In industrial sites and enterprise campus networks, wireless connectivity is no longer simply about “being able to connect.”
As internal network security requirements continue to rise, more and more organizations are adopting enterprise-grade 802.1X WiFi authentication, using RADIUS servers to centrally authenticate and authorize every terminal device.
For ARMxy industrial edge computing devices deployed in the field, connecting securely and reliably to enterprise WiFi networks—without a desktop environment or graphical interface, and running on headless Linux systems—often becomes a critical step during project implementation.
This guide is based on the preinstalled wpa_supplicant tool on ARMxy devices. It walks through the complete process of enterprise 802.1X WiFi access, including:
Configuration file creation
Authentication and connection
IP address acquisition
Status verification and troubleshooting
The goal is to help you deploy successfully in real industrial environments, avoiding common pitfalls and unnecessary detours.
In industrial sites and enterprise intranet environments, traditional WPA2-PSK (password-based WiFi) can no longer meet modern security requirements:
Shared passwords increase risk when personnel change
Device identities cannot be uniquely distinguished
Centralized management and auditing are difficult
Enterprise-grade 802.1X WiFi authentication has therefore become the mainstream solution:
Centralized authentication via RADIUS servers
Per-device identity using individual accounts or certificates
High security, supporting certificates and mutual authentication
Industrial suitability, widely used in factories, campuses, and enterprise networks
ARMxy devices come with wpa_supplicant preinstalled, enabling enterprise WiFi access directly from the command line.
Before starting configuration, make sure the following information and tools are ready:
Operating System: Linux
Wireless Tool: wpa_supplicant (preinstalled on ARMxy)
Access Method: SSH or serial console
SSID: Company_WiFi
Authentication Method: PEAP / MSCHAPv2 or EAP-TLS
Credentials:
Username + password
or client certificate + private key
Optional: CA root certificate
For easier maintenance, it is recommended to store configuration files in the following directory:
Example file name:
👉 Most common and lowest deployment cost
Parameter explanation:
ssid: Enterprise WiFi name
identity: Username (employee ID or account)
password: Login password
phase2: Phase 2 authentication method
ca_cert: Strongly recommended to enhance security
⚠️ Disabling server certificate validation is not recommended for long-term use and should only be done for testing.
👉 Highest security level, commonly used for critical devices
Parameter explanation:
client_cert: Client certificate
private_key: Private key file
ca_cert: RADIUS server CA certificate
-c: Specify configuration file
-i: Wireless interface name (e.g., wlan0)
Success indicator:
Once confirmed, press Ctrl + C to exit test mode.
-B: Run as a background daemon
Successful authentication does not automatically mean network access.
You must still obtain an IP address via DHCP:
Verify the result:
Checkpoints:
inet address exists → IP obtained
Not 169.254.x.x → DHCP functioning normally
Interface status:
Interface is UP and has an IP address
WiFi association:
Shows Connected to
Process status:
Process is running
Network connectivity:
Normal replies received
Focus on keywords:
EAP
authentication
failed
timeout
| Issue | Possible Cause | Action |
|---|---|---|
| SSID not found | AP out of range | Check access point signal |
| Authentication failed | Incorrect credentials or certificate | Verify account or cert |
| EAP timeout | Certificate or encryption mismatch | Review configuration |
| No IP address | DHCP issue | Test static IP configuration |
With 802.1X enterprise WiFi, ARMxy devices can achieve:
✅ Secure access to enterprise intranets
✅ Controlled and traceable device identities
✅ Seamless integration with IT security systems
This makes the solution especially suitable for:
Smart manufacturing
Factory intranets
Energy systems
Campus-scale industrial deployments