You can't really do this without using some additional form of security. WEP keys defined on the AP will be static (by definition) and the clients would need the same key entered statically. You can use "per session" keys if you layer on some other form of authentication such as a RADIUS server. In this case the WEP key is negotiated on the fly at the time of connection.
In any case, use WPA rather than WEP, WEP is not in any way secure.
We are pleased to announce the immediate availability of the IOS-XE release 17.4.1 for the Catalyst Wireless Controllers. The new code is now posted on the CCO and can be found at this link:
Securing devices without 802.1X
PSK (Pre-Shared-Key) WLAN is widely used for consumer & enterprise IoT onboarding as most of IoT device doesn’t support 802.1X. While PSK WLAN provides an easy way to onboard IoT, it also introduces challenges as...
Due to the certificate expiration, any new Control and Provisioning of Wireless Access Points (CAPWAP) or Light Weight Access Point Protocol (LWAPP) connection will fail to establish. The main feature that is affected will be the Acce...