Chapter 7 Wireless LAN

The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method.

Figure 43 Example WPS Process: PIN Method

 

ENROLLEE

REGISTRAR

WPS

This device’s

WPS PIN: 123456

WPS

Enter WPS PIN from other device:

WPS

WPS

START

START

WITHIN 2 MINUTES

SECURE EAP TUNNEL

SSID

WPA(2)-PSK

COMMUNICATION

7.10.8.3 How WPS Works

When two WPS-enabled devices connect, each device must assume a specific role. One device acts as the registrar (the device that supplies network and security settings) and the other device acts as the enrollee (the device that receives network and security settings. The registrar creates a secure EAP (Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPA-PSK or WPA2-PSK pre-shared key to the enrollee. Whether WPA-PSK or WPA2-PSK is used depends on the standards supported by the devices. If the registrar is already part of a network, it sends the existing information. If not, it generates the SSID and WPA(2)-PSK randomly.

The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point.

110

 

AMG1312-T Series User’s Guide