{"id":5862,"date":"2023-03-03T21:00:00","date_gmt":"2023-03-03T21:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2011\/02\/14\/upgrading-wi-fi-security-from-wep-to-wpa2\/"},"modified":"2023-04-04T18:20:39","modified_gmt":"2023-04-04T18:20:39","slug":"upgrading-wi-fi-security-from-wep-to-wpa2","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/","title":{"rendered":"How to Configure a Router to Use WPA2 in 7 Easy Steps"},"content":{"rendered":"<p>Most of us connect our mobile devices to a Wi-Fi router for internet access, but this connection can leave our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> and data vulnerable to cyber threats. To protect against those threats, a Wi-Fi Protected Access (WPA) encryption protocol is recommended. And even though it&#8217;s been around since 2004, WPA2 remains the Wi-Fi security standard.<\/p>\n<p>WPA2 is a security protocol that <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">secures wireless networks<\/a> using the advanced encryption standard (AES). The protocol protects your incoming and outgoing internet traffic and makes it difficult for cyber criminals to intercept your data or hack your device. If implemented and configured properly, WPA2 is stronger and more resistant to potential attacks than predecessor technologies like WEP (Wired Equivalent Privacy) and WPA.<\/p>\n<p>Although WPA3 has been around for five years, its uptake remains <a href=\"https:\/\/wigle.net\/stats\" target=\"_blank\" rel=\"noopener\">less than 1%<\/a>. WEP and WPA are both under 4%, while WPA2 commands a 73% share of known wireless encryption connections.<\/p>\n<p>Older routers and devices may not support WPA2, but if your devices support it, upgrading to WPA2 is a fairly simple process.<\/p>\n<h2>7 Steps to Configure Your Router for WPA2<\/h2>\n<ol>\n<li><a href=\"#log-in\">Log Into Your Router Console<\/a><\/li>\n<li><a href=\"#navigate\">Navigate to the Router Security Panel<\/a><\/li>\n<li><a href=\"#encryption\">Select Encryption Option<\/a><\/li>\n<li><a href=\"#password\">Set Your Network Password<\/a><\/li>\n<li><a href=\"#save\">Save Changes<\/a><\/li>\n<li><a href=\"#reboot\">Reboot<\/a><\/li>\n<li><a href=\"#log-in-again\">Log In<\/a><\/li>\n<\/ol>\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/trends\/the-best-security-for-wireless-networks\/\" target=\"_blank\" rel=\"noopener\"><strong>Wireless Security: WEP, WPA, WPA2 and WPA3 Explained<\/strong><\/a><\/p>\n<h2 id=\"log-in\">Step 1: Log Into Your Router Console<\/h2>\n<p>Using the browser of your choice, log into the admin console of your home router. The exact method for doing this may vary depending on your router manufacturer. You can refer to your Router Manual for more details. However, the most common method is to enter http:\/\/192.168.1.1 into the browser address bar and press ENTER; http:\/\/10.0.0.1\/ is another common router IP address.<\/p>\n<p>If those don&#8217;t work, you can type &#8220;cmd&#8221; into the search bar of your Windows machine to call up the command line interface, then type &#8220;ipconfig&#8221; and hit enter; the address will be under Default Gateway. On a Mac, you might find it in the TCP\/IP tab of Advanced Network settings in System Preferences, while in Linux you&#8217;ll find it under Connection Information after clicking on the network icon.<\/p>\n<p>The typical username and password for Wi-Fi routers is &#8220;admin&#8221; for both, but you may need to search online or contact your ISP if that doesn&#8217;t work. And while you&#8217;re in there, update that password to something a little less hackable, possibly saving the new one in a <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/p>\n<p>As long as you&#8217;re in there, you should look around and address any security warnings; perhaps your firewall security setting is too low, for example.<\/p>\n<h2 id=\"navigate\">Step 2: Navigate to the Router Security Panel<\/h2>\n<p>The next step is to navigate to the Wireless &gt; Security menu option, which may vary depending on the router. Check your router manufacturer\u2019s website or manual for specific instructions, or just navigate your way around until you find it. Here&#8217;s a screenshot of one route and settings:<\/p>\n<figure id=\"attachment_27549\" aria-describedby=\"caption-attachment-27549\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-27549\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2011\/02\/wifi-security-1024x576.jpg\" alt=\"wi-fi security\" width=\"696\" height=\"392\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-1024x576.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-300x169.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-768x432.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-1536x865.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-150x84.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-696x392.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security-1068x601.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg 1631w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-27549\" class=\"wp-caption-text\">Wi-Fi router admin dashboard<\/figcaption><\/figure>\n<h2 id=\"encryption\">Step 3: Select Encryption Option<\/h2>\n<p>Select the encryption option WPA2-PSK. If this option is not available, you may need to upgrade the router firmware.<\/p>\n<p>Note that some routers also offer a WPA2-Enterprise setting, which is designed for corporate environments. Your router may not offer WPA3, and even if it does, all your devices might not be compatible.<\/p>\n<h2 id=\"password\">Step 4: Set Your Network Password<\/h2>\n<p>Create a strong network password that meets the following requirements:<\/p>\n<ul>\n<li>Must be at least eight characters long<\/li>\n<li>It should have a combination of uppercase and lowercase letters<\/li>\n<li>It should contain a mix of letters, numbers, and symbols<\/li>\n<\/ul>\n<h2 id=\"save\">Step 5: Save Changes<\/h2>\n<p>Click Save or Apply to confirm the changes.<\/p>\n<h2 id=\"reboot\">Step 6: Reboot<\/h2>\n<p>Reboot your router, if necessary, to apply the changes.<\/p>\n<h2 id=\"log-in-again\">Step 7: Log In<\/h2>\n<p>Connect all your wireless devices, select your new Wi-Fi SSID, and enter your new Wi-Fi password to complete the process.<\/p>\n<h2>Consider Upgrading From WPA2 to WPA3<\/h2>\n<p>WPA3 is the latest wireless security protocol that is designed to address some of the security weaknesses of WPA2. It includes features such as Simultaneous Authentication of Equal (SAE), the Dragonfly handshake, simplified setup, better IoT device security, and future proofing.<\/p>\n<p>Even though WPA3 is the upgraded version of WPA2, this doesn\u2019t mean that you have to immediately implement this upgrade. This will depend on your devices&#8217; and network\u2019s compatibility. You&#8217;ll have to check the documentation of your devices to see if they&#8217;re compatible. But in the meantime, WPA2 with a good firewall setting and antivirus software on your devices is pretty good security.<\/p>\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noopener\"><strong>Best Antivirus Software<\/strong><\/a><\/p>\n<h2>6 Differences Between WPA2 and WPA3<\/h2>\n<p>WPA3 provides improved security features compared to WPA2. However, it is important to note that not all devices and networks support WPA3, and upgrading can be unnecessary or impractical for all situations. Here are the differences between WPA2 and WPA3:<\/p>\n<ol>\n<li><strong>Stronger encryption:<\/strong> WPA3 uses a stronger encryption algorithm (256-bit encryption) compared to WPA2 (128-bit encryption). This makes it more difficult for attackers to intercept and decrypt wireless traffic.<\/li>\n<li><strong>Protection against brute force attacks: <\/strong>WPA3 uses SAE, a new authentication method that protects against attacks on the Wi-Fi network&#8217;s password. This makes it more difficult for attackers or anyone to guess or crack the password.<\/li>\n<li><strong>Protection against offline dictionary attacks: <\/strong>A new key exchange protocol called Dragonfly is used in WPA3, which protects against offline dictionary attacks, a password guessing attack. That&#8217;s a significant improvement over WPA2.<\/li>\n<li><strong>Better IoT device security: <\/strong>WPA3 introduced Protected Management Frames (PMF), which provides better protection for IoT devices. PMF ensures that these devices are authenticated and encrypted even if they don\u2019t support WPA3.<\/li>\n<li><strong>Simplified setup: <\/strong>WPA3 includes a feature called Wi-Fi Easy Connect, which makes it easier to set up devices on a Wi-Fi network with the need for a password. This features QR code or Near Field Communications (NFC) to securely connect devices to the network.<\/li>\n<li><strong>Improved security for public Wi-Fi:<\/strong> WPA3 introduces a feature called Opportunistic Wireless Encryption (OWE), which encrypts wireless traffic even if the user doesn\u2019t enter a password or if the password is insecure.<\/li>\n<\/ol>\n<h2>Bottom Line: Configuring a Router to Use WPA2<\/h2>\n<p>WPA2 has been in use for about 20 years, which means that there are very few devices and routers left that don&#8217;t support the protocol. That&#8217;s pretty convenient, because it remains the default Wi-Fi security standard.<\/p>\n<p>And if you&#8217;ve never done it, it&#8217;s kind of fun going into your Wi-Fi router admin panel, so even if you&#8217;re already on WPA2, it&#8217;s good to check the security settings in there anyway. You may find something that needs to be addressed.<\/p>\n<p>If your devices and router support WPA3, by all means upgrade to that protocol. If not, WPA2 will do for now.<\/p>\n<p><strong>Read next:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-wifi-6-routers\/\"><strong>The Best Wi-Fi 6 Routers Secure and Fast Enough for Business<\/strong><\/a><\/p>\n<p><em>This updates a 2011 article by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/eric-geier-esp\/\" target=\"_blank\" rel=\"noopener\"><em>Eric Geier<\/em><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6dae41a250-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6dae41a250\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6dae41a250\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6dae41a250\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6dae41a250\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6dae41a250\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6dae41a250\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Most of us connect our mobile devices to a Wi-Fi router for internet access, but this connection can leave our network and data vulnerable to cyber threats. To protect against those threats, a Wi-Fi Protected Access (WPA) encryption protocol is recommended. And even though it&#8217;s been around since 2004, WPA2 remains the Wi-Fi security standard. [&hellip;]<\/p>\n","protected":false},"author":318,"featured_media":27549,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[15272,584,4272,31077,31345,5186],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[400,383,378,395,31779,381,393,392,396],"class_list":["post-5862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-linux-security","tag-mac","tag-wi-fi","tag-windows-security","tag-wireless-router-security","tag-wireless-security","b2b_audience-implementation-and-support","b2b_product-antivirus","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-iot-security","b2b_product-network-access-control-nac","b2b_product-virtual-private-network-vpn","b2b_product-web-security","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Configure a Router to Use WPA2 in 7 Easy Steps<\/title>\n<meta name=\"description\" content=\"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Configure a Router to Use WPA2 in 7 Easy Steps\" \/>\n<meta property=\"og:description\" content=\"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-03T21:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-04T18:20:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1631\" \/>\n\t<meta property=\"og:image:height\" content=\"918\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kaye Timonera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaye Timonera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\"},\"author\":{\"name\":\"Kaye Timonera\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\"},\"headline\":\"How to Configure a Router to Use WPA2 in 7 Easy Steps\",\"datePublished\":\"2023-03-03T21:00:00+00:00\",\"dateModified\":\"2023-04-04T18:20:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\"},\"wordCount\":1155,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg\",\"keywords\":[\"Linux security\",\"Mac\",\"Wi-Fi\",\"Windows security\",\"wireless router security\",\"wireless security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\",\"name\":\"How to Configure a Router to Use WPA2 in 7 Easy Steps\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg\",\"datePublished\":\"2023-03-03T21:00:00+00:00\",\"dateModified\":\"2023-04-04T18:20:39+00:00\",\"description\":\"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg\",\"width\":1631,\"height\":918,\"caption\":\"Wi-Fi router admin dashboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Configure a Router to Use WPA2 in 7 Easy Steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\",\"name\":\"Kaye Timonera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"caption\":\"Kaye Timonera\"},\"description\":\"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Configure a Router to Use WPA2 in 7 Easy Steps","description":"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/","og_locale":"en_US","og_type":"article","og_title":"How to Configure a Router to Use WPA2 in 7 Easy Steps","og_description":"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/","og_site_name":"eSecurity Planet","article_published_time":"2023-03-03T21:00:00+00:00","article_modified_time":"2023-04-04T18:20:39+00:00","og_image":[{"width":1631,"height":918,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg","type":"image\/jpeg"}],"author":"Kaye Timonera","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaye Timonera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/"},"author":{"name":"Kaye Timonera","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f"},"headline":"How to Configure a Router to Use WPA2 in 7 Easy Steps","datePublished":"2023-03-03T21:00:00+00:00","dateModified":"2023-04-04T18:20:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/"},"wordCount":1155,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg","keywords":["Linux security","Mac","Wi-Fi","Windows security","wireless router security","wireless security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/","url":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/","name":"How to Configure a Router to Use WPA2 in 7 Easy Steps","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg","datePublished":"2023-03-03T21:00:00+00:00","dateModified":"2023-04-04T18:20:39+00:00","description":"Learn how to configure a router to use the WPA2 security protocol. Follow our step-by-step guide to secure your network today.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2011\/02\/wifi-security.jpg","width":1631,"height":918,"caption":"Wi-Fi router admin dashboard"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/upgrading-wi-fi-security-from-wep-to-wpa2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Configure a Router to Use WPA2 in 7 Easy Steps"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f","name":"Kaye Timonera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","caption":"Kaye Timonera"},"description":"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.","url":"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5862"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=5862"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5862\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/27549"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=5862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=5862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=5862"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=5862"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=5862"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=5862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}