Page 116 / 327 Scroll up to view Page 111 - 115
Chapter 7 Wireless
VMG3926-B10A User’s Guide
116
Figure 49
WPS: Example Network Step 3
7.9.9.5
Limitations of WPS
WPS has some limitations of which you should be aware.
WPS works in Infrastructure networks only (where an AP and a wireless client communicate). It
does not work in Ad-Hoc networks (where there is no AP).
When you use WPS, it works between two devices only. You cannot enroll multiple devices
simultaneously, you must enroll one after the other.
For instance, if you have two enrollees and one registrar you must set up the first enrollee (by
pressing the WPS button on the registrar and the first enrollee, for example), then check that it
successfully enrolled, then set up the second device in the same way.
WPS works only with other WPS-enabled devices. However, you can still add non-WPS devices to
a network you already set up using WPS.
WPS works by automatically issuing a randomly-generated WPA-PSK or WPA2-PSK pre-shared
key from the registrar device to the enrollee devices. Whether the network uses WPA-PSK or
WPA2-PSK depends on the device. You can check the configuration interface of the registrar
device to discover the key the network is using (if the device supports this feature). Then, you
can enter the key into the non-WPS device and join the network as normal (the non-WPS device
must also support WPA-PSK or WPA2-PSK).
When you use the PBC method, there is a short period (from the moment you press the button
on one device to the moment you press the button on the other device) when any WPS-enabled
device could join the network. This is because the registrar has no way of identifying the
“correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a
possible way for a hacker to gain access to a network.
You can easily check to see if this has happened. WPS works between only two devices
simultaneously, so if another device has enrolled your device will be unable to enroll, and will not
have access to the network. If this happens, open the access point’s configuration interface and
look at the list of associated clients (usually displayed by MAC address). It does not matter if the
CLIENT 1
AP1
REGISTRAR
CLIENT 2
EXISTING CONNECTION
SECURITY INFO
ENROLLEE
AP2
EXISTING CONNECTION
Page 117 / 327
Chapter 7 Wireless
VMG3926-B10A User’s Guide
117
access point is the WPS registrar, the enrollee, or was not involved in the WPS handshake; a
rogue device must still associate with the access point to gain access to the network. Check the
MAC addresses of your wireless clients (usually printed on a label on the bottom of the device). If
there is an unknown MAC address you can remove it or reset the AP.
Page 118 / 327
Chapter 7 Wireless
VMG3926-B10A User’s Guide
118
Page 119 / 327
VMG3926-B10A User’s Guide
119
C
HAPTER
8
Home Networking
8.1
Overview
A Local Area Network (LAN) is a shared communication system to which many networking devices
are connected. It is usually located in one immediate area such as a building or floor of a building.
Use the LAN screens to help you configure a LAN DHCP server and manage IP addresses.
8.1.1
What You Can Do in this Chapter
Use the
LAN Setup
screen to set the LAN IP address, subnet mask, and DHCP settings of your
VMG (
Section 8.2 on page 121
).
Use the
Static DHCP
screen to assign IP addresses on the LAN to specific individual computers
based on their MAC Addresses (
Section 8.3 on page 125
).
Use the
UPnP
screen to enable UPnP and UPnP NAT traversal on the VMG (
Section 8.4 on page
126
).
Use the
Additional Subnet
screen to configure IP alias and public static IP (
Section 8.5 on page
128
).
Use the
STB Vendor ID
screen to configure the Vendor IDs of the connected Set Top Box (STB)
devices, which have the VMG automatically create static DHCP entries for the STB devices when
they request IP addresses (
Section 8.6 on page 130
).
Use the
Wake on Lan
screen to remotely turn on a device on the network. (
Section 8.7 on page
130
).
Use the
TFTP Server Name
screen to identify a TFTP server for configuration file download
using DHCP option 66. (
Section 8.8 on page 131
).
DSL
LAN
Page 120 / 327
Chapter 8 Home Networking
VMG3926-B10A User’s Guide
120
8.1.2
What You Need To Know
8.1.2.1
About LAN
IP Address
IP addresses identify individual devices on a network. Every networking device (including
computers, servers, routers, printers, etc.) needs an IP address to communicate across the
network. These networking devices are also known as hosts.
Subnet Mask
Subnet masks determine the maximum number of possible hosts on a network. You can also use
subnet masks to divide one network into multiple sub-networks.
DHCP
A DHCP (Dynamic Host Configuration Protocol) server can assign your VMG an IP address, subnet
mask, DNS and other routing information when it's turned on.
DNS
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and
vice versa. The DNS server is extremely important because without it, you must know the IP
address of a networking device before you can access it.
RADVD (Router Advertisement Daemon)
When an IPv6 host sends a Router Solicitation (RS) request to discover the available routers,
RADVD with Router Advertisement (RA) messages in response to the request. It specifies the
minimum and maximum intervals of RA broadcasts. RA messages containing the address prefix.
IPv6 hosts can be generated with the IPv6 prefix an IPv6 address.
8.1.2.2
About UPnP
Identifying UPnP Devices
UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP
compatible device installed on your network will appear as a separate icon. Selecting the icon of a
UPnP device will allow you to access the information and properties of that device.
NAT Traversal
UPnP NAT traversal automates the process of allowing an application to operate through NAT. UPnP
network devices can automatically configure network addressing, announce their presence in the
network to other UPnP devices and enable exchange of simple product and service descriptions.
NAT traversal allows the following:
Dynamic port mapping
Learning public IP addresses

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top