Figure 5.  Client-based WDS over Peer-to-Peer VPN

Note: A discussion on how key exchange would work in a peer-to-peer VPN scenario is beyond the scope of this paper.