WPA support

To secure your LAN and WLAN, you can use WPA encryption with the help of the WPA-supplicant software. This software provides key negotiation with the WPA authenticator and controls association with IEEE 802.11i networks. WPA uses IEEE 802.1X and WPA2 uses IEEE 802.11i.

Authentication can be performed either with a pre-shared key (PSK) or, for IEEE 802.1X, via the Extensible Authentication Protocol (EAP).

WPA is configured using the text file wpa.conf that can list accepted networks and security policies. The configuration file is saved locally on the devices.

wpa_supplicant is a free software application. For further information, see http://w1.fi/wpa_supplicant/.

Providing WPA configuration file

  1. Create a text file named wpa.conf by using the wpa_supplicant program. See below for an example.
  2. To transfer the wpa.conf file to the devices, use the Scout feature Files configured for transfer. Use the following destination:

    LAN setup/scep/
    WLAN setup/wlan/

    For further information, see Files configured for transfer.

Example of a WPA configuration file with 802.1X (WLAN)

Copy
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
ap_scan=1
network={
    ssid="<WLAN name>"
    scan_ssid=1
    key_mgmt=WPA-EAP
    eap=TLS
    identity="<Common Name as specified in certificate>"
    priority=6
    ca_cert="/setup/cacerts/root-ca.pem"
    client_cert="/setup/cacerts/client.pem"
    private_key="/setup/cacerts/client.key"
        }

Network profiles (LAN and WLAN) that are transferred to the device via a wpa.conf file cannot be edited locally on the device.

For further information on WPA configuration and on using variables, see Configuring WPA supplicant in the short guide IEEE 802.1X authentication.