User's Manual

Chapter 5 Wireless
B222s User’s Guide
68
When you use the PBC m et hod, t here is a short period (from t he m om ent you press t he but t on
on one device to t he m om ent you press t he butt on on the ot her device) when any WPS-enabled
device could j oin the network. This is because t he regist rar has no way of identifying the
correct enrollee, and cannot different iate bet ween your enrollee and a rogue device. This is a
possible way for a hacker t o gain access t o a net w ork.
You can easily check to see if t his has happened. WPS works bet w een only two devices
sim ultaneously, so if anot her device has enrolled your device w ill be unable t o enroll, and will not
have access t o t he net work. I f this happens, open t he access point ’s configurat ion interface and
look at t he list of associat ed client s ( usually displayed by MAC address). I t does not m at t er if the
access point is t he WPS regist rar, t he enrollee, or was not involved in the WPS handshake; a
rogue device m ust still associate with the access point t o gain access t o t he net work. Check t he
MAC addresses of your wireless clients ( usually print ed on a label on t he bot t om of t he device). I f
there is an unknown MAC address you can rem ove it or reset t he AP.