Chapter 7 Wireless
VMG/XMG Series User’s Guide
178
8 On a computer connected to the wireless client, try to connect to the Internet. If you can connect, WPS 
was successful.
If you cannot connect, check the list of associated wireless clients in the AP’s configuration utility. If you 
see the wireless client in the list, WPS was successful.
The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting 
to the WPS-enabled AP via the PIN method.
Figure 107   Example WPS Process: PIN Method
7.11.8.3  How WPS Works
When two WPS-enabled devices connect, each device must assume a specific role. One device acts 
as the registrar (the device that supplies network and security settings) and the other device acts as the 
enrollee (the device that receives network and security settings. The registrar creates a secure EAP 
(Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPA-PSK or 
WPA2-PSK pre-shared key to the enrollee. Whether WPA-PSK or WPA2-PSK is used depends on the 
standards supported by the devices. If the registrar is already part of a network, it sends the existing 
information. If not, it generates the SSID and WPA(2)-PSK randomly.