An overview of the wireless local area network (WLAN) security protocols supported by the device.
Wireless local area networks (WLANs) allow the device to communicate wirelessly. Before using the device on a WLAN, the facility's infrastructure (access points, switches, servers, and so on) must be set up and properly configured.
Once the infrastructure is configured, use the
Settings
Network & internet
menu on the device to configure it to match the network's security scheme.
The device supports the following WLAN security options:
None
An open network with no security.
Enhanced Open (OWE)
Provides unauthenticated encryption for open networks, protecting against passive sniffing.
WEP
Wireless Equivalent Privacy, an older and less secure protocol.
WPA/WPA2/WPA3-Personal
Secures the network using a pre-shared key (PSK), also known as a password. This is the most common method for home and small office networks.
WPA/WPA2/WPA3-Enterprise
Secures the network by requiring each user to authenticate with unique credentials, typically against a RADIUS server. This method uses the Extensible Authentication Protocol (EAP) and supports the following methods:
PEAP (Protected Extensible Authentication Protocol) - with MSCHAPV2 and GTC authentication.
TLS (Transport Layer Security)
TTLS (Tunneled Transport Layer Security) - with PAP, MSCHAP, MSCHAPV2, and GTC authentication.
GTC authentication without a password (Dynamic GTC), used in some PEAP and TTLS configurations, may require a specific Mobility DNA Enterprise License.