Industrial Cellular Router With Integrated Firewall and VPN: User Manual
Industrial Cellular Router With Integrated Firewall and VPN: User Manual
Industrial Cellular Router With Integrated Firewall and VPN: User Manual
Table of contents
1 For your safety ...........................................................................................................................5
1.1 Identification of warning notes ...............................................................................5
1.2 Qualification of users .............................................................................................5
1.3 Field of application of the product ..........................................................................6
1.4 Safety notes...........................................................................................................7
1.5 Security in the network...........................................................................................8
1.6 UL warning notes (only TC ROUTER 3002T-4G VZW and
TC ROUTER 3002T-4G ATT)................................................................................9
3 Installation ................................................................................................................................13
3.1 Product description..............................................................................................13
3.2 Licensing information on open source software...................................................13
3.3 Structure ..............................................................................................................14
3.4 Mounting and removal .........................................................................................16
3.5 Inserting the SIM card..........................................................................................17
3.6 Connection ..........................................................................................................18
3.7 Resetting the router .............................................................................................21
A Technical appendix.................................................................................................................121
A1 XML elements....................................................................................................121
A2 Structure of the XML configuration file ...............................................................124
A3 Wireless network ...............................................................................................127
A4 CIDR, Classless Inter-Domain Routing..............................................................146
B Appendixes.............................................................................................................................147
B1 List of figures .....................................................................................................147
B2 Index..................................................................................................................151
USA
The following devices are intended for use in the USA (only for export outside of the Euro-
pean Economic Area):
– TC ROUTER 3002T-4G VZW
– TC ROUTER 3002T-4G ATT
Other countries
If the required general conditions are met, use in other countries is possible.
To gain a rough idea of which frequency bands are available in your country of use, visit
www.frequencycheck.com.
• You will find the frequency bands for your device at “Wireless interface” on page 116.
Check with your provider whether any of these frequency bands are available at the
installation location.
• Check with your provider whether there is network coverage at the installation location.
• Check with your provider whether the device is approved for operation at the installation
location.
You can find the approved accessories listed with the product at
phoenixcontact.net/products.
WARNING:
Observe the following safety notes when using the device.
• Installation, operation, and maintenance may only be carried out by qualified electri-
cians. Follow the installation instructions as described.
• When installing and operating the device, the applicable regulations and safety direc-
tives (including national safety directives), as well as the generally recognized codes of
practice, must be observed. The technical data is provided in the packing slip and on
the certificates (conformity assessment, additional approvals where applicable).
• Opening or modifying the device is prohibited. Do not repair the device yourself, but re-
place it with an equivalent device. Repairs may only be carried out by the manufacturer.
The manufacturer is not liable for damages resulting from non-compliance.
• The IP20 degree of protection (IEC 60529/EN 60529) of the device is intended for use
in a clean and dry environment. Do not subject the device to mechanical and/or thermal
stress that exceeds the specified limits.
• The device is designed exclusively for operation with safety extra-low voltage (SELV)
in accordance with IEC 60950/EN 60950/VDE 0805. The device may only be connect-
ed to devices that meet the requirements of EN 60950.
• The device complies with the EMC regulations for industrial areas (EMC class A).
When used in residential areas, the device may cause radio interference.
Additional measures for protection against unauthorized network access can be found in
the AH EN INDUSTRIAL SECURITY application note. The application note can be down-
loaded by going to the product listing at phoenixcontact.net/products.
HTTPS certificate
• At the plant, a self-signed HTTPS certificate is located in the device to encrypt access
to the internet. For initial commissioning, you must renew the certificate or exchange it
for one you have created yourself. This is the only way to ensure that the certificate is
unique for operative use (see page 49).
2.1 Transport
The device is delivered in cardboard packaging.
• Only transport the device to its destination in its original packaging.
• Observe the instructions on how to handle the package, as well as the moisture, shock,
tilt, and temperature indicators on the packaging.
• Observe the humidity specifications and the temperature range specified for transport
(see “Ambient conditions” on page 117).
• Protect the surfaces as necessary to prevent damage.
• When transporting the equipment or storing it temporarily, make sure that the surfaces
are protected from the elements and any external influences, and that they are kept dry
and clean.
2.2 Storage
The storage location must meet the following requirements:
– Dry
– Protected against unauthorized access
– Protected from harmful environmental influences such as UV light
• For storage/transport, observe the humidity and air pressure specifications, and the
temperature range.
See “Ambient conditions” on page 117.
2.3 Unpacking
The device is delivered in packaging together with a packing slip that provides installation
instructions.
• Read the entire packing slip carefully.
• Retain the packing slip.
3 Installation
Features
– Virtual permanent line to connect networks via cellular network
– Stateful inspection firewall for dynamic filtering
– VPN remote start via SMS or call
– Two switching inputs and one switching output
– XML interface
– Alarm sent via SMS or e-mail directly via the integrated switching input
– Configuration via web-based management or microSD card
– Two local Ethernet connections
– Switchable energy-saving mode
– Integrated log
– Extended temperature range of -40°C ... +70°C
3.3 Structure
3.3.1 4G router
11
10
9 US
ERR
CON
Micro SD
Micro
SD 1
LAN 1 LAN 2
2
7
ANT 1
3
ANT 2
4
TC ROUTER
SIM
6
24V 0V I1 I2 01
5
Figure 3-1 4G router
1 LAN interface 1
2 LAN interface 2
3 SMA antenna connection 1, primary antenna
4 SMA antenna connection 2, secondary antenna
5 COMBICON plug-in screw terminal block
6 SIM interface
7 Slot for microSD card
8 CON LED
9 ERR LED
10 US LED
11 Reset button
3.3.2 3G router
CON
Figure 3-2 3G router
1 LAN interface 1
2 LAN interface 2
3 SMA antenna socket
4 COMBICON plug-in screw terminal block
5 SIM interface
6 Slot for microSD card
7 CON LED
8 ERR LED
9 US LED
10 Reset button
In the case of the TC ROUTER 3002T..., the CON LED can be configured via web-based
management. You can therefore monitor the cellular IP connection or the VPN tunnel.
B
Figure 3-3 Mounting on the DIN rail
Removal
• Pull down the locking latch using a screwdriver, needle-nose pliers or similar.
• Pull the bottom edge of the device slightly away from the mounting surface.
• Pull the device away from the DIN rail.
A B
Figure 3-4 Removal
The device only supports 1.8 V and 3 V SIM cards. In the event of older SIM cards, please
contact your provider.
You will receive a SIM card from the provider on which all data and services for your con-
nection are stored. The SIM card can be protected with a 4 or 5-digit PIN code. We recom-
mend that you enter the PIN code and the APN settings as described in “SIM” on page 37.
A packet data connection via the cellular network is required for the core functions. Select
an appropriate SIM card. You must activate the package data connection before the oper-
ation (see “Packet data setup” on page 43).
T1
C
AN
T1
AN
T2
AN
T2
AN
A
D D
SIM
SIM
B
Figure 3-5 Removing the SIM card holder, inserting the SIM card
3.6 Connection
3.6.1 Antenna
– You can find the approved accessories for this wireless system listed with the product
at phoenixcontact.net/products.
– Please refer to the documentation for the antenna.
US US
ER ER
R R
CO CO
N N
Mic Mic
ro ro
SD SD
LA LA
N N
1 1
LA LA
N N
2 2
AN AN
T1 T1
ANT 1 AN
T2
AN
T2
ANT 2
SIM
SIM
TC ROUTER
TC ROUTER
24V 24V
01 01
I1 I1
I2 I2
01 01
The 4G routers have two antenna connections. To achieve optimum LTE reception, always
connect two antennas for 4G routers. The 3G routers only have one antenna connection.
n.c. 8 RJ45
n.c. 7
TD- 6
n.c. 5
n.c. 4
TD+ 3
RD- 2
RD+ 1
US
ER
R
CO
N
Mic
ro
SD
LA
N
1
LA
N
2
AN
T1
AN
T2
24V 0V I1 I2 01
SIM
TC ROUTER
24V
01
I1
I2
01
• Connect the supply voltage to 24 V and 0 V at the plug-in screw terminal block. Ensure
the correct polarity when doing so.
• The device is ready for operation as soon as the US LED lights up.
Connection
• You can connect 10 ... 30 V DC to switching inputs I1 and I2.
• Switching output O1 is designed for a maximum of 50 mA at 10 ... 30 V DC.
• The connecting cables for the switching inputs and the switching output must not be
longer than 30 meters in length.
• The 0 V potential of the switching inputs and outputs must be connected to the “0 V” ter-
minal block of the power supply connection.
–
+
24V 0V I1 I2 01
Reset
• Press and hold the reset button.
• Disconnect the Ethernet cable from the LAN connection on the router.
• Reconnect the Ethernet cable.
• Press and hold down the reset button for a further five seconds.
The IP address has now been reset to the default address.
– IP address: 192.168.0.1
– Subnet mask: 255.255.255.0
• To log in to the router, click on “Login”. You need the user name and the password.
– User name: admin
– Password: admin
For security reasons, we recommend you change the password during initial configura-
tion (see “User, password change” on page 91).
Basic setup
admin Password for unrestricted access to all areas
IP configuration IP address (local or LAN) and subnet mask of the router
SIM PIN: Enter the PIN for the SIM card here. The PIN cannot be
read back, it can only be overwritten.
APN: The APN can be obtained from your provider.
APN (Access Point Name) is the name of a terminal point in a
packet data network. The APN enables access to an external
data network. At the same time, the APN specifies the network
to which a connection is to be established. In the case of a
public APN, the connection is usually established to the Inter-
net. The device supports public and private APNs.
4.4.1 Hardware
4.5 Software
Here you will find a list of the software used and license information.
You can find further information on the open source software in the technical note
AH EN OPEN SOURCE SOFTWARE at phoenixcontact.net/product/2702528.
4.6 Status
The following status information is displayed here:
– Device
– Cellular communication interface
– LAN interface
– VPN connection
– I/Os
This area is also visible with the user access. The menu items “Routing table”, “DHCP
leases” and “System info” are only available if you are logged in as an administrator.
4.6.1 Radio
Status, Radio
Radio status Provider Provider name
Network status Status of the cellular network
– Registered home: logged in to the provider‘s home net-
work
– Roaming: dial-in via an external cellular network
– Waiting for PIN: enter the PIN.
– Waiting for PUK: SIM card locked because an incorrect
PIN was entered three times, PUK entry required
– Wrong PIN: wrong PIN stored in device
– No SIM card: SIM card not inserted
– Busy: radio engine starting
– Power off: radio engine switched off
Signal level Signal strength as a dBm value, RSSI value, and bar
4.9.1 IP configuration
The connection from the router to the local Ethernet network can be set up here. You can
modify the IP configuration, e.g., the IP address, the subnet mask, and the type of address
assignment. Confirm your changes to the IP configuration with “Apply”. The changes only
take effect after a restart.
4.10.2 SIM
Wireless network, SIM Settings for the primary cellular network connection, Europe
SIM Country Select the country in which the router is dialing into the cellular
network. This setting limits the selection among the providers.
PIN Enter the PIN for the SIM card here. The PIN cannot be read
back, it can only be overwritten.
Roaming If roaming is activated (default), you can select a specific pro-
vider from the drop-down menu.
– Enabled: the router can also dial-in via external networks.
If “Auto” is set under “Provider”, the strongest provider is
selected. Depending on your contract, this may incur
additional costs. Alternatively, you can specify a provider.
– Disabled: roaming is deactivated. Only the provider‘s
home network is used. If this network is unavailable, the
router cannot establish an Internet connection.
Provider Select a provider via which the router is to establish the Inter-
net connection. The country selected under “Country” limits
the list of providers.
– Auto: the router automatically selects the provider using
the SIM card.
User name User name for packet data access
The user name and password can be obtained from your
provider. This field may be left empty if the provider does not
require a special input.
Password Password for packet data access
This field may be left empty if the provider does not require a
password.
Wireless network, SIM [...] Settings for the primary cellular network connection, Europe
APN The APN can be obtained from your provider.
APN (Access Point Name) is the name of a terminal point in a
packet data network. The APN enables access to an external
data network. At the same time, the APN specifies the network
to which a connection is to be established. In the case of a
public APN, the connection is usually established to the Inter-
net. The device supports public and private APNs.
Authentication Select the protocols for logging in to the provider:
– None: the provider‘s APN does not require login (default).
– Refuse MSCHAP: MSCHAP is not accepted.
– CHAP only: Only CHAP is accepted.
– PAP only: Only PAP is accepted.
Wireless network, SIM Settings for the primary cellular network connection, US
SIM Country Select the country in which the router is dialing into the GSM
network. This setting limits the selection among the providers.
PIN Enter the PIN for the SIM card here. The PIN cannot be read
back, it can only be overwritten.
Roaming If roaming is activated (default), you can select a specific pro-
vider from the drop-down menu.
– Disabled: roaming is deactivated. Only the provider‘s
home network is used. If this network is unavailable, the
router cannot establish an Internet connection.
– Enabled: the router can also dial-in via external networks.
If “Auto” is set under “Provider”, the strongest provider is
selected. Depending on your contract, this may incur
additional costs. Alternatively, you can specify a provider.
Provider Select a provider via which the router is to establish the Inter-
net connection. The country selected under “Country” limits
the list of providers.
– Auto: the router automatically selects the provider using
the SIM card.
User name User name for packet data access
The user name and password can be obtained from your
provider. This field may be left empty if the provider does not
require a special input.
Password Password for packet data access
This field may be left empty if the provider does not require a
password.
Wireless network, SIM [...] Settings for the primary cellular network connection, US
APN APN (Access Point Name) is the name of a terminal point in a
packet data network. The APN enables access to an external
data network. At the same time, the APN specifies the network
to which a connection is to be established. In the case of a
public APN, the connection is usually established to the Inter-
net. The device supports public and private APNs.
– managed Internet APN: default, no manual input
The device autonomously logs in to the network. The APN
is set automatically. When the router has logged in to the
network, the standard APN used is displayed.
– managed application APN (only Verizon Wireless):
enter an application APN. The standard APN remains
stored in the device.
– customer APN: enter a customer-specific APN. The
standard APN remains stored in the device.
– overwrite APN: the standard APN will be deleted if you
enter your APN here. This is only possible after the router
has successfully made a connection with the cellular net-
work by using the default setting (managed Internet APN).
Only use "overwrite APN" if the default APN of your pro-
vider changed and the router does not adapt automati-
cally.
Contact your provider if you have accidentally overwritten
the default APN.
Authentication Select the protocols for logging in to the provider:
– None: the provider‘s APN does not require login (default).
– Refuse MSCHAP: MSCHAP is not accepted.
– CHAP only: Only CHAP is accepted.
– PAP only: Only PAP is accepted.
Table 4-2 Subcommands <sub_cmd> for the function commands “SET” and “CLR”
Subcommand Description
<sub_cmd>
GPRS Start or stop packet data connection
OUTPUT Switch output 1: ON/OFF
OUTPUT:n Switch output n: ON/OFF, n={1...4}
IPSEC Start or stop IPsec VPN 1: ON/OFF
IPSEC:n Start or stop IPsec VPN n: ON/OFF, n={1...3}
OPENVPN Start or stop VPN 1: ON/OFF
OPENVPN:n Start or stop VPN n: ON/OFF, n={1...3}
Example
SMS message text for starting IPsec tunnel #2 with the password 1234:
#1234:SET:IPSEC:2
To stop this connection, you must send the following SMS message:
#1234:CLR:IPSEC:2
4.10.6 DynDNS
Each cellular router is dynamically assigned an IP address by the provider. The address
changes from session to session.
If the cellular router is to be accessed via the Internet, you can specify a fixed host name with
the help of a DynDNS provider for the dynamic IP address. The router can in the future be
accessed via this host name.
Check whether your cellular network provider supports dynamic DNS in the cellular net-
work.
4.10.8 Monitoring
Monitoring records cellular network parameters. You can use the function temporarily for
startup or troubleshooting. The function is not intended for permanent use. All parameters
are stored in a separate log file: “logradio.txt”. At the end of the monitoring period, monitor-
ing must be disabled.
Reference IP ping=
Configuration
Country
Subject alternative
names
Download certificate Create CSR
sign request
Certificates
Installed certificates Overview of the certificates that are saved in the router
The certificate information is displayed per mouseover at the
green checkmark.
Renew: update certificate
Delete: delete certificate
Firewall
You can filter access to the device interfaces (Web, SSH, SNMP, socket server) with the
firewall. You can create 32 rules for local access from the LAN, as well as 32 rules for remote
access from the WAN via the cellular network interface. Remote access is completely
blocked in the standard setting and local access allowed.
If multiple firewall rules are defined, these are queried starting from the top of the list of
entries until an appropriate rule is found. This rule is then applied.
If the list of rules contains further subsequent rules that could also apply, these rules are
ignored.
Every XML file generally begins with the header <?xml version="1.0"?> or
<?xml version="1.0" encoding="UTF-8"?> followed by the basic entry.
Basic entries
<io> ........... </io> I/O system
<info> ........... </info> Request general device information
<cmgs> ........... </cmgs> Send SMS messages
<cmgr> ........... </cmgr> Receive SMS messages
<cmga> ........... </cmga> Confirm receipt of SMS
<email> ........... </email> Send e-mails
I/O system
Using the XML socket server, you can:
– Query outputs and inputs
– Switch outputs
The outputs used must have been previously configured to “Remote controlled”. Depending
on the setting of “XML Boolean values”, on/off or 0/1 can be output as “value”.
Make sure that the XML data does not contain any line breaks.
<?xml version="1.0"?>
<io>
Request state of output 1
<output no="1"/>
<input no="1"/> Request state of input 1
</io>
Switch outputs
<?xml version="1.0"?>
<io>
Switch output 1
<output no="1" value="on"/>
</io>
<?xml version="1.0"?>
<io>
Switch on data connection
<gprs value="on"/>
</io>
Response from the router (shown with line break):
Make sure that the XML data does not contain any line breaks. The text must be UTF-8-
coded.
ASCII characters 34dec, 38dec, 39dec, 60dec, and 62dec must be entered as " '
& < and >.
If the XML data was received correctly, the device responds with the transmission status:
<?xml version="1.0"?>
<result>
<cmgs length="17">SMS transmitted</cmgs>
</result>
The response means that an SMS message has not been received yet. The following error
codes are possible:
Sending e-mails
Send XML data with the following structure to the device IP address via Ethernet:
<?xml version="1.0"?>
<email to="[email protected]" cc="[email protected]">
<subject>Test Mail</subject>
<body>
This is an e-mail text with several lines.
Best regards,
your router
</body>
</email>
<?xml version="1.0"?>
<io>
Start IPsec VPN connection
<ipsec no="1" value="on"/>
</io>
Response from the router (shown with line break):
<?xml version="1.0"?>
<io>
Stop IPsec VPN connection
<ipsec no="1" value="off"/>
</io>
<?xml version="1.0"?>
<io>
Start OpenVPN connection
<openvpn no="1" value="on"/>
</io>
Response from the router (shown with line break):
<?xml version="1.0"?>
<io>
Stop OpenVPN connection
<openvpn no="1" value="off"/>
</io>
Response from the router (shown with line break):
4.12.1 Firewall
The device includes a stateful packet inspection firewall. The connection data of an active
connection is recorded in a database (connection tracking). Rules therefore only have to be
defined for one direction. This means that only data from the other direction of the relevant
connection is automatically allowed through.
The firewall is active by default upon delivery. It blocks incoming data traffic and only permits
outgoing data traffic.
The device supports a maximum of 32 rules for incoming data traffic and 32 rules for out-
going data traffic.
If multiple firewall rules are defined, these are queried starting from the top of the list of
entries until an appropriate rule is found. This rule is then applied.
If the list of rules contains further subsequent rules that could also apply, these rules are
ignored.
Port forwarding
The table contains the rules defined for IP and port forwarding. The device has one IP ad-
dress, which can be used to access the device externally. For incoming data packets, the
device can convert the specified sender IP address to internal addresses. This technique is
referred to as NAT (Network Address Translation). Using the port number, the data packets
can be redirected to the ports of internal IP addresses.
Exposed host
With this function, the router forwards all received external packets that do not belong to an
existing connection to an IP address in the LAN. The device can therefore be accessed
directly from the Internet as an “exposed host”. You can use the device as a server.
4.12.3 Masquerading
For certain networks, you can specify whether IP masquerading is to be used. When IP
masquerading is active, the router replaces the sender IP address with the IP address of the
router for all data traffic packets. This assignment is saved in a table. In this way, the router
can transmit the answer back to the right destination.
The device supports a maximum of 16 rules for IP masquerading.
4.13 VPN
Requirements for a VPN connection
A general requirement for a VPN connection is that the IP addresses of the VPN partners
are known and can be accessed. The device supports up to three IPsec connections and
up to three OpenVPN connections.
In order to successfully establish an IPsec connection, the VPN peer must support IPsec
with the following configuration:
– Authentication via X.509 certificate or pre-shared secret key
– Diffie-Hellman group 2 or 5
– 3DES or AES encryption
– MD5 or SHA-1 hash algorithms
– Tunnel mode
– Quick mode
– Main mode
– SA lifetime (one second to 24 hours)
The following functions are supported for OpenVPN connections:
– OpenVPN Client
– TUN device
– Authentication via X.509 certificate or pre-shared secret key (PSK)
– Static key
– TCP and UDP transmission protocol
– Keep Alive
4.13.1 IPsec
IPsec (Internet Protocol Security) is a secure VPN standard used for communication via IP
networks.
Settings, Edit
IKE, Edit
4.13.1.1 Certificates
A certificate that has been loaded on the router is used to authenticate the router at the peer.
The certificate acts as an ID card for the router, which it shows to the relevant peer.
The procedure for creating an X.509 certificate is described under Section 5.5, “Creating
certificates”.
4.13.2 OpenVPN
4.13.2.1 Connections
OpenVPN is a program for creating a virtual private network (VPN) via an encrypted con-
nection. The device supports three OpenVPN connections.
Tunnel, Edit
Advanced, Edit
4.13.2.3 Certificates
Upload the certificates as described under “Certificates” on page 78
4.14 I/O
The router has two integrated digital switching inputs and one integrated digital switching
output for alarms and switching.
4.14.1 Inputs
The inputs can be used to send alarms by SMS or e-mail. Each input can be configured
individually. Please note that inputs that are used to start a VPN connection, for example,
cannot also be used to send alarms.
I/O, Inputs
Inputs High, Low • Select if a message should be sent at a “High” level or a
“Low” level.
• Click on “Apply”.
• Choose whether you want to be alerted by SMS or e-mail.
• Click on “Edit”.
• Enter the following for an SMS message:
– Recipient from the phonebook
– Message text
• Enter the following for an e-mail alert:
– To: recipient
– Cc: recipient of a copy
– Subject
– Message text
4.14.2 Outputs
The outputs can be switched remotely or, alternatively, provide information about the status
of the router. Each output can be configured individually.
I/O, Outputs
Outputs – Manual: manual switching of the output via the web-
based management
– Remote controlled: remote switching via SMS or socket
server. Automatic reset of the output can be used as an
option. To do this, activate “Autoreset” and specify the du-
ration in minutes.
– Radio network: the output is switched if the router is
logged in to a cellular network.
– Packet service: the output is switched if the router has
established a packet data connection and received a val-
id IP address from the provider.
– VPN service: the output is switched if the router has es-
tablished a VPN connection.
– Incoming call: the output is switched if the router is
called by a phone number listed in the phonebook.
– Connection lost: the output is switched if the router con-
nection check does not reach the configured reference
address.
Autoreset Duration in minutes until the output is reset automatically
4.14.3 Phonebook
Enter phone numbers here:
– For the recipients of alarm SMS messages
– For those authorized to switch the outputs
4.15 System
System, User
User setup admin Password for unrestricted access to all areas
user Password for restricted access (only read access)
4.15.6 Date/time
System, Date/time
Date/time System time You can set the time manually if no NTP server (time server)
has been set up or the NTP server cannot be reached.
Time synchronisation – Enabled: the router synchronizes the time and date with
a time server. Initial time synchronization can take up to
15 minutes. During this time, the router continuously com-
pares the time data of the external time server and that of
its own clock. The time is thus adjusted as accurately as
possible. Only then can the router act as the NTP server
for the devices connected to the LAN interface. The router
then provides the system time.
– Disabled: the router does not adjust the system time
automatically.
4.15.7 Reboot
System, Reboot
Reboot Reboot NOW! Restart the router
Any active data transmissions will be aborted.
Do not trigger a reboot while data transmission is active.
Daily reboot Define the day of the week on which the router will be restarted
at the specified time.
Following a reboot, it is necessary to log in to the cellular net-
work again. The provider resets the data link and calculates
charges. Regular rebooting provides protection against the
provider aborting and re-establishing the connection at an
unforeseeable point in time.
Time Time specified in Hours:Minutes
Event Choose the digital input with the “High” signal which will be
used to restart the router if required.
Make sure that, following a restart, the signal is “Low” again.
This ensures that the router starts up normally.
5.1 Installation
• Start the setup file. Follow the instructions in the setup program.
• On the “Subject” tab, enter the information about the owner of the root certificate.
• Create a key for this certificate. The default name, key type, and key size can be
retained.
The period of validity of the certificate is specified on the “Extensions” tab. The root certifi-
cate must be valid for longer than the machine certificates that are to be created later. In this
example, the validity is set to ten years.
• Set the certificate type to “Certification Authority”.
• Activate all the options as shown in Figure 5-6.
Figure 5-6 Setting the validity and type for the CA certificate
• Click OK.
The certificate has been created. A new root certificate from which further machine certifi-
cates can be derived now appears in the overview.
• Default settings for the certificates to be created later can be made on the “Subject” tab.
The name must be specified in the relevant certificates. The text specified in the angle
brackets is a placeholder which is replaced when the template is applied.
Figure 5-9 Creating a template, entering information about the owner (subject)
• On the “Extensions” tab, set the certificate type to “End Entity” as the template should
be valid for machine certificates.
• The validity of the certificates to be created is 365 days in this example. Once the end
date has elapsed, the certificates can no longer be used.
Figure 5-10 Creating a template, entering the validity and type of certificate
• Click OK.
The template has been created. You can now use the template as a basis to create certifi-
cates signed by the root certificate.
The fields on the “Subject” tab will now either be empty or they will contain the defaults from
the imported template. When entering information on this tab, please note that the certifi-
cates must differ at least with regard to their name (internal name and common name). For
example, the equipment identification of the machine or the location can be specified as the
name here.
• Click OK.
You have now created a machine certificate signed by the Certification Authority (CA).
The complete certificate, including the private key and the CA certificate, must be in “PKCS
#12 with Certificate Chain” format. You can then upload it to the relevant device as a
machine certificate.
For security reasons, the machine certificate is protected with a password of your choice.
• Enter the password. You need the password in order to load the machine certificate on
the relevant device.
• The certificate for the peer must also be exported. This certificate is stored in PEM for-
mat without the private key.
7.1 Maintenance
The device is maintenance-free.
7.2 Disposal
Dispose of the device separately from other waste, i.e., via an appropriate collection site.
8 Technical data
8.1.1 Accessories
License
License for mGuard Secure VPN Client v11.x MGUARD SECURE VPN 2702579 1
CLIENT LIC
Wireless interface TC ROUTER 3002T TC ROUTER 3002T TC ROUTER 3002T TC ROUTER 3002T
-4G -3G -4G VZW -4G ATT
TC ROUTER 2002T TC ROUTER 2002T
-4G -3G
Interface description GSM / GPRS / GSM / GPRS / LTE (FDD) LTE (FDD) / UMTS /
EDGE / UMTS / EDGE / UMTS / HSPA
HSPA / LTE (FDD) HSPA
Frequency 850 MHz 850 MHz 700 MHz (LTE B13) 850 MHz
(EGSM, 2 W) (EGSM, 2 W) 1700 MHz (LTE B4) (UMTS/HSPA B5)
900 MHz 900 MHz 1900 MHz
(EGSM, 2 W) (EGSM, 2 W) (UMTS/HSPA B2)
1800 MHz 1800 MHz 700 MHz (LTE B13 /
(EGSM, 1 W) (EGSM, 1 W) B17)
1900 MHz 1900 MHz 850 MHz (LTE B5)
(EGSM, 1 W) (UMTS/HSPA B2) 1700 MHz (LTE B4)
850 MHz 2100 MHz 1900 MHz (LTE B2)
(UMTS/HSPA B5) (UMTS/HSPA B1)
900 MHz
(UMTS/HSPA B8)
1900 MHz
(UMTS/HSPA B2)
2100 MHz
(UMTS/HSPA B1)
800 MHz (LTE B20)
850 MHz (LTE B5)
900 MHz (LTE B8)
1800 MHz (LTE B3)
1900 MHz (LTE B2)
2100 MHz (LTE B1)
2600 MHz (LTE B7)
Data rate ≤ 150 Mbps ≤ 21.6 Mbps (HSPA ≤ 150 Mbps (LTE (DL))
(LTE (DL)) (DL))
≤ 50 Mbps (LTE (UL))
≤ 50 Mbps ≤ 5.76 Mbps (HSPA
(LTE (UL)) (UL))
Antenna 50 Ω impedance, SMA antenna socket
SIM interface 1.8 V, 3 V
GPRS Class 12, Class B -
CS1 ... CS4
EDGE Multislot Class 10 -
UMTS HSPA 3GPP R9 HSPA 3GPP R7 - HSPA 3GPP R9
LTE CAT4 - CAT4 CAT4
Digital input
Number of inputs 2
Voltage input signal 10 V DC ... 30 V DC
Switching level “1” signal 10 V DC ... 30 V DC
Digital output
Number of outputs 1 (resistive load)
Voltage output signal 10 V DC ... 30 V DC (depending on the operating voltage)
Current output signal ≤50 mA (not short-circuit-proof)
General data
Management Web-based management, SNMP
Degree of protection IP20 (manufacturer‘s declaration)
Pollution degree 2 (indoor use only)
Dimensions (W/H/D) 45 mm x 130 mm x 126 mm
Housing material Plastic, gray
Vibration resistance in accordance 5g, 10 ... 150 Hz, 2.5 h, in XYZ direction
with EN 60068-2-6/IEC 60068-2-6
Shock in accordance with 15 g
EN 60068-2-27/IEC 60068-2-27
Immunity in accordance with EN 61000-6-2
Electromagnetic compatibility Conformance with EMC directive 2014/30/EU
8.3 Dimensions
45 127,5
US
ERR
CON
Micro SD
Micro
SD
LAN 1 LAN 2
130
ANT 1
ANT 2
TC ROUTER
SIM
24V 0V I1 I2 01
A1 XML elements
Table A-1 Data definitions of the XML elements used
Only “name” is used as an attribute in the <entry> element. This attribute determines where
the data is placed in the file tree. As defined in the header, all data must be specified in the
UTF-8 character set.
Line breaks in the data are specified as escape sequences: “ ”.
LAN interface
<entry name="conf/network/interface/lan/ipaddr">192.168.0.1</entry>
<entry name="conf/network/interface/lan/netmask">255.255.255.0</entry>
<entry name="conf/network/interface/lan/proto">static</entry>
<entry name="conf/network/interface/lan/ipalias"># IP
alias # let alias_cnt=0</entry>
<entry name="conf/network/interface/lan/devlist"></entry>
<entry name="conf/network/interface/lan/ifname">eth0</entry>
<entry name="conf/network/interface/lan/mode">auto</entry>
<entry name="conf/network/interface/lan/type">ethernet</entry>
The ./devlist, ./ifname, ./mode, and ./type elements must not be modified. They are also not
modified by settings on the configuration page.
DHCP server
<entry name="conf/network/dhcp/lan/enable">0</entry>
<entry name="conf/network/dhcp/lan/domain">example.net</entry>
<entry name="conf/network/dhcp/lan/lease">24h</entry>
<entry name="conf/network/dhcp/lan/dynamic">0</entry>
<entry name="conf/network/dhcp/lan/addr1">192.168.0.10</entry>
<entry name="conf/network/dhcp/lan/addr2">192.168.0.30</entry>
<entry name="conf/network/dhcp/lan/hosts"># DHCP hosts #</entry>
<entry name="conf/network/dhcp/lan/names"># DHCP names #</entry>
<entry name="conf/network/dhcp/lan/options"># DHCP options #</entry>
Static routes
<entry name="conf/network/route/lan/sroute"># static routes #
</entry>
SNMP
<entry name="conf/snmp/device"></entry>
<entry name="conf/snmp/description"></entry>
<entry name="conf/snmp/location"></entry>
<entry name="conf/snmp/contact"></entry>
<entry name="conf/snmp/rocommunity">public</entry>
<entry name="conf/snmp/rwcommunity"></entry>
<entry name="conf/snmp/rwuser">admin</entry>
<entry name="conf/snmp/secretpass">Snmpadmin</entry>
<entry name="conf/snmp/trap_addr">0.0.0.0</entry>
<entry name="conf/snmp/trap_port">162</entry>
<entry name="conf/snmp/trap_community">public</entry>
<entry name="conf/snmp/trap_enable">0</entry>
<entry name="conf/snmp/v12_enable">0</entry>
<entry name="conf/snmp/v3_enable">0</entry>
<entry name="conf/snmp/fw_local"></entry>
<entry name="conf/snmp/fw_external"></entry>
A3 Wireless network
General settings
<entry name="conf/gsm/band_setup">515</entry>
<entry name="conf/gsm/sim_timeout">10</entry>
<entry name="conf/gsm/relogin">0</entry>
<entry name="conf/gsm/time">01:00</entry>
SIM card
<entry name="conf/sim1/mcc">262</entry>
<entry name="conf/sim1/cpin"></entry>
<entry name="conf/sim1/roaming">1</entry>
<entry name="conf/sim1/provider">0</entry>
<entry name="conf/sim1/username"></entry>
<entry name="conf/sim1/password"></entry>
<entry name="conf/sim1/apn">web.vodafone.de</entry>
<entry name="conf/sim1/auth_allow">0</entry>
SMS configuration
<entry name="conf/gsm/sms_control">0</entry>
<entry name="conf/gsm/sms_password"></entry>
<entry name="conf/gsm/sms_forward">0</entry>
<entry name="conf/gms/sms_server">192.168.0.200</entry>
<entry name="conf/gsm/sms_port">1432</entry>
Packet data
<entry name="conf/gprs/enable">0</entry>
<entry name="conf/gprs/debug">0</entry>
<entry name="conf/gprs/noccp">0</entry>
<entry name="conf/network/interface/wwan/mtu">1500</entry>
<entry name="conf/gprs/restart">5</entry>
<entry name="conf/gprs/echo-interval">30</entry>
<entry name="conf/gprs/echo-failure">4</entry>
<entry name="conf/gprs/event">0</entry>
Static routes
<entry name="conf/network/route/wwan/sroute"># static routes #
</entry>
./sroute List of local static routes. This list should only be modified via the con-
figuration page.
DynDNS
<entry name="conf/ddns/enable">0</entry>
<entry name="conf/ddns/provider">0</entry>
<entry name="conf/ddns/server">members.dyndns.org</entry>
<entry name="conf/ddns/username"></entry>
<entry name="conf/ddns/password"></entry>
<entry name="conf/ddns/hostname"></entry>
Monitoring
<entry name="conf/gsm/log_enable">0</entry>
<entry name="conf/gsm/log_duration">24</entry>
<entry name="conf/gsm/log_interval">1</entry>
<entry name="conf/gsm/log_ping"></entry>
General settings
<entry name="conf/iptables/fw_enable">1</entry>
<entry name="conf/iptables/nat_enable">0</entry>
<entry name="conf/iptables/fw_netbios">1</entry>
<entry name="conf/iptables/icmp">0</entry>
<entry name="conf/iptables/masq_enable">1</entry>
<entry name="conf/iptables/xssh">0</entry>
<entry name="conf/iptables/xwbm">0</entry>
<entry name="conf/dropbear/enable">0</entry>
<entry name="conf/dropbear/port">22</entry>
Firewall
<entry name="conf/iptables/fw_in"># Firewall incoming #</entry>
<entry name="conf/iptables/fw_out"># Firewall outgoing #</entry>
The values represent a special list and should only be modified via the configuration page.
./fw_in List of firewall rules for incoming data
./fw_out List of firewall rules for outgoing data
NAT table
<entry name="conf/iptables/nat_fw"># NAT firewall #</entry>
<entry name="conf/iptables/nat_vs"># NAT virtual server #</entry>
The values represent a special list and should only be modified via the configuration page.
./nat_fw List of firewall rules for the NAT table (port forwarding)
./nat_vs List of forwarding rules for the NAT table (port forwarding)
A 3.2 VPN
A 3.2.1 IPsec
Higher-level settings
<entry name="conf/ipsec/enableupdate">0</entry>
<entry name="conf/ipsec/autoupdate">600</entry>
A 3.2.2 Certificates
<entry name="ipsec.d/cacerts/test.crt">-----BEGIN CERTIFICATE--...
</entry>
<entry name="ipsec.d/certs/local/test.crt">-----BEGIN CERTIFICATE--
...</entry>
<entry name="ipsec.d/certs/remote/mGuard.crt">-----BEGIN CERTIFICATE--
...</entry>
<entry name="ipsec.d/private/test.pem">-----BEGIN RSA PRIVATE KEY--
...</entry>
<entry name="ipsec.d/ldir/test.p12">7</entry>
./cacerts/* CA certificates
./certs/local/* Local certificates
./certs/remote/* Peer certificates
./private/* Private key
./ldir/* Bit mask for certificate validity
A 3.2.3 OpenVPN
Connections 1 ... n
<entry name="conf/openvpn/tunnel1/name">tunnel1</entry>
<entry name="conf/openvpn/tunnel1/enable">0</entry>
<entry name="conf/openvpn/tunnel1/event">0</entry>
<entry name="conf/openvpn/tunnel1/host"></entry>
<entry name="conf/openvpn/tunnel1/rport">1194</entry>
<entry name="conf/openvpn/tunnel1/proto">0</entry>
<entry name="conf/openvpn/tunnel1/complzo">0</entry>
<entry name="conf/openvpn/tunnel1/float">0</entry>
<entry name="conf/openvpn/tunnel1/redir">0</entry>
<entry name="conf/openvpn/tunnel1/bind">0</entry>
<entry name="conf/openvpn/tunnel1/lport">1194</entry>
<entry name="conf/openvpn/tunnel1/auth">0</entry>
<entry name="conf/openvpn/tunnel1/certificate">test-server.p12</entry>
<entry name="conf/openvpn/tunnel1/nscert">0</entry>
<entry name="conf/openvpn/tunnel1/psk">my_static.key</entry>
<entry name="conf/openvpn/tunnel1/username"></entry>
<entry name="conf/openvpn/tunnel1/password"></entry>
<entry name="conf/openvpn/tunnel1/remote_ifc">172.16.0.2</entry>
<entry name="conf/openvpn/tunnel1/local_ifc">172.16.0.1</entry>
<entry name="conf/openvpn/tunnel1/remote_addr">192.168.9.0/24</entry>
<entry name="conf/openvpn/tunnel1/nat">0</entry>
<entry name="conf/openvpn/tunnel1/local_masq">0</entry>
<entry name="conf/openvpn/tunnel1/local_addr">192.168.0.0/24</entry>
<entry name="conf/openvpn/tunnel1/local_net">192.168.1.0</entry>
<entry name="conf/openvpn/tunnel1/cipher">BF-CBC</entry>
<entry name="conf/openvpn/tunnel1/keepalive">1</entry>
<entry name="conf/openvpn/tunnel1/ping">30</entry>
<entry name="conf/openvpn/tunnel1/restart">120</entry>
Port forwarding
<entry name="conf/openvpn/napt"># NAPT port forwarding #</entry>
The values represent a special list and should only be modified via the configuration page.
Certificates
<entry name="openvpn/cacerts/test-server.crt">-----BEGIN CERTIFICATE--
...</entry>
<entry name="openvpn/certs/test-server.crt">-----BEGIN CERTIFICATE--
...</entry>
<entry name="openvpn/private/test-server.pem">-----BEGIN RSA PRIVATE
KEY--...</entry>
<entry name="openvpn/ldir/test-server.p12">7</entry>
<entry name="openvpn/casonly/test-ca.crt">-----BEGIN CERTIFICATE--
...</entry>
./cacerts/* CA certificates
./certs/ Certificates
./private/ Private key
./ldir/* Bit mask for certificate validity
./casonly/* CA certificates for authentication with user name and password
Static key
<entry name="openvpn/keys/my_static.key"># # 2048 bit OpenVPN static
key... </entry>
Diffie-Hellman parameters
<entry name="openvpn/dh1024.pem">-----BEGIN DH PARAMETERS--...</entry>
<entry name="openvpn/dh2048.pem">-----BEGIN DH PARAMETERS--...</entry>
Inputs 1 ... 2
<entry name="conf/alerts/in_1/0/enable">0</entry>
<entry name="conf/alerts/in_1/0/action">0</entry>
<entry name="conf/alerts/in_1/0/sms/phonebook">0</entry>
<entry name="conf/alerts/in_1/0/sms/message"></entry>
<entry name="conf/alerts/in_1/0/email/to"></entry>
<entry name="conf/alerts/in_1/0/email/cc"></entry>
<entry name="conf/alerts/in_1/0/email/subject"></entry>
<entry name="conf/alerts/in_1/0/email/message"></entry>
<entry name="conf/alerts/in_1/1/enable">0</entry>
<entry name="conf/alerts/in_1/1/action">0</entry>
<entry name="conf/alerts/in_1/1/sms/phonebook">0</entry>
<entry name="conf/alerts/in_1/1/sms/message"></entry>
<entry name="conf/alerts/in_1/1/email/to"></entry>
<entry name="conf/alerts/in_1/1/email/cc"></entry>
<entry name="conf/alerts/in_1/1/email/subject"></entry>
<entry name="conf/alerts/in_1/1/email/message"></entry>
<entry name="conf/alerts/in_1/alarm_enable">0</entry>
<entry name="conf/alerts/in_1/alarm_time">0</entry
Output 1
<entry name="conf/leds/out_1/function">0</entry>
<entry name="conf/leds/out_1/autoreset">0</entry>
<entry name="conf/leds/out_1/time">10</entry>
Phonebook
<entry name="conf/phonebook/n01"></entry>
<entry name="conf/phonebook/n02"></entry>
<entry name="conf/phonebook/n03"></entry>
<entry name="conf/phonebook/n04"></entry>
<entry name="conf/phonebook/n05"></entry>
<entry name="conf/phonebook/n06"></entry>
<entry name="conf/phonebook/n07"></entry>
<entry name="conf/phonebook/n08"></entry>
<entry name="conf/phonebook/n09"></entry>
<entry name="conf/phonebook/n10"></entry>
<entry name="conf/phonebook/n11"></entry>
<entry name="conf/phonebook/n12"></entry>
<entry name="conf/phonebook/n13"></entry>
<entry name="conf/phonebook/n14"></entry>
<entry name="conf/phonebook/n15"></entry>
<entry name="conf/phonebook/n16"></entry>
<entry name="conf/phonebook/n17"></entry>
<entry name="conf/phonebook/n18"></entry>
<entry name="conf/phonebook/n19"></entry>
<entry name="conf/phonebook/n20"></entry>
Socket server
<entry name="conf/alerts/sock_enable">0</entry>
<entry name="conf/alerts/sock_port">1432</entry>
<entry name="conf/alerts/sock_xml_nl">1</entry>
<entry name="conf/alerts/sock_xml_io">0</entry>
A 3.4 System
User authentication
<entry name="conf/auth/admin">admin</entry>
<entry name="conf/auth/user">public</entry>
For users “admin” and “user”, the passwords are stored in plain text by default. When a new
password is assigned, only the hash values are stored here.
Default AT commands
<entry name="conf/gsm/at1cmd"></entry>
<entry name="conf/gsm/at2cmd"></entry>
<entry name="conf/gprs/at1cmd"></entry>
<entry name="conf/gprs/dialup">*99***1#</entry>
Reboot
<entry name="conf/system/rebootenable">0</entry>
<entry name="conf/system/reboottime">01:00</entry>
<entry name="conf/system/rebootevent">0</entry>
B Appendixes
B1 List of figures
Figure 3-1: 4G router .............................................................................................14
Figure 3-2: 3G router .............................................................................................15
Figure 3-3: Mounting on the DIN rail .....................................................................16
Figure 3-4: Removal ..............................................................................................16
Figure 3-5: Removing the SIM card holder, inserting the SIM card .......................17
Figure 3-6: Connecting the antenna (4G router) ....................................................18
Figure 3-7: RJ45 interface .....................................................................................19
Figure 3-8: Connecting the supply voltage ............................................................19
Figure 3-9: Wiring inputs .......................................................................................20
Figure 4-1: Login window ......................................................................................23
Figure 4-2: Basic setup .........................................................................................24
Figure 4-3: Device information, Hardware .............................................................25
Figure 4-4: Software ..............................................................................................26
Figure 4-5: Status, Radio ......................................................................................27
Figure 4-6: Status, Network connections ..............................................................29
Figure 4-7: IPsec status ........................................................................................30
Figure 4-8: OpenVPN status .................................................................................30
Figure 4-9: Status, I/O status .................................................................................31
Figure 4-10: Status, Routing table ...........................................................................31
Figure 4-11: Status, DHCP leases ..........................................................................32
Figure 4-12: Status, System info .............................................................................32
Figure 4-13: Local network, IP configuration ...........................................................33
Figure 4-14: Local network, DHCP server ...............................................................34
Figure 4-15: Local network, Static routes ................................................................35
Figure 4-16: Wireless network, Radio setup ............................................................36
Figure 4-17: Wireless network, SIM (Europe) .........................................................37
Figure 4-18: Wireless network, SIM (US) ................................................................39
Figure 4-19: Wireless network, SMS configuration .................................................42
Figure 4-20: Wireless network, Packet data setup ..................................................43
Figure 4-21: Wireless network, Static routes ...........................................................44
Figure 4-22: Wireless network, DynDNS .................................................................45
Figure 4-23: Wireless network, Connection check ..................................................46
Figure 4-24: Wireless network, Monitoring ..............................................................47
B2 Index
M Restart
See Reboot
Maintenance ..................................................... 111, 112
RJ45 interface............................................................. 19
managed application APN........................................... 40
Root certificate
managed Internet APN................................................ 40
See CA certificate
Masquerading ............................................................. 80
Routing table ............................................................... 31
mGuard Secure VPN Client ...................................... 114
Monitoring ................................................................... 47
Mounting ..................................................................... 16 S
Security settings
N See Network security
SIM
Network connections................................................... 29
Europe................................................................... 37
Network security ......................................................... 63
US ......................................................................... 39
SMS settings............................................................... 41
O
SNMP configuration .................................................... 93
Open source software ................................................. 13
SNMP Firewall ............................................................ 80
OpenVPN status ......................................................... 86
Socket server .............................................................. 89
OpenVPN tunnel
Static keys................................................................... 85
See VPN tunnel
Static routes ................................................................ 35
Operating and indication elements
Status and diagnostics indicators................................ 15
3G router ............................................................... 15
Storage ....................................................................... 10
4G router ............................................................... 14
Subcommand.............................................................. 41
Ordering data ............................................................ 113
Supply voltage ............................................................ 19
Output
Surge protection........................................................ 114
See Switching output
Switching input
Outputs ....................................................................... 87
Configuration ......................................................... 86
Overview of product versions ...................................... 13
Connection ............................................................ 20
overwrite APN ............................................................. 40
Switching output
Configuration ......................................................... 87
P Connection ............................................................ 20
Password (default) ...................................................... 23 Synchronisation .......................................................... 96
Phonebook.................................................................. 88 System configuration................................................... 89
Power supply
See Supply voltage T
Pre-shared secret key
Technical data........................................................... 115
See Static keys
Time settings
Product versions ......................................................... 13
See Date/time
Push-in plug .............................................................. 114
Transport..................................................................... 10
Tunnel
R See VPN tunnel
Radio setup................................................................. 36
Radio status ................................................................ 27 U
Reboot ........................................................................ 98
Update
Redirection of data packets......................................... 35
See Firmware update
Repair ....................................................................... 111
USA............................................................................. 14
Reset .......................................................................... 21
User ............................................................................ 91
User level .................................................................... 24
User name .................................................................. 23
V
Viewing the device status............................................ 25
VPN (Virtual Private Network) ..................................... 80
VPN tunnel .................................................................. 81
W
Web-based management
Login ..................................................................... 23
Starting .................................................................. 23
Wireless network......................................................... 36
Wireless static routes .................................................. 44
X
X.509 certificate .................................................. 78, 101
XCA .......................................................................... 101
XML element............................................................. 121
XML file format .......................................................... 124
How to contact us
Internet Up-to-date information on Phoenix Contact products and our Terms and Conditions can be
found on the Internet at:
phoenixcontact.com
Make sure you always use the latest documentation.
It can be downloaded at:
phoenixcontact.net/products
Subsidiaries If there are any problems that cannot be solved using the documentation, please contact
your Phoenix Contact subsidiary.
Subsidiary contact information is available at phoenixcontact.com.
156 / 156 PHOENIX CONTACT GmbH & Co. KG • Flachsmarktstraße 8 • 32825 Blomberg • Germany
phoenixcontact.com