Normally I connect a device to the HT2000W's WiFi the tradional way, but due to my SmartTV having the ability to connect via WPS, I decided to try it. This was a few months back. It wouldn't work. I would push the WPS button on the front of the HT2000W modem when directed to by the TV and it wouldn't work. I tried over and over, and tried again this evening. Again, I wouldn't normally connect this way and only wanted to try it.
Well, I found out why it wouldn't work. As it turns out, I first had to enable WPS connection from within the WiFi settings of the modem. I don't know if WPS is supposed to be on by default, but it was off in my settings. So, I checked the little box and clicke on Apply Changes to turn it on, then tried the connection again. It worked like a charm.
So, if anyone out there tries to connect their device to the HT2000W modem using the push button method (the button on the front of the modem), but it doesn't work, make sure that the WPS connection is enabled in the WiFi settings of the modem. If it isn't, check the box and click on Apply Changes.
WPS has some known vulnerabilties.
Created by the Wi-Fi Alliance and introduced in 2006, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. Prior to the standard, several competing solutions were developed by different vendors to address the same need.
A major security flaw was revealed in December 2011 that affects wireless routers with the WPS PIN feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key. Users have been urged to turn off the WPS PIN feature, although this may not be possible on some router models.
Why reduce the security of the network by introducing "end-arounds" to its security?
It might be that mine was the opposite of the norm in not being checked.
Great info. I was only presenting the information for those that might be having a problem connecting when they choose to use this method. It wasn't meant as an endorsement. I know from past comments that WPS is somewhat frowned upon. I, personally, wouldn't use it, and I disabled it again after the test connection.