Raspberry Pi connected to WiFi of WPA2 Enterprise.

Introduction

Many people have introduced how to connect Raspberry Pi 3 (Raspbian Stretch) to WPA2 Enterprise, but I did not see a method for Raspberry Pi 4 (Raspbian Buster), so I will post it as a memorandum.

Configuration:

Device: Raspberry Pi4 ModelB 2GB
OS: Raspbian Buster
Access point: Cisco MR33

Setting 1 — edit wpa_supplicant.conf

sudo nano (or your favorite editor) Edit the file in /etc/wpa_supplicant/wpa_supplicant.conf.

I think that the first three lines are included by default, so I will add from the “network =” line.
The password is entered in clear text. If you are worried about security, please create a hash.

When OS is Raspbian Stretch, it was connected to WPA2 Enterprise Wi-Fi by editing wpa_supplicant.conf as above. However, when implemented on Raspberry Pi 4 (Raspbian Buster), the connection → disconnection → connection … was repeated, and eventually the IP that should be assigned by DHCP also failed with “169.254.xx.xx”. While I was googled, some people had encountered the same event in the forum, and after implementing the remedy (described later) described in the article, I was able to connect successfully.

Raspbian Buster — WiFi WPA2 enterprise broken?
More info: https://www.raspberrypi.org/forums/viewtopic.php?t=247310

Setting 2 — edit dhcpcd.conf

This is the workaround described in the forum.
sudo nano (or your favorite editor) Edit the file in /etc/dhcpcd.conf.

Please add the last three lines.

In the home environment, since the wired NIC address is fixed, the setting information of eth0 is also written.

After adding wlan0 part, after restarting Raspberry Pi, it automatically connected to WPA2 Enterprise Wi-Fi

Reference

 by the author.

--

--

--

DevOps Consultant. I’m strongly focused on automation, security, and reliability.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

HackTheBox & CryptoHack recently hosted a brilliant CTF, Cyber Apocalypse.

My Journey into a QA Security Mindset: IDOR vulnerability

RYUK ransomware attacks on AD

My Neighbor Alice partners with Litentry to explore an improved NFT collection experience

GDPR — changing the rules of identity and access management

My OSCP Experience & Tips (I TRIED HARDER!!)

Top 8 Upcoming Technology Trends for 2022

10 Best Mobile Apps for social security office North Carolina

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Maciej

Maciej

DevOps Consultant. I’m strongly focused on automation, security, and reliability.

More from Medium

Initial Fedora Server 35 configuration on a Raspberry PI

Netboot Raspberry Pi using Ubuntu 20.04 OS

Enable or Disable Permissive Domain in SELinux policy on Linux — Ansible module selinux_permissive

xdg-desktop-menu — command line tool for (un)installing desktop menu items