Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the device must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
After the infrastructure is set up to enforce the chosen WLAN security scheme, use
Network & internet
to open settings and configure the device to match the security scheme.
The device supports the following WLAN options:
Open
Wireless Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
WPA/WPA2-Enterprise
Protected Extensible Authentication Protocol (EAP_ with MSCHAPV2 and GTC authentication
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) with Password Authentication Protocol (PAP) with SCHAP and MSCHAPv2 authentication and GTC authentication.
Password (PWD).
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP) with MSCHAP and MSCHAPv2 authentication, and GTC authentication.
Password (PWD)
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')