Wi-Fi Security – WPA2, WPA3 & EAP
1. Why Wi-Fi Security Matters
Wireless networks transmit data through open air using radio frequencies — any device within range can receive those frames. Unlike wired networks where an attacker needs physical access to a cable, a wireless attacker needs only proximity. Without strong encryption and authentication, every packet you send over Wi-Fi is readable by anyone nearby with the right tools.
Wi-Fi security standards have evolved significantly since the late 1990s — from the completely broken WEP, through the interim WPA, to the widely deployed WPA2, and now to the modern WPA3. Each generation addressed weaknesses in its predecessor. Understanding what each standard does, why it was introduced, and what it protects against is a core CCNA wireless topic.
| Standard | Year | Encryption | Key Exchange | Status |
|---|---|---|---|---|
| WEP | 1999 | RC4 (stream cipher) | Static shared key | Broken — never use |
| WPA | 2003 | TKIP (RC4 with improvements) | PSK or 802.1X/EAP | Deprecated — avoid |
| WPA2 | 2004 | CCMP / AES-128 | PSK (4-way handshake) or 802.1X/EAP | Current standard |
| WPA3 | 2018 | CCMP / AES-128 or GCMP-256 | SAE (replaces PSK) or 802.1X/EAP-Suite-B | Recommended / modern |
Related pages: Wi-Fi Overview | 802.11 Standards | WPA / WPA2 / WPA3 Comparison | Wireless LAN Overview | Frequency & Channels | 802.1X Authentication | AAA Overview | AAA Local vs RADIUS | AAA Authentication Methods | Access Points & WLC | WLC SSID & VLAN Mapping Lab | Guest WLAN & WebAuth Lab | 802.1X Port Authentication Lab
2. WEP — Wired Equivalent Privacy (Broken)
WEP (Wired Equivalent Privacy) was the original IEEE 802.11 security standard, introduced in 1999 with the goal of providing privacy equivalent to a wired network. It uses the RC4 stream cipher with a 40-bit or 104-bit static shared key. Despite its name, WEP was fundamentally broken and is now completely insecure.
Why WEP Is Broken
3. WPA — Wi-Fi Protected Access (Transitional)
WPA (Wi-Fi Protected Access) was introduced in 2003 as an emergency interim fix for WEP's fatal flaws, while IEEE 802.11i (which became WPA2) was still being finalised. WPA was designed to run on existing WEP hardware via a firmware update — a significant constraint that limited how much it could improve security.
WPA Improvements Over WEP
| Feature | WEP | WPA |
|---|---|---|
| Encryption cipher | RC4 (static IV) | TKIP — RC4 with per-packet key mixing and extended IV (48 bits) |
| IV length | 24 bits (reuse within minutes) | 48 bits (2⁴⁸ ≈ 281 trillion — IV reuse effectively eliminated) |
| Integrity check | CRC-32 (not cryptographic) | MIC — Message Integrity Check (Michael) — cryptographic |
| Key management | Static shared key for all clients | Per-session keys derived from PSK or 802.1X via 4-way handshake |
| Authentication | Shared key only | PSK (Pre-Shared Key) or 802.1X/EAP |
WPA Limitations
WPA's TKIP is still based on RC4, which is a weak cipher by modern standards. TKIP was later found to have vulnerabilities (including the TKIP MIC failure attack). WPA is deprecated and should not be used in new deployments. WPA2 replaced it in 2004.
4. WPA2 — The Current Mainstream Standard
WPA2, ratified in 2004 and based on IEEE 802.11i, is the first Wi-Fi security standard to use AES (Advanced Encryption Standard) — a fundamentally stronger cipher than RC4. WPA2 replaces TKIP with CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol), which provides both strong encryption and cryptographic integrity.
WPA2 comes in two modes depending on the deployment context: WPA2-Personal (for homes and small offices) and WPA2-Enterprise (for corporate environments requiring per-user authentication). See WPA / WPA2 / WPA3 Comparison for a full feature breakdown.
4.1 WPA2-Personal (PSK Mode)
WPA2-Personal uses a Pre-Shared Key (PSK) — a passphrase configured on the access point and on every client device. The PSK is never transmitted over the air. Instead, both the AP and the client use the PSK, the SSID, and random nonces to derive a Pairwise Master Key (PMK), which feeds into the 4-Way Handshake to generate per-session Pairwise Transient Keys (PTKs).
WPA2-Personal Vulnerability — KRACK and Dictionary Attacks
1. Dictionary / brute-force attacks: If the PSK is weak (a common word or short passphrase), an attacker can capture the 4-Way Handshake and perform an offline brute-force attack using tools like hashcat. A strong, random passphrase (20+ characters) significantly reduces this risk.
2. KRACK (Key Reinstallation Attack, 2017): A vulnerability in the 4-Way Handshake that allowed nonce reuse under certain conditions. Patched on most modern devices — but unpatched legacy devices remain vulnerable.
3. No forward secrecy: If the PSK is ever compromised, all past sessions that were recorded can potentially be decrypted.
4.2 WPA2-Enterprise (802.1X/EAP Mode)
WPA2-Enterprise replaces the shared PSK with 802.1X/EAP authentication — each user authenticates individually with unique credentials (username/password, certificate, or smart card) via a RADIUS server. This eliminates the single shared secret that makes WPA2-Personal less suitable for corporate environments. See AAA Authentication Methods for the full AAA framework.
| Feature | WPA2-Personal (PSK) | WPA2-Enterprise (802.1X) |
|---|---|---|
| Authentication credentials | Single shared passphrase for all users | Per-user credentials (username/password or certificate) |
| Infrastructure required | AP only — no additional servers | RADIUS server + (optionally) PKI/CA for certificates. See AAA Local vs RADIUS. |
| Scalability | Poor — changing the key requires reconfiguring every device | Excellent — add/remove users on RADIUS without touching APs |
| Rogue client risk | High — anyone who knows the PSK can join | Low — each user authenticates individually |
| Typical deployment | Home networks, small offices, guest Wi-Fi | Enterprise, universities, government |
| Complexity | Simple | Complex — requires RADIUS infrastructure. See AAA Overview. |
5. WPA3 — Modern Security Improvements
WPA3, announced by the Wi-Fi Alliance in 2018, addresses the remaining weaknesses in WPA2. It comes in two modes — WPA3-Personal and WPA3-Enterprise — and introduces significant improvements in both authentication and encryption. See WPA / WPA2 / WPA3 Comparison for the full side-by-side breakdown.
5.1 WPA3-Personal — SAE Replaces PSK
WPA3-Personal replaces the WPA2 4-Way Handshake PSK exchange with SAE (Simultaneous Authentication of Equals), also known as Dragonfly (defined in IEEE 802.11s and RFC 7664). SAE is a password-authenticated key exchange protocol that provides several critical improvements over WPA2-PSK.
5.2 WPA3-Enterprise
WPA3-Enterprise retains 802.1X/EAP for authentication but strengthens the cryptographic suite:
| Feature | WPA2-Enterprise | WPA3-Enterprise |
|---|---|---|
| Encryption | CCMP-128 (AES-128) | CCMP-128 (standard) or GCMP-256 (192-bit security mode) |
| Authentication | 802.1X / EAP | 802.1X / EAP (same) with stricter cipher requirements |
| Management Frame Protection | Optional (PMF) | Mandatory — protects deauth/disassoc frames from spoofing |
| 192-bit mode | Not available | Available — uses GCMP-256, HMAC-SHA-384, ECDH/ECDSA P-384 |
5.3 WPA3 Key Features Summary
| Feature | WPA3 Improvement |
|---|---|
| SAE (Dragonfly) | Replaces PSK 4-Way Handshake; eliminates offline dictionary attacks; provides forward secrecy |
| Forward Secrecy | Each session generates unique keys — past sessions cannot be decrypted even if the password is later compromised |
| PMF — Protected Management Frames | Mandatory in WPA3 — encrypts and authenticates management frames (deauthentication, disassociation) to prevent spoofed deauth attacks used to kick clients off the network |
| Enhanced Open (OWE) | Opportunistic Wireless Encryption for open (no-password) networks — provides per-session encryption even without authentication, replacing completely open WPA2 hotspots |
| 192-bit Security Mode | Available in WPA3-Enterprise for high-security environments (government, financial) — uses GCMP-256 and Suite-B cryptographic algorithms |
6. EAP — Extensible Authentication Protocol
EAP (Extensible Authentication Protocol), defined in RFC 3748, is the authentication framework used in WPA2/WPA3-Enterprise and 802.1X. EAP itself is not an authentication method — it is a flexible framework that supports many different authentication methods (called EAP types or EAP methods), each with different credential requirements and security characteristics.
EAP messages between the wireless client (supplicant) and the RADIUS server are transported by the AP (authenticator), which encapsulates them in RADIUS packets. The AP does not see or process the EAP credentials — it is purely a passthrough. See AAA Authentication Methods for the broader authentication context.
7. EAP Types — PEAP, EAP-TLS, EAP-TTLS, LEAP, EAP-FAST
Different EAP methods vary in what credentials they use, whether they require a server-side certificate, a client-side certificate, or both, and how strongly they protect credentials in transit. The following are the most important EAP types for the CCNA exam and enterprise deployments.
7.1 PEAP — Protected EAP
PEAP (Protected EAP) is the most widely deployed EAP method in enterprise Wi-Fi. It creates an encrypted TLS tunnel between the client and the RADIUS server using only a server-side certificate (the client does not need a certificate). Inside the tunnel, credentials are exchanged using a simpler inner authentication method — most commonly MSCHAPv2 (username and password).
7.2 EAP-TLS — Mutual Certificate Authentication
EAP-TLS is the most secure EAP method. Both the RADIUS server and the client must present valid digital certificates. There is no password involved — authentication is purely certificate-based. This requires a full PKI (Public Key Infrastructure) to issue and manage client certificates for every device.
7.3 EAP-TTLS — Tunnelled TLS
EAP-TTLS (Tunnelled TLS) is similar to PEAP — it creates a TLS tunnel using a server certificate and performs inner authentication inside. The difference is that EAP-TTLS supports a wider range of inner authentication methods (PAP, CHAP, MSCHAPv2, EAP, etc.) and is more flexible across different operating systems. It is popular in Linux/non-Windows environments.
7.4 LEAP — Lightweight EAP (Cisco Proprietary — Deprecated)
LEAP was Cisco's proprietary EAP method, introduced before PEAP/EAP-TLS were standardised. It uses MS-CHAPv1 for mutual authentication but has serious vulnerabilities — it is susceptible to offline dictionary attacks (ASLEAP attack). LEAP is deprecated and should never be used in new deployments.
7.5 EAP-FAST — Flexible Authentication via Secure Tunnelling
EAP-FAST was developed by Cisco as a replacement for LEAP. It uses a PAC (Protected Access Credential) — a shared secret provisioned to the client — to establish a TLS tunnel without requiring a certificate. It was designed for environments where deploying certificates is not practical. EAP-FAST is secure but less commonly encountered than PEAP today.
| EAP Method | Server Cert? | Client Cert? | Client Credentials | Security Level | Status |
|---|---|---|---|---|---|
| PEAP | Yes | No | Username + password (MSCHAPv2) | High | Current — widely used |
| EAP-TLS | Yes | Yes | Client certificate (no password) | Highest | Current — highest security |
| EAP-TTLS | Yes | No | Username + password (flexible inner method) | High | Current — common on Linux |
| EAP-FAST | No (PAC used) | No | Username + password (inside PAC tunnel) | High | Current — Cisco environments |
| LEAP | No | No | Username + password (MS-CHAPv1) | Low — vulnerable | Deprecated — never use |
8. 802.1X Wireless Authentication — How It Works End to End
IEEE 802.1X is the port-based network access control standard that underpins WPA2/WPA3-Enterprise authentication. It defines the roles of supplicant, authenticator, and authentication server, and controls network access at the port level until authentication succeeds. See 802.1X Port Authentication Lab for hands-on configuration.
802.1X Port States
| Port State | Traffic Allowed | When |
|---|---|---|
| Unauthorised | EAP/802.1X only — no data traffic | Before authentication completes |
| Authorised | All traffic permitted (based on RADIUS policy) | After successful authentication |
9. Additional Wireless Security Mechanisms
9.1 SSID Hiding (Not a Security Control)
Some administrators disable SSID broadcasting so the network name does not appear in client scan results. This is not a security control — SSIDs are visible in probe requests and can be discovered in seconds with wireless sniffing tools like Wireshark. SSID hiding creates management overhead without providing meaningful protection.
9.2 MAC Address Filtering (Weak)
MAC address filtering allows only devices with pre-approved MAC addresses to associate with the AP. This provides a very low level of security — MAC addresses are transmitted unencrypted in 802.11 frames and can be trivially spoofed by any attacker with a wireless adapter. It is useful only as an additional layer alongside strong WPA2/WPA3 — never as a primary security mechanism.
9.3 PMF — Protected Management Frames (802.11w)
PMF (Protected Management Frames), defined in IEEE 802.11w, encrypts and authenticates wireless management frames — specifically deauthentication and disassociation frames. Without PMF, an attacker can send spoofed deauthentication frames to disconnect clients from the network (a deauth attack, commonly used as part of WPA2 handshake capture). PMF makes these attacks ineffective.
| Standard | PMF Status |
|---|---|
| WPA2 | Optional — can be set to Disabled, Optional, or Required |
| WPA3 | Mandatory — always enabled, cannot be disabled |
9.4 Wireless Intrusion Prevention System (WIPS)
A WIPS monitors the RF environment for rogue access points, ad-hoc networks, and wireless attacks. It can automatically contain rogue APs by sending deauthentication frames (in coordination with a WLC) to disconnect clients from unauthorised networks. Cisco's WLC supports WIPS functionality through its CleanAir and Rogue Management features.
9.5 Guest WLAN Isolation
Guest Wi-Fi networks should be isolated from the corporate LAN using a separate VLAN, firewall policy, or client isolation feature on the AP/WLC. This prevents guest devices from accessing internal resources. See: Guest WLAN & WebAuth Lab
10. Comparing All Wi-Fi Security Standards
| Standard | Encryption | Auth (Personal) | Auth (Enterprise) | Forward Secrecy | PMF | Use Today? |
|---|---|---|---|---|---|---|
| WEP | RC4 (broken) | Static key | None | No | No | Never |
| WPA | TKIP/RC4 | PSK (4-way handshake) | 802.1X/EAP | No | No | No — deprecated |
| WPA2-Personal | CCMP/AES-128 | PSK (4-way handshake) | — | No | Optional | Yes — home/SMB |
| WPA2-Enterprise | CCMP/AES-128 | — | 802.1X/EAP | No | Optional | Yes — corporate |
| WPA3-Personal | CCMP/AES-128 | SAE (Dragonfly) | — | Yes | Mandatory | Recommended |
| WPA3-Enterprise | CCMP-128 or GCMP-256 | — | 802.1X/EAP (Suite-B) | Yes | Mandatory | Recommended |
See also: 802.1X Authentication | AAA Overview | AAA Local vs RADIUS | AAA Authentication Methods | WPA / WPA2 / WPA3 Comparison | Wi-Fi Overview | Access Points & WLC | Wireshark | Firewalls | VLANs | AAA RADIUS Configuration Lab | WLC SSID & VLAN Mapping Lab | 802.1X Port Authentication Lab
Test Your Knowledge — Wi-Fi Security Quiz
Related Topics & Step-by-Step Tutorials
Continue your wireless networking studies:
- Wi-Fi Overview – 802.11 Standards & Architecture — Wi-Fi fundamentals — SSID, BSS, ESS, channels
- IEEE 802.11 Wi-Fi Standards (a/b/g/n/ac/ax) — 802.11 a/b/g/n/ac/ax — speeds, bands, features
- RF Fundamentals – Antennas, Channels & Interference — RF power, gain, EIRP, antenna types
- Wi-Fi Frequency Bands and Channel Planning — 2.4 GHz vs 5 GHz channels and overlap
- Wi-Fi Security – WPA2, WPA3 & EAP — WEP, WPA, WPA2, WPA3 — 802.1X and PSK
- Wireless Roaming – Intra & Inter-Controller — roaming, fast BSS transition, sticky client
- Access Points (APs) & Wireless LAN Controllers (WLCs) — lightweight APs and WLC architecture
- Lightweight vs Autonomous Access Points — CAPWAP — lightweight vs autonomous APs
- Wireless LAN Controller (WLC) – Overview — WLC configuration — SSIDs, VLANs, interfaces
- Configuring a Wireless LAN Controller (WLC) — Gettin… (Step-by-Step)
- Creating SSIDs and Mapping to VLANs on a Cisco WLC (Step-by-Step)
- Autonomous Access Point Configuration via CLI (Step-by-Step)
- FlexConnect AP Configuration (Step-by-Step)
- Guest WLAN with Web Authentication (WebAuth) (Step-by-Step)
- Wireless RF Channel & Power Planning (Step-by-Step)