Step 4: How do I setup WEP or WPA encryption?

As described in the Key Terms section, WPA-2 is the preferred encryption method.  Please reference your vendor’s documentation to ensure what levels of encryption are supported and how to properly implement them.  

 

Copyright © 2007 CACI. All rights reserved.