Chapter 7 Wireless
VMG1312-B Series User’s Guide
134
The following figure shows a WPS- enabled wireless client ( installed in a not ebook com put er)
connecting to the WPS-enabled AP via t he PI N m ethod.
Figure 46 Exam ple WPS Process: PI N Met hod
7.10.9.3 How WPS Works
When t wo WPS-enabled devices connect , each device m ust assum e a specific role. One device acts
as the registrar ( t he device t hat supplies net work and securit y sett ings) and t he ot her device act s
as the enrollee ( t he device t hat receives network and security sett ings. The regist rar creat es a
secure EAP (Ext ensible Authent icat ion Pr otocol) tunnel and sends the network nam e ( SSI D) and t he
WPA-PSK or WPA2- PSK pre- shared key to the enrollee. Whether WPA-PSK or WPA2-PSK is used
depends on t he standards supported by t he devices. I f the registrar is already part of a network, it
sends t he exist ing inform at ion. I f not , it generates the SSI D and WPA( 2) -PSK random ly.
ENROLLEE
SECURE EAP TUNNEL
SSID
WPA(2)-PSK
WITHIN 2 MINUTES
COMMUNICATION
This device’s
WPS
Enter WPS PIN
WPS
from other device:
WPS PIN: 123456
WPS
START
WPS
START
REGISTRAR