background image

Ubee Interactive

3.8   Wireless

DDW3612 Subscriber User Guide • July, 2010

43

WEP Encryption

If you don’t have WPA(2)-aware wireless clients, then use 
WEP key encrypting. A higher bit key offers better security. 
WEP encryption scrambles the data transmitted between the 
wireless stations and the DDW3612 Wireless Cable Modem 
Gateway to keep network communications private. It encrypts 
unicast and multicast communications in a network. Both the 
wireless stations and the DDW3612 Wireless Cable Modem 
Gateway must use the same WEP key. Data Encryption can 
be set to WEP 

128-bit, 64-bit, 

or 

Disable.

 

Shared Key Authentication

Shared Key is an authentication method used by wireless 
LANs, which follow the IEEE 802.11 standard. Wireless 
devices authenticate each other by using a secret key 
that is kept by both devices.

802.1x Authentication

Enable to have the DDW3612 Wireless Cable Modem 
Gateway authenticate wireless clients.

Network Key 1-4

You can pre-define up to 4 keys for 64-bit or 128-bit (64-
bit keys require 10 hexadecimal digits) (128-bit key 
require 26 hexadecimal digits).

Current Network Key

You can select one of the four pre-defined keys as the 
current network key.

Passphrase

You can set WEP encryption key by entering a word or 
group of printable characters in the Passphrase box and 
click Generate WEP keys. These characters are case 
sensitive.

Generate WEP Keys

Force the wireless router to generate 4 WEP keys 
automatically.

Apply

Click to save the wireless configurations.

Automatic Security 
Configuration

Use this feature to setup WPS (Wifi Protected Setup) for 
devices connecting to the wireless network.

Device Name

Enter a name for this wireless cable modem for WPS.

PIN

Enter the Personal Identification Number for this wireless 
cable modem.

Configure

Click this button to apply the WPS-Device Name/PIN 
Setup.

WPS Add Client/Push 
Button/PIN

Select which method to have connecting wireless clients 
connect to the wireless network, Push Button or PIN. If 
PIN is selected, clients are required to enter the PIN in 
order to access the wireless cable modem. For push 
button, a client pushes a button, either on the device or in 
software on the device, and then on the wireless cable 
modem to establish secure communications.

Apply

Click Apply to save WPS configurations.

Label

Description

Summary of Contents for DDW3612

Page 1: ...treet Suite 200 Englewood CO 80112 1 888 390 8233 Sales email amsales ubeeinteractive com Support email amsupport ubeeinteractive com version 10 14 10 Ubee DDW3612 Wireless Cable Modem Gateway Firmwar...

Page 2: ...s material is protected by the copyright laws of the United States and other countries It may not be reproduced distributed or altered in any fashion by any entity either internal or external to Ubee...

Page 3: ...m Status 13 3 3 Cable Modem Downstream 14 3 4 Cable Modem Upstream 15 3 5 Cable Modem Operation Config 16 3 6 Cable Modem Event Log 18 3 7 Gateway 19 3 7 1 Gateway Information 19 3 7 2 Gateway Setup 2...

Page 4: ...9 1 Wireless Speeds and Performance 52 3 10 Parental Control 57 3 10 1 Parental Control User Setup 57 3 10 2 Parental Control Basic Settings 59 3 10 3 Parental Control Tod Filter 60 3 10 4 Parental C...

Page 5: ...nstallation instructions and troublehsooting information 1 1 Device Overview This section contains the following subsections Application Diagram p 2 Physical Specifications Standards Firmware Operatio...

Page 6: ...erfaces Cable F Connector Female LAN 4 10 100 1000 Mbps RJ 45 Ports USB 1 USB 2 0 Port Standards Certifications DOCSIS 3 0 Euro DOCSIS 3 0 Certified DOCSIS Euro DOCSIS 1 0 1 1 2 0 Certified CE FCC Cla...

Page 7: ...factors including network configuration and speed Security VPN Pass Through IPSec L2TP PPTP NAT Firewall MAC IP Port Filtering Parental Control Stateful Packet Inspection SPI DoS Attack Protection WP...

Page 8: ...he cable modem s MAC Address UPPER case if letters Example DDW3612BE Note If the subscriber changes the SSID the device does not revert to this default SSID upon any reset of the device except in the...

Page 9: ...nding 1 On Blue with channel bonding 2 On Green without channel bonding On 7 Registration OK Off On if connects On if connects On if connects On if connects Off On On 1 On Blue with channel bonding 2...

Page 10: ...1 1 Device Overview Ubee Interactive 6 DDW3612 Subscriber User Guide July 2010...

Page 11: ...ilable and powered on The Windows PC must have an ethernet network adapter ethernet port The PC must also have an internet browser installed Netscape or Internet Explorer Connect the power adapter tha...

Page 12: ...he login window enter the user credentials Standard User Consumer Web Interface Login Username user Password user 6 Click OK and the web interface is displayed Note The username and password must be e...

Page 13: ...DW3612 Subscriber User Guide July 2010 9 devices and wireless devices to the network Note The web interface allows you to customize the configurations and capabilities the device For full explanation...

Page 14: ...devices to the network for example a laptop computer do the following 1 Use the device LEDs to confirm operations The WiFi LED must be solidly lit The PWR DS US and Online LEDs are also solidly lit i...

Page 15: ...so that is could re establish a connection with the cable modem Check for a resource conflict Windows users only To do this 1 Right click on the My Computer icon on your desktop and choose Properties...

Page 16: ...ons are listed below the following screen example Label Description Cable Modem The current DOCSIS standard of the device MAC Address The unique Media Access Control MAC hardware address of cable mode...

Page 17: ...ion Acquired Downstream Channel Displays a Downstream channel that the cable modem is trying to lock to and the progress Ranged Upstream Channel Displays an Upstream channel that the device is trying...

Page 18: ...cription Frequency Displays the downstream channel frequency on which the cable modem is scanning Lock Status Displays if the cable modem succeeded in locking to a downstream channel Channel ID Displa...

Page 19: ...d below the following screen example RxMER The Receiver Modulation Error Ratio is used to quantify the performance of a digital radio receiver in a communications system using digital modulation Corre...

Page 20: ...left side of the screen Field explanations are listed below the following screen example Modulation Displays the current cable modem upstream modulation type QPSK QAM8 QAM16 QAM32 QAM64 QAM128 QAM256...

Page 21: ...downstream service flow Priority Displays the use priority of the frequency ID Max Traffic Rate Displays the max data rate as enabled by the service provider Max Traffic Burst Displays the max data ra...

Page 22: ...e operational issues with the device 1 Access the web interface Refer to page 7 if needed 2 Click the Event Log link from the left side of the screen Field explanations are listed below the following...

Page 23: ...needed 2 Click the Gateway link from the top of the screen Then select Information 3 The Information fields are defined following this screen example Label Description Internet Settings Gateway MAC Ad...

Page 24: ...eless feature Enabled Disabled Operating Mode Displays what mode the router is working in Bridge NAT Router or NAT Router Note Firewall menu options are not available when the device is in Bridge mode...

Page 25: ...teway address for all wired LAN hosts that connect to the DDW3612 Wireless Cable Modem Gateway LAN MAC Address Displays the LAN interface s hardware address WAN IP Address Displays the current WAN pub...

Page 26: ...the IP address is assigned by the service provider s DHCP server 2 Static IP For Static IP you must manually enter the IP address for the WAN interface 3 PPTP DHCP For Point to Point Tunneling Protoco...

Page 27: ...fines the DHCP lease time duration A DHCP user s PC gets an IP address with a lease time When the lease time expires the PC must connect to the DHCP server and be reissued another unused IP address DH...

Page 28: ...tic Lease from the left side of the screen The Static Lease fields are explained following this screen example Label Description Index Index number of the each client that connects to your network MAC...

Page 29: ...DDNS fields are explained following this screen example Label Description DDNS Service Select the service provider used for your DDNS Service or Disabled www DyDNS org www no ip com User Name Input yo...

Page 30: ...re SNTP is a protocol for synchronizing the clocks of computing devices over networks Current Time Displays the current system time System Start Time Displays the accumulated time since system was sta...

Page 31: ...Enable to block connection requests initialized from Internet users Ipsec PassThrough If Internet users initialize an IPSec VPN request to a host located behind the router NAT makes this attempt fail...

Page 32: ...page 7 if needed 2 Click the Gateway link from the top of the screen 3 Click MAC Filtering from the left side of the screen The MAC Filtering fields are explained following this screen example UPnP En...

Page 33: ...e Gateway link from the top of the screen 3 Click IP Filtering from the left side of the screen The IP Filtering fields are explained following this screen example Clear Select Clear to delete the fil...

Page 34: ...efer to page 7 if needed 2 Click the Gateway link from the top of the screen 3 Click Port Filtering from the left side of the screen The Port Filtering fields are explained following this screen examp...

Page 35: ...numbers that a local host s application listens to for incoming requests data e g a game or other service These port numbers should be available in the documentation associated with the application Y...

Page 36: ...row for each port used by the XBOX The ports used by the XBOX are defined in the Internal Port field The same ports used by the XBOX are also defined in the External Port Start and End fields Keep in...

Page 37: ...nother router on the network to forward data through Ext Start Port Define the port number to start the range of ports to publish to the Internet Ext End Port Define the port number to end the range o...

Page 38: ...Click Port Triggering from the left side of the screen The Port Triggering fields are explained following this screen example Label Description Trigger Range The trigger port is a port or a range of...

Page 39: ...his specific application requires a LAN host to listen to Thus the server returns responses to these ports Example 1 John requests a file from the Real Audio server port 7070 Port 7070 is a trigger po...

Page 40: ...and forwarding data between LAN interconnections 1 Access the web interface Refer to page 7 if needed 2 Click the Gateway link from the top of the screen 3 Click Pass Through from the left side of th...

Page 41: ...rnet This may be used when applications do not work with port triggers or for other networking strategies 1 Access the web interface Refer to page 7 if needed 2 Click the Gateway link from the top of...

Page 42: ...3 7 Gateway Ubee Interactive 38 DDW3612 Subscriber User Guide July 2010...

Page 43: ...less radio including the current country channel number and bandwidth control 1 Access the web interface Refer to page 7 if needed 2 Click the Wireless link from the top of the screen 3 Click Radio fr...

Page 44: ...lower or upper 20Mhz 40 MHz channels doubles the channel width This allows for a doubling of the PHY data rate over a single 20 MHz channel Sideband for Control Channel 40 Mhz only Only when using 40...

Page 45: ...of the screen The Primary Network fields are explained following this screen example Note Wireless default values are discussed in Default Values on page 4 Label Description Primary Network Select to...

Page 46: ...ess to the wireless LAN WPA WPA2 Encryption Switch to enable or disable WPA WPA2 encryption WPA Pre Shared Key The encryption mechanisms used for WPA and WPA PSK are the same The only difference betwe...

Page 47: ...equire 26 hexadecimal digits Current Network Key You can select one of the four pre defined keys as the current network key Passphrase You can set WEP encryption key by entering a word or group of pri...

Page 48: ...ct Mode Use this feature to control wireless access to your network by MAC address Select Disable to turn off MAC Restrictions and allow any wireless client to connect to this wireless router Note how...

Page 49: ...of the screen Apply Click to save Connected Clients List of current connected Wireless client listed by MAC address Fields definitions are Age s The duration since the wireless client s polled values...

Page 50: ...select a specific data rate to limit the connection rates of wireless clients Beacon Interval Specify the Beacon Interval from 100 to 6553 5ms This value indicates the frequency interval of the beaco...

Page 51: ...If you select Auto the DDW3611 will use Request to Send Clear to Send RTS CTS to improve the performance in 802 11 mixed environments If you select Off the 802 11 performance will be maximized under m...

Page 52: ...ops cause broadcast traffic to circle the network endlessly resulting in possible throughput degradation and disruption of communications Note This feature is available when logged into the device usi...

Page 53: ...ultimedia Note This feature is available when logged into the device using the MSO user login Refer to page 4 for more information 1 Access the web interface Refer to page 7 if needed 2 Click the Wire...

Page 54: ...nt In this area of the screen four Access Categories ACs are listed to prioritize wireless network traffic Refer to the next row below AC BE AC BK AC VI AC VO The Wi Fi Multimedia feature prioritizes...

Page 55: ...legacy power save mechanism of the IEEE 802 11 standard ANSI IEEE Std 802 11 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Spe...

Page 56: ...al Strength on page 52 Estimating Wireless Cable Modem to Wireless Client Distances on page 53 Wireless Channel Selection on page 55 3 9 1 1 Received Signal Strength Received signal strength RSSI is m...

Page 57: ...ess Control on page 44 This value will be used in the formula further below 4 Use the table below to determine what materials the wireless signal must travel through in order to reach the desired wire...

Page 58: ...or a 54Mbps connection 37dBm 24db foot for open space 154 16 feet 6 Once you know the optimal feet distance between individual wireless clients and the wireless cable modem you can resolve and prevent...

Page 59: ...channel and so on This is done by configuring the channel on each wireless access point individually if you have multiples If you only have control over one wireless device in an environment where the...

Page 60: ...3 9 Wireless Network Deployment and Troubleshooting Ubee Interactive 56 DDW3612 Subscriber User Guide July 2010...

Page 61: ...tain sites by keywords 1 Access the web interface Refer to page 7 if needed 2 Click the Parental Control link from the top of the screen 3 10 1 Parental Control User Setup The User Setup option allows...

Page 62: ...m the pop up menu an existing content rule that defines what kind of websites the user can visit or not White List Access Only If you have created a content rule which defines a black list and white l...

Page 63: ...al Control link from the top of the screen 3 Click Basic from the left side of the screen The Basic fields are explained following this screen example Label Description Enable Parental Control Click t...

Page 64: ...r a keyword and click the Add Keyword button To remove a keyword select it from the list and click Remove Keyword Blocked Domain List Add Domain Remove Domain Enter web domains for example unwanted co...

Page 65: ...ays to Block Select the days to block Internet access The internet access times for the days selected to block are defined in the following fields Time to Block All Day Select All Day to eliminate all...

Page 66: ...Access the web interface Refer to page 7 if needed 2 Click the Tools link from the top of the screen 3 Click Ping from the left side of the screen The Ping fields are explained following this screen...

Page 67: ...ned following this screen example Ping Interval Define the interval between ping operations in milliseconds Start Test Abort Test Clear Results Click Start to start the ping test Click Abort Test to c...

Page 68: ...ick Abort Test to cancel the test Click Clear Results to clear the displayed trace route results Results Refresh This Results area of the screen displays the trace route results Click Refresh to updat...

Page 69: ...the Tools link from the top of the screen 3 Click Password from the left side of the screen The Password fields are explained following this screen example Label Description Master New Password Confi...

Page 70: ...2 Click the Tools link from the top of the screen 3 Click Factory Default from the left side of the screen The Factory Default fields are explained following this screen example Label Description Res...

Reviews: