Pppoe – Ubiquiti Networks PowerBridgM User Manual
Page 46

43
Chapter 5: Network Tab
airOS
™
v5.5.4 User Guide
Ubiquiti Networks, Inc.
PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) is a virtual
private and secure connection between two systems
that enables encapsulated data transport. Subscribers
sometimes use PPPoE to connect to Internet Service
Providers (ISPs), typically DSL providers.
Select PPPoE to configure a PPPoE tunnel. You can
configure only the external network interface as a PPPoE
client because all the traffic will be sent via this tunnel.
After the PPPoE connection is established, the device will
obtain the IP address, default gateway IP, and DNS server
IP address from the PPPoE server. The broadcast address
is used to discover the PPPoE server and establish the
tunnel.
If there is a PPPoE connection established, then the IP
address of the PPP interface will be displayed on the
Main tab next to the PPP interface statistics; otherwise
a Not Connected message and Reconnect button will be
displayed. To re-connect a PPPoE tunnel, click Reconnect.
Username
Specify the username to connect to the PPPoE
server; this must match the username configured on the
PPPoE server.
Password
Specify the password to connect to the PPPoE
server; this must match the password configured on the
PPPoE server.
Show
Check the box if you want to view the characters of
the password.
Service Name
Specify the name of the PPPoE service.
Fallback IP
Specify the IP address for the device to use if
the PPPoE server does not assign an IP address.
Fallback Netmask
Specify the netmask for the device to
use if the PPPoE server does not assign a netmask.
MTU/MRU
The size (in bytes) of the Maximum
Transmission Unit (MTU) and Maximum Receive Unit
(MRU) used for data encapsulation during transfer through
the PPP tunnel. The default value is 1492.
Encryption
Enables the use of Microsoft Point-to-Point
Encryption (MPPE).
NAT
Network Address Translation (NAT) enables packets
to be sent from the external network (WAN) to the local
interface IP address and then sub-routed to other client
devices residing on its local network while the airOS
device is operating in Access Point or AP‑Repeater mode.
NAT is implemented using the masquerade type firewall
rules. NAT firewall entries are stored in the iptables
nat table. Specify static routes to allow packets to pass
through the airOS device if NAT is disabled.
•
NAT Protocol
If NAT is enabled, you can modify data
packets to allow them to pass through the device. To
avoid modification of some specific types of packets,
such as SIP, PPTP, FTP, or RTSP, then uncheck the
respective box(es).
Block management access
By default, device
management from the WAN interface is blocked. This
feature makes SOHO Router mode more secure if the
device has a public IP address.
DMZ
DMZ (Demilitarized Zone) specifically allows one
computer/device behind NAT to become “demilitarized”,
so all ports from the public network are forwarded to the
ports of this private network, similar to a 1:1 NAT.
•
DMZ Management Ports
The web management port
(TCP/IP port 80 by default) of the airOS device will be
used for the host device. The airOS device responds to
requests from the external network as if it were the host
device that is specified with the DMZ IP address. DMZ
Management Ports is disabled by default; the device is
accessible from the WAN port. If DMZ Management Ports
is enabled, all management ports will be forwarded to
the device, so you’ll only be able to access the device
from the LAN side.
•
DMZ IP
Specify the IP address of the local host network
device. The DMZ host device will be completely exposed
to the external network.
Auto IP Aliasing
If enabled, automatically generates an
IP address for the corresponding WLAN/LAN interface.
The generated IP address is a unique Class B IP address
from the 169.254.X.Y range (netmask 255.255.0.0), which
is intended for use within the same network segment only.
The Auto IP always starts with 169.254.X.Y, with X and Y
as the last two octets from the MAC address of the device.
For example, if the MAC is 00:15:6D:A3:04:FB, then the
generated unique Auto IP will be 169.254.4.251.
The Auto IP Aliasing setting can be useful because you
can still access and manage devices even if you lose,
misconfigure, or forget their IP addresses. Because an
Auto IP address is based on the last two octets of the MAC
address, you can determine the IP address of a device if
you know its MAC address.