11-21-2023 03:59 PM
Hello,
I am working on starting the process of upgrading to WPA3-Enterprise. Currently we have devices that won’t support WPA3 192 bit. I do have the option to go to WPA3-Enterprise AES-CCMP128. I am currently running WPA2-Enterprise AES-CCMP128. Is there any security benefit of moving to WPA3-Enterprise AES-CCMP128?
Solved! Go to Solution.
11-24-2023 10:56 AM
WPA3 mandates "PMF- Protected Management Frame". In that sense it is always better if you can move connection to WPA3. That will mitigate DoS - Denial of Service attacks to your Wi-Fi.
When it comes to WPA3-Enterprise, you can go for 192 bit mode for highly sensitive environment to achieve highest security strength. Typical environment you can go with 128-bit AES with CCMP. AKM value 5 as oppose to AKM 12 (see below image).
HTH
Rasika
*** Pls rate all useful responses ***
11-23-2023 08:58 AM
Short answer no - but check out similar recent question at https://community.cisco.com/t5/wireless/windows-10-showing-as-wpa2-enterprise/m-p/4963374#M263219 where JPavonM explains why they're basically the same.
11-24-2023 10:56 AM
WPA3 mandates "PMF- Protected Management Frame". In that sense it is always better if you can move connection to WPA3. That will mitigate DoS - Denial of Service attacks to your Wi-Fi.
When it comes to WPA3-Enterprise, you can go for 192 bit mode for highly sensitive environment to achieve highest security strength. Typical environment you can go with 128-bit AES with CCMP. AKM value 5 as oppose to AKM 12 (see below image).
HTH
Rasika
*** Pls rate all useful responses ***
11-24-2023 04:23 PM
And you're suggesting that for a guest network @Rasika Nayanajith ?
If you did want to do that then might be worth looking into using OpenRoaming for your guests - just need to work out how to onboard them easily.
11-24-2023 04:30 PM
Hi Rich,
Open guest networks, recommendation is to go with "Enhanced Open" also known as OWE - Opportunistic Wireless Encryption (AKM 18). Given current client all may not supporting it, you have to deploy it in transition mode. In "Enhanced Open" transition mode, you have to create 2 SSIDs, due to that many stay away from OWE transition mode deployment, but if you need on the fly encryption for your guest SSIDs that is the way to go.
Below two posts describe it in detailed
1. https://mrncciew.com/2019/11/21/enhanced-open-part-1/
2. https://mrncciew.com/2019/11/22/enhanced-open-part-2/
HTH
Rasika
11-24-2023 04:48 PM
Yep that's exactly what we already explained Rasika - it was you who suggested AKM 5 (802.1X with SHA-256)
11-25-2023 01:08 AM
Not sure if I missed reading it, but I didn't see that the post was referring to the Guest Wi-Fi network. I understood it as WPA2-Enterprise vs. WPA3-Enterprise discussion and in that context going ahead with AKM5 (WPA3-Enterprise) is recommended.
HTH
Rasika
01-17-2024 05:18 AM
Hi Rasika,
Read the thread like a poem. I came here while I was looking up for a CISCO device which supports WPA3 Enterprise but with only CCMP-128 (AES) framework. Most of the new devices support GCMP suites but my client firmware is not complieant with that. Does these GCMP/CCMP security frameworks backward compatible ? Which device/AP to chose to get CCMP-128 support ?
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide