LTE Extension

The MAC36PRO controller can be remotely accessed with the LTE 4G cellular network, which allows for a full connectivity with the controller by a wireless connection. The solution enables maintaining a full functionality including programming and configuration with all advantages of the wireless transmission. LTE connection with the MAC36PRO controller is carried out with the use of the LTE-DIN-EXT-SET extension.

The LTE-DIN-EXT-SET set includes:

  • LTE-USB-EXT: Onyx 4573326591584 LTE USB modem (SIM card not included) with a 1 m USB-A/A cable,

  • LTE-ANT 698–2700 MHz: LTE antenna GA.130.201111 with a magnetic mount and CRC9-SMA-150 converter,

  • LTE-DIN-ACC: accessories for USB-A DIN rail mounting including AN-25184 adapter and FX-USB/B Keystone
    module.

Note

Please note that it is strongly recommended to use the elements included in the set for connection, most importantly, the USB cable. The USB cable, which is seemingly easily replaceable, is essential for establishing a functioning connection, and the one included in the LTE-DIN-EXT-SET provides required parameters. USB cable replacements are likely to fail to provide, for example, proper data transferring parameters.

All technical details of the contents of the set is available in the datasheet: iSMA CONTROLLI Download Center - MAC36.

The LTE modem is connected to the MAC36PRO controller with a use of the USB cable, directly or through a USB hub with external power supply.

SIM Card

A SIM card is not part of the LTE extension set. However, the LTE extension for MAC36PRO supports a wide range of SIM cards available worldwide with the only requirement of providing an LTE 4G coverage. The supported SIM card type is 4FF (Nano SIM).

LTE Connection Security

When the MAC36PRO controller connects to the Internet using a USB LTE 4G dongle (LTE-DIN-EXT-SET), it takes advantage of the security features of modern cellular networks. However, once it connects to the public Internet, the device can still face common cyber threats, such as unauthorized access or data interception. To combat these risks, the device has a built-in VPN functionality. This allows all network traffic to be securely encrypted between the device and a trusted remote server.

  • Enable and configure the VPN. Always use the device’s VPN feature with strong encryption and trusted VPN endpoints to protect data in transit.

  • Keep Niagara version up to date to fix known vulnerabilities.

  • Use strong authentication. Change default passwords, use strong and unique credentials, and enable a certificate-based or key-based authentication where available.

  • Limit network exposure. Disable unnecessary services and close unused ports to reduce the risk of attacks.

  • Physically secure the device and dongle. Prevent an unauthorized physical access, as this could potentially lead to tampering or credential theft.

Combination of the cellular connectivity, VPN protection, and good security practices can greatly diminish the risk of cyber attacks and ensure a secure operation of the device in the field.