1 00:00:01,190 --> 00:00:09,380 So let's have a look at Wi-Fi protected setup or what you might see as WPX, sure, it's a standard 2 00:00:09,380 --> 00:00:17,120 for the easy and secure establishment of a wireless network that weps is an optional certification program 3 00:00:17,120 --> 00:00:18,980 for Wi-Fi certified products. 4 00:00:20,000 --> 00:00:26,840 So not all wi fi certified products will include some sort of support. 5 00:00:27,990 --> 00:00:35,970 Users will need to look for the Wi-Fi protected set logo or, you know, some equivalent term on the 6 00:00:35,970 --> 00:00:40,490 product to ensure that the product is WPX compatible. 7 00:00:41,310 --> 00:00:51,580 So WPX automatically configures a network name, SS ID and a security key for the access point and the 8 00:00:51,620 --> 00:00:55,580 WPX enabled client devices on a network. 9 00:00:56,790 --> 00:01:02,610 You don't need to know the SS IDs and security key or even the passphrase when connecting waps enabled 10 00:01:02,610 --> 00:01:03,150 devices. 11 00:01:04,500 --> 00:01:11,310 No one can guess or figured out your security key or passphrase because the keys will be randomly generated 12 00:01:11,700 --> 00:01:18,060 so there's no predictable passphrase or long sequences of hexadecimal to enter. 13 00:01:20,440 --> 00:01:27,400 Now, information and network credentials are securely exchanged over the air using the Extensible Authentication 14 00:01:27,400 --> 00:01:28,990 Protocol, or IAP. 15 00:01:29,950 --> 00:01:33,400 That's one of the authentication protocols used in WPA to. 16 00:01:34,810 --> 00:01:38,200 However, yes, there are a few disadvantages. 17 00:01:39,530 --> 00:01:46,850 One, it doesn't support ad hoc mode or network where wireless devices are communicating directly to 18 00:01:46,850 --> 00:01:48,770 each other without an access point. 19 00:01:49,600 --> 00:01:59,290 And all of the Wi-Fi devices on the network must be certified or GPS compatible, otherwise you won't 20 00:01:59,290 --> 00:02:03,810 be able to take advantage of the ease of securing the network in this way. 21 00:02:05,360 --> 00:02:10,110 Now, there are three primary methods used and Wi-Fi protected set up. 22 00:02:10,640 --> 00:02:16,280 There's a pin entry push button configuration and near field communication. 23 00:02:18,100 --> 00:02:24,220 In all Wi-Fi protected setup networks, a unique pin will be required for each device to join the network. 24 00:02:26,090 --> 00:02:33,920 A fixed PIN label or sticker may be placed on a device or a dynamic pin can be generated and then shown 25 00:02:33,920 --> 00:02:35,420 on the devices display. 26 00:02:36,480 --> 00:02:43,200 In any event, the pen is used to make sure the intended device is added to the network being set up, 27 00:02:43,500 --> 00:02:51,000 and it'll help to avoid accidental or even malicious attempts to add unintended devices to that network. 28 00:02:52,210 --> 00:02:58,300 And when some Wi-Fi protected set up networks, the user may connect multiple devices to the network 29 00:02:58,300 --> 00:03:01,990 and then enable data encryption by pushing a button. 30 00:03:03,440 --> 00:03:10,910 The access point, or wireless router, will have a physical button and other devices may have a physical 31 00:03:10,910 --> 00:03:12,580 or even a software base button. 32 00:03:14,560 --> 00:03:19,270 And then during the usually two minute set up period, which follows the push of that button. 33 00:03:20,230 --> 00:03:27,550 Unintended devices could join the network if they are in range, and finally, a near field communication 34 00:03:27,550 --> 00:03:35,800 interface or an NFC can be used to transfer network settings to a new device without requiring manual 35 00:03:35,800 --> 00:03:36,790 entry of its PIN. 36 00:03:37,720 --> 00:03:44,950 Make a note, the NFC method provides strong protection against adding an unintended device to the network. 37 00:03:46,430 --> 00:03:48,470 But I'll leave that as a dot, dot, dot.