Best practices

2.8 Install, configure, and secure a basic wireless network

📘CompTIA ITF+ (FC0-U61)


Best Practices for Wireless Networks

When setting up a wireless network, it’s important to follow certain best practices to keep the network safe, reliable, and efficient. These practices involve configuring your wireless access point (AP) and understanding wireless security.


1. Change the SSID (Service Set Identifier)

  • What it is: The SSID is the name of your Wi-Fi network. It’s what devices see when scanning for Wi-Fi.
  • Best Practice: Change the default SSID that comes with your router or access point.
    • Default names often indicate the brand and model (e.g., “Linksys123”), which can help hackers target your network.
    • Choose a name that doesn’t give away any personal information (avoid your name, address, etc.).
  • Why it matters: A unique SSID makes your network less of a target and easier to manage in environments with many Wi-Fi networks.

2. Change the Default Password

  • What it is: The default password is the one that comes pre-set on your router or access point.
  • Best Practice: Set a strong, unique password.
    • Use a mix of letters (uppercase and lowercase), numbers, and special characters.
    • Avoid simple passwords like “password123” or “admin”.
  • Why it matters: Default passwords are publicly known and easy for attackers to use to gain access. Changing it protects your network.

3. Wireless Encryption: Encrypted vs. Unencrypted

Encryption protects the data sent over Wi-Fi from being intercepted. There are different types of wireless security:

a. Open Network (Unencrypted)

  • No password is required. Anyone within range can connect.
  • Use case: Rarely recommended except for public networks where security isn’t critical (e.g., guest Wi-Fi in a coffee shop).
  • Risk: Data can be easily intercepted because nothing is encrypted.

b. Captive Portal

  • Users connect to Wi-Fi and are redirected to a login page (e.g., for a hotel or company guest network).
  • Can still be open or encrypted behind the portal.
  • Use case: Allows control over who uses the network and can enforce policies.

c. WEP (Wired Equivalent Privacy)

  • An older encryption standard for Wi-Fi.
  • Weakness: Easily cracked today. Not recommended.
  • Use case: Only in very old legacy systems that don’t support newer encryption.

d. WPA (Wi-Fi Protected Access)

  • A newer standard than WEP, more secure.
  • Strengths: Uses stronger encryption than WEP, but older WPA versions can still be vulnerable.
  • Use case: If older devices don’t support WPA2, WPA is a fallback.

e. WPA2

  • Current standard for most modern networks.
  • Uses AES encryption, which is strong and secure.
  • Best Practice: Always choose WPA2 (or WPA3 if available).
  • Use case: Secures company laptops, mobile devices, and IoT devices in a workplace environment.
  • Tip: Use a strong password/passphrase with WPA2 for maximum security.

Summary Table: Encryption Types

TypeEncrypted?Security LevelUse Case
OpenNoVery lowPublic Wi-Fi where data security isn’t critical
Captive PortalOptionalMediumGuest Wi-Fi networks, hotels, cafes
WEPYesVery lowLegacy devices (not recommended)
WPAYesMedium-highOlder devices needing better security
WPA2YesHighModern secure networks

Key Takeaways for the Exam

  1. Always change the default SSID and passwords — don’t leave your network using factory settings.
  2. Use the strongest encryption available — WPA2 or WPA3.
  3. Avoid open networks unless necessary, and understand captive portals are useful for controlled guest access.
  4. WEP is obsolete — only use if absolutely necessary for legacy devices.

Following these best practices ensures your wireless network is secure, reliable, and professional, which is exactly what the CompTIA ITF+ exam wants you to know.

Buy Me a Coffee