WLAN

WLAN

Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the device must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the
Network & Internet
settings to configure the device to match the security scheme.
The device supports the following WLAN security options:
  • None
  • Enhanced Open
  • Open
  • Wireless Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
  • WPA3-Personal
  • WPA/WPA2 - Enterprise
    • Protected Extensible Authentication Protocol (PEAP)
    • Transport Layer Security (TLS)
    • Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP, MSCHAPv2, and GTC authentication.
    • Password (PWD).
    • Extensible Authentication Protocol Method for Subscriber Identity Module (SIM).
    • Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA).
    • Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA').
    • Lightweight Extensible Authentication Protocol (LEAP).
  • WPA3-Enterprise 192-bit
  • WPA3 - Enterprise
    • Protected Extensible Authentication Protocol (PEAP)
    • Transport Layer Security (TLS)
    • Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP, MSCHAPv2, and GTC authentication.
    • Password (PWD).
    • Extensible Authentication Protocol Method for Subscriber Identity Module (SIM).
    • Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA).
    • Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA').
    • Lightweight Extensible Authentication Protocol (LEAP).
The
Status
bar displays icons that indicate Wi-Fi network availability and Wi-Fi status.