Configuration should include utilization of the concepts needed to install and confiture wireless configuration settings such as
- cryptographic protocols
- Wireless Fidelity (WiFi) Protected Access II (WPA2)
- WiFi Protected Access III (WPA3)
- authentication protocols
- Institution of Electrical and Electronics Engineers (IEEE) 802.1X
- Remote Authentication Dial-in User Service (RADIUS) federation
- methods
- pre-shared key (PSK) vs. enterprise vs. open
- WiFi Protected Setup (WPS)
- captive portals
- installation considerations
- site surveys
- heat maps
- WiFi analyzers
- channel overlays
- wireless access point (WAP) placement.