Integration Manual

JODY-W3 series - System integration manual
UBX-19011209 - R07 Software Page 48 of 71
C2-Restricted
vht_oper_chwidth=1
vht_oper_centr_freq_seg0_idx=42
ieee80211ax=1
he_su_beamformer=1
he_bss_color=1
he_oper_chwidth=1
he_oper_centr_freq_seg0_idx=42
eapol_version=1
wpa_key_mgmt=WPA-PSK
wpa=2
rsn_pairwise=CCMP
wpa_passphrase=1234567890
The access point is started with the command:
hostapd hostapd_ax5g.conf -B
Use the command with the options -dddt to generate detailed log files for debugging purpose.
A hostapd configuration file example for 802.11ax operation in the 2.4 GHz band and WPA2 security
is shown below.
# File: hostapd_ax2g.conf
interface=uap0
driver=nl80211
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
ieee80211d=1
country_code=US
beacon_int=100
dtim_period=1
wmm_enabled=1
uapsd_advertisement_enabled=1
ssid= JODY-W3-AX2G
ignore_broadcast_ssid=0
hw_mode=g
channel=11
auth_algs=1
max_num_sta=10
ieee80211n=1
require_ht=0
ht_capab=[LDPC][GF][SHORT-GI-20][TX-STBC][RX-STBC1][HT20]
ieee80211ac=0
ieee80211ax=1
he_su_beamformer=1
he_bss_color=1
eapol_version=1
wpa_key_mgmt=WPA-PSK
wpa=2
wpa_pairwise=CCMP
wpa_passphrase=1234567890
3.8.6.2 Using internal authenticator
Access point can be configured using the uaputl configuration tool provided by NXP. NXP firmware
has internal authenticator functionalities that are used in this case.
In the following example, two concurrent access points are created. The first access point is
configured for 802.11ax operation in the 5 GHz band using the uap0 interface. It uses an SSID value -
JODY-W3-5Gand the passphrase "12345678" for WPA2 based security. The second access point
is configured for 802.11n in the 2.4 GHz band using the muap0 interface. It uses an SSID value -
JODY-W3-2G and no security. The description of the individual commands is provided in the
README_UAP file in the driver package.