networkstandards

SSID and Wireless Security Standards

Overview

This document defines the standard SSIDs, security configurations, and network segmentation requirements for municipal wireless networks. All configurations implement WPA3-Enterprise security and IEEE 802.1X authentication to ensure compliance with NIST guidelines.

Standards References

Standard Title Ratification Date Scope
IEEE 802.11i-2004 Security Enhancements July 2004 WPA2 security framework
IEEE 802.11w-2009 Protected Management Frames September 2009 PMF/MFP
IEEE 802.1X-2020 Port-Based Network Access Control February 2020 Authentication
Wi-Fi Alliance WPA3 v3.5 WPA3 Specification February 2025 WPA3-Enterprise
IETF RFC 9190 EAP-TLS 1.3 February 2022 Certificate authentication with TLS 1.3
IETF RFC 7542 Network Access Identifier May 2015 User identity format
NIST SP 800-153 Guidelines for Securing WLANs February 2012 WLAN security

SSID Architecture

graph TB
    subgraph WIRELESS["Wireless Network Architecture"]
        subgraph ENTERPRISE["Enterprise SSIDs (802.1X)"]
            CORP["MUNI-CORP<br/>Corporate devices<br/>VLAN 20"]
            SECURE["MUNI-SECURE<br/>Restricted systems<br/>VLAN 50"]
        end

        subgraph MANAGED["Managed SSIDs"]
            IOT["MUNI-IOT<br/>IoT devices<br/>VLAN 200"]
        end

        subgraph PUBLIC["Public SSIDs"]
            GUEST["MUNI-GUEST<br/>Visitor access<br/>VLAN 100"]
        end
    end

    CORP -->|"802.1X EAP-TLS"| RADIUS[RADIUS Server]
    SECURE -->|"802.1X + Cert"| RADIUS
    IOT -->|"WPA3-Personal"| PSK[Managed PSK]
    GUEST -->|"Captive Portal"| PORTAL[Portal Server]

    RADIUS --> AD[Active Directory]
    RADIUS --> PKI[Certificate Authority]

Standard SSID Definitions

SSID Summary Table

SSID Name Purpose Security Auth Method VLAN Broadcast
MUNI-CORP Managed employee devices WPA3-Enterprise 802.1X EAP-TLS 20 Hidden
MUNI-GUEST Visitor/public access OWE + Portal Captive portal 100 Visible
MUNI-IOT IoT devices WPA3-Personal Pre-shared key 200 Hidden
MUNI-SECURE High-security systems WPA3-Enterprise 802.1X + certs 50 Hidden

Security Comparison

graph LR
    subgraph SECURITY_LEVELS["Security Levels"]
        HIGH["🔒 HIGH<br/>MUNI-SECURE<br/>MUNI-CORP"]
        MEDIUM["🔓 MEDIUM<br/>MUNI-IOT"]
        LOW["🌐 LOW<br/>MUNI-GUEST"]
    end

    HIGH -->|"WPA3-Enterprise<br/>802.1X + Certificates"| TRUSTED[Trusted Network Access]
    MEDIUM -->|"WPA3-Personal<br/>Managed PSK"| RESTRICTED[Restricted Access]
    LOW -->|"OWE Encryption<br/>Captive Portal"| INTERNET[Internet Only]

SSID Detailed Specifications

MUNI-CORP (Corporate)

Purpose: Primary network for managed devices and authenticated employees.

Configuration

Setting Value Standard Reference
Security protocol WPA3-Enterprise Wi-Fi Alliance WPA3
Encryption AES-GCMP-256 IEEE 802.11i
Authentication 802.1X EAP-TLS RFC 9190
PMF (802.11w) Required IEEE 802.11w-2009
RADIUS server Primary + Secondary RFC 2865
VLAN assignment 20 (CORP) IEEE 802.1Q
Bands 6 GHz preferred, 5 GHz, 2.4 GHz available IEEE 802.11be-2024
Multi-Link Operation Enabled (WiFi 7 clients) IEEE 802.11be-2024
Broadcast SSID Hidden Security best practice
Client isolation Disabled Inter-client communication allowed
Fast roaming 802.11r (FT) enabled IEEE 802.11r-2008
Band steering Enabled (prefer 6 GHz → 5 GHz → 2.4 GHz)

Authentication Flow

sequenceDiagram
    participant Client
    participant AP as Access Point
    participant RADIUS
    participant AD as Active Directory
    participant CA as Certificate Authority

    Client->>AP: Association Request
    AP->>Client: Association Response
    AP->>Client: EAP-Request/Identity
    Client->>AP: EAP-Response/Identity
    AP->>RADIUS: Access-Request
    RADIUS->>Client: EAP-TLS: Server Certificate
    Client->>RADIUS: EAP-TLS: Client Certificate
    RADIUS->>CA: Validate Certificate
    CA->>RADIUS: Certificate Valid
    RADIUS->>AD: Check User/Device
    AD->>RADIUS: Authorized
    RADIUS->>AP: Access-Accept (VLAN 20)
    AP->>Client: EAP-Success
    Client->>AP: 4-Way Handshake
    AP->>Client: Connected (VLAN 20)

MUNI-GUEST (Guest)

Purpose: Internet access for visitors, contractors, and personal devices.

Configuration

Setting Value
Security OWE (Enhanced Open) — AES-CCMP-128, PMF required
Access Captive portal with terms acceptance, 8-hour session timeout
Network VLAN 100 (GUEST), client isolation enabled, 10/5 Mbps bandwidth limit
Bands 2.4 GHz, 5 GHz, 6 GHz (WiFi 7 clients)

For the complete MUNI-GUEST SSID configuration specification, see OWE Enhanced Open Standards.

OWE Requirement (Effective 2026): OWE is mandatory for all guest networks — per-client encryption without passwords, protecting guests from passive eavesdropping while maintaining zero-friction access.

Network Restrictions

flowchart LR
    GUEST_CLIENT[Guest Device] --> GUEST_VLAN[VLAN 100]
    GUEST_VLAN --> FIREWALL{Firewall Rules}
    FIREWALL -->|"✅ Allowed"| INTERNET[Internet]
    FIREWALL -->|"❌ Blocked"| CORP[Corporate Networks]
    FIREWALL -->|"❌ Blocked"| MGMT[Management Networks]
    FIREWALL -->|"❌ Blocked"| PRINTERS[Printers]
Access Status Notes
Internet ✅ Allowed Via content filter
Corporate resources ❌ Blocked No internal access
Printers ❌ Blocked Security isolation
DNS ✅ Filtered Malware/phishing protection
Other guest clients ❌ Blocked Client isolation enabled

MUNI-IOT (Internet of Things)

Purpose: Connected devices including sensors, displays, and smart building systems.

Configuration

Setting Value Rationale
Security protocol WPA3-Personal (SAE) Device compatibility
Encryption AES-CCMP-128 Standard encryption
Pre-shared key Rotated quarterly Managed via secure process
PMF (802.11w) Required Management frame protection
VLAN assignment 200 (IOT) Isolated from corporate
Bands 2.4 GHz only IoT device compatibility
Broadcast SSID Hidden Reduce attack surface
Client isolation Enabled Prevent lateral movement
Bandwidth limit 5 Mbps down / 2 Mbps up IoT requirements minimal

Access Controls

flowchart TD
    IOT_DEVICE[IoT Device] --> IOT_VLAN[VLAN 200]
    IOT_VLAN --> ACL{Access Control List}
    ACL -->|"✅ Allowed"| CLOUD[Specific Cloud Services]
    ACL -->|"✅ Allowed"| NTP[Time Servers]
    ACL -->|"✅ Allowed"| DNS[DNS Servers]
    ACL -->|"❌ Blocked"| CORP_NET[Corporate Network]
    ACL -->|"❌ Blocked"| INTERNET[General Internet]
    ACL -->|"❌ Blocked"| OTHER_IOT[Other IoT Devices]

MUNI-SECURE (Restricted)

Purpose: High-security systems requiring enhanced authentication.

Configuration

Setting Value Rationale
Security protocol WPA3-Enterprise 192-bit Maximum security
Encryption AES-GCMP-256 Suite B cryptography
Authentication 802.1X EAP-TLS Certificate required
PMF (802.11w) Required Management frame protection
Additional MAC allowlist Defense in depth
VLAN assignment 50 (SECURE) Restricted network
Bands 6 GHz preferred, 5 GHz fallback Performance, security, less interference
Multi-Link Operation Enabled (WiFi 7 clients) Reliability for critical systems
Broadcast SSID Hidden Reduce visibility
Client isolation Disabled Authorized inter-client
Certificate requirement User + Device Dual certificate validation

WiFi 7 MLO Benefit: Multi-Link Operation ensures seamless connectivity for secure systems by maintaining simultaneous links across bands—if one band experiences interference, traffic continues on alternate links without session interruption.


SSID Count Limits

Policy Statement

Hard Limit: Maximum 4 SSIDs per access point.

This is a mandatory configuration limit with no exceptions. All municipal wireless deployments must not exceed four (4) SSIDs per physical access point. This limit applies regardless of AP model, vendor, or deployment scenario.

Current SSID Inventory

The municipal wireless network operates at maximum SSID capacity:

SSID Purpose Status
MUNI-CORP Corporate devices Required
MUNI-GUEST Guest/visitor access Required
MUNI-IOT IoT devices Required
MUNI-SECURE High-security systems Required

No additional SSIDs may be configured. Requests for new SSIDs must be addressed by consolidating existing use cases or leveraging VLAN/RADIUS-based policy differentiation within existing SSIDs.

Technical Justification

Beacon Frame Overhead

Each SSID requires its own beacon frame broadcast per IEEE 802.11:

graph LR
    subgraph BEACON_CYCLE["Beacon Transmission per SSID"]
        B1["Beacon 1<br/>102.4 ms"]
        B2["Beacon 2<br/>102.4 ms"]
        B3["Beacon 3<br/>102.4 ms"]
        BN["...continuous"]
    end

    B1 --> B2 --> B3 --> BN

    subgraph OVERHEAD["Airtime Consumed"]
        O1["2.8% at 1 Mbps<br/>(2.4 GHz legacy)"]
        O2["0.47% at 6 Mbps<br/>(5 GHz / 6 GHz)"]
    end

Per-SSID Airtime Calculation (2.4 GHz at 1 Mbps worst case):

Transmission time = 2,800 bits ÷ 1 Mbps = 2.8 ms per beacon
Beacons per second = 10
Airtime per SSID = 2.8 ms × 10 = 28 ms/second = 2.8% airtime

Airtime Consumption by Band

Band Beacon Rate Airtime per SSID 4 SSIDs Total
2.4 GHz (1 Mbps legacy) 1 Mbps 2.8% 11.2%
2.4 GHz (OFDM-only) 6 Mbps 0.47% 1.9%
5 GHz 6 Mbps 0.47% 1.9%
6 GHz 6 Mbps 0.47% 1.9%

Critical insight: 2.4 GHz with legacy client compatibility is the bottleneck. Four SSIDs consume over 11% of available airtime in beacon overhead alone.

Additional Management Frame Overhead

Beacons are not the only overhead. Each SSID multiplies management frame traffic:

Frame Type Frequency Impact per Additional SSID
Beacons 10/second continuous Fixed 2.8% airtime (2.4 GHz legacy)
Probe Responses Per client scan Multiplied per SSID (1 response per SSID per probe)
Authentication Per association Minor
Association Per connection Minor
Disassociation Per roam/disconnect Minor

Probe Response Amplification: When clients scan for networks, the AP must respond with a probe response for each configured SSID. In high-density environments (50+ clients), probe storms multiply by the SSID count. Four SSIDs means 4× the probe response traffic compared to a single SSID.

Cumulative Airtime Impact Model

2.4 GHz Band, 50 Clients, Legacy Rates Enabled:

SSIDs Beacon Overhead Probe Overhead (est.) Total Mgmt Overhead Status
1 2.8% 1-2% ~4% ✅ Optimal
2 5.6% 2-4% ~8% ✅ Good
3 8.4% 3-6% ~12% ✅ Acceptable
4 11.2% 4-8% ~16-19% Maximum
5 14.0% 5-10% ~20-24% ❌ Degraded
6 16.8% 6-12% ~24-29% ❌ Poor
8 22.4% 8-16% ~32-38% ❌ Severe
xychart-beta
    title "Management Overhead vs SSID Count (2.4 GHz)"
    x-axis "Number of SSIDs" [1, 2, 3, 4, 5, 6, 7, 8]
    y-axis "Airtime Overhead %" 0 --> 40
    bar [4, 8, 12, 18, 22, 27, 32, 38]
    line [20, 20, 20, 20, 20, 20, 20, 20]

The 20% Threshold: Industry consensus identifies 20% management overhead as the point where user experience degrades noticeably—increased latency, reduced throughput, and connection reliability issues. At 4 SSIDs, deployments remain under this threshold. A 5th SSID pushes into the degradation zone.

Vendor Recommendations

All major enterprise wireless vendors independently recommend limiting SSIDs to 4 or fewer per AP:

All major enterprise wireless vendors (Cisco, Aruba/HPE, Juniper Mist, Meraki, Extreme) independently recommend limiting SSIDs to 4 or fewer per AP, citing beacon overhead and probe response amplification as primary performance concerns.

Vendor Consensus Summary

Vendor Recommended Max Platform Hard Limit Notes
Cisco 3-4 16 Explicit design guidance
Aruba/HPE 4 16 Validated reference design
Juniper Mist 4 8 AI-driven best practices
Meraki 4 15 Performance warning at 4+
Extreme 4 16 RF planning guidance

Compliance and Enforcement

This 4-SSID limit is a mandatory technical standard, not a guideline. Violations cause measurable performance degradation affecting all wireless users on the affected access point.

Enforcement Requirements

Requirement Implementation
New deployments Must not exceed 4 SSIDs at commissioning
Existing deployments Audit and remediate if exceeding 4 SSIDs
Change requests SSID additions rejected if limit reached
Exceptions None permitted

Handling Requests for Additional SSIDs

When a 5th SSID is requested:

  1. Reject the request — The limit is non-negotiable
  2. Evaluate consolidation — Can existing SSIDs be consolidated via VLAN assignment or RADIUS attributes?
  3. Evaluate policy differentiation — Can the use case share an existing SSID with different policies based on user/device authentication?
  4. Document the denial — Reference this standard and the performance impact data
flowchart TD
    A[New SSID Request] --> B{Current SSID Count?}
    B -->|"< 4"| C[Evaluate business need]
    B -->|"= 4"| D[REJECT: Limit reached]
    C --> E{Approved?}
    E -->|Yes| F[Configure new SSID]
    E -->|No| G[Document denial]
    D --> H{Alternative solution?}
    H -->|Consolidate SSIDs| I[Merge use cases]
    H -->|RADIUS differentiation| J[Policy-based separation]
    H -->|VLAN assignment| K[Dynamic VLAN via 802.1X]
    H -->|No alternative| G
    I --> F
    J --> L[Use existing SSID]
    K --> L

IEEE 802.11 Standards References

Standard Relevance
IEEE 802.11-2024 §9.3.3.3 Beacon frame format and timing
IEEE 802.11-2024 §11.1.3.1 Beacon interval (default 100 TU)
IEEE 802.11-2024 §17.3.8.2 OFDM mandatory data rates
IEEE 802.11b-1999 §18.1 Legacy 1 Mbps, 2 Mbps rates (2.4 GHz)

Industry Adoption Data

Enterprise Wireless Security Adoption

Security Feature Adoption Rate Source Year
WPA3-Enterprise 71% of enterprises Ponemon Wireless Security Study 2025
802.1X authentication 86% of enterprise WiFi EMA Network Management Report 2025
Certificate-based auth (EAP-TLS) 58% of 802.1X deployments Gartner Identity Report 2025
Guest network isolation 96% of organizations Gartner Network Security Survey 2025
PMF (802.11w) enabled 78% of enterprise APs Wi-Fi Alliance Survey 2025
6 GHz band enabled 67% of WiFi 6E/7 deployments 650 Group 2026

Municipal Wireless Security

Practice Adoption Notes
Separate guest SSID 99% Universal requirement
IoT network isolation 82% Growing requirement
WPA3 deployment 71% Accelerating with WiFi 7
6 GHz (WiFi 7) deployment 31% Early adopters, growing rapidly

Security Requirements

WPA3 Security Features

graph TD
    subgraph WPA3["WPA3 Security Improvements"]
        SAE["SAE (Simultaneous Auth)<br/>Replaces PSK exchange"]
        PMF["Protected Management Frames<br/>Required (was optional)"]
        GCMP["GCMP-256 Encryption<br/>Stronger than CCMP"]
        TRANSITION["Transition Disable<br/>Prevents downgrade"]
    end

    SAE --> BENEFIT1["Resistant to offline<br/>dictionary attacks"]
    PMF --> BENEFIT2["Prevents deauth<br/>and disassoc attacks"]
    GCMP --> BENEFIT3["192-bit security<br/>mode available"]
    TRANSITION --> BENEFIT4["Prevents WPA2<br/>fallback attacks"]

Authentication Requirements by SSID

SSID Method Certificate MFA RADIUS Required
MUNI-CORP EAP-TLS Device cert Via cert Yes
MUNI-SECURE EAP-TLS User + Device Via cert + PIN Yes
MUNI-IOT PSK (SAE) No No No
MUNI-GUEST OWE + Portal No No Optional

RADIUS Configuration

For authoritative RADIUS server specifications, redundancy requirements, and failover configuration, see 802.1X Implementation — RADIUS Architecture.

RF and Channel Settings

Channel Planning

graph LR
    subgraph BAND_24["2.4 GHz Band"]
        CH1["Channel 1<br/>2.412 GHz"]
        CH6["Channel 6<br/>2.437 GHz"]
        CH11["Channel 11<br/>2.462 GHz"]
    end

    subgraph BAND_5["5 GHz Band (Non-DFS Preferred)"]
        CH36["Channel 36"]
        CH40["Channel 40"]
        CH44["Channel 44"]
        CH48["Channel 48"]
        CH149["Channel 149"]
        CH153["Channel 153"]
        CH157["Channel 157"]
        CH161["Channel 161"]
    end

    subgraph BAND_6["6 GHz Band (WiFi 7 - Preferred)"]
        CH6_1["1-93 (20 MHz)"]
        CH6_160["3 × 160 MHz channels"]
        CH6_320["3 × 320 MHz channels"]
    end
Band Channel Width Recommended Channels
2.4 GHz 20 MHz only 1, 6, 11 (non-overlapping)
5 GHz (non-DFS) 40-80 MHz 36/40, 44/48, 149/153, 157/161
5 GHz (DFS) 40-80 MHz Use if non-DFS exhausted
6 GHz (WiFi 7) 160-320 MHz 3 non-overlapping 320 MHz channels

WiFi 7 (802.11be) Channel Considerations

Feature Configuration Benefit
320 MHz channels Enable in 6 GHz Maximum throughput for high-density
Preamble puncturing Enable Use spectrum around interference
MLO link pairs 5 GHz + 6 GHz preferred Reliability with performance
Band preference 6 GHz > 5 GHz > 2.4 GHz Maximize WiFi 7 capabilities

Power Settings

Setting Recommendation
Transmit power Automatic (RRM) preferred
Minimum power Set to prevent coverage holes
Maximum power Based on site survey
Power save WMM Power Save enabled

Rate Limiting

SSID Download Upload Rationale
MUNI-CORP Unlimited Unlimited Business productivity
MUNI-GUEST 10 Mbps 5 Mbps Fair use, prevent abuse
MUNI-IOT 5 Mbps 2 Mbps IoT needs minimal bandwidth
MUNI-SECURE Unlimited Unlimited Security systems priority

Cost-Performance Analysis

Security Implementation Costs

Component Initial Cost Annual Cost Notes
RADIUS server (2x redundant) $0 (included with AD) $0 Windows NPS or similar
Certificate Authority $0 (internal CA) $2,000 PKI maintenance
Captive portal $5,000 $1,000 Cloud or on-premise
Wireless management $15,000 $8,000 Controller or cloud
Total (50 APs) $20,000 $11,000
Per-AP annual cost $220

Security ROI

Benefit Estimated Annual Value
Prevented breaches (802.1X) $50,000-500,000
Compliance (NIST, CJIS) Required
Reduced support (certificate auth) $10,000
Guest network liability protection Risk mitigation

NIST Alignment

NIST SP 800-53 Control Implementation
AC-18: Wireless Access WPA3-Enterprise on all corporate SSIDs
AC-18(1): Authentication and Encryption EAP-TLS with AES-GCMP-256
AC-18(3): Disable Wireless Guest/IoT isolation, no corporate access
AC-18(4): Restrict Configuration Centralized wireless management
AC-18(5): Antennas and Power Site survey-based configuration
IA-3: Device Identification 802.1X device certificates
SC-8: Transmission Confidentiality WPA3 encryption on corporate/IoT SSIDs, OWE on guest
SC-40: Wireless Link Protection PMF (802.11w) required

Infrastructure Readiness Pass/Fail Checklist

Use this checklist to verify wireless platform readiness before SSID deployment. Every Required item must pass. If any Required item fails, the platform is not ready for SSID deployment.

Wireless Platform Readiness Checklist

# Requirement Required Pass Fail
1 Maximum 4 SSIDs per access point enforced Yes
2 WPA3-Enterprise with EAP-TLS support Yes
3 OWE (Enhanced Open) for guest SSID Yes
4 WPA3-Personal with scheduled PSK rotation Yes
5 PMF (802.11w) mandatory on all SSIDs Yes
6 802.11r (Fast BSS Transition) support Yes
7 Dynamic VLAN assignment via RADIUS attributes Yes
8 Per-SSID rate limiting / bandwidth control Yes
9 6 GHz band support with 320 MHz channel width Yes

Results

Outcome Action
All Required items pass Approved for SSID deployment
Any Required item fails Not approved — resolve before proceeding
Questions about a specific requirement Contact Network Engineering

How to Verify Requirements

Checklist Item Where to Find
4 SSID maximum Platform SSID configuration, AP group settings
WPA3-Enterprise + EAP-TLS Security profile configuration, RADIUS integration
OWE guest SSID SSID security settings, Enhanced Open configuration
WPA3-Personal + PSK rotation PSK management features, rotation scheduling
PMF mandatory Security profile settings, 802.11w configuration
802.11r support Fast roaming configuration, BSS transition settings
Dynamic VLAN via RADIUS RADIUS attribute mapping, VLAN assignment policy
Per-SSID rate limiting QoS / bandwidth policy, per-SSID traffic shaping
6 GHz / 320 MHz Radio configuration, channel width options

References

  1. IEEE 802.11i-2004, “Amendment 6: Medium Access Control (MAC) Security Enhancements,” IEEE, July 2004.
  2. IEEE 802.11w-2009, “Amendment 4: Protected Management Frames,” IEEE, September 2009.
  3. IEEE 802.1X-2020, “Port-Based Network Access Control,” IEEE, February 2020.
  4. Wi-Fi Alliance, “WPA3 Specification Version 3.5,” Wi-Fi Alliance, February 2025.
  5. IETF RFC 9190, “EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3,” IETF, February 2022.
  6. NIST SP 800-153, “Guidelines for Securing Wireless Local Area Networks (WLANs),” NIST, February 2012.
  7. NIST SP 800-53 Rev. 5, “Security and Privacy Controls for Information Systems and Organizations,” NIST, August 2025.

Cross-References

This SSID standard integrates with existing municipal network documentation:

Document Relationship
OWE Enhanced Open Standards Guest SSID (MUNI-GUEST) encryption requirements
WPA3-Enterprise Standards Corporate and secure SSID security configuration
802.1X Implementation EAP-TLS authentication and RADIUS for 802.1X SSIDs
Network Segmentation VLAN assignments and zone policies per SSID
Design Standards AP placement and wireless design workflow
Deployment Procedures SSID validation during deployment
Access Point Specifications AP hardware capabilities supporting SSID features

For questions about these standards, open an issue or contact the Network Engineering team.