ZyXEL Communications LTE Series User Manual page 83

Hide thumbs Also See for LTE Series:
Table of Contents

Advertisement

Chapter 6 Wireless
Figure 56 Example WPS Process: PIN Method
6.8.7.3 How WPS Works
When two WPS-enabled devices connect, each device must assume a specific role. One device acts
as the registrar (the device that supplies network and security settings) and the other device acts as the
enrollee (the device that receives network and security settings. The registrar creates a secure EAP
(Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPA-PSK or
WPA2-PSK pre-shared key to the enrollee. Whether WPA-PSK or WPA2-PSK is used depends on the
standards supported by the devices. If the registrar is already part of a network, it sends the existing
information. If not, it generates the SSID and WPA(2)-PSK randomly.
The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a
WPS-enabled access point.
LTE Series User's Guide
83

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents