Deploying Wireless Networks
to wireless networking Security
WPA2 — WPA with security improvements fully meeting the requirements of the IEEE
802.11i standard. Configuration requirements are the same as for WPA.
For best security use the WPA2 with AES encryption and a RADIUS server to verify
individual credentials for each user. WEP, while better than no security at all, is an older
algorithm that is easily compromised. With either WEP or WAP, changing encryption
passphrases on a regular basis further enhances security.
Separate access for employe...