If you use both a cable and wireless interface, you should shut one of them down, unless they are being used for different subnets.
Try
rcnetwork stop eth0
rcnetwork restart wlan0
I use DHCP.
On the "Network Address Setup" page I have
"Automatic Address Setup (via DHCP)" checked.
Checking the "Host Name and Name Server" button:
Under "Host Name and Name Server Configuration" I entered my Hostname and Domain name and checked the "Change Host Name via DHCP.
Clicking the Routing Button:
I entered the IP address of my Cisco Cable Router (192.168.1.1)
Clicking on the "Hardware Details" button:
on the Manual Network Card configuration:
The system gave my interface the Configuration name: wlan0.
The system gave my interface the Hardware Name: static-0. I didn't change it in the "Hardware Configuration Name" line underneath. I left it as it is.
Under Module Name: I entered the name of the kernel module for my wireless device. "ndiswrapper" in my case.
Under "DHCP Client Options" button. On the DHCP Client Options page, I checked the "Request Broadcast Response" box, and entered my hostname in the "DHCP Client Identifier" line. This may have been a mistake according to the SuSE manual (I read this part later), but after making this change, I was able to connect to my router after rebooting. The "Host Name to Send" line I left as AUTO.
On the Detailed Network Card Settings Button/page, I selected "Device Activation "At Boot Time" drop down item.
I clicked on the "User Controlled" box.
I have the "External Zone" selected for my firewall zone. Note: make sure that the DHCP Client is added to an allowed service for the Firewall zone you select)
Clicking on "Next" from the "Network Address Setup" page, gets me to the
"Wireless Network Card Configuration" page.
Operating Mode "Managed" dropdown item is selected.
I entered my LAN's domain name for the ESSID.
Authentication Mode "WPA-PSK" drop down item is selected.
Key Input Type, this is really up to you, but needs to match the router's setup.
I generated a 64 digit hex key using the random device:
Code:
dd if=/dev/random bs=1 count=32 | od -t x1 | sed -e 's/^[[:digit:]]\{7\}//' -e 's/ //g' | tr '[[:lower:]]' '[[:upper:]]' | tr -d '\
' ; echo
note: there is a newline after the backslash,
in the second tr command's argument.
This part simply joins the two lines.
It would be possible to do all of the conversion in a sed script,
but I don't know how to write a oneliner shell command
that contains a branch in the sed code.
Then I used cut and past to enter the key into the routers web setup page and the Yast Encryption Key entry.
If yast doesn't like the key, you might try editing it into /etc/sysconfig/ifcfg-wlan0 manually. That is what I did. I han't converted the letters "a-d" to uppercase. In hindsight, I think that yast was expecting Upper Case letters "A-D" for the input.
Now I don't have a passphrase that is someone could use a dictionary attack against. Plus, a script to generate a new key anytime I want.
I hope this helps. I can't guarantee that none of my items are in error, but I did post this message on my hp pavilion zv5000 using a wireless connection to a cisco cable router using this configuration.