<P> The WPS protocol consists of a series of EAP message exchanges that are triggered by a user action, relying on an exchange of descriptive information that should precede that user's action . The descriptive information is transferred through a new Information Element (IE) that is added to the beacon, probe response, and optionally to the probe request and association request / response messages . Other than purely informative type - length - values, those IEs will also hold the possible and the currently deployed configuration methods of the device . </P> <P> After this communication of the device capabilities from both ends, the user initiates the actual protocol session . The session consists of eight messages that are followed, in the case of a successful session, by a message to indicate that the protocol is completed . The exact stream of messages may change when configuring different kinds of devices (AP or STA), or when using different physical media (wired or wireless). </P> <P> Some devices with dual - band wireless network connectivity do not allow the user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi - Fi Protected Setup, unless the wireless access point has separate WPS button for each band or radio; however, a number of later wireless routers with multiple frequency bands and / or radios allow the establishment of a WPS session for a specific band and / or radio for connection with clients which cannot have the SSID or band (e.g., 2.4 / 5 GHz) explicitly selected by the user on the client for connection with WPS (e.g. pushing the 5 GHz, where supported, WPS button on the wireless router will force a client device to connect via WPS on only the 5 GHz band after a WPS session has been established by the client device which cannot explicitly allow the selection of wireless network and / or band for the WPS connection method). </P> <P> In December 2011, researcher Stefan Viehböck reported a design and implementation flaw that makes brute - force attacks against PIN - based WPS feasible to be performed on WPS - enabled Wi - Fi networks . A successful attack on WPS allows unauthorized parties to gain access to the network, and the only effective workaround is to disable WPS . The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN, which is an eight - digit number used to add new WPA enrollees to the network . Since the last digit is a checksum of the previous digits, there are seven unknown digits in each PIN, yielding 10 = 10,000,000 possible combinations . </P>

What is wps button on access point mean
find me the text answering this question