ZyXEL Communications P-660HN-TxA User Manual

Page 134

Advertising
background image

Chapter 8 Wireless LAN

P-660HN-TxA User’s Guide

134

• When you use the PBC method, there is a short period (from the moment you

press the button on one device to the moment you press the button on the

other device) when any WPS-enabled device could join the network. This is

because the registrar has no way of identifying the “correct” enrollee, and

cannot differentiate between your enrollee and a rogue device. This is a possible

way for a hacker to gain access to a network.
You can easily check to see if this has happened. WPS works between only two

devices simultaneously, so if another device has enrolled your device will be

unable to enroll, and will not have access to the network. If this happens, open

the access point’s configuration interface and look at the list of associated

clients (usually displayed by MAC address). It does not matter if the access

point is the WPS registrar, the enrollee, or was not involved in the WPS

handshake; a rogue device must still associate with the access point to gain

access to the network. Check the MAC addresses of your wireless clients

(usually printed on a label on the bottom of the device). If there is an unknown

MAC address you can remove it or reset the AP.

Advertising