For us valiant Linux sysadmins, wireless networking is complicated by the difficulty of finding supported hardware. (Insert ritual rant about
In part 1 of this two-article series, we discussed the relatively straightforward stuff — wireless products that work on Linux, wireless speeds, and definitions of the different protocols. Today we’ll dive into the slightly more complex issues of chipsets, utilities, wireless access points, and security.
Chipsets
The most certain method of determining if a particular NIC will work on Linux is to check which chipset the NIC uses. A word of caution here — chipsets can change even though the model numbers stay the same. For example, several readers kindly pointed out that the Linksys WPC11/WMP11, which used to be a reference wireless NIC for Linux, now uses a Broadcom chipset, which is completely unsupported in Linux. The moral: take nothing for granted.
When shopping for a NIC, first ask the vendor which chipset the NIC uses. The Lucent/Agere Orinoco and Harris/Intersil Prism chips work great and are well-supported. (Yes, the company names keep changing — like we have nothing better to do than try to keep track.)
Linux has a wonderful set of built-in utilities to dig out the chipset information. These tools are particularly useful for confirming if you were told the truth before purchasing the NIC. With the NIC installed, run lspci. No need to have the drivers installed or to have it configured — just have the NIC plugged in.
lspci -v reports everything that is connected to the PCI bus, including mini-PCIs on notebooks. Be sure to get the newest version of lspci, v2.1.11 (use lspci –version to check which version you’re using), as it is much improved. lspci is part of pciutils (see Resources for download links).
For genuine PCMCIA or Cardbus cards, use cardctl ident; for USB cards, run dmesg.
Linux Wireless Utilities
The various NICs come with the usual assortment of configuration utilities. Some of them even work on Linux. Most don’t.
Thankfully, Linux has its own set of wireless utilities courtesy of Jean Tourrilhes, author of the Linux Wireless Howto. Packaged as wireless-tools, the latest edition is wireless-tools.26, which contains:
There’s also a very good graphical configuration utility, KWiFiManager, which of course requires KDE. KWiFiManager is based on wireless-tools. (Again, see Resources for download links.)
Reasons to Go Slow
If dependability is your goal, stick with straight 802.11b. I don’t recommend purchasing multimode NICs yet. Many vendors now ship 802.11b/a/g cards, which sound like a perfectly delightful way to cover all the bases, and to be ready for when there is reliable Linux support for the a and g protocols. Given the sad history of Linux support (insert ritual snort of derision), though, I would wait for a sure thing.
Also, a new standard to replace the now-elderly PCI bus is emerging: ExpressCard. At the moment, it promises to be built on platform-independent standards, be very fast, and cost less to implement. Look for actual products to appear in 2004.
Yes, it’s a ways off, so don’t hold your breath, but given the reluctance of manufacturers to support Linux on existing wireless products, especially on the higher-speed devices, it may get here first anyway. If it lives up to its promise, writing drivers for different operating systems will be trivial, or possibly even unnecessary.
For Those Who Must Have Speeeed
Far be it for me to stand in the way of those who must live on the bleeding edge. For the fearless speed-demons there are a couple of 802.11a/b/g-on-Linux projects for Atheros and PRISM GT chipsets (see Resources). Atheros dares to support Linux well and publicly — bless them.
Wireless Access Points
With the exception of higher cost, there’s no downside to using multi-mode access points. WAPs come with their own embedded operating systems, so OS compatibility is not as much of an issue. But there are still some irritating deficiencies. For example, many access points come with nice management and monitoring utilities that only run on Windows, and units with upgradeable firmware often require Windows to perform the upgrade. Still, although they have their limitations, these APs are usable on Linux.
Look for WAPs that can be configured via a browser interface; these will work anywhere. These APs typically include network settings, user management, WEP (Wired Equivalent Privacy), and support for roaming. Other common options are routing, bridging, DHCP server capabilities, and the ability to function as an Internet gateway.
The downside to units with browser interfaces, especially the lower-cost ones, is you’re stuck with them — if you want to ssh in directly and perform cool command-line tricks, too bad; you can’t.
Some other things to look for in a WAP:
Security
Now we get to the fun part. WEP is pretty much universal. While WEP is universally considered to be weak and easily crackable, it is better than nothing. Never ever go nekkid with wireless; you must use some kind of encryption.
It is truly amazing how you can often struggle to get a decent signal inside your office, while at the same time the dern thing will escape outside for miles with the strength and clarity of a good TV broadcast, just waiting for some weirdo with a Pringles can to intercept it. Even if they don’t want your data, I doubt you want them downloading megabytes of porn or worse, launching attacks from your network.
Note that you cannot mix different WEP strengths in your WAPs and NICs — you must use 40-bit with 40-bit, and 128-bit with 128-bit. By the way, 128-bit is really 104-bit, and there’s no reason to get all excited over key length, anyway. The weak point is in a 24-bit random number known as an Initialization Vector (IV). This goes out first, to initialize the connection. As any cracker will attest, there’s no need to butt heads with a 40- or 104-bit key when you have a nice frail 24-bit target to play with.
Here are some essential steps to take:
The “Wireless Security Blackpaper” is a must-read for wireless LAN admins, even though it barely addresses Linux. It covers the whys and howtos in detail. My favorite part is where it explains, in plain English, what the different numbers really mean when talking about encryption strength. (As always, see Resources for links.)
Really Not That Scary
This all sounds complicated, but it’s really not so bad. If you have a good, supported NIC and a newer Linux distribution with a 2.4 kernel, your card should be recognized and the drivers automatically installed. Ethernet configs are old hat; use iwconfig or KWiFiManager. See Resources for two good configuration howtos: “Netgear MA101USB & RedHat 8.0 HOWTO” and “My Linux Wireless Tutorial using Linksys WPC11.”
Resources
OK, this is a huge wad o’ links. Not to worry, given the variety of wireless products, and the paucity of vendor documentation, these links should help you find anything you need:
Wireless Security Blackpaper
WLAN Adapter Chipset Directory
pciutils home page
ExpressCard home page
Linux PCMCIA Information Page
PRISM GT drivers
Atheros 802.11b/g and 802.11a/b/g drivers
Netgear MA101USB & RedHat 8.0 HOWTO (should be helpful for other systems too)
My Linux Wireless Tutorial using Linksys WPC11
The Linux Wireless LAN Howto
KWiFiManager – the wireless LAN client manager for KDE3
»
See All Articles by Columnist Carla Schroder
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.