As described in the Key Terms section, WPA-2
is the preferred encryption method. Please
reference your vendor’s documentation to ensure what levels of encryption
are supported and how to properly implement them.
Copyright © 2007 CACI. All rights reserved.