TP-Link TL-WN7200ND User Guide - Page 21

TL-WN7200N, PBC Method, II. PIN Method, QSS- QSS BUTTON mode

Page 21 highlights

TL-WN7200N 150Mbps High Power Wireless USB Adapter User Guide ) Note: To build a successful connection by QSS, you should also do the corresponding configuration of the Access Point for QSS or WPS function meanwhile. I. PBC Method If your Access Point is equipped with a push-button for Wi-Fi Protected Setup, you can connect the adapter to the Access Point by Push QSS Button method. Figure 3-9 QSS- QSS BUTTON mode Step 1 Click the QSS button (marked by the red circle) on the screen as Figure 3-9. Or: Press and hold the QSS button on the adapter (shown on the following figure) for 2 or 3 seconds. Step 2 Press the QSS button on your Access Point device to build the connection. II. PIN Method If your Access Point supports Wi-Fi Protected Setup and the PIN method, you can add the adapter to the network by the following two ways: - 16 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41

150Mbps High Power Wireless USB Adapter
User Guide
TL-WN7200N
- 16 -
)
Note:
To build a successful connection by QSS, you should also do the corresponding configuration of
the Access Point for QSS or WPS function meanwhile
.
I.
PBC Method
If your Access Point is equipped with a push-button for Wi-Fi Protected Setup, you can connect
the adapter to the Access Point by Push QSS Button method.
Figure 3-9 QSS- QSS BUTTON mode
Step 1
Click the
QSS
button (marked by the red circle) on the screen as Figure 3-9.
Or:
Press and hold the QSS button on the adapter (shown on the following figure) for 2 or 3
seconds.
Step 2
Press the QSS button on your Access Point device to build the connection.
II. PIN Method
If your Access Point supports Wi-Fi Protected Setup and the PIN method, you can add the
adapter to the network by the following two ways: