Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the device must both be properly configured to enable this communication.
To extend the life of the battery, turn off Wi-Fi when not in use.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the
Wireless & networks
settings configure the device to match the security scheme.
The device supports the following WLAN security options:
Wireless Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
WPA/WPA2/WPA3 Enterprise (EAP)
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')