Huawei B2368 Series User Manual page 56

Lte cpe
Hide thumbs Also See for B2368 Series:
Table of Contents

Advertisement

LTE CPE B2368 User's
Guide
The principle of functioning WPS automatic assignment of randomly generated passwords WPA-PSK /
WPA2-PSK registrar enrollee. If the password is generated by the WPA-PSK or WPA2-PSK depending on the
specifications of the device. Information on the available level of security can be found for example in the
configuration interface of the registrar (if such a function of the device supports it). Thus generated can then enter
a password into a device that does not support WPS, thus created a standard connection to the network (the
device still must support encryption method WPA-PSK or WPA2-PSK).
If this happened, however, can be easily verified. As already mentioned, WPS always works only between two
devices. So if during the two-minute interval has been to establish a connection with another device, your device
will not be able to accept the role of an enrollee and will not be able to connect to the network. If this happens,
open the configuration interface of the access point and check the list of connected client devices (typically are
given their MAC addresses). Independently of how there was a potential intrusion alien device, to ensure that this
equipment has obtained access to your wireless network, it must be assigned to the access point. Check the
MAC addresses of client devices in your home (usually on a label on the bottom of the device). If the list in the
configuration interface, you can find an unknown MAC address, you can be deleted from the list. An alternative
solution is to restart the access point.
Issue 01
WPS 2.0 does not use WPA-PSK.
If you choose to use PBC methods (ie press the WPS button), keep in mind that its essence is to create a
two-minute " window " during which the network can connect to any device that supports WPS. Registrar
two-minute " window " during which the network can connect to any device that supports WPS. Registrar
two-minute " window " during which the network can connect to any device that supports WPS. Registrar
two-minute " window " during which the network can connect to any device that supports WPS. Registrar
two-minute " window " during which the network can connect to any device that supports WPS. Registrar
can not detect in any way " right " clerk, and therefore can not distinguish between the device wishing to
can not detect in any way " right " clerk, and therefore can not distinguish between the device wishing to
can not detect in any way " right " clerk, and therefore can not distinguish between the device wishing to
can not detect in any way " right " clerk, and therefore can not distinguish between the device wishing to
can not detect in any way " right " clerk, and therefore can not distinguish between the device wishing to
actually connect and intruder. During this period you can penetrate your network hacker.
Copyright © Huawei Technologies Co., Ltd.
5 Wireless WiFi 2.4 / 5 GHz
53

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

B2368-22B2368-66B2368-57

Table of Contents