WEP (Wired Equivalent Protocol) |
- Protects data over wireless networks
- Provides no protection past the SonicWall appliance
- Provides minimum protection for transmitted dat
- Uses a static key for encryption
- Useful for older legacy devices, PDAs, wireless printers
- Not recommended for deployments needing a high degree of security
|
WPA (Wi-Fi Protected Access) |
- Good security (uses TKIP)
-
For use with trusted corporate wireless clients
- Transparent authentication with Windows log-in
- No client software needed in most cases
- Requires a separate authentication protocol, such as RADIUS to authenticate the users
- Uses a dynamic key
This option is only visible when it has been enabled on the diagnostics page.
|
WPA2 (Wi-Fi Protected Access, v2) |
- Best security (uses AES)
- For use with trusted corporate wireless clients
- Transparent authentication with Windows log-in
- Client software install might be necessary in some cases
- Supports 802.11i WPA/WPA2 EAP authentication mode
- No backend authentication needed after first log-in (allows for faster roaming)
- Supports two protocols for storing and generating keys: PSK (Pre-Shared Key) and EAP (Extensible Authentication Protocol)
EAP support is only available in Access Point Mode (selected on the DEVICE | Internal Wireless > Settings page). EAP support is not available in Bridge Mode.
|
WPA2-AUTO |
- Tries to connect using WPA2 security
- If the client is not WPA2 capable, the connection defaults to WPA
|
WPA3 |
- WPA3 is a WFA security standard for personal and enterprise networks
- It improves Wi-Fi security by using modern security algorithms and stronger cipher suites.
- Supports the following protocols for storing and generating keys: PSK (Pre-Shared Key), EAP (Extensible Authentication Protocol), and OWE (opportunistic wireless encryption)
|
WPA3/WPA2 |
- Tries to connect using WPA3 security
- If the client is not WPA3 capable, the connection defaults to WPA2
|
WPA3-EAP-192B |
- The 192-bit security mode offered by WPA3-Enterprise ensures the right combination of cryptographic tools are used and sets a consistent baseline of security within a WPA3 network.
- Uses extensible authentication protocol.
|