2.3 Given a scenario, select and configure wireless devices and technologies
Encryption
📘CompTIA Network+ (N10-009)
WPA2 – Wi-Fi Protected Access 2
WPA2 is a security protocol used to protect wireless networks. Its main goal is to encrypt data transmitted over Wi-Fi so that unauthorized users cannot easily read it. It is the successor to WPA (Wi-Fi Protected Access) and much stronger than the old WEP (Wired Equivalent Privacy) standard.
1. Why WPA2 is Important
- Wireless networks transmit data over the air.
- Without encryption, anyone nearby can potentially capture and read sensitive information like passwords, emails, or company data.
- WPA2 encrypts that data so only authorized devices can understand it.
IT-focused example:
In a corporate office, employees connect to the Wi-Fi using WPA2. Even if someone captures the wireless signals using a network sniffer, the data is encrypted and unreadable without the correct encryption keys.
2. Encryption Types in WPA2
WPA2 uses AES (Advanced Encryption Standard) for encryption.
Key points about AES:
- It is strong and modern, replacing the older TKIP (used in WPA).
- It ensures that data packets are scrambled and only devices with the correct key can decrypt them.
- AES is widely trusted and used in many secure systems, not just Wi-Fi.
3. Modes of WPA2
WPA2 has two main modes, depending on the network type:
a) WPA2-Personal (WPA2-PSK)
- “PSK” stands for Pre-Shared Key.
- Uses a password that all devices use to connect.
- Common in home networks or small offices.
- Easy to set up: the user enters the Wi-Fi password on their device.
Exam tip: Remember that WPA2-Personal is simpler but doesn’t scale well for large enterprises.
b) WPA2-Enterprise
- Uses a RADIUS server for authentication.
- Each user/device has unique credentials, not just one shared password.
- More secure than WPA2-Personal.
- Common in large organizations, where you want to control who can connect and track activity per user.
IT-focused example:
A company uses WPA2-Enterprise. Employees log in with their company username and password. If someone leaves the company, their credentials can be disabled without changing the network password for everyone else.
4. Key Components of WPA2
To understand how WPA2 works, know these main components:
- Authentication
- Confirms the device is allowed to join the network.
- WPA2-Personal: Device uses the shared password.
- WPA2-Enterprise: Device uses unique credentials verified by the RADIUS server.
- Encryption
- Scrambles the data being transmitted.
- Uses AES to make sure even if someone intercepts the signal, they cannot read it.
- Integrity
- Ensures data is not altered during transmission.
- WPA2 uses CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) to verify integrity.
5. Common WPA2 Terms to Know for the Exam
- PSK (Pre-Shared Key): Password shared by all devices in a small network.
- RADIUS (Remote Authentication Dial-In User Service): Server that verifies user credentials for enterprise networks.
- AES: Strong encryption standard used to protect wireless traffic.
- CCMP: Protocol used in WPA2 to ensure data integrity.
6. Advantages of WPA2
- Strong encryption using AES.
- Supports both small networks (personal) and large enterprises (enterprise).
- Harder to crack than older protocols like WEP or WPA with TKIP.
- Ensures both authentication and integrity.
7. Things to Watch for in Exams
- WPA2 is more secure than WPA and WEP.
- WPA2-Personal uses PSK; WPA2-Enterprise uses RADIUS authentication.
- AES is mandatory in WPA2 (unlike WPA, which could use TKIP).
- WPA2 is vulnerable to weak passwords in personal mode, so strong passwords are important.
8. Example of WPA2 Setup in IT Environment
- Small office: All staff use the same WPA2-Personal Wi-Fi password to access printers, shared files, and internet.
- Corporate network: Each employee connects using their corporate login through WPA2-Enterprise. The RADIUS server checks credentials, assigns the connection, and logs network activity.
✅ Summary for Exam:
- WPA2 = secure Wi-Fi encryption protocol.
- Uses AES for encryption and CCMP for integrity.
- Modes:
- Personal (PSK): One shared password.
- Enterprise: Uses RADIUS server with individual credentials.
- Stronger and more secure than WPA and WEP.
