Configuration should include applying concepts of wireless security.