{"id":1827,"date":"2010-06-04T13:33:23","date_gmt":"2010-06-04T12:33:23","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1827"},"modified":"2010-06-04T13:33:23","modified_gmt":"2010-06-04T12:33:23","slug":"apple-wpa2-security-settings-best-for-wireless-throughput","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/","title":{"rendered":"Apple: WPA2 Security Settings Best for Wireless Throughput"},"content":{"rendered":"<p>Apple has published a <a href=\"http:\/\/support.apple.com\/kb\/TS3361\">technical note<\/a> explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices, using Apple&#8217;s AirPort hardware. Using older protection &#8211; WPA &#8211; will prevent the devices from exceeding 54 Mbps (megabits per second). Apple&#8217;s article suggests that this is the case for other hardware, but says that users should check the correct configuration for non-Apple devices. However, WPA\/WPA2 Personal provides higher throughput for single devices, such as a single computer and router. In most cases, your actual Internet bandwidth will not exceed 54 Mbps, so if you only have a single computer, this is not an issue.<\/p>\n<p>To set WPA2 protection, open AirPort Utility, choose your base station, then click Manual Setup. Click the AirPort icon in the toolbar, then the Wireless tab, then choose WPA2 Personal from the Wireless Security menu.<\/p>\n<p><center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/wpa2.jpg\" \/ alt=\"AirPort Utility settings for WPA2 protection\"><br \/>\n<\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices, using Apple&#8217;s AirPort hardware. Using older protection &#8211; WPA &#8211; will prevent the devices from exceeding 54 Mbps (megabits per second). Apple&#8217;s article suggests that this is the case for other hardware, but [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1656,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[19],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple: WPA2 Security Settings Best for Wireless Throughput  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-04T12:33:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png\" \/>\n\t<meta property=\"og:image:width\" content=\"117\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png\",\"width\":\"117\",\"height\":\"120\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/\",\"name\":\"Apple: WPA2 Security Settings Best for Wireless Throughput - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage\"},\"datePublished\":\"2010-06-04T12:33:23+00:00\",\"dateModified\":\"2010-06-04T12:33:23+00:00\",\"description\":\"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple: WPA2 Security Settings Best for Wireless Throughput\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Apple: WPA2 Security Settings Best for Wireless Throughput\",\"datePublished\":\"2010-06-04T12:33:23+00:00\",\"dateModified\":\"2010-06-04T12:33:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage\"},\"wordCount\":149,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png\",\"keywords\":[\"AirPort\"],\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/","og_locale":"en_US","og_type":"article","og_title":"Apple: WPA2 Security Settings Best for Wireless Throughput  - The Mac Security Blog","og_description":"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-06-04T12:33:23+00:00","og_image":[{"width":"117","height":"120","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png","width":"117","height":"120"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/","name":"Apple: WPA2 Security Settings Best for Wireless Throughput - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage"},"datePublished":"2010-06-04T12:33:23+00:00","dateModified":"2010-06-04T12:33:23+00:00","description":"Apple has published a technical note explaining that the WPA2 setting for wireless security provides the best network throughput to multiple devices,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple: WPA2 Security Settings Best for Wireless Throughput"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Apple: WPA2 Security Settings Best for Wireless Throughput","datePublished":"2010-06-04T12:33:23+00:00","dateModified":"2010-06-04T12:33:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#webpage"},"wordCount":149,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-wpa2-security-settings-best-for-wireless-throughput\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png","keywords":["AirPort"],"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/04\/airport.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-tt","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1827"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1827"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1656"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}