...
Sets the frequency of the wireless access point (in MHz). This method returns true
on success and false
on failure; use the GetFailureReason()
method to return more information in case of failure.
Note | ||
---|---|---|
| ||
The following |
...
Sets the RADIUS identity. If this value is not set, it In EAP-TLS mode, the identity will be taken from the specified client certificate if this method is not called ("subjectAltName" will be used if present; otherwise, the "commonName" is used). In EAP-PEAP/MSCHAP mode, this method must be called to set the identity.
SetWiFiEapTlsOptions(options As String) As Boolean
...
SetWiFiSecurityMode(mode As String) As Boolean
Sets the encryption to use for WPA Enterprise authenticationWiFi encryption method. By default, both WPA (TKIP) and WPA2 (CCMP) encryption are permitted. This method accepts a space-separated, case-insensitive list that can include either "tkip" or "ccmp" values. Passing an empty string sets the default mode. If both CCMP and TKIP are allowed, CCMP always has priority.
...
- Packaging the client certificate and private key in a single file in PKCS#12 format (using PEM or DER encoding), usually with a .p12 file extension. To do this, set the PKCS#12 file using the
SetWiFiPrivateKey()
method and pass a blank string to theSetWiFiClientCertificate()
method. - Packaging the client certificate as a X.509 certificate (using PEM or DER encoding) and using optionally securing the key with a passphrase to secure the key (instead of the usual WiFi passphrase). To do this, set the client certificate using the
SetWiFiClientCertificate()
method and the key using theSetWiFiPrivateKey()
method. You can then optionally If the key is protected with a passphrase, you should then callSetWiFiPassphrase()
to protect the key with a passphrase.
Certificate keys may contain binary data if not PEM formatted. In this case, they must be provided as an roByteArray object. Text formats may be passed using a string or roByteArray.
...
During authentication, the Radius server is passed an identity. By default, the identity will be taken from the client certificate. If the certificate has a "subjectAltName", it will be used; otherwise, the "CommonName" is used. If neither of these are correct, the identity may be overridden. This default behavior can be overridden by calling SetWiFiIdentity()
, and or it can be restored specified by passing a blank string to SetWiFiIdentity()
.
...
Additional CA certificates are often required (and using a custom CA for authentication is potentially more secure). Also, some CA hierarchies require intermediate certificates. CA certificates , which are sometimes supplied via EAP, but if . If the server does not supply them, they may be added to the CA file using the SetWiFiCACertififcates()
method. This method supports PEM and DER certificates.
...
- EAP-TLS: When the clock is not set, the time is set to ten seconds after the client certificate becomes valid, which is usually sufficient to authenticate (though this may not be sufficient for servers with newer certificates than the client).
- PEAP/MSCHAP: There is no client certificate, so and the server certificate time is not checked when the date is not set.
...