User`s guide
Table Of Contents
- VMG8924-B10A and VMG8924- B30A Series
- User’s Guide
- Technical Reference
- Network Map and Status Screens
- Broadband
- Wireless
- Home Networking
- 7.1 Overview
- 7.2 The LAN Setup Screen
- 7.3 The Static DHCP Screen
- 7.4 The UPnP Screen
- 7.5 Installing UPnP in Windows Example
- 7.6 Using UPnP in Windows XP Example
- 7.7 The Additional Subnet Screen
- 7.8 The STB Vendor ID Screen
- 7.9 The 5th Ethernet Port Screen
- 7.10 The LAN VLAN Screen
- 7.11 The Wake on LAN Screen
- 7.12 Technical Reference
- Routing
- Quality of Service (QoS)
- Network Address Translation (NAT)
- Dynamic DNS Setup
- Interface Group
- USB Service
- Power Management
- Firewall
- MAC Filter
- Parental Control
- Scheduler Rule
- Certificates
- VPN
- Voice
- Log
- Traffic Status
- VoIP Status
- ARP Table
- Routing Table
- IGMP/MLD Status
- xDSL Statistics
- 3G Statistics
- User Account
- Remote Management
- TR-069 Client
- TR-064
- SNMP
- Time Settings
- E-mail Notification
- Logs Setting
- Firmware Upgrade
- Configuration
- Diagnostic
- Troubleshooting
- Customer Support
- Setting up Your Computer’s IP Address
- IP Addresses and Subnetting
- Pop-up Windows, JavaScripts and Java Permissions
- Wireless LANs
- IPv6
- Services
- Legal Information
- Index

Chapter 6 Wireless
VMG8924-B10A and VMG8924-B30A Series User’s Guide
106
• When you use the PBC method, there is a short period (from the moment you press the button
on one device to the moment you press the button on the other device) when any WPS-enabled
device could join the network. This is because the registrar has no way of identifying the
“correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a
possible way for a hacker to gain access to a network.
You can easily check to see if this has happened. WPS works between only two devices
simultaneously, so if another device has enrolled your device will be unable to enroll, and will not
have access to the network. If this happens, open the access point’s configuration interface and
look at the list of associated clients (usually displayed by MAC address). It does not matter if the
access point is the WPS registrar, the enrollee, or was not involved in the WPS handshake; a
rogue device must still associate with the access point to gain access to the network. Check the
MAC addresses of your wireless clients (usually printed on a label on the bottom of the device). If
there is an unknown MAC address you can remove it or reset the AP.