Setting Up the LAN (Local Area Network)
To use your web browser to access the web pages used to set up the router, your Computer must be configured to "Obtain an IP address automatically", that is, you must change the IP network settings of your computer so that it is a DHCP client. If you are using Windows 2000, XP:
Your Computer is now ready to use the Router via DHCP server.
Accessing the router
Open your web browser and enter the routers default IP (this you can find in the setup guide of the router) URL http://xxx.xxx.xxx.xxx in the address bar and press Enter.
You will then be prompted for a User Name and Password, by default on most of the routers you can use "admin" in the User Name field and "admin" or "administrator" in the Password field (this can also be found in the setup Guide of the router)
PPP Username and Password
PPP username and password is the username that you chose during setting up your account online or on the application form.
You can configure the DSL Router IP address and Subnet Mask for the LAN interface to correspond to your LAN's IP Subnet. If you want the DHCP server to automatically assign IP addresses, then enable the DHCP server and enter the range of IP addresses that the DHCP server can assign to your computers. Disable the DHCP server if you would like to manually assign IP addresses, in most cases it is better to leave DHCP enabled, this makes adding future computers to the network a breeze.
Below are a few basic steps of how to set up the wireless connection on your computer to connect to your router.
A wireless router
The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Be sure to get a wireless router, and not a wireless access point. Wireless access point's are used to connect several wireless computers or devices together WITHOUT an internet connection, were as a wireless router can do the same but also connect you to the internet through the same unit.
A wireless network adapter
Network adapters wirelessly connect your computer to your wireless router. If you have a newer computer you may already have wireless capabilities built in. If this is the case, then you will not need a wireless network adapter. If you need to purchase an adapter for a desktop computer, buy a USB wireless network adapter for easy of installation, if you are bit more on the adventurous side you can buy a PCI internal Wireless card and install it (this would require you to open up your PC - it is highly advisable to have a qualified technician do this for you), if you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.
Note: To make setup easy, choose a network adapter made by the same vendor that made your wireless router there are many different standards when it comes to wireless, for instance, if your wireless router only supports 802.11g and your computers wireless card only supports 802.11b even though they are both wireless they will not connect to each other, for example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from D-Link, Netgear, Linksys. If you have a desktop computer, make sure that you have an available USB port to plug the wireless network adapter into. If you don't have any open USB ports, buy a hub to add additional ports.
Connect your wireless router
Connect your wireless router to your modem, in most cases your modem and wireless router are combined into one unit. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Configure your wireless router
Using the network cable that came with your wireless router, you should temporarily connect your computer to one of the open network ports on your wireless router (any port that isn't labelled Internet, WAN, or WLAN). If you need to, turn your computer on. It should automatically connect to your router.
Next, open Internet Explorer and type in the address to configure your router.
You might be prompted for a password. The address and password you use will vary depending on what type of router you have, so refer to the instructions included with your router.
Internet Explorer will show your router's configuration page. Most of the default settings should be fine, but you should configure three things:
The exact steps you follow to configure these settings will vary depending on the type of router you have. After each configuration setting, be sure to click Save Settings, Apply, or OK to save your changes.
Now, you should disconnect the network cable from your computer.
Connect your computers
If your computer does not have wireless network support built in, plug your network adapter into your USB port, and place the antenna on top of your computer (in the case of a desktop computer), or insert the network adapter into an empty PC card slot (in the case of a laptop). Windows XP will automatically detect the new adapter, and may prompt you to insert the CD that came with your adapter. The on-screen instructions will guide you through the configuration process.
Note: The steps below only apply if you're using Windows XP Service Pack 2. If you're running Windows XP and you don't have Service Pack 2 yet, plug your computer into your wireless router and download and install Windows XP Service Pack 2.
Windows XP should show an icon with a notification that says it has found a wireless network.
Follow these steps to connect your computer to your wireless network:
Note: If the Wireless Network Connection window continues to show Acquiring Network Address, you may have mistyped the encryption key, or the DHCP in the router is set to disabled.
After you apply the configurations, it will return to the Setup screen showing the new configurations, if all your settings have been entered in correctly you should be able to surf the net.
If you have any problems setting up your Router, Internet Connection or Mail account please feel free to call us anytime on 0861300900.
If you intend to use a wireless network be sure to enable security. Internet fraud, bandwidth theft and Identity theft does happen and is on the increase. If you do not intend to use a wireless network make sure to disable it completely.
Many People setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible. That's totally understandable. It's also quite risky as numerous security problems can result. Today's WiFi products don't always help the situation as configuring their security features can be time-consuming and non-intuitive. The recommendations below summarize the steps you should take to improve the security of your home wireless LAN.
Change Default Administrator Passwords (and Usernames)
At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.
Turn on (Compatible) WPA / WEP Encryption
All Wi-Fi equipment supports some form of "encryption." Encryption technology scrambles messages sent over wireless networks so that they cannot be easily read by humans. Several encryption technologies exist for Wi-Fi today. Naturally you will want to pick the strongest form of encryption that works with your wireless network. To function, though, all Wi-Fi devices on your LAN must share the identical encryption settings. Therefore you may need to find a "lowest common demoninator" setting.
Change the Default SSID
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "Linksys." True, knowing the SSID does not by itself allow anyone to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring your LAN.
Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.
Disable SSID Broadcast
In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbour or hacker will try to log in to your home network. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator.
Do Not Auto-Connect to Open Wi-Fi Networks
Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbour's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.
Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed quick and easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from a network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range, then set each connected device to match. Use a private IP range (like 10.0.0.x) to prevent computers from being directly reached from the Internet.
Enable Firewalls on Each Computer and the Router
Modern routers contain built-in firewall capability, but the option exists to disable them. Ensure that your router's firewall is turned on. Additionally, consider installing and running personal firewall software on each computer connected to the router for extra protection.
Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighbouring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the centre of the home rather than near windows to minimize leakage.
Turn off the Network during Extended Periods of Non-Use
The ultimate in security measures, shutting down the network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline. Computer disk drives have been known to suffer from power cycle wear-and-tear, but this is not a concern for broadband modems and routers.
If you have any problems setting up your Router, Internet Connection or Mail account please feel free to call us anytime on 0861300900.
Setting up E-mail in Outlook 2003
Setting up Microsoft Outlook Express.
You should now be able to receive your e-mail.
This is a basic example of setting up port forwarding on a Billion 7402 via the cli.
[user]# telnet 192.168.1.254
Connected to 192.168.1.254.
Escape character is '^]'.
Login: admin <- same login as your webinterface
admin> nat status <- to get your l2tp interface name
NAT enabled on:
ID | Name | Interface | Type
1 | nat1 | ipwan | internal
2 | @nat_pppdevice16 | @ip_pppdevice16 | internal
admin> nat add globalpool test1 @ip_pppdevice16 internal 184.108.40.206 endaddress 220.127.116.11 <- make the billion aware of that ip, the "test1" can be any name
admin> nat add resvmap map1 interfacename @ip_pppdevice16 192.168.1.100 tcp 80 80 80 80 <- this is the actual port forwarding put into place specify to what ip address , protocol, (start port, end port) for the static ip, (start port, end port) for internal server
admin> system config save
Change your outgoing smtp mail server in Microsoft Outlook
Change your outgoing smtp mail server in Outlook Express
VoIP stands for Voice over Internet Protocol. Both VoIP and SIP are used to govern the setup and transmission of voice calls over the internet. Take note that even though IP systems are designed to make telephone calls over the internet, they are still able to communicate with traditional voice networks as well as mobile networks.
In the traditional setting telephone calls are made by making use of circuit switching. This is where a circuit is created when you lift up the handset of your telephone to establish communication with the network, indicated by the dialling tone heard over the handset which confirms that you have contact with the public network. Once you enter the number of whomever you wish to call the public network will then transfer your call to the recipients' phone. When the recipient then answers the call a circuit is created between both parties and remains open throughout the whole of the two way communication. Once either receiver is replaced on the handset, the circuit is broken and the call ends.
In the VoIP setting, as discussed before in the section on SIP, a system of packet switching is in use. This is where your voice is broken down into small packets of data and transmitted across the internet to the recipients' phone where they are reassembled back into your voice.
SIP is short for Session Initiation Protocol or simply the protocol needed to initiate a session. You may be wondering what session this is referring to and why it is necessary to have a protocol put in place to get one started. The session that we are referring to in this case is a communications session, more specifically an IP communication session between IP devices (Laptop, Voip phone) over an IP network. At its core SIP is a signalling protocol used to set up an IP communication session.
As with all communications sessions it starts with some sort of signalling as is also the case with a face to face conversation. If you want to ask one of your colleagues for some assistance on a particular matter you will signal your intent by calling their name. Once your colleague recognizes your signal to initiate a conversation they would signal back their acceptance of the signal to talk by responding: "Yes" or "How can I help". Now that your initiation signal has been accepted by your colleague the communication can commence as both parties are ready to converse.
The dialogue between you and your colleague will then take place by exchanging information in the form of sound waves. Once you have received the information you desired from your colleague you would signal the end of the conversation by thanking your colleague for the assistance and to be polite your colleague would signal back, e.g. "Thanks for your help" and "Don't mention it."
Signalling in an IP setting works on the same principal. Instead of signalling with sound waves through the air, IP devices signal with packets over an IP network. This being said there are numerous different kinds of IP packets with different functions and content, the most important thing being that both the sender and receiver of these IP packets have an understanding of the packet construct and what to do with the data it received.
In IP communications there are two types of IP packets, namely signalling packets and media packets. Signalling packets are used to establish the session and media packets which convey the audio/video. In the case of a voice session the initial analogue sound wave is encoded into 1's and 0's and sent over the IP network as a media packet. On the other side the 1's and 0's are then unpacked and decoded to reconstruct the analogue wave to be played back to the user.
Every second of conversation has many media packets that get sent over the IP network to convey the real time conversation. For a media exchange such as this to take place we are assuming that two important things have already taken place, this being that both parties know each other's location (know where media packets need to be sent to) and that both parties are making use of the same codecs to decode the content of the media packets. We are thus presented with the following two questions: How do we locate the other parties IP address and how do we decide which codec is going to be used? The need for a process that has the descriptions and rules that will allow us to locate each other and agree on codecs presents itself. In other words we are in need of a protocol.
This is where SIP comes in. SIP is essentially a rulebook that describes how to locate the other party and which codec to use. It also defines how to construct and send IP signalling packets to set up a call and how the call is to be managed.
When making a call between two SIP phones the phones can then make use of all of the rules set by SIP to construct an IP signalling packet, or a SIP packet which is populated with all of the data required to set up a call and sends it out over the IP network. On the other side the receiving SIP phone understands the rules of SIP, and recognizes the invitation to start a call will then notify the receiver of the call by ringing. After signalling has been completed and codecs have been determined, the phones then begin exchanging media packets that digitally convey the conversation. Sometime later one of the parties will signal the end of the call and both parties will stop sending media and the call is terminated.
The basic concept behind SIP is easy to understand as it is just signalling to set up and manage IP communication sessions.
The following section will contain information on how to setup VoIP for an Axxess Voice service. Take note that you will not only setting up Axxess Voice service on the VoIP phones that Axxess are going to be offering as VoIP accounts can be configured on a desktop computer, laptop or mobile phone by making use of readily available VoIP applications. These VoIP applications can be found online or on the Google Play Store as well as the Apple App Store. This guide will contain examples of Axxess Voice service configured on some common VoIP systems.
Handset registration is usually done automatically upon power up. To perform handset registration manually follow these steps:
Take note that after the success of registration, the handset LCD screen prompts "Handset subscribed". If the handset LCD screen prompts "Searching for Base", please check that the base station is powered on.
Once handset registration is complete follow these steps to access the web user interface:
Add your Account details into the required fields:
The base station can be configured to obtain network settings in one of the following ways:
DHCP: By default, the base station attempts to contact a DHCP server in your network to obtain the valid network settings, e.g., IP address, subnet mask, gateway address and DNS address.
Static IP Address: If the base station cannot contact a DHCP server for any reason, the client needs to configure the IP address, subnet mask, gateway address, primary DNS address and secondary DNS address for the base station manually.
To configure the network parameters for the base station manually:
Take note that the phone supports either or both IPv4 and IPv6 addresses mode, but IPv6 is disabled by default. Wrong network settings may result in inaccessibility of the phone and may have an impact on the network performance.
Add your Account details into the required fields:
Please note that the Cell C LTE APN is restricted and does not allow port forwarding.
Axxess is a bank approved beneficiary with all the major South African Banks.
Please use your Axxess account number (can be found on your invoice) as your reference when making an EFT or Cash Deposit payments. Please email a copy of your Proof of Payment to email@example.com
Failure to do so might cause a delay in activation or re-activation of your service(s).