Trying to get off of WPA2 entirely isn't doable as we have devices that don't know nothing about no WPA3. Even our one year old SleepNumber bed cannot handle it.
It is clear that most vendors do not strictly adhere to the security requirements of WiFi7. They allow negotiation of EHT and MLO without SAE-EXT, GCMP-256, beacon protection.
GCMP-256 is still optional, so CCMP-128 is fine there - the risk the vendors have if they do not do WPA3 (PMF is required with WPA3, BTW) is that clients will just connect at the lower/older rates...
The secondary SSID is useful for older WiFi4/5 clients that cannot support WPA3, which as discussed in this thread, are still a real thing, esp with IoT devices, but also older PC's that run Win7 or even WinXP where WPA3 is a non-starter for most (device drivers also have to support it). And it's not just Windows - older Mac and iDevices may not support WPA3, and same goes with Linux, esp with older HW.
The AP shall, if the BSS enables EHT or MLO, irrespective of the band the BSS is operating on, advertise the single pairwise cipher GCMP-256 in the RSNE Override 2 element.
Cisco's documentation and the WPA3 specification both claim that GCMP-256 is necessary, and I'm not sure the same is true for ieee802.11be, which is still hidden behind a paywall.
The AP shall, if the BSS enables EHT or MLO, irrespective of the band the BSS is operating on, advertise the single pairwise cipher GCMP-256 in the RSNE Override 2 element.
From what I understand, EHT does support both CCMP-128 and GCMP-256.GCMP256 support is required for the wifi7 client in any case - one can deploy WiFi7 w/o MLO, so EHT can still use CCMP-128 for WPA3-Personal
If I understand correctly, WPA3-Enterprise is just WPA2-Enterprise+PMF, and WPA3-Enterprise 192-bit really changes AKM and only supports GCMP-256 from the start.WPA3-Enterprise, if I read the spec correctly, mandates GCMP-256 whether MLO is deployed or not.
Since in 2025 not all the clients support WPA3 - I'm running WPA2-Personal on all home networks. Mixed mode and separate SSIDs all giving access to the main network doesn't make sense to me. Two doors to the same room locked with different keys. No issues with WPA2 and not going to play with firewall rules per client. Business networks are perfectly fine with WPA2-Enterprise.
I'm a WPA3-only guy, not only that, H2E and 11ax are also configured to be mandatory like WPA3. All my devices are 6E/7, no IoT ewaste.I'm highly in doubt someone is actually running WPA3 only or has more than a few Wi-Fi 7 devices different than phone/tablet.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!