WPA3 security enhancements for APs
WPA3 security enhancements for access points are wireless security features that
-
introduce advanced encryption methods such as GCMP-256 and SuiteB-192-1X AKM
-
strengthen authentication and data protection with features like SAE-EXT-KEY support and AP beacon protection, and
-
allow multiple cipher suites to be configured per WLAN, providing greater flexibility and security for wireless networks.
Cipher suites are sets of encryption and integrity algorithms designed to protect radio communication on your wireless LANs. You must use a cipher suite when using Wi-Fi Protected Access (WPA), WPA2, WPA3, or Cisco Centralized Key Management (CCKM). Wired Equivalent Privacy, or WEP, is a form of wireless authentication used for associating to 802.11 wireless networks.
|
Feature Name |
Release |
Description |
|---|---|---|
|
Wi-Fi 7 WPA3 Security Constraints |
Cisco IOS XE 17.15.2 |
In this release, the Wi-Fi 7 standard dictates these security constraints, which are applicable for Wi-Fi 7–compliant APs. The security standards listed are beaconed as Wi-Fi 7 clients, which is a deviation from the actual security constraint.
|
|
Decoupled GCMP-256 and Suite-B-192-1X AKM Configuration |
Cisco IOS XE 17.15.1 |
There is a strong dependency between the GCMP-256 cipher and the Suite-B-192-1X AKM. Until Cisco IOS XE 17.14.1, configuring the GCMP-256 cipher automatically enabled the Suite-B-192-1X AKM because it could not be enabled separately using commands. In the Cisco IOS XE 17.15.1 release, this dependency is removed through new configuration options, allowing the GCMP-256 cipher to be used with other supported AKMs. Suite-B-192-1X AKM is useful for enterprise networks, including federal government and health care deployments that require the highest level of security. Until Cisco IOS XE 17.14.1, Suite-B-192-1X AKM was tied to GCMP-256 and was implicitly enabled when GCMP-256 was configured at the WLAN level. From Cisco IOS XE 17.15.1 onward, a new AKM configuration allows Suite-B-192-1X AKM to be enabled separately, and GCMP-256 cipher configuration applies only to the cipher. |
|
Wi-Fi Protected Access (WPA3) Security Enhancements for Access Points |
Cisco IOS XE 17.15.1 |
From Cisco IOS XE 17.15.1 onwards, OWE association is supported on both CCMP-128 and GCMP-256 ciphers. If you configure both
ciphers, a client will select its desired cipher suite while connecting in the association request.
The security enhancements developed in Cisco IOS XE 17.15.1 for APs are:
The configuration commands introduced are:
|
|
Opportunistic Wireless Encryption (OWE) Support with GCMP-256 Cipher |
Cisco IOS XE 17.14.1 |
Until Cisco IOS XE 17.14.1, OWE was supported with the CCMP-128 cipher. |
Benefits of using GCMP-Based ciphers
-
Provides secure communication and data transmission.
-
Provides confidentiality and integrity protection.
-
Provides parallel processing and fast encryption.
Wireless Encryption Methods for Data Protection
Encryption protects data by making it unreadable to unauthorized users.
These are the encryption protocols are used in wireless authentication.
-
Temporal Key Integrity Protocol (TKIP): TKIP is the encryption method used by WPA and supports legacy WLAN equipment. TKIP addresses the original flaws associated with the 802.11 WEP encryption method. It makes use of WEP but encrypts the Layer 2 payload using TKIP and carries out a message integrity check (MIC) in encrypted packets to ensure that messages have not been altered.
-
Advanced Encryption Standard (AES): AES uses Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP), which allows destination hosts to recognize if the encrypted and non-encrypted bits have been altered.

Attention
AES is a preferred method because of its strong encryption.
CCMP is the standard encryption protocol for use with Wi-Fi Protected Access 2 (WPA2) and is much more secure than the WEP protocol, and TKIP of WPA.
-
Galois or Counter Mode Protocol (GCMP): GCMP is more secure and efficient than CCMP.
![]() Note |
Choose the appropriate note type from the attributes. |
Supported platforms
-
Cisco Catalyst 9800-CL Wireless Controller for Cloud
-
Cisco Catalyst 9800-L Wireless Controller
-
Cisco Catalyst 9800-40 Wireless Controller
-
Cisco Catalyst 9800-80 Wireless Controller
-
Cisco Catalyst 9300 Series Switches
-
Cisco Embedded Wireless Controller on Catalyst Access Points
Supported APs
-
Cisco Aironet 2800 Series Access Points
-
Cisco Aironet 3800 Series Access Points
-
Cisco Aironet 4800 Series Access Points
-
Cisco Catalyst 9117 Series Access Points
-
Cisco Catalyst 9124AX Series Access Points
-
Cisco Catalyst 9130AX Series Access Points
-
Cisco Catalyst 9136 Series Access Points
-
Cisco Catalyst 9162 Series Access Points
-
Cisco Catalyst 9164 Series Access Points
-
Cisco Catalyst 9166 Series Access Points
-
Cisco Aironet 1560 Series Outdoor Access Points
Restrictions
-
WPA3 is not supported on Cisco Wave 1 APs.
-
GCMP-256 is not supported on Cisco Catalyst 9105, 9110, 9115, 9120 APs and 802.11ac Wave2 QCA APs such as 1852.
-
Beacon Protection is only supported on QCA-based APs, such as 9130 , 9136, 9162, 9164, and 9166.
GCMP-256 Cipher and SuiteB-192-1X AKM
A GCMP-256 cipher and SuiteB-192-1X AKM are Wi-Fi security mechanisms that
-
provide strong encryption and authentication for wireless communications
-
help meet high-security requirements for environments such as government and healthcare, and
-
support flexible configuration in recent Cisco IOS XE releases.
Decoupled GCMP-256 and Suite-B-192-1X AKM configuration
There is a strong dependency between the GCMP-256 cipher with Suite-B-192-1X AKM. Therefore, until Cisco IOS XE 17.14.1, if you configure the GCMP-256 cipher, the Suite-B-192-1X AKM automatically gets enabled, as Suite-B-192-1X Authentication and Key Management (AKM) cannot be enabled separately using commands.
In the Cisco IOS XE 17.15.1 release, certain commands eliminate the dependency between Suite-B-192-1X AKM and the GCMP-256 cipher. CMP-256 cipher can be configured with other supported AKMs.
GCMP-256 cipher and Suite-B-192-1X AKM were previously strongly dependent features.
-
Until Cisco IOS XE 17.14.1, enabling GCMP-256 cipher also enabled Suite-B-192-1X AKM, and Suite-B-192-1X AKM could not be enabled separately.
-
From Cisco IOS XE 17.15.1 onwards, the dependency is removed and each can be configured independently.
Configure SuiteB-192-1X AKM (GUI)
Enable SuiteB-192-1X Authentication and Key Management (AKM) for a WLAN using the required cipher combinations.
Use this procedure to configure secure authentication and encryption for WLANs, ensuring compliance with SuiteB-192-1X standards.
Before you begin
Confirm the device supports SuiteB-192-1X AKM and required cipher options.
Procedure
|
Step 1 |
Choose Configuration > Tags & Profiles > WLANs. |
||||
|
Step 2 |
Click Add. The Add WLAN window is displayed. |
||||
|
Step 3 |
In the General tab, enter the Profile Name, SSID, and the WLAN ID. |
||||
|
Step 4 |
Choose Security > Layer2, select one of these options:
The Auth Key Mgmt (AKM) section displays the AKMs supported by the cipher you select in the WPA2/WPA3 Encryption section. Valid cipher and AKM combinations are displayed in the Auth Key Mgmt (AKM) section. For example, to enable SuiteB-192-1x AKM,
|
||||
|
Step 5 |
In the WPA2 Encryption section, check the GCMP256 check box. Valid cipher and AKM combinations are displayed in the Auth Key Mgmt (AKM) section. |
||||
|
Step 6 |
In the Fast Transition section, in the Status drop-down list, select Disabled.
|
||||
|
Step 7 |
In the Auth Key Mgmt (AKM) section, check the SUITEB192-1X check box. |
||||
|
Step 8 |
Click Apply to Device. |
The WLAN is now configured with SuiteB-192-1X AKM and the required ciphers, enabling secure authentication and encryption.
Configure SuiteB-192-1X AKM (CLI)
Enable SuiteB-192-1X Authentication and Key Management (AKM) for a WLAN using the required cipher combinations.
Use this procedure to configure secure authentication and encryption for WLANs, ensuring compliance with SuiteB-192-1X standards.
Before you begin
Confirm the device supports SuiteB-192-1X AKM and required cipher options.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the WLAN profile and SSID. Enter the WLAN configuration mode. Example:
|
|
Step 3 |
Disable adaptive 802.11r. Example:
|
|
Step 4 |
Disable security AKM for 802.1X. Example:
|
|
Step 5 |
Configure the SuiteB-192-1X support. Example:
|
|
Step 6 |
Configure the GCMP256 support using the security wpa wpa2 ciphers {aes | ccmp256 | gcmp128 | gcmp256} command. Example:
|
The WLAN is now configured with SuiteB-192-1X AKM and the required ciphers, enabling secure authentication and encryption.
Feedback