Thank you for purchasing the USR Courier M2M 4G LTE Cat 1
Cellular Gateway!
For more than three decades, millions of businesses and
consumers have relied on USR for dependable Internet
access. Today, USR endeavors to continue the longstanding
tradition of supporting successful businesses by providing
equipment for data transfer, remote management,
broadband backup, point-of-sale, and machine-to-machine
functions. USR strives to support the latest technologies through the development of new tools, which are
known for their mobility, convenience, and reliability. USR products are designed for multiple environments,
including data centers, remote networks, embedded solutions, and small-to medium-sized business markets.
This User Guide explains how to set-up and use the Courier M2M 4G LTE Cat 1 Cellular Gateway.
This document pertains to both the USR3513 and the USR803513. In this document, the term “Cellular
Gateway” is used when referring to both versions. The terms USR3513 or USR803513 are used when referring to
a specific version.
Screenshots and graphics shown in this guide may differ slightly from your product due to differences in your
product’s firmware, your web browser, or your computer’s operating system.
The Courier M2M 4G LTE Cat 1 Cellular Gateway is a wireless device that provides cellular connectivity to the
Internet for machine-to-machine (M2M) and Internet of Things (IoT) applications.
The Cellular Gateway can interface with a wide variety of M2M and IoT equipment via Ethernet or serial port.
For example, the Cellular Gateway can allow remote M2M equipment to wirelessly contact an application server
via the Internet and transmit M2M data, as shown in figure 1.
figure 1
Also, the Cellular Gateway can allow remote serial equipment to wirelessly contact an application server via the
Internet and transmit M2M data, as shown in figure 2.
In cases where a remote site has wired access to the Internet as shown in figure 3, the Cellular Gateway’s
firewall can protect the remote equipment while allowing a connection to an application server via the Internet.
figure 3
Also in cases where a remote site has wired access to the Internet, the Cellular Gateway can be used as a serialto-Ethernet bridge, allowing remote serial equipment to contact an application server via the Internet to
transmit M2M data, as shown in figure 4.
figure 4
Those are just a few examples of how the versatile USR Courier M2M 4G LTE Cat 1 Cellular Gateway can be part
of a traditional M2M or IoT data communications solution.
USR’s Courier M2M 4G LTE Cat 1 Cellular Gateway is shipped with the following items. If any of these items are
missing or damaged, please contact your customer service representative for assistance.
USR3513
1 USR3513 Cellular Gateway
1 Power supply with fixed blades for North America
2 4G/3G/2G omni-directional antennas, 0 dBi, SMA (male)
1 Ethernet cable
1 Quick start guide (printed)
USR803513
1 USR803513 Cellular Gateway
1 Power supply with interchangeable EU and UK blades
2 4G/3G/2G omni-directional antennas, 0 dBi, SMA (male)
1 Ethernet cable
1 Quick start guide (printed)
NOTE: The above items come with the standard Cellular Gateway models, but the package contents may vary
Single unit supports multiple cellular networks
Configure for your cellular operator in less than a minute (USR3513)
Category 1 speeds on 4G LTE networks, ideal for M2M applications
Fallback to 3G UMTS networks (USR3513) when outside of 4G LTE coverage
Fallback to 2G networks (USR803513) when outside of 4G LTE coverage
Interface to Ethernet or serial equipment
Includes two types of VPN for contacting an M2M server that’s behind a firewall
User-friendly web interface for enabling connectivity, configuring the firewall, setting serial port
parameters, and monitoring operational status
Concealed SIM slot discourages unauthorized removal of SIM
Can be remotely configured from a web browser
Safety & EMC: (see CE Declaration of Conformity)
Network: GCF (module only)
Energy efficiency: ErP level VI
Hazardous Substances: RoHS compliant
Reliability
USR3513 MTBF: 1,110 yrs (module only)
USR803513 MTBF: 1,055 yrs (module only)
Warranty
Warranty Period: Two-year limited manufacturer warranty from date of purchase
The recessed hardware reset button is located on the unit’s back panel.
Using a pen or small screwdriver, press and hold as follows:
If the reset button is pressed for less than one second it will be ignored.
Hold for one to four seconds to perform a reboot when the button is released.
If the reset button is pressed for more than four seconds up to ten seconds it will be ignored.
Hold for more than ten seconds up to twenty seconds to restore factory settings and reboot when the
button is released.
If the reset button is pressed for more than twenty seconds it will be ignored.
14. Click Status on the menu bar of the WAN page to confirm the cellular connection on the Status page.
A connection to the network will be setup automatically. In a few seconds when the connection is
complete, entries will appear in the Registration, Area Information, WAN IP, WAN Netmask, and WAN
Default Gateway fields.
The Cellular Gateway’s date and time will automatically synchronize to the network clock.
Now you can proceed with configuring the Cellular Gateway for the target application.
The USR Courier M2M 4G LTE Cat 1 Cellular Gateway provides an embeddedweb interface for a convenient and
intuitive wayto configure the Cellular Gateway and monitor its status.
In this chapter, default settings are identified by a Bold Italic font.
Accessing the Web Interface
The web interface is accessed locally via a web browser running on a computer connected to the gateway, or
remotely via a web browser running on a computer or mobile device. The recommended web browsers are:
IE 10 or newer
Firefox (all)
Opera 12 or newer
Safari 6 or newer
Chrome (all)
Local access to the web interface is made by connecting an Ethernet cable from a computer to the LAN port of
the Cellular Gateway.
To access the web interface, open a web browser on the computer and enter the IP address of the embedded
web interface into the browser’s address bar. The default IP address is 192.168.10.250, which can be changed
later if desired.
NOTE: Some browsers may display a security warning. Accept the warning to open an unencrypted https
session.
Remote Access
Remote access to the web interface can be made from a computer or mobile device* that has a connection to
the Internet (or to a private network), under the following conditions:
The Cellular Gateway has Remote Access enabled
The Cellular Gateway has a cellular or a wired connection to the Internet (or to a private network)
The Cellular Gateway is at an IP address that is known and is routable from the computer or mobile
device
*The Cellular Gateway’s web interface is not optimized for viewing on mobile devices.
To access the web interface:
1. Open a web browser on the computer or mobile device.
2. Enter the https:// prefix, the IP address of the SIM, a colon (:), and the Remote Access port number
into the address bar.
Example: https://10.24.85.5:1800
3. Press/touch Enter
NOTE: Some browsers may display a security warning. Accept the warning to open an unencrypted https
For either local access or remote access, a Login box will appear in the browser. Enter the default User Name
(admin) and Password (password) and click the Log In button. The User Name and Password are case-sensitive.
NOTE: To prevent unauthorized access to the web interface, changethe User Name and Password.
As a security measure, the web interface will automatically log out if it detects no activity for ten minutes. If the
timeout expires, log back in to continue using the web interface.
Navigating the Web Interface
A Menu Bar is displayed at the top of the web interface. It allows navigation to each page of the web interface.
During a local access session, this displays the IP address of the computer connected to the Cellular Gateway.
During a remote access session, this displays the IP address of the computer or mobile device connected
remotely to the Cellular Gateway.
Date
When the Cellular Gateway has a cellular connection or has a wired connection to a network that has an NTP
server, the Cellular Gateway’s date and time will automatically synchronize to the network.
When no NTP server is found, a default date and time will display.
Uptime
Displays the time duration since the last power-up or reboot.
IMEI
Displays the International Mobile Equipment Identity number, which is a unique identifier of the Cellular
Gateway’s embedded radio module.
Displays the International Mobile Subscriber Identity number, which is a unique identifier of the cellular
subscriber associated with the SIM installed in the Cellular Gateway’s SIM slot.
ICC
Displays the Integrated Circuit Card Identifier (ICCID) number, which is a unique identifier printed on the SIM
installed in the Cellular Gateway’s SIM slot.
Module Revision
Displays the embedded radio module’s firmware version number.
Displays the status of the Cellular Gateway’s connection to a cell tower.
Registration status
Home (Operator): Displayed when the Cellular Gateway is connected to a cell tower that is operated by
a carrier with which the SIM has an active subscription. Operator displays the name of the cell tower
operator.
Roaming (Operator): Displayed when the Cellular Gateway has a roaming connected to a cell tower that
is not operated by a carrier with which the SIM has an active subscription. Operator displays the name
of the cell tower operator.
Not registered, ME is not currently searching a new operator to register: Displayed when the Cellular
Gateway is not currently searching for a connection to a cell tower.
Not registered, but ME is currently searching a new operator to register: Displayed when the Cellular
Gateway is actively searching for a connection to a cell tower.
Denied: Displayed when a cell tower has refused a connection request from the Cellular Gateway.
Unknown: Displayed when none of the above conditions apply.
Signal quality and strength
When the Cellular Gateway is registered with a cell tower, the signal quality and signal strength are displayed as
two numbers.
The first number that follows the (Operator) is a signal quality measurement that ranges from 31 (best) to 0
(worst). When no connection is found, the number 99 is displayed.
The number in parenthesis is the signal strength displayed in dBm, which ranges from -51 dBm (strongest) to 113 dBm (weakest). When the Cellular Gateway is not registered or couldn’t find a cell tower, -125 dBm is
reported.
Good: -51 to -79 dBm
Fair: -80 to -103 dBm
Bad: -104 to -113 dBm, -125 dBm
This section displays information about the WWAN (cellular) or WAN (Ethernet) connection.
The network information displayed in this section depends on the Mode setting in the WAN page and the DCHP
setting in the WAN page. The following table shows how the network information is effected by the Mode and
DHCP settings.
Received & Transmitted
Displays the cumulative number of bytes received and transmitted over either type of WAN connection since the
last power-up or reboot.
The Cellular Gateway provides two types of VPN on its WAN connection: IPSec and OpenVPN.
When the Cellular Gateway has IPSec enabled, this section appears and displays information about the VPN
connection.
IPSec Status
Displays Idle when IPSec is enabled but a tunnel is not established.
Displays Connected when an IPSec tunnel is established.
Remote IP
Reports the IP address of the IPSec endpoint at the far end of the VPN tunnel.
Remote Client IP is reported when the other VPN endpoint is an IPSec client.
Remote Gateway IP is reported when the other VPN endpoint is an IPSec gateway.
When the Cellular Gateway has OpenVPN enabled, this section appears and displays information about the VPN
connection.
OpenVPN Status
Displays Idle when an OpenVPN client is enabled but a tunnel is not established.
Displays Listening when an OpenVPN server is enabled but a tunnel is not established.
Displays Connected when an OpenVPN tunnel is established.
IP
Reports the IP address of the OpenVPN endpoint at the far end of the VPN tunnel.
This section displays information about the Cellular Gateway’s LAN port.
IP
Displays the current IP address of the Cellular Gateway’s LAN port. The embedded web interface is accessed at
this IP address. The default IP address is 192.168.10.250, which can be changed on the LAN page.
Netmask
Displays the current IP netmask of the Cellular Gateway’s LAN port. The default netmask is 255.255.255.0, which
can be changed on the LAN page.
Received & Transmitted
Displays the cumulative number of bytes received and transmitted over the LAN connection since the last
power-up or reboot.
connection will not complete until a valid User name and/or Password is
Mode
This setting chooses a WWAN (cellular) or WAN (Ethernet) connection.
WWAN: The Cellular Gateway’s embedded radio module will try to connect to a cellular data network.
WAN: The Cellular Gateway’s WAN port will try to connect to a local-area network.
Operator (USR3513 only)
This setting configures the embedded radio module firmware for a specific cellular network.
Verizon: The embedded radio module will run firmware that is approved for the Verizon 4G LTE cellular
network.
AT&T & T-Mobile: The embedded radio module will run firmware that is approved for the AT&T 4G LTE cellular
network and also works on the T-Mobile 4G LTE cellular network.
LTE Generic: The embedded radio module will run firmware that works on most other 4G LTE cellular networks.
Access Point
The cellular network operator usually will provide an APN (Access Point Name) to the subscriber. Enter the APN
into this field to connect to the Internet via the cellular data network.
NOTE: If the cellular network also required a User name and/or Password, the
The cellular network operator may provide an assigned User name, or may provide instructions for choosing a
User name. Enter the User name into this field. Leave it blank if a User name is not required by the cellular
network.
Password
The cellular network operator may provide an assigned Password, or may provide instructions for choosing a
Password. Enter the Password into this field. Leave it blank if a Password is not required by the cellular network.
Authentication
No Auth: Use this setting when the WAN connection is not authenticating Point-to-Point Protocol (PPP).
PAP: Password Authentication Protocol is used by Point-to-Point Protocol (PPP) to authenticate clients. Use this
setting when connecting to a PPP server that requires PAP authentication.
CHAP: Challenge Handshake Authentication Protocol is a secure method to authenticate clients used by Pointto-Point Protocol (PPP). Use this setting when connecting to a PPP server that requires CHAP authentication.
The contents of these fields depends on the Mode setting and the DCHP setting.
When Mode is set to WWAN, these fields are undefined. Addresses are assigned by the cellular
network.
When Mode is set to WAN and DHCP is set to Enable, these fields are undefined. Addresses are assigned
by the local-area network.
When Mode is set to WAN and DHCP is set to Disable, enter a network IP Address, Subnet mask,
Gateway address, and DNS address into these fields.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
The Cellular Gateway’s LAN IP address is static, and the default is 192.168.10.250.
To change the IP address of the Cellular Gateway’s LAN port, enter the new IP address into this field and click
the Save button.
When choosing a new LAN address, basic network principles must be followed. For example when three nodes
have static IP addresses and the Cellular Gateway’s DHCP server is enabled:
and must stay outside
Subnet mask
The default LAN subnet mask is 255.255.255.0.
To change the subnet mask of the Cellular Gateway’s LAN port, enter the new subnet mask into this field and
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
DHCP page
This page enables/disables and configures the Cellular Gateway’s DHCP server.
Changes to settings on this page don’t take effect until saved!
Enable: This setting enables the Cellular Gateway’s DHCP server. Use this setting when any node attached to the
Cellular Gateway’s LAN port will request a DHCP IP address.
For example, when using a computer to access the Cellular Gateway’s web interface, the computer normally will
request an IP address and the Cellular Gateway’s DHCP server will assign an IP address to the computer.
Disable: This setting disables the Cellular Gateway’s DHCP server. Use this setting when all nodes attached to
the Cellular Gateway’s LAN port have a manually-assigned static IP address.
NOTE: When all nodes have a static IP address, the DHCP server can remain enabled, provided that all of the
static IP addresses are outside the DHCP range. That way, a computer can easily join the network to
access the Cellular Gateway’s web interface.
When choosing static IP addresses, basic network principles must be followed. For example when three nodes
have static IP addresses and the Cellular Gateway’s DHCP server is enabled:
and must stay outside
Offset
This entry sets the lowest Host ID number that the Cellular Gateway’s DHCP server can assign. The allowed
range is 1 - 254. The default value is 100.
This entry sets the number of sequential Host ID numbers that the Cellular Gateway’s DHCP server can assign.
The allowed range is 1 - 254. The default value is 20.
The highest Host ID number that the DHCP server can assign is (Offset + Range - 1).
DNS
When any node connected to the Cellular Gateway’s LAN port tries to connect to a URL (instead of an IP
address), the Cellular Gateway will try to resolve the URL into an IP address by consulting a DNS server.
The first DNS entry contains the IP address of the primary DNS server.
In an M2M system, using a URL to contact a host may be handy when the host has a dynamic IP address and
reports its current IP address to a DNS server. So if the application will be using URLs, enter the IP address of the
host’s primary DNS server into this field.
DNS
This entry contains the IP address of an alternate DNS server.
If the application will be using URLs, enter the IP address of the host’s alternate DNS server into this field.
When the Cellular Gateway’s DHCP server assigns an IP address to a DHCP client attached to the LAN port, the
DHCP protocol also assigns a lease time to that client. When the lease expires, the DHCP client is required to
send another DHCP request.
The default value is 3600 seconds. The allowed range is 60 to 3880000 seconds.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
When the Cellular Gateway’s DHCP server has assigned IP addresses to DHCP clients, this page displays
information about the DHCP clients and the DHCP leases.
Each row on this page displays information about one DHCP client.
computer attached to the LAN port during gateway set-up may use
the cellular connection for all of its Internet access activities. Data
Default policies
The default policies control two data paths thru the gateway:
Connections from the Cellular Gateway’s LAN & serial ports to the WAN (cellular or Ethernet).
Connections from the WAN (cellular or Ethernet) to the Cellular Gateway’s LAN & serial ports.
LAN -> WAN
Accept: Connections from the LAN to the WAN are allowed. Use this setting when nodes attached to the Cellular
Gateway’s LAN port need to initiate a connection to an IP address on the Internet, or when the Cellular Gateway
bridges its serial client to the WAN.
CAUTION: When LAN -> WAN is set to Accept and the WAN is cellular, a
usage can be very high, and the usage is billable by the cellular
operator.
To prevent this excessive data usage, consider using Port Filtering
or Trusted IPs.
Reject: Connections from LAN nodes to the WAN are blocked. Use this setting when nodes attached to the
Cellular Gateway’s LAN port or serial port will only receive a connection from a host.
Drop: This setting is similar to Reject, except the Cellular Gateway does not notify LAN nodes that the
connection is blocked.
CAUTION: When WAN -> Local is set to Accept, the Cellular Gateway and the
secure system, get a private IP address from the cellular operator.
WAN -> Local
Accept: Connections from the WAN to the Cellular Gateway’s LAN are allowed. Use this setting when nodes
attached to the Cellular Gateway’s LAN port need to receive a connection from a host on the Internet, or when
the Cellular Gateway bridges the WAN to its serial server.
LAN nodes are vulnerable to attacks from the Internet. For a more
Reject: Connections from the WAN to the Cellular Gateway’s LAN are blocked. Use this setting when nodes
attached to the Cellular Gateway’s LAN port or serial port will only initiate a connection to an IP address on the
Internet.
CAUTION: When WAN -> Local is set to Reject, the Cellular Gateway will not
allow an inbound connection, but it will notify the source of the
request that the connection is blocked. That response may alert
attackers and prompt further attacks.
Drop: This setting is similar to Reject, except the Cellular Gateway does not notify the source of the request that
connections are blocked. Use this setting to minimize the chance of being attacked from the Internet.
vulnerable to attacks from the Internet. For a more secure system,
Remote Access
Remote access allows a remote computer or mobile device* to log into the Cellular Gateway’s embedded web
interface, under the following conditions:
The Cellular Gateway has Remote Access enabled
The Cellular Gateway has a cellular or a wired connection to the Internet (or to a private network)
The Cellular Gateway is at an IP address that is known and is routable from the computer or mobile
device
*The Cellular Gateway’s web interface is not optimized for viewing on mobile devices.
Disable: Use this setting to reject a remote access session.
Enable: Use this setting to accept a remote access session. A field will appear for entering a port number. The
port field sets the port number that the Cellular Gateway is listening to for a Remote Access connection.
The default value is 1800. The allowed range is 0 to 65535.
Remote Access does NOT require setting the WAN -> Local default policy to Accept.
NOTE: In order for the enable or disable setting to take effect, reboot the gateway after saving!
CAUTION: When Remote Access is Enabled, the Cellular Gateway is
get a private IP address from the cellular operator.
1. Open a web browser on the computer or mobile device.
2. Enter the https:// prefix, the IP address of the SIM, a colon (:), and the Remote Access port number into the
address bar.
Example: https://10.24.85.5:1800
3. Press/touch Enter.
4. Log in.
NOTE: Some browsers may display a security warning. Accept the warning to open an unencrypted https
session.
DMZ
DMZ is one way to pass inbound data through the Cellular Gateway to a node on its LAN. (The other way is
Inbound Port Forwarding.)
NOTE: To allow a host to connect to the Cellular Gateway, the Cellular Gateway’s SIM must be provisioned with
a static IP address. And for security reasons, that static IP address should be private (not a public address on the
Internet). The cellular operator must therefore provide a VPN connection from the host into their private
network to allow the host to reach the private static IP address of the Cellular Gateway, as illustrated above.
NOTE:By default the Cellular Gateway’s serial port is a server listening at port
DMZ configures a demilitarized (safe) zone on the Cellular Gateway’s LAN. This feature forwards all inbound
data to a specific IP address on the Cellular Gateway’s LAN to protect any other nodes on the LAN.
Disable: Disables the DMZ feature.
Enable: Enables the DMZ feature. A field will appear for entering the IP address that is used for forwarding all
inbound data to the LAN.
6000. To avoid port conflicts when using DMZ:
Don’t send any data to the gateway on port 6000, or
Set the serial server to listen at an unused port, or
Inbound Port Forwarding is one way to pass inbound data through the Cellular Gateway to a node on its LAN.
(The other way is DMZ.)
NOTE: To allow a host to connect to the Cellular Gateway, the Cellular Gateway’s SIM must be provisioned with
a static IP address. And for security reasons, that static IP address should be private (not a public address on the
Internet). The cellular operator must therefore provide a VPN connection from the host into their private
network to allow the host to reach the private static IP address of the Cellular Gateway, as illustrated above.
The Inbound Port Forwarding section of the Firewall page lists the Inbound Port Forwarding rules, up to a
maximum of 24.
Each rule, in sequence, evaluates the inbound data’s protocol, source IP address, and destination port number.
When more than one rule is set up, the first line has the highest priority.
If the inbound data’s protocol, source IP address, and destination port number match the entries in a rule, the
data will be forwarded to that rule’s Local IP and Local Port entries on the Cellular Gateway’s LAN.
If no match in found by the rules:
the data may be passed thru the Cellular Gateway by DMZ (if enabled), or
the data will be blocked
Click the Add+ button to create a port forwarding rule using the above entries. New rules are added below
previous rules.
To remove a rule, click the Delete button next to the rule.
NOTE: Add rules in the order of their priority (highest first).
Outbound port filtering
When Default PoliciesLAN -> WAN setting is set to Reject or Drop, nodes on the Cellular Gateway’s LAN cannot
connect and send data to any IP address on the WAN. Outbound Port Filtering is one way to control where
nodes on the LAN can send outbound data when LAN -> WAN is set to Reject or Drop. (The other way is
Outbound Trusted IPs.)
The Outbound Port Filtering section of the Firewall page lists the Outbound Port Filtering rules, up to a
maximum of 24.
Each rule, in sequence, evaluates the outbound data’s destination port number. When more than one rule is set
up, the first line has the highest priority.
Enter a port number into each text field to specify a range of port numbers for the rule. Both values must be in
the range of 0 to 65535, and the second value must be greater than or equal to the first.
Policy
Use this setting to choose a policy that specifies what this rule will do based on the outbound data’s destination
port number.
Accept: If the outbound data’s destination port number is within the range of the rule, the data is passed to the
WAN. Outbound data whose destination port number is outside the range of the rule is blocked.
Reject: If the outbound data’s destination port number is within the range of the rule, the data is blocked.
Outbound data whose destination port number is outside the range of the rule is passed to the WAN.
Drop: This setting is similar to Reject, except the Cellular Gateway does not notify LAN nodes that the
connection is blocked.
Click the Add+ button to create a port filtering rule using the above entries. New rules are added below previous
rules.
To remove a rule, click the Delete button next to the rule.
NOTE: Add rules in the order of their priority (highest first).
Outbound trusted IPs
When Default PoliciesLAN -> WAN is set to Reject or Drop, nodes on the Cellular Gateway’s LAN cannot connect
and send data to any IP address on the WAN. Outbound Trusted IPs is one way to control where nodes on the
LAN can send outbound data when LAN -> WAN is set to Reject or Drop. (The other way is Outbound Port
Filtering.)
The Outbound Trusted IPs section of the Firewall page lists the trusted IP addresses, up to a maximum of 24.
If the outbound data’s destination IP address is found in any trusted IP rule, the data is passed to the WAN.
Outbound data whose destination IP address is not found is blocked.
Enter the IP address of a trusted host into the Outbound trusted IPs text field.
NOTE: The host must have a static IP address.
Add+ button
Click the Add+ button to create a trusted IP rule using the above entry. New rules are added below previous
rules.
To remove a rule, click the Delete button next to the rule.
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page, or log out of the web interface, or click the
Cancel button.
Cancel button
The Cancel button provides a way to discard all changes made on the Firewall page without navigating away or
logging out.
This page configures the network settings and serial parameters of the Cellular Gateway’s serial port.
Changes to settings on this page don’t take effect until saved!
Line driver
The Cellular Gateway’s serial port can use either RS232 or RS485 signaling. See Product Specifications for the
serial port’s pinout in each Line Driver mode.
RS485: Choose this setting to use four-wire full-duplex differential signaling.
RS232: Choose this setting to use RS232 signaling.
The Cellular Gateway can bridge a connection received from a host on the WAN to its serial port, or it can make
a connection from its serial port to a host on the WAN.
Server: The Cellular Gateway listens at a port for a connection from a host on the WAN so it can bridge the
connection to its serial port.
Client: The Cellular Gateway tries to open a connection to the IP address and port number of a host on the WAN
so it can bridge the connection to its serial port.
IPStack
When serial Mode is set to Server, the IPStack display confirms that Server protocols are being used.
When serial Mode is set to Client, the IPStack display confirms that Client protocols are being used.
Protocol
The Cellular Gateway’s serial bridge can use either TCP or UDP protocols for connecting to or from a host on the
WAN.
UDP: Use this setting when the serial bridge needs to connect to a UDP server or from a UDP client.
TCP: Use this setting when the serial bridge needs to connect to a TCP server or from a TCP client.
When the serial Mode is set to Server, a Listen port entry field is displayed. Enter the port number that the host
on the WAN will use to contact the Cellular Gateway’s serial port.
The default value is 6000. The allowed range is 0 to 65535.
When the serial Mode is set to Client, Destination IP and Destination port entry fields are displayed. Enter the
IP address of the host on the WAN and the host’s listener port number.
The default port value is 6000. The allowed port range is 0 to 65535.
NOTE: The host must have a static IP address.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
ATTENTION: To setup a VPN, both endpoints of the tunnel must be configured!
The settings in the Cellular Gateway have corresponding settings
in the other VPN host. Consult with the administrator of the other
IPSec Page
The Cellular Gateway provides two types of VPN on its WAN connection: IPSec and OpenVPN. This page
enables/disables and configures the Cellular Gateway’s IPSec protocols.
The IPSec client protocols can initiate a VPN on the WAN connection to an IPSec gateway.
The IPSec gateway protocols can listen on the WAN for a VPN connection from an IPSec client.
VPN host to configure those settings.
Changes to settings on this page don’t take effect until saved!
When Gateway/Client is set to Disable, this field is undefined.
When Gateway/Client is set to Client or Gateway, this is a required field. Choose and enter a fully qualified
domain name of the Cellular Gateway ❶.
This entry is case-sensitive.
Remote IP
When Gateway/Client is set to Disable or Gateway, this field is undefined.
When Gateway/Client is set to Client, this is a required field. Enter the public WAN IP address of the IPSec
endpoint at the far end of the VPN tunnel ❷ into this field.
Remote Group IP
When Gateway/Client is set to Disable, this field is undefined.
When Gateway/Client is set to Client or Gateway, this is a required field. Enter the network address of the other
IPSec host’s LAN ❸ into this field.
NOTE: The network address is the network prefix with a host ID=0.
Example: 192.168.20.0
NOTE: The Cellular Gateway’s LAN network IP address must NOT match the LAN network IP address of the other
IPSec host.
When Gateway/Client is set to Disable, this field is undefined.
When Gateway/Client is set to Client or Gateway, this is a required field. Enter the subnet mask of the other
IPSec host’s LAN ❹ into this field.
Remote FQDN (Fully Qualified Domain Name)
When Gateway/Client is set to Disable, this field is undefined.
When Gateway/Client is set to Client or Gateway, this is a required field. Enter the fully qualified domain name
of the IPSec host at the far end of the VPN tunnel ❺ into this field.
This entry is case-sensitive.
Pre Shared Key
When Gateway/Client is set to Disable, this field is undefined.
When Gateway/Client is set to Client or Gateway, this is a required field. Enter a Pre-Shared Key that matches
the Pre-Shared Key entry of the other IPSec host.
This setting must match the setting in the other IPSec host.
DES: Use this setting for the DES encryption algorithm.
3DES: Use this setting for the 3DES encryption algorithm.
AES 192: Use this setting for the AES encryption algorithm with 192-bit key.
AES 256: Use this setting for the AES encryption algorithm with 256-bit key.
Phase 2 Auth (Authorization)
This setting must match the setting in the other IPSec host.
MD5: Use this setting for MD5 hashing algorithm.
SHA1: Use this setting for SHA1 hashing algorithm.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
ATTENTION: To setup a VPN, both endpoints of the tunnel must be configured!
The settings in the Cellular Gateway have corresponding settings
in the other OpenVPN host. Consult with the administrator of the
OpenVPN Page
The Cellular Gateway provides two types of VPN on its WAN connection: IPSec and OpenVPN. This page
enables/disables and configures the Cellular Gateway’s OpenVPN protocols.
The OpenVPN client protocols can initiate a VPN on the WAN connection to an OpenVPN server.
The OpenVPN server protocols can listen on the WAN for a VPN connection from an OpenVPN client.
other OpenVPN host to configure those settings.
Changes to settings on this page don’t take effect until saved!
When Activate is set to Disable, this field is undefined.
When Activate is set to Server or Client, this is a required field. Enter the TLS renegotiation time (in seconds) into
this field.
This setting should match the setting in the other OpenVPN host. If the settings don’t match, the greater setting
will be used.
The default value is 3600 seconds. The allowed range is 1 to 3600 seconds.
NOTE: The TLS renegotiation time directly impacts the amount of cellular data
consumed to maintain the OpenVPN connection. More frequent
renegotiation causes higher cellular data consumption.
LZO Compression
None: Use this setting when the other OpenVPN host has compression disabled.
Enabled: Use this setting to apply data compression to all VPN traffic when the other OpenVPN host has
compression enabled.
Adaptive: Use this setting to dynamically decide whether or not to compress VPN traffic (some traffic is actually
more efficient uncompressed). The other OpenVPN host must be configured for adaptive compression.
When Activate is set to Disable or Server, this field is undefined.
When Activate is set to Client, this is a required field. Enter the public WAN IP address of the OpenVPN server
into this field.
VPN Subnet/Netmask
When Activate is set to Disable or Client, these fields are undefined.
When Activate is set to Server, these are required fields. Enter the network address and subnet mask chosen for
the OpenVPN virtual subnet into this field. The OpenVPN’s virtual network address must be different than the
network addresses of the client and the server LANs.
The default network address of the OpenVPN virtual subnet is 10.9.1.0.
NOTE: The network address is the network prefix with a host ID=0.
Example: The client LAN address = 192.168.10.0The server LAN address = 172.16.20.0So the VPN network address = 10.9.1.0 (which ≠ 192.168.10.0 and ≠ 172.16.20.0)
VPN Client Subnet/Netmask
When Activate is set to Disable or Client, these fields are undefined.
When Activate is set to Server, these are required fields. Enter the network address and subnet mask of the
client’s LAN into this field.
NOTE: The network address is the network prefix with a host ID=0.
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
ATTENTION: Save the OpenVPN settings before importing and saving the
OpenVPN requires several files containing certificates and keys. The OpenVPN community provides an
application that creates those files, and provides an installer to install the application onto a Windows
computer.
See Creating OpenVPN Certificates & Keys in the Appendix for details.
NOTE: After all of the files are created, some must be loaded into the Cellular Gateway, and some must be
loaded into the other OpenVPN host. See the Appendix for the file usage.
For each file being loaded into the Cellular Gateway, use the corresponding Choose File button to navigate to
the directory on the computer where the file is located, then use the corresponding Import button to transfer
the file into the Cellular Gateway.
ATTENTION: Save the OpenVPN settings before importing and saving the
Certificate Authority files!
CA: Use these buttons to select and load the CA file (ca.crt).
Certificate: Use these buttons to select and load the Certificate file.
When Activate is set to Server, select the server certificate (server.crt).
When Activate is set to Client, select the client certificate (client.crt).
Key: Use these buttons to select and load the Key file.
When Activate is set to Server, select the server key (server.key).
When Activate is set to Client, select the client key (client.key).
TLS auth: Use these buttons to select and load the TLS auth file (ta.key).
Diffie Hellman: When Activate is set to Server, Diffie-Hellman buttons appear. Use these buttons to select and
load the Diffie-Hellman file (dh2048.pem).
When Activate is set to Client, the Diffie-Hellman buttons disappear because the Diffie-Hellman file is not
required by the Cellular Gateway.
Save button: Use this Save button to save all imported Certificate Authority files into the Cellular Gateway. Once
saved, the files persist regardless of reboot, power-fail, or factory reset.
This entry sets the length of the log. If the log goes beyond this number, the earliest entries will be deleted from
the log as new entries are added.
The allowed range of this setting is 100 to 1024. The default is 100.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
The log is kept in the Cellular Gateway’s memory and displayed in the log display window. When the log is
longer than the display window, a scroll bar is provided for moving the view up or down.
Download button
The log is kept in the Cellular Gateway’s memory. Click the Download button to copy the log to a file. A file
containing the Cellular Gateway’s current log will download into the browser’s download directory. The log file
Use this button to refresh the display with the current log entries from the Cellular Gateway’s memory. This has
the same effect as clicking the browser’s Refresh button or using the Refresh keyboard shortcut.
Clear button
The log is kept in the Cellular Gateway’s memory. Click the Clear button to empty the log and refresh the
display.
The Cellular Gateway displays the current date and time on the Status Page, and uses the current date and time
for timestamping the log (when enabled).
This page configures the Cellular Gateway’s date and time settings.
Changes to settings on this page don’t take effect until saved!
Sync date & time with
local-area network or
Internet NTP server
Date & time set to
default values
Date & time set to
default values
NTP
The Cellular Gateway will try to synchronize its date and time with either a cellular network or with an NTP
server found on a local-area network or on the Internet.
Time Zone
The Cellular Gateway can adjust its date & time for any time zone.
Use this drop-down list to select the desired time zone.
Day light savings
The Cellular Gateway can adjust its date & time for daylight saving time in the selected time zone.
Disable: The Cellular Gateway will not adjust its date & time for daylight saving time.
Enable: The Cellular Gateway will automatically adjust its date & time for daylight saving time.
uploading over-the-air will be slow and will consume much cellular data!
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
F/W Upgrade Page
Customer Support may recommend installing a new firmware to solve a problem. The new firmware can be
found on the USR3513 support page: https://support.usr.com/support/3513
To get new firmware:
1. Open a web browser.
2. Navigate to the USR3513 support page.
3. Find the firmware recommended by Customer Support.
4. Click the link to download the file to the local computer. Remember where the file is saved!
After the new firmware file is stored on the computer, login to the Cellular Gateway’s web interface and
navigate to the Firmware Upgrade Page.
NOTE: Use Local Access to upload new firmware to the Cellular Gateway.
Remote Access can be used, but the firmware file is very large, so
Use these buttons to load new system firmware into the Cellular Gateway.
Click the Choose File button to open a navigation window to find the new system firmware file. The system
firmware file will have a .zip extension. Do not unzip this file!
Click the Upgrade button to install the system firmware into the Cellular Gateway. When the installation is
done, the gateway will automatically reboot.
ATTENTION: If the system firmware upgrade is interrupted, the Cellular
Gateway will detect the corrupt image and will run the previous
firmware image. Then the firmware upgrade can be re-tried.
Radio Firmware Select File
Use these buttons to load new radio firmware into the Cellular Gateway.
Click the Choose File button to open a navigation window to find the radio firmware file. The radio firmware file
will have a .bin extension.
Click the Upgrade button to install the radio firmware into the Cellular Gateway. When the installation is done,
the gateway will automatically reboot.
Allowed characters are shown shaded in the ASCII table.
The User Name and Password are case-sensitive.
Maximum number of characters is 16.
New Password
Enter the new Password into this text box.
Allowed characters are shown shaded in the ASCII table.
The User Name and Password are case-sensitive.
Maximum number of characters is 16
Confirm New Password
Re-enter the new Password into this text box to confirm the Password is correct.
Save button
Changes made on this page do not take effect until saved. Click the Save button to make changes effective. To
discard all changes made on the page, navigate to another page or log out of the web interface.
The Cellular Gateway’s configuration can be saved to a file. The configuration file can then be loaded into any
Cellular Gateway of the same model as the source gateway to duplicate the configuration of the source
gateway.
Save
Click the Save button to create a configuration file. A file containing the Cellular Gateway’s current settings will download into the browser’s download directory. The configuration file will have a .dat extension.
Use these buttons to load all the settings in a configuration file into the Cellular Gateway.
Click the Choose File button to select a configuration file. A navigation box will open to allow reading the file
from anywhere in the computer’s directory. Navigate to the desired configuration file and select it.
Once a configuration file has been selected, click the Restore button to load that configuration into the Cellular
Gateway, followed by an automatic system reboot.
Log out
From any page, select Log out from the Administrator menu to immediately log out and display the login box.