/certs/clientkey.pem" <co xml:id="co-tls-pkey"/>
private_key_passwd="freebsdmallclient" <co xml:id="co-tls-pwd"/>
}
This field indicates the network name (<acronym>SSID</acronym>). Bu alan ağ adını gösterir (<acronym> SSID </acronym>).
This example uses the <acronym>RSN</acronym> <trademark class="registered">IEEE</trademark> 802.11i protocol, also known as <acronym>WPA2</acronym>. Bu örnekte, <acronym> WPA2 </acronym> olarak da bilinen <acronym> RSN </acronym> <trademark class = "kayıtlı"> IEEE </trademark> 802.11i protokolü kullanılmaktadır.
The <literal>key_mgmt</literal> line refers to the key management protocol to use. In this example, it is <acronym>WPA</acronym> using <acronym>EAP</acronym> authentication. <literal> key_mgmt </literal> satırı, kullanılacak anahtar yönetimi protokolünü ifade eder. Bu örnekte, <acronym> EAP </acronym> kimlik doğrulaması kullanılarak <acronym> WPA </acronym> kullanılır.
This field indicates the <acronym>EAP</acronym> method for the connection. Bu alan bağlantı için <acronym> EAP </acronym> yöntemini gösterir.
The <literal>identity</literal> field contains the identity string for <acronym>EAP</acronym>. <literal> kimlik </literal> alanı, <acronym> EAP </acronym> için kimlik dizesini içerir.
The <literal>ca_cert</literal> field indicates the pathname of the <acronym>CA</acronym> certificate file. This file is needed to verify the server certificate. <literal> ca_cert </literal> alanı, <acronym> CA </acronym> sertifika dosyasının yol adını belirtir. Bu dosya, sunucu sertifikasını doğrulamak için gereklidir.
The <literal>client_cert</literal> line gives the pathname to the client certificate file. This certificate is unique to each wireless client of the network. The <literal>client_cert</literal> line gives the pathname to the client certificate file. This certificate is unique to each wireless client of the network.
The <literal>private_key</literal> field is the pathname to the client certificate private key file. The <literal>private_key</literal> field is the pathname to the client certificate private key file.
The <literal>private_key_passwd</literal> field contains the passphrase for the private key. <literal> private_key_passwd </literal> alanı, özel anahtarın parolasını içerir.
Then, add the following lines to <filename>/etc/rc.conf</filename>: Ardından, <filename> /etc/rc.conf </filename> öğesine aşağıdaki satırları ekleyin:
The next step is to bring up the interface: Bir sonraki adım arayüzü açmaktır:
<prompt>#</prompt> <userinput>service netif start</userinput>
Starting wpa_supplicant.
DHCPREQUEST on wlan0 to 255.255.255.255 port 67 interval 7
DHCPREQUEST on wlan0 to 255.255.255.255 port 67 interval 15
DHCPACK from 192.168.0.20
bound to 192.168.0.254 -- renewal in 300 seconds.
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.254 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet DS/11Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
<prompt>#</prompt> <userinput>service netif start</userinput>
Starting wpa_supplicant.
DHCPREQUEST on wlan0 to 255.255.255.255 port 67 interval 7
DHCPREQUEST on wlan0 to 255.255.255.255 port 67 interval 15
DHCPACK from 192.168.0.20
bound to 192.168.0.254 -- renewal in 300 seconds.
wlan0: flags=8843&lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&gt; mtu 1500
ether 00:11:95:d5:43:62
inet 192.168.0.254 netmask 0xffffff00 broadcast 192.168.0.255
media: IEEE 802.11 Wireless Ethernet DS/11Mbps mode 11g
status: associated
ssid freebsdap channel 1 (2412 Mhz 11g) bssid 00:11:95:c3:0d:ac
country US ecm authmode WPA2/802.11i privacy ON deftxkey UNDEF
AES-CCM 3:128-bit txpower 21.5 bmiss 7 scanvalid 450 bgscan
bgscanintvl 300 bgscanidle 250 roam:rssi 7 roam:rate 5 protmode CTS
wme burst roaming MANUAL
It is also possible to bring up the interface manually using <citerefentry><refentrytitle>wpa_supplicant</refentrytitle><manvolnum>8</manvolnum></citerefentry> and <citerefentry><refentrytitle>ifconfig</refentrytitle><manvolnum>8</manvolnum></citerefentry>. Arabirimi <citerefentry><refentrytitle>wpa_supplicant</refentrytitle><manvolnum>8</manvolnum> </citerefentry> ve <citerefentry><refentrytitle>ifconfig</refentry> 8 < </ manvolnum> </ citerefentry>.
<acronym>WPA</acronym> with <acronym>EAP-TTLS</acronym> <acronym>WPA</acronym> with <acronym>EAP-TTLS</acronym>
With <acronym>EAP-TLS</acronym>, both the authentication server and the client need a certificate. With <acronym>EAP-TTLS</acronym>, a client certificate is optional. This method is similar to a web server which creates a secure <acronym>SSL</acronym> tunnel even if visitors do not have client-side certificates. <acronym>EAP-TTLS</acronym> uses an encrypted <acronym>TLS</acronym> tunnel for safe transport of the authentication data. <acronym> EAP-TLS </acronym> ile, hem kimlik doğrulama sunucusunun hem de istemcinin bir sertifikaya ihtiyacı vardır. <acronym> EAP-TTLS </acronym> ile istemci sertifikası isteğe bağlıdır. Bu yöntem, ziyaretçilerin istemci tarafı sertifikaları olmasa bile güvenli bir <acronym> SSL </acronym> tüneli oluşturan bir web sunucusuna benzer. <acronym> EAP-TTLS </acronym>, kimlik doğrulama verilerinin güvenli taşınması için şifreli bir <acronym> TLS </acronym> tüneli kullanır.
The required configuration can be added to <filename>/etc/wpa_supplicant.conf</filename>: Gerekli yapılandırma <filename> /etc/wpa_supplicant.conf </filename> dosyasına eklenebilir:

Loading…

This field indicates the network name (<acronym>SSID</acronym>).
Bu alan ağ adını gösterir (<acronym> SSID </acronym>).
4 months ago
Browse all component changes

Glossary

English Turkish (tr_TR)
GNOME (GNU Network Object Model Environment) GNU Ağ Nesne Modeli Ortamı FreeBSD Doc
internal network iç şebeke FreeBSD Doc
internal network yerel ağ FreeBSD Doc
name server ad sunucusu FreeBSD Doc
network FreeBSD Doc
network card ethernet kartı,ağ kartı FreeBSD Doc
network file system ağ dosya sistemi FreeBSD Doc
network interface ağ arayüzü FreeBSD Doc
network monitoring ağ izleme FreeBSD Doc
network printer ağ yazıcısı FreeBSD Doc
network service ağ hizmeti FreeBSD Doc
path name yol adı FreeBSD Doc
raw network sockets ham ağ soketleri FreeBSD Doc
Virtual Private Network Sanal Özel Ağlar FreeBSD Doc

Source information

Source string comment
(itstool) path: callout/para
Source string location
book.translate.xml:63537
String age
6 months ago
Source string age
a year ago
Translation file
books/tr_TR/handbook.po, string 10404