esp-idf/examples/wifi/wifi_eap_fast
2022-12-19 14:15:24 +08:00
..
main esp_wifi: Always connect Station in PMF mode if possible 2022-02-21 11:31:56 +05:30
CMakeLists.txt tools: Increase the minimal supported CMake version to 3.16 2022-06-01 06:35:02 +00:00
README.md esp_exmaples: Update ESP32C2 chip in Readme 2022-12-19 14:15:24 +08:00
sdkconfig.defaults wpa_supplicant: sync eap code with upstream 2022-05-13 12:57:47 +08:00

Supported Targets ESP32 ESP32-C2 ESP32-C3 ESP32-S2 ESP32-S3

WPA2 Enterprise Example

This example shows how ESP32 connects to AP with Wi-Fi enterprise encryption using the EAP-FAST method. The example does the following steps:

  1. Install CA certificate which is optional.
  2. Set user name and password and identity.
  3. Set the PAC file which may be empty.
  4. Enable wpa2 enterprise.
  5. Connect to AP.

Note: 1. EAP-FAST is not supported with CONFIG_WPA_MBEDTLS_CRYPTO and so is disabled by default. 2. Setting the config fast_provisioning to methods 0 and 1 do not support saving the PAC credentials in case of a restart or loss of power. 3. The certificates present in the examples/wifi/wifi_eap_fast/main folder contain server certificates which have the corresponding CA as well. These can be used for server validation which is opptional. 4. The expiration date of these certificates is 2027/06/05.

Configuration

idf.py menuconfig
  • Set SSID of Access Point to connect in Example Configuration.
  • Enter EAP-ID.
  • Enter Username and Password.
  • Enable or disable Validate Server option.

Build and Flash the project.

idf.py -p PORT flash monitor

Example output

Here is an example of wpa2 enterprise (FAST method) console output.

I (690) example: Setting WiFi configuration SSID wpa2_test...
I (690) phy_init: phy_version 4670,719f9f6,Feb 18 2021,17:07:07
I (800) wifi:mode : sta (24:6f:28:80:41:78)
I (800) wifi:enable tsf
I (1410) wifi:new:<6,0>, old:<1,0>, ap:<255,255>, sta:<6,0>, prof:1
I (2410) wifi:state: init -> auth (b0)
I (2420) wifi:state: auth -> assoc (0)
E (2420) wifi:Association refused temporarily, comeback time 3072 mSec
I (5500) wifi:state: assoc -> assoc (0)
I (5500) wifi:state: assoc -> init (6c0)
I (5500) wifi:new:<6,0>, old:<6,0>, ap:<255,255>, sta:<6,0>, prof:1
I (7560) wifi:new:<6,0>, old:<6,0>, ap:<255,255>, sta:<6,0>, prof:1
I (7560) wifi:state: init -> auth (b0)
I (7560) wifi:state: auth -> assoc (0)
I (7570) wifi:state: assoc -> run (10)
I (7770) wifi:connected with wpa2_test, aid = 1, channel 6, BW20, bssid = 24:4b:fe:ab:be:99
I (7770) wifi:security: WPA2-ENT, phy: bg, rssi: -80
I (7780) wifi:pm start, type: 1

I (7800) example: ~~~~~~~~~~~
I (7800) example: IP:0.0.0.0
I (7800) example: MASK:0.0.0.0
I (7800) example: GW:0.0.0.0
I (7800) example: ~~~~~~~~~~~
I (7870) wifi:AP's beacon interval = 102400 us, DTIM period = 1
I (8580) esp_netif_handlers: sta ip: 192.168.5.3, mask: 255.255.255.0, gw: 192.168.5.1
I (12800) example: ~~~~~~~~~~~
I (12800) example: IP:192.168.5.3
I (12800) example: MASK:255.255.255.0
I (12800) example: GW:192.168.5.1
I (12800) example: ~~~~~~~~~~~