0 / 60 seg.

A client needs to secure their cafe's wireless network, which is used only by employees. What is the best approach for a finite list of devices?