1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Wireless Survey

Discussion in 'Tomato Firmware' started by rs232, Apr 22, 2011.

  1. rs232

    rs232 Network Guru Member

    What does actually "Capabilities" mean when you find networks under wireless survey?

    My wireless is wpa2 however it's reported a infra wep (?):

    Code:
    infra wep
    shortpre 
    shortslot
    802.11n
    
    Also what shortslot stands for?

    Not very clear I have to say...
     
  2. TexasFlood

    TexasFlood Network Guru Member

  3. rs232

    rs232 Network Guru Member

    Thanks!

    I'm wondering is this reporting tomato does can be improved. I mean, my windows xp tells me if a network is wep, wpa or wpa2...
     
  4. TexasFlood

    TexasFlood Network Guru Member

    First of all, Windows XP has like a million times more code and size than Tomato firmware. Having said that, Linux based routers and Tomato are very powerful, but there are practical limits many dictated by space, how many features you can cram in there and what's worth the space or not. You often have the option of getting your own report with a scripted command of your own, read on for an example.

    If it says "WEP", means it's encrypted, not sure how much value it is to know the details of the encryption. I think the firmware is essentially taking the output of the integrated scanning capabilities of the "wl" command and parsing the summary info to the GUI.

    You can see the results of a scan in it's most basic form by telnet/SSH-ing to your router and typing "wl scan" {enter} followed by "wl scanresults|more" {enter}, or type "wl scan" {execute} followed by "wl scanresults" {execute} into the Tools->System command window if you're running a version of Tomato which supports that. There are, of course, optional parameters for the scan command and incremental forms iscan_s and iscan_c if you want to get fancy. You can see there is some additional information available there such as security type details if found in the scan. I saw TKIP WPA-PSK, AES-CCMP, etc. Didn't notice it differentiating WPA2 but maybe my results just didn't have an AP with WPA2. Although it seems simple, updating the GUI report to reflect that might be more of a coding challenge than it's worth, you'd have to ask one of the developers.

    Here's an example, a randomly selected section from the output on my router:
    Code:
    SSID: "fakessid1" 
    Mode: Managed	RSSI: -75 dBm	noise: -82 dBm	Flags: FromBcn 	Channel: 1 
    BSSID: 00:23:75:07:3A:70	Capability: ESS WEP ShortSlot  
    Supported Rates: [ 1(b) 2(b) 5.5(b) 11(b) 6 6 9 12 18 24 36 48 54 ] 
     
    SSID: "fakessid2" 
    Mode: Managed	RSSI: -71 dBm	noise: -92 dBm	Channel: 1 
    BSSID: 98:FC:11:42:18:FE	Capability: ESS WEP ShortSlot  
    Supported Rates: [ 1(b) 2(b) 5.5(b) 11(b) 18 24 36 54 6 9 12 48 ] 
    RSN: 
    	multicast cipher: AES-CCMP 
    	unicast ciphers(1): AES-CCMP  
    	AKM Suites(1): WPA-PSK  
    	Capabilities(0x000c): No Pre-Auth, Pairwise, 16 PTK Replay Ctrs1 GTK Replay Ctr 
    802.11N Capable: 
    	Chanspec: 2.4GHz channel 1 20MHz (0x2b01) 
    	Control channel: 1 
    	802.11N Capabilities: SGI20 SGI40  
    	Supported MCS : [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 32 ] 
     
    SSID: "fakessid3" 
    Mode: Managed	RSSI: -74 dBm	noise: -94 dBm	Channel: 1 
    BSSID: C0:C1:C0:4D:78:A4	Capability: ESS WEP ShortSlot  
    Supported Rates: [ 1(b) 2(b) 5.5(b) 11(b) 18 24 36 54 6 9 12 48 ] 
    WPA: 
    	multicast cipher: TKIP 
    	unicast ciphers(2): AES-CCMP TKIP  
    	AKM Suites(1): WPA-PSK  
    	Capabilities(0x000c): Pairwise, 16 PTK Replay Ctrs 
    RSN: 
    	multicast cipher: TKIP 
    	unicast ciphers(2): AES-CCMP TKIP  
    	AKM Suites(1): WPA-PSK  
    	Capabilities(0x000c): No Pre-Auth, Pairwise, 16 PTK Replay Ctrs1 GTK Replay Ctr 
    802.11N Capable: 
    	Chanspec: 2.4GHz channel 1 20MHz (0x2b01) 
    	Control channel: 1 
    	802.11N Capabilities: SGI20 SGI40  
    	Supported MCS : [ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 32 ] 
     
    SSID: "fakessid4" 
    Mode: Managed	RSSI: -64 dBm	noise: -94 dBm	Channel: 5 
    BSSID: E0:91:F5:A4:B9:FA	Capability: ESS WEP ShortPre ShortSlot  
    Supported Rates: [ 1(b) 2(b) 5.5(b) 11(b) 6(b) 9 12(b) 18 24(b) 36 48 54 ] 
    WPA: 
    	multicast cipher: TKIP 
    	unicast ciphers(2): AES-CCMP TKIP  
    	AKM Suites(1): WPA-PSK  
    	No WPA Capabilities advertised 
    RSN: 
    	multicast cipher: TKIP 
    	unicast ciphers(2): AES-CCMP TKIP  
    	AKM Suites(1): WPA-PSK  
    	Capabilities(0x0000): No Pre-Auth, Pairwise, 1 PTK Replay Ctr1 GTK Replay Ctr 
    802.11N Capable: 
    	Chanspec: 2.4GHz channel 5 40MHz (0x2d05) 
    	Control channel: 3 
    	802.11N Capabilities: 40Mhz SGI40  
    	Supported MCS : [ 0 1 2 3 4 5 6 7 ]
     

Share This Page