background image

Basic Settings

5-4

PPP over Ethernet (PPPoE) Settings

PPPoE (Point-to-Point Protocol over Ethernet) is a specification for 
connecting multiple computer users on an Ethernet to a remote site typically 
through a DSL modem. PPPoE combines PPP (Point-to-Point Protocol) 
with the Ethernet protocol, where the PPP protocol information is 
encapsulated within the Ethernet frames.

PPPoE can be used to let multiple wireless users share a common Digital 
Subscriber Line by connecting an ADSL modem to a gateway.

If you have a broadband connection to the Internet and are required to login 
with a username and password to gain access to the Internet, your ISP is 
most likely using PPPoE. If you have access to the Internet when you turn 
on your computer, you are probably not using PPPoE. The best way to tell, 
is to call you ISP and ask them, or refer to the user documentation provided 
from your ISP.

The BG-2000 supports two PPPoE connection modes:

Always On

On Demand

Use this page to choose your PPPoE connection mode:

In Always On mode (default mode), the PPPoE connection with the ISP 
is established when the BG-2000 is powered on. If the ISP is 
inaccessible when the BG-2000 is powered on, periodic retries will be 
attempted until the PPPoE connection is successfully established. Once 
the connection is established, the PPPoE connection remains "up" until 
the BG-2000 is powered off.

Summary of Contents for BG-2000

Page 1: ...VDUJPO FBUVSFT 2VJDL OTUBMMBUJPO VJEF 2 Hardware Description 1BOFM FTDSJQUJPO SPOU 1BOFM FTDSJQUJPO BDL 1BOFM FTDSJQUJPO 3FMPBE VUUPO VODUJPOT PUUPN 1BOFM FTDSJQUJPO EFOUJGJDBUJPO BCFM BSEXBSF 3FTFU V...

Page 2: ...DFTTJOH UIF BOBHFNFOU 5PPM BWJHBUJOH UISPVHI UIF BOBHFNFOU 5PPM PNF BJO SFB 4FUVQ BJO SFB 5PPMT BJO SFB 5 Basic Settings 0WFSWJFX OUFSOFU EESFTT 5 1 1 4FUUJOHT 111 PWFS UIFSOFU 111P 4FUUJOHT 8JSFMFTT...

Page 3: ...DFTT 5FSNJOBM DDFTT 4 1 DDFTT 4UBUJTUJDT 8 Virtual Private Networks OUSPEVDUJPO 4VQQPSUFE 71 T 14FD 0WFSWJFX 1151 0WFSWJFX 51 0WFSWJFX JGGFSFODFT CFUXFFO 1151 BOE 51 9 Troubleshooting PNNPO 5SPVCMFTIP...

Page 4: ...T PNNVOJDBUJPO SSPS JOPS POGJHVSBUJPO SSPS POGJHVSBUJPO SSPS 8 DUJWJUZ BJMVSF FOFSBM 4PGUXBSF BJMVSF FOFSBM FWJDF BJMVSF 4PGUXBSF JTNBUDI PS FGFDUJWF FWJDF A Specifications 5FDIOJDBM 4QFDJGJDBUJPOT OW...

Page 5: ...management and configuration of the ORiNOCO BG 2000 A companion document the Quick Installation Guide provides a high level step by step procedure for the setup and installation of the BG 2000 and th...

Page 6: ...Information that you input exactly as shown is displayed in bold For example Type 192 168 253 1 Titles of information products are displayed in italics For example The Quick Installation Guide Network...

Page 7: ...ned for interoperability meaning that your device will communicate with other vendor s wireless products carrying the Wi Fi logo The BG 2000 has built in firewall protection against unauthorized acces...

Page 8: ...ble networking options Seamless connectivity between home work and school Technical support 24 hours a day 7 days a week Quick Installation Guide The Quick Installation Guide will guide you through a...

Page 9: ...escription Panel Description This section will familiarize you with physical characteristics of your BG 2000 including a Front Panel Description b Back Panel Description c Bottom Panel Description Fig...

Page 10: ...Description 2 2 Front Panel Description The front panel of the BG 2000 contains four indicator lights that describe the networking state of your device They are Figure 2 2 Front Panel Power Wireless...

Page 11: ...activity is not possible between the BG 2000 and other wireless stations Initially the light is off when not connected and flickers green when downstream traffic is detected LAN On steady or flickers...

Page 12: ...All physical connections are made on the back panel of the BG 2000 The back panel contains from top to bottom a Reload push button b Power supply plug c 10 100BASE T Ethernet LAN port d 10 100BASE T E...

Page 13: ...just above the power supply socket The small push button has three functions Revert to Last Known Good Configuration Reload to Factory Defaults Reload Gateway Software These three functions are detail...

Page 14: ...n a LAN n a WAN n a Light Activity Description Impact Action Power Flicker Amber A reload to factory defaults can be used when you have forgotten your password or other unique identifiers to access y...

Page 15: ...ibed in Table 2 5 2 Make sure your computer is in the same subnet 192 168 253 1 as your BG 2000 To verify this Light Activity Description Impact Action Power Flicker Amber A reload of gateway software...

Page 16: ...ubnet as your BG 2000 3 At the DOS command prompt type tftp i 192 168 253 1 put filename of downloaded software FIRMWARE 4 Wait until the file is loaded and the command prompt returns with Transfer su...

Page 17: ...be referenced when setting up and configuring your device or to provide details to ORiNOCO Technical Support The identification label contains Gateway Module Name For example ORiNOCO BG 2000 Network N...

Page 18: ...on Pn Serial Number Sn Hardware Reset Button For easy identification this button is labeled RESET on the bottom panel of the unit and can be accessed with the tip of a paper clip A hardware reset can...

Page 19: ...he product free from vibration and dust Always disconnect the power adapter before cleaning Operation Guidelines To maximize the wireless coverage place the unit as centrally as possible depending on...

Page 20: ...Hardware Description 2 12...

Page 21: ...eway 4 Static IP Bridge DHCP Client Gateway Use this configuration profile if your IP Address is automatically assigned by your service provider In this case you do not need to fill in the IP Address...

Page 22: ...m your service provider Table 3 2 Network Access Settings via ADSL PPPoE Static IP Gateway Use this configuration profile if your IP Address is predefined also known as Static IP by your service provi...

Page 23: ...be able to connect the BG 2000 within an existing LAN The NAT will be disabled and the BG 2000 will act as a wireless pass thru allowing the sharing of machines files and printers throughout your net...

Page 24: ...Networking Options 3 4...

Page 25: ...culties accessing the Management Tool Make sure to disable any proxy settings on your web browser see the troubleshooting section Turning Off Proxy Server on Your Web browser before trying to access t...

Page 26: ...st screen that will appear after you have configured the BG 2000 via the Setup Wizard This area is the main entrance to the Management Tool and can be accessed at anytime by clicking the Home button a...

Page 27: ...DNS Primary Domain Name System address Secondary DNS Secondary Domain Name System address Active Profile indicates the name of your last saved configuration Uptime indicates the amount of time elapse...

Page 28: ...The Management Tool 4 4 Figure 4 1 Home Main Area...

Page 29: ...configuring your device using the Setup Wizard The Setup Wizard will guide you through a series of simple questions to determine which type of configuration is right for you You may also use this page...

Page 30: ...rea allows you to perform common functions involved in the management of your BG 2000 which are itemized in the left navigational bar of the Tools screen You can return to this screen at anytime by cl...

Page 31: ...er Ethernet PPPoE Settings Wireless Settings Local Network Settings Internet Address TCP IP Settings Your WAN IP address can be either static meaning it never changes or dynamic meaning each time you...

Page 32: ...ntifies the geographical region of a telephone If the IP Address was assigned to you by your ISP this field must be populated with a Subnet Mask value Gateway Address device that you must address to c...

Page 33: ...Basic Settings 5 3 Figure 5 1 Internet Address TCP IP Settings Basic Settings...

Page 34: ...username and password to gain access to the Internet your ISP is most likely using PPPoE If you have access to the Internet when you turn on your computer you are probably not using PPPoE The best way...

Page 35: ...y to the Internet If the PPPoE connection remains idle no activity to the Internet for the specified Idle Time out the PPPoE connection will automatically be closed When activity to the Internet resum...

Page 36: ...Basic Settings 5 6 Figure 5 2 PPPoE Basic Settings...

Page 37: ...our specific Network Name will be able to access the BG 2000 If this box is not checked the BG 2000 will broadcast its Network Name SSID for all Wireless Client Adapters to see Turn on Data Security W...

Page 38: ...haracters for Hex 64 bit Encryption Enter 12 characters for Hex 64 bit Encryption including 0x in front of the Hex key Enter 13 characters for ASCII 128 bit Encryption Enter 26 characters for Hex 128...

Page 39: ...Multicast Rate For Multicast traffic you are advised to use a Multicast Rate value of 2 Mb s which is the default value and is supported by all Wireless Client Adapters Only use higher Multicast Rate...

Page 40: ...municate at the highest transmit rate as supported by both of the interfaces However communications at the highest transmit rate may not travel as far as transmissions at lower transmit rates When mov...

Page 41: ...Basic Settings 5 11 Figure 5 3 Wireless Settings Basic Settings...

Page 42: ...r dummy IP address replaced with the public IP Address of the BG 2100 Only this IP address is visible from the public network LAN IP Address 192 168 253 1 Subnet Mask 255 255 255 0 This IP address is...

Page 43: ...Basic Settings 5 13 Figure 5 4 Local Network Settings Basic Settings...

Page 44: ...Basic Settings 5 14...

Page 45: ...onsequences of these changes There are five categories of Advanced Settings Wireless Access Control Set restrictive communication limitations Port Forwarding Redirect network services to specific stat...

Page 46: ...ss devices that are not identified in this list The access control list can be enabled and disabled To add stations for Wireless Access Control Check the box labeled Enable Wireless Access Control Cli...

Page 47: ...f remapping and translating communication traffic between your BG 2000 and PC Card throughout your private network It is a mechanism by which you set up rules to define the port to be routed and its d...

Page 48: ...t 1503 on 192 168 253 2 the same internal machine This combination of port forwarding will enable you to use Windows NetMeeting with your BG 2000 TCP Transport Control Protocol is used for HTTP and Te...

Page 49: ...Settings 6 5 Select the item to be removed then click the Delete button Click the Save button Don t forget to Restart your BG 2000 for these changes to take effect Figure 6 2 Port Forwarding Advanced...

Page 50: ...u to control the type of Internet services accessible from your network such as Email HTTP NNTP Telnet and FTP You may want to enable this feature if you would like to set boundaries for your children...

Page 51: ...Advanced Settings 6 7 Figure 6 3 Port Filtering Advanced Settings...

Page 52: ...ing AppleTalk to be routed to a segment of the network with Unix workstations By restricting AppleTalk from being routed to the Unix subnet the Unix subnet is filtered from unwanted traffic increasing...

Page 53: ...Advanced Settings 6 9 Figure 6 4 Protocol Filtering Advanced Settings...

Page 54: ...of DNS addresses in your private network This prevents you from having to manually release and renew the DNS address of every computer connected in your network also known as DNS Relay This feature i...

Page 55: ...aults screen will reset all of the configuration settings back to the default values set by the factory The Web Access screen allows you to select which interfaces you would like to use to manage your...

Page 56: ...sult in unpredictable results To activate an existing profile 1 Select the profile you wish to activate 2 Click the Activate button 3 Restart your BG 2000 To select a profile you have saved on your co...

Page 57: ...System Tools 7 3 Figure 7 1 Profile Management Tool Page...

Page 58: ...new software file from the product website and saving it to a directory of your choosing select the Browse button to locate the new file visible in the Choose file window Click on the Upgrade button a...

Page 59: ...Defaults You will return your BG 2000 to its original factory out of box configurations This places your BG 2000 into a known working state in the event that your unit appears unusable Figure 7 3 Res...

Page 60: ...estarted for this to take effect in both the web interface and CLI administrations The default username for your BG 2000 is admin There is no default password therefore you may leave this field empty...

Page 61: ...System Tools 7 7 Figure 7 4 Web Access Tools Page...

Page 62: ...cripting It provides a solution to use a telnet setting in order to supply commands and receive textual replies The CLI is accessible via the Wi Fi LAN and WAN interfaces of your device Currently the...

Page 63: ...System Tools 7 9 Figure 7 5 Terminal Access Tools Page...

Page 64: ...ommunication occurs between SNMP capable devices and provides a standard interface to configure and manage networking products Read Only Community String enables you to create a network management lev...

Page 65: ...System Tools 7 11 Figure 7 6 SNMP Access Tools Page...

Page 66: ...s Table 7 1 ICMP Name Description Messages Indicates the number of ICMP messages addressed to the ICMP entity that were actually received sent by the ICMP entity This number includes the messages that...

Page 67: ...of ICMP Timestamp request messages received sent Timestamp Reply Indicates the number of ICMP Timestamp Reply messages received sent Address Mask Request Indicates the number of ICMP Address Mask mes...

Page 68: ...dresses of unsupported classes e g Class E If the unit functions as an IP Gateway it will not forward datagrams For such devices this counter will also include datagrams discarded because the destinat...

Page 69: ...s The number of Failed Reassemblies does not necessarily represent the number of discarded IP fragments as some algorithms notably the algorithm in RFC 815 can lose track of the number of fragments by...

Page 70: ...s that is printed on the label on the unit s processor module IP Address The associated IP address of this device If your network does not use IP addressing this value will probably be the same for al...

Page 71: ...icates the number of SNMP ASN 1 or BER errors encountered by the SNMP protocol entity when decoding SNMP message Error Status tooBig Received Indicates the number of SNMP PDU s delivered to the SNMP p...

Page 72: ...he value readOnly Sent Indicates the number of valid SNMP PDU s which were generated by the SNMP protocol entity and for which the value of the error status is readOnly Please note that this is a prot...

Page 73: ...by the SNMP protocol entity Sent Indicates the number of SNMP Set Request PDU s which have been generated by the SNMP protocol entity Get Responses Received Indicates the number of SNMP Get Response P...

Page 74: ...depend upon the algorithm used to determine the retransmission timeout In particular when the timeout algorithm is RSRE an object of this type has the semantics of the UBOUND quantity described in RF...

Page 75: ...also includes segments received on currently established connections Out Segments Indicates the total number of segments sent including segments sent on currently established connections This count e...

Page 76: ...ably Local Address Indicates the local IP address for this TCP connection In the case of a connection in the listen state that is willing to accept connections for any IP interface associated with the...

Page 77: ...System Tools 7 23 Figure 7 7 Statistics Tools Page...

Page 78: ...System Tools 7 24...

Page 79: ...until it reaches its destination Emulation of the private link is accomplished by data encryption The link in which private data is encapsulated and encrypted is called a VPN connection VPNs are used...

Page 80: ...y is mandatory in IPSec The difference between AH integrity and ESP integrity is that ESP integrity does not authenticate IP headers ESP integrity is an option in IPSec implementation and can be used...

Page 81: ...ssage Digest version 5 MD5 and HMAC Secure Hash Algorithm SHA In addition several encryption algorithms exist Data Encryption Standard DES DES Cipher Block Chaining CBC and Triple DES 3DES As a minimu...

Page 82: ...tworks The L2TP client and L2TP server must first establish a UDP connection Once connected L2TP creates the tunnel in which L2TP datagrams will traverse the public network Differences between PPTP an...

Page 83: ...and blue cable straight through for the WAN port 4 Verify that you have a existing Internet connection 5 Check if the external DSL Cable device is operational and working correctly 6 Verify the correc...

Page 84: ...ivity Table to identify the problem Turning Off Proxy Server on Your Web browser ROORZ WKH VWHSV IRU HLWKHU QWHUQHW SORUHU RU 1HWVFDSH GHSHQGLQJ XSRQ ZKDW EURZVHU RX XVH For Internet Explorer users a...

Page 85: ...lick the Stop icon or press the ESC key and ignore any error messages that appear click OK c In the Edit menu select Preferences d In the Category drop down menu select Advanced Proxies e Select Direc...

Page 86: ...our BG 2000 your PC Card USB Client needs the correct TCP IP and DHCP settings If the software utility of your PC Card displays a good wireless connection but you are unable to communicate over the wi...

Page 87: ...DHCP from the Configure pop up menu 5 Click Apply Now Custom MAC Address Procedure If you are having difficulty obtaining a DHCP assigned IP Address from your ISP WAN light flickers Amber in excess o...

Page 88: ...To do this 1 Open a DOS Command window on your computer 2 Type ipconfig all at the prompt 3 Record the Physical Address MAC Address 4 Log into the Management Tool and navigate to Setup Internet Addres...

Page 89: ...en Normal Operation Steady Green Off n a n a Wireless Communication Error Flicker Green n a n a n a Minor Configuration Error Flicker Amber n a n a n a Configuration Error Steady Green n a n a Flicker...

Page 90: ...power adapter is connected to the wall outlet If this doesn t solve your problem contact ORiNOCO Technical Support at 1 866 674 6626 prompt 2 Have your serial number handy The serial number should be...

Page 91: ...nel of the unit Verify that the Encryption Key of your PC Card matches the Encryption Key of your BG 2000 If this doesn t solve your problem contact ORiNOCO Technical Support at 1 866 674 6626 prompt...

Page 92: ...ave access to the Management Tool Read the Event Log of the Management Tool and take appropriate action Restart your BG 2000 If you do not have access to the Management Tool Perform a Hardware Reset P...

Page 93: ...on Read the Event Log of the Management Tool and take appropriate action Follow the Custom MAC Address Procedure in this section If this doesn t solve your problem contact ORiNOCO Technical Support at...

Page 94: ...o your inquiry without this information Description A hardware and or software defect prevents your BG 2000 from operating normally Impact No communication Action Read the Event Log of the Management...

Page 95: ...e that is not applicable for your BG 2000 will not be able to run Action Perform a Reload to Factory Defaults and then upgrade the appropriate software If this doesn t solve your problem contact ORiNO...

Page 96: ...Troubleshooting 9 14...

Page 97: ...igh speed Wireless LANs Wireless Fidelity Wi Fi certified by the Wireless Ethernet Compatibility Alliance WECA Bit Error Rate better than 10 5 Range up to 550 meters See details on Radio Specification...

Page 98: ...o F max 95 Barometric Pressure 740 to 1050 hPa Input Voltage BG 2000 7 to 15V DC Input Voltage Power Adapter 100 to 240V AC 10 Power Adapter Types Subject to local standards Available types US CAN JP...

Page 99: ...ing Protocols Supported NAT PPP PPPoE TCP IP Wireless Wi Fi compliant wireless LAN port based on ORiNOCO 11 Mb s radio technology Wired a 10 100BASE T Ethernet LAN port female RJ 45 connector yellow b...

Page 100: ...2400 2500 MHz Selectable sub channels 1 2 3 4 5 6 7 8 9 10 11 2412 default 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 BER Better than 10 5 Output Power 15 dBm Nominal Modulation Direct Sequence...

Page 101: ...rials Obstacles or objects in the signal path of the radio signal absorb or reflect the radio signal In areas with floor to ceiling walls the range may decrease to 15 of the maximum range Wireless Ran...

Page 102: ...ugh wireless networking products have been designed for operation in the license free 2 4 GHz band local radio regulations may impose a number of limitations to the use of wireless communication equip...

Page 103: ...te or edit the Access Control Table files with the BG 2000 Management Tool ADSL Asymmetric Digital Subscriber Line Technology for broadband computer communication via standard telephone lines Unlike r...

Page 104: ...ble code combinations for each single character For example Numerical values would allow you to select from 10 different values per character only in the range of 0 9 Alphabetical values would allow y...

Page 105: ...t you must address to communicate with networked devices outside the current Subnet DHCP Dynamic Host Configuration Protocol The Dynamic Host Configuration Protocol DHCP is an Internet protocol and ca...

Page 106: ...the Web can see the change DNS Address Domain Name System Address Primary DNS Address When previously defined for your ISP account you always have to enter the Domain Name System value Secondary DNS A...

Page 107: ...any unauthorized access to the network See also Translating Hex ASCII values Default value No default value Valid values for 64 bit Encryption 5 digit case sensitive Alphanumeric Value in the range o...

Page 108: ...firewall examines the traffic routed between your private and public network to determine if it meets certain criteria If the traffic is legitimate it is allowed to pass along otherwise it is stopped...

Page 109: ...e from a numerical value For example 1234 h or 0x1234 will identify a four digit hexadecimal value where 1234 will identify a four digit numerical value In case of doubt consult the user documentation...

Page 110: ...rea networks IEEE Standards are developed and defined by the IEEE The IEEE 802 11 Standard is an interoperability standard for wireless LAN devices that identifies three major distribution systems for...

Page 111: ...twork devices that communicate via the TCP IP protocol In networks that use TCP IP each device must have a unique IP Address similar to telephones having a unique telephone number This unique number o...

Page 112: ...ax As a computer user you cannot connect directly to the internet The ISP acts as an intermediary between your computer and the internet LAN Local Area Network A group of computers connected to one an...

Page 113: ...ed by a unique factory set number that cannot be changed also referred to as the Universal MAC Address The MAC Address of a ORiNOCO Wireless Adapter is printed on a label on the underside of the hardw...

Page 114: ...different IP address known within another network A NAT enabled device translates a set of local IP addresses to one or more IP addresses on the Internet NAT translates the IP address of incoming pack...

Page 115: ...rk Name set to ANY Packet Filtering Packet Filtering is a type of Firewall Packet Filtering Firewalls work at the network level of the IP layer of TCP IP In a packet filtering firewall each packet is...

Page 116: ...forwards them to the Internet server where they can actually be put on the Internet PPP can handle synchronous as well as asynchronous communication PPP also supports error detection and data compress...

Page 117: ...YYUTxxxxxxxx where YY identify the year of manufacturing xxxxxxxx identifies the unique item number This number is printed on the identification label located on the bottom panel of your BG 2000 SOHO...

Page 118: ...entified by the Subnet Mask In a wireless network that allows mobile wireless stations to roam between different cells all BG 2000 devices and wireless stations must be connected to the same LAN subne...

Page 119: ...for communication between computers transmitting data over networks including the Internet See also IP Address Subnet Subnet Mask Default Gateway DHCP Translating Hex ASCII values You can use the tabl...

Page 120: ...Hex A 41 a 61 B 42 b 62 C 43 c 63 D 44 d 64 E 45 e 65 F 46 f 66 G 47 g 67 H 48 h 68 I 49 i 69 J 4A j 6A K 4B k 6B L 4C l 6C M 4D m 6D N 4E n 6E O 4F o 6F P 50 p 70 Q 51 q 71 R 52 r 72 S 53 s 73 T 54 t...

Page 121: ...Glossary B 19 Y 59 y 79 Z A z 7A Spacebar 20 0 30 21 1 31 22 2 32 23 3 33 24 4 34 25 5 35 26 6 36 27 7 37 28 8 38 29 9 39 2A 3A 2B 3B 2C 3C 2D 3D 2E 3E 2F 3F 5B 40 5C 5D 5E _ 5F 60 7B 7C...

Page 122: ...send and receive datagrams over IP networks USB Universal Serial Bus A USB device is a Wireless Adapter that you can use to connect computers desktops to a wireless network To use this adapter the co...

Page 123: ...ped with RJ 45 connectors This cable is also referred to as 10Base T or 100Base T cable This cable is typically used to connect a BG 2000 directly to a computer VPN Virtual Private Network A Virtual P...

Page 124: ...An additional feature called VPN over NAT also known as VPN Pass through has been added to the Broadband Gateway It allows certain types of VPN clients to connect to remote VPN servers WAN Wide Area...

Page 125: ...it were being transmitted over standard network cabling In order to duplicate wired network security levels wireless data is encrypted at its point of transmission The receiving device decodes the da...

Page 126: ...tions to patch panels or hubs ORiNOCO offers the following types of adapters PC Card PCI Adapter USB Client Refer to your Wireless Client Adapter documentation for more information Wireless Station A...

Page 127: ...th 64 bit and 128 Bit Data Security WEP based on the RC4 algorithm This type of interface also referred to as Gold Label allows you to enter 5 or 13 digit keys in Alphanumeric Value or 10 or 26 digit...

Page 128: ...Glossary B 26...

Reviews: