Overview ............................................................................................................................................... 119
Using WEP ............................................................................................................................................ 119
Using WPA2-PSK .............................................................................................................................. 120
Using WPA2-Enterprise .................................................................................................................. 120
3