Wi-Fi Configuration

Wi-Fi Configuration

Edit an existing Wi-Fi configuration or create a new one for RFD40 and RFD90 readers.
Wi-Fi configuration is available on handheld readers only.
You will be prompted to provide the administrative credentials before you can view or edit the settings in the European region.
For authorization password changes, refer to Authorization Session and Password Requirements.
User login credentials in wi-fi settings for EU region
  1. In the existing connection, click
    Get Details
    for information on the SSID, Mac Address, IP Address, and the Connection Status of the connected network. Or click
    Disconnect
    to disconnect from the network.
    RFD40/90 Wi-Fi Configuration
    RFD40/90 Wi-Fi Configuration
  2. To add a Wi-Fi profile and connect to an existing profile, select
    Scan and Choose Network
    ,
    Enter SSID
    or
    Choose existing profiles
    and enter the following information:
    • SSID
      - scan, select or enter the available networks. SSID shall be listed in the drop-down menu and can be refreshed on clicking Refresh icon.
    • Protocol
      - the suggested protocol will be set when you select the SSID and can be changed.
    • Passkey
      - enter the pre shared key for the WPA/WPA2 network.
    • EAP
      - select the extensible Authentication Protocol.
    • CA Certificate
      - click CA Certificate icon to add the installed CA certificate to the network.
    • Client Certificate
      - click Client Certificate icon to add the installed Client certificate to the network.
    • Identify
      - enter the identity/user name configured in the RADIUS server.
    • Anonymous Identity
      - enter the Anonymous Identity/Username configured in the RADIUS server.
    • Password
      - enter the password configured in the RADIUS server for the corresponding Identity/Username.
    • Private Key
      - click Private Key icon to add the installed private/client key certificate to the network.
    • Private Password
      - enter the password to decrypt the private/client key.
    • Hidden Profile
      - this option allows the reader to connect to a Wi-Fi network even if it is not available during scanning.
    • Preferred Wi-Fi
      - select this option to make this Wi-Fi as the first choice to associate and connect.
    Only SSID fields are required for the
    Choose existing profiles
    option.
  3. Click
    Add
    to add a network profile or click
    Connect
    to connect to a network.
  4. Click
    Delete
    to delete the selected network profile.
Users are responsible for configuring the Wi-Fi security modes on the RFD40/90 sleds according to their individual security requirements. To ensure compliance with the cybersecurity requirements of the EU Radio Equipment Directive (RED), Article 3.3 (d), use secure settings such as WPA3 Standard, WPA3_Personal_SAE, or WPA3_Enterprise_GCMP_256_SUITEB_192 to protect against security threats. Improper configuration may lead to vulnerabilities, and the manufacturer is not liable for any resulting damage or security breaches.
The recommended security mode for wireless security is to use the WPA3 Standard.
  • For Personal Networks, the preferred security mode is WPA3_Personal_SAE.
  • For Enterprise-Grade Networks, it is recommended to use A3_Enterprise_GCMP_256_SUITEB_192, which offers the highest level of security.
RFD40/90 supports the following WPA2/WPA3 Personal and WPA2/WPA3 Enterprise protocols.
Protocol
Description
Support
WPA2_Personal_CCMP
Uses the CCMP-128 AES Encryption with PSK.
Hashing Algorithm used is HMAC-SHA1.
802.11w for WPA2 Personal is supported.
Supported
WPA3_Personal_SAE
Uses the CCMP-128 AES Encryption with PSK (SAE).
Hashing Algorithm used is HMAC-SHA256.
Supported
WPA2_Enterprise_CCMP
Uses the CCMP-128 AES Encryption with PMK derived from the EAP Authentication exchange with RADIUS server.
Hashing Algorithm used is HMAC-SHA1.
PMF (Protected Management Frames) is optional.
Supported
WPA3_Enterprise_CCMP
Uses the CCMP-128 AES Encryption with PMK derived from the EAP Authentication exchange with RADIUS server.
Hashing Algorithm used is HMAC-SHA256.
PMF (Protected Management Frames) is Mandatory.
Supported
WPA3_Enterprise_GCMP_256_SHA256
Uses the GCMP-256 AES Encryption with PMK derived from the EAP Authentication exchange with RADIUS server.
Hashing Algorithm used is HMAC-SHA256.
PMF (Protected Management Frames) is Mandatory.
Supported
WPA3_Enterprise_GCMP_256_SUITEB_192
Uses the GCMP-256 AES Encryption with PMK derived from the EAP Authentication exchange with RADIUS.
Supported