Microhard Systems Inc. warrants that each product will be free of defects in material and workmanship for a period of one (1)
year for its products. The warranty commences on the date the product is shipped by Microhard Systems Inc. Microhard Systems
Inc.’s sole liability and responsibility under this warranty is to repair or replace any product which is returned to it by the Buyer
and which Microhard Systems Inc. determines does not conform to the warranty. Product returned to Microhard Systems Inc. for
warranty service will be shipped to Microhard Systems Inc. at Buyer’s expense and will be returned to Buyer at Microhard Systems Inc.’s expense. In no event shall Microhard Systems Inc. be responsible under this warranty for any defect which is caus ed
by negligence, misuse or mistreatment of a product or for any unit which has been altered or modified in any way. The warranty
of replacement shall terminate with the warranty of the product.
Warranty Disclaims
Microhard Systems Inc. makes no warranties of any nature of kind, expressed or implied, with respect to the hardware, software,
and/or products and hereby disclaims any and all such warranties, including but not limited to warranty of non-infringement,
implied warranties of merchantability for a particular purpose, any interruption or loss of the hardware, software, and/or product,
any delay in providing the hardware, software, and/or product or correcting any defect in the hardware, software, and/or product,
or any other warranty. The Purchaser represents and warrants that Microhard Systems Inc. has not made any such warranties to
the Purchaser or its agents MICROHARD SYSTEMS INC. EXPRESS WARRANTY TO BUYER CONSTITUTES MICRO-
HARD SYSTEMS INC. SOLE LIABILITY AND THE BUYER’S SOLE REMEDIES. EXCEPT AS THUS PROVIDED, MI-
CROHARD SYSTEMS INC. DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PROMISE.
MICROHARD SYSTEMS INC. PRODUCTS ARE NOT DESIGNED OR INTENDED TO BE USED IN
ANY LIFE SUPPORT RELATED DEVICE OR SYSTEM RELATED FUNCTIONS NOR AS PART OF
ANY OTHER CRITICAL SYSTEM AND ARE GRANTED NO FUNCTIONAL WARRANTY.
Indemnification
The Purchaser shall indemnify Microhard Systems Inc. and its respective directors, officers, employees, successors and assigns
including any subsidiaries, related corporations, or affiliates, shall be released and discharged from any and all manner of action,
causes of action, liability, losses, damages, suits, dues, sums of money, expenses (including legal fees), general damages, special
damages, including without limitation, claims for personal injuries, death or property damage related to the products sold hereunder, costs and demands of every and any kind and nature whatsoever at law.
IN NO EVENT WILL MICROHARD SYSTEMS INC. BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL,
INCIDENTAL, BUSINESS INTERRUPTION, CATASTROPHIC, PUNITIVE OR OTHER DAMAGES WHICH MAY BE
CLAIMED TO ARISE IN CONNECTION WITH THE HARDWARE, REGARDLESS OF THE LEGAL THEORY BEHIND
SUCH CLAIMS, WHETHER IN TORT, CONTRACT OR UNDER ANY APPLICABLE STATUTORY OR REGULATORY
LAWS, RULES, REGULATIONS, EXECUTIVE OR ADMINISTRATIVE ORDERS OR DECLARATIONS OR OTHERWISE, EVEN IF MICROHARD SYSTEMS INC. HAS BEEN ADVISED OR OTHERWISE HAS KNOWLEDGE OF THE
POSSIBILITY OF SUCH DAMAGES AND TAKES NO ACTION TO PREVENT OR MINIMIZE SUCH DAMAGES. IN THE
EVENT THAT REGARDLESS OF THE WARRANTY DISCLAIMERS AND HOLD HARMLESS PROVISIONS INCLUDED
ABOVE MICROHARD SYSTEMS INC. IS SOMEHOW HELD LIABLE OR RESPONSIBLE FOR ANY DAMAGE OR INJURY, MICROHARD SYSTEMS INC.'S LIABILITY FOR ANYDAMAGES SHALL NOT EXCEED THE PROFIT REALIZED BY MICROHARD SYSTEMS INC. ON THE SALE OR PROVISION OF THE HARDWARE TO THE CUSTOMER.
Proprietary Rights
The Buyer hereby acknowledges that Microhard Systems Inc. has a proprietary interest and intellectual property rights in the
Hardware, Software and/or Products. The Purchaser shall not (i) remove any copyright, trade secret, trademark or other evidence
of Microhard Systems Inc.’s ownership or proprietary interest or confidentiality other proprietary notices contained on, or i n, the
Hardware, Software or Products, (ii) reproduce or modify any Hardware, Software or Products or make any copies thereof, (iii)
reverse assemble, reverse engineer or decompile any Software or copy thereof in whole or in part, (iv) sell, transfer or otherwise
make available to others the Hardware, Software, or Products or documentation thereof or any copy thereof, except in accordance
with this Agreement.
It is assumed that users of the products described herein have either system integration or
design experience, as well as an understanding of the fundamentals of radio communications.
Throughout this manual you will encounter not only illustrations (that further elaborate on the
accompanying text), but also several symbols which you should be attentive to:
Caution or Warning
Usually advises against some action which could result in undesired or
detrimental consequences.
Point to Remember
Highlights a key feature, point, or step which is noteworthy. Keeping
these in mind will simplify or enhance device usage.
Tip
An idea or suggestion to improve efficiency or enhance usefulness.
Information
Information regarding a particular technology or concept.
To satisfy FCC RF exposure requirements for mobile transmitting devices, a separation distance of 23cm or more should be maintained
between the antenna of this device and persons during device operation. To ensure compliance, operations at closer than this distance is not
recommended. The antenna being used for this transmitter must not be co-located in conjunction with any other antenna or transmitter.
Pour satisfaire aux exigences de la FCC d'exposition RF pour les appareils mobiles de transmission, une distance de séparation de 23cm ou
WARNING
WARNING
plus doit être maintenue entre l'antenne de cet appareil et les personnes au cours de fonctionnement du dispositif. Pour assurer le respect,
les opérations de plus près que cette distance n'est pas recommandée. L'antenne utilisée pour ce transmetteur ne doit pas être co-localisés
en conjonction avec toute autre antenne ou transmetteur.
MAXIMUM EIRP
FCC Regulations allow up to 36dBm Effective Isotropic Radiated Power (EIRP). Therefore, the sum of the transmitted power (in dBm), the
cabling loss and the antenna gain cannot exceed 36dBm.
Réglementation de la FCC permettra à 36dBm Puissance isotrope rayonnée équivalente (EIRP). Par conséquent, la somme de la puissance
transmise (en dBm), la perte de câblage et le gain d'antenne ne peut pas dépasser 36dBm.
EQUIPMENT LABELING / ÉTIQUETAGE DE L'ÉQUIPEMENT
This device has been modularly approved. The manufacturer, product name, and FCC and Industry Canada identifiers of this product must
appear on the outside label of the end-user equipment.
WARNING
Ce dispositif a été approuvé de façon modulaire. Le fabricant, le nom du produit, et la FCC et de l'Industrie du Canada identifiants de ce
produit doit figurer sur l'étiquette à l'extérieur de l'équipement de l'utilisateur final.
SAMPLE LABEL REQUIREMENT / EXIGENCE D'ÉTIQUETTE :
IPn3G Version 2 IPn3G Version 1
FCCID: RI7T56KL1
IC: 5131A-KL1
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference,
and (2) this device must accept any interference
received including interference that may cause
undesired operation.
FCCID: IHDT56KL1
IC: 109O-KL1
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference,
and (2) this device must accept any interference
received including interference that may cause
undesired operation.
IPn3Gb
FCCID: XPYLISAU230
IC: 8595A-LISAU230
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference,
and (2) this device must accept any interference
received including interference that may cause
undesired operation.
Please Note: These are only sample labels; different products contain different identifiers. The actual identifiers should
be seen on your devices if applicable.
S'il vous plaît noter: Ce sont des exemples d'étiquettes seulement; différents produits contiennent des identifiants
différents. Les identifiants réels devrait être vu sur vos périphériques le cas échéant.
2.0 New menu format, Added AT Commands, UDP Reporting (v1.1.10-r1036) PEH Sept 2011
2.1 Added AT Command Syntax for each command, Added SMS At Commands PEH Feb 2012
2.2 Updated to reflect changes in v1.2.2-r1045. SMS, SMS Alerts, GRE, Added info on SNMP MIB,
Backup/Restore, System conf etc
2.3 Updated FCC & IC ID’s, Misc Screen Shots, FormattingPEH Feb 2012
2.4 Updated SNMP MIB PEH Feb 2012
2.41 Removed references to Appendix D in Regulatory Info. PEH Mar 2012
2.5 Added Digital I/O, COM Logging, Event NMS Support, Management, Scheduled Reboots, SMS,
PPP, Email Updates, Screen Shots etc. v1.2.4-r1058
2.6 Added System > History (RSSI, EC/NO, Temp, VDC logs), System Reboot History, Network >
Ethernet Port Status. V2.0.0-r2002b
2.61 Fixed links in TOC PEH July 2012
2.7 Updated NMS Configuration and related info, Syslog, Static Routing, updated screen shots, etc.
V2.0.18-r2040, added Appendix on IP-Passthrough, Port Forwarding, added GPS to Serial.
2.8 Updated to reflect changes up to v2.0.28-r2070. Added History > Frequency ,Updated Network
DHCP Lease time, MAC binding, Updated Carrier > Frequency, Added Security > Certificate Management, Updated VPN, Updated GRE, Added Modbus, Added Power Saving. Misc formatting,
updated screen shots throughout.
2.81 Added PoE, for units shipped after March 1, 2013 PEH Jul 2013
2.9 Added Data Usage, Local Monitor, VPN Appendix, Firewall Appendix, Troubleshooting Appendix,
updated screen shots, added Modbus options to serial port, added SMS Control Commands, AT
Commands, misc corrections & formatting. Changes current up to firmware v2.0.44 -r2090.
3.0 Added FCC ID for IPn3Gb, Added additional spec data for IPn3Gb PEH Jan 2014
3.1 Additional updates for IPn3Gb, Updated to reflect firmware v2.2.0-r2102. Updated Carrier Config,
Added Wireless Bus to COM1.
CSA Class 1 Division 2 is Available Only on Specifically Marked Units
If marked this for Class 1 Division 2 – then this product is available for use in Class 1 Division 2, in the indicated Groups on the
product.
In such a case the following must be met:
The transceiver is not acceptable as a stand-alone unit for use in hazardous locations. The transceiver must be mounted within a
separate enclosure, which is suitable for the intended application. Mounting the units within an approved enclosure that is c ertified
for hazardous locations, or is installed within guidelines in accordance with CSA rules and local electrical and fire code, will ensure
a safe and compliant installation.
The antenna feed line; DC power cable and interface cable must be routed through conduit in accordance with the National
Electrical Code.
Do not connect or disconnect equipment unless power has been switched off or the area is known tobe non-hazardous.
Installation, operation and maintenance of the transceiver should be in accordance with the transceiver’s installation manual, and
the National Electrical Code.
Tampering or replacement with non-factory components may adversely affect the safe use of the transceiver in hazardous
locations, and may void the approval.
The wall adapters supplied with your transceivers are NOT Class 1 Division 2 approved, and therefore, power must be supplied to
the units using the screw-type or locking type connectors supplied from Microhard Systems Inc. and a Class 1 Division 2 power
source within your panel.
If you are unsure as to the specific wiring and installation guidelines for Class 1 Division 2 codes, contact CSA International.
CSA Classe 1 Division 2 est disponible uniquement sur les unités particulièrement
marquées
Si marqué cette Classe 1 Division 2 - alors ce produit est disponible pour une utilisation en Classe 1 Division 2 , dans les groupes
indiqués sur le produit .
Dans un tel cas, la suivante doit être remplie:
L'émetteur-récepteur n'est pas acceptable comme une unité autonome pour une utilisation dans des endroits dangereux .
L'émetteur-récepteur doit être monté dans un boîtier séparé , qui est approprié pour l'application envisagée. Montage des unités
dans une enceinte approuvée qui est certifié pour les emplacements dangereux , ou est installé à l'intérieur des lignes directrices ,
conformément aux règles de la CSA et le code électrique local et le feu , assurera une installation sûre et conforme .
La ligne d'alimentation d'antenne , câble d'alimentation CC et le câble d'interface doivent être acheminés à travers le conduit en
conformité avec le National Electrical Code .
Ne pas connecter ou déconnecter l'équipement que l'alimentation est coupée ou que la zone est connue pour être non
dangereux .
Installation, l'exploitation et la maintenance de l'émetteur-récepteur doivent être en conformité avec le manuel d'installation de
l'émetteur-récepteur , et le National Electrical Code .
Falsification ou le remplacement des composants non - usine peut nuire à l'utilisation sécuritaire de l'émetteur-récepteur dans des
endroits dangereux , et peut annuler l'approbation .
Les adaptateurs muraux fournis avec les émetteurs-récepteurs sont PAS classe 1, division 2 ont approuvé , et par conséquent,
doit être alimenté pour les unités à l'aide des connecteurs de type vis ou verrouillage fournies par Microhard Systems Inc. et une
Division 2 source d'alimentation de classe 1 au sein de votre panneau .
Si vous n'êtes pas sûr de l' installation et de câblage des lignes directrices spécifiques pour la classe 1 Division 2 codes ,
communiquer avec la CSA International.
2.1 Installing the SIM Card ...................................................................................................................... 14
2.2 Getting Started .................................................................................................................................. 14
4.2 System .............................................................................................................................................. 24
A SERIAL GATEWAY
allows asynchronous
serial data to enter (as
through a gate) the
realm of IP
communications.
The serial data is
encapsulated within
UDP or TCP packets.
The IPn3G is a high-performance 3G Cellular Ethernet/Serial/USB Gateway. Equipped with 2
serial data ports, 1 USB, and 1 Ethernet Port, the IPn3G provides complete access to remote
devices. Using the vast established infrastructure of cellular networks, the IPn3G can provide
data services anywhere coverage is provided.
While private wireless networks can provide wireless data services, using FHSS ISM bands, or
secure dedicated licensed radio’s, coverage is only available where radio’s, repeaters, and other
equipment is deployed. Achieving a wide coverage area generally involves many radio units,
antennas, possibly private or shared towers and large amounts of planning.
The IPn3G/IPn3Gb operates on HSPA & Quad Band GSM cellular networks, using 3G/HSPA//
HSPA+/EDGE/GPRS technology to provide fast and reliable data transfer.
The small size and superior performance of the IPn3G makes it ideal for many applications.
Some typical uses for this modem:
SCADA
remote telemetry
traffic control
industrial controls
remote monitoring
LAN extension
Key performance features of the IPn3G/IPn3Gb include:
communicates with virtually all PLCs, RTUs, and serial devices through either one of
two available RS232 interface, RS422, or RS485
fastest serial rates: 300 baud to 921kbps
advanced serial port supports legacy serial devices, including RTS, CTS, DSR, DTR,
and DCD.
Easy to manage through web- or text-based user interface, orSNMP
wireless firmware upgrades
system wide remote diagnostics
advanced security features
industrial temperature specifications
DIN rail mountable
Optional Class 1 Div 2
Available as OEM solution
Supporting co-located independent networks and with the ability to carry both serial and IP traffic, the IPn3G supports not only network growth, but also provides the opportunity to migrate
from asynchronous serial devices connected today to IP-based devices in the future.
Up to 7.2 Mbps downlink
Up to 5.76 Mbps uplink
EDGE/GPRS
Multi-Slot Class 12
IPn3Gb Data Features: HSDPA cat 14, up to 21.1 Mb/s DL for LISA-U230
GPRS multi-slot class 125, coding scheme CS1-CS4, up to 85.6 kb/s DL/UL
EDGE multi-slot class 125, coding scheme MCS1-MCS9, up to 236.8 kb/s DL/UL CSD GSM max 9.6 kb/s
UMTS max 64 kb/s
IPn3G TX Power: HSPA - Class 3 (0.25W)
GSM 850/900 MHz - Class 4 (2W)
GSM 1800/1900 MHz - Class 1 (1W)
EDGE 850/900 MHz - Class E2 (0.5W)
EDGE 1800/1900 MHz - Class E2 (0.4W)
IPn3Gb TX Power: WCDMA/HSDPA/HSUPA Power Class
· Power Class 3 (24 dBm) for WCDMA/HSDPA/HSUPA mode
GSM/GPRS Power Class
· Power Class 4 (33 dBm) for GSM/E-GSM bands
· Power Class 1 (30 dBm) for DCS/PCS bands
EDGE Power Class
· Power Class E2 (27 dBm) for GSM/E-GSM bands
· Power Class E2 (26 dBm) for DCS/PCS bands
IPn3Gb Current Consumption:
UMTS Active Connection Current:
Avg Serial Data: 75mA
Avg Ethernet: 94mA
Peak Tx: 275mA
Serial Interface: RS232, RS485, RS422Serial Baud Rate: 300bps to 921kbpsUSB: USB 2.0
USB Console Port
USB to Serial Data Routing
USB to Ethernet Data Routing
UMTS 800 (band VI) 23.0 Uplink continuous RF power for RMS at maximum power
UMTS 850 (band V) 23.0 Uplink continuous RF power for RMS at maximum power
UMTS 900 (band VIII) 23.0 Uplink continuous RF power for RMS at maximum power
UMTS 1700 (band VIII) 23.0 Uplink continuous RF power for RMS at maximum power
UMTS 1900 (band II) 23.0 Uplink continuous RF power for RMS at maximum power
UMTS 2100 (band 1) 23.0 Uplink continuous RF power for RMS at maximum power
Condition for all parameters: 50 Ω output load
Condition for GPRS/EDGE multi-slot output power: Multi-Slot Power Reduction profile 2
RF Performance (continued…)
Min.
32.5 Uplink burst RF power for GSM or GPRS 1-slot TCH at PCL 5 or Gamma 3
32.5 Uplink burst RF power for GPRS 2-slot TCH at Gamma 3
31.7 Uplink burst RF power for GPRS 3-slot TCH at Gamma 3
30.5 Uplink burst RF power for GPRS 4-slot TCH at Gamma 3
27.0 Uplink burst RF power for EDGE 8PSK 1-slot TCH at PCL 8 or Gamma 6
27.0 Uplink burst RF power for EDGE 8PSK 2-slot TCH at Gamma 6
26.2 Uplink burst RF power for EDGE 8PSK 3-slot TCH at Gamma 6
25.0 Uplink burst RF power for EDGE 8PSK 4-slot TCH at Gamma 6
29.5 Uplink burst RF power for GSM or GPRS 1-slot TCH at PCL 0 or Gamma 3
29.5 Uplink burst RF power for GPRS 2-slot TCH at Gamma 3
28.7 Uplink burst RF power for GPRS 3-slot TCH at Gamma 3
27.5 Uplink burst RF power for GPRS 4-slot TCH at Gamma 3
26.0 Uplink burst RF power for EDGE 8PSK 1-slot TCH at PCL 2 or Gamma 5
26.0 Uplink burst RF power for EDGE 8PSK 2-slot TCH at Gamma 5
25.2 Uplink burst RF power for EDGE 8PSK 3-slot TCH at Gamma 5
24.0 Uplink burst RF power for EDGE 8PSK 4-slot TCH at Gamma 5
Typ.
(dBm)
Table 1-3: IPn3Gb Transmitter maximum output power
This QUICK START guide will walk you through the setup and process required to
access the WebUI configuration window and to establish a basic wireless connection
to your carrier.
Note that the units arrive from the factory with the Local Network setting configured
as ‘Static’ (IP Address 192.168.0.1, Subnet Mask 255.255.255.0, and Gateway
192.168.0.1), in DHCP server mode. (This is for the Ethernet Adapter on the back
of the IPn3G unit.
2.1 Installing the SIM Card
Before the IPn3G can be used on a cellular network a valid SIM Card for your
Wireless Carrier must be installed. Insert the SIM Card into the slot as shown
To reset to factory
defaults, press and
hold the CFG button
for 8 seconds with the
IPn3G powered up.
The LED’s will flash
quickly and the IPn3G
will reboot with factory
defaults.
below.
SIM Card Slot
2.2 Getting Started
Connect the Antenna’s to the applicable ANTENNA jack’s of the IPn3G.
Connect the Phoenix-Type Connector to the power adapter as shown below and
apply power to the
Use the MHS-supplied
power adapter or an
equivalent power
source.
Once successfully logged in, the System Summary Window will be displayed.
To establish basic wireless connectivity with your carrier, the information in the
Carrier > Config menu must be completed as provided by your carrier.
Carriers may require different
information to be filled out.
Contact them for specific connection information.
For SIM Cards issued with Dynamic IP addresses most carriers simply require the correct
APN. SIM Cards assigned Static
public IP address often require
additional login details.
Wireless Carriers require the
following information:
Always Required:
Access Point Name (APN)
Some Carriers Require:
Authentication Type
User Name
Password
Verify connectivity with your Wireless Carrier by selecting Carrier > Statistics
or System > Summary. Your carriers name should appear next to the Network
entry and the Activity Status should read as: Call in progress
If you do not see “Call in Progress” you are not connected to or communicating
with your wireless carrier.
Check that the SIM card is installed correctly.
Verify that the proper antennas are installed correctly
Verify the APN assigned by the carrier.
Re-Enter the login details, if required by the carrier, to ensure any typing
You see “Call in Progress”, but no Internet Access. Check the WAN IP Address in
the Carrier > Statistics or System > Summary screens. If an IP Address is
not shown, check the APN and login details for errors.
Ensure the default
passwords are changed.
Set up appropriate firewall
rules to block unwanted
incoming data.
Refer to Section 4.0 WebUI Configuration to configure serial ports, USB, or any
security or firewall features required on the IPn3G.
Ensure that all default passwords are changed to limit access to the modem.
For best practices and to limit data charges it is critical to properly set up the
firewall. (Especially important for Public Static IP addresses.)
To access devices attached to the IPn3G remotely, see Appendix C: IP-
Passthrough, and/or Appendix D: Port Forwarding for working examples of how
to configure your devices and the IPn3G to provide remote connectivity.
The IPn3G provides a fully enclosed, stand alone modem, requiring only cabled connections.
The IPn3G can be used on a table top like surface, or using the mounting holes provided can be
mounted anywhere for a permanent solution.
Power
Data (Serial) Interface
Ethernet Interface
USB Interface
LED Indicators
Antenna’s (Main, GPS, Diversity)
On the front of the IPn3G is the USB port, DIAGNOSTIC port, CONFIG Button, RSSI, STATUS, RF and
SGNL LED’s as described below:
The USB port can be used for: (See Section 4.1.7 USB Configuration)
Console Port
Data Mode
Windows USB driver
downloads are available
to registered users
from:
microhardcorp.com/
support
The Diagnostic port (RS232) is used for:
NDIS Mode
AT Command Interface at 115.2kbps and
HyperTerminal (or equivalent).
User data (RS232 - RxD, TxD, and SG)
Digital I/O—Input Pin 7, Output Pin 8
CONFIG (Button) - Holding this button depressed while powering-up the IPn3G will boot the unit into
FLASH FILE SYSTEM RECOVERY mode. The default IP address for system recovery (only - not for nor-
Digital I/O is only
available and has been
implemented on units
shipped after June 1,
2012
mal access to the unit) is static: 192.168.1.39.
If the unit has been powered-up for some time (>1 minute), depressing the CFG Button for 8 seconds will
result in FACTORY DEFAULTS being restored, including a static IP address of 192.168.0.1. This IP address is useable in a Web Browser for accessing the Web User Interface.
RF LED (Red) - When connected to a 2G/EDGE or 3G-WCDMA Network, the RF LED indicates
a transmission burst. When connected to a 3G/HSPA Network the LED has no function.
SGNL LED (Green) - When illuminated, the SGNL LED indicates that the modem is connected and syn-
chronized with a wireless carrier.
Receive Signal Strength Indicator (RSSI) (3x Green) - As the received signal strength increases,
starting with the furthest left, the number of active RSSI LEDs increases. If the measured signal strength is
less than –110dBm no LED’s will be illuminated. If the signal is greater than –105dBm, 1 LED will be on, -100dBm equals 2 LED’s, and any signal greater than –95dBm will show all 3 RSSI LED’s to be ON.
STATUS LED (Red) - Upon initial application of power the STATUS LED will be illuminated for approxi-
mately 20 seconds, after which time it will being to blink slowly (loading) for an additional 25 seconds, then
stay ON ‗solid‘ (indicating it has achieved its specific operational status).
Drawing 3-4: IPn3G Front View
Table 3-1: Diagnostic Port RS232 Pin Assignment
Signal
Name
RXD 2 O
TXD 3 I
SG 5
Digital In 7 I
Digital Out 8 O
PIN
#
Input or
Output
RS485/422
TxB -
TxA -
RxB -
RxA -
GND -
Vin+ -
RS485/422
Vin+
GND
RxA
RxB
TxA
TxB
DATA
ETHERNET
ANTENNA
GPS
RX DIV
3.0 Hardware Description
3.1.2 Connectors and Indicators
3.1.2.2 Rear
On the back of the IPn3G is the Data port, RS485/422 interface, as well as the power connections. The
unit also has the SMA(F) connectors for the Main (TX/RX), GPS and the Diversity (RX) antenna’s.
The DATA (RS232 Port (DCE)) on the rear
of the circuit board is used for:
RS232 serial data (300-921kbps).
The RS422/485 Port is used to interface the Nano
Development Board to a DTE with the same
interface type. Either the RS232 or RS422/485 interface is used
for data traffic.
Vin+/Vin– is used to power the unit. The input Voltage range
is 7-30 Vdc.
PoE*– The IPn3G can also be powered using Passive PoE on the
Ethernet Port, via a PoE injector.
Caution: Using a
power supply that
does not provide
proper voltage may
damage the modem.
6 TxB (D+) O
5 TxA (D-) O
4 RxB (R+) I
3 RxA (R-) I
2 Vin -
1 Vin + I
Name Input or
Output
Output
*PoE only available on models shipped after March 1,
2013*
4.0 WebUI Configuration
The Web User Interface (WebUI) is a browser based configuration method that allows a user to use a
graphical interface to configure, test and troubleshoot a IPn3G unit. Any standard web browser can be
used and no additional software is required. Using the Web User Interface a user can:
Remotely or locally configure a IPn3G unit, including:
Network settings
Radio configuration
Serial Port configuration
Security
USB
Firewall
I/O
VPN
Retrieve unit revisions
Update system firmware
Much more...
In this section, all aspects of the Web Browser Interface, presented menus, and available configuration
options will be discussed.
Upon successfully accessing the IPn3G using a Web Browser, the Logon window will appear.
For security, do not
allow the web browser
to remember the User
Name or Password.
It is advisable to
change the login
Password (see Section
4.1.8.1). Do not
FORGET the new
password as it cannot
be recovered.
The factory default User Name is: admin
The default password is: admin
Note that the password is case sensitive. It may be changed (discussed further along in this section), but
once changed, if forgotten, may not be recovered.
When entered, the password appears as ’dots’ as shown in the image below. This display format prohibits
others from viewing the password.
The ‘Remember my password’ checkbox may be selected for purposes of convenience, however it is
recommended to ensure it is deselected - particularly once the unit is deployed in the field - for one
primary reason: security.
The System Summary window displays an overview of the current IPn3G configuration. When initially
logging into the unit, this will be the first window displayed, allowing a user to quickly identify configuration
information.
Carrier APN
Carrier Name
The System Summary window displays information about the wireless carrier as well as local network,
USB and System information:
Carrier: Activity Status, Network, WAN IP, Phone Number, SIM Card info etc
Ethernet Port: Local Ethernet Port information of rear RJ45 Connector.
USB Port: USB Port information, NDIS IP Address etc.
System: Hardware and Software versions and System time.
The System Config submenu allows the configuration of the Radio Description, the Time and Date,
including NTP time server parameters. As well as the Console and Wireless Traffic timeouts.
Image 4-4: System Config Window
Radio Description
The Radio Description is simply a convenient identifier for a specific IPn3G,
e.g. Pump Station 5, 123 Main Street, etc. This feature is most welcome
when accessing units remotely: a convenient cross-reference for the unit’s
IP address. This ‘name’ appears in all menu windows. It has no bearing
on the unit’s operation.
Date (yyyy-mm-dd)
The calendar date may be entered in this field. Note that the entered value
is lost should the IPn3G lose power for some reason.
Values (Characters)
Default is model-dependent
up to 30 characters
Values (2010-08-05)
valid date values, where
yyyy = 4-digit year
mm = 2-digit month
dd = 2-digit day
NTP may be used to
synchronize the time in
the IPn3G within a
network to a reference
time source.
The calendar date may be entered in this field. Note that the entered value
is lost should the IPn3G lose power for some reason.
The Timezone field allows you to set the time zone in the IPn3G. Select the
time zone from the dropdown list that matches your location. Time zones
are sorted by UTC (+/-) offset.
Note that if NTP Server Status is ENABLED, the ‘Synchronize with NTP
Server’ soft button on the System Configuration menu will be available for
use.
Leave as DISABLED (default) if a server is not available.
IP address or domain name for NTP server (on local LAN or website
(provided that Internet access is available)) is to be entered in this field if
the NTP Server Status is configured as ENABLED.
Time (hh:mm:ss)
Values (11:27:28)
hh = 2-digit hours
mm = 2-digit minutes
ss = 2-digit seconds
Timezone
Values (List)
Select the applicable time
zone from the dropdown
list.
NTP Time Synchronize
Values (Selection)
Disable
Enable
NTP Server (IP/Name)
Values (0.0.0.0)
valid NTP server IP
address or ‘name’
This value determines when the console connection (made via COM2) will
timeout after becoming inactive.
The Wireless Traffic Timeout will reset the unit if there has been no RF
activity in the configured time. 0 = Disabled (default)
Enabled by default, when the CONFIG button on the front of the IPn3G is
held down for 10s while the unit is powered up, the unit will reset and all
settings will be reset to factory defaults. When disabled the unit will reset,
but the settings will not be overwritten.
The IPn3G can report system level events to a third party Syslog server,
which can be used to monitor events reported by the IPn3G. The raw event
syslog can be view by entering the following URL into the web browser
http://X.X.X.X/syslog, Where X.X.X.X is the IP address of the IPn3G.
Image 4-5: Syslog
IP Address
0.0.0.0
System Syslog Server Port
Enter the UDP listening port of the Syslog Server. The default port number
is generally 514, but could vary from Server to Server.
UDP Port
514
System SMS Command
This option allows a user to enable or disable to use of the following SMS
commands to reboot or trigger events in the IPn3G:
MSC#REBOOT Reboot system
MSC#MIOP1 open I/O ouput1
MSC#MIOC1 close I/O ouput1
MSC#EURD0 trigger event report0
MSC#EURD1 trigger event report1
MSC#EURD2 trigger event report2
MSC#NMS trigger NMS UDP report
MSC#WEB trigger NMS webclient service immediately
MSC#PSCLOSE close power saving mode
MSC#PSVOL enable/switch to supply voltage power mode
MSC#PSTIMER enable/switch to timer power mode
MSC#PSSNIFF enable/switch to sniff power mode
MSC#APN set APN and reconnect. MSC=apn[,usr][,pwd]
The Location menu shows current modem location with online map and exact GPS Coordinate. If the GPS
is not valid, it uses the Cell Tower ID that the unit is currently connect to, to approximate the general
location of the IPn3G.
The History menu shows a graphical history of RSSI, Ec/No, Temperature, Voltage and Frequency of the
Cellular module. Data for the current hour, as well as a specific 24 hour period of a calendar date. Clicking
the Max, Ave and Min links will show the raw data used to plots the points on the graphs. The data points
are optionally stored in non-volatile (flash) memory, so data is saved even when the IPn3G is restarted or
power is lost.
The Network > Summary tab gives an overview of the configuration of the Ethernet port on the IPn3G. This
port is the RJ45 port located on the back of the IPn3G.
Within any IP network,
each device must have its
own unique IP address.
A SUBNET MASK is a bit
mask that separates the
network and host (device)
portions of an IP address.
The ‘unmasked’ portion
leaves available the
information required to
identify the various
devices on the subnet.
Image 4-8: Network Configuration , Local IP Configuration Submenu
Ethernet Port Status: The Ethernet port status shows the type and status of the local Ethernet Link.
IP Address: This is the currently configured logical IP address of the IPn3G. This IP address must
be set statically in the Network > Config tab. This is generally set to a Private IP
address for a local network.
IP Subnet Mask: The IP Subnet Mask is the current Subnet Mask being used by the unit to define the
subnet and host address of the IPn3G.
IP Gateway: The IP Gateway sets the default gateway for traffic leaving the IPn3G.
Ethenet MAC: This is the physical MAC address of the RJ45 Ethernet Port of the back of the IPn3G
USB MAC: For quick reference, this is the physical MAC address of the USB port on the front of
the IPn3G, when it is configured as a NDIS Ethernet Interface. See the USB section
for more information.
The Network > Statistics tab displays a variety of parameters which apply to the traffic through, and status
of, the physical Ethernet port (hardware interface) on the rear of the IPn3G.
Received and Transmitted information are applicable to the local data traffic into and out of the IPn3G,
respectively. Errors which are counted include alignment, frame check sequence (FCS), frame too long,
and internal MAC. The dropped packet count could increment if, for example, the network layer was too
busy to accept the data.
The FIFO errors are related to interface-specific hardware.
Collisions occur on all Ethernet networks being that Ethernet operates as a logical bus. The amount of
collisions is typically related to the number of devices on the attached network and the amount of data
being moved.
The Transmit Carrier count relates to carrier sense errors.
The Network > Config tab allows the configuration of the Ethernet port on the IPn3G (Rear RJ45). This port
is configured as static port and must be configured by the user if the default values are not to be used. By
default this port acts as a simple DHCP server, allowing the IPn3G to assign IP addresses and enable
communication to attached devices. Caution must be taken not to connect the IPn3G to an existing
network where a DHCP server may already be running.
Within any IP network,
each device must have its
own unique IP address.
A SUBNET MASK is a bit
mask that separates the
network and host (device)
portions of an IP address.
The ‘unmasked’ portion
leaves available the
information required to
identify the various
devices on the subnet.
A GATEWAY is a point
within a network that acts
as an entrance to another
network.
In typical networks, a
router acts as a gateway.
Image 4-11: Network Configuration , Local IP Configuration Submenu
Enter a valid IP Address. The default IP address for the Ethernet Port on
the IPn3G is 192.168.0.1.
For a small private network with IP addresses appearing similar to
192.168.1.xx (Class C address), the standard 255.255.255.0 subnet mask
may be applicable.
If the IPn3G units are integrated into a network which has a defined
gateway, then, as with other hosts on the network, this gateway’s IP
This option allows a user to select between Auto Negotiation (10/100), or
Fixed. If fixed is selected, additional options appear below.
This option allows a user to select between Auto Negotiation (10/100), or
Fixed. If fixed is selected, additional options appear below.
Choose between full and half duplex.
The ARP Cache timeout allows the configuration of how long a ARP entry
stays in the ARP table.
Values (selection)
Auto Negotiation
Fixed
Ethernet Port Speed
Values (selection)
100MBit/s / 10MBit/s
Ethernet Port Duplex
Values (selection)
Full / Half
ARP Cache Timeout(s)
Values (seconds)
60
DHCP Server Status
Prior to enabling this
service, verify that there
are no other devices either wired (e.g. LAN) or
wireless (e.g. another
unit) with an active DHCP
SERVER service.
(The Server issues IP
address information at the
request of a DHCP Client,
which receives the
information.)
Choose to enable or disabled the DHCP Server service. Devices on the
network, which are intended to receive IP address information from this
DHCP Server, must have their local IP settings set for ‘DHCP’ (as opposed
to ‘static’). The default is Enabled.
DHCP Starting/Ending Address
Use the Starting and Ending Address fields to define the range that the
DHCP server will assign IP Addresses. (also known as the address pool).
Values
Disable
Enable
Values
192.168.0.100 to
192.168.0.200
DHCP Lease Time
This is the amount of time a device can lease an IP Address from the
IPn3G before it must renew or obtain a new IP address. This option allows
the user to specify if the lease time specified in in seconds, minutes, hours
etc.
Select between Static (user must specify DNS server addresses), or
Automatic (the DNS servers are assigned by the Carrier).
If set for Static, a user would enter the IP Address of the desired primary
DNS server in this field. If set for automatic, this field will be populated by
the currently assigned DNS address.
If set for Static, a user would enter the IP Address of the desired alternate
DNS server in this field. If set for automatic, this field will be populated by
the currently assigned DNS address.
It may be desirable to ensure specific devices always obtain the same IP
address from the DHCP service. Enter the MAC address of that device in
this field.
Values (selection)
Static
Automatic
Preferred DNS Server
Values (IP Address)
(current DNS Server)
Alternate DNS Server
Values (IP Address)
(current DNS Server)
Binding MAC
Values (MAC)
00:00:00:00:00:00
Binding IP
It may be desirable to ensure specific devices always obtain the same IP
address from the DHCP service. Enter the IP Address to be assigned to
that device here.
The Network > Static Routing Menu, allows for the user to add static routes to the IPn3G. Static routes can
be used to inform IPn3G of networks that are not directly attached.
Enter the destination IP Address and subnet mask of the remote network
for which the data is intended.
Enter the IP Address of the next hop to the destination network.
Select the interface from which the destination network is available. LAN
refers to the network attached locally through the RJ45, and the WAN is
the Cellular network.
Image 4-12: Network Configuration , Local IP Configuration Submenu
Destination IP / Subnet Mask
Values (IP Address)
0.0.0.0 / 255.255.255.0
Default Gateway
Values
0.0.0.0
Interface
Values (selection)
WAN / LAN
4.0 WebUI Configuration
4.3.6 Network > SNMP
The IPn3G may be configured to operate as a Simple Network Management Protocol (SNMP) agent.
Network management is most important in larger networks, so as to be able to manage resources and
measure performance.
SNMP may be used in several ways:
SNMP: Simple Network
Management Protocol
provides a method of
managing network
devices from a single PC
running network
management software.
Managed networked
devices are referred to as
SNMP agents.
A SNMP management system (a PC running SNMP management software) is required for this service to
operate. An SNMP MIB Browser can be also be used to provision the IPn3G, these utilities are not supplied
by Microhard Systems, but many free and premium types of browsers are available on the market. This system must have full access to the IPn3G network. Communications is in the form of queries (information
requested by the management system) or traps (information initiated at, and provided by, the SNMP agent
in response to predefined events).
Objects specific to the IPn3G are hosted under private enterprise number 21703.
An object is a variable in the device and is defined by a Management Information Database (MIB). Both the
management system and the device have a copy of the MIB. The MIB in the management system provides
for identification and processing of the information sent by a device (either responses to queries or devicesourced traps). The MIB in the device relates subroutine addresses to objects in order to read data from, or
write data to, variables in the device. Contact Microhard Systems Inc, for the most recent MIB file.
An SNMPv1 agent accepts commands to retrieve an object, retrieve the next object, set and object to a
specified value, send a value in response to a received command, and send a value in response to an event
(trap).
SNMPv2c adds to the above the ability to retrieve a large number of objects in response to a single request.
SNMPv3 adds strong security features including encryption; a shared password key is utilized. Secure device monitoring over the Internet is possible. In addition to the commands noted as supported above, there
is a command to synchronize with a remote management station.
Custom MIBs can be obtained by contacting Microhard Systems Inc. Appendix F: SNMP MIB Sample con-
tains the first few pages of the IPn3G MIB to be used as a reference The MIB file can change when new
features are added, so it is best to contact us for the complete and latest MIB file for the IPn3G.
If disabled, no SNMP service is provided from the device. Enabled, the
device - now an SNMP agent - can support SNMPv1, v2, & v3.
Read Only Community Name
Effectively a plain-text password mechanism used to weakly authenticate
SNMP queries. Being part of the community allows the SNMP agent to
process SNMPv1 and SNMPv2c requests. This community name has only
READ priority.
Read Write Community Name
Effectively a plain-text password mechanism used to weakly authenticate
SNMP queries. Being part of the community allows the SNMP agent to
process SNMPv1 and SNMPv2c requests. This community name has only
READ/WRITE priority.
Defines accessibility of SNMPv3; select either Read Only or Read/Write
priority. If Read Only is selected, the SNMPv3 user may only read
information; if Read Write is selected, the SNMPv3 user may read and
write (set) variables.
V3 User Authentication Level
Defines SNMPv3 user’s authentication level.
NoAuthNoPriv: No authentication, no encryption.
AuthNoPriv: Authentication, no encryption.
AuthPriv: Authentication, encrpytion.
V3 Authentication Password
SNMPv3 user’s authentication password. Only valid when V3 User
Authentication Level set to AuthNoPriv or AuthPriv (see above).
V3 Authentication Password
SNMPv3 user’s encryption password. Only valid when V3 User
Authentication Level set to AuthPriv (see above).
Values
Read Only
Read Write
Values
NoAuthNoPriv
AuthNoPriv
AuthPriv
Values (char string)
00000000
Values (char string)
00000000
Select which version of trap will be sent should a failure
or alarm condition occur.
If enabled, an authentication failure trap will be generated upon
authentication failure.
The community name which may receive traps.
Defines a host IP address where traps will be sent to (e.g. SNMP
management system PC IP address).
The Network > DHCP Lease tab shows a summary of IP Addresses assigned by the IPn3G’s DHCP
server. As seen below the MAC address, IP Address, Name and the amount of time remaining on the
DHCP lease is shown.
Image 4-14: Network Configuration , Local IP Configuration Submenu
4.3.8 Network > Device List
The Network > Device List shows the current ARP table for the local network adapter. Similar to the DHCP
list the MAC address and IP address are shown, however not only DHCP assigned devices are listed in the
device list, any devices, even those statically assigned, that are connected through the local network
interface (RJ45) are displayed, including those connected through a hub or switch.
The Local Device Monitor allows a user to monitor a local device connected locally to the Ethernet port or
to the locally attached network. If the IPn3G cannot detect the specified IP or a DHCP assigned IP, the unit
will restart the DHCP service, and eventually restart the modem to attempt to recover the connection.
Image 4-16: Network Configuration , Local Monitor
Enable or disable the local device monitoring service.
Select the IP mode. By selecting a fixed IP address the service will monitor
the connection to that specific IP. If auto detect is selected, the IPn3G will
detect and monitor DHCP assigned IP address.
This field is only shown if Fixed Local IP is selected for the IP Mode. Enter
the static IP to be monitored in this field.
The status timeout is the maximum time the IPn3G will wait to detect the
monitored device. At this time the IPn3G will restart the DHCP service.
Status
Values (selection)
Disable / Enable
IP Mode
Values (selection)
Fixed local IP
Auto Detected IP
Local IP
Values (IP)
0.0.0.0
Status Timeout
Values (seconds)
10
This field defines the amount of time the IPn3G will wait to detect the
monitored device before it will reboot the modem.
The Carrier Statistics window provides information related to the Wireless Carrier portion of the IPn3G. A
variety of information can be found here, such as Activity Status, Network (Name of Wireless Carrier
connected) , Data Service Type(2G/3G/HSPA etc), Frequency band, Phone Number etc.
Not all statistics parameters displayed are applicable.
The Received and Transmitted bytes and packets indicate the respective amount of data which has been
moved through the radio.
The Error counts reflect those having occurred on the wireless link.
The parameters within the Carrier Configuration menu must be input properly; they are the most basic
requirement required by your cellular provider for network connectivity.
This option allows for the automatic detection of available carriers, the
manual selection of detected carriers, or the fixed selection of entering a
carriers ID. Manual and Fixed are commonly used when the IPn3G is
Roaming and it is desirable to control which carrier the unit connects to.
In Manual Carrier mode, select the desired carrier from the list of available
carriers. In fixed mode, enter the Carrier ID.
When set to Automatic the modem will automatically decide on the best
signal to connect to, in some cases this may be 2G. When set to 3G Only,
the modem will continually try to connect to 3G, the same for 2G only.
Once set to operate in a specific technology, a user can then select which
frequencies within that technology to use. It is recommended to be careful,
as if no useable frequency/technology (3G/2G) is available, the modem will
not connect.
Access Point Name (APN)
The (Access Point Name) APN is required and assigned by the wireless
carrier. A Carrier will have different APNs for different service types (Static
vs Dynamic etc).
Values
Varies
Network Data Mode
Values (selection)
Automatic
3G Only
(1900/850/900/2100/1700)
2G Only
(850/900/1800/1900 MHz)
Values (String)
Carrier dependant
It is possible to have a Pin number associated with a SIM card that is
required to use the SIM card on a device. If the installed SIM card has
been set up with a SIM Pin, enter the number here.
When NAT is enabled internal addresses are not visible to external
networks. When disabled the router does not perform any address
translation on the packets passing through it.
IP pass-through allows the WAN IP address to be assigned to the device
connected to the rear Ethernet port on the IPn3G. In this mode the IPn3G
is transparent and forwards all traffic to the device connected to the
Ethernet port. The WebUI port (Default HTTP Port:80), this port is retained
for remote management of the IPn3G. This port can be changed to a
different port under the Security > Access Menu. It is recommended to
reboot the IPn3G after changing these settings.
If disabled, the modem will always remain connected. The default is
Disabled.
The maximum amount of time to pass before modem will timeout. The
default is 0 seconds.
The maximum amount of time to wait for a connection The default is 90
seconds.
Values (selection)
Disable / Ethernet
Dial-on-Demand
Values (selection)
Disable / Enable
Idle Time Out
Values (seconds)
0-65535
Connect Time Out
Values (seconds)
0-65535
The maximum amount of attempts to dial and establish a connection. The
default is 0, which means that there is no maximum and the modem will
keep trying indefinitely.
Sets the authentication type required to negotiate with peer.
PAP - Password Authentication Protocol.
CHAP - Challenge Handshake Authentication Protocol.
User Name as required for authentication to remote peer. May not be
required for dynamically assigned IP addresses from the wireless carrier.
Usually required for static IP addresses.
Password as required for authentication to remote peer. May not be
required for dynamically assigned IP addresses from the wireless carrier.
Usually required for static IP addresses.
Sets the number to be dialed. Carrier dependant, the default number is
*99***1#
In some cases the Static IP address must be entered in this field if
assigned by a wireless carrier. In most cases the IP will be read from the
SIM card and this field should be left at the default value.
Enabled by default, the IPn3G, will use the DNS server as specified
automatically by the service provider.
Sets the modems connect string if required by the carrier.
Values (char string)
Carrier/peer dependant
Dial Number
Values (String)
*99***1#
Static IP Address
Values
0.0.0.0
Use Remote DNS
Values (Selection)
Disable / Enable
Connect String
Values (String)
The modem can have up to 4 initialization strings.
This selection allows the use of a Dynamic Domain Name Server (DDNS),
for the IPn3G.
Unless a carrier issues a Static IP address, it may be desirable to use a
dynamic DNS service to track dynamic IP changes and automatically
update DNS services. This allows the use of a constant resolvable host
name for the IPn3G.
This is a list of supported Dynamic DNS service providers. Free and
premium services are offered, contact the specific providers for more
information.
This is the host or domain name for the IPn3G as assigned by the DDNS
provider.
Enter a valid user name for the DDNS service selected above.
This selection allows the use of a ICMP Keep Alive Check for the IPn3G.
The default is disabled.
A user can set up a reachable host (IP or domain) for the unit to ping
periodically to keep the WAN connection alive (Wireless Carrier) in case
the carrier shuts it down due to lack of activity. PING frequency is defined
by the Interval.
The Interval value determines the frequency, or how often, the IPn3G will
send out PING messages to the Host.
The Count field is the maximum number of PING errors such as “Host
unreachable” the IPn3G will attempt before the unit will reboot itself to
attempt to correct connection issues. If set to zero (0), the unit will never
reboot itself.
This window displays information related to the serial interfaces of the IPn3G.
COM1/2 Port Status
Enabled by default. (IF COM2 is disabled it is available as a ‘Console’ port.)
COM1/2 Connect As
Display of chosen protocol with respect to serial gateway function.
COM1/2 Connect Status
If port is enabled and there is data traffic, this will display ‘Active’.
The other displayed parameters are not all applicable. Of most use are the transmitted and received bytes/
packets: these will indicate if data is coming into and out of the COM ports.
The menus ’COM1 > Config’ and ’COM2 > Config’ are used to configure the serial device server for the
serial communications ports:
COM1 (DATA), the rear DE9 connector on the IPn3G, and
COM2 (DIAGNOSTIC), the front DE9 connector.
Serial device data may be brought into a LAN network through TCP, UDP, or multicast; it may also exit the
IPn3G network on another IPn3G ’s serial port. Ensure that the firewall allows access to the assigned ports
by either creating rules to allow it, or by setting the WAN Request to allow.
COM1 is a full-featured RS232 interface dedicated to serial data traffic. It supports hardware handshaking.
By default, this port is enabled.
COM2 is, by default, disabled. In this state, it may be used as the console port for the text user interface.
Enabled, it becomes another serial port for data traffic. It is a 3-wire (TxD, RxD, and SG) interface and
does not support hardware handshaking.
For brevity, only COM1 is fully detailed in this section; the relative limitations of COM2 are noted where
applicable.
Note: Most PCs do not
readily support serial
communications greater
than 115200bps.
Select operational status of port. Enabled by default.
*COM2 is Disabled by default. If COM2 is Enabled and there is a desire to
switch it back to Disabled (console mode) via the serial connection to it, the
escape sequence of ‘+++’ may be entered at the Data Baud Rate for which
the port is configured.
Determines which (rear of unit) serial interface shall be used to connect to
external devices: RS232, RS485, or RS422. This option applies only to
COM1 / DATA. When an interface other than RS232 is selected, the DE9
port will be inactive.
The serial baud rate is the rate at which the modem is to
communicate with the attached local asynchronous
device.
*COM2 data baud rate maximum is 115200bps.
Values (bits per second (bps))
921600
460800
230400
115200
57600
38400
28800
19200
Values
Enable
Disable
Channel Mode
Values
RS232 / RS485 / RS422
Data Baud Rate
14400
9600
7200
4800
3600
2400
1200
600
300
Data Format
This setting determines the format of the data on the serial port.
The default is 8 data bits, No parity, and 1 Stop bit.
Values
8N1
8N2
8E1
8O1
7N1
7N2
Flow Control
Flow control may be used to enhance the reliability of
serial data communications, particularly at higher baud
rates. If the attached device does not support hardware
handshaking, leave this setting at the default value of
‘None’.
Software flow control
(XON/XOFF) is not
supported.
When CTS Framing is selected, the IPn3G uses the CTS
signal to gate the output data on the serial port. Figure
3A below illustrates the timing of framed output data.
*COM2 does not support Flow Control.
Values
None / Hardware / CTS Framing
Drawing 4A: CTS Output Data Framing
7E1
7O1
7E2
7O2
4.0 WebUI Configuration
Pre-Data Delay (ms)
Refer to Drawing 3A.
*COM2 does not support this function.
Values (ms)
100
Post-Data Delay (ms)
Refer to Drawing 3A.
*COM2 does not support this function.
Values (ms)
100
Data Mode
This setting defines the serial output data framing. In Transparent mode
(default), the received data will be output promptly from the IPn3G. When
set to Seamless, the serial port server will add a gap between data frames
to comply with the MODBUS protocol for example.
Values
Seamless
Transparent
Character Timeout
In Seamless mode (see Data Mode), this setting determines when the
serial server will consider the recently-received incoming data as being
ready to transmit. As per the MODBUS standard, frames will be marked as
‘bad’ if the time gap between frames is greater than 1.5 characters, but less
than the Character Timeout value.
The serial server also uses this parameter to determine the time gap inserted between frames. It is measured in ‘characters’ and related to baud rate.
Example: If the baud rate is 9600bps, it takes approximately 1ms to move one character. With the Character Timeout set to 4, the timeout period is 4ms. When the calculated time is less than 3.5ms, the serial
server will set the character timeout to a minimum value of 3.5ms. If the baud rate is greater than
19200bps, the minimum char acter timeout is internally set to 750us (microseconds) .
Values
characters
4
Defines the buffer size that the serial server will use to receive data from
the serial port. When the server detects that the Character Timeout criteria
has been met, or the buffer is full, it packetizes the received frame and
transmits it.
This setting effects the Quality of Service (QoS) associated with the data
traffic on the specific COM port.
When enabled the data will continue to buffer received on the serial data
port when the radio loses synchronization. When disabled the IPn4G will
disregard any data received on the serial data port when radio
synchronization is lost.
This option will enable or disable the MODBUS decoding and encoding
features.
Modbus TCP Protection
The field allows the Modbus TCP Protection Status flag to be enabled or
disabled. If enabled the Modbus data will be encrypted with the Modbus
Protection Key.
Modbus TCP Protection Key
MODBUS encryption key used for the MODBUS TCP Protection Status
feature.
Data Logging on the COM ports allows for the actual serial port data to be
sent to a remote host. This data can be in the Raw form or converted to
Hex before it is sent.
Select Tx&Rx to log data to/from the serial port. Select Tx to log data that is
being transmitted from the serial port, and Rx to log data being received at
the serial port.
Enter the IP Address of the where the logging data is to be sent. Generally
this is a PC listening on the specified UDP port.
Enter the UDP port of the IP Address where the data is to be sent.
This setting determines which protocol the serial server will use to transmit serial port data over the IP
Series network. Ensure that the firewall allows access to the assigned ports by either creating rules to
The protocol selected in
the Protocol Config field
will determine which
configuration options
appear in the remainder
of the COMn
Configuration Menu.
UDP: User Datagram
Protocol does not provide
sequencing information
for the packets sent nor
does it establish a
’connection’ (‘handshakin
g’) and is therefore most
suited to communicating
small packets of data.
TCP: Transmission
Control Protocol in
contrast to UDP does
provide sequencing
information and is
connection-oriented; a
more reliable protocol,
particularly when large
amounts of data are being
communicated.
Requires more bandwidth
than UDP.
allow it, or by setting the WAN Request to allow.
TCP Client: When TCP Client is selected and data is received on its serial port, the IPn3G takes the
initiative to find and connect to a remote TCP server. The TCP session is terminated by this same unit
when the data exchange session is completed and the connection timeout has expired. If a TCP
connection cannot be established, the serial port data is discarded.
Remote Server Address
IP address of a TCP server which is ready to accept serial port data through a TCP
connection. For example, this server may reside on a LAN network server.
Default: 0.0.0.0
Remote Server Port
A TCP port which the remote server listens to, awaiting a session connection request from
the TCP Client. Once the session is established, the serial port data is communicated from
the Client to the Server.
Default: 20001
Outgoing Connection Timeout
This parameter determines when the IPn3G will terminate the TCP connection if the
connection is in an idle state (i.e. no data traffic on the serial port).
Default: 60 (seconds)
TCP Server: In this mode, the IPn3G will not INITIATE a session, rather, it will wait for a Client to request
a session of it (it’s being the Server—it ‘serves’ a Client). The unit will ‘listen’ on a specific TCP port. If a
session is established, data will flow from the Client to the Server, and, if present, from the Server to the
Client. If a session is not established, both Client-side serial data, and Server-side serial data , if present,
will be discarded.
Local Listening Port
The TCP port which the Server listens to. It allows a TCP connection to be created by a TCP
Client to carry serial port data.
Default: 20001
Incoming Connection Timeout
Established when the TCP Server will terminate the TCP connection is the connection is in
an idle state.
Default: 300 (seconds)
TCP Client/Server: In this mode, the IPn3G will be a combined TCP Client and Server, meaning that it
can both initiate and serve TCP connection (session) requests. Refer to the TCP Client and TCP Server
descriptions and settings described previously as all information, combined, is applicable to this mode.
A UDP or TCP port is an
application end-point.
The IP address identifies
the device and, as an
extension of the IP
address, the port
essentially ‘fine tunes’
where the data is to go
‘within the device’.
Be careful to select a port
number that is not
predetermined to be
associated with another
application type, e.g.
HTTP uses port 80.
Multicast is a one-tomany transmission of
data over an IP network.
It is an efficient method of
transmitting the same
data to many recipients.
The recipients must me
members of the specific
multicast group.
TTL: Time to Live is the
number of hops a packet
can travel before being
discarded.
In the context of multicast,
a TTL value of 1 restricts
the range of the packet to
the same subnet.
Protocol Config (continued)
UDP Point-to-Point: In this configuration the IPn3G will send serial data to a specifically-defined point,
using UDP packets. This same IPn3G will accept UDP packets from that same point.
Remote IP Address
IP address of distant device to which UDP packets are sent when data received at serial port.
Default: 0.0.0.0
Remote Port
UDP port of distant device mentioned above.
Default: 20001
Listening Port
UDP port which the IP Series listens to (monitors). UDP packets received on this port are
Default: 20001
UDP Point-to-Multipoint (P): This mode is configured on an IPn3G which is to send multicast UDP
packets; typically, the MASTER in the IPn3G network.
Multicast IP Address
A valid multicast address this unit uses to send multicast UDP packets upon receiving data
Default: 224.1.1.1
Multicast Port
A UDP port that this IPn3G will send UDP packets to. The Multipoint (MP - see the UDP
Default: 20001
Listening Port
The UDP port that this unit receives incoming data on from multiple remote units.
Default: 20011
Time to Live
Time to live for the multicast packets.
Default: 1 (hop)
UDP Point-to-Multipoint (MP): This protocol is selected on the units which are to receive multicast UDP
packets, typically the Remote units. See the previous description of UDP Point-to-Multipoint (P).
Remote IP Address
Remote Port
forwarded to the unit’s serial port.
from the serial port. The default value is a good example of a valid multicast address.
Point-to-Multipoint (MP) description) stations should be configured to listen to this point in
order to receive multicast packets from this IPn3G.
The IP address of a distant device (IP Series or, for example, a PC) to which the unit
sends UDP packets of data received on the serial port. Most often this is the IP address
of the Master IP Series.
Default: 0.0.0.0
The UDP port associated with the Remote IP Address (above). In the case of this
‘Remote’ being the Master IPn3G, the value in this field should match the Listening Port
of the Master (see UDP Point-to-Multipoint (P)).
Default: 20011
A valid MULTICAST address that this unit will use to receive multicast UDP packets sent
by a UDP Point-to-Multipoint (P) unit. Note that the default value for this field matches
In a Point-to-Multipoint
(PMP) network topology
which is to utilize UDP
multicast, typically the
MASTER would be
configured as ’(P)’ (the
POINT) and the
REMOTES would be
configured as ’(MP)’ (the
MULTIPOINTS).
Multicast Port
UDP Multipoint-to-Multipoint
Multicast IP Address
A valid multicast address the unit will use to send multicast UDP packets upon receiving them
Default: 224.1.1.1
Multicast Port
UDP port that the packets are sent to. Multipoint stations should be configured to listen to
Default: 20011
Time to Live
Time to live for the multicast packets.
Default: 1 (hop)
Listening Multicast IP Address
A valid multicast address the unit is to listen to receive multicast UDP packets sent by
Default: 224.1.1.1
Listening Multicast Port
UDP port that the unit will listen to for multicast UDP packets sent by another UDP Multipoint-
the default Multicast IP Address of the UDP Point-to-Multipoint (P) configuration
described on the previous page.
Default: 224.1.1.1
The UDP port that this unit will use, along with the Multicast IP Address detailed above,
to receive the multicast UDP packets sent by the UDP Point-to-Multipoint (P) unit.
Default: 20001
SMTP: Simple Mail
Transport Protocol is a
protocol used to transfer
mail across an IP
network.
Protocol Config (continued)
SMTP Client: If the IPn3G network has Internet access, this protocol may be used to send the data
received on the serial port (COM1), in a selectable format (see Transfer Mode (below)), to an e-mail
addressee. Both the SMTP Server and the e-mail addressee must be ‘reachable’ for his feature to
function. Note: COM2 does not support this mode.
Mail Subject
Enter a suitable ‘e-mail subject’ (e-mail heading). Default: COM1 Message
Mail Server (IP/Name)
Username / Password
Mail Recipient
A valid e-mail address for the intended addressee, entered in the proper format.
Default: host@
Message Max Size
Maximum size for the e-mail message.
Default: 1024
Timeout (s)
How long the unit will wait to gather data from the serial port before sending an e-mail
Default: 10
Transfer Mode
Select how the data received on COM1 is to be sent to the email addressee. Options are:
Default: Text
PPP: COM1 can be configured as a PPP server for a serial connection with a PC or other device. The
attached PC could then use a dedicated serial (WindowsXP - dialup/modem) type PPP connection to
access the network resources of the IPn3G. Note: COM2 does not support this mode.
PPP Local IP
Enter the local PPP IP Address, the IP Address of the IPn3G COM1 Port.
Default: 192.168.0.1
PPP Host IP
PPP Idle Timeout(s)
Enter the desired PPP Idle Timeout in seconds.
IP address or ‘Name’ of SMTP (Mail) Server.
Default: 0.0.0.0
The username/password of the email account being used, if authentication is required for
outgoing email.
Default: varies/varies
message; data will be sent immediately upon reaching Message Max Size.
Text, Attached File, Hex Code.
Enter the PPP Host IP here. This is the IP of the PC or attached device.
Default: 192.168.0.99
SMS AT Mode: When set to SMS AT Mode, the serial port accepts the SMS AT subset of the AT
Command Set. Only SMS AT Commands are available. For more detailed information about specific
commands, refer to the Section 5: AT Commands. The following commands are available on the COM1
serial port:
AT+CMGR - Read Message
AT+CMGL - List Message
AT+CMGD - Delete Message
AT+CMGS - Send SM to Network
AT+CGMI - Request Manufacturer ID
AT+CGMM - Request Model ID
AT+CGMR - Request Revision
AT+CSQ - Signal Strength
AT+MMGR - Read Message (Does not change Status)
AT+MMGL - List Message (Does not change Status)
AT+CMFG - Message Format
AT+CCLK - Read System Date and Time
AT+CSCA - Service Center Address
AT+CREG - Network Registration Status
AT+CNMI - New Message Indications to Terminal
AT+CMTI - Stored SMS-DELIVER Indication Unsolicited Response
GPS Transparent Mode: When in GPS Transparent Mode, GPS data is reported out of the serial port.
Sample output is shown below:
WirelessBus Mode: WirelessBus Mode can be used in systems where serial based polled SCADA
systems such as Modbus have one master/host and multiple remote/slave RTU/PLC’s located at several
different locations. The IPn3G that is connected to the Master is provided a list of IP Addresses/ports of
IPn3G’s that are connected to each of the remotes. Several Modbus (or other serial based protocols), can
be connected to each of the remote IPn3G’s (Using RS485 for multi-drop etc). WirelessBus Mode supports
Modbus RTU, and Modbus ASCII modes, as well as other protocols using broadcast mode.
Image 4-29: COM1 > Wireless Bus Mode (Host/Server)
WirelessBus Mode uses UDP packets to communicate between the Host and the Remotes. When a IPn3G
is configured as a Host/Server it retains a list of ModbusID’s and the respective IP/Port information
required to communicate with any remotes. When a Modbus poll is received by the IPn3G it looks at the
Modbus ID, then assembles a UDP packet to be sent to the corresponding IP/Port listed in the table. At the
remote side, the packet is disassembled and sent out the remote serial port as original serial data.
Listening Port
This is the UDP port used by the IPn3G configured as a Host/Server to
listen for incoming traffic from remote devices using the WirelessBus mode
and set as Remote/Clients.
Values (UDP)
20009
Timeout
The IPn3G features a configurable timeout. This timeout checks to ensure
the specified port is open and ready.
Values (seconds)
30
Bus Mode
When set to Remote/Client, and data received on the serial port will
automatically be encapsulated into an UDP packet and sent to the
configured host IP. When set to Host/Server the IPn3G will encapsulate
data received on the serial port into a UDP packet and send to the
applicable IP addresses/Ports listed.
When configured as Host/Server Bus Mode, this option will allow a user to
select between Modbus RTU, Modbus ASCII, or as Broadcast (for other
protocols. When set to broadcast the IPn3G will send any incoming serial
data to all the IP/Port numbers listed. When in either Modbus mode the
IPn3G will only send to the IP/Port that matches the Modbus ID.
Remote IP/ Adress Config
For each remote IPn3G enter the reachable IP address and configured
UDP port configured for serial data. The ModbusID is not required when in
broadcast mode for polled protocols other than Modbus.
Image 4-30: COM1 > Wireless Bus Mode (Remote/Client)
When the Bus Mode is configured for Remote/Client, enter the IP address
or domain address where the Host/Server is located.
Values (selection)
RTU Modbus Direct Access
ASCII Modbus Direct Access
Broadcast For Any Protocol
Values (UDP)
IP Address (required)
Port (UDP Port #)
ModbusID (if applicable)
Host IP/Domain Name
Values (IP/Domain)
192.168.168.1
Enter the UDP port number configured on the Host/Server where the
WirelessBus service is listening. By default this is configured as 20009 on
the Host/Server.
This window displays information related to the USB port located on the front of the IPn3G.
USB Port Status
Displays the status of the USB Port.
Configure via USB Configuration menu.
USB Connect As
Display of chosen protocol with respect to serial gateway function.
Configure via USB Configuration menu.
USB Connect Status
If port is enabled and there is data traffic, this will display ‘Active’.
The other displayed parameters are not all applicable. Of most use are the transmitted and received bytes/
packets: these will indicate if data is coming into and out of the USB port.
The USB Device Port Mode allows a user to define the operation of the IPn3G ’s USB Port. The port can be
configured to be used as any one of the following:
Console Mode Provides support for the USB-to-Serial console port. In this case, Mini USB port can be
used as a USB-to-Serial console port for the text user interface.
Data Mode Provides support for the USB-to-Serial port. Mini USB port can be used as a RS232
interface dedicated to serial data traffic.
NDIS Mode The USB port can be used as a network interface card. The IPn3G USB port is
configured by default in NDIS Standalone Ethernet Mode with a DHCP server running
in the background.
This means that a user can use the USB port communicate with the IPn3G via Ethernet
on the USB port of their PC’s.
Windows Drivers are available from the Support Desk on the Microhard Systems Inc website.
Please register and login into:
http://www.microhardcorp.com/support
When the USB port in configured as Console Mode, the port acts as a console port.
Data Mode:
USB Data Mode is Disabled by default. If USB Data Mode is selected and there is a desire to switch it back
to Disabled (console mode) via the USB-to-Serial connection to it, the escape sequence of '+++' may be
entered at the Data Baud Rate for which the port is configured.
Image 4-31: USB Configuration Data Port
USB Device Port Mode
For more information about
any of the Data Port field parameters refer to COM1/COM2
NDIS Standalone Mode is enabled by default. This setting will allow the USB port to act as a network
interface card.
USB Device Port Mode (Continued)
Image 4-32: USB NDIS Network Configuration
In standalone Mode the USB port will act as a separate NIC for the IPn3G.
In Bridge Mode the USB port wil use the same settings as the rear ethernet
port.
This is the IP Address of the USB NDIS adapter on the IPn3G. The IPn3G
acts as a DHCP server on this port and assigns an IP address to
connecting devices, i.e your PC.
For best practices and to
control unwanted access
it is critical that any
passwords not be left at
the default values.
Image 4-33: Security > Password Configuration Menu
To keep a system secure, the Administrator Password (which is prompted-for at the LogOn window,
Console, and Telnet sessions) should be modified rather than retaining the factory default value of ‘admin’.
The Upgrade Password protects the IPn3G from having firmware upgrade performed via FTP by an
unauthorized person. It is recommended that the default password be changed when the system is
deployed.
New Password/Repeat Password (admin)
Enter a new password for the Admin user. Repeat to ensure the intended
password was entered and that it was entered correctly. Do not forget the
admin password as, if lost, it cannot be recovered.
Values (char string)
admin
New Password/Repeat Password (upgrade)
Enter a new password for the Upgrade user. Repeat to ensure the intended
password was entered and that it was entered correctly.
Image 4-34: Security Config. Menu, Discovery Service Config. Submenu
Telnet: A user command
which uses the TCP/IP
protocol to access a remote
device.
Format, from DOS prompt:
>telnet 192.168.1.50
where the IP address is that
of the target device.
If the above IP address is that
of an IPn3G accessible via
the network, the user will
arrive at the unit’s LogOn
window.
HTTP: HyperText Transfer
Protocol. The standard
protocol for transferring data
between a Web server and a
Web browser.
Allows, or disables use of the DiscoverIP utility. The discover IP utility
allows a user to scan a network for all available IPn3G units, and displays
the MAC and IP addresses as well as the unit description. The port used
for Discovery is 20077.
There are two methods whereby a user may be authenticated for access to the IPn3G:
Local
Using the Admin or Upgrade access and associated passwords - the authentication is
done ‘locally’ within the IPn3G, and
RADIUS&Local
RADIUS authentication (using a specific user name and password supplied by your
RADIUS Server Administrator) - this authentication would be done ‘remotely’ by a
RADIUS Server; if this authentication fails, proceed with Local authentication as per
above.
RADIUS: Remote
Authentication Dial In
User Service. An
authentication,
authorization, and
accounting protocol which
may be used in network
access applications.
A RADIUS server is used
to verifying that
information is correct.
Select the Authentication Mode: Local (default) or RADIUS&Local. For
the latter selection, RADIUS authentication must be attempted FIRST; if
unsuccessful, THEN Local authentication may be attempted.
Auth Mode
Values
Local
RADIUS&Local
In this field, the IP address of the RADIUS server is to be entered if
RADIUS&Local has been selected as the Authorization Mode.
In this field, the applicable Port number for the RADIUS Server is to be
entered if RADIUS&Local has been selected as the Authorization Mode.
Normally, a RADIUS Server uses Port 1812 for the authentication function.
If the IP Series’ Authorization Mode has been set to RADIUS&Local, obtain
the RADIUS Secret for his particular client from your RADIUS Server
Administrator and enter it into this field, and the following field. (You will
also want to obtain the applicable RADIUS User Name from your RADIUS
Server Administrator.)
When using the VPN features of the IPn3G, it is possible to select X.509 for the Authentication Type. If that
is the case, the IPn3G must use the required x.509 certificates in order to establish a secure tunnel
between other devices. Certificate Management allows the user a place to manage these certificates.
When enabled, the firewall settings are in effect. When disabled, none of
the settings configured in the menu’s below have an effect, the modem is
“open”.
When Blocked the IPn3G will block at traffic on the WAN (Wireless Carrier)
unless specified otherwise in the Access Rules, MAC List, IP List
configurations. Access to ports 80 (HTTP) and 443 (HTTPS-if enabled), is
still available unless disabled in the Remote Management option.
LAN to WAN Access Control
Allows or Blocks traffic from the LAN (Ethernet, USB NDIS) accessing the
WAN unless specified otherwise using the Access Rules, MAC, and IP List
configuration.
Allow remote management of the IPn3G on the WAN side using the WebUI
on port 80(HTTP), and 443 (HTTPS). If disabled, the configuration can only
be accessed from the LAN.
Once the firewall is turned on, rules configuration can be used to define specific rules on how local and
remote devices access different ports and services. MAC List and IP List are used for general access, and
are applied before rules are processed.
The rule name is used to identify the created rule. Each rule must have a
unique name and up to 10 characters can be used.
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP
(quietly dropped), will refuse connections.
This is configured based on how the WAN Request and LAN to WAN
Access Control are configured in the previous menus.
Select the zone which is to be the source of the data traffic. WAN applies
to the wireless connection to the cellular carrier and the LAN refers to local
connections on the IPn3G (Ethernet, USB NDIS etc)
If a valid IP/Network address is specified, the action will apply against that
address; otherwise, leaving the default value of 0.0.0.0/0 in this field results
in the action applying to all source IP addresses.
Select the zone which is the intended destination of the data traffic. WAN
applies to the wireless connection to the cellular carrier and the LAN refers
to local connections on the IPn3G (Ethernet, USB NDIS etc)
If a valid IP/Network address is specified, the action will apply against that
address; otherwise, leaving the default value of 0.0.0.0/0 in this field results
in the action applying to all source IP addresses.
Values
WAN
LAN
none
Source IP
Values (IP Address)
0.0.0.0/0
Destination Zone
Values (selection)
WAN
LAN
none
Destination IP
Values (IP Address)
0.0.0.0/0
Protocol
The protocol field defines the transport protocol type controlled by the rule.
Values
TCP
UDP
ICMP
all
Destination Port
This field is used to define a port or service used in the rule (i.e. Port 80 =
HTTP which is generally a web server)
The IPn3G can be used to provide remote access to connected devices. To access these devices a user
must define how incoming traffic is handled by the IPn3G. If all incoming traffic is intended for a specific
connected device, DMZ could be used to simplify the process, as all incoming traffic can be directed
towards a specific IP address.
In the case where there is multiple devices, or only specific ports need to be passed, Port forwarding is
used to forward traffic coming in from the WAN (Cellular) to specific IP Addresses and Ports on the LAN.
Port forwarding can be used in combination with other firewall features, but the Firewall must be enabled
for Port forwarding to be in effect. If the WAN Request is blocked on the General Tab, additional rules and/
or IP Lists must be set up to allow the port forwarding traffic to pass through the firewall.
IP-Passthrough (Carrier > Config) is another option for passing traffic through the IPn3G, in this case all
traffic is passed to the device connected to the RJ45 port of the IPn3G, The device must be set for DHCP,
as the IPn3G assigns the WAN IP to the device, and the modem enters into a transparent mode, routing all
traffic to the RJ45 port. This option bypasses all firewall features of the IPn3G, as well as all other features
of the IPn3G such as COM, VPN, GPS etc.
Enable or disable DMZ Mode. DMZ can be used to forward all traffic to a
specific PC/Device on the LAN (DMZ Server IP listed below).
Image 4-40: Firewall Configuration, Port Forwarding Config. Submenu
DMZ Mode
Values (selection)
Disable / Enable
4.0 WebUI Configuration
If DMZ is enabled and an
exception port for the
WebUI is not specified,
remote management will
not be possible. The
default port for remote
management is TCP 80.
Enter the IP address of the destination device on the LAN side of the
IPn3G.
Enter a exception port number that will NOT be forwarded to the DMZ
server IP. Usually a configuration or remote management port that is
excluded to retain external control of the IPn3G.
Enter any additional ports that are not to be forwarded, each separated by
a comma.
This is simply a field where a convenient reference or description is added
to the rule. Each Forward must have a unique rule name and can use up to
10 characters.
DMZ Server IP
Values (IP Address)
192.168.100.100
Exception Port
Values (Port #)
none
More Exception Ports
Values (Port #)
none
Rule Name
Values (10 chars)
Forward
Enter the IP address of the intended internal (i.e. on LAN side of IPn3G)
server.
Target port number of internal server on the LAN IP entered above.
Select the type of transport protocol used. For example Telnet uses TCP,
SNMP uses UDP, etc.
MAC List configuration can be used to control which physical LAN devices can access the ports on the
IPn3G, by restricting or allowing connections based on the MAC address. MAC List can be used alone or
in combination with LAN to WAN Access Control to provide secure access to the physical ports of the
IPn3G.
Image 4-41: Firewall Configuration, MAC List Config. Submenu
The Rule Name field is required to give the rule a convenient name for
reference. Each rule must have a unique name, up to 10 characters in
length.
Specify the MAC Address to be added to the list. Must be entered in the
correct format as seen above.
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP (quietly
IP List configuration can be used to define who or what can access the IPn3G, by restricting or allowing
connections based on the IP Address/Subnet. Can be used alone or in combination with WAN Request
and LAN to Wan Access Control.
The Rule Name field is required to give the rule a convenient name for
reference. Each rule must have a unique name, up to 10 characters in
length.
Specify the specific IP or Network address (With /subnet, for example
192.168.0.0/24 will apply to all IP addresses in the 192.168.0.1 -
192.168.0.254 range (subnet /24 = 255.255.255.0).
Optional, enter a destination IP address to make the IP list more specific.
Leave as 0.0.0.0/0 to not use.
Enter the specific zone that the IP List will apply to, WAN (Wireless), LAN
(Ethernet, USB NDIS) or None (both).
Rule Name
Values (10 chars)
IP_List
Source Address
Values (IP Address)
0.0.0.0/0
Destination Address
Values (IP Address)
0.0.0.0/0
Select Zone
Values (Selection)
WAN / LAN / NONE
The Action is used to define how the rule handles the connection request.
ACCEPT will allow a connection, while REJECT (error) and DROP (quietly
dropped), will refuse connections.
This menu provides a soft button which, when selected, will reset the firewall settings to factory defaults.
Once the button is pressed all configured firewall settings will immediately be reset to factory defaults.
On the front diagnostics (COM2) port of the IPn3G (Units shipped after June 1, 2012), 2 pins have been
set aside to be used for Digital I/O. Pin 7 is used as an INPUT, and Pin 8, is used for an OUTPUT. The
status window shows the current status of these pins.
Image 4-44: I/O > Status
Diagnostics Port (DB9 - Female)
Pin 7 - INPUT
Pin 8 - OUTPUT
Image 4-45: I/O > Pin Location
INPUT PINS
Pin 7 on the Diagnostics port of the IPn3G can be used to detect an input. Pin 7 has a small wetting
current (Vin) used to detect a contact closure, and prevent false readings by any noise or intermittent
signals, it has a threshold sensitivity of 1.8V.
OUTPUT PINS
Pin 8 on the diagnostics port of the IPn3G can be used to provide an output signal, which can be used, for
example, to drive an external relay to control an external device. Appendix G: Digital I/O: Driving an External Relay, provides a example schematic of how this would work. Maximum recommended load for
the Output Pin is 150mA @ 32 VDC (Vin)
A Virtual Private Network (VPN) may be configured to enable a tunnel between the IPn3G and a remote
network.. The IPn3G supports VPN IPsec Gateway to Gateway (site-to-site) tunneling, meaning you are
using the IPn3G to create a tunnel between two VPN devices. The IPn3G can also operate as a L2TP
Server, allowing users to VPN into the unit from a remote PC, and a L2TP Client.
The Site to Site configuration allows the connection of two VPN devices to create a tunnel, such as a
IPn3G router at the office and a VPN capable router at a teleworker’s home. To establish a tunnel, settings
must be mirrored on the two routers. A successful connection requires that at least one router is identifiable
by a static IP address or a Server ID. If one end of the tunnel uses a dynamic IP address, the server ID can
be used to establish a connection. The two ends of the tunnel cannot be on the same subnet.
Image 4-47: VPN IPsec, Site-to-Site Submenu
Add/Edit Tunnel > Tunnel Name
Enter a name for the VPN Tunnel. Up to 16 different tunnels can be
created, each requiring a unique name. The VPN tunnel name can be
comprised of 1-0, A-Z, a-z or ‘_’. The space and dash ‘-’, are not valid
characters.
Add/Edit Tunnel > Tunnel Status
Tunnel Status is used to Enable or Disable the current tunnel.
Add/Edit Tunnel > Authentication
Select the type of Authentication. If Preshared Key is used, the same key
must be entered under IPsec Setup > Preshared Key. If X.509 is selected,
Certificate Management (Security) must be used to load the required
certificates and private keys related to X.509
Local Setup > Local Security Gateway Type
Specify the method for identifying the router to establish the VPN tunnel.
The Local Security Gateway is on this router; the Remote Security
Gateway is on the other router. At least one of the routers must have either
a static IP address or a dynamic IP with server id to make a connection.
IP Only: Choose this option if this router has a static WAN IP address. The WAN IP address appears
automatically. For the Remote Security Gateway Type, an extra field appears. If you know the IP address
of the remote VPN router, choose IP Address, and then enter the address.
IP + Server ID: Choose this option if this router has a static WAN IP address and a server id. The WAN IP
address appears automatically. For the Remote Security Gateway Type, an extra field appears. If you
know the IP address of the remote VPN router, choose IP Address, and then enter the address.
Dynamic IP + Server ID: Choose this option if this router has a dynamic IP address and a server id
(available such as @microhard.vpn). Enter the server id to use for authentication. The server id can be
used only for one tunnel connection.
Local Setup > Gateway IP Address
Displays the current WAN IP address of the IPn3G.
Local Setup > Local Server ID
This option appears when the Local Security Gateway Type specifies that
the Server ID is required for the connection. The Server ID must be in the
format @name, where name can be anything. Both routers must know
each others names to establish a connection.
Local Setup > Subnet IP Address
Define the local network by specifying the local subnet. Each end of the
tunnel must be on different subnets. To setup/change the local subnet on
the IPn3G, visit the Network Configuration Tab prior to setting up a VPN
tunnel.
Local Setup > Subnet Mask
Specify the subnet mask of the local network address.
Local Setup > Certificate
Values (IP Address)
Current WAN IP Address
Values (characters)
(no default)
Values (IP Address)
(no default)
Values (IP Address)
(no default)
If X.509 CA Authentication is selected, this field will appear. Enter
the certificate to be used by the current tunnel.
If X.509 CA Authentication is selected, this field will appear. Enter
the Private Key required by the X.509 protocol.
Specify the method for identifying the router to establish the VPN tunnel.
The Local Security Gateway is on this router; the Remote Security
Gateway is on the other router. At least one of the routers must have either
a static IP address or a dynamic IP with server id to make a connection.
(See Local Group Setup for details)
Values (selection)
IP Only
IP + Server ID
Dynamic IP + Server ID
Remote Setup > Gateway IP Address
If the remote VPN router has a static IP address, enter the IP address of
the remote VPN Gateway here.
Values (IP Address)
(no default)
Remote Setup > Remote Server ID
This option appears when the Remote Security Gateway Type specifies
that the Server ID is required for the connection. The Server ID must be in
the format @name, where name can be anything. Both routers must know
each others names to establish a connection.
Define the remote network by specifying the subnet local to that router.
Remote Setup > Subnet Mask
Specify the subnet mask of the remote network address.
Remote Setup > Certificate
If X.509 CA Authentication is selected, this field will appear. Enter the
certificate to be used by the current tunnel.
Select the IPsec IKE (Internet Key Exchange) mode used for
authentication. Main mode is the standard mode, but aggressive mode can
be used to provide faster negotiation.
IPsec Setup > Phase 1 DH Group
Select value to match the values required by the remote VPN router.
Values (IP Address)
(no default)
Values (IP Address)
(no default)
Values (characters)
(no default)
IPsec Setup > Mode
Values (selection)
Main / Aggressive
Values (selection)
modp1024/modp1536/
modp2048
Phase 1 Encryption
Select value to match the Phase 1 Encryption type used by the remote
VPN router.
Values (selection)
3des/aes/aes128/aes256
Phase 1 Authentication
Select value to match the Phase 1 Authentication used by the remote VPN
router.
Values (selection)
md5 / sha1
Phase 1 SA Life Time
Select value to match the values required by the remote VPN router.
Set the DPD action required to authenticate with the remote VPN
router.
4.10.1.2 VPN > L2TP Server
DPD Action
Values (selection)
Hold / Clear
Enter a name for the L2TP VPN Tunnel. The L2TP VPN tunnel name can
be comprised of 1-0, A-Z, a-z or ‘_’. The space and dash ‘-’, are not valid
characters.
Tunnel Status is used to Enable or Disable the current tunnel.
Select the type of Authentication. If Preshared Key is used, the same key
must be entered under IPsec Setup > Preshared Key. If X.509 is selected,
Certificate Management (Security) must be used to load the required
certificates and private keys related to X.509
Specify the method for identifying incoming L2TP connections. Remote
systems can simply specify the IP address, or it can be configured that the
Server ID must also be known.
Local Setup > Local Security Gateway Type
Local Setup > Gateway IP Address
Displays the current WAN IP address of the IPn3G, which is the local VPN
Gateway.
Specify the Server ID if required by the Local Security Gateway Type
above. Usually this is in the format of @name.
Displays the local subnet used by the IPn3G for local devices, those
connected to the Ethernet Port. To modify the subnet used, visit the
Network Configuration menus.
Values (selection)
IP Only
IP + Server ID
Values (IP Address)
Current IP Address
Server ID
Values (characters)
(no default)
Subnet IP Address
Values (IP Address)
192.168.0.0
Subnet Mask
Displays the local subnet mask used by the IPn3G for local devices.
Values (IP Address)
255.255.255.0
Certificate / Private Key
If X.509 CA is chosen as the authentication method for the L2TP server,
then the certificates must be loaded using the Certificate Management
menu located under security. Specify which certificate / private key is being
used with this tunnel here.
Values (characters)
(no default)
Remote Setup > Start IP Address
Enter the starting range of IP Addresses that will be assigned to a remote
VPN adapter (such as a remote PC) when a VPN tunnel is created.
Values (IP Address)
192.168.0.201
End IP Address
Enter the end of the range of IP Addresses that will be assigned to a
remote VPN adapter (such as a remote PC) when a VPN tunnel is created.
IPsec Setup - Refer back to the previous section for information about IPsec parameters.
The IPn3G can also operate as a L2TP Client, allowing a VPN connection to be made with a L2TP Server.
The Connection Name is used as a reference name for easy identification
of the connection.
Enable or disable the connection to the specified L2TP server here.
Select the type of Authentication. If Preshared Key is used, the same key
must be entered under IPsec Setup > Preshared Key. If X.509 is selected,
Certificate Management (Security) must be used to load the required
certificates and private keys related to X.509
The L2TP requires that incoming connections know their IP Address and/or
the Server ID. Select which parameters are used by the L2TP server.
Local Setup > Local Security Gateway Type
Local Setup > Gateway IP Address
The current WAN IP address is shown here.
If the server ID is required, enter the ID here.
Remote Setup > Remote Security Gateway Type
The L2TP requires that incoming connections know their IP Address and/or
the Server ID. Select which parameters are used by the L2TP server. The
L2TP server must have a static, known IP address to create a tunnel.
Values (selection)
IP Only
IP + Server ID
Dynamic IP + Server ID
Values (IP Address)
Current IP Address
Local Setup > Local ID
Values (characters)
(no default)
Values (selection)
IP Only
IP + Server ID
Remote Setup > Gateway IP Address
Enter the IP address of the L2TP server that is to be connected to.
Values (IP Address)
(no default)
Remote Setup > Server ID
If the server ID is required, enter the ID here.
Values (characters)
(no default)
Remote Setup > Subnet IP Address
Enter the IP Address of the remote network.
Values (IP Address)
(no default)
Remote Setup > Subnet Mask
Enter the subnet mask of the remote network.
IPsec Setup - Refer back to the previous sections for information about IPsec
parameters.
The IPn3G also supports GRE (Generic Routing Encapsulation), which can encapsulate a wide variety of
network layer protocols not supported by traditional VPN. This allows IP packets to travel from one side of
a GRE tunnel to the other without being parsed or treated like IP packets.
Each GRE tunnel must have a unique name. Up to 10 GRE tunnels are
supported by the IPn3G. Valid characters include A-Z, a –z, 1 - 0, ‘_’.
Spaces and dashes are not allowed.
GRE Tunnel Local Status
Enable / Disable the GRE Tunnel.
Enable / Disable Multicast support over the GRE tunnel.
Enable / Disable ARP (Address Resolution Protocol) support over the GRE
tunnel.
Set the TTL (Time-to-live) value for packets traveling through the GRE
tunnel.
Some models of the IPn3G support GPS and can provide GPS data to a client. The IPn3G can be polled
for GPS data via GPSD standards and/or provide customizable reporting to up to 4 different destination IP
addresses via UDP packets, or by Email.
GPS data can also be reported out the COM1 RS232/485 Serial Port. For more information, refer to the
COM1 > IP Protocol Config > GPS Transparent Mode section.
Enable or disable the GPS polling function of the IPn3G. The default is
disabled.
Specify the TCP port on the IPn3G running that a remote GPS system can
connect and poll for GPSD information.
Specifies the output power supplied to the GPS antenna as required for the
specific antenna being used. Refer to your antennas manufacturer for more
information. In 0.05V intervals.
Values (selection)
Disable / Enable
TCP Port
Values (1-65535)
2947
Antenna Power (V)
Values (1.5 - 3.05)
3.05
Enable UDP and/or Email or disable GPS Reporting. Up to 4 reports can
be set up and configured independently.
If enabled local streaming will stream the GPS data selected to a device
connected to the LAN.
Specify the IP Address of the destination of the GPS data UDP packets.
Specify the port number running the GPS services at the IP Address
specified in the IP Address field.
The repeat timer specifies the frequency at which the GPS data is reported
in seconds.
The trigger condition defines the conditions that must be met before a GPS
update is reported. If OR is chosen, the Repeater Timer OR the Distance
trigger conditions must be met before an update is sent. The AND
condition, requires that both the Repeat timer AND the Distance trigger
conditions be met before an update is sent.
Distance trigger (meters)
The distance trigger allows a specified distance to be traveled before the
GPS data is reported.
Values (IP Address)
0.0.0.0
Remote Port
Values (Port #)
0
Interval(s)
Values (seconds)
0
Trigger condition
Values (selection)
OR
AND
Values (meters)
0
The Message field allows customization of up to 4 different GPS messages
to be sent to the specified host.
None - Message is not used, no data will be sent
ALL - Sends all of the below
GGA - GPS Fix Data
GSA - Overall Satellite Data
GSV - Detailed Satellite Data
RMC - Recommended Min Data for GPS
VTG - Vector Track & Ground Speed