Introduction
This guide provides an in-depth look at WPA3 encryption, a significant advancement in Wi-Fi security. Introduced by the Wi-Fi Alliance in 2018, WPA3 enhances authentication, strengthens cryptographic capabilities, and mandates Protected Management Frames (PMFs) for improved network security. This document aims to help users make informed decisions regarding their network security by explaining WPA3's features and implementation within Cisco Meraki networks.
WPA3 is enabled by default on wireless networks configured for MR 27.X. Legacy access points (802.11ac Wave-1 or older) may not support WPA3; in such cases, traffic will be encrypted using WPA2 if a WPA3 SSID is configured.
Encryption Modes
Cisco Meraki supports two primary WPA3 modes:
- WPA3-Personal: Offers enhanced password-based authentication using Simultaneous Authentication of Equals (SAE), providing stronger protection against password guessing.
- WPA3-Enterprise: Delivers advanced security for sensitive data transmission with 192-bit cryptographic strength, aligning with high-security network standards.
WPA3-Personal Explained
WPA3-Personal utilizes SAE, building upon WPA2-PSK. It allows authentication solely through a passphrase, adding a security layer by authenticating both the client device (STA) and the Meraki Access Point (AP) before association. This process is particularly beneficial for non-complex passphrases.
WPA3-Personal includes two variants:
- WPA3 Only: The access point only accepts clients using WPA3 SAE.
- WPA3 Transition Mode: Allows both WPA2 and WPA3 clients to connect to the same SSID, ensuring compatibility for older devices.
WPA3-Enterprise Explained
WPA3-Enterprise enhances WPA2 by providing 192-bit security through the 802.1x standard, making it suitable for enterprise environments like government, defense, and finance. For WPA3-Enterprise to function, RADIUS servers must support specific EAP ciphers, including TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, and TLS_DHE_RSA_WITH_AES_256_GCM_SHA384.
The WPA3-Enterprise process involves a series of authentication steps, including probe requests and responses, 802.11 authentication, association requests, and an EAP process utilizing EAP-TLS for credential exchange with the RADIUS server.
Configuration Steps
To enable WPA3-SAE, navigate to Wireless > Access Control and set the WPA encryption mode to WPA3 only.
For WPA3 Transition Mode, navigate to Wireless > Access Control and select WPA2 and WPA3 (transition mode).
For WPA3-Enterprise, navigate to Wireless > Access Control, select Enterprise with my RADIUS server, and configure the RADIUS server accordingly.
Compatibility and Recommendations
The guide also details client behavior charts for WPA3 Personal based on dashboard configurations and discusses compatibility for different bands (2.4/5GHz and 6GHz). It is recommended to use distinct SSID names when encryption modes are mismatched (e.g., WPA2 on 2.4/5GHz vs. WPA3 on 6GHz) to avoid compatibility issues.