Chapter 7 Wireless
VMG1312-B Series User’s Guide
138
• When you use t he PBC m et hod, t here is a short period (from the m om ent you press t he butt on
on one device t o the m om ent you press t he but ton on t he ot her device) when any WPS- enabled
device could j oin t he net work. This is because t he registrar has no way of identifying t he
“ correct” enrollee, and cannot different iat e between your enrollee and a rogue device. This is a
possible way for a hacker t o gain access t o a network.
You can easily check to see if this has happened. WPS works between only t w o devices
sim ultaneously, so if anot her device has enrolled your device will be unable t o enroll, and will not
have access to the network. I f t his happens, open the access point ’s configuration interface and
look at t he list of associat ed clients ( usually displayed by MAC address). I t does not m at t er if t he
access point is t he WPS registrar, t he enrollee, or was not involved in the WPS handshake; a
rogue device m ust st ill associat e wit h t he access point t o gain access t o t he network. Check t he
MAC addresses of your wireless client s ( usually print ed on a label on the bott om of t he device). I f
there is an unknown MAC address you can rem ove it or reset the AP.