Page 146 / 424 Scroll up to view Page 141 - 145
Chapter 6 Wireless
P-2612HNU-Fx User’s Guide
146
6.7.6.2
PIN Configuration
Each WPS-enabled device has its own PIN (Personal Identification Number). This
may either be static (it cannot be changed) or dynamic (in some devices you can
generate a new PIN by clicking on a button in the configuration interface).
Use the PIN method instead of the push-button configuration (PBC) method if you
want to ensure that the connection is established between the devices you specify,
not just the first two devices to activate WPS in range of each other. However, you
need to log into the configuration interfaces of both devices to use the PIN
method.
When you use the PIN method, you must enter the PIN from one device (usually
the wireless client) into the second device (usually the Access Point or wireless
router). Then, when WPS is activated on the first device, it presents its PIN to the
second device. If the PIN matches, one device sends the network and security
information to the other, allowing it to join the network.
Take the following steps to set up a WPS connection between an access point or
wireless router (referred to here as the AP) and a client device using the PIN
method.
1
Ensure WPS is enabled on both devices.
2
Access the WPS section of the AP’s configuration interface. See the device’s User’s
Guide for how to do this.
3
Look for the client’s WPS PIN; it will be displayed either on the device, or in the
WPS section of the client’s configuration interface (see the device’s User’s Guide
for how to find the WPS PIN - for the ZyXEL Device, see
Section 6.4 on page 135
).
4
Enter the client’s PIN in the AP’s configuration interface.
5
If the client device’s configuration interface has an area for entering another
device’s PIN, you can either enter the client’s PIN in the AP, or enter the AP’s PIN
in the client - it does not matter which.
6
Start WPS on both devices within two minutes.
7
Use the configuration utility to activate WPS, not the push-button on the device
itself.
8
On a computer connected to the wireless client, try to connect to the Internet. If
you can connect, WPS was successful.
If you cannot connect, check the list of associated wireless clients in the AP’s
configuration utility. If you see the wireless client in the list, WPS was successful.
Page 147 / 424
Chapter 6 Wireless
P-2612HNU-Fx User’s Guide
147
The following figure shows a WPS-enabled wireless client (installed in a notebook
computer) connecting to the WPS-enabled AP via the PIN method.
Figure 34
Example WPS Process: PIN Method
6.7.6.3
How WPS Works
When two WPS-enabled devices connect, each device must assume a specific role.
One device acts as the registrar (the device that supplies network and security
settings) and the other device acts as the enrollee (the device that receives
network and security settings. The registrar creates a secure EAP (Extensible
Authentication Protocol) tunnel and sends the network name (SSID) and the WPA-
PSK or WPA2-PSK pre-shared key to the enrollee. Whether WPA-PSK or WPA2-PSK
is used depends on the standards supported by the devices. If the registrar is
already part of a network, it sends the existing information. If not, it generates
the SSID and WPA(2)-PSK randomly.
ENROLLEE
SECURE EAP TUNNEL
SSID
WPA(2)-PSK
WITHIN 2 MINUTES
COMMUNICATION
This device’s
WPS
Enter WPS PIN
WPS
from other device:
WPS PIN:
123456
WPS
START
WPS
START
REGISTRAR
Page 148 / 424
Chapter 6 Wireless
P-2612HNU-Fx User’s Guide
148
The following figure shows a WPS-enabled client (installed in a notebook
computer) connecting to a WPS-enabled access point.
Figure 35
How WPS works
The roles of registrar and enrollee last only as long as the WPS setup process is
active (two minutes). The next time you use WPS, a different device can be the
registrar if necessary.
The WPS connection process is like a handshake; only two devices participate in
each WPS transaction. If you want to add more devices you should repeat the
process with one of the existing networked devices and the new device.
Note that the access point (AP) is not always the registrar, and the wireless client
is not always the enrollee. All WPS-certified APs can be a registrar, and so can
some WPS-enabled wireless clients.
By default, a WPS devices is “unconfigured”. This means that it is not part of an
existing network and can act as either enrollee or registrar (if it supports both
functions). If the registrar is unconfigured, the security settings it transmits to the
enrollee are randomly-generated. Once a WPS-enabled device has connected to
another device using WPS, it becomes “configured”. A configured wireless client
can still act as enrollee or registrar in subsequent WPS connections, but a
configured access point can no longer act as enrollee. It will be the registrar in all
subsequent WPS connections in which it is involved. If you want a configured AP to
act as an enrollee, you must reset it to its factory defaults.
SECURE TUNNEL
SECURITY INFO
WITHIN 2 MINUTES
COMMUNICATION
ACTIVATE
WPS
ACTIVATE
WPS
WPS HANDSHAKE
REGISTRAR
ENROLLEE
Page 149 / 424
Chapter 6 Wireless
P-2612HNU-Fx User’s Guide
149
6.7.6.4
Example WPS Network Setup
This section shows how security settings are distributed in an example WPS setup.
The following figure shows an example network. In step
1
, both
AP1
and
Client 1
are unconfigured. When WPS is activated on both, they perform the handshake. In
this example,
AP1
is the registrar, and
Client 1
is the enrollee. The registrar
randomly generates the security information to set up the network, since it is
unconfigured and has no existing information.
Figure 36
WPS: Example Network Step 1
In step
2
, you add another wireless client to the network. You know that
Client 1
supports registrar mode, but it is better to use
AP1
for the WPS handshake with
the new client since you must connect to the access point anyway in order to use
the network. In this case,
AP1
must be the registrar, since it is configured (it
already has security information for the network).
AP1
supplies the existing
security information to
Client 2
.
Figure 37
WPS: Example Network Step 2
REGISTRAR
ENROLLEE
SECURITY INFO
CLIENT 1
AP1
REGISTRAR
CLIENT 1
AP1
ENROLLEE
CLIENT 2
EXISTING CONNECTION
SECURITY INFO
Page 150 / 424
Chapter 6 Wireless
P-2612HNU-Fx User’s Guide
150
In step 3, you add another access point (
AP2
) to your network.
AP2
is out of
range of
AP1
, so you cannot use
AP1
for the WPS handshake with the new access
point. However, you know that
Client 2
supports the registrar function, so you use
it to perform the WPS handshake instead.
Figure 38
WPS: Example Network Step 3
6.7.6.5
Limitations of WPS
WPS has some limitations of which you should be aware.
WPS works in Infrastructure networks only (where an AP and a wireless client
communicate). It does not work in Ad-Hoc networks (where there is no AP).
When you use WPS, it works between two devices only. You cannot enroll
multiple devices simultaneously, you must enroll one after the other.
For instance, if you have two enrollees and one registrar you must set up the
first enrollee (by pressing the WPS button on the registrar and the first enrollee,
for example), then check that it successfully enrolled, then set up the second
device in the same way.
WPS works only with other WPS-enabled devices. However, you can still add
non-WPS devices to a network you already set up using WPS.
WPS works by automatically issuing a randomly-generated WPA-PSK or WPA2-
PSK pre-shared key from the registrar device to the enrollee devices. Whether
the network uses WPA-PSK or WPA2-PSK depends on the device. You can check
the configuration interface of the registrar device to discover the key the
network is using (if the device supports this feature). Then, you can enter the
key into the non-WPS device and join the network as normal (the non-WPS
device must also support WPA-PSK or WPA2-PSK).
CLIENT 1
AP1
REGISTRAR
CLIENT 2
EXISTING CONNECTION
SECURITY INFO
ENROLLEE
AP2
EXISTING CONNECTION

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top