Wireless local area networks (WLANs) allow the device to communicate wirelessly inside a building. Before using the device on a WLAN, the facility must be set up with the required hardware to run the WLAN (sometimes known as infrastructure). The infrastructure and the device must both be properly configured to enable this communication.
Refer to the documentation provided with the infrastructure (access points (APs), access ports, switches, Radius servers, etc.) for instructions on how to set up the infrastructure.
Once the infrastructure is set up to enforce the chosen WLAN security scheme, use the
Wireless & networks
(A11 only) or
Network & internet
(A13 only) on settings, and configure the device to match the security scheme.
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Transport Layer Security (TLS)
WPA/WPA2-Enterprise (A13 only)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA).
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA').
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP) with MSCHAP and MSCHAPv2 authentication, and GTC authentication.
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Transport Layer Security (TLS)
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP), MSCHAP and MSCHAPv2 authentication.
WPA3-Enterprise (A13 only)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA).
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA').
Tunneled Transport Layer Security (TTLS) - with Password Authentication Protocol (PAP) with MSCHAP and MSCHAPv2 authentication, and GTC authentication.
Protected Extensible Authentication Protocol (PEAP) - with MSCHAPV2 and GTC authentication.
Extensible Authentication Protocol Method for Subscriber Identity Module (SIM)
Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA)
Improved Extensible Authentication Protocol Method for Authentication and Key Agreement (AKA')
Transport Layer Security (TLS)
The device supports the following WLAN security options:
GTC authentication without a password (Dynamic GTC) requires a Mobility DNA Enterprise License.