It’s not a secret that the WEP (Wired Equivalent Privacy) encryption method for wireless networks can be easily cracked. Using WEP actually invites Wi-Fi eavesdroppers to take a stab at cracking your encryption key, so they can connect to your network in order to steal data and wreak havoc. This leaves you with using the more secure Wi-Fi Protected Access (WPA or WPA2) encryption method. However, you’ll find that the easy-to-setup WPA method (PSK or Pre-shared Key) is also vulnerable to cracking, which is explained in an earlier tutorial. Since each client or computer on the network has to be configured with the same passphrase, this method usually isn’t practical for small businesses that have employees using the network.
How WPA-Enterprise encryption works
If you require a highly secure wireless network, it’s best to use the WPA or WPA2 Enterprise encryption solution. After securely logging on to the network with a username and password, every client automatically receives a unique encryption key that’s long and regularly updated—making it impossible for a Wi-Fi snooper to intercept enough packets (within hundreds of years) per key to decode a key. Even if a key was somehow decoded, the extremely old hacker will find a new key would have already been put into place—the locks are already changed. Technically, WPA-PSK works by each client being assigned a unique encryption key, as well. However, the encryption keys for WPA-PSK are derived (between the client and access point/wireless router) in such a way that enables much easier decoding by eavesdroppers.
When using WPA-Enterprise, unlike WPA-PSK, employees won’t know the passphrase. This way they can’t share it with outsiders or use it when they are no longer employed with the company. WPA-Enterprise also can save you a great deal of time; the keys don’t have to manually changed on all of the clients. If you use WPA-PSK and you want to change the passphrase for your network (which is recommended on a regular basis to help prevent eavesdroppers from decoding it) you would have to go to each computer and input the new key.
Traditionally, the WPA-Enterprise implementation requires purchasing, installing, and configuring a RADIUS server and other technical components. This rather great investment of your money and time isn’t likely to be practical for your small business, especially if you lack a dedicated IT person or staff. This doesn’t have to be the case these days, however.
Your WPA-Enterprise options
In this series of tutorials you’ll discover some options to get enterprise-level wireless security to protect the sensitive information on your small business network. You don’t even have to drown yourself in the pool of network security acronyms. Here’s a sneak peak of some your options:
Buy an Access Point (AP) with a built-in RADIUS server: This is an easy way out; just purchase an AP with a built-in 802.1x RADIUS server that works with WPA/WPA2. You’ll find these APs, such as the USRobotics USR5453 or ZyAIR G-2000 Plus v2, online anywhere from $100 to $200 a piece. This solution typically is best if you only need a few APs for your entire wireless network and is more cost-effective if your APs already have this feature or you haven’t bought any yet.
To set up the server, all you have to do is select the wireless security type on the Web-based configuration screen and create accounts on the local databases of each of the APs. Then you can configure your client computers with the proper settings and you’re secured.
Use hosted third-party services: This is also another great way to ease the learning curve and simplify your wireless security journey. All you do is sign up for the service, configure your wireless router and/or APs, and set up your computers. The RADIUS server is hosted by the company. You’ll receive Web-based access to a portal where you can add/remove user accounts and APs.
WiTopia offers SecureMyWiFi, starting at $99 per year for one AP with up to 100 users, with +$99 one-time setup fee. Each additional AP costs $14.99 per year.
BoxedWireless offers this type of service for 1-10 users at $186 or 11-25 users at $257 per year (supports more users–see their Web site) with an unlimited number of APs.
Setup your own RADIUS server: If you want more control and flexibility of your encryption scheme, setting up a software-based server on your network that’s user-friendly and targeted towards small-businesses may be the way to go. That way you can have a bullet-proof Wi-Fi network up and running in a matter of an hour or two, rather than spending thousands of dollars on a traditional enterprise-level server that would take an average user days to wrap his or her head around.
You’ll need RADIUS/802.1x server software that supports protocols, such as Extensible Authentication Protocol (EAP). (We’ll discuss using Elektron in a later part.) The server handles the authentication of the clients trying to connect to your wireless network. It’s basically a database where you can list usernames and passwords for the people that you want to connect to your network. You input the address of the server into your wireless router and/or APs. Then, when someone tries to connect they’re prompted to login and the credentials are checked against those on the server. Additionally, the client computer must also have a certificate (a small file) installed and is checked against the certificates listed in the server.
Eric Geier is the Founder and President of Sky-Nets, Ltd., a Wi-Fi hotspot network. He is also the author of many networking and computing books, including Home Networking All-in-One Desk Reference For Dummies (Wiley 2008) and 100 Things You Need to Know about Microsoft® Windows Vista (Que 2007).
This article was first published on WiFiPlanet.com.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.