background image

Ubee Interactive

Using the Forwarding Option

Ubee DDW365 Wireless Cable Modem Subscriber User Guide • October 2013

44

2.  Assign a Static IP lease to the client/host to which you are setting up forwarding. This 

way, the IP does not change and disrupt your forwarding rules. For example, if you are 
hosting a Web server in your internal network, and you wish to setup a forwarding rule 
for it, assign a static IP lease to that system to keep the IP from renewing and 
disrupting the forwarding rule.

6.5.2

Setting Up Forwarding

If the suggestions in 

Before Setting Up Forwarding on page 43

 did not correct your 

communication problem, use port forwarding.

You need the following information to set up port forwarding:

IP address

 of each local host system (for example, Xbox) for which you need to setup 

a port forwarding rule.

Port numbers

 the local host’s application listens to for incoming requests/data (for 

example, a game or other service). These port numbers should be available in the 
documentation associated with the application.

  

Note

For detailed information on port forwarding, including how to set it up for specific 
applications using specific network devices (for example, cable modems), refer to: 

http://portforward.com 

or consult your host device or application user manual.

  

Steps

To set up forwarding:

1. Access the Web interface of the DDW365, see 

Accessing the Web User Interface 

Locally on page 13

.

2. Click 

Advanced 

from the main menu.

3. Click 

Forwarding 

from the left menu.

4. Click 

Create IPv4.

Summary of Contents for DDW365

Page 1: ...et Suite 200 Englewood CO 80112 1 888 390 8233 Sales email amsales ubeeinteractive com Support email amsupport ubeeinteractive com October 2013 Ubee DDW365 Wireless Cable Modem Firmware Version 8 14 2...

Page 2: ...either internal or external to Ubee except in accordance with applicable agreements contracts or licensing without the express written consent of Ubee and the business management owner of the material...

Page 3: ...ork 10 2 3 Troubleshooting the Installation 12 3 Using the Web User Interface 13 3 1 Accessing the Web User Interface Locally 13 3 2 Logging Out of the Web Interface 14 4 Understanding the Status Menu...

Page 4: ...Log Option 53 7 3 Using the Remote Log Option 54 8 Understanding the Parental Control Menu 56 8 1 Using the Parental Control User Setup Option 56 8 2 Using the Basic Option 58 8 3 Using the ToD Filter...

Page 5: ...and Applications on page 3 Requesting Support on page 3 Checking Device Package Components on page 3 Understanding the Device Panels Connections and LEDs on page 4 Understanding Specifications Standa...

Page 6: ...ble the device can fall and become damaged To prevent overheating do not block the slots and openings in the module housing that provide ventilation Do not expose this device to direct sunlight Do not...

Page 7: ...gain of 2 dBi This device must not be co located with or operating in conjunction with any other antenna or transmitter 1 2 Understanding Connections and Applications The following diagram illustrates...

Page 8: ...tions and LEDs 1 5 1 Understanding the Device Front and Rear Panels The following images represent the device front and rear panels Connection descriptions are provided in section 1 5 2 and LED descri...

Page 9: ...ers gaming consoles and or routers hubs using an RJ45 cable Each ETH port on the back panel of the device has an LED to indicate its status when an Ethernet device is connected CABLE Connects to the p...

Page 10: ...f not used the LED is off When a user pushes the WPS button or triggers WPS via the device s Web UI an LED on the top front of the device flashes for 4 minutes until a PIN is entered from the wireless...

Page 11: ...DMA Only 8dBmV to 55dBmV 8 16 QAM 8dBmV to 58dBmV QPSK S CDMA 8dBmV to 53dBmV all modulations Actual speeds vary based on factors including network configuration and speed Security and Network Support...

Page 12: ...fault SSID when the device is reset except when a manual reset is performed through the Web UI The MAC address can be found on the device label or it can be found by opening an Internet browser window...

Page 13: ...sh to confirm the setup or add devices to your network Refer to Connecting Devices to the Network on page 10 Steps To set up the device 1 Remove the contents from the device packaging 2 Place the DDW3...

Page 14: ...t Refer to Understanding LED Behavior on page 5 for more information 2 2Connecting Devices to the Network Use the instructions below to connect network devices and validate device functionality Topics...

Page 15: ...ireless networks window The default SSID subscriber managed DDW365 plus the last 2 characters of the MAC address with the letters entered in UPPER case Example DDW3658C Notes You can find the MAC addr...

Page 16: ...of the DDW365 are not lit where Ethernet cables are connected Restart the computer so that it can re establish a connection with the device Check for a resource conflict Windows users only 1 Right cl...

Page 17: ...sing the Web User Interface Locally Access the Web user interface for the DDW365 from a Web browser such as Internet Explorer on a Windows computer Default values are shown in the steps below Steps To...

Page 18: ...eless Cable Modem Subscriber User Guide October 2013 14 about the DDW365 3 2 Logging Out of the Web Interface Log out when finished using the Web user interface Steps To log out of the user interface...

Page 19: ...e Web Interface Ubee DDW365 Wireless Cable Modem Subscriber User Guide October 2013 15 2 To begin a new user interface session click Back to Login The Cable Modem Information screen is displayed Click...

Page 20: ...e Account Option on page 20 Using the Diagnostics Option on page 21 Using the Client List Option on page 24 Using the User Default Option on page 26 Steps To access status options 1 Access the Web use...

Page 21: ...Defines the firmware version of the device Cable Modem MAC Address Defines the unique media access control MAC hardware address of the DDW365 Cable Modem Serial Number Defines the unique manufacturer...

Page 22: ...m channel bonding statistics Downstream displays detailed information on the network traffic from the service provider to the local computer downstream channels Upstream displays detailed information...

Page 23: ...el Description Startup Procedure Procedure Status Comment Acquire Downstream Channel Displays the Downstream channel status and if the device has locked to a channel Connectivity State Displays connec...

Page 24: ...hannel frequency on which the device is scanning Power Displays the receiver power level in decibel millivolts dBmV after ranging process SNR Displays the signal to noise ratio the desired signal leve...

Page 25: ...ork connectivity Two utilities are available Ping and Traceroute Topics See the following topics Using the Ping Option on page 21 Using the Traceroute Option on page 23 4 4 1 Using the Ping Option Use...

Page 26: ...Enter new parameter values or accept the default values 4 Click Start Test Field descriptions are listed below the screen example Label Description Utility Provides a drop down menu to choose Ping or...

Page 27: ...eps To trace host IP addresses along a route 1 Click Status from main menu 2 Click Diagnostics from the left side menu 3 Choose Traceroute from the Utility drop down menu 4 Enter new parameter values...

Page 28: ...ce a route Max Hops Defines the maximum number of hops Hops are the number of routers the traceroute traverses Default is 30 Data Size Defines the data size to send for the traceroute operation The de...

Page 29: ...rface Status Displays whether the CPE Interface is enabled or disabled Tools Client List Host Name Displays the host name of the DHCP client connected to the DDW365 IP Address Displays the IP address...

Page 30: ...menu 2 Click User Default from the left side menu Field descriptions are listed below the screen example Label Description Restore User Defaults Restores settings to factory defaults Select Yes then...

Page 31: ...p Option on page 27 Using the DHCP Option on page 29 Using the DDNS Option on page 31 Using the Backup Option on page 32 Using the Time Option on page 35 Steps To access the basic menu 1 Access the We...

Page 32: ...tes no interface or prefix has been specified WAN IP Address Displays the current WAN public IP address obtained from the service provider MAC Address Displays the WAN interface s hardware address Dur...

Page 33: ...and the IP address is assigned by the service provider s DHCP server Static IP For Static IP you must manually enter the IP address for the WAN interface PPTP dhcp For Point to Point Tunneling Protoc...

Page 34: ...esses can be recognized on the network Number of CPEs Defines the maximum number of customer premises equipment devices CPE that can connect to the network through the DDW365 Lease Time Defines the DH...

Page 35: ...d below the screen example DHCP Clients Lists all DHCP clients currently connected to the device either via an Ethernet connection or via a wireless connection Each client is listed with the following...

Page 36: ...nt Configuration To backup and save the current modem configuration click the Backup button A pop up window appears instructing you to select Save when prompted Click OK Label Description DDNS Service...

Page 37: ...File option and click OK The file will be saved to your Downloads folder as a binary file bin titled GatewaySettings bin 5 4 2 Restoring the DDW365 to a Previously Saved Configuration To restore the...

Page 38: ...ked up file appears in the box to the left of the Browse button Click the Restore button You are advised that you will be required to reboot the device Click OK You are then notified that the device h...

Page 39: ...ription Enable SNTP Enables Yes or disables No the SNTP feature Current Time Displays the current system time System Start Time Displays the time the system was started Time Server 1 Defines the IP ad...

Page 40: ...age 47 Using the Pass Through Option on page 49 Using the DMZ Host Option on page 50 Steps To access the advanced menu 1 Access the Web User Interface Refer to Accessing the Web User Interface Locally...

Page 41: ...attempt if Internet users initialize an IPSec VPN request to a host located behind the router PPTP PassThrough Forces the router to redirect the PPTP request to the local host when enabled NAT fails t...

Page 42: ...ation protocol RSVP RSVP defines how applications reserve resources and how they free the reserved resources once they are no longer needed FTP Enables or disables the file transfer protocol FTP used...

Page 43: ...ork MSN Enables or disables the Microsoft network protocol used for instant messaging SIP Enables or disables the session initiation protocol application layer gateway SIP ALG SIP ALG inspects protoco...

Page 44: ...ring establishes a list and any host on this list is not able to access the network through the DDW365 Steps To filter MAC addresses 1 Note the MAC addresses of the devices that you want to deny Inter...

Page 45: ...e ports specified Steps To configure port filters 1 Click Advanced from the main menu 2 Click Port Filtering from the left side menu Field descriptions are listed below the screen example Label Descri...

Page 46: ...by port range You may accidentally prevent traffic that should pass through your network such as http or email Pre assigned application ports are displayed on the Forwarding screen Refer to Using the...

Page 47: ...pplications Home Security Systems Security systems that use the Internet Audio Servers VoIP Audio and VoIP applications and services Topics See the following topics Before Setting Up Forwarding on pag...

Page 48: ...ng You need the following information to set up port forwarding IP address of each local host system for example Xbox for which you need to setup a port forwarding rule Port numbers the local host s a...

Page 49: ...ocated in your LAN External Start Port Defines the port number to start the range of ports to publish to the Internet External End Port Defines the port number to end the range of ports published to I...

Page 50: ...orts and forwarding rules may not be required for other applications Steps To set up port forwarding for an Xbox 1 Click Advanced from the main menu 2 Click Forwarding from the left side menu 3 Enter...

Page 51: ...e specific port numbers with bi directional traffic to function properly Applications such as video conferencing voice gaming and some messaging program features may require these special settings Som...

Page 52: ...connect to the Real Audio server until the connection is closed or expires Steps To set up port triggering 1 Click Advanced from the main menu 2 Click Port Triggers from the left side menu 3 Click Cr...

Page 53: ...ide menu The pass through fields are explained following this screen example Label Description Trigger Start Port Defines a port number or the starting port number in a range of port numbers Trigger E...

Page 54: ...t port on the DDW365 3 Log in to the DDW365 Web user interface 4 Click Advanced from the main menu 5 Click DMZ Host from the left side menu 6 Enter the IP address of the Home Gateway host device to be...

Page 55: ...Ubee DDW365 Wireless Cable Modem Subscriber User Guide October 2013 51 example connect to the Internet from a PC connected to the Home Gateway Label Description DMZ Address Defines the IP address of...

Page 56: ...to specific sites Note Firewall menu options are not available when the device is in Bridge mode Topics See the following topics Using the Basic Option on page 52 Using the Local Log Option on page 53...

Page 57: ...descriptions are listed below the screen example Label Description IPv4 Firewall Protection Defines the level of protection Choices are Off Low Medium and High Services are based on the protection le...

Page 58: ...Remote Log fields are explained following this screen example Label Description Contact Email Address Defines the email address where you want to send the log SMTP Server Name Defines the name of the...

Page 59: ...empts that are allowed by the firewall Blocked Connections Logs all access attempts that are blocked by the firewall Known Internet Attacks Logs all known attacks from the Internet Product Configurati...

Page 60: ...ing the ToD Filter Option on page 60 Using the Local Log Option on page 61 Steps To access the parental control menu 1 Access the Web interface Refer to Accessing the Web User Interface Locally on pag...

Page 61: ...tries to access the Internet via the device Re Enter Password Confirms the password with the re entered password Trusted User Defines the selected user as a trusted user when enabled is checked The u...

Page 62: ...ft side of the screen The Basic fields are explained following this screen example Session Duration Allows you to enter a time in minutes for the user s session to expire When the session expires the...

Page 63: ...d click Add New Policy Content Policy List Lists existing policies you can choose to use Remove Policy Deletes a policy from the list Select the policy from the list and click Remove Policy Keyword Li...

Page 64: ...n and click Add Domain Remove Allowed Domain Removes a domain from the Allowed Domain List Select the domain from the list and click Remove Domain Allowed Domain List Displays domains you have added a...

Page 65: ...policy Select the policy from the drop down list and click Remove Days to Block Selects the days to block Internet access Time to Block All Day or a specific time frame Defines the time to block To bl...

Page 66: ...lds are explained following this screen example Label Description Last Occurrence Displays the time when the last event occurred Action Displays what is done by parental control including dropping or...

Page 67: ...Using the Bridging Option on page 75 Deploying and Troubleshooting the Wireless Network on page 76 Steps To access the wireless menu 1 Access the Web interface Refer to Accessing the Web User Interfa...

Page 68: ...mode has a significant increase in the maximum raw OSI physical layer data rate from 54 Mbit s to a maximum of 600 Mbit s with the use of four spatial streams when at a channel width of 40MHz One spa...

Page 69: ...your particular region Channel selection can have an impact on wireless networking performance For more information refer to Selecting a Wireless Channel on page 79 Regulatory Mode Defines whether Reg...

Page 70: ...with an SSID and channel Network communications such as authentication conflict and duplicate packets are managed by the wireless card Managed Communicates with an associated master not directly with...

Page 71: ...DW365 plus the last 2 characters of the MAC address with the letters entered in UPPER case Closed Network Hides the selected SSID when enabled so it is not visible to wireless clients unless manually...

Page 72: ...WPA2 alone with a pre shared key requires a RADIUS or TACACS server for authentication This method is mostly used in large enterprise implementations WPA2 PSK Enables or disables WPA2 PSK If you do n...

Page 73: ...required Shared Key is an authentication method used by wireless LANs which follow the IEEE 802 11 standard Wireless devices authenticate each other by using a secret key that is kept by both devices...

Page 74: ...e disabled before Closed Network can be enabled 9 3 Using the Access Control Option Use the Access Control option to configure which clients can access your wireless network WPS Add Client Add a clien...

Page 75: ...s access to your network by MAC address Disabled turns off MAC restrictions and allows any wireless client to connect to this device However if you use other security mechanisms for access to the wire...

Page 76: ...Displays the MAC addresses entered in the MAC Addresses field see above Age s Displays the duration since the wireless client s polled values were sent to the device The values include all informatio...

Page 77: ...to a station STA that is operating in a reduced power mode WMM transmit opportunity TXOP is assigned to each access point The bounded time interval during which a station can send as many frames as p...

Page 78: ...data transmission The wireless client device can doze between packets to save power while the wireless access point buffers downlink frames The application chooses the time to wake up and receive data...

Page 79: ...moves oldest frame when set to On EDCA STA Parameters Allows you to prioritize wireless network traffic for receiving terminals Access categories are AC_BE Best Effort medium throughput and delay Most...

Page 80: ...g Wireless Cable Modem to Wireless Client Distances on page 77 Selecting a Wireless Channel on page 79 Understanding Received Signal Strength Received signal strength RSSI is measured from connected w...

Page 81: ...wireless clients reach the distance threshold between each other network performance degrades Steps To determine wireless cable modem placement 1 Connect a wireless client to the wireless cable modem...

Page 82: ...To check the wireless signal strength and speed use the following steps for a Windows computer connected wirelessly to the wireless cable modem If the wireless computer is not connected refer to Conne...

Page 83: ...e by configuring the channel on each wireless access point individually if you have multiples If you have control over only one wireless device in an environment where there may be several you can cha...

Page 84: ...dressed to a computer on the local subnet Demilitarized Zone DMZ Allows one IP address or computer to be placed in between the firewall and the Internet usually for gaming and video conferencing This...

Page 85: ...ll A highly effective method to block unsolicited traffic from outside the connected computers in your gateway and local network Gateway A local device usually a router that connects hosts on a local...

Page 86: ...r that allows the network to identify it at the hardware level Usually written in the form 01 23 45 67 89 ab Megabits per Second Mbps A unit of measurement for data transmission that represents one mi...

Page 87: ...le Access TDMA A method in which cable modems must time share the upstream channel because there are many cable modems and only one upstream channel frequency Transmission Control Protocol TCP A metho...

Page 88: ...rotected Setup WPS A security protocol for wireless home networks Created by the Wi Fi Alliance this protocol allows home users to easily set up wireless security and add new devices without needing t...

Reviews: