SWRU455M February 2017 – October 2020 CC3120 , CC3120MOD , CC3130 , CC3135 , CC3135MOD , CC3220MOD , CC3220MODA , CC3220R , CC3220S , CC3220SF , CC3230S , CC3230SF , CC3235MODAS , CC3235MODASF , CC3235MODS , CC3235MODSF , CC3235S , CC3235SF
The SimpleLink Wi-Fi device supports Wi-Fi enterprise connection according to 802.1x authentication process. Enterprise connection requires an authentication of the STA by the radius server behind the AP. Enterprise connection can be invoked from manual connection or a profile. Only one enterprise profile is supported. The following authentication methods are supported:
When the station has been authenticated, the AP and the station negotiate with the WPA/WPA2 security. The enterprise connection can require up to three files to complete the process (to authenticate the radius server and client according to the device and server authentication settings).
If the server requires client authentication, the following files are required:
The SimpleLink Wi-Fi device requires server authentication by default and the following file is required:
Server Root CA file – This file must be in PEM format. The demand for server authentication can be canceled through the WLAN setting. Canceling this authentication is valid for a single manual connection only.
Example:
_i16 Status;
_u8 param;
_u8 param = 0; /* 1 means disable the server authentication */
Status = sl_WlanSet(SL_WLAN_CFG_GENERAL_PARAM_ID,SL_WLAN_GENERAL_PARAM_DISABLE_ENT_SERVER_AUTH,1,¶m);
if( Status )
{
/* error */
}
Those files must be programmed with the following names:
Manual enterprise connection and preferred network enterprise connection both include the same security information needed to complete enterprise connection.
The following information is required according to the server demands:
Configure to one of the following values according to the target authentication method:
The SimpleLink Wi-Fi supports only one enterprise profile and requires using the above-specified file names.
An example of manual connection to an enterprise network:
SlWlanSecParams_t SecParams;
SlWlanSecParamsExt_t SecExtParams;
_i16 Status;
SecParams.Type = SL_WLAN_SEC_TYPE_WPA_ENT;
SecParams.Key = KEY;
SecParams.KeyLen = strlen(KEY);
SecExtParams.User = IDENTITY;
SecExtParams.UserLen = strlen(IDENTITY);
SecExtParams.AnonUser = ANONYMOUS;
SecExtParams.AnonUserLen = strlen(ANONYMOUS);
SecExtParams.EapMethod = SL_WLAN_ENT_EAP_METHOD_PEAP0_MSCHAPv2;
Status = sl_WlanConnect((_i8*)SSID,strlen(SSID),0,&SecParams ,&SecExtParams);
if( Status )
{
/* error */
}