<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures in General Discussion</title>
    <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120149#M4853</link>
    <description>&lt;H1&gt;&lt;FONT color="#000080"&gt;Introduction:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;The Wi-Fi Alliance introduced WPA3 in 2018 and it is a successor to WPA2. It was released to address the security limitations of WPA2, such as offline dictionary attacks and KRACK &amp;amp; Kraken attacks. Like WPA2, WPA3 also comes in two variants: Personal &amp;amp; Enterprise, but with significant improvements in authentication and encryption. This article focuses on the differences between WPA3-Personal and Transition Mode, illustrated with real-world packet captures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Why WPA3 and Not WPA2:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;Before we dive into the WPA3 modes, it is important to understand why WPA3 is needed and why WPA2 is no longer sufficient. The WPA2 security standard has been in use since 2004, and it is still widely used on many networks. As of now, not many devices support WPA3. In WPA2-Personal, security heavily depends on the strength of the passphrase. That passphrase is directly converted into a PMK which is then used in the 4-way handshake for key derivation. When weak passwords are used, WPA2 networks are vulnerable to KRACK and offline dictionary attacks. On the contrary, WPA3-Personal uses SAE (&lt;STRONG&gt;Simultaneous Authentication of Equals&lt;/STRONG&gt;) to generate the PMK, which offers stronger resistance to offline dictionary attacks. The table below highlights the major improvements WPA3 introduces over WPA2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA2 vs. WPA3:&lt;/FONT&gt;&lt;/H1&gt;&lt;TABLE width="617px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Features&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;WPA2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;WPA3&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Encryption&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;AES-CCMP&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;GCMP-256 / AES-CCMP&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Key Size&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;128-bit&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;128 &amp;amp; 192-bit for Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Authentication Types&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;PSK / Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;SAE / Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;PMF Support&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Optional&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Mandatory&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Forward Secrecy&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Not Supported&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Supported&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Security Level&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Very High&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Protection against Attacks&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Susceptible to KRACK and offline dictionary attacks&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Resistant to KRACK and offline dictionary attacks&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Backward Compatibility&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Support WPA-PSK&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Support WPA2-PSK in Transition mode&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3 Types:&lt;/FONT&gt;&lt;/H1&gt;&lt;OL&gt;&lt;LI&gt;WPA3-Personal&lt;/LI&gt;&lt;LI&gt;WPA3-Enterprise&lt;/LI&gt;&lt;/OL&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Types are further divided into:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_0-1756219010454.png" style="width: 591px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9136i556DD286D73D7F3A/image-dimensions/591x269?v=v2" width="591" height="269" role="button" title="Nathiya_M_0-1756219010454.png" alt="Nathiya_M_0-1756219010454.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;SAE is the authentication type used in WPA3, but it is not new to wireless. It was first introduced in mesh networks (802.11s) to allow APs to discover and authenticate with each other simultaneously. SAE belongs to a family of protocols known as &lt;STRONG&gt;Password-Authenticated Key Exchanges (PAKEs)&lt;/STRONG&gt;, which let two devices prove they both know the same password without ever sending it across the air. To achieve this, WPA3 uses the &lt;STRONG&gt;Dragonfly handshake&lt;/STRONG&gt;, a two-step process where the client and access point exchange special cryptographic values (commit and confirm messages). These values act like proofs that the password is correct, but without revealing the password itself. The result is a shared secret that is unique for every client–AP connection, which then becomes the basis for the Pairwise Master Key (PMK). This design not only blocks offline dictionary attacks but also ensures &lt;STRONG&gt;forward secrecy&lt;/STRONG&gt;, so that even if the Wi-Fi password is stolen later, previously captured traffic remains secure. In addition to SAE, WPA3 makes &lt;STRONG&gt;Protected Management Frames (PMF)&lt;/STRONG&gt; mandatory, blocking spoofed disassociation or deauthentication frames that plagued WPA2.&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How is the PMK generated in WPA3-Personal mode?&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;For clarity, the explanation below is kept simple and focuses only on the essential steps. It is not intended to cover the full mathematics or cryptographic proof behind SAE and Dragonfly&lt;/P&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;Dragonfly Handshake - Steps:&lt;/FONT&gt;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;1. Generating Private Values:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both AP and client pick 2 random numbers. ‘r’ &amp;amp; ‘m’.&lt;UL class="lia-list-style-type-circle"&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ‘r’ - &amp;nbsp;a private random value (acts like a private key)&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ‘m’ - a masking value to protect the private key&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;These values are not shared with anyone.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;2. Creating PWE:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Passphrase is used as a seed to create PWE along with both device’s MAC addresses.&lt;/LI&gt;&lt;LI&gt;The PWE is mapped to a point on elliptic curve. This mapping uses a process called &lt;STRONG&gt;hunting and pecking&lt;/STRONG&gt;, where the password, MAC addresses, and a counter are repeatedly hashed until a valid curve point is found.&lt;/LI&gt;&lt;LI&gt;SAE allows up to 40 attempts.&lt;/LI&gt;&lt;LI&gt;This “PWE” is unique for each client–AP pair.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_1-1756219279731.png" style="width: 300px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9140i76B91583F541D7CB/image-dimensions/300x236?v=v2" width="300" height="236" role="button" title="Nathiya_M_1-1756219279731.png" alt="Nathiya_M_1-1756219279731.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;3. Scalar:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;A scalar is computed as:&lt;UL class="lia-list-style-type-circle"&gt;&lt;LI&gt;scalar = (r + m) mod q, where ‘q’ is the order of the elliptic curve group&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;The scalar will be sent as part of the commit frame.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;4. Creating Public Key / Element:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Using a private value and PWE, both the devices create a public element.&lt;UL&gt;&lt;LI&gt;element = -m x PWE &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;5. Commit Phase: &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both the devices initiate the ECDH handshake by sending the calculated scalar and FFE (element).&lt;/LI&gt;&lt;LI&gt;No private key or actual passwords are revealed here.&lt;/LI&gt;&lt;LI&gt;Once both sides receive each other’s public value, they use it along with their own private scalar to compute a shared secret.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;6. Confirm Phase: &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both the devices send the ‘confirm’ message once they derived the shared secret.&lt;/LI&gt;&lt;LI&gt;This works as a &lt;STRONG&gt;Zero-Knowledge Proof&lt;/STRONG&gt;: each side proves knowledge of the password-derived secret without exposing the password itself.&lt;/LI&gt;&lt;LI&gt;The shared secrets are validated through mutual authentication, confirming that both parties have derived the same shared secret without ever transmitting the actual password&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;7. PMK Derivation:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Once both sides agree on the shared secret, a &lt;STRONG&gt;Key Derivation Function (KDF)&lt;/STRONG&gt; expands it into the &lt;STRONG&gt;Pairwise Master Key (PMK&lt;/STRONG&gt;).&lt;/LI&gt;&lt;LI&gt;From here, 4-way handshake process is same as WPA2-PSK. From the derived PMK, PTK and GTK keys are derived to protect user traffic.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#000080"&gt;PMK derivation in a flow chart:&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Nathiya_M_2-1756219824110.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9142iBDE4550363B0EA80/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_2-1756219824110.png" alt="Nathiya_M_2-1756219824110.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;U&lt;/FONT&gt;&lt;FONT color="#000080"&gt;nderstanding the WPA3-Personal mode connection flow from packet capture:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;I used ExtremeCloud IQ controller–AP [On-premise] for this testing. Wlan – SSID configuration from XIQ-C controller running on version 10.14.01&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_3-1756219951205.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9143i86F5B6C60F6EC3EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_3-1756219951205.png" alt="Nathiya_M_3-1756219951205.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;Packet # 1113 to 1173 – WPA3-Personal mode complete flow.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_5-1756220027074.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9146iDE58258FD77226A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_5-1756220027074.png" alt="Nathiya_M_5-1756220027074.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;STRONG&gt;Beacon &amp;amp; Probe Response&lt;/STRONG&gt; frames show the RSN Information of the BSS.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Supported “&lt;STRONG&gt;Group Suite&lt;/STRONG&gt;,” “&lt;STRONG&gt;Pairwise Cipher Suite&lt;/STRONG&gt;,” “&lt;STRONG&gt;Auth Key Management&lt;/STRONG&gt;,” &amp;amp; “&lt;STRONG&gt;PMF Support”&lt;/STRONG&gt; details.&lt;/LI&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:8&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;--&amp;gt;&lt;FONT color="#FF6600"&gt; is indicating &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Management frame Protection Required [MFPR] &amp;amp;&amp;nbsp;Management frame Protection Capabilities [MFPC] --&amp;gt;&amp;nbsp;&amp;nbsp;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;True&lt;/STRONG&gt; indicates PMF is mandatory&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_7-1756220275434.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9148i4DEC8CBFC8A5E8DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_7-1756220275434.png" alt="Nathiya_M_7-1756220275434.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;&lt;STRONG&gt;Authentication Frames 1 &amp;amp; 2 - Commit messages:&lt;/STRONG&gt; Packets # 1148 &amp;amp; 1157&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Authentication Frame 1 - Client to AP &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Authentication Frame 2 – AP to client&lt;UL&gt;&lt;LI&gt;Which includes status code: &lt;FONT color="#FF6600"&gt;Successful&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;SAE type - &lt;FONT color="#FF6600"&gt;Commit (1)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Group ID: 19 -&amp;nbsp;&lt;FONT color="#FF6600"&gt;refer to cryptographic group used for ECDH (Elliptic Curve Diffie–Hellman)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Scalar – &lt;FONT color="#FF6600"&gt;masked Private value derived from r &amp;amp; m.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;FFE – &lt;FONT color="#FF6600"&gt;Element - Public Key&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_10-1756220561754.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9152iF3883514E837E726/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_10-1756220561754.png" alt="Nathiya_M_10-1756220561754.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Authentication Frames 3 &amp;amp; 4 – Confirm Messages:&lt;/STRONG&gt; Packet # 1161 &amp;amp; 1162&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Authentication frames 3 &amp;amp; 4 – Between client to AP and vice versa.&lt;UL&gt;&lt;LI&gt;Which includes, Status code: &lt;FONT color="#FF6600"&gt;Successful&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;SAE message type –&lt;FONT color="#FF6600"&gt; Confirm (2)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;From client to AP: &lt;FONT color="#FF6600"&gt;Send-Confirm 1&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;From AP to Client: Send-&lt;FONT color="#FF6600"&gt;Confirm 0&lt;/FONT&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#FF6600"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Confirm: &lt;/STRONG&gt;&lt;/FONT&gt;shows the Key Confirmation Token (KCK-derived MAC)&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_11-1756220669556.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9153i56D286D84B49FD11/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_11-1756220669556.png" alt="Nathiya_M_11-1756220669556.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. How to confirm in the capture that the PMK is generated:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;After the successful PMK generation, it will lead to the 4-way key handshake with no error in the flow.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;--------------------------------------------------------------------&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3-Personal Transition Mode:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;WPA3 transition mode is used to provide support for mixed devices deployments to provide backward compatibility. As of now, not all the devices are capable of WPA3. &amp;nbsp;For the customers who want security but also want to support WPA2 devices at the same time, the solution is to use the WPA3 transition mode. In Transition mode, PMF is optional, allowing WPA2 clients to connect.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;Wlan SSID configuration for WPA3-Transition:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_12-1756220740463.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9154iE6C7B347ACA85D3C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_12-1756220740463.png" alt="Nathiya_M_12-1756220740463.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to identify the difference between WPA3-personal and transition mode in the packet capture?&lt;/FONT&gt;&lt;/H1&gt;&lt;OL&gt;&lt;LI&gt;The BSS broadcasting the WPA3-transition mode will broadcast both the AKM suites. This information can be checked in the “Beacon” &amp;amp; “Probe Response” frame.&lt;UL&gt;&lt;LI&gt;The packet capture image above shows both the PSK &amp;amp; SAE AKM.&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;00-0F-AC:2 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;is indicating &lt;STRONG&gt;PSK&lt;/STRONG&gt; is used&lt;/FONT&gt;.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;00-0F-AC:8 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;is indicating &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;PMF is optional.&amp;nbsp;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;Management frame Protection Required [MFPR] --&amp;gt; &lt;FONT color="#FF6600"&gt;False&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Management frame Protection Capabilities [MFPC] --&amp;gt; &lt;FONT color="#FF6600"&gt;True (these values indicate PMF is optional).&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_13-1756221028985.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9156i2D1A6F7923372DFB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_13-1756221028985.png" alt="Nathiya_M_13-1756221028985.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2. The below image shows the connection flow from the WPA2 supported client connected to the WPA3 transition SSID but it is using AKM suite – PSK for connection but using same passphrase configured in the WPA3.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Unlike, 4 -Authentication frames in WPA3, this capture shows only 2.&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;The authentication algorithm is&lt;FONT color="#FF6600"&gt; “Open System” &lt;FONT color="#000000"&gt;and not&lt;/FONT&gt;&amp;nbsp;"SAE"&lt;/FONT&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_15-1756221121504.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9159iA2921FB606B371A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_15-1756221121504.png" alt="Nathiya_M_15-1756221121504.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to check whether WPA3 is configured to use FT?&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;This option varies based on vendor. ExtremeCloud AP supports WPA3 SAE with FT. If the AP supports 802.11r, how to check the same in the packet capture?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;As discussed before, in the “Beacon” and the “Probe Response” RSN Information “Auth Key Management” field will show 2 SAE types.&lt;UL&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:8 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:9 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;FT using &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_16-1756221247079.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9163iA20BAA1D4F78917C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_16-1756221247079.png" alt="Nathiya_M_16-1756221247079.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;What happens when non-WPA3 supported clients try to connect to the WPA3-personal mode:&lt;/FONT&gt;&lt;/H1&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;Visual look:&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;When clicking WLAN icon, the WPA3 SSID will show with a “X” symbol and there will be no option given to ‘connect’. The message will show ‘can’t connect to this network’. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_17-1756221340604.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9164iD2B6E225CE08345F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_17-1756221340604.png" alt="Nathiya_M_17-1756221340604.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to check for the wireless NIC WPA3 support in Windows laptop:&lt;/FONT&gt;&lt;/H1&gt;&lt;UL&gt;&lt;LI&gt;Use &lt;STRONG&gt;#netsh wlan show drivers&lt;/STRONG&gt; to verify the list of supported AKM by the wireless NIC card.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_19-1756221411089.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9167i74B8D318B3DDBDEE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_19-1756221411089.png" alt="Nathiya_M_19-1756221411089.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3 Strength &amp;amp; Weakness:&lt;/FONT&gt;&lt;/H1&gt;&lt;TABLE width="666px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="135.3px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Strengths&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Weaknesses/Challenges&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;SAE helps resist the offline dictionary &amp;amp; KRACK attacks &amp;amp; provides forward secrecy&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Transition Mode allows the use of WPA2-PSK which reduces the security&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Encryption&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;WPA3-Enterprise supports 192-bit CNSA suite (AES-GCMP-256, SHA-384, ECC)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Not all vendors/clients fully support advanced suites&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Management Frame security&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;PMF mandatory protects against spoofed de-auth/disassociation attacks&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Legacy clients without PMF cannot connect&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="132px"&gt;&lt;P&gt;&lt;STRONG&gt;Roaming / Mobility&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="132px"&gt;&lt;P&gt;Supports PMK caching and FT&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="132px"&gt;&lt;P&gt;Roaming behavior inconsistent across vendors; Observed, full SAE re-auth in WPA3-Personal at times.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Conclusion:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;WPA3 strengthens Wi-Fi security by replacing PSK with SAE, enforcing Protected Management Frames, and introducing stronger encryption for both personal and enterprise deployments. While Transition Mode and inconsistent roaming remain challenges, WPA3 is a significant step forward. Organizations should plan phased migrations, retire WPA2 when possible, and adopt WPA3-only SSIDs to achieve the best balance of security and performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reference:&lt;/P&gt;&lt;P&gt;[1]&lt;A href="https://dl.aircrack-ng.org/wiki-files/doc/additional_papers/dragonblood.pdf" target="_blank" rel="noopener"&gt;https://dl.aircrack-ng.org/wiki-files/doc/additional_papers/dragonblood.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[2] &lt;A href="https://www.wi-fi.org/system/files/WPA3%20Specification%20v3.4.pdf" target="_blank" rel="noopener"&gt;https://www.wi-fi.org/system/files/WPA3%20Specification%20v3.4.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[3] &lt;A href="https://praneethwifi.in/2021/02/04/wpa3-authentication-part-1/?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;https://praneethwifi.in/2021/02/04/wpa3-authentication-part-1/?utm_source=chatgpt.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[4] &lt;A href="https://mrncciew.com/2019/11/29/wpa3-sae-mode/" target="_blank" rel="noopener"&gt;https://mrncciew.com/2019/11/29/wpa3-sae-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[5] &lt;A href="https://mrncciew.com/2019/11/29/wpa3-sae-transition-mode/" target="_blank" rel="noopener"&gt;https://mrncciew.com/2019/11/29/wpa3-sae-transition-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[6] &lt;A href="https://wlan1nde.wordpress.com/2018/09/14/wpa3-improving-your-wlan-security/" target="_blank" rel="noopener"&gt;https://wlan1nde.wordpress.com/2018/09/14/wpa3-improving-your-wlan-security/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[7] &lt;A href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[8] &lt;A href="https://arubanetworking.hpe.com/techdocs/aos/wifi-design-deploy/security/modes/wpa3-personal/?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;https://arubanetworking.hpe.com/techdocs/aos/wifi-design-deploy/security/modes/wpa3-personal/?utm_source=chatgpt.com&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Aug 2025 13:10:57 GMT</pubDate>
    <dc:creator>Nathiya_M</dc:creator>
    <dc:date>2025-08-27T13:10:57Z</dc:date>
    <item>
      <title>Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120149#M4853</link>
      <description>&lt;H1&gt;&lt;FONT color="#000080"&gt;Introduction:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;The Wi-Fi Alliance introduced WPA3 in 2018 and it is a successor to WPA2. It was released to address the security limitations of WPA2, such as offline dictionary attacks and KRACK &amp;amp; Kraken attacks. Like WPA2, WPA3 also comes in two variants: Personal &amp;amp; Enterprise, but with significant improvements in authentication and encryption. This article focuses on the differences between WPA3-Personal and Transition Mode, illustrated with real-world packet captures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Why WPA3 and Not WPA2:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;Before we dive into the WPA3 modes, it is important to understand why WPA3 is needed and why WPA2 is no longer sufficient. The WPA2 security standard has been in use since 2004, and it is still widely used on many networks. As of now, not many devices support WPA3. In WPA2-Personal, security heavily depends on the strength of the passphrase. That passphrase is directly converted into a PMK which is then used in the 4-way handshake for key derivation. When weak passwords are used, WPA2 networks are vulnerable to KRACK and offline dictionary attacks. On the contrary, WPA3-Personal uses SAE (&lt;STRONG&gt;Simultaneous Authentication of Equals&lt;/STRONG&gt;) to generate the PMK, which offers stronger resistance to offline dictionary attacks. The table below highlights the major improvements WPA3 introduces over WPA2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA2 vs. WPA3:&lt;/FONT&gt;&lt;/H1&gt;&lt;TABLE width="617px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Features&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;WPA2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;WPA3&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Encryption&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;AES-CCMP&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;GCMP-256 / AES-CCMP&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Key Size&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;128-bit&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;128 &amp;amp; 192-bit for Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Authentication Types&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;PSK / Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;SAE / Enterprise&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;PMF Support&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Optional&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Mandatory&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Forward Secrecy&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Not Supported&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Supported&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Security Level&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Very High&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Protection against Attacks&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Susceptible to KRACK and offline dictionary attacks&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Resistant to KRACK and offline dictionary attacks&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="196.788px"&gt;&lt;P&gt;&lt;STRONG&gt;Backward Compatibility&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.65px"&gt;&lt;P&gt;Support WPA-PSK&lt;/P&gt;&lt;/TD&gt;&lt;TD width="209.762px"&gt;&lt;P&gt;Support WPA2-PSK in Transition mode&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3 Types:&lt;/FONT&gt;&lt;/H1&gt;&lt;OL&gt;&lt;LI&gt;WPA3-Personal&lt;/LI&gt;&lt;LI&gt;WPA3-Enterprise&lt;/LI&gt;&lt;/OL&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Types are further divided into:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_0-1756219010454.png" style="width: 591px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9136i556DD286D73D7F3A/image-dimensions/591x269?v=v2" width="591" height="269" role="button" title="Nathiya_M_0-1756219010454.png" alt="Nathiya_M_0-1756219010454.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;SAE is the authentication type used in WPA3, but it is not new to wireless. It was first introduced in mesh networks (802.11s) to allow APs to discover and authenticate with each other simultaneously. SAE belongs to a family of protocols known as &lt;STRONG&gt;Password-Authenticated Key Exchanges (PAKEs)&lt;/STRONG&gt;, which let two devices prove they both know the same password without ever sending it across the air. To achieve this, WPA3 uses the &lt;STRONG&gt;Dragonfly handshake&lt;/STRONG&gt;, a two-step process where the client and access point exchange special cryptographic values (commit and confirm messages). These values act like proofs that the password is correct, but without revealing the password itself. The result is a shared secret that is unique for every client–AP connection, which then becomes the basis for the Pairwise Master Key (PMK). This design not only blocks offline dictionary attacks but also ensures &lt;STRONG&gt;forward secrecy&lt;/STRONG&gt;, so that even if the Wi-Fi password is stolen later, previously captured traffic remains secure. In addition to SAE, WPA3 makes &lt;STRONG&gt;Protected Management Frames (PMF)&lt;/STRONG&gt; mandatory, blocking spoofed disassociation or deauthentication frames that plagued WPA2.&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How is the PMK generated in WPA3-Personal mode?&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;For clarity, the explanation below is kept simple and focuses only on the essential steps. It is not intended to cover the full mathematics or cryptographic proof behind SAE and Dragonfly&lt;/P&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;Dragonfly Handshake - Steps:&lt;/FONT&gt;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;1. Generating Private Values:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both AP and client pick 2 random numbers. ‘r’ &amp;amp; ‘m’.&lt;UL class="lia-list-style-type-circle"&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ‘r’ - &amp;nbsp;a private random value (acts like a private key)&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ‘m’ - a masking value to protect the private key&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;These values are not shared with anyone.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;2. Creating PWE:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Passphrase is used as a seed to create PWE along with both device’s MAC addresses.&lt;/LI&gt;&lt;LI&gt;The PWE is mapped to a point on elliptic curve. This mapping uses a process called &lt;STRONG&gt;hunting and pecking&lt;/STRONG&gt;, where the password, MAC addresses, and a counter are repeatedly hashed until a valid curve point is found.&lt;/LI&gt;&lt;LI&gt;SAE allows up to 40 attempts.&lt;/LI&gt;&lt;LI&gt;This “PWE” is unique for each client–AP pair.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_1-1756219279731.png" style="width: 300px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9140i76B91583F541D7CB/image-dimensions/300x236?v=v2" width="300" height="236" role="button" title="Nathiya_M_1-1756219279731.png" alt="Nathiya_M_1-1756219279731.png" /&gt;&lt;/span&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;3. Scalar:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;A scalar is computed as:&lt;UL class="lia-list-style-type-circle"&gt;&lt;LI&gt;scalar = (r + m) mod q, where ‘q’ is the order of the elliptic curve group&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;The scalar will be sent as part of the commit frame.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;4. Creating Public Key / Element:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Using a private value and PWE, both the devices create a public element.&lt;UL&gt;&lt;LI&gt;element = -m x PWE &amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;5. Commit Phase: &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both the devices initiate the ECDH handshake by sending the calculated scalar and FFE (element).&lt;/LI&gt;&lt;LI&gt;No private key or actual passwords are revealed here.&lt;/LI&gt;&lt;LI&gt;Once both sides receive each other’s public value, they use it along with their own private scalar to compute a shared secret.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;&lt;STRONG&gt;6. Confirm Phase: &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Both the devices send the ‘confirm’ message once they derived the shared secret.&lt;/LI&gt;&lt;LI&gt;This works as a &lt;STRONG&gt;Zero-Knowledge Proof&lt;/STRONG&gt;: each side proves knowledge of the password-derived secret without exposing the password itself.&lt;/LI&gt;&lt;LI&gt;The shared secrets are validated through mutual authentication, confirming that both parties have derived the same shared secret without ever transmitting the actual password&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;7. PMK Derivation:&lt;/FONT&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Once both sides agree on the shared secret, a &lt;STRONG&gt;Key Derivation Function (KDF)&lt;/STRONG&gt; expands it into the &lt;STRONG&gt;Pairwise Master Key (PMK&lt;/STRONG&gt;).&lt;/LI&gt;&lt;LI&gt;From here, 4-way handshake process is same as WPA2-PSK. From the derived PMK, PTK and GTK keys are derived to protect user traffic.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;&lt;H2&gt;&lt;FONT color="#000080"&gt;PMK derivation in a flow chart:&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Nathiya_M_2-1756219824110.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9142iBDE4550363B0EA80/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_2-1756219824110.png" alt="Nathiya_M_2-1756219824110.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;U&lt;/FONT&gt;&lt;FONT color="#000080"&gt;nderstanding the WPA3-Personal mode connection flow from packet capture:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;I used ExtremeCloud IQ controller–AP [On-premise] for this testing. Wlan – SSID configuration from XIQ-C controller running on version 10.14.01&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_3-1756219951205.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9143i86F5B6C60F6EC3EA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_3-1756219951205.png" alt="Nathiya_M_3-1756219951205.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;Packet # 1113 to 1173 – WPA3-Personal mode complete flow.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_5-1756220027074.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9146iDE58258FD77226A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_5-1756220027074.png" alt="Nathiya_M_5-1756220027074.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;STRONG&gt;Beacon &amp;amp; Probe Response&lt;/STRONG&gt; frames show the RSN Information of the BSS.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Supported “&lt;STRONG&gt;Group Suite&lt;/STRONG&gt;,” “&lt;STRONG&gt;Pairwise Cipher Suite&lt;/STRONG&gt;,” “&lt;STRONG&gt;Auth Key Management&lt;/STRONG&gt;,” &amp;amp; “&lt;STRONG&gt;PMF Support”&lt;/STRONG&gt; details.&lt;/LI&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:8&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;--&amp;gt;&lt;FONT color="#FF6600"&gt; is indicating &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Management frame Protection Required [MFPR] &amp;amp;&amp;nbsp;Management frame Protection Capabilities [MFPC] --&amp;gt;&amp;nbsp;&amp;nbsp;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;True&lt;/STRONG&gt; indicates PMF is mandatory&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_7-1756220275434.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9148i4DEC8CBFC8A5E8DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_7-1756220275434.png" alt="Nathiya_M_7-1756220275434.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;&lt;STRONG&gt;Authentication Frames 1 &amp;amp; 2 - Commit messages:&lt;/STRONG&gt; Packets # 1148 &amp;amp; 1157&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Authentication Frame 1 - Client to AP &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Authentication Frame 2 – AP to client&lt;UL&gt;&lt;LI&gt;Which includes status code: &lt;FONT color="#FF6600"&gt;Successful&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;SAE type - &lt;FONT color="#FF6600"&gt;Commit (1)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Group ID: 19 -&amp;nbsp;&lt;FONT color="#FF6600"&gt;refer to cryptographic group used for ECDH (Elliptic Curve Diffie–Hellman)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Scalar – &lt;FONT color="#FF6600"&gt;masked Private value derived from r &amp;amp; m.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;FFE – &lt;FONT color="#FF6600"&gt;Element - Public Key&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_10-1756220561754.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9152iF3883514E837E726/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_10-1756220561754.png" alt="Nathiya_M_10-1756220561754.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;4. Authentication Frames 3 &amp;amp; 4 – Confirm Messages:&lt;/STRONG&gt; Packet # 1161 &amp;amp; 1162&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Authentication frames 3 &amp;amp; 4 – Between client to AP and vice versa.&lt;UL&gt;&lt;LI&gt;Which includes, Status code: &lt;FONT color="#FF6600"&gt;Successful&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;SAE message type –&lt;FONT color="#FF6600"&gt; Confirm (2)&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;From client to AP: &lt;FONT color="#FF6600"&gt;Send-Confirm 1&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;From AP to Client: Send-&lt;FONT color="#FF6600"&gt;Confirm 0&lt;/FONT&gt;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#FF6600"&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Confirm: &lt;/STRONG&gt;&lt;/FONT&gt;shows the Key Confirmation Token (KCK-derived MAC)&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_11-1756220669556.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9153i56D286D84B49FD11/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_11-1756220669556.png" alt="Nathiya_M_11-1756220669556.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. How to confirm in the capture that the PMK is generated:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;After the successful PMK generation, it will lead to the 4-way key handshake with no error in the flow.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;--------------------------------------------------------------------&lt;/P&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3-Personal Transition Mode:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;WPA3 transition mode is used to provide support for mixed devices deployments to provide backward compatibility. As of now, not all the devices are capable of WPA3. &amp;nbsp;For the customers who want security but also want to support WPA2 devices at the same time, the solution is to use the WPA3 transition mode. In Transition mode, PMF is optional, allowing WPA2 clients to connect.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;Wlan SSID configuration for WPA3-Transition:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_12-1756220740463.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9154iE6C7B347ACA85D3C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_12-1756220740463.png" alt="Nathiya_M_12-1756220740463.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to identify the difference between WPA3-personal and transition mode in the packet capture?&lt;/FONT&gt;&lt;/H1&gt;&lt;OL&gt;&lt;LI&gt;The BSS broadcasting the WPA3-transition mode will broadcast both the AKM suites. This information can be checked in the “Beacon” &amp;amp; “Probe Response” frame.&lt;UL&gt;&lt;LI&gt;The packet capture image above shows both the PSK &amp;amp; SAE AKM.&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;00-0F-AC:2 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;is indicating &lt;STRONG&gt;PSK&lt;/STRONG&gt; is used&lt;/FONT&gt;.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;00-0F-AC:8 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;is indicating &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;PMF is optional.&amp;nbsp;&lt;UL&gt;&lt;LI&gt;&amp;nbsp;Management frame Protection Required [MFPR] --&amp;gt; &lt;FONT color="#FF6600"&gt;False&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Management frame Protection Capabilities [MFPC] --&amp;gt; &lt;FONT color="#FF6600"&gt;True (these values indicate PMF is optional).&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_13-1756221028985.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9156i2D1A6F7923372DFB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_13-1756221028985.png" alt="Nathiya_M_13-1756221028985.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;2. The below image shows the connection flow from the WPA2 supported client connected to the WPA3 transition SSID but it is using AKM suite – PSK for connection but using same passphrase configured in the WPA3.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Unlike, 4 -Authentication frames in WPA3, this capture shows only 2.&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;The authentication algorithm is&lt;FONT color="#FF6600"&gt; “Open System” &lt;FONT color="#000000"&gt;and not&lt;/FONT&gt;&amp;nbsp;"SAE"&lt;/FONT&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_15-1756221121504.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9159iA2921FB606B371A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_15-1756221121504.png" alt="Nathiya_M_15-1756221121504.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to check whether WPA3 is configured to use FT?&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;This option varies based on vendor. ExtremeCloud AP supports WPA3 SAE with FT. If the AP supports 802.11r, how to check the same in the packet capture?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;As discussed before, in the “Beacon” and the “Probe Response” RSN Information “Auth Key Management” field will show 2 SAE types.&lt;UL&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:8 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;Auth Key management—&lt;STRONG&gt;00-0F-AC:9 --&amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#FF6600"&gt;FT using &lt;STRONG&gt;SAE&lt;/STRONG&gt; is used.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_16-1756221247079.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9163iA20BAA1D4F78917C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_16-1756221247079.png" alt="Nathiya_M_16-1756221247079.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;What happens when non-WPA3 supported clients try to connect to the WPA3-personal mode:&lt;/FONT&gt;&lt;/H1&gt;&lt;H2&gt;&lt;FONT color="#3366FF"&gt;Visual look:&lt;/FONT&gt;&lt;/H2&gt;&lt;P&gt;When clicking WLAN icon, the WPA3 SSID will show with a “X” symbol and there will be no option given to ‘connect’. The message will show ‘can’t connect to this network’. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_17-1756221340604.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9164iD2B6E225CE08345F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_17-1756221340604.png" alt="Nathiya_M_17-1756221340604.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;How to check for the wireless NIC WPA3 support in Windows laptop:&lt;/FONT&gt;&lt;/H1&gt;&lt;UL&gt;&lt;LI&gt;Use &lt;STRONG&gt;#netsh wlan show drivers&lt;/STRONG&gt; to verify the list of supported AKM by the wireless NIC card.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nathiya_M_19-1756221411089.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/9167i74B8D318B3DDBDEE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Nathiya_M_19-1756221411089.png" alt="Nathiya_M_19-1756221411089.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;WPA3 Strength &amp;amp; Weakness:&lt;/FONT&gt;&lt;/H1&gt;&lt;TABLE width="666px"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="135.3px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Category&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Strengths&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="50px"&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;Weaknesses/Challenges&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;SAE helps resist the offline dictionary &amp;amp; KRACK attacks &amp;amp; provides forward secrecy&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Transition Mode allows the use of WPA2-PSK which reduces the security&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Encryption&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;WPA3-Enterprise supports 192-bit CNSA suite (AES-GCMP-256, SHA-384, ECC)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Not all vendors/clients fully support advanced suites&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="105px"&gt;&lt;P&gt;&lt;STRONG&gt;Management Frame security&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="105px"&gt;&lt;P&gt;PMF mandatory protects against spoofed de-auth/disassociation attacks&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="105px"&gt;&lt;P&gt;Legacy clients without PMF cannot connect&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="135.3px" height="132px"&gt;&lt;P&gt;&lt;STRONG&gt;Roaming / Mobility&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="253.363px" height="132px"&gt;&lt;P&gt;Supports PMK caching and FT&lt;/P&gt;&lt;/TD&gt;&lt;TD width="276.538px" height="132px"&gt;&lt;P&gt;Roaming behavior inconsistent across vendors; Observed, full SAE re-auth in WPA3-Personal at times.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H1&gt;&amp;nbsp;&lt;/H1&gt;&lt;H1&gt;&lt;FONT color="#000080"&gt;Conclusion:&lt;/FONT&gt;&lt;/H1&gt;&lt;P&gt;WPA3 strengthens Wi-Fi security by replacing PSK with SAE, enforcing Protected Management Frames, and introducing stronger encryption for both personal and enterprise deployments. While Transition Mode and inconsistent roaming remain challenges, WPA3 is a significant step forward. Organizations should plan phased migrations, retire WPA2 when possible, and adopt WPA3-only SSIDs to achieve the best balance of security and performance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reference:&lt;/P&gt;&lt;P&gt;[1]&lt;A href="https://dl.aircrack-ng.org/wiki-files/doc/additional_papers/dragonblood.pdf" target="_blank" rel="noopener"&gt;https://dl.aircrack-ng.org/wiki-files/doc/additional_papers/dragonblood.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[2] &lt;A href="https://www.wi-fi.org/system/files/WPA3%20Specification%20v3.4.pdf" target="_blank" rel="noopener"&gt;https://www.wi-fi.org/system/files/WPA3%20Specification%20v3.4.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[3] &lt;A href="https://praneethwifi.in/2021/02/04/wpa3-authentication-part-1/?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;https://praneethwifi.in/2021/02/04/wpa3-authentication-part-1/?utm_source=chatgpt.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[4] &lt;A href="https://mrncciew.com/2019/11/29/wpa3-sae-mode/" target="_blank" rel="noopener"&gt;https://mrncciew.com/2019/11/29/wpa3-sae-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[5] &lt;A href="https://mrncciew.com/2019/11/29/wpa3-sae-transition-mode/" target="_blank" rel="noopener"&gt;https://mrncciew.com/2019/11/29/wpa3-sae-transition-mode/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[6] &lt;A href="https://wlan1nde.wordpress.com/2018/09/14/wpa3-improving-your-wlan-security/" target="_blank" rel="noopener"&gt;https://wlan1nde.wordpress.com/2018/09/14/wpa3-improving-your-wlan-security/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[7] &lt;A href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange&lt;/A&gt;&lt;/P&gt;&lt;P&gt;[8] &lt;A href="https://arubanetworking.hpe.com/techdocs/aos/wifi-design-deploy/security/modes/wpa3-personal/?utm_source=chatgpt.com" target="_blank" rel="noopener"&gt;https://arubanetworking.hpe.com/techdocs/aos/wifi-design-deploy/security/modes/wpa3-personal/?utm_source=chatgpt.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Aug 2025 13:10:57 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120149#M4853</guid>
      <dc:creator>Nathiya_M</dc:creator>
      <dc:date>2025-08-27T13:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120631#M4875</link>
      <description>&lt;P&gt;The article provides an insightful breakdown of how WPA3-Personal enhances Wi-Fi security by addressing the long-standing vulnerabilities of WPA2. Through real-world packet captures, it becomes clear how WPA3’s SAE authentication method offers stronger protection against offline attacks and password weaknesses, especially when compared to the transitional mode used for backward compatibility. For anyone interested in exploring real-world network behavior and encryption in action, consider using reliable tools and staying informed through tech-focused resources. And if you enjoy deep-dive content like this, you might also want to install the &lt;A href="https://movieboxhd.app/" target="_self"&gt;Movie Box app&lt;/A&gt; to conveniently stream educational tech documentaries and tutorials.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2025 14:24:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120631#M4875</guid>
      <dc:creator>Jamesatwell</dc:creator>
      <dc:date>2025-11-01T14:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120962#M4881</link>
      <description>&lt;P&gt;The article offers a clear explanation of how WPA3-Personal improves Wi-Fi security by fixing WPA2's long-standing flaws. When compared to the transitional mode employed for backward compatibility, it is evident from real-world packet captures that WPA3's SAE authentication technique provides better defense against offline attacks and password vulnerabilities. Anyone interested in learning about encryption and real-world network activity should think about using trustworthy tools and keeping up with tech-related sites. Additionally, you might want to install &lt;A href="https://bilibilihd.app/" target="_self"&gt;Bilibili&lt;/A&gt; to easily access instructional tech documentaries and lessons if you prefer in-depth stuff like this.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 08:31:38 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/120962#M4881</guid>
      <dc:creator>Johnpyatt</dc:creator>
      <dc:date>2025-12-16T08:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121034#M4882</link>
      <description>&lt;P&gt;The article provides a detailed description of how WPA3-Personal addresses the long-standing shortcomings of WPA2 to enhance Wi-Fi security. Real-world packet captures show that WPA3's SAE authentication approach offers superior protection against offline attacks and password vulnerabilities when compared to the transitional mode used for backward compatibility. Anyone who wants to learn about encryption and actual network activity should consider using reliable tools and staying up to date with tech-related websites. If you like in-depth content like this, you might also want to install &lt;A href="https://cinebyhd.app/" target="_self"&gt;Cineby gd&lt;/A&gt; so you can quickly access educational tech documentaries and lessons.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jan 2026 06:43:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121034#M4882</guid>
      <dc:creator>Johnpyatt</dc:creator>
      <dc:date>2026-01-01T06:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121132#M4884</link>
      <description>&lt;P data-unlink="true"&gt;This is a very well-written and detailed explanation of WPA3-Personal and Transition Mode. I really like how the packet captures clearly show the differences between SAE and PSK, especially for people who troubleshoot Wi-Fi security in real environments. Articles like this make it much easier to understand why WPA3 matters today. Just like with secure networks, when users look for things such as an&lt;A href="https://inatboxapk-indirin.com.tr/" target="_self"&gt; &lt;EM&gt;Inat TV download&lt;/EM&gt;&lt;/A&gt;&amp;nbsp;, it’s always important to rely on trusted sources and understand the underlying security to stay protected.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 09:02:13 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121132#M4884</guid>
      <dc:creator>markwoo1122</dc:creator>
      <dc:date>2026-01-28T09:02:13Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding WPA3-Personal and Transition Mode Through Real-World Packet Captures</title>
      <link>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121167#M4885</link>
      <description>&lt;P&gt;This is a really solid and well-structured breakdown of why WPA3 was necessary and how it meaningfully improves on WPA2. I especially like how the article moves beyond surface-level comparisons and clearly explains &lt;EM&gt;why&lt;/EM&gt; SAE and the Dragonfly handshake matter in real-world security, not just on paper. The step-by-step &lt;A href="https://goojara-to.co.za/" target="_self"&gt;Website&lt;/A&gt;&amp;nbsp;PMK generation section makes an otherwise complex cryptographic process much easier to grasp, even for readers who aren’t deep into wireless security.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jan 2026 15:21:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/general-discussion/understanding-wpa3-personal-and-transition-mode-through-real/m-p/121167#M4885</guid>
      <dc:creator>goojarato</dc:creator>
      <dc:date>2026-01-31T15:21:27Z</dc:date>
    </item>
  </channel>
</rss>

