Wireless Security Protocols
WEP (Wired Equivalent Privacy): original 802.11 security. RC4 cipher with static keys. Completely broken — cracked in minutes with freely available tools (IV attacks expose the key). Never use WEP. If you see WEP on the exam, it is always the wrong security choice.
WPA (Wi-Fi Protected Access): transitional replacement for WEP. Uses TKIP (Temporal Key Integrity Protocol) — dynamically changes keys per packet. Still has vulnerabilities (TKIP weaknesses, KRACK attacks). Deprecated. Do not use.
WPA2 (802.11i): strong security. Uses AES-CCMP encryption — Counter mode with CBC-MAC Protocol. The minimum acceptable standard. Personal mode uses PSK (Pre-Shared Key) — a passphrase shared by all clients. Enterprise mode uses 802.1X with RADIUS — each user authenticates individually.
WPA3: current best. Personal mode uses SAE (Simultaneous Authentication of Equals) — replaces PSK handshake, resistant to offline dictionary attacks, provides forward secrecy (past sessions can't be decrypted if the password is later compromised). Enterprise mode adds 192-bit encryption suite (CNSA — Commercial National Security Algorithm suite). Mandatory Management Frame Protection (802.11w).
Enterprise Wireless Authentication (802.1X)
802.1X with EAP for wireless: the AP acts as the authenticator (passes EAP messages between client and RADIUS server). Client (supplicant) must authenticate with credentials, certificate, or both before getting network access. Each user has individual authentication — when an employee leaves, disable their account without changing the network passphrase.
Common EAP methods for wireless: EAP-TLS (mutual certificate authentication — most secure, requires client certificates), PEAP-MSCHAPv2 (server certificate only, client uses Windows credentials — common in corporate environments), EAP-TTLS (similar to PEAP, cross-platform). EAP-FAST (Cisco, no certificates required).
Certificate validation: in PEAP/TTLS, clients must validate the server's certificate to prevent evil twin attacks. Clients that accept any certificate are vulnerable to credential theft — configure clients to verify the CA and server certificate name.
Wireless Threat Mitigations
Rogue AP detection: WIPS (Wireless Intrusion Prevention System) scans for unauthorized APs broadcasting SSIDs. WLCs in enterprise deployments can detect rogue APs using neighboring APs as sensors. If a rogue AP is wired into the network, the WLC can locate and report it.
Wireless hardening: disable WPS (vulnerable to PIN brute force). Change default SSID (hides AP manufacturer). Use WPA2 Enterprise or WPA3. Enable 802.11w (Management Frame Protection — prevents deauth attacks). Separate guest SSID on isolated VLAN. Disable SSID broadcast for sensitive networks (limited effectiveness). Segment IoT devices onto a dedicated SSID/VLAN.