Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the device must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the
Wireless & networks
(A11 only) or
Network & internet
(A13 only) on settings, and configure the device to match the security scheme.
The device supports the following WLAN security options:
None
Enhanced Open
Wireless Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)/WPA2 Personal (PSK)
WPA3-Personal
WPA/WPA2/WPA3 Enterprise (EAP) (A11 only)
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
Password (PWD).
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP) with MSCHAP and MSCHAPv2 authentication, and GTC authentication.
Password (PWD).
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP) with MSCHAP and MSCHAPv2 authentication, and GTC authentication.
Password (PWD).
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')