Objective 4.1High13 min

Wireless Security Standards

Understanding WPA3, AAA/RADIUS, cryptographic protocols, and authentication methods for wireless networks including 802.1X, EAP types, and enterprise wireless security.

Understanding Wireless Security Standards

Wireless security standards define how networks authenticate users and encrypt traffic. Understanding the evolution from WEP to WPA3 and the role of enterprise authentication (802.1X/RADIUS) is essential for securing wireless networks.

Key wireless security components:WPA3 — Latest wireless security standard • 802.1X — Port-based network access control • RADIUS — AAA server for authentication • EAP — Extensible Authentication Protocol types

The 2017 KRACK (Key Reinstallation Attack) vulnerability affected all WPA2 implementations, allowing attackers to decrypt wireless traffic. This accelerated WPA3 development, which includes protections against such attacks and provides forward secrecy.

Wireless security has evolved significantly—using outdated protocols creates serious vulnerabilities.

Why This Matters for the Exam

Wireless security standards are heavily tested on SY0-701 because proper implementation is critical. Questions cover WPA versions, EAP types, and enterprise authentication architecture.

Understanding wireless standards helps with network security design, compliance requirements, and vulnerability assessment. Weak wireless security = network compromise.

The exam tests recognition of standards, their security features, and appropriate implementation.

Deep Dive

How Has Wireless Security Evolved?

Wireless Security Timeline:

StandardEraSecurity Level
WEP1999Broken (never use)
WPA2003Legacy (avoid)
WPA22004Standard (acceptable)
WPA32018Current (preferred)

Why WEP Failed:

WEP weaknesses:
- Static encryption keys
- Weak IV (initialization vector)
- No integrity protection
- Can be cracked in minutes

NEVER use WEP - completely broken

What Are WPA2 and WPA3?

WPA2 Features:

FeatureDescription
EncryptionAES-CCMP (strong)
AuthenticationPSK or Enterprise
Key Management4-way handshake
WeaknessOffline dictionary attacks

WPA3 Improvements:

FeatureBenefit
SAE (Dragonfly)Replaces PSK, resists offline attacks
Forward secrecyPast sessions protected if key exposed
192-bit securityEnterprise mode strength
PMF requiredManagement frame protection
Easy connectQR code device onboarding

WPA2 vs WPA3 Comparison:

AspectWPA2WPA3
Personal authPSK (vulnerable)SAE (Dragonfly)
Enterprise auth802.1X802.1X (192-bit option)
Offline attacksVulnerableProtected
Forward secrecyNoYes
Management framesOptional protectionRequired protection

SAE (Simultaneous Authentication of Equals):

WPA2-PSK problem:
- Capture 4-way handshake
- Offline dictionary attack
- Eventually crack password

WPA3-SAE solution:
- Zero-knowledge proof
- Cannot capture crackable handshake
- Each session unique
- Offline attacks don't work

What Is 802.1X?

802.1X provides port-based network access control for both wired and wireless networks.

802.1X Components:

ComponentRole
SupplicantClient requesting access
AuthenticatorAP or switch (enforcer)
Authentication ServerRADIUS server (decider)

802.1X Architecture:

[Supplicant]           [Authenticator]           [Auth Server]
(Client/Device)        (AP/Switch)               (RADIUS)
      |                      |                        |
      |──── EAP Request ────>|                        |
      |                      |──── RADIUS Request ───>|
      |                      |                        |
      |                      |<─── RADIUS Response ───|
      |<─── EAP Response ────|                        |
      |                      |                        |
      |    (If approved: port opened, access granted) |

What Is RADIUS?

RADIUS (Remote Authentication Dial-In User Service) provides AAA services.

AAA Functions:

FunctionPurpose
AuthenticationVerify identity (who are you?)
AuthorizationGrant permissions (what can you do?)
AccountingTrack usage (what did you do?)

RADIUS in Wireless:

User connects to WiFi
        ↓
AP sends credentials to RADIUS
        ↓
RADIUS checks against directory (AD, LDAP)
        ↓
RADIUS returns accept/reject
        ↓
AP grants or denies access
        ↓
RADIUS logs the session (accounting)

RADIUS vs TACACS+:

AspectRADIUSTACACS+
ProtocolUDPTCP
EncryptionPassword onlyFull packet
AAA separationCombinedSeparate
Primary useNetwork accessDevice admin

What Are EAP Types?

EAP (Extensible Authentication Protocol) provides the authentication framework for 802.1X.

Common EAP Types:

EAP TypeCertificatesSecurity
EAP-TLSClient + ServerHighest
PEAPServer onlyHigh
EAP-TTLSServer onlyHigh
EAP-FASTOptional (PAC)High
LEAPNoneWeak (avoid)

EAP-TLS:

Requirements:
- Server certificate
- Client certificate (each device)
- PKI infrastructure

Process:
1. Server presents certificate
2. Client validates server
3. Client presents certificate
4. Server validates client
5. Mutual authentication complete

Pros: Strongest security
Cons: Certificate management overhead

PEAP (Protected EAP):

Requirements:
- Server certificate
- Username/password (typically)

Process:
1. TLS tunnel established (server cert)
2. Credentials sent inside tunnel
3. Inner authentication (often MS-CHAPv2)

Pros: No client certs needed
Cons: Password-based

What Are Personal vs Enterprise Modes?

Personal Mode (PSK):

WPA2-Personal / WPA3-Personal:
- Shared password
- All users same key
- No individual identity
- Good for home/small office

Limitation: Cannot revoke individual access

Enterprise Mode (802.1X):

WPA2-Enterprise / WPA3-Enterprise:
- Individual credentials
- RADIUS authentication
- Per-user/device keys
- Audit trail
- Required for business

Benefit: Revoke individual access, track usage

Mode Comparison:

AspectPersonalEnterprise
AuthenticationShared passwordIndividual credentials
Key derivationSame for allUnique per session
User trackingNoYes
ScalabilityLimitedEnterprise
ComplexitySimpleRequires RADIUS

How CompTIA Tests This

Example Analysis

Scenario: A company is upgrading their wireless network. Current state: WPA2-Personal with a shared password. Requirements: individual user authentication, audit logging, ability to revoke access, and strongest available security.

Analysis - Wireless Security Upgrade:

Current State Assessment:

WPA2-Personal:
✗ Shared password (everyone knows)
✗ Cannot track individual users
✗ Cannot revoke single user
✗ Vulnerable to offline attacks
✗ No audit trail

Recommended Architecture:

Standard: WPA3-Enterprise

Why WPA3:
✓ SAE protects against offline attacks
✓ Forward secrecy
✓ Management frame protection
✓ Latest security standard

Why Enterprise:
✓ Individual authentication
✓ Per-user session keys
✓ Audit logging via RADIUS
✓ Can revoke individual access

Authentication Architecture:

[Employees]                [Access Points]           [RADIUS]           [AD]
(Supplicants)              (Authenticators)          (Auth Server)      (Directory)
     |                           |                        |               |
     |─── Connect to SSID ──────>|                        |               |
     |<── EAP Identity Request ──|                        |               |
     |─── Username ─────────────>|── RADIUS Request ─────>|               |
     |                           |                        |─── Validate ─>|
     |                           |                        |<── Response ──|
     |<── Certificate ───────────|<── EAP-TLS ───────────|               |
     |─── Certificate ──────────>|─────────────────────────────────────────>
     |                           |                        |               |
     |   (Mutual authentication complete - access granted)                |

EAP Type Selection:

OptionSecurityComplexityRecommendation
EAP-TLSHighestHigh (client certs)If PKI exists
PEAPHighMediumMost common
EAP-TTLSHighMediumAlternative to PEAP

Recommendation: PEAP with WPA3

Justification:
- No client certificates needed
- Users authenticate with AD credentials
- Server certificate verifies AP authenticity
- Balance of security and usability

Configuration:
- Server: FreeRADIUS or NPS
- Server certificate from internal CA
- Inner auth: MSCHAPv2 with AD
- WPA3-Enterprise mode on APs

Implementation:

ComponentConfiguration
APsWPA3-Enterprise, RADIUS client
RADIUSIntegrate with Active Directory
CertificateServer cert for EAP
UsersAD credentials (existing)
LoggingRADIUS accounting enabled

Access Control:

New employee: Add to AD → Automatic access
Terminated: Disable AD account → Immediate revocation
Guest: Separate SSID, captive portal
Contractor: Time-limited AD account

Key insight: WPA3-Enterprise with PEAP provides individual authentication via existing AD credentials, audit logging through RADIUS accounting, and strong security without the complexity of client certificates. This balances security requirements with operational feasibility.

Key Terms

wireless security standardsWPA3WPA2RADIUS802.1XEAPwireless encryptionAAA

Common Mistakes

Using WPA2-Personal in enterprise—shared passwords don't scale and can't be individually revoked.
WEP still in use—WEP is completely broken. Should have been eliminated years ago.
PEAP without server certificate validation—clients must validate server cert to prevent evil twin attacks.
LEAP in production—LEAP is vulnerable and should be replaced with PEAP or EAP-TLS.

Exam Tips

WPA3 uses SAE (Dragonfly) instead of PSK. Protects against offline dictionary attacks.
WPA3 provides forward secrecy—compromised key doesn't expose past sessions.
802.1X components: Supplicant (client), Authenticator (AP), Authentication Server (RADIUS).
EAP-TLS = client + server certificates = strongest. PEAP = server cert + password = common enterprise.
RADIUS = AAA. Authentication + Authorization + Accounting.
Personal mode = shared password. Enterprise mode = individual credentials via RADIUS.
WEP = never use. WPA = legacy. WPA2 = acceptable. WPA3 = preferred.

Memory Trick

Wireless Evolution: "WEP = Worst Ever Protocol" (broken) "WPA = Was a Patch, Acceptable briefly" "WPA2 = Was Pretty Adequate" "WPA3 = Way Preferred Always"

  • 802.1X Components - "SAA":
  • Supplicant = Seeking access (client)
  • Authenticator = AP/switch (enforcer)
  • Authentication server = RADIUS (decider)

EAP Types: "TLS = Two certificates (client + server)" "PEAP = Password in tunnel (server cert only)"

  • RADIUS = AAA:
  • Authentication = Who are you?
  • Authorization = What can you do?
  • Accounting = What did you do?

Personal vs Enterprise: "Personal = Password shared" "Enterprise = Each user individual"

WPA3 SAE Benefit: "SAE = Stops Attackers from External cracking" Offline dictionary attacks don't work

Test Your Knowledge

Q1.Which WPA3 feature protects against offline dictionary attacks?

Q2.In 802.1X architecture, which component makes the authentication decision?

Q3.Which EAP type requires certificates on BOTH client and server?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee