Multiple SSID should not be a problem related to mesh.
On firmware 2.13 you should be able to install batman-adv
One 2.17 you cannot access repo, this is true. When I upgrade firmware for testing, I will try to use the old repo. But you cannnot install kernel modules.
Correction: kmod-batman-adv will install. Having the flu really breaks my reasoning. I’m trying configurations now.
I’m not limited in the number of SSIDs except for the driver limit of 8 which is not the issue. The issue I’m running into with the 802.11s mesh is configuring the bridges to provide some sort of isolation between SSIDs. The 802.11 mesh acts as a virtual switch, much like BATMAN, so even with SSIDs bridged to MESH one bridge per SSID, everything can see everything. There’s not a lot of point in multiple SSIDs if there’s no isolation between them. As the 802.11s mesh is acting as a switch, one might think it would take a VLAN configuration. Thus far I haven’t figured out how to accomplish that. Putting VLANs on the bridges is something I haven’t successfully tested. I’m not trying to get to the Ethernet ports at all. Everything will land on a controller that is part of the mesh and it will deal with assigning addresses to the mesh VLANs, walled garden, etc. (Hint: batman-adv has VLANs - that’s what it is so often selected).
What’s not working? I’ve got 7 AR150s on 2.13 running this config with 3 kmod-batman-adv VLANs on top. Works a charm! Did you establish the adhoc without encryption and test at the adhoc level first? I had trouble initially going directly to a full config. I suspect the settings the GLi web interface is setting in wireless for radio0 (11ng, HT40, and noscan instead of 11g, and HT40). After I worked that bit out the adhoc is working great.
These instructions might work for 802.11s, but I didn’t test 802.11s with this particular method.
I didn’t include any mesh as it doesn’t matter. This puts the interface in ad-hoc and adds encryption. Whatever we do above that with batman-adv or OLSR will ride the interface as it is configured. See the next message for real world testing.
This weekend I ran 8 AR150s at an outdoor festival using the instructions above to establish a secure backbone. A couple of friends swore it wasn’t possible to run security over ad-hoc and did me the favor of validating the configuration while it was live. All of the data packets they captured were encrypted with CCMP (a.k.a. AES). Management frames were of course in the clear and that’s a challenge for another day.
The network covered ~328,000 square feet or ~30,000 square meters. The majority of the units ran with 5 dBi antennas while some ran 11 dBi directional antennas along the edge of the property and through a tree line. Performance was reasonable within 3 hops to the Internet gateway. Beyond 3 hops, round trip time impacted performance and exceeded 500 ms. There was no power in the middle of the property so some APs were 4 hops to the gateway. Still, for the intended purpose, the network ran well. I believe that with proper antennas and a bit more height, I could cut the number of units to 4 while improving the signal and round trip times.
config wifi-iface
option device 'radio0'
option mode 'adhoc'
option ssid 'mesh'
option bssid '02:02:02:02:02:02'
option network 'mesh'
option encryption 'psk2'
option key '********'
Both require replacing wpad-mini with wpad + authsae. I see no reason that psk2 and psk-mixed can't be interchanged and psk2 would of course be the better choice. The end result is still CCMP data packets as they consider that the first stop in WPAd.
M
A lot of people helped get me this far and paying it forward feels right.
By chance, did you eventually go with BATMAN or OLSR?
I went with kmod-batman-adv from a field of OLSR, 802.11s, and BATMANd. Reasons:
VLANs worked on kmod-batman-adv on my first attempt. I had 3 days left until I tilted the towers. Crunch, the great equalizer!
k-b-a, like 802.11s runs at layer 2 (Data Link/MAC) so AP clients can roam without additional tricks. OLSR and BATMANd run at layer 3 requiring things like RELAYd to make it work. Put simply, k-b-a presented a great VLAN trunking switch in the sky. That allowed me to simplify the design.
Considerations for the future:
If 802.11s will support VLANs it has some advantages like diagnostics and visualization included. k-b-a needs alfreD to visualize the network although it adds other capabilities.
k-b-a includes a great deal of "hand wavium"(tm) that one must learn. Multicast rates require a minimum speed or k-b-a ignores them as if they didn't exist. Have fun diagnosing that without visualization. Small packets ping with a reasonable rtt, large packets are dropped. Suddenly we're looking for an MTU issue when it is simply we've caused the radio to shift speeds mid-packet and the link no longer exist to k-b-a.
802.11s allows for slower links. This is good for instance if you have someone running Square. The protocol is light and the additional radio time is not much of a consideration on a network of Square users. They won't stream music, but that isn't the goal. In contrast, k-b-a will require 2 radios to bring the signal level up enough to allow a functioning link. That's two additional towers, radios, power, batteries, enclosures, hops, man hours, etc... when all I have is a client worth $10 on the other end of the link who wants Square. The network needs to bend to meet their expectation and be cost effective.
If so, is adding that file all you needed to do to make encryption work?
If you have an functioning adhoc link regardless of the protocol (batmand, k-b-a, OLSR) these steps will add CCMP/AES:
opkg update
opkg remove wpad-mini
opkg install wpad authsae (authsae does Authorization by the Simultaneous Authentication of Equals and is the real magic here)
edit /etc/config/wireless
For your adhoc network
change option encryption to "psk2"
add option key "yourkey"
repeat on all other routers
wifi down
wait 5...4...3...2...1...
wifi up
MAGIC! (lol)
Two tips:
Use a generator to create your encryption key! It'll be static across all your devices. Make it a challenge to the supercomputer brute squad. (examples: https://www.grc.com/passwords.htm - OR - http://randomkeygen.com/ )
Use a generator to create your BSSID! Never use a BSSID you find in an example. (examples: https://www.hellion.org.uk/cgi-bin/randmac.pl - OR - http://www.miniwebtool.com/mac-address-generator/ )
Sorry to revive an old thread. Given the amount of interest in running a mesh network over a WPA2 secured connection, I have written a bit of documentation on how to setup OLSR over a WPA2 Ad-Hoc network.
This has been tested on all GL-Inet routers with Atheros based chips (NOT MEDIATEK!)