🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to configure WPA3-Enterprise and RADIUS to meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.17 and protect wireless access with strong authentication and encryption

Step-by-step guidance for configuring WPA3-Enterprise with RADIUS (EAP-TLS), certificates, and AP settings to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 wireless authentication and encryption requirements.

•
April 22, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Protecting controlled unclassified information (CUI) on wireless networks is a high-priority requirement under NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (Control AC.L2-3.1.17); the recommended, practical way to meet that requirement is to deploy WPA3-Enterprise with a RADIUS backend using certificate-based EAP (EAP-TLS) and hardened access point and RADIUS configurations.

Why WPA3-Enterprise + RADIUS (EAP-TLS) meets the compliance objective

WPA3-Enterprise provides stronger encryption (GCMP) and mandatory management frame protection (PMF) compared with legacy WPA/WPA2 modes; pairing it with a RADIUS server that enforces EAP-TLS gives you mutual authentication via X.509 certificates, eliminates reliance on shared passphrases, and produces audit records for authentication events — all outcomes that align with NIST/CMMC expectations for strong authentication and encryption for wireless access.

High-level implementation plan for a small business

At a practical level, implementers should follow these steps: (1) inventory APs and verify firmware supports WPA3-Enterprise (or plan hardware refresh), (2) deploy or subscribe to a RADIUS service (FreeRADIUS, Microsoft NPS, Cisco ISE, cloud RADIUS/NPS extension), (3) establish a PKI (internal CA or enterprise CA) and issue server and client certificates, (4) configure RADIUS to require EAP-TLS, (5) configure SSIDs on APs for WPA3-Enterprise pointing to RADIUS, (6) harden ciphers, require PMF, disable legacy fallbacks, and (7) enable logging, monitoring, and certificate lifecycle processes (CRL/OCSP, renewal automation).

Concrete technical details and example configurations

Small-business-friendly example: FreeRADIUS on a Linux VM + internal CA using OpenSSL. Create a CA, issue a RADIUS server certificate (subjectAltName with FQDN), and generate client certificates for devices or use MDM/SCEP to enroll laptops and phones. Configure eap.conf (or mods-enabled/eap) to use eap = tls and point to the server cert and private key. In FreeRADIUS clients.conf, add each AP with a long shared secret and restrict access by IP. On APs, create an SSID using WPA3-Enterprise, set RADIUS server IP/port (1812) and shared secret, select 802.1X authentication with EAP, and require PMF and AES-GCMP (avoid TKIP).

Example OpenSSL commands (simplified) to create CA and server cert:

openssl genrsa -out ca.key 4096
openssl req -x509 -new -nodes -key ca.key -sha256 -days 3650 -out ca.crt -subj "/CN=MyInternalCA"
openssl genrsa -out radius.key 2048
openssl req -new -key radius.key -out radius.csr -subj "/CN=radius.example.local"
openssl x509 -req -in radius.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out radius.crt -days 825 -sha256 -extfile v3ext.cnf
Then configure FreeRADIUS to use radius.crt/radius.key and trust the CA certificate.

Recommended RADIUS/EAP choices and cipher settings

For compliance and security, use EAP-TLS (mutual certs) as the primary EAP method. Avoid EAP-PEAP/MSCHAPv2 unless you have strong MFA and legacy client constraints. Configure TLS to accept only strong keys: prefer ECC P-256 or RSA 3072/4096 for server keys, and require TLS 1.2+ with strong ciphers. On the Wi‑Fi side, select WPA3-Enterprise (128-bit) or WPA3-Enterprise 192-bit mode if you need higher assurance; ensure the AP enforces AES-GCMP (GCMP-128 or GCMP-256) and that Management Frame Protection is required (802.11w required).

Operational controls, logging and lifecycle management

Compliance requires not just initial configuration but ongoing operational controls: time synchronization (NTP) across APs and RADIUS for certificate validation; CRL / OCSP publishing and RADIUS OCSP checks if you revoke client certs; log authentication attempts and failures and forward to a central syslog/SIEM for retention consistent with your policy (NIST often expects audit logging and retention to support incident response); and implement monitoring/alerts for spikes in failed authentications or AP configuration changes.

Small-business scenarios and deployment options

Scenario A — Minimal on-prem: Use a small Linux VM running FreeRADIUS and an internal CA; distribute client certs via an MDM (Intune, Workspace ONE) or manually for a dozen devices. Scenario B — Hybrid/Cloud: Use Azure AD + NPS extension or a cloud RADIUS provider that integrates with your identity provider and uses client certs or device posture checks. Scenario C — Mixed clients: If some IoT devices cannot do EAP-TLS, place them on a segmented guest/VLAN with firewall rules restricting CUI access, and require separate authentication for endpoints handling CUI.

Compliance tips, best practices, and risks of non-implementation

Best practices: enforce certificate-based authentication (EAP-TLS), automate certificate issuance/renewal via SCEP/MDM, disable WPA/WPA2 personal and TKIP, require PMF, use long RADIUS shared secrets and limit AP management to out-of-band connections, and document configurations and policies. Test with multiple client OS versions and maintain a procedure for revoked certificates. The risks of failing to implement these controls include eavesdropping of wireless traffic, rogue APs and credential theft when PSKs are used, lateral movement into CUI repositories, failed audits, loss of DoD contracts, and legal/financial penalties for non-compliance.

Summary: To meet AC.L2-3.1.17 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, implement WPA3-Enterprise with a RADIUS server enforcing EAP-TLS, strong certificate lifecycles, hardened AP settings (PMF and AES-GCMP), centralized logging, and operational processes for monitoring and certificate revocation; for small businesses, this can be achieved with FreeRADIUS or cloud/NPS solutions combined with an MDM for certificate distribution, delivering both the technical protections and the documented controls auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes