Microhard Systems Inc. warrants that each product will be free of defects in material and workmanship for a
period of one (1) year for its products. The warranty commences on the date the product is shipped by Micro-
hard Systems Inc. Microhard Systems Inc.’s sole liability and responsibility under this warranty is to repair or
replace any product which is returned to it by the Buyer and which Microhard Systems Inc. determines does
not conform to the warranty. Product returned to Microhard Systems Inc. for warranty service will be shipped
to Microhard Systems Inc. at Buyer’s expense and will be returned to Buyer at Microhard Systems Inc.’s ex-
pense. In no event shall Microhard Systems Inc. be responsible under this warranty for any defect which is
caused by negligence, misuse or mistreatment of a product or for any unit which has been altered or modified
in any way. The warranty of replacement shall terminate with the warranty of the product.
Warranty Disclaims
Microhard Systems Inc. makes no warranties of any nature of kind, expressed or implied, with respect to the
hardware, software, and/or products and hereby disclaims any and all such warranties, including but not limited to warranty of non-infringement, implied warranties of merchantability for a particular purpose, any interruption or loss of the hardware, software, and/or product, any delay in providing the hardware, software, and/
or product or correcting any defect in the hardware, software, and/or product, or any other warranty. The Purchaser represents and warrants that Microhard Systems Inc. has not made any such warranties to the Purchaser or its agents MICROHARD SYSTEMS INC. EXPRESS WARRANTY TO BUYER CONSTITUTES MICROHARD
SYSTEMS INC. SOLE LIABILITY AND THE BUYER’S SOLE REMEDIES. EXCEPT AS THUS PROVIDED, MICROHARD
SYSTEMS INC. DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PROMISE.
MICROHARD SYSTEMS INC. PRODUCTS ARE NOT DESIGNED OR INTENDED TO BE USED IN
ANY LIFE SUPPORT RELATED DEVICE OR SYSTEM RELATED FUNCTIONS NOR AS PART OF
ANY OTHER CRITICAL SYSTEM AND ARE GRANTED NO FUNCTIONAL WARRANTY.
Indemnification
The Purchaser shall indemnify Microhard Systems Inc. and its respective directors, officers, employees, successors and assigns including any subsidiaries, related corporations, or affiliates, shall be released and discharged from any and all manner of action, causes of action, liability, losses, damages, suits, dues, sums of
money, expenses (including legal fees), general damages, special damages, including without limitation,
claims for personal injuries, death or property damage related to the products sold hereunder, costs and demands of every and any kind and nature whatsoever at law.
IN NO EVENT WILL MICROHARD SYSTEMS INC. BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL,
INCIDENTAL, BUSINESS INTERRUPTION, CATASTROPHIC, PUNITIVE OR OTHER DAMAGES WHICH MAY BE
CLAIMED TO ARISE IN CONNECTION WITH THE HARDWARE, REGARDLESS OF THE LEGAL THEORY BEHIND
SUCH CLAIMS, WHETHER IN TORT, CONTRACT OR UNDER ANY APPLICABLE STATUTORY OR REGULATORY
LAWS, RULES, REGULATIONS, EXECUTIVE OR ADMINISTRATIVE ORDERS OR DECLARATIONS OR OTHERWISE,
EVEN IF MICROHARD SYSTEMS INC. HAS BEEN ADVISED OR OTHERWISE HAS KNOWLEDGE OF THE POSSIBILITY OF SUCH DAMAGES AND TAKES NO ACTION TO PREVENT OR MINIMIZE SUCH DAMAGES. IN THE EVENT
THAT REGARDLESS OF THE WARRANTY DISCLAIMERS AND HOLD HARMLESS PROVISIONS INCLUDED ABOVE
MICROHARD SYSTEMS INC. IS SOMEHOW HELD LIABLE OR RESPONSIBLE FOR ANY DAMAGE OR INJURY, MICROHARD SYSTEMS INC.'S LIABILITY FOR ANYDAMAGES SHALL NOT EXCEED THE PROFIT REALIZED BY MICROHARD SYSTEMS INC. ON THE SALE OR PROVISION OF THE HARDWARE TO THE CUSTOMER.
Proprietary Rights
The Buyer hereby acknowledges that Microhard Systems Inc. has a proprietary interest and intellectual property rights in the Hardware, Software and/or Products. The Purchaser shall not (i) remove any copyright, trade
secret, trademark or other evidence of Microhard Systems Inc.’s ownership or proprietary interest or confiden-
tiality other proprietary notices contained on, or in, the Hardware, Software or Products, (ii) reproduce or modify any Hardware, Software or Products or make any copies thereof, (iii) reverse assemble, reverse engineer or
decompile any Software or copy thereof in whole or in part, (iv) sell, transfer or otherwise make available to
others the Hardware, Software, or Products or documentation thereof or any copy thereof, except in accordance with this Agreement.
It is assumed that users of the products described herein have either system integration or
design experience, as well as an understanding of the fundamentals of radio communications.
Throughout this manual you will encounter not only illustrations (that further elaborate on the
accompanying text), but also several symbols which you should be attentive to:
Caution or Warning
Usually advises against some action which could result in undesired or
detrimental consequences.
Point to Remember
Highlights a key feature, point, or step which is noteworthy. Keeping
these in mind will simplify or enhance device usage.
Tip
An idea or suggestion to improve efficiency or enhance usefulness.
Information
Information regarding a particular technology or concept.
To satisfy FCC RF exposure requirements for mobile transmitting devices, a separation distance of 23cm or more should be maintained
between the antenna of this device and persons during device operation. To ensure compliance, operations at closer than this distance is not
recommended. The antenna being used for this transmitter must not be co-located in conjunction with any other antenna or transm itter.
WARNING
WARNING
WARNING
Pour satisfaire aux exigences de la FCC d'exposition RF pour les appareils mobiles de transmission, une distance de séparatio n de 23cm ou
plus doit être maintenue entre l'antenne de cet appareil et les personnes au cours de fonctionnement du dispositif. Pour assurer le respect,
les opérations de plus près que cette distance n'est pas recommandée. L'antenne utilisée pour ce transmetteur ne doit pas être co-localisés
en conjonction avec toute autre antenne ou transmetteur.
MAXIMUM EIRP
FCC Regulations allow up to 36dBm Effective Isotropic Radiated Power (EIRP). Therefore, the sum of the transmitted power (in dBm), the
cabling loss and the antenna gain cannot e xceed 36dBm.
Réglementation de la FCC permettra à 36dBm Puissance isotrope rayonnée équivalente (EIRP). Par conséquent, la somme de la pui ssance
transmise (en dBm), la perte de câblage et le gain d'antenne ne peut pas dépasser 36dBm.
EQUIPMENT LABELING / ÉTIQUETAGE DE L'ÉQUIPEMENT
This device has been modularly approved. The manufacturer, product name, and FCC and Industry Canada identifiers of this product must
appear on the outside label of the end-user equipment.
Ce dispositif a été approuvé de façon modulaire. Le fabricant, le nom du produit, et la FCC et de l'Industrie du Canada identifiants de ce
produit doit figurer sur l'étiquette à l'extérieur de l'équipement de l'utilisateur final.
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference,
and (2) this device must accept any interference
received including interference that may cause
undesired operation.
Please Note: These are only sample labels; different products contain different identifiers. The actual identifiers should be seen on
your devices if applicable. S'il vous plaît noter: Ce sont des exemples d'étiquettes seulement; différents produits contiennent des
identifiants différents. Les identifiants réels devrait être vu sur vos périphériques le cas échéant.
CSA Class 1 Division 2 is Available Only on Specifically Marked Units
If marked this for Class 1 Division 2 – then this product is available for use in Class 1 Division 2, in the indicated Groups on the
product.
In such a case the following must be met:
The transceiver is not acceptable as a stand-alone unit for use in hazardous locations. The transceiver must be mounted within a
separate enclosure, which is suitable for the intended application. Mounting the units within an approved enclosure that is c ertified
for hazardous locations, or is installed within guidelines in accordance with CSA rules and local electrical and fire code, w ill ensure
a safe and compliant installation.
The antenna feed line; DC power cable and interface cable must be routed through conduit in accordance with the National
Electrical Code.
Do not connect or disconnect equipment unless power has been switched off or the area is known tobe non-hazardous.
Installation, operation and maintenance of the transceiver should be in accordance with the transceiver’s installation manual , and
the National Electrical Code.
Tampering or replacement with non-factory components may adversely affect the safe use of the transceiver in hazardous
locations, and may void the approval.
The wall adapters supplied with your transceivers are NOT Class 1 Division 2 approved, and therefore, power must be supplied to
the units using the screw-type or locking type c onnectors supplied from Microhard Systems Inc. and a Class 1 Division 2 power
source within your panel.
If you are unsure as to the specific wiring and installation guidelines for Class 1 Division 2 codes, contact CSA Internation al.
CSA Classe 1 Division 2 est disponible uniquement sur les unités particulièrement
marquées
Si marqué cette Classe 1 Division 2 - alors ce produit est disponible pour une utilisation en Classe 1 Division 2 , dans les groupes
indiqués sur le produit .
Dans un tel cas, la suivante doit être remplie:
L'émetteur-récepteur n'est pas acceptable comme une unité autonome pour une utilisation dans des endroits dangereux .
L'émetteur-récepteur doit être monté dans un boîtier séparé , qui est approprié pour l'application envisagée. Montage des unités
dans une enceinte approuvée qui est certifié pour les emplacements dangereux , ou est installé à l'intérieur des lignes direc trices ,
conformément aux règles de la CSA et le code électrique local et le feu , assurera une installation sûre et conforme .
La ligne d'alimentation d'antenne , câble d'alimentation CC et le câble d'interface doivent être acheminés à travers le conduit en
conformité avec le National Electrical Code .
Ne pas connecter ou déconnecter l'équipement que l'alimentation est coupée ou que la zone est connue pour être non
dangereux .
Installation, l'exploitation et la maintenance de l'émetteur-récepteur doivent être en conformité avec le manuel d'installation de
l'émetteur-récepteur , et le National Electrical Code .
Falsification ou le remplacement des c omposants non - usine peut nuire à l'utilisation sécuritaire de l'émetteur-récepteur dans des
endroits dangereux , et peut annuler l'approbation .
Les adaptateurs muraux fournis avec les émetteurs-récepteurs sont PAS classe 1, division 2 ont approuvé , et par conséquent,
doit être alimenté pour les unités à l'aide des connecteurs de type vis ou verrouillage fournies par Microhard Systems Inc. et une
Division 2 source d'alimentation de classe 1 au sein de votre panneau .
Si vous n'êtes pas sûr de l' installation et de câblage des lignes directrices spécifiques pour la classe 1 Division 2 codes ,
communiquer avec la CSA International.
The BulletPlus is a high-performance Cellular Dual Ethernet/Serial/USB Gateways w/WiFi,
equipped with 3x RJ45 Ethernet Ports, dual SIM capability, 2x Programmable Analog I/O,
Standalone GPS, 802.11b/g/n WiFi, and an RS232 serial communication port.
The BulletPlus utilizes the cellular infrastructure to provide network access to wired or wireless devices anywhere cellular coverage is supported by a cellular carrier. The BulletPlus
supports 4G/LTE connections with blazing fast speeds.
Providing reliable Cellular Ethernet bridge functionality as well gateway service for most
equipment types which employ an RS232, RJ45 or WiFi interface, the BulletPlus can be used
in a limitless types of applications such as:
High-speed backbone
IP video surveillance
Voice over IP (VoIP)
Facilitating internetwork
wireless communications
Legacy network/device
migration
SCADA (PLC’s, Modbus,
Hart)
1.1 Performance Features
Key performance features of the BulletPlus include:
Fast, reliable connection speeds to 4G, 3G, LTE, and HSPA Networks (varies by
model)
2x Programmable Analog/Digital Inputs OR up to 8 Digital Outputs
DMZ and Port Forwarding
3x 10/100 Ethernet Ports (WAN/2LAN)
Standalone GPS (TCP Server/UDP/SMTP Reporting)
User interface via local console, telnet, web browser
Compatibility with virtually all PLCs, RTUs, and other RS232 serial devices.
BulletPlus Supported Bands: LTE FDD: Band 1, 3, 8, all bands with diversity (China) LTE TDD: Band 39, 40, 41(38), all bands with diversity
DC-HSPA+/HSPA+/HSPA/UMTS: Band 1, 5, 8, 9, all bands
with diversity
TD-SCDMA: Band 34, 39, all bands with diversity
GSM/GPRS/EDGE: 1800 MHz/900 MHz
BulletPlus Data Features: LTE: DL 100 Mbps, UL 50 Mbps (North America) HSPA+: DL 42 Mbps, UL 5.7 Mbps
HSPA+: DL 21 Mbps, UL 5.7 Mbps
WCDMA: DL/UL 384 kbps
EDGE Class 33: DL/UL 236.8 kbps
GPRS Class 33: DL/UL 85.6kbps
BulletPlus Data Features: LTE FDD: UL 50Mbit/s, DL 150Mbit/s @20M BW cat4 (China) LTE TDD: UL 10Mbit/s; DL 112Mbit/s @20M BW cat4
TD-SCDMA PS: UL 384 kbit/s; DL 384 kbit/s
TD-HSPA+: UL 2.2 Mbit/s; DL 4.2 Mbit/s
DC-HSPA+: UL 5.76 Mbit/s; DL 42 Mbit/s
HSPA+: UL 5.76 Mbit/s; DL 21.6 Mbit/s
WCDMA PS: UL 384 kbit/s; DL 384 kbit/s
WCDMA CS: UL 64 kbit/s; DL 64 kbit/s
EDGE: UL 236.8 kbit/s; DL 236.8 kbit/s
GPRS: UL 85.6 kbit/s; DL 85.6 kbit/s
General
Serial Interface: RS232, RS485, RS422 Serial Baud Rate: 300bps to 921kbps USB*: USB 2.0
(*Future) USB Console Port
USB to Serial Data Routing
USB to Ethernet Data Routing (NDIS)
This QUICK START guide will walk you through the setup and process required to access the
WebUI configuration window and to establish a basic wireless connection to your carrier.
Note that the units arrive from the factory with the Local Network setting configured as
‘Static’ (IP Address 192.168.168.1, Subnet Mask 255.255.255.0, and Gateway
192.168.168.1), in DHCP server mode. (This is for the LAN Ethernet Adapter on the back of
the BulletPlus unit.)
2.1 Installing the SIM Card
Before the BulletPlus can be used on a cellular network a valid SIM Card for your Wire-
less Carrier must be installed. Insert the SIM Card into the slot as shown, the bottom
SIM slot is for SIM1: (The contacts should face down, and the notch to the right)
To reset to factory
defaults, press and hold
the CFG button for 8
seconds with the
BulletPlus powered up.
The LED’s will flash
quickly and the modem
will reboot with factory
defaults.
Use the MHS-supplied
power adapter or an
equivalent power source.
The unit can also be powered
via PoE using a MHS PoE
injector.
2.2 Getting Started with Cellular
Connect the Antenna’s to the applicable ANTENNA jack’s of the BulletPlus.
Connect the power connector to the power adapter and apply power to the unit, the CPU
LED will flash during boot-up, once on solid, proceed to the next step.
On the Carrier > Status Tab, verify that a WAN IP Address has been assigned by your
carrier. It may take a few minutes, so try refreshing the page if the WAN IP Address
doesn’t show up right away. The Activity Status should also show “Connected”.
If you have set a static IP on your PC, you may need to add the DNS Servers shown in
the Carrier Status Menu to you PC to enable internet access.
Congratulations! Your BulletPlus is successfully connected to your Cellular Carrier.
Ensure the default
passwords are changed.
Set up appropriate firewall
rules to block unwanted
incoming data.
To access devices connected to BulletPlus remotely, one or more of the following must be
configured: IP-Passthrough, Port Forwarding, DMZ. Another option would be to set up a
VPN.
Ensure that all default passwords are changed to limit access to the modem.
(Firmware version v1.3.0-r1014 requires the defaults passwords are changed
upon initial login).
For best practices and to limit data charges it is critical to properly set up the
firewall. (Especially important for Public Static IP addresses.)
The BulletPlus is a fully-enclosed unit ready to be interfaced to external devices with standard connectors
as discussed below. An optional mounting bracket can be ordered to allow the BulletPlus to be mounted
for a fixed installation.
The BulletPlus Hardware Features Include:
Standard Connectors for:
3x 10/100 Ethernet Ports (RJ45 - 1xWAN / 2xLAN)
Data Port (RS232/DB9)
4-Pin: MATE-N-LOK Type Connector for Power / I/O 1/2
Cellular Antenna (SMA Female Antenna Connection x2)
GPS Antenna (SMA Female Antenna Connection)
WiFi Antenna (RP-SMA Female Antenna Connection)
Status/Diagnostic LED’s for RSSI(x3), Tx, Rx, GPS, CPU
Dual SIM (Mini-SIM (2FF)) Card Slots
CFG Button for factory default / firmware recovery operations
USB 2.0 Connector
On the front of the Bullet is the CFG Button, USB Port, Main, GPS & Diversity, GPS & WIFI Antenna
Connectors and SIM Card Slot. The top of the Bullet are the status indicators, RSSI, Tx, RX, GPS and
PWR.
The USB port is a future development to be available in later releases of firmware.
CFG (Button) - Holding this button while powering-up the Bullet will boot the unit into FLASH FILE SYS-
TEM RECOVERY mode. The default IP address for system recovery (only - not for normal access to the
unit) is static: 192.168.1.39. Hold for 1 second for httpd recovery mode, 5 seconds for tftp recovery mode,
or 10 seconds for master reset. If button is held for longer than 15 seconds the button will be ignored.
If the unit has been powered-up for some time (>1 minute), depressing the CFG Button for ~10 seconds
(unit will reboot) will result in FACTORY DEFAULTS being restored, including the static factory IP address.
This IP address is useable in a Web Browser for accessing the Web User Interface.
Receive Signal Strength Indicator (RSSI) - As the received signal strength increases, starting
with the furthest left, the number of active RSSI LEDs increases.
Tx(Red)/Rx(Green) LED’s - The Tx/Rx LED’s indicate carrier (cellular) traffic.
GPS - Indicates that the optional standalone
GPS module has synchronized and is ready
for use.
PWR LED - The Power LED indicates that
power has been applied to the module.
Flashing indicates a bootup process.
SIM Card - This slot is used to install SIM
card(s) provided by the cellular carrier. Ensure
that the SIM card is installed properly by pay-
ing attention to the diagram printed next the
SIM card slot. The Bottom slot is SIM1, the contact
should face down, and the notch should be to the
On the side of the Bullet is the Data Port (RS232) and on the back are the Power and Ethernet(PoE)
interfaces and the 2x Programmable I/O.
Drawing 3-7: BulletPlus Rear & Side View
Caution: Using a power
supply that does not
provide proper voltage
may damage the modem.
The Data Port (RS232 DCE) on the side of the unit is used for
RS232 Serial Data based field devices at 300 bps to 921kbps.
The Ethernet Ports (2LAN/WAN) are 10/100 Mbps RJ-45
interfaces used to connect devices Ethernet based field devices.
Programmable I/O– The Bullet has 2 programmable Analog/
Digital Inputs or 2 Digital Outputs. Maximum recommended load
for the output pin is 150mA @ 30 Vdc (Vin).
Vin+/Vin– is used to power the unit. The input Voltage range is
7-30 Vdc.
PoE– The Bullet can also be powered using Passive PoE on the
Ethernet Port (WAN), via a PoE injector.
Upon successfully accessing the BulletPlus using a Web Browser, the Logon window will appear.
For security, do not allow the
web browser to remember the
User Name or Password.
The factory default User Name is: admin
The default password is: admin
Note that the password is case sensitive. It should be changed (discussed further along in this section),
It is advisable to change the
login Password. Do not
FORGET the new password
as it cannot be recovered.
but once changed, if forgotten, may not be recovered.
When entered, the password appears as ’dots’ as shown in the image below. This display format prohibits
others from viewing the password.
The ‘Remember my password’ checkbox may be selected for purposes of convenience, however it is
recommended to ensure it is deselected - particularly once the unit is deployed in the field - for one
primary reason: security.
If the BulletPlus is restored to factory defaults the password is also restored to the original default
password.
As of firmware version v1.3.0-r1014 it is required to change the password upon initial login, once
the password is changed, it will be required to login to the unit once again with the updated
password.
The main category tabs located at the top of the navigation bar separate the configuration of the BulletPlus
into different groups based on function. The System Tab contains the following sub menu’s:
Summary - Status summary of entire radio including network settings,
version information, and radio connection status
Settings - Host Name, System Log Settings, System Time/Date
Services - Enable/Disable and configure port numbers for SSH, Telnet, HTTP
and HTTPS services
Keepalive - Configure System keep alive to ensure network/internet access.
Maintenance - Remote firmware Upgrades, reset to defaults, configuration backup
and restore.
Reboot - Schedule reboots and/or immediately reboot the system.
4.1.1 System > Summary
The System Summary screen is displayed immediately after initial login, showing a summary and status of
all the functions of the BulletPlus in a single display. This information includes System Status, Carrier
Status, Cellular & LAN/WAN network information, version info, etc.
The System Summary page
will Auto Refresh, each time
this happens a small amount
of data is used. If viewing
over the Cellular Network this
data could add up to a
significant amount over a long
period of time.
Options available in the System Settings menu allow for the configuration of the Host Name, Description,
Console Timeout and System Log server settings.
Image 4-1-2: System Settings > System Settings
Host Name/Description
The Host Name is a convenient identifier for a specific BulletPlus unit.
This feature is most used when accessing units remotely: a convenient
cross-reference for the unit’s WAN/Carrier IP address. This name
appears when logged into a telnet session, or when the unit is
reporting into Microhard NMS System.
The description provides an additional field for text characters, but is
not displayed anywhere but in this field.
Console Timeout (s)
This value determines when a console connection (made via Console
Port or Telnet) will timeout after becoming inactive.
CFG Reset to Default Button
Enabled by default, when the CFG button on the front of the BulletPlus
is held down for 10s while the unit is powered up, the unit will reset
and all settings will be reset to factory defaults. When disabled the unit
will reset, but the settings will not be overwritten.
Network Time Protocol (NTP)
can be used to synchronize the
time and date or computer
systems with a centralized,
referenced server. This can
help ensure all systems on a
network have the same time
and date.
The BulletPlus can report system level events to a third party Syslog
server, which can be used to monitor events reported by the BulletPlus.
IP Address
0.0.0.0
System Syslog Server Port
Enter the UDP listening port of the Syslog Server. The default port number
is generally 514, but could vary from Server to Server.
Time Settings
The BulletPlus can be set to use a local time source, thus keeping time on its own, or it can be configured
to synchronize the date and time via a NTP Server. The options and menus available will change
depending on the current setting of the Date and Time Setting Mode, as seen below.
UDP Port
514
Select the Date and Time Setting Mode required. If set for ‘Use
Local Time’ the unit will keep its own time and not attempt to
synchronize with a network server. If ‘Synchronize Date And
Time Over Network’ is selected, a NTP server can be defined.
The calendar date may be entered in this field. Note that the
entered value is lost should the BulletPlus lose power for some
reason.
The time may be entered in this field. Note that the entered
value is lost should the BulletPlus lose power for some reason.
If connecting to a NTP time server, specify the timezone from
the dropdown list.
This displays the POSIX TZ String used by the unit as
determined by the timezone setting.
Enter the IP Address or domain name of the desired NTP time
server.
Enter the IP Address or domain name of the desired NTP time
server.
Values (hh:mm:ss)
11:27:28 (varies)
Timezone
Values (selection)
User Defined (or out of date)
POSIX TZ String
Values (read only)
(varies)
NTP Server
Values (address)
pool.ntp.org
NTP Port
Values (port#)
123
NTP Client Interval
By default the modem only synchronizes the time and date during
system boot up (default: 0), but it can be modified to synchronize at a
regular interval. This process does consume data and should be set
Certain services in the BulletPlus can be disabled or enabled for either security considerations or resource/
power considerations. The Enable/Disable options are applied after a reboot and will take affect after each
start up. The Start/Restart/Stop functions only apply to the current session and will not be retained after a
power cycle.
Image 4-1-5: System > Services
The FTP service can be enabled/disabled using the Services Status
Menu. The FTP service is used for firmware recovery operations.
Using the Telnet Service Enable/Disable function, you can disable the
Telnet service from running on the modem. The port used by the
Telnet service can also be modified. The default is 23.
Using the SSH Service Enable/Disable function, you can disable the
SSH service (Port 22) from running on the modem. The port used by
the SSH service can also be modified. The default is 22.
The default web server port for the web based configuration tools used
in the modem is port 80 (http) and port 443 (HTTPS).
Change as required, but keep in mind that if a non standard port is
used, it must be specified in a internet browser to access the unit.
(example: http://192.168.168.1:8080).
The Keep alive tab allows for the configuration of the keep alive features of the BulletPlus. The BulletPlus
can check for activity on the Wireless Interface, The CLI (Command Line Interface), The WEBUI, and
ensure that they are working as expected. In the event that the BulletPlus does not detect activity on a
interface it will reboot to attempt to resolve any issues that may have occurred.
Image 4-1-6: Carrier > Keepalive
Enable or Disable the keep alive functions of the modem. If it is
disabled, the user can configure the Traffic Check separately. The unit
will monitor traffic on the Cell interface.
Monitors traffic on the Cell interface as well as the WAN interface if the
WAN port is configured as independent in the Network Settings. If the
Bullet detects that there is no activity on the above interfaces it will
attempt a ICMP, HTTP or DNS Lookup as configured below to
determine if service has been lost.
Monitors the activity of CLI. If the console isn't accessed within the
certain period which is specified by Console Timeout in SystemSettings web page, the modem will send out the connection request.
Monitors the activity of Web UI. If the Web UI isn't accessed or
refreshed within the certain period which is specified by Console
Timeout in System-Settings web page, the modem will send out the
connection request.
Once the connection is lost, the modem will send one of the requests
to the remote host to determine the connection status. If the modem
fails to get the response, it will re-send the request within the seconds
specified by Keepalive Interval below:
ICMP: Send a "ping" request
HTTP: Send a "wget" request to a HTTP server
DNS Lookup: Send a "dslookup" request to a DNS server
Specify a IP Address or Domain that is used to test the modems
connection. The modem will send out the connection requests to the
specified Host.
The Interval value determines the frequency, or how often, the unit will
send out PING messages to the Host. The BulletPlus will first attempt
to re-initialize the cellular model before performing a full system
reboot, thus the interval may be delayed by up to 120 seconds)
The Keepalive Retry is the maximum number of connection failures
such as “Host unreachable” the unit will attempt before the unit will
reboot itself to attempt to correct connection issues. The default
number is 20, and valid value is from 10 to 200.
Occasional firmware updates may be released by Microhard Systems which may include fixes and/or new
features. The firmware can be updated wirelessly using the WebUI.
Check this box to erase the configuration of the BulletPlus unit during
the upgrade process. This will upgrade, and return the unit to factory
defaults, including the default IP Addresses and passwords. Not
checking the box will retain all settings during a firmware upgrade
procedure.
Use the Browse button to find the firmware file supplied by Microhard
Systems. Select “Upgrade Firmware” to start the upgrade process.
This can take several minutes.
Reset to Default
The BulletPlus may be set back to factory defaults by using the Reset to Default option under System >
Maintenance > Reset to Default. *Caution* - All settings will be lost!!!
The configuration of the BulletPlus can be backed up to a file at any time using the Backup Configuration
feature. The file can the be restored using the Restore Configuration feature. It is always a good idea to
backup any configurations in case of unit replacement. The configuration files cannot be edited offline, they
are used strictly to backup and restore units.
Use the ‘Browse’ button to find the backup file that needs to be restored to the unit. Use the ‘Check
Restore File’ button to verify that the file is valid, and then the option to restore the configuration is
displayed, as seen above.
The Keep Carrier Settings box can be selected before the restore process is started, if it is selected the
BulletPlus will retain the current carrier settings and not overwrite them with the settings contained in the
backup file.
The BulletPlus can be remotely rebooted using the System > Reboot menu. As seen below a button
‘Reboot now’ is provided. Once pressed, the unit immediately reboots and starts its boot up procedure. The
BulletPlus can also be restarted on a regular basis by setting up a daily/weekly/monthly schedules.
Image 4-1-9: System > Reboot
Status
Use this option to enable or disabled schooled reboots. If enabled the
BulletPlus is reboot at the interval defined below.
Schedule daily, weekly or monthly reboots. Setting up a reboot
schedule can help keep the modem connected to the cellular carrier
and prevent physically rebooting the modem if located at a remote
destination.
Values (selection)
Disable / Enable
Values (selection)
Reboot Daily
Reboot Weekly
Reboot Monthly
Days / Time
If set for weekly, days are counted from Sunday to Saturday (0 to 6),
and if set to monthly the days are counted 1 to 31. Multiple days can
be specified by separating with a comma ‘,’.
Set the time of day (24hr clock) for which to reboot the device.
The Network Summary display gives a overview of the currently configured network interfaces including
the Connection Type (Static/DHCP), IP Address, Net Mask, Default Gateway, DNS, and IPv4 Routing
Table.
The BulletPlus features 2x LAN ports that can be used for connection of devices on a local network. The
WAN port can also be bridged with the LAN therefore providing up to 3 LAN ports. By default the has a
static IP Address assigned, 192.168.168.1. Also, by default the LAN is running a DHCP server to provide
IP Addresses to devices that are connected to the physical LAN port (s) (directly or via a switch).
DHCP: Dynamic Host
Configuration Protocol may
be used by networked
devices (Clients) to obtain
unique network addresses
from a DHCP server.
Advantage:
Ensures unique IP addresses
are assigned, from a central
point (DHCP server) within a
network.
Disadvantage:
The address of a particular
device is not ‘known’ and is
also subject to change.
STATIC addresses must be
tracked (to avoid duplicate
use), yet they may be
permanently assigned to a
device.
Within any IP network, each
device must have its own
unique IP address.
Image 4-2-2: Network > Network LAN Configuration
LAN Add/Edit Interface
The BulletPlus has the capability to have multiple SSID’s for the WiFi radio. New Interfaces can be added
for additional SSID’s, providing, if required, separate subnets for each SSID. By default any additional
interfaces added will automatically assign IP addresses to connecting devices via DHCP. Additional
interfaces can only be used by additional WIFI SSID’s (virtual interfaces).
Image 4-2-3: Network > LAN Port Configuration
Spanning Tree (STP)
This option allows the BulletPlus to participate in the Spanning Tree
protocol with other devices to prevent local loops. By default this is
disabled.
A SUBNET MASK is a bit
mask that separates the
network and host (device)
portions of an IP address.
The ‘unmasked’ portion
leaves available the
information required to
identify the various devices
on the subnet.
This selection determines if the BulletPlus will obtain an IP address
from a DHCP server on the attached network, or if a static IP address
will be entered. If a Static IP Address is chosen, the fields that follow
must also be populated.
If ‘Static’ Connection Type is selected, a valid IPv4 Address for the
network being used must be entered in the field. If ‘DHCP’ is chosen
this field will not appear and it will be populated automatically from the
DHCP server.
If ‘Static’ Connection Type is selected, the Network Mask must be
entered for the Network. If ‘DHCP’ is chosen this field will not appear
and it will be populated automatically from the DHCP server.
If the Connection Type is set to DHCP, you can use Auto for the DNS
Mode and a DNS server will automatically be defined. If the connection
type is set as static, DNS servers can be manually specified.
Values (selection)
DHCP
Static
IP Address
Values (IP Address)
192.168.168.1
Netmask
Values (IP Address)
255.255.255.0
DNS Mode
Values (selection)
Auto
Manual
Within any IP network, each
device must have its own
unique IP address.
Primary DNS / Secondary DNS
Set the primary and alternate DNS (Domain Name Server) for use by
devices on the LAN port, if required.
A BulletPlus may be configured to provide dynamic host control protocol (DHCP) service to all attached
(either wired or wireless (WiFi)-connected) devices. By default the DHCP service is enabled, so devices
that are connected to the physical Ethernet LAN ports, as well as any devices that are connected by WiFi
will be assigned an IP by the BulletPlus. The LAN DHCP service is available for each interface, and is
located in the add/edit interface menus.
Image 4-2-4: Network > DHCP Server
DHCP Server
Prior to enabling this service,
verify that there are no other
devices - either wired (e.g.
LAN) or wireless with an
active DHCP SERVER
service. (The Server issues
IP address information at the
request of a DHCP Client,
which receives the
information.)
The option is used to enable or disable the DHCP service for devices
connected to the LAN Port(s).
Select the starting address DHCP assignable IP Addresses. The first
octets of the subnet will be pre-set based on the LAN IP configuration,
and can not be changed.
Set the maximum number of IP addresses that can be assigned by the
BulletPlus.
The DHCP lease time is the amount of time before a new request for a
network address must be made to the DHCP Server.
Specify an alternate gateway for DHCP assigned devices if the default
gateway is not to be used.
DNS: Domain Name Service
is an Internet service that
translates easilyremembered domain names
into their not-so-easilyremembered IP addresses.
Being that the Internet is
based on IP addresses,
without DNS, if one entered
the domain name
www.microhardcorp.com (for
example) into the URL line of
a web browser, the website
‘could not be found’).
Specify a preferred DNS server address to be assigned to DHCP
devices.
Specify the alternate DNS server address to be assigned to DHCP
devices.
Enter the address of the WINS/NBNS (NetBIOS) Server. The WINS
server will translate computers names into their IP addresses, similar
to how a DNS server translates domain names to IP addresses.
Select the method used to resolve computer names to IP addresses.
Four name resolution methods are available:
B-node: broadcast
P-node: point-to-point
M-node: mixed/modified
H-node: hybrid
The BulletPlus has the capability to add multiple network interfaces, as such it may be desirable to
segment these different subnets. The BulletPlus features 802.1Q VLAN. 802.1Q VLAN uses tagging to
allow separation of network segments. Ports can belong to multiple VLANs. A Trunk port can be configured
to communicate with other VLAN switch by adding all configured VLANs to a single port. The native
VLAN1 is used by default, it is important that any connected VLAN switch use the same Native VLAN.
Image 4-2-5: Network > VLAN
VLAN names can be added to aid in VLAN identification (purpose, I,e
Engineering, Accounting, etc).
When adding a VLAN you must select a VLAN ID. Select between 2
and 127 for valid VLAN IDs.
Assign port to the current VLAN.
Excluded: Not part of the current VLAN
Tagged: In 802.1Q this assigns the current VLAN to the port,
Untagged: In port based VLAN this assigns a port to the current
VLAN.
VLAN Name
Values
(no default)
VLAN ID
Values
2 (2-127)
Port 1 - 2
Values (selection)
Excluded
Tagged
Untagged
Network
Allows the user the ability to assign specific configured network
interfaces to a specific VLAN. (802.1Q)
The WAN configuration refers to the wired WAN connection on the BulletPlus. The WAN port can be used
to connect the BulletPlus to other networks, the internet and/or other network resources.
DHCP: Dynamic Host
Configuration Protocol may
be used by networked
devices (Clients) to obtain
unique network addresses
from a DHCP server.
Advantage:
Ensures unique IP addresses
are assigned, from a central
point (DHCP server) within a
network.
Disadvantage:
The address of a particular
device is not ‘known’ and is
also subject to change.
STATIC addresses must be
tracked (to avoid duplicate
use), yet they may be
permanently assigned to a
device.
Image 4-2-6: Network > WAN Configuration
Use this to set the function of the physical WAN RJ45 port. If set to
independent WAN , the physical WAN port will operate as a standard
WAN port. Alternatively it can be configured to be bridged to the LAN,
and operate as a second LAN port, or even as an independent LAN.
This selection determines if the BulletPlus will obtain an WAN IP
address from a DHCP server, or if a static IP address will be entered.
If a Static IP Address is chosen, the fields that follow must also be
populated.
If ‘Static’ Connection Type is selected, a valid IPv4 Address for the
network being used must be entered in the field. If ‘DHCP’ is chosen
this field will not appear and it will be populated automatically from the
DHCP server.
If ‘Static’ Connection Type is selected, the Network Mask must be
entered for the Network. If ‘DHCP’ is chosen this field will not appear
and it will be populated automatically from the DHCP server.
If the BulletPlus is integrated into a network which has a defined
gateway, then, as with other hosts on the network, this gateway’s IP
address will be entered into this field. If there is a DHCP server on the
network, and the Connection Type (see previous page) is selected to
be DHCP, the DHCP server will populate this field with the appropriate
gateway address.
The Default Route parameter allows you to set this interface as the
default route in the routing table. This is result in all data being sent to
the WAN interface if there the destination network is not directly
connected (LAN, WIFI etc), and no other route has been specified
(4G). In cases where the WAN is the primary connection this would be
set to Yes.
Select between Manual or Auto for DNS server(s) for the WAN
interface. If set to Auto the BulletPlus will try to automatically detect the
DNS servers to use, which is normally the case when the WAN is
DHCP. Manual required the DNS addresses to be known and entered
below.
DNS (Domain Name Service) Servers are used to resolve domain
names into IP addresses. If set to auto and the Connection Type is set
for DHCP the DHCP server will populate this field and the value set
can be viewed on the Network > Status page. To add additional static
servers, enter them here.
Values (IP Address)
(no default)
Default Route
Values (selection)
No / Yes
DNS Mode
Values (selection)
Manual / Auto
Primary DNS
Values (IP Address)
(no default)
DNS (Domain Name Service) Servers are used to resolve domain
names into IP addresses. If set to auto and the Connection Type is set
for DHCP the DHCP server will populate this field and the value set
can be viewed on the Network > Status page. To add additional static
servers, enter them here.
In some applications it is important that specific devices always have a predetermined IP address. This
menu allows for MAC Address binding to a IP Address, so that whenever the device that has the specified
MAC address, will always get the selected IP address from the DHCP service. In this situation, all attached
(wired or wireless) devices can all be configured for DHCP, but still get a known IP address.
Image 4-2-7: Network > MAC Address Binding
Name
The name field is used to give the device a easily recognizable name.
Values (characters)
(no default)
MAC Address
Enter in the MAC address of the device to be bound to a set IP
address. Set the IP Address in the next field. Must use the format:
AB:CD:DF:12:34:D3. It is not case sensitive, but the colons must be
present.
Values (MAC Address)
(no default)
IP Address
Enter the IP Address to be assign to the device specified by the MAC
address above.
Static Addresses
This section displays the IP address and MAC address currently assigned through the DCHP service, that
are bound by it’s MAC address. Also shown is the Name, and the ability to remove the binding by clicking
“Remove _______”.
Values (IP Address)
(minutes)
Active DHCP Leases
This section displays the IP Addresses currently assigned through the DCHP service. Also shown is the
MAC Address, Name and Expiry time of the lease for reference. The ‘Release All’ button terminates all
active leased and requires all connected devices to request new network information (IP/Subnet/etc)
Unless a carrier issues a Static IP address, it may be desirable to use a Dynamic DNS (DDNS) service to
track dynamic IP changes and automatically update DNS services. This allows the use of a constant
resolvable host name for the BulletPlus.
Image 4-2-8: Carrier > Traffic Watchdog
DDNS Status
This selection allows the use of a Dynamic Domain Name Server
(DDNS), for the BulletPlus.
If the BulletPlus is using a wired WAN (ISP) as well as a Cellular
carrier, specific which will use the DNS service.
This is a list of supported Dynamic DNS service providers. Free and
premium services are offered, contact the specific providers for more
information.
Enter a valid user name and password for the DDNS service selected
above.
Values (Selection)
Enable / Disable
Network
Values (Selection)
Auto / Carrier / WAN
Service
Values (selection)
changeip
dyndns
eurodyndns
hn
noip
ods
ovh
regfish
tzo
zoneedit
User Name / Password
Values (characters)
(none)
Host
This is the host or domain name for the BulletPlus as assigned by the
DDNS provider. Use the provided button to query the server (if
configured correctly)
It may be desirable to have devices on different subnets to be able to talk to one another. This can be
accomplished by specifying a static route, telling the BulletPlus where to send data.
Image 4-2-9: Network > Routes
Routes can be names for easy reference, or to describe the route
being added.
Enter the network IP address for the destination.
Specify the Gateway used to reach the network specified above.
In some cases there may be multiple routes to reach a destination.
The Metric can be set to give certain routes priority, the lower the
metric is, the better the route. The more hops it takes to get to a
destination, the higher the metric.
Define the exit interface. Is the destination a device on the LAN, LAN1
(If physical WAN port is bridged as an independent LAN), 3G/4G
(cellular), USB or the WAN?
The BulletPlus when paired with other VRRP enabled devices (another BulletPlus or compatible devices)
can provide redundant internet access for LAN devices by using VRRP (Virtual Router Redundancy
Protocol) as illustrated below. If a connected device needs to access the internet it will use whichever
virtual router has the highest priority, if that device is not available the next router with the higher priority
will router the traffic.
This is the IP Address of the virtual router, this must be the same on all
devices participating in VRRP. This is the IP that any attached LAN
PC/device would use as its default gateway.
Values
192.168.220.211
Virtual Router ID
This is the Router ID. Each router/ participating in VRRP should have
a router ID to distinguish between them.
Values
2
Router Priority
This is the Router priority. This number to assigned to each router to
determine which router(s) will be used first or as the primary. The
higher the ID, the higher the priority.
4.2.8 Network > Ports
The Network > Ports menu can be used to determine the characteristics of the physical Ethernet interfaces
on the BulletPlus. As seen below the Mode (Auto/Manual), Auto-Negotiation, Speed (10/100Mbit/s) and the
Duplex (Full/Half) can all be configured on the BulletPlus.
The BulletPlus features Bandwidth Throttling, which allows the upload/download of connected networks/
users data speeds to be limited to a specified value. Network Bandwidth Throttling can be implemented by
each physical Ethernet interface as seen in the image below.
Image 4-2-12: Network > Bandwidth Throttling
The rule name is used as a reference to be able to help identify which
interface or network is attached to the affected network interface.
Select the physical interface to be affected by the Bandwidth Throttling
as defined below.
Enable or disable uploading on the specified interface. This prevent
data from being uploaded to a server. (i.e uploading/sending videos or
other files to a server).
Set the data limit (speed) for file uploads if uploads have been allowed
using the Upload Bandwidth Enable.
Enable or disable downloading on the specified interface. This prevent
data from being downloaded from a server. (i.e downloading files,
internet browsing etc).
Values (chars)
Enable / Disable
Download Bandwidth
Set the data limit (speed) for file downloads if downloads have been
allowed using the Download Bandwidth Enable.
4.2.10 Network > Device List
The Network > Device List shows the current ARP table for the network adapters. The MAC address and
IP address are shown, however not only DHCP assigned devices are listed in the device list, any devices,
even those statically assigned, that are connected through the local network interface (RJ45) are
displayed, including those connected through a hub or switch.
The BulletPlus provides Cloud based content filtering and security using the third-party service by Open
DNS. OpenDNS is a service which offers free or premium DNS services with added security, phishing
protection and optional, advanced content filtering. To get started with OpenDNS an account must first be
created with OpenDNS by visiting their website.
Image 4-2-14: Network > Cloud Filtering
OpenDNS Cloud Filter
Enable or Disable the OpenDNS cloud based filtering & security.
Disable Bypassing OpenDNS
If enabled all clients connected through the BulletPlus will be forced to
use OpenDNS and is subject to any and all content filtering and
security, to prevent circumvention.
When Cloud Filter is enabled, this status will be refreshed every 30
seconds, showing the OpenDNS status. For OpenDNS to be active,
the status must be green and show "Connected to OpenDNS".
Enter the user name and password for the OpenDNS account that was
specified during registration and setup of the service.
The BulletPlus can provide comprehensive content filtering, limiting access to specific websites and other
content. By MAC Address, the BulletPlus allows content to be filtering regardless of the assigned IP
address. Filtering can also be applied on a entire network, limiting access to any connected device.
Enable or Disable the Webfilter of the BulletPlus.
Check Filter HTTPS will redirect all port 443 traffic into the webfilter.
(Please make sure system DNS works.)
Default setting can be used for MAC addresses where all addresses
may be allowed (Allow) with a few exceptions, or where all addresses
are block (Deny), with a few exceptions.
After a Default rule has been applied, exceptions can be added by
adding MAC Webfilter Rules.
Values
00:00:00:00:00:00 Allow
MAC Webfilter Rules
Add MAC Webfilter rules to apply filtering. If a default rule has been
added these rules can be used to specify exceptions. MAC Webfilter
Rules can also be applied to limit access to just one or a few websites
by simply adding the to the MAC Webfilter list without using a default
rule.
Name: Add a name for the MAC Webfilter Rule.
MAC Address: Enter the MAC Address to apply rule to.
Domain/URL/IP: Enter the Domain Name or URL of the website control access for, i.e.
www.company.com. To ensure the full domain is blocked, enter the most inclusive domain, i.e.
.company.com will block www.company.com and images.company.com and videos.company.com.
Alternatively you can use an IP address or address range written in CIDR notation, i.e. 8.8.8.0/24.
Action: Specify if the rule Allows access or Denies access to the specified address.
Rule Priority: The Rule Priority is used to determine the order rules are evaluated. Higher priority rules
(bigger number) are evaluated first and the first one to match has its assigned action taken."
Enabled: Enable or Disable the MAC Webfilter rule.
When a network is set to Allow (Blacklist) it will allow access to all sites
not blocked in the Filter Rules. Selecting Deny (Whitelist) will only
allow access to websites with an Allow action in the Filter rules, all
other sites will be blocked.
Values (selection)
Allow / Deny
MAC Webfilter Rules
Add Network Webfilter Rules to allow or deny access to specified
content. The Network rules work with the Network Webfilter Default
Settings.
Name: Add a name for the MAC Webfilter Rule.
Network: Select the local network for which the rule applies.
Domain/URL/IP: See description in MAC Filtering Rules above.
Action: See description in MAC Filtering Rules above.
Rule Priority: See description in MAC Filtering Rules above.
Enabled: Enable or Disable the Network Webfilter rule.
MultiWAN is used to manage the primary data connection used by the BulletPlus. In cases where a wired
WAN (ISP) is available it is generally used for the primary connection as data is usually cheaper (unlimited)
than a cellular connection. The BulletPlus can provide automatic failover services, switching the connection
(or default route) used for outside data.
Enable or disable the MultiWAN service on the BulletPlus. To use
MultiWAN, the WAN (wired) must be configured as independent in the
Network > WAN settings and/or the Wireless must be set to Client &
bound to the WIFI interface.
Define which connection is the primary network/internet connection for
the BulletPlus. Normally this is the wired WAN connection to an ISP.
Select which WAN connection is the secondary connection. When a
failure of the main WAN occurs this will be the first alternative.
Generally this will be the cellular connection.
The WiFi on the BulletPlus can be configured as a client and used as a
data connection to access the internet.
This is the frequency at which the BulletPlus will send ICMP packets to
the defined host to determine if the interface has failed.
It is possible for the BulletPlus to send out a notification when the
MultiWAN has switched its available connection and is routing data
through an alternate interface.
Values (selection)
WAN / Carrier / WIFI Client
Second WAN
Values (selection)
WAN/ 4G / WIFI
Third WAN
Values (selection)
WAN/ 4G / WIFI / Disable
Health Monitor Interval
Values (seconds)
20
Switch Notification
Values (selection)
Disable / Email / SMS / Both
Failover Settings (Same settings for WAN, WIFI Client and Carrier)
Select the type of failover detection to be used. By default ICMP is
used to ping a specified address(s), a DNS Lookup can also be
selected.
Values (selection)
ICMP / DNS Lookup
Host Name
Up to three(3) reachable addresses can be specified to test for link
health at the frequency specified above for the Health Monitor Interval.
A test button is provided to ensure that reachable address have been
entered and that there are no errors.
The Ping mode allows for the selected hosts to be pinged either
Sequentially or Simultaneously. This option is only displayed when the
failover mode is set to ICMP.
This is the amount of time the Health Monitor will wait for a response
from the ICMP Host (when type is configured as ICMP).
This is the number of attempts the BulletPlus will attempt to reach the
IMCP host before going into failover and switching WAN interfaces.
The BulletPlus will continue to monitor the failed interface, even after
failover has occurred. This defines the number of successful attempts
required before recovering the failed interface.
Recovery Immediate Mode / Wait
Once the preferred connection is again deemed available, it can be
specified to wait a configurable amount of time before restoring the
connection.
The Carrier Status window provides complete overview information related to the Cellular Carrier portion of
the BulletPlus. A variety of information can be found here, such as Activity Status, Network (Name of
Wireless Carrier connected), Data Service Type (WCDMA/HSPA/HSPA+/LTE etc), Frequency band,
Phone Number etc.
Not all statistics parameters displayed are applicable.
The Received and Transmitted bytes and packets indicate the respective amount of data which has been
moved through the radio.
The Error counts reflect those having occurred on the wireless link.
The parameters within the Carrier Configuration menu must be input properly; they are the most basic
requirement required by your cellular provider for network connectivity. The BulletPlus can support dual
SIM cards, as described below either slot can be specified as the primary slot and if a connectivity issue
occurs, the unit can be configured to automatically switch to the alternate SIM card.
Carrier Status is used to Enable or Disable the connection to the
Cellular Carrier. By default this option is enabled.
Allows a user to specify the MTU size for custom applications. In most
cases this will be left blank and the system will determine the best
value.
IP pass-through allows the WAN IP address to be assigned to the
device connected to the LAN or WAN ports. In this mode the Bullet is
for the most part transparent and forwards all traffic to the device
connected to the selected Ethernet port except that listed below:
The WebUI port (Default Port:TCP 80), this port is retained for remote
management of the Bullet. This port can be changed to a different port under
the System > Services Menu.
The SNMP Listening Port (Default Port: UDP 161).
Port Forwarding Rules. The BulletPlus forward to other internal modem
services (Iperf etc) by using X.X.X.1 for an internal IP Address.
The virtual IP address is configurable to allow access to the unit on the
LAN/WAN connector once IP-Passthrough has been enabled.
The firewall/rules must be configured to allow traffic, all incoming
carrier traffic is blocked by default.
The BulletPlus supports one or two SIM cards to be installed. By
default the primary SIM is the top SIM, and the unit will try to connect
using SIM1 first, and then if it fails to connect, or loses connection to a
valid carrier, it will then attempt SIM2.
Dual Cards Management
Values (Selection)
Disable
Ethernet (LAN)
WAN
SIM Selection
Values (Selection)
Dual SIM Cards
SIM Card-1 Only
SIM Card-2 Only
By default the Primary SIM is the SIM installed into the SIM1 slot on
the unit. The SIM card installed into the Primary slot will be the Cellular
Carrier in which the BulletPlus will attempt to make a connection with.
This can be modified here.
SIM Card-1 Settings
This feature allows the disabling or enable of data roaming. When data
roaming is enabled the modem will be allowed to use data when in
roaming status. It is not recommended to allow roaming unless the
appropriate data plans are in place.
In some cases, a user may want to lock onto a certain carrier. There
are four options to choose from: Auto, SIM based, Manual and Fixed.
Auto will allow the unit to pick the carrier automatically. Data roaming is
permitted.
SIM based will only allow the unit to connect to the network indicated by the
SIM card used in the unit.
Manual will scan for available carriers and allow a user to select from the
available carriers. It takes 2 to 3 minutes to complete a scan.
Fixed allows a user to enter the carrier code (numerical) directly and then the
unit will only connect to that carrier.
Select the valid types of Carrier connections allowed. For example if
set to auto the BulletPlus will connect to any data type. If set to
WCDMA only, the BulletPlus will only allow connection to WCDMA
related technologies, and not allow the device to connect to lesser
(slower) technologies.
APN (Access Point Name)
The APN is required by every Carrier in order to connect to their
networks. The APN defines the type of network the Bullet is connected
to and the service type. Most Carriers have more than one APN,
usually many, dependant on the types of service offered.
Values (Selection)
Auto
Based on SIM
Manual
Fixed
Technologies Mode
Values (Selection)
AUTO
WCDMA, LTE, GSM
GSM Only
WCDMA Only
LTE Only
WCDMA, GSM
LTE,WCDMA
WCDMA, LTE
LTE, GSM
Values (characters)
auto
Auto APN (default) may allow the unit to quickly connect to a carrier, by cycling through a predetermined
list of common APN’s. Auto APN will not work for private APN’s or for all carriers.
Advanced+
The SIM Pin is required for some international carriers. If supplied and
required by the cellular carrier, enter the SIM Pin here.
Sets the authentication type required to negotiate with peer.
PAP - Password Authentication Protocol.
CHAP - Challenge Handshake Authentication Protocol.
Only required if the carrier requires a User Name and Password.
A User Name may be required for authentication to a remote peer.
Although usually not required for dynamically assigned IP addresses
from the wireless carrier. Varies by carrier.
Enter the password for the user name above. May not be required by
some carriers, or APN’s
Network+
In some cases the Static IP address must be entered in this field if
assigned by a wireless carrier. In most cases the IP will be read from
the SIM card and this field should be left at the default value.
If enabled the Bullet with use the DNS server as specified
automatically by the service provider.
Values (characters)
Carrier/peer dependant
Password
Values (characters)
Carrier/peer dependant
IP Address
Values (IP Address)
(none)
Use Remote DNS
Values (selection)
Enable / Disable
Default Route
Use this interface as the default route for all outbound traffic unless
specified in the Network > Routes table.
Values (Selection)
Yes / No
DNS-Passthrough
When enabled DNS-Passthrough will pass on the WAN assigned DNS
information to the end device.
SIM Card-2 Settings
Settings for SIM Card-2 are identical to that of SIM Card-1, refer to the previous section for information on
how to configure SIM Card-2.
The SMS menu allows a user to view the SMS Command History and view the SMS messages on the SIM
Card.
Image 4-3-3: SMS > SMS Command History
4.3.4 Carrier > SMS Config
SMS messages can be used to remotely reboot or trigger events in the BulletPlus. SMS alerts can be set
up to get SMS messages based on system events such as Roaming status, RSSI,
Ethernet Link Status or IO Status.
This option allows a user to enable or disable to use of the following
SMS commands to reboot or trigger events in the BulletPlus:
MSC#REBOOT Reboot system
MSC#NMS Send NMS UDP Report
MSC#WEB Send web client inquiry
MSC#MIOP1 open I/O ouput1
MSC#MIOP2 open I/O ouput2
MSC#MIOC1 close I/O ouput1
MSC#MIOC2 close I/O ouput2
If enabled, the BulletPlus will only accept and execute commands
originating from the phone numbers in the Phone Filter List. Up to 6
numbers can be added.
Set the threshold for RSSI alerts. When the signal strength drops
below this threshold, an SMS alert will be sent to the number(s)
specified.
Enable or disable SMS Alerts for Roaming Status.
The BulletPlus can send alerts based on the roaming status. Data
rates during roaming can be expensive and it is important to know
when a device has started roaming.
Values (Selection)
Disable RSSI check
Enable RSSI check
Low Threshold (dBm)
Values (dBm)
-99
Carrier Network
Values (Selection)
Disable Roaming Check
Enable Roaming Check
Home / Roaming Status
Values (Selection)
In Roaming
Changed or In Roaming
Changed to Roaming
Enable or disable SMS Alerts for the Ethernet Link status of the LAN
RJ45 port.
The status of the Ethernet Link of the LAN (RJ45) can be used to send
SMS Alerts. The link status may indicate an issue with the connected
device.
SMS Alerts can be sent based on the state changes of the Digital I/O
lines.
Ethernet
Values (Selection)
Disable Ethernet check
Enable Ethernet check
Ethernet Link Status
Values (Selection)
Changed
In no-link
Changed or in no-link
Changed to no-link
The Data Usage tool on the BulletPlus allows users to monitor the amount of cellular data consumed.
Since cellular devices are generally billed based on the amount of data used, alerts can be triggered by
setting daily and/or monthly limits. Notifications can be sent using SMS or Email, allowing a early warning if
configurable limits are about to be exceeded. The usage data reported by the Data Usage Monitor may not
match the data reported by the carrier, but it gives the users an idea of the bandwidth consumed by the
BulletPlus.
If enabled the BulletPlus will track the amount of cellular data consumed. If
disabled, data is not recorded, even in the Current Data Usage display.
Select the notification method used to send alerts when daily or monthly
thresholds are exceeded. If none is selected, notifications will not be sent,
but data usage will be recorded for reference purposes.
Image 4-3-9: Data Usage > SMS Config
Monthly/Daily Data Unit
Select the data unit to be used for data usage monitoring.
Select the data limit for the day or month, used in connection with the data
unit is the previous field. If you want to set the limit to 250 Mbytes, select M
Bytes for the data unit, and 250 for the data limit.
Values (selection)
None
Send Notice SMS
Send Notice Email
Both SMS & Email
Values (selection)
Bytes / K Bytes / M Bytes
G Bytes
Data Limit
Values (1-65535)
500
For Monthly tracking, select the day the billing/data cycles begins. On this
day each month the BulletPlus will reset the data usage monitor numbers.
Up to two (2) additional notices can be sent based on a percentage (10500%) of the threshold value.
If SMS is selected as the notification method, enter the phone number to
send any SMS messages generated when the data usage exceeds the
configured limits.
If Email is selected as the notification method, enter the desired email
subject line for the notification email sent when daily and/or monthly usage
limits are exceeded.
If Email is selected as the notification method, enter the SMTP server
details for the account used to send the Email notifications. Domain or IP
address with the associated port as shown.
If Email is selected as the notification method, enter the username of the
Email account used to send Emails.
If Email is selected as the notification method, enter the password of the
Email account used to send Emails. Most email servers require
authentication on outgoing emails.
If Email is selected as the notification method, enter the password of the
Email account used to send Emails. Most email servers require
authentication on outgoing emails.
Values (string)
Daily/Monthly Data Usage
Notice
Mail Server(IP/Name)
Values (xxx:port)
smtp.gmail.com:465
Username
Values (username)
@gmail.com
Password
Values (string)
***
Authentication
Values (selection)
None
SSL/TLS
STARTTLS
SSL/TLS + STARTTLS
Enter the email address of the individual or distribution list to send the
email notification to.
The BulletPlus provides a Odometer that shows the total data used by the BulletPlus. You can also click on
the More link to get a data usage history summary as seen below.
The Status window gives a summary of all radio or wireless related settings and connections.
The General Status section shows the Wireless MAC address of the current radio, the Operating Mode
(Access Point, Client), the SSID being used, frequency channel information and the type of security used.
Traffic Status shows statistics about the transmitted and received data.
The BulletPlus shows information about all Wireless connections in the Connection Info section. The
Wireless MAC address, Noise Floor, Signal to Noise ratio (SNR), Signal Strength (RSSI), The transmit and
receive Client Connection Quality (CCQ), TX and RX data rates, and a graphical representation of the
signal level or quality.
The top section of the Wireless Configuration allows for the configuration of the physical radio module. You
can turn the radio on or off, and select the channel bandwidth and frequency as seen below.
Image 4-4-2: Wireless > Radio Configuration
This option is used to turn the radio module on or off. If turned off
Wireless connections can not be made. The default is On.
The Mode defines which wireless standard to use for the wireless
network. The BulletPlus supports 802.11/b/g/n modes as seen here.
Select the appropriate operating mode from the list.
The options below are dependant and vary on the operating mode
chosen here.
Only appears when using 802.11b or b/g modes. Lower channel
bandwidths may provide longer range and be less susceptible to noise
but at the trade off of data rates. Higher channel bandwidth may
provide greater data rates but will be more susceptible to noise and
shorter distance potentials.
Select HT20 for a 20MHz channel, or HT40 for a 40 MHz Channel.
The 40MHz channel is comprised of 2 adjacent 20MHz channels and
the + and—designate to use the higher or lower of the adjacent
channels.
Advanced Capabilities (Only shown if box is checked)
MPDU Aggregation (Enable/Disable) - Allows multiple data frames to be sent in a single transmission
block, allowing for acknowledging or retransmitting if errors occur.
Short GI (Enable/Disable) - GI (guard interval) is the time the receiver waits for any RF reflections to settle
before sampling data. Enabling a short GI (400ns) can increase throughput, but can also increase the error
rate in some installations.
HT Capabilities Info - TX-STBC RX-STBC1 DSSS_CCK-40
Maximum AMSDU (byte) - 3839
Maximum AMPDU (byte) - 65535
Values (selection)
HT20
HT40HT40+
Channel-Freq
The Channel-Freq setting allows configuration of which channel to
operate on, auto can be chosen where the unit will automatically pick a
channel to operate. If a link cannot be established it will try another
channel.
This setting establishes the transmit power level which will be
presented to the antenna connectors at the rear of the BulletPlus.
Unless required, the Tx Power should be set not for maximum, but
rather for the minimum value required to maintain an adequate system
fade margin.
Refer to FCC (or as
otherwise applicable)
regulations to ascertain,
and not operate beyond,
the maximum allowable
transmitter output power
and effective isotropic
radiated power (EIRP).
The Wireless Distance parameter allows a user to set the expected
distance the WiFi signal needs to travel. The default is 100m, so the
BulletPlus will assume that the signal may need to travel up to 100m
so it sets various internal timeouts to account for this travel time.
Longer distances will require a higher setting, and shorter distances
may perform better if the setting is reduced.
Once the RTS Threshold defined packet size is reached, the system
will invoke RTS/CTS flow control. A large RTS Threshold will improve
bandwidth, while a smaller RTS Threshold will help the system recover
from interference or collisions caused by obstructions.
Fragment Thr (256 ~ 2346)
The Fragmentation Threshold allows the system to change the
maximum RF packet size. Increasing the RF packet size reduces the
need to break packets into smaller fragments. Increasing the
fragmentation threshold slightly may improve performance if a high
packet error rate is experienced.
The Clear Channel Assessment uses carrier sense and energy
detection to determine if a channel/medium is available for
transmission. Changing the threshold will impact how the BulletPlus
Wifi determines channel availability.
The bottom section of the Wireless Configuration provides for the configuration of the Operating Mode of
the Wireless Interface, the TX power, Wireless Network information, and Wireless Encryption. The
BulletPlus can support multiple virtual interfaces. These interfaces provide different SSID’s for different
users, and can also be assigned to separate subnets (Network Interfaces) to prevent groups from
interacting.
Image 4-4-3: Wireless > Radio Configuration
Network
Choose between LAN or WAN for the Virtual Interface. If additional
Network Interfaces have been defined in the Network > LAN section,
the Interface name will also appear here.
Values (selection)
LAN
WAN
Etc..
(Additional Interfaces…)
Mode
Access Point - An Access Point may provide a wireless data
connection to many clients, such as stations, repeaters, or other
supported wireless devices such as laptops etc.
If more than 1 Virtual Interface (more than 1 SSID) has been defined,
the BulletPlus can ONLY operate as a Access Point, and will be
locked into this mode.
Station/Client - A Station may sustain one wireless connection, i.e. to an Access Point.
Repeater - A Repeater can be connected to an Access Point to extend the range and provide a
wireless data connection to many clients, such as stations.
Disabling the SSID broadcast helps secure the wireless network.
Enabling the broadcast of the SSID (Network Name) will permit others
to ‘see’ the wireless network and perhaps attempt to ‘join’ it.
When AP Isolation is enabled wireless devices connected to this SSID
will not be able to communicate with each other. In other words if the
BulletPlus is being used as a Hot Spot for many wireless clients, AP
Isolation would provide security for those clients by not allowing
access to any other wireless device.
WiFi Multimedia (WMM) is a feature that enhances the quality of
service on a network by prioritizing data packets according to data
type. (Video, Voice, Best Effort, Background).
network. In an open wireless
network, the SSID is
broadcast; in a closed system
it is not. The SSID must be
known by a potential client for
it to be able to access the
wireless network.
Change the default value for
the Network Name to
something unique for your
network. Do this for an
added measure of security
and to differentiate your
network from others which
may be operating nearby.
All devices connecting to the BulletPlus in a given network must use
the SSID of the BulletPlus. This unique network address is not only a
security feature for a particular network, but also allows other networks
- with their own unique network address - to operate in the same
area without the possibility of undesired data exchange between
networks.
The encryption types defines the type of security used for the Wireless
Interface, to join a network a device must know the correct password/
passphrase/key.
Security options are dependent on the version type. This section
describes all available options. Export versions may not have all
optional available to meet regulatory requirements set government
policies.
This is the password, or preshared key that is required by any device
to connect to the wireless interface of the BulletPlus. It is strongly recommended to always have a password defined, and changed from
the factory default.
Check this box to show the currently configured password for WPA/
WPA2 encryption passphrase.
If using Enterprise (RADIUS) encryption, enter the IP Address of the
RADIUS authentication server here.
If using Enterprise (RADIUS) encryption, enter the port number of the
RADIUS authentication server here.
This is the password, or preshared key that is required by any device
to connect to the wireless interface of the BulletPlus. It is strongly recommended to always have a password defined, and changed from
the factory default.
The Wireless Hotspot configuration is used when providing public hotspot services and it is required to use
a server or web based authentication service to verify users, provide terms of use or other information
Use this option to enable or disable the hotspot authentication service.
There are three different options for the Hotspot Mode:
Simple Internal - Display a simple text based terms of use or
statement to connected users.
Simple External - Display an external webpage
RADIUS/UAM - Use a 3rd Party Authentication service to
authenticate and/or prompt users to agree to terms of
service.
If the Hotspot Mode, RADIUS/UAM is chosen, specify the hotspot URL
as given by your service provider. The address of the UAM Server, the
authentication portal.
If the Hotspot Mode, RADIUS/UAM is chosen, this is a secret
password between the Redirect URL and the Hotspot given by the
hotspot provider.
This field is used to specify which configured network is bonded to the
hotspot. Sub networks can be created in the Network > LAN menu,
which are dedicated to the hotspot devices.
*The DHCP service for the network used should be turned off as all IP
address assignments will be made by the hotspot service provider.*
Specify the IP Address of the Hotspot application. All hotspot clients
will get an IP address in the same network as the Hotspot.
Specify the Netmask of the Hotspot application. All hotspot clients will
get an IP address in the same network as the Hotspot.
Provide your service providers 1st DNS Server domain.
Values
Varies
Network IP Address
Values
192.168.182.0
Network Netmask
Values
255.255.255.0
DNS Domain
Values
Key.chillispot.info
Primary DNS
Specify the Primary DNS server to be used by devices connected to
the Hotspot network.
Values
208.67.222.222
Secondary DNS
Specify the Secondary DNS server to be used by devices connected
to the Hotspot network.
Values
208.67.222.220
DHCP Start
When devices connect to the BulletPlus Wifi and Hotspot is enabled,
the Hotspot will assign the IP addresses to the connected devices,
select the starting range here.
Values
3
DHCP End
When devices connect to the BulletPlus Wifi and Hotspot is enabled,
the Hotspot will assign the IP addresses to the connected devices,
select the ending range here.
The Firewall Summary allows a user to see detailed information about how the firewall is operating. The
All, Filter, Nat, Raw, and Mangle options can be used to view different aspects of the firewall.
The General Firewall settings allow users to enable or disable the firewall, and to decide which areas of the
modem to protect. The Firewall can also be reset to factory defaults from this area of the WebUI.
In a cellular device such as this, it is highly recommended to configure the firewall to protect any devices
connected to the modem, and to control data usage. This is especially important with units set up with a
public IP address as the modem is effectively on the public internet and is susceptible to a wide range of
threats which may severely impact the data usage. This can be avoided by blocking all Cellular traffic and
setting up specific rules to either open only used ports, or even restrict access to specific IP/networks.
For best practices and to
control data usage it is
critical that the firewall be
configured properly.
It is recommended to block
all incoming Cellular traffic
and create rules to open
specific ports and/or use
ACL lists to limit incoming
connections.
When Carrier Request is
set to ‘Allow’ the modem is
open to anyone, this is not
recommended as it may
impact data usage from
unwanted sources.
Image 4-5-2: Firewall > General
WAN Remote Management
Allow remote management of the BulletPlus on the WAN side using the
WebUI on port 80(HTTP), and 443 (HTTPS). If disabled, the configuration
can only be accessed from the LAN (or Cellular if enabled)..
Carrier Remote Management
Allow remote management of the BulletPlus from the Cellular side of using
the WebUI on port 80(HTTP), and 443 (HTTPS). If disabled, the
configuration can only be accessed from the LAN (or WAN if enabled)..
When Blocked the BulletPlus will block all requests from devices on the
WAN unless specified otherwise in the Access Rules, MAC List, IP List
configurations. Access to ports 80 (HTTP) and 443 (HTTPS-if enabled), is
still available unless disabled in the WAN Remote Management option.
When Blocked all requests from devices on the Cellular (Wireless Carrier)
side will be blocked, unless specified otherwise in the Access Rules, MAC
List, IP List configurations. Access to ports 80 (HTTP) and 443 (HTTPS-if
enabled), is still available unless disabled in the 4GRemote Management
option.
Allows or Blocks traffic from the LAN accessing the WAN unless specified
otherwise using the Access Rules, MAC, and IP List configuration.
LAN to Carrier Access Control
Allows or Blocks traffic from the LAN accessing the Cell connection unless
specified otherwise using the Access Rules, MAC, and IP List
configuration.
The Anti-Spoof protection is to create some firewall rules assigned to the
external interface (WAN & Cellular) of the firewall that examines the source
address of all packets crossing that interface coming from outside. If the
address belongs to the internal network or the firewall itself, the packet is
dropped.
Packet Normalization is the normalization of packets so there are no
ambiguities in interpretation by the ultimate destination of the packet. The
scrub directive also reassembled fragmented packets, protecting some
operating systems from some forms of attack, and drops TCP packets that
have invalid flag combinations.
The BulletPlus can be used to provide remote access to connected devices. To access these devices a
user must define how incoming traffic is handled by the BulletPlus. If all incoming traffic is intended for a
specific connected device, DMZ could be used to simplify the process, as all incoming traffic can be
directed towards a specific IP address.
In the case where there is multiple devices, or only specific ports need to be passed, Port forwarding is
used to forward traffic coming in from the WAN (Cellular) to specific IP Addresses and Ports on the LAN.
Port forwarding can be used in combination with other firewall features, but the Firewall must be enabled
for Port forwarding to be in effect. If the WAN Request is blocked on the General Tab, additional rules and/
or IP Lists must be set up to allow the port forwarding traffic to pass through the firewall.
IP-Passthrough (Carrier > Settings) is another option for passing traffic through the BulletPlus, in this case
all traffic is passed to a single device connected to the RJ45 port of the BulletPlus, The device must be set
for DHCP, as the BulletPlus assigns the WAN IP to the device, and the modem enters into a transparent
mode, routing all traffic to the RJ45 port. This option bypasses all firewall features of the BulletPlus, as well
as all other features of the BulletPlus such as COM, VPN, GPS etc.
If DMZ is enabled and an
exception port for the WebUI
is not specified, remote
management will not be
possible. The default port for
remote management is TCP
If the firewall is set to block
incoming traffic on the WAN
and/or Carrier interfaces,
additional rules or IP/MAC
lists must be configured to
allow desired traffic access.
Enable or disable DMZ Mode. DMZ can be used to forward all traffic to the
DMZ Server IP listed below.
Enter the IP address of the device on the LAN side of the BulletPlus where
all the traffic will be forwarded to.
Enter a exception port number that will NOT be forwarded to the DMZ
server IP. Usually a configuration or remote management port that is
excluded to retain external control of the BulletPlus.
Firewall Port Forwarding Configuration
This is simply a field where a convenient reference or description is added
to the rule. Each Forward must have a unique rule name and can use up to
10 characters.
Values (selection)
Disable / Enable
DMZ Server IP
Values (IP Address)
192.168.100.100
Exception Port
Values (Port #)
0
Name
Values (10 chars)
Forward
Source
Select the source for the traffic, from either the 3G/Cellular or from the
WAN.
Enter the IP address of the intended internal (i.e. on LAN side of
BulletPlus) server. This is the IP address of the device you are forwarding
traffic to.
Target port number of the internal server on the LAN IP entered above.
Select the type of transport protocol used. For example Telnet uses TCP,
SNMP uses UDP, etc.
Port number of the incoming request (from 4G/WAN-side).
MAC List configuration can be used to control which physical LAN devices can access the ports on the
BulletPlus, by restricting or allowing connections based on the MAC address. IP List configuration can be
used to define who or what can access the BulletPlus, by restricting or allowing connections based on the
IP Address/Subnet.
MAC-IP List can be used alone or in combination with LAN to WAN/4G Access Control to provide secure
access to the physical ports of the BulletPlus.
Firewall MAC List Configuration
The Rule Name field is required to give the rule a convenient name for
reference. Each rule must have a unique name, up to 10 characters in
length.
Specify the MAC Address to be added to the list. Must be entered in the
correct format as seen above. Not case sensitive.
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP (quietly
dropped), will refuse connections.
Firewall IP List Configuration
The Rule Name field is required to give the rule a convenient name for
reference. Each rule must have a unique name, up to 10 characters in
length.
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP (quietly
dropped), will refuse connections.
Enter the specific zone that the IP List will apply to, Cellular, LAN, WAN or
None (both).
Values (selection)
ACCEPT
DROP
REJECT
Rule Name
Values (10 chars)
IP_List
Action
Values (selection)
ACCEPT / DROP / REJECT
Source
Values (Selection)
LAN/LAN1/WAN/Cell/USB
NONE
Match incoming traffic from the specified source IP range. Boxes accept
single IP Addresses without network masks, example: 192.168.1.0 to
192.168.1.255 represents all IP Addresses in the 192.168.1.0/24 network.
(Put same IP in both boxes for a single IP match.)
Once the firewall is turned on, rules configuration can be used to define specific rules on how local and
remote devices access different ports and services. MAC List and IP List are used for general access, and
are applied before rules are processed.
It is highly recommended to block as much traffic as possible from the modem, especially when using a
public IP address. The best security would to be to allow traffic only from trusted IP addresses, and only
the specific ports being used, and block everything else. Not configuring the firewall and the firewall rules
correctly could result in unpredictable data charges from the cellular carrier.
Refer to Appendix D for an
example of how to set up a
firewall to block all
connections and then add
access to only specific IP’s
and Ports.
Appendix D: Firewall
Example
Image 4-5-6: Firewall > Rules
Rule Name
The rule name is used to identify the created rule. Each rule must have a
unique name and up to 10 characters can be used.
Values (10 Chars)
characters
Action
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP
(quietly dropped), will refuse connections.
This is configured based on how the WAN/Carrier Request and LAN to
WAN/Carrier Access Control are configured in the previous menus.
Values (selection)
ACCEPT
DROP
REJECT
Source
Select the zone which is to be the source of the data traffic. The LAN/
LAN1 refers to local connections on the BulletPlus.
Match incoming traffic from the specified source IP range. Boxes accept
single IP Addresses without network masks, example: 192.168.1.0 to
192.168.1.255 represents all IP Addresses in the 192.168.1.0/24 network.
(Put same IP in both boxes for a single IP match.)
Select the zone which is the intended destination of the data traffic. 3G/4G
applies to the wireless connection to the cellular carrier and the LAN,
LAN1, USB refers to local connections on the BulletPlus.
Match incoming traffic from the specified destination IP range. Boxes
accept single IP Addresses without network masks, example: 192.168.1.0
to 192.168.1.255 represents all IP Addresses in the 192.168.1.0/24
network. (Put same IP in both boxes for a single IP match.)
Match incoming traffic directed at the given destination port or port range.
(To specify a port range use a From:To (100:200) format)
Values (IP Address)
192.168.0.0 to
192.168.0.0
Destination
Values (selection)
LAN/LAN1/Cell/WAN/USB
None
Destination IPs
Values (IP Address)
192.168.0.0 to
192.168.0.0
Destination Port
Values (port)
0
The protocol field defines the transport protocol type controlled by the rule.
A Virtual Private Network (VPN) may be configured to enable a tunnel between the BulletPlus and a
remote network. The BulletPlus supports VPN IPsec Gateway to Gateway (site-to-site) tunneling, meaning
you are using the BulletPlus to create a tunnel to a network with VPN capabilities (Another BulletPlus or
VPN capable device). The BulletPlus can also operate as a L2TP Server, allowing users to VPN into the
unit from a remote PC, and a L2TP Client.
Used to enable (checked) is disable (unchecked) the VPN tunnel.
Values (checkbox)
Enable (Checked)
Local Group Setup
Local Security Gateway Type
Specify the method for identifying the router to establish the VPN tunnel.
The Local Security Gateway is on this router; the Remote Security
Gateway is on the other router. At least one of the routers must have either
a static IP address or a dynamic IP with server id to make a connection.
IP Only: Choose this option if this router has a static WAN IP address. The WAN IP address appears
automatically. For the Remote Security Gateway Type, an extra field appears. If you know the IP address
of the remote VPN router, choose IP Address, and then enter the address.
IP + Server ID: Choose this option if this router has a static WAN IP address and a server id. The WAN IP
address appears automatically. For the Remote Security Gateway Type, an extra field appears. If you
know the IP address of the remote VPN router, choose IP Address, and then enter the address.
Dynamic IP + Server ID: Choose this option if this router has a dynamic IP address and a server id
(available such as @microhard.vpn). Enter the server id to use for authentication. The server id can be
used only for one tunnel connection.
Values (selection)
IP Only
IP + Server ID
Dynamic IP + Server ID
Interface IP Address
Displays the IP address of the BulletPlus, which is the local VPN Gateway.
This option appears when the Local Security Gateway Type specifies that
the Server ID is required for the connection. The Server ID must be in the
format @name, where name can be anything. Both routers must know
each others names to establish a connection.
Next-hop Gateway means the next-hop gateway IP address for the local or
remote gateway participant's connection to the public network.
Define the local network by specifying the local subnet. The local and
remote routers must use different subnets.
Specify the subnet mask of the local network address.
Group Subnet Gateway
Enter the Gateway for the local group network.
Remote Group Setup
Remote Security Gateway Type
Specify the method for identifying the router to establish the VPN tunnel.
The Local Security Gateway is on this router; the Remote Security
Gateway is on the other router. At least one of the routers must have either
a static IP address or a dynamic IP with server id to make a connection.
(See Local Group Setup for details)
If the remote VPN router has a static IP address, enter the IP address of
the remote VPN Gateway here.
Values (IP Address)
255.255.255.0
Values (IP Address)
(no default)
Values (selection)
IP Only
IP + Server ID
Dynamic IP + Server ID
Gateway IP Address
Values (IP Address)
(no default)
This option appears when the Remote Security Gateway Type specifies
that the Server ID is required for the connection. The Server ID must be in
the format @name, where name can be anything. Both routers must know
each others names to establish a connection.
Next-hop Gateway means the next-hop gateway IP address for the local or
remote gateway participant's connection to the public network.
Define the remote network by specifying the local subnet.
Specify the subnet mask of the remote network address.
This will display the current BulletPlus WAN (Cellular) IP Address.
Remote Gateway IP Address
Enter the IP Address of the Remote Gateway that you wish to establish a
connection with.
Some servers require that you know the Server ID as well as the IP
address. Enter the Server ID of the remote router here.
In order to communicate with the devices on the other side of the tunnel,
the BulletPlus must know which data to pass through the tunnel, to do this
enter the Remote Subnet network IP address here.
Enter the Remote Subnet Mask
Values (IP Address)
Current IP
Values (IP Address)
none
Remote Server ID
Values
none
Remote Subnet IP
Values (IP Address)
none
Remote Subnet Mask
Values (IP Address)
Idle time before hanging up
Enter the Idle time (in seconds) to wait before giving up the PPP
connection. The default is 0, which means the time is infinite. (0—65535)
Enter the Username
The preshared key is required to connect to the L2TP Server.
IPSec Setup - See previous sections for additional info.
The BulletPlus supports OpenVPN and can be configured as a Server or a Client. This section outlines the
configuration of a OpenVPN Server.
Enable/Disable the OpenVPN Mode by selecting the mode to operate in,
Client or Server. When the Server is enabled it will be listening for incoming
connection requests from OpenVPN Clients.
The TCP/UDP port which the server is listening on. Default is 1194
If enabled (Auto) the server will push its DNS server information to the
client. Manual allows the DNS information to be manually entered.
When select yes, the clients will not see each other. Select no, it will allow
different clients to be able to "see" each other. By default, clients will only
see the server.
Keep Alive Ping Interval
The keep alive directive causes ping-like messages to be sent back and
forth over the link so that each side knows when the other side has gone
down. Default 10 seconds.
Default 120 seconds. Ping every 10 seconds, assume that remote peer is
down if no ping received during a 120 second time period. (must be at least
twice the interval specified above)
Select a cryptographic cipher. Must be the same on Server and Client.
Enable/Disable LZO compression on the VPN link. Lempel–Ziv–
Oberhumer (LZO) is a lossless data compression algorithm.
OpenVPN support multiple subnet behind server/client. So that the vpn
connection can reach the subnet behind. Each subnet must be specified to
the data can be routed correctly.