Chapter 7 Wireless LAN
AMG1312-T Series User’s Guide
110
The following figure shows a WPS-enabled wireless client (installed in a notebook computer)
connecting to the WPS-enabled AP via the PIN method.
Figure 43
Example WPS Process: PIN Method
7.10.8.3 How WPS Works
When two WPS-enabled devices connect, each device must assume a specific role. One device acts
as the registrar (the device that supplies network and security settings) and the other device acts
as the enrollee (the device that receives network and security settings. The registrar creates a
secure EAP (Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the
WPA-PSK or WPA2-PSK pre-shared key to the enrollee. Whether WPA-PSK or WPA2-PSK is used
depends on the standards supported by the devices. If the registrar is already part of a network, it
sends the existing information. If not, it generates the SSID and WPA(2)-PSK randomly.
The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a
WPS-enabled access point.
ENROLLEE
SECURE EAP TUNNEL
SSID
WPA(2)-PSK
WITHIN 2 MINUTES
COMMUNICATION
This device’s
WPS
Enter WPS PIN
WPS
from other device:
WPS PIN:
123456
WPS
START
WPS
START
REGISTRAR
Summary of Contents for AMG1312-T Series
Page 12: ...12 PART I User s Guide ...
Page 13: ...13 ...
Page 58: ...Chapter 4 Tutorials AMG1312 T Series User s Guide 58 Tutorial Advanced QoS Class Setup ...
Page 61: ...61 PART II Technical Reference ...
Page 62: ...62 ...