# /etc/network/interfaces -- configuration file for ifup(8), ifdown(8) # The loopback interface auto lo iface lo inet loopback # Wireless interfaces # # Example of an unencrypted (no WEP or WPA) wireless connection # that connects to any available access point: # iface wlan0 inet dhcp wireless_mode managed wireless_essid any # # # Same as above but locked to a specific access point: # #iface wlan0 inet dhcp # wireless_mode managed # wireless-essid some-essid # # A WEP encrypted connection locked to a specific access point: # #iface wlan0 inet dhcp # wireless-essid some-essid # wireless-key s:My-PlainText-Password # wireless-mode managed # # A WPA1 or WPA2 encrypted connection locked to a specific access point. # This is the best option for non-roaming, single-network usage. # Note that your card may require a firmware update to use WPA. # Some distributions install a temporary volatile firmware update on ifup. # #iface wlan0 inet dhcp # wpa-essid some-essid # wpa-psk My-PlainText-Password # # A WPA1 or WPA2 encrypted connection using an external configuration file # for wpa-supplicant. This is the way to go if you need to configure multiple # networks with different keys and / or WPA settings and roaming support. # # iface wlan0 inet dhcp # wpa-conf /etc/wpa_supplicant.conf # wpa-driver hostap iface atml0 inet dhcp # Wired or wireless interfaces auto eth0 iface eth0 inet dhcp iface eth1 inet dhcp # Ethernet/RNDIS gadget (g_ether) # ... or on host side, usbnet and random hwaddr iface usb0 inet static address 192.168.0.202 netmask 255.255.255.0 network 192.168.0.0 gateway 192.168.0.200 # Zaurus 2.4 Lineo net_fd; obsolete iface usbd0 inet static address 192.168.129.201 netmask 255.255.255.0 network 192.168.129.0 gateway 192.168.129.200 # iPAQ 2.4 mach-sa1100/usb-eth # (192.168.0.202 is the iPAQ's IP, 192.168.0.200 is the host's IP) iface usbf inet static address 192.168.0.202 netmask 255.255.255.0 network 192.168.0.0 gateway 192.168.0.200 # Bluetooth networking iface bnep0 inet dhcp