Wireless Local Area Network

Wireless Local Area Network

An overview of the wireless local area network (WLAN) security protocols supported by the device.
Wireless local area networks (WLANs) allow the device to communicate wirelessly. Before using the device on a WLAN, the facility's infrastructure (access points, switches, servers, and so on) must be set up and properly configured.
Once the infrastructure is configured, use the
Settings
Network & internet
menu on the device to configure it to match the network's security scheme.
The device supports the following WLAN security options:
  • None
    An open network with no security.
  • Enhanced Open (OWE)
    Provides unauthenticated encryption for open networks, protecting against passive sniffing.
  • WEP
    Wireless Equivalent Privacy, an older and less secure protocol.
  • WPA/WPA2/WPA3-Personal
    Secures the network using a pre-shared key (PSK), also known as a password. This is the most common method for home and small office networks.
  • WPA/WPA2/WPA3-Enterprise
    Secures the network by requiring each user to authenticate with unique credentials, typically against a RADIUS server. This method uses the Extensible Authentication Protocol (EAP) and supports the following methods:
    • PEAP (Protected Extensible Authentication Protocol) - with MSCHAPV2 and GTC authentication.
    • TLS (Transport Layer Security)
    • TTLS (Tunneled Transport Layer Security) - with PAP, MSCHAP, MSCHAPV2, and GTC authentication.
    • LEAP (Lightweight Extensible Authentication Protocol)
    • AKA (Authentication and Key Agreement)
    • AKA' (Improved AKA)
    • SIM (Subscriber Identity Module)
    GTC authentication without a password (Dynamic GTC), used in some PEAP and TTLS configurations, may require a specific Mobility DNA Enterprise License.