Chapter 3 Wireless LANs
single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP)
If both an AP and the wireless clients support
3.4 Wi-Fi Protected Setup
3.4.1 How WPS Works
When two
The following figure shows a
Figure 9 How WPS works |
|
|
|
|
|
|
ACTIVATE |
|
|
|
|
| ACTIVATE |
WPS |
|
|
|
|
| WPS |
| WITHIN 2 MINUTES | |||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
WPS HANDSHAKE
ENROLLEE |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| REGISTRAR |
|
|
|
|
|
|
|
|
| SECURE TUNNEL | ||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |||||||||||||||
|
|
|
|
|
|
|
|
| SECURITY INFO | ||||||||||||||||||
|
|
|
|
|
|
|
| COMMUNICATION | |||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
24 |
|
NWD Series User’s Guide | |
|
|