An overview of the wireless local area network (WLAN) security protocols supported by the device.
Wireless local area networks (WLANs) allow the device to communicate wirelessly. Before using the device on a WLAN, the facility's infrastructure (access points, switches, servers, and so on) must be set up and properly configured.
Once the infrastructure is configured, use the
Settings
Network & internet
menu on the device to configure it to match the network's security scheme.
The device supports the following WLAN security options:
None
An open network with no security.
Enhanced Open (OWE)
Provides unauthenticated encryption for open networks, protecting against passive sniffing.
WEP
Wireless Equivalent Privacy, an older and less secure protocol.
WPA/WPA2-Personal
WPA3-Personal
Secures the network using a pre-shared key (PSK), also known as a password. This is the most common method for home and small office networks.
WPA/WPA2-Enterprise
WPA3-Enterprise
Secures the network by requiring each user to authenticate with unique credentials, typically against a RADIUS server. This method uses the Extensible Authentication Protocol (EAP) and supports the following methods:
PEAP (Protected Extensible Authentication Protocol) - with MSCHAPV2 and GTC authentication.
TLS (Transport Layer Security)
TTLS (Tunneled Transport Layer Security) - with PAP, MSCHAP, MSCHAPV2, and GTC authentication.
AKA (Authentication and Key Agreement)
AKA' (Improved AKA)
SIM (Subscriber Identity Module)
WPA3-Enterprise 192-bit
High-security WPA3-Enterprise Wi-Fi security protocol, designed for environments with stringent security requirements. This mode provides a higher level of security by enforcing a minimum 192-bit encryption strength and supports following methods: