ZyXEL Communications Corporation NWD211AN Manual De Usuario

Descargar
Página de 154
 Chapter 3 Wireless LANs
NWD-211AN User’s Guide
47
• When you use the PBC method, there is a short period (from the moment you press the 
button on one device to the moment you press the button on the other device) when any 
WPS-enabled device could join the network. This is because the registrar has no way of 
identifying the “correct” enrollee, and cannot differentiate between your enrollee and a 
rogue device. This is a possible way for a hacker to gain access to a network.
You can easily check to see if this has happened. WPS works between only two devices 
simultaneously, so if another device has enrolled your device will be unable to enroll, and 
will not have access to the network. If this happens, open the access point’s configuration 
interface and look at the list of associated clients (usually displayed by MAC address). It 
does not matter if the access point is the WPS registrar, the enrollee, or was not involved 
in the WPS handshake; a rogue device must still associate with the access point to gain 
access to the network. Check the MAC addresses of your wireless clients (usually printed 
on a label on the bottom of the device). If there is an unknown MAC address you can 
remove it or reset the AP.