Microchip® Advanced Software Framework

 All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
WINC1500 Connecting a TLS Enterprise Secured AP Example for SAML21 XPlained Pro B Documentation

Introduction

This example demonstrates the use of the WINC1500 with the SAMx2x Xplained Pro board to connect to a secured 802.1x enterprise network that supports TLS as phase 2 authentication.
The following Enterprise security methods are supported by this example.

* - EAP with TLS
* - PEAPv0 with TLS
* - PEAPv1 with TLS
*

It uses the following hardware:

  • the SAM Xplained Pro.
  • the WINC1500 on EXT1.

Main Files

  • main.c : Initialize the WINC1500 and connect to network that support enterprise security with TLS authentication protocol.

Usage

  1. Assemble the devices and connect to USB debug cable from PC.
  2. On the computer, open and configure a terminal application as the follows.
    * Baud Rate : 115200
    * Data : 8bit
    * Parity bit : none
    * Stop bit : 1bit
    * Flow control : none
    *
  3. Prepare an AP that supports enterprise security with any of the following security method.
  • EAP with TLS
  • PEAPv0 with TLS
  • PEAPv1 with TLS
  1. You need to know following things before configuring RADIUS server settings in the AP. Ask your network administrator to get there information and configure it in the WINC1500.
    * User name
    * User certificate and key file
    * Name of wireless network
    * Root certificate file
    *
  2. Modify MAIN_WLAN_802_1X_USR_NAME to the user name.
  3. Modify the python script key_decoder.py available in the script folder with path to user certificate and key file. Execute the script to generate the file privateKey_decoded.txt which contain the certificate and private key coefficient. Copyt the content of privateKey_decoded.txt and update the arrays modulus, exponent and certificate in main.h file. Modify MAIN_WLAN_SSID to wireless network name
    * #define MAIN_WLAN_SSID "WINC1500_ENTERPRISE"
    * #define MAIN_WLAN_802_1X_USR_NAME "DEMO_USER"
    *
  4. Build and run the application. If the device connected successfully, IP address which is assigned by DHCP will be displayed on the terminal program.
    * -- WINC1500 enterprise security connection with TLS example --
    * -- SAMXXX_XPLAINED_PRO --
    * -- Compiled: xxx xx 2021 hh:mm:ss --
    * (APP)(INFO)Chip ID xxxxxx
    * (APP)(INFO)DriverVerInfo: 0xaaaaaaaa
    * (APP)(INFO)Firmware ver : xx.x.x xxxxxx xxxxx
    * (APP)(INFO)Firmware Build xxx xx xxxx xx:xx:xx
    * (APP)(INFO)Firmware Min driver ver : xx.x.x
    * (APP)(INFO)Driver ver: xx.x.x
    * (APP)(INFO)Driver built at xxx xx xxxx xx:xx:xx
    * Username:DEMO_USER
    * Connecting to WINC1500_ENTERPRISE...
    * Username:DEMO_USER
    * Wi-Fi connected
    * Wi-Fi IP is xxx.xxx.xxx.xxx
    * Connection successfully completed.
    *
Warning
* For using the security enterprise network, the root certificate must be written to WINC1500.
* Download the root certificate using the root_certificate_downloader. (Refer to WINC1500 Software User Guide.)
*

Compilation Information

This software was written for the GNU GCC compiler using Atmel Studio 6.2 Other compilers may or may not work.

Contact Information

For further information, visit Microchip.