RaspAP lets you quickly get a wireless access point up and running to share the connectivity of many popular Debian-based devices, including the Raspberry Pi. Our popular Quick installer creates a known-good default configuration that “just works” on all current Raspberry Pis with onboard wireless. A responsive interface gives you control over the relevant services and networking options. Advanced DHCP settings, OpenVPN client support, SSL, security audits, themes and multilingual options are included.
We hope you enjoy using RaspAP as much as we do creating it. Tell us how you use this with your own projects.
Start with a clean install of the latest release of Raspberry Pi OS (32-bit) Lite. The Raspberry Pi OS desktop and 64-bit beta distros are unsupported.
sudo apt-get update sudo apt-get full-upgrade sudo reboot
Set the “WLAN country” option in
raspi-config’s Localisation Options:
With the prerequisites done, you can proceed with either the Quick installer or Manual installation steps below.
Install RaspAP from your device’s shell prompt:
curl -sL https://install.raspap.com | bash
The installer will complete the steps in the manual installation (below) for you.
After the reboot at the end of the installation the wireless network will be configured as an access point as follows:
Note: As the name suggests, the Quick Installer is a great way to quickly setup a new AP. However, it does not automagically detect the unique configuration of your system. Best results are obtained by connecting to ethernet (
eth0) or as a WiFi client, also known as managed mode, with
wlan0. For the latter, refer to this FAQ. Special instructions for the Pi Zero W are available here.
Please read this before reporting an issue.
This feature uses DNS blacklisting to block requests for ads, trackers and other undesirable hosts. To enable ad blocking, simply respond to the prompt during the installation. As a beta release, we encourage testing and feedback from users of RaspAP.
Details are provided here.
By default RaspAP configures a routed AP for your clients to connect to. A bridged AP configuration is also possible. Slide the Bridged AP mode toggle under the Advanced tab of Configure hotspot, then save and restart the hotspot.
Note: In bridged mode, all routing capabilities are handled by your upstream router. Because your router assigns IP addresses to your device’s hotspot and its clients, you might not be able to reach the RaspAP web interface from the default
10.3.141.1 address. Instead use your RPi’s hostname followed by
.local to access the RaspAP web interface. With Raspbian default settings, this should look like
raspberrypi.local. Alternate methods are discussed here.
More information on Bridged AP mode is provided in our documentation.
RaspAP lets you create an AP with a Wifi client configuration, often called AP-STA mode. With your system configured in managed mode, enable the AP from the Advanced tab of Configure hotspot by sliding the Wifi client AP mode toggle. Save settings and start the hotspot. The managed mode AP is functional without restart.
Note: This option is disabled until you configure your system as a wireless client. For a device operating in managed mode without an
eth0 connection, this configuration must be enabled before a reboot.
RaspAP is free software, but powered by your support. If you find RaspAP useful for your personal or commercial projects, become a GitHub sponsor and get access to exclusive features in the Insiders Edition.
Detailed manual setup instructions are provided on our documentation site.
RaspAP provides an 802.11ac wireless mode option for supported hardware (currently the RPi 3B+/4 and compatible Orange Pi models) and wireless regulatory domains. See this FAQ for more information.
RaspAP was originally made for Raspbian, but now also installs on the following Debian-based distros.
|Raspberry Pi OS||(32-bit) Lite Buster||ARM||Official|
|Debian||Buster||ARM / x86_64||Beta|
|Ubuntu||18.04 LTS / 19.10||ARM / x86_64||Beta|
We find Armbian particularly well-suited for this project. Please note that “supported” is not a guarantee. If you are able to improve support for your preferred distro, we encourage you to actively contribute to the project.
RaspAP uses GNU Gettext to manage multilingual messages. In order to use RaspAP with one of our supported translations, you must configure a corresponding language package on your RPi. To list languages currently installed on your system, use
locale -a at the shell prompt. To generate new locales, run
sudo dpkg-reconfigure locales and select any other desired locales. Details are provided on our documentation site.
See this list of supported languages that are actively maintained by volunteer translators. If your language is not supported, why not contribute a translation? Contributors will receive credit as the original translators.
Simply append the
--cert option to the Quick Installer, like so:
curl -sL https://install.raspap.com | bash -s -- --cert
Note: this only installs mkcert and generates an SSL certificate with the input you provide. It does not (re)install RaspAP.
More information on SSL certificates and HTTPS support is available in our documentation.
OpenVPN may be optionally installed by the Quick Installer. Once this is done, you can manage client configuration and the
openvpn-client service with RaspAP.
To configure an OpenVPN client, upload a valid .ovpn file and, optionally, specify your login credentials. RaspAP will store your client configuration and add firewall rules to forward traffic from OpenVPN’s
tun0 interface to your configured wireless interface.
Note: this feature is currently in beta. Please read this before reporting an issue.
Find out more about our coding style guidelines and recommended tools.
Please read this before reporting a bug.
This project exists thanks to all the awesome people who contribute their time and expertise.
Development of RaspAP is made possible thanks to a sponsorware release model. This means that new features are first exclusively released to sponsors as part of Insiders.
Learn more about how sponsorship works, and how easy it is to get access to Insiders.
See the LICENSE file.