Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Sets the frequency of the wireless access point (in MHz). This method returns true on success and false on failure; use the GetFailureReason() method to return more information in case of failure.

 

Note
titleNote

The following SetWifi* methods are used to configure WPA Enterprise with EAP-TLS. 

...

Sets the RADIUS identity. If this value is not set, it In EAP-TLS mode, the identity will be taken from the specified client certificate if this method is not called ("subjectAltName" will be used if present; otherwise, the "commonName" is used). In EAP-PEAP/MSCHAP mode, this method must be called to set the identity.

SetWiFiEapTlsOptions(options As String) As Boolean

...

SetWiFiSecurityMode(mode As String) As Boolean

Sets the encryption to use for WPA Enterprise authenticationWiFi encryption method. By default, both WPA (TKIP) and WPA2 (CCMP) encryption are permitted. This method accepts a space-separated, case-insensitive list that can include either "tkip" or "ccmp" values. Passing an empty string sets the default mode. If both CCMP and TKIP are allowed, CCMP always has priority.

...

  • Packaging the client certificate and private key in a single file in PKCS#12 format (using PEM or DER encoding), usually with a .p12 file extension. To do this, set the PKCS#12 file using the SetWiFiPrivateKey() method and pass a blank string to the SetWiFiClientCertificate() method.
  • Packaging the client certificate as a X.509 certificate (using PEM or DER encoding) and using optionally securing the key with a passphrase to secure the key (instead of the usual WiFi passphrase). To do this, set the client certificate using the SetWiFiClientCertificate() method and the key using the SetWiFiPrivateKey() method. You can then optionally If the key is protected with a passphrase, you should then call SetWiFiPassphrase() to protect the key with a passphrase.

Certificate keys may contain binary data if not PEM formatted. In this case, they must be provided as an roByteArray object. Text formats may be passed using a string or roByteArray.

...

During authentication, the Radius server is passed an identity. By default, the identity will be taken from the client certificate. If the certificate has a "subjectAltName", it will be used; otherwise, the "CommonName" is used. If neither of these are correct, the identity may be overridden. This default behavior can be overridden by calling SetWiFiIdentity(), and or it can be restored specified by passing a blank string to SetWiFiIdentity().

...

Additional CA certificates are often required (and using a custom CA for authentication is potentially more secure). Also, some CA hierarchies require intermediate certificates. CA certificates , which are sometimes supplied via EAP, but if . If the server does not supply them, they may be added to the CA file using the SetWiFiCACertififcates() method. This method supports PEM and DER certificates.

...

  • EAP-TLS: When the clock is not set, the time is set to ten seconds after the client certificate becomes valid, which is usually sufficient to authenticate (though this may not be sufficient for servers with newer certificates than the client). 
  • PEAP/MSCHAP: There is no client certificate, so  and the server certificate time is not checked when the date is not set.

...