Setup guide

Flags: X - disabled, R - running, D - dynamic
0 R name="wds1" mtu=1500 mac-address=00:01:24:70:3B:AE arp=enabled
disable-running-check=no master-inteface=wlan1
wds-address=00:01:24:70:3A:83
[admin@Neighbour] interface wireless wds>
Add the IP address:
[admin@Neighbour] ip address> add address=192.168.25.1/24 interface=wds1
[admin@Neighbour] ip address> print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK BROADCAST INTERFACE
0 192.168.25.1/24 192.168.25.0 192.168.25.255 wds1
[admin@Neighbour] ip address>
And now you can check whether the WDS link works:
[admin@Neighbour] ip address> /ping 192.168.25.2
192.168.25.2 64 byte ping: ttl=64 time=6 ms
192.168.25.2 64 byte ping: ttl=64 time=4 ms
192.168.25.2 64 byte ping: ttl=64 time=4 ms
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max = 4/4.4/6 ms
[admin@Neighbour] ip address>
Wireless Security Example
Let us consider that we want to secure all data for all wireless clients that are connecting to our AP.
At first, add addresses to the wireless interfaces.
On the AP:
[admin@AP] ip address> add address=192.168.1.1/24 interface=wlan1
[admin@AP] ip address> print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK BROADCAST INTERFACE
0 192.168.1.1/24 192.168.1.0 192.168.1.255 wlan1
[admin@AP] ip address>
And on the client:
[admin@Client] ip address> add address=192.168.1.2/24 interface=wlan1
[admin@AP] ip address> print
Flags: X - disabled, I - invalid, D - dynamic
# ADDRESS NETWORK BROADCAST INTERFACE
0 192.168.1.2/24 192.168.1.0 192.168.1.255 wlan1
[admin@Client] ip address>
On the AP set the security to required and choose which encryption algorithm to use:
[admin@AP] interface wireless security> set 0 security=required \
\... algo-1=40bit-wep key-1=0123456789 transmit-key=key-1
[admin@AP] interface wireless security> print
0 name="wlan1" security=required algo-0=none key-0=""
algo-1=40bit-wep key-1="0123456789" algo-2=none key-2="" algo-3=none key-3=""
transmit-key=key-1 sta-private-algo=none sta-private-key=""
radius-mac-authentication=no
[admin@AP] interface wireless security>
On the client side do the same:
[admin@Client] interface wireless security> set 0 security=required \
\ algo-1=40bit-wep key-1=0123456789 transmit-key=key-1
[admin@AP] interface wireless security> print
0 name="wlan1" security=required algo-0=none key-0=""
algo-1=40bit-wep key-1="0123456789" algo-2=none key-2="" algo-3=none key-3=""
transmit-key=key-1 sta-private-algo=none sta-private-key=""
radius-mac-authentication=no
[admin@Client] interface wireless security>
Finally, test the link:
[admin@Client] interface wireless security> /ping 192.168.1.1
192.168.1.1 64 byte ping: ttl=64 time=22 ms