Comparing Peplink’s Newest 5G Routers: BR1 Mini 5G, BR1 Pro 5G, and B One 5G

The advent of 5G technology has ushered in a new era of seamless and high-speed networking, prompting users to seek 5G solutions for a multitude of applications. Responding to this demand, Peplink, a leader in networking solutions, introduces three new 5G routers, all under $1,000: the BR1 Mini 5G, the BR1 Pro 5G, and the B One 5G. Each router offers unique features tailored to diverse networking needs while sharing some key similarities:

  • PrimeCare subscription for 1 year, offering InControl 2 management, warranty with standard RMA, FusionHub license, and SpeedFusion.
  • Certifications with major carriers like AT&T, T-Mobile, Verizon, and more.
  • Redundant SIM slots for nano SIM cards as well as eSIM support.
  • Support for external antennas to achieve the best performance where needed.
  • IP Passthrough support for Ethernet and Cellular WAN connections.

Now let’s delve into the specifics of each router:

1. BR1 Pro 5G

The BR1 Pro 5G sets a high standard with its integration of cutting-edge technology. Equipped with a new x62 cellular module supporting 5G cross-band carrier aggregation and a wider range of 5G bands, this router promises exceptional performance. Its multi-core CPU ensures gigabit speeds, marking an 800% improvement over its predecessor, the BR1 Classic.

Key Features:

  • Flexible for any environment, but best suited for mobile applications such as RVs, buses, or emergency vehicles. 
  • Ruggedized hardware.
  • WiFi 6 support for reduced interference and simultaneous connection to multiple devices.
  • 2x GB Ethernet LAN and 1x 2.5 GB Ethernet WAN.
  • Accommodates 1 to 150 users with a throughput of up to 1 Gbps.
  • SpeedFusion throughput supported up to 400 Mbps.

2. BR1 Mini 5G

Compact yet powerful, the BR1 Mini 5G packs a punch with its seamless connectivity and versatility. Featuring a global 5G modem and redundant SIM slots, it ensures uninterrupted connectivity by allowing effortless switching between carriers. With certifications from major carriers like AT&T, T-Mobile, and Verizon (C-Band), reliability is guaranteed.

Key Features:

  • Ideal for those seeking a 5G backup connection that seamlessly integrates into existing networks.
  • Small footprint.
  • No WiFi or GPS support.
  • Best suited for 1 to 60 users with a throughput of up to 300 Mbps.
  • 2 x Ethernet LAN ports and optional Ethernet WAN port for flexible connectivity.
  • SpeedFusion throughput supported up to 80 Mbps.

3. B One 5G

The B One 5G router offers seamless integration of LTE/5G connections, catering to diverse connectivity needs. With features like dual Ethernet WAN ports, WiFi 6 support, and a USB Type-C WAN port, it ensures ultimate versatility and adaptability. Firmware updates and endless support ensure longevity and reliability.

Key Features:

  • Suited for home or office use, but can also work for mobile applications, such as RVs.
  • Dual gigabit Ethernet WAN ports for failover, load balancing, or bonding.
  • Accommodates up to 150 users with a throughput of up to 1 Gbps.
  • SpeedFusion throughput supported up to 400 Mbps.

For a closer look at a comparison for these three devices, check out the Peplink comparison chart.

In conclusion, Peplink’s newest 5G routers cater to various networking requirements, offering a spectrum of features. Whether prioritizing compactness, performance, or versatility, there’s a router tailored to meet your needs. Upgrade your connectivity today and embrace the future of  networking with Peplink’s innovative solutions.

Need some guidance on which 5G Peplink solution to select? Contact the experts at 5Gstore.com for assistance Monday thru Friday 9am to 6pm CT. 

AT&T Investigates Massive Data Leak: 73 Million Customers Affected

AT&T is currently grappling with a massive data leak that has exposed the personal information of 73 million of its current and former customers. The breach, discovered approximately two weeks ago, has stirred concerns over the security of sensitive data and raised questions about the source and extent of the leak.

According to a news release issued by AT&T, the leaked data, which surfaced on the dark web, includes highly sensitive information such as customers’ Social Security numbers. However, the company has emphasized that the leak does not encompass financial data or specifics regarding call histories. The data appears to originate from 2019 or earlier, implying a potential vulnerability existing within AT&T’s systems or those of its vendors during that period.

AT&T has promptly launched an investigation into the breach to determine its source and ascertain whether it originated from their own infrastructure or that of one of their third-party vendors. The company, however, has stated that there is currently no evidence of unauthorized access to their systems resulting in the extraction of the leaked dataset.

The leak, which affects approximately 7.6 million current account holders and a staggering 65.4 million former account holders, underscores the magnitude of the incident and its potential repercussions for millions of individuals. In response, AT&T is taking proactive measures to mitigate the impact on its customers. The telecommunications company has urged affected individuals to reset their account passcodes and remain vigilant about any suspicious activity on their accounts or credit reports.

Additionally, AT&T has pledged to offer credit monitoring services at its expense to affected customers where applicable, demonstrating its commitment to assisting those affected by the breach. The company’s swift response and transparency regarding the incident aim to reassure customers and address concerns about the security of their personal information.

News of the data leak first surfaced on March 17 when it was posted by an account named vx-underground. Despite initial skepticism from AT&T regarding the source of the leak, subsequent investigations have compelled the company to take the matter seriously and initiate measures to address the breach.

As the investigation unfolds, AT&T remains focused on securing its systems and safeguarding the privacy of its customers. The incident serves as a stark reminder of the ongoing challenges faced by companies in protecting sensitive data in an increasingly digital and interconnected world. Moving forward, robust cybersecurity measures and continuous vigilance will be paramount in preventing similar breaches and preserving customer trust.

5Gstore Breaks Through The Glass Bottom with a Revolutionary Offer!

In a world where every tech company seems to be diving in a race to the bottom, offering everything but the kitchen sink to win over customers, 5Gstore is pioneering a groundbreaking strategy. Why race to the bottom, we thought, when we can break right through the glass bottom itself with an offer that redefines the very foundation of promotional giveaways?

This April, we’re not just joining the bandwagon of companies throwing free routers at you when you sign up. Oh no, we’re propelling ourselves into uncharted territories. In a bold, unprecedented move, 5Gstore announces the launch of an offer that is sure to turn heads, drop jaws, and maybe even raise a few eyebrows: Not only are we giving away our top-of-the-line 5G routers for absolutely free with carrier activation, but we will also pay you $250 to graciously accept our state-of-the-art technology into your home. Yes, you heard us right. We’re paying you!

Why, You Ask? Because We Can!

1. Reinventing Generosity: In an era where everyone is trying to one-up each other with freebies, we thought, why not go one… down? Let’s not just reach the bottom; let’s create a new one.

2. The Ultimate Customer Experience: We want you to not only experience the future with our 5G technology but to feel like you’re part of a future where companies pay you for the pleasure of their service.

3. Because Laughter Is Priceless: They say the best things in life are free, but can you really put a price on a good chuckle? We think not, which is why we’re willing to bet $250 that this will make you smile.

How It Works

Simply follow the breadcrumbs of disbelief to our website, sign up for a carrier activation, and get ready to welcome the future of technology into your home – along with a tidy sum of $250. It’s our way of saying thank you for embracing the future with 5Gstore, where the impossible becomes possible.

The Icing on the Cake

As part of our unparalleled commitment to customer satisfaction, we’re also offering unlimited virtual high-fives and a lifetime supply of bragging rights that you were part of the most audacious offer in the history of telecommunications.

But wait, there’s a twist! As much as we pride ourselves on innovation and breaking the mold, we must confess, this groundbreaking offer is our way of sharing a bit of April Fools’ Day fun with you. While our routers are real, and our commitment to pushing the boundaries of technology and customer service is genuine, we’ll have to hold off on paying you to use them (for now).

Happy April Fools’ Day from Your Friends at 5Gstore!

We hope this brought a smile to your face and a light-hearted moment to your day. At 5Gstore, we’re all about connecting people – not just through technology, but through moments of joy and laughter. Thanks for being such good sports. Here’s to enjoying the future of connectivity together – no strings (or cash payments) attached!

Starlink: When It Makes Sense to Use It (and When It Doesn’t)

In the rapidly expanding universe of internet connectivity, Starlink, a satellite internet service provided by SpaceX, has emerged as a game-changer for many. Its mission to provide high-speed internet across the globe, especially in underserved areas, has both intrigued and confused potential users about its best applications. This comprehensive look aims to demystify when it makes sense to opt for Starlink and when it might be better to stick with traditional internet services.

When It Makes Sense to Use Starlink

RV or Mobile Healthcare

For those living the nomadic life in an RV or operating mobile healthcare services, traditional wired broadband options are out of the question. Starlink offers a viable solution with its mobile satellite internet service. Its ability to provide reliable, high-speed internet on the go makes it an indispensable tool for remote workers, travelers, and mobile clinics, ensuring connectivity no matter the location.

Boat/Yacht/Marine Application

Maritime internet options have traditionally been limited to costly and slow satellite connections. Starlink changes the game for sailors, yacht owners, and marine operators by offering a high-speed, relatively affordable alternative. With its marine-specific plans, Starlink enables better navigation, communication, and entertainment options on the open sea, far surpassing previous offerings in both performance and price.

Aviation

For private aircraft owners, maintaining connectivity during flights has often been a luxury out of reach or tied to exorbitant costs. Starlink’s entrance into the aviation internet service market promises to revolutionize this, providing high-speed internet access mid-flight. This capability not only enhances the travel experience for passengers but also improves flight operations through better communication and real-time data exchange.

Very Rural and No Other Wired Internet Broadband Options

In remote and rural areas, where traditional internet service providers (ISPs) cannot or will not offer service due to logistical and financial constraints, Starlink shines as a beacon of connectivity. It bridges the digital divide for rural homes and businesses, offering speeds and latencies that rival, and in some cases surpass, those of urban broadband services.

Backup to Existing Wired Connection, When Fast Cellular Isn’t Available

Even in areas well-served by traditional ISPs, Starlink can serve an important role as a backup internet connection. For businesses and individuals who cannot afford downtime, Starlink provides an alternative when terrestrial broadband services fail, and fast cellular options are unavailable or unreliable. Its quick setup and portable equipment make it an ideal contingency plan.

When It Doesn’t Make Sense to Use Starlink

Other Broadband Wired Options Available

If you reside in an urban or suburban area with access to fiber, cable, or DSL internet services, opting for Starlink might not make the most sense. Traditional broadband options typically offer more consistent speeds and reliability for a lower cost. For everyday home and office use, wired connections remain the go-to choice for most consumers and businesses.

Video Conference Priorities 

Starlink, while offering impressive speeds for satellite internet, can sometimes suffer from latency issues due to the nature of satellite communication. For real-time applications such as video conferencing through platforms like Teams, Google Meets, or Zoom, even slight delays can disrupt the flow of conversation and lead to a frustrating user experience. In these cases, wired broadband services usually provide a more stable connection with lower latency.

VOIP Phone Traffic

Similar to video conferencing, Voice Over Internet Protocol (VOIP) phone services require stable and low-latency internet connections to function seamlessly. Delays or packet loss, which can occur more frequently with satellite internet like Starlink, might lead to dropped calls or poor call quality. For critical communication needs, especially in a professional setting, traditional broadband is often more reliable.

Low Latency Needs

For applications and tasks that demand the lowest possible latency—such as competitive online gaming, high-frequency stock trading, or certain types of remote work—Starlink may not be the best fit. The inherent delay in sending signals to space and back can’t compete with the milliseconds of latency offered by fiber-optic connections.

Is Starlink Right for You?

Starlink represents a monumental leap forward in satellite internet technology, offering high-speed connectivity in many areas of the world previously left in the digital dark. However, it’s not a one-size-fits-all solution. For those in remote areas, on the move, or in need of a reliable backup, Starlink is a groundbreaking option. Yet, for users with access to traditional broadband services or those requiring ultra-low latency, sticking with wired internet options might still be the best bet. As with any technology, assessing your specific needs and usage patterns is key to making the right choice.

Protecting Against DNS Vulnerabilities: Strategies and Best Practices

Domain Name System (DNS) vulnerabilities pose significant threats to organizations worldwide. These attacks exploit weaknesses in the DNS protocol, leading to dire consequences such as data theft, network breaches, and service disruptions. As the digital landscape evolves, so do the techniques employed by malicious actors, making it imperative for businesses to fortify their defenses. In this article, we delve into common DNS attacks, their implications, and proactive measures organizations can take to prevent them, including the adoption of Zero Trust Network Access (ZTNA) and strict access controls.

DNS Attacks: A Growing Concern

DNS attacks have become pervasive in today’s interconnected digital ecosystem. According to a 2021 IDC survey encompassing over 1,100 organizations globally, a staggering 87% reported experiencing DNS attacks. These incidents incurred substantial financial losses, with an average cost of approximately $950,000 per attack. Notably, the shift towards remote work and cloud migration amid the COVID-19 pandemic has expanded the attack surface, providing assailants with new targets.

Common DNS Attack Vectors

  1. DNS Amplification: DNS amplification attacks involve exploiting open DNS servers to flood target systems with excessive DNS response traffic, thus triggering Distributed Denial of Service (DDoS) attacks. This method is highly effective because it leverages the inherent behavior of DNS servers to provide large responses to small queries. Attackers often spoof their source addresses, making it appear as though the requests are coming from legitimate sources. By doing so, they maximize the amplification effect, causing a significant volume of traffic to be directed towards the target’s infrastructure. DNS amplification attacks can overwhelm network resources, rendering services inaccessible to legitimate users. Mitigation strategies typically involve securing and properly configuring DNS servers, implementing rate limiting, and deploying DDoS protection mechanisms.
  2. Distributed Reflection Denial of Service (DRDoS): Distributed Reflection Denial of Service (DRDoS) attacks exploit open DNS resolvers to amplify and reflect traffic towards a target, thereby overwhelming its resources and causing denial of service. Unlike traditional DDoS attacks where the attacker directly floods the target with traffic, DRDoS attacks abuse the functionality of DNS resolvers to magnify the impact of the attack. The attacker sends requests to open DNS resolvers, spoofing the source IP address to make it appear as if the requests originate from the victim’s network. The DNS resolvers then respond to these requests, directing the amplified traffic towards the victim’s infrastructure. This technique allows attackers to generate a massive volume of traffic while concealing their own identity. To mitigate DRDoS attacks, organizations should implement measures such as source IP validation, rate limiting on DNS resolvers, and network filtering to block spoofed traffic.
  3. DNS Spoofing/Cache Poisoning: DNS spoofing, also known as cache poisoning, involves manipulating DNS servers to inject fraudulent or malicious data into the cache of DNS resolvers. By doing so, attackers can redirect users attempting to access legitimate websites to malicious ones controlled by the attackers. This tactic is often facilitated through techniques such as DNS cache poisoning, where attackers exploit vulnerabilities in DNS software or protocols to inject false DNS records into the cache. DNS spoofing attacks can be initiated through various means, including phishing emails, malware-infected systems, or compromised DNS servers. The consequences of DNS spoofing can be severe, as it compromises data integrity, exposes users to phishing scams, and facilitates the distribution of malware. To mitigate DNS spoofing attacks, organizations should regularly update DNS software, implement DNSSEC (DNS Security Extensions) to authenticate DNS responses, and deploy Intrusion Detection Systems (IDS) to detect anomalous DNS traffic.
  4. DNS Tunneling: DNS tunneling attacks involve exploiting DNS protocols to establish covert communication channels between a client and a server for the purpose of data exfiltration or malware propagation. Unlike traditional communication channels, DNS tunnels leverage DNS queries and responses to transmit data, allowing attackers to bypass network security measures such as firewalls and Intrusion Detection Systems (IDS). In DNS tunneling attacks, malicious payloads are encoded into DNS queries or responses and transmitted between the client and the server. This technique enables attackers to evade detection and exfiltrate sensitive data without raising suspicion. To mitigate DNS tunneling attacks, organizations should implement DNS traffic monitoring and analysis tools, deploy DNS firewall solutions to detect and block malicious DNS traffic, and enforce strict egress filtering policies to prevent unauthorized DNS communications.
  5. Fast Flux: Fast flux is an evasion technique used by attackers to hide malicious activities, such as phishing scams and malware distribution, by constantly changing the IP addresses associated with a legitimate domain. In a fast flux setup, attackers employ botnets to rapidly switch between multiple IP addresses, making it difficult for security analysts to track and block malicious activities. By leveraging dynamic IP swapping, attackers can prolong the lifespan of their malicious infrastructure and evade detection by security tools. Fast flux can be particularly challenging to mitigate due to its dynamic nature and the large number of IP addresses involved. However, organizations can implement measures such as network traffic monitoring, IP reputation-based blocking, and domain reputation analysis to detect and mitigate fast flux attacks.
  6. DNS Hijacking/Redirection: DNS hijacking or redirection involves compromising DNS resolution processes to redirect users attempting to access legitimate websites to rogue servers controlled by attackers. This can be achieved through various means, including malware infections, router compromise, or unauthorized modifications to DNS configurations. Once compromised, DNS settings are altered to point legitimate domain names to malicious IP addresses controlled by the attackers. This enables attackers to intercept sensitive information, such as login credentials or financial data, and perpetrate phishing scams or other malicious activities. To prevent DNS hijacking attacks, organizations should implement robust security measures, including DNSSEC to ensure the integrity of DNS responses, DNS monitoring to detect unauthorized changes, and regular audits of DNS configurations to identify and mitigate potential vulnerabilities. Additionally, end-user education and awareness training can help mitigate the risk of falling victim to DNS hijacking attacks through social engineering tactics such as phishing emails.
  7. NXDOMAIN Attack: In an NXDOMAIN (Non-Existent Domain) attack, attackers flood DNS servers with requests for non-existent domain names, causing the server to respond with NXDOMAIN responses. This type of attack consumes server resources and can lead to denial of service for legitimate users. NXDOMAIN attacks exploit vulnerabilities in DNS infrastructure by flooding servers with a high volume of requests for domain names that do not exist. As a result, the DNS server is forced to process these requests and generate responses indicating that the requested domains are not found. This consumes computational resources and bandwidth, potentially causing the DNS server to become overwhelmed and unresponsive. To mitigate NXDOMAIN attacks, organizations can implement rate limiting, DNS query filtering, and traffic analysis tools to detect and block malicious traffic patterns.
  8. Man-in-the-Middle (MitM) Attacks: Man-in-the-Middle (MitM) attacks on DNS traffic involve attackers intercepting communication between a user and a DNS server, allowing them to eavesdrop on the traffic, manipulate DNS responses, or inject malicious content. In a MitM attack, attackers typically position themselves between the user and the DNS server, intercepting DNS queries and responses as they traverse the network. By doing so, attackers can tamper with DNS responses, redirect users to malicious websites, or even spoof legitimate domain names to launch phishing attacks. MitM attacks on DNS traffic can be facilitated through various means, including ARP spoofing, DNS cache poisoning, or exploiting vulnerabilities in network protocols. To mitigate MitM attacks, organizations should implement encryption protocols such as DNS over HTTPS (DoH) or DNS over TLS (DoT) to protect DNS traffic from interception and tampering. Additionally, network segmentation, intrusion detection systems (IDS), and certificate validation mechanisms can help detect and prevent MitM attacks on DNS traffic.

Protective Measures Against DNS Threats

Addressing the multifaceted nature of DNS threats necessitates a holistic and proactive security approach, encompassing technical controls, user education, and continuous monitoring.

  1. Implement Strong Access Controls: Enforce multi-factor authentication (MFA) to bolster access security and thwart unauthorized entry. Avoid password reuse and ensure robust password management practices across all DNS-related accounts and systems.
  2. Implement DNSSEC: Deploy DNS Security Extensions (DNSSEC) to authenticate DNS responses and thwart DNS spoofing attacks. DNSSEC enhances data integrity and authenticity, bolstering trust in DNS infrastructure and mitigating the risk of fraudulent DNS records.
  3. Utilize DNS Filtering: Employ DNS filtering solutions to block access to known malicious websites and prevent users from inadvertently visiting fraudulent domains. By proactively identifying and blocking malicious DNS queries, DNS filtering technologies mitigate the likelihood of successful spoofing and poisoning attacks.
  4. Conduct Regular Vulnerability Assessments: Routinely perform vulnerability assessments and penetration tests to identify and remediate weaknesses in DNS infrastructure. Proactive vulnerability management minimizes the risk of exploitation by malicious actors and enhances overall network security posture.
  5. Educate Users: Raise awareness among users about the risks of DNS attacks and emphasize the importance of verifying website authenticity, exercising caution when clicking on links, and promptly reporting suspicious activity. Ongoing education and training initiatives empower users to recognize and respond to potential threats effectively.
  6. Implement Zero Trust Network Access (ZTNA): Embrace a Zero Trust approach to network security, abstracting access mechanisms and granting permissions based on user identity, device posture, and contextual factors. Deploy ZTNA and identity-based network segmentation to limit lateral movement within the network and enhance resilience.
  7. Monitor DNS Traffic: Implement robust monitoring and logging mechanisms to track DNS traffic and detect anomalous behavior indicative of potential attacks. Real-time monitoring facilitates rapid incident response, minimizing the impact of attacks and enabling timely remediation efforts.

Conclusion

DNS vulnerabilities pose significant risks to individuals and organizations, compromising trust in online communications and threatening data integrity. By comprehensively understanding DNS attacks and implementing proactive protective measures, stakeholders can fortify their defenses and mitigate the risk of falling victim to DNS-based threats. In an era of escalating cyber threats, proactive defense strategies, including the adoption of ZTNA, and ongoing vigilance are essential for safeguarding digital infrastructure and preserving trust in the interconnected world of the internet.

Peplink: Take Control of Your Management Software

So, you have purchased a Peplink Router—Congratulations! This can be an exciting prospect for many users looking to implement Peplink products into their network or use Peplink as their primary source of Internet. One of the most popular reasons for purchasing a Peplink is their remote management service, this comes in the form of the Peplink InControl 2 website (IC2) and the Peplink app, or basic local administration from the router itself. New Peplink users can find these options a little daunting. 5Gstore is here to help you get started! We will discuss the different ways you can manage your Peplink devices and some issues that may occur when using them.

InControl 2 Cloud-Based Management

Network management requires constant maintenance, standardization of device configurations, monitoring of network health and urgent troubleshooting. If you are a general home user or an experienced technician monitoring large networks, Peplink’s InControl 2 cloud-based remote manager has you covered. This cloud-based management platform empowers users with unparalleled oversight and control over their Peplink devices, all accessible through the convenience of any web browser. Whether it’s deploying mass configuration changes, monitoring real-time network stability or responding to unexpected issues, InControl 2 streamlines these tasks with a very user-friendly interface. When it comes to managing even a single router with InControl 2, you do not have to be a networking engineer. In fact, in most cases, configuring settings through InControl 2 is easier than manually configuring the router from its administrative graphical user interface (GUI).

Peplink App

The Peplink app provides users with the convenience of managing their network from anywhere, at any time. Optimized for mobile devices, the app allows users to quickly access key networking features, monitor the health and performance of their Peplink devices, and receive instant alerts. While it offers a more condensed interface than its web-based counterpart, the Peplink app is engineered for efficiency, ensuring that essential functions are easily accessible. Whether you’re troubleshooting on the go, adjusting configurations, or checking the status of your network, the Peplink app simplifies network management. The app is currently available on Android and iOS devices to provide flexibility and control over your network.

Local Web Administration

As with all routers, Peplink is configurable directly from the device itself. This is accomplished by connecting to the router’s wifi or connecting a pc or laptop to one of your device’s LAN ports. Once connected you can visit the device’s web admin by opening a browser (Google Chrome, Firefox, etc.) and typing in the IP address of your router. For Peplink this will either be 192.168.50.1 or 192.168.1.1, depending on if the Peplink is a Pepwave MAX or a Peplink Balance router. This will give you full access to your router’s configuration. When comparing this option to the previously discussed InControl 2 and Peplink app, most users may find configuring their Peplink unit to require more effort and knowledge of router settings. 

Which Management Option Is Best?

Choosing the right management tool for your Peplink devices can significantly improve your networking experience. 5Gstore personally recommends InControl 2 if you want as much control as possible from anywhere at any time and while the Peplink app offers convenience for basic management tasks on the go, Peplink’s InControl 2 platform stands out as the superior choice for comprehensive network management. InControl 2 provides a unified dashboard that allows you to monitor and manage all of your Peplink devices across multiple locations.

 This platform excels in its depth of features and will continue to be the leading management platform from Peplink when it comes to getting new updates and features. InControl 2 management can also be shared to anyone that you want to have access to assist in your networking management and the amount of access that you provide another user can be adjusted.

If you are a 5Gstore customer this provides an added bonus to your 5Gstore tech support. Having a problem with your configuration and not sure where the problem is? As a 5Gstore customer you can add our tech support agents directly to your InControl 2 group for hands-on assistance from your rep. 5Gstore does not directly support the Peplink app and providing hands on support is not always an easy task when using the local web admin. However, if you are still deciding which way to manage your Peplink, below is a general guideline for each option based on use case!

  • Peplink App – Configure router settings remotely with a simplified user interface on a mobile device
  • Web Admin – Configure basic to advanced router settings in 1 router on a desktop
  • InControl 2 – Monitor the status of multiple routers, with quantities varying from a few to hundreds, and apply configurations to the devices (e.g. firmware upgrade schedule, outbound policy) all at once.

Can All 3 Options Be Used At The Same Time?

This is where management can be a bit more complex. You can essentially have access to all 3 options, but if you allow InControl 2 to manage your settings you will have a limited view of certain details within the app such as Data usage/WAN quality, and Connected devices. As for the InControl 2 and the Peplink app you must choose which one to place in control of your settings. InControl 2 and the Peplink app will override any changes made directly from the router login and will compete for control. If you choose to use InControl 2 first when you access the app you will be warned that InControl 2 is managing your settings already. If you’re unsure which one to use, refer back to the suggested use cases for each one. 

Troubleshooting Issues That May Occur When Using The App or InControl2

If you have managed to configure your router, but you are running into issues with conflicting settings you aren’t sure how to resolve, here are some common issues that you may encounter along with steps to assist you in fixing them. 

The App Shows That My Router Is Registered On InControl 2 And I Cannot Proceed, What Should I Do? 

This message is displayed when the router is already registered inside a group on InControl 2, and the group setting of “Allow managing devices in Peplink App” is set to “No”. To give access rights to the Peplink app, the admin of the group must change the setting to “Yes” first. You can then tap “The setting has been updated” to try again. Follow the steps below to make this change:

Login to your InControl 2 account. From here you will need to navigate to the Group level from your main Organization. In the image below you can see the Organization>Group Name and it shows that you are on the Group Level. 

Hover over the “Settings” Icon and you will see a drop down menu with Group Settings at the bottom, Click this option. You will be brought to a new section and you will need to scroll down to the “Peplink App” section.

I Am Trying To Make Changes To My Router Via The App But My Changes Are Reverting Back To The Previous Settings. What should I do?

This issue is most likely due to settings being applied from InControl 2 first and then trying to alter the settings later from the Peplink app. We recommend accessing the web admin of your router and checking to see if the following message is displayed for your settings on the router.

If you see this message then InControl 2 is currently managing your settings. You will need to login to your InControl 2 account and remove the InControl 2 managed settings and make sure “Allow managing devices in Peplink App” is set to “Yes”

It is important to note that if you are managing settings with InControl 2 and don’t remove the IC2 settings and allow app control you may encounter issues with your Peplink settings.

If you are not seeing that message and are still having issues and are unsure of which steps to take, it may be necessary to disable InControl 2 management entirely from within your router and see if the issue is resolved. You can do this by accessing the Web Admin of your Peplink and navigating to Status>Incontrol 2> and disable Incontrol 2 management.

When in doubt, always double check that your settings aren’t currently being managed somewhere else if you are having trouble applying settings from one of the management options. Of course, if you have purchased your Peplink device directly from 5Gstore you can call our helpful support agents at 833-547-8673 Mon – Fri 9am-6pm Central Daylight Time.

Cloud Management Services for Cellular Routers 

What They Are & Why You Should Use Them

When you purchase some sort of electronic device, you normally have the option of purchasing an extended warranty for it. This might not only give you the option of hardware replacement, but added benefits. When it comes to routers – like the ones we carry from Cradlepoint, Digi, Inseego, Peplink, and Sierra Wireless – you may also have the added benefit of a cloud management service. 

What is a Cloud Management Service? 

This is essentially a website you can log into from anywhere in the world and both monitor and manage your routers remotely. Of course, in order to be able to do this, you must have a valid warranty and or cloud subscription for each of your routers. 

Why Should I Use a Cloud Manager?

Cloud management services are somewhat similar to device registrations with the manufacturer. It proves you own the device and protects it from being added to another user’s management account. They help to keep an eye on your devices by monitoring the health of the device, its uptime, and signal strength. Configurations are streamlined, as it allows you to get devices online more quickly.

What Benefits Do Cloud Managers Provide?

Other than remote visibility of your routers’ connection status in real-time, there are several benefits to having cloud management service for your devices. 

  • Lower Overall Management Costs: Reducing the cost of configuring and deploying your devices through a single platform.
  • Increased Productivity: Manage multiple devices at the same time and reach your goals more quickly and efficiently.
  • Maintenance: Minimizing the cost of keeping your devices current and secure with easy deployment of software and security updates.
  • Security: Lock down access to your devices to authorized personnel and improve the overall security on your networks. 

Common features include:

  • Configuration by device or group
    • Save time by setting up configurations that can then be uploaded to your device or groups of devices. Most devices support Zero touch provisioning (ZTP), which allows you to automatically deploy device configurations over a network connection.
  • Data usage tracking and alerts
    • Avoid overage fees by staying up to date on how much data your device(s) are using. 
  • GPS tracking
    • Verify where your device has traveled in the past or view it in real time.
  • Firmware update
    • Ensure proper maintenance for your device(s) by upgrading firmware as needed. This can sometimes be done for a group of devices also.
  • Device diagnostics for troubleshooting
    • Use tools like ping and traceroute to verify how traffic is flowing on your network. Additionally, you may reboot your device as needed or in some cases, you may set a reboot schedule. 

Less Common Features

  • Remote access to the web UI
    • Use the management service to log into your device remotely, just like it works locally, or similarly.
  • Remote Access to devices on the LAN of the router
  • VPN Connectivity and simple configuration
    • Link devices with the use of VPN, which can easily be configured through the cloud manager.
  • API support
    • The API is an interface for developers to integrate their systems and/or scripts with the data available in the cloud manager. This may include online/offline status of routers and network interfaces, signal strength and quality of cellular modems, router logs, and more.
  • Fast Renewal Activation
    • Renewing service can be a real pain, but not when it comes to processing licenses for Peplink at 5Gstore.com. We have an automated system that allows you to enter your Peplink serial number in our website search field and it will report back compatible licenses. Once your license is purchased, it takes mere minutes to be processed.

Some warranties include these cloud services and in those cases, the cloud service is valid for as long as the warranty is. Here’s what each manufacturer offers:

Cradlepoint NetCloud 

  • Warranty, support and cloud management services are bundled under the NetCloud subscription, which is available for 1, 3 or 5 years.
    • Features include:
      • Bulk configuration and firmware updates
      • Troubleshooting and diagnostic tools
      • Custom alerts and reports
      • Location services and coverage mapping
      • Cellular plan monitoring and forecasting
      • API option

Digi Remote Manager

  • Cloud service is available through a license separate from the device warranty. Premier service plans are available for 1, 3, or 5 years.
    • Features include:
      • Configuration manager
      • Location mapping
      • Bulk firmware upgrades
      • Out of Band Management
      • Alarms and On-Demand Reports
      • Web Service APIs

Inseego Connect

  • Basic management is included for the life of the device, but has limited features compared to their Standard and Advanced plans. It is mainly for device inventory and status monitoring. Standard is best for focusing on monitoring device health and remotely configuring devices. Advanced includes all the standard features plus additional analytics and insights into how devices are being utilized. These are both available for an additional fee for 1 or 3 years. Note that when purchasing the Advanced plan, this includes warranty and support, also for 1 or 3 years.
    • Features include:
      • Bulk Configuration of groups of devices
      • Location mapping
      • Access to key health metrics
      • Data usage tracking
      • Set alerts and perform diagnostics
      • Firmware updates

Peplink InControl 2

  •  Cloud management is included with a valid warranty, of which it is 1 year standard. Optional warranty extensions are available at 1, 2 or 4 years. For non-PrimeCare Velocity and Volume-Based series devices you also have the option for 1 or 2 years of cloud management only.
    • Features include:
      • Bulk configuration
      • Remote access to web UI and devices on the LAN
      • GPS fleet management
      • Troubleshooting tools
      • API option

Sierra Wireless/ Semtech AirLink Management Service

  • Warranties include support and cloud management for 1 year. Upgrades are available for 1 year on AirLink devices.
    • Features include:
      • Mass configuration
      • Location mapping
      • Device alerts and reports
      • Firmware upgrades
      • Data usage tracking
      • Diagnostic tools
      • Web services API

How Much Data Will Cloud Manager Services Use?

You may also be wondering how much data usage the Cloud Service is going to require. This is especially important for users who have limited data plans for M2M or IoT applications. Let’s take a look at the minimum usage for each system. 

Cloud Management ServiceMinimum Data Usage
Cradlepoint NetCloudData usage ranges from 5-10 MB per router per month in typical scenarios. Settings like connection pulse intervals significantly impact usage. Faster pulses increase data usage, while slower pulses risk connection issues but save data.
Digi Remote ManagerWithout updates and default settings, it uses approximately 4.68 MB on cellular and 18.1 MB on non-cellular connections monthly. However, if all features are enabled, it can go up to 263 MB monthly. To minimize data usage, users can disable non-essential features like event logging and adjust keep-alive intervals. 
Inseego ConnectAverage is 100 MB monthly, but this can increase depending on usage. While this service doesn’t offer extensive customization options, being mindful of data-intensive activities can help minimize usage.
Peplink InControl 2Monthly data usage averages 339.7 MB with GPS enabled and 172.3 MB with GPS disabled. Users can optimize data consumption by adjusting reporting metrics. Enabling Low Data Usage Mode in particular, significantly reduces data usage, down to 6.9 MB with GPS enabled and 1.3 MB with GPS disabled.
Sierra Wireless/ Semtech AirLink Management ServiceWith default configurations, devices use around 2.7 MB/day without telemetry and 3.3 MB/day with telemetry. Disabling both telemetry and the Network Watchdog reduces usage to approximately 400 KB/day. 

What Happens When I Don’t Renew My Cloud Management Service?

Most manufacturers will include some sort of cloud service with the purchase of the hardware. This may make you more inclined to use it, but what happens when the service expires? While in most cases, you can still log in and view past data, most or all remote management features are lost. This includes the ability to log into your device or devices behind it, firmware upgrades, and GPS as well as data usage tracking. 

ManufacturerIncluded Cloud ServicePost Expiration Functionality
Cradlepoint1, 3 or 5 yearsSome, or all features become unusable. More info
DigiNoDevice reports no longer available, including data usage. Individual Device Stream data is retained, and could be accessed via the API.
InseegoBasic plan for life of deviceRemote management and data tracking is unavailable.
Peplink1 yearRemote access, configuration, and data tracking is lost. Past reports are still accessible.
Sierra Wireless/ Semtech1 yearRemote management and data tracking is lost.

How Do I Renew My Cloud Management Service?

  • Cradlepoint: Alerts are sent to the admin at 90 days before expiration and again at 30 days before expiration, if no order has been placed. If you choose to renew after your devices have expired, there may be a 10% reinstatement fee applied. Simply contact sales@5gstore.com with your device serial number(s) and email address associated with your Cradlepoint NetCloud account and we’ll follow up with a quote. 
  • Digi: When it comes time to renew your Digi devices, you may purchase subscriptions per device, right at 5Gstore.com. Note your device serial number(s) and the email on the Digi Remote Manager account is needed at checkout. 
  • Inseego: At renewal time, go to 5Gstore.com and purchase the subscription of your choice. You will need to enter the device IMEI number(s) at checkout. 
  • Peplink: Alerts are sent at least 30 days prior to expiration of your Care plan, and a 30 day grace period is provided after expiration, if needed. After the 31st day from the Care Plan expiration date, a diagnostic report is required to be submitted and verified by Peplink. You may either email sales@5gstore.com with your Diagnostic Report or submit it at checkout. Not sure what license you need? Just enter your device’s serial number in the 5Gstore.com search bar and it will populate compatible licenses. Our team can also assist you with selecting the appropriate license for your needs. 
  • Sierra Wireless/ Semtech: Contact sales@5gstore.com with your device serial number(s) and email address associated with your AirLink Management Service account, along with your account UID, and we’ll follow up with a quote. 

How Much Will it Cost to Renew Cloud Management Service?

Want to get an idea of the yearly costs for the cloud service? Here is a breakdown of the costs by manufacturer: 

Manufacturer1 year renewal3 year renewal5 year renewal
CradlepointStarts at $72Starts at $216Starts at $360
Digi$48$126$210
Inseego$19.99$49.99N/A
Peplink*$29 (cloud only)/ $49 and up (Care plans)$49 (2 year cloud only)/ $98 and up (Care plans)N/A
Sierra Wireless/ Semtech$30 (RV, RX, LX, MP Series)/ $90 (XR Series)$90 (RV, RX, LX, MP Series)/ $270 (XR series)$150 (RV, RX, LX, MP Series)/ $450 (XR Series)
*Cloud only subscriptions apply to Velocity & Volume-Based series devices. PrimeCare and PrimeCare+ or EssentialCare and EssentialCare+ prices range, depending on the device model.

Is Cloud Management Service Right For You?

Whether you have one device to manage, or multiple devices, a cloud management solution could save you both time and money. In most cases this is best for administrators that need to manage several local and/or remote devices. However it can also be helpful for single device users as well. Features like data and client data usage tracking capabilities, as well as device diagnostic tools could prove beneficial.   

If after reading this you’re still unsure as to whether or not you want to use a cloud management service, reach out to our team for assistance. We’re available Monday through Friday from 9am to 6pm CT at 833-547-8673 or sales@5gstore.com

Understanding TAA Compliance

In an increasingly interconnected global economy, trade agreements play a pivotal role in shaping business practices and economic relationships between nations. One such agreement that holds significant importance for companies seeking to do business with the U.S. government is the Trade Agreements Act (TAA). TAA compliance is not just a legal requirement; it’s a commitment to ethical business practices, fair trade, and supporting domestic economies. 

There are 3 categories of TAA-compliant products. This includes the following:

  • Domestic end products – made entirely in the United States
  • Designated country end products – made in a country that has a trade agreement with the United States 
  • Foreign end products – made outside of the United States and do not meet the requirements for designated country end products

In this article, we delve into what it means to be TAA compliant, why it’s important, the requirements for compliance, and the benefits it offers.

What Does it Mean to be TAA Compliant?

At its core, TAA compliance refers to adherence to the guidelines set forth by the Trade Agreements Act, a federal law governing government contracts and procurement. The primary objective of TAA is to foster fair and open international trade while ensuring that products purchased by the U.S. government are manufactured in designated TAA-compliant countries. These countries include Taiwan, Canada, Mexico, Australia, Japan, Germany, and many others. The full list of TAA-compliant countries can be found on the General Services Administration (GSA) website.

Why is TAA Compliance Important?

The significance of TAA compliance extends beyond mere regulatory adherence. It serves as a testament to a company’s commitment to ethical business practices and fair trade. Here’s why TAA compliance is crucial:

  1. Support for Fair Trade Practices: TAA compliance ensures that the U.S. government upholds fair trade practices, avoiding inadvertent violations of international trade agreements.
  2. Economic Protection and Job Support: By promoting the purchase of products made in the U.S. or designated TAA-compliant countries, TAA compliance supports domestic economies and American workers.

What is Required to be TAA Compliant?

Achieving TAA compliance involves meeting specific requirements outlined by the Trade Agreements Act:

  1. Designated Country Status: Companies must operate in a designated country, including the U.S., EU countries, and nations with free trade agreements with the U.S.
  2. Origin of Products or Services: Products or services sold to the government must be manufactured or substantially transformed in a designated country, ensuring compliance with TAA regulations.
  3. Accurate Record-Keeping: Maintaining meticulous records of products/services sold to the government and their country of origin is imperative. A comprehensive compliance program outlining policies and procedures must also be in place.
  4. Compliance with Domestic Sourcing Requirements: In addition to TAA, compliance with the Buy American Act (BAA) is also necessary, ensuring a percentage of a product’s components are sourced domestically.

Benefits of TAA Compliance

TAA compliance offers several benefits for businesses:

  1. Government Contract Eligibility: TAA compliance is a prerequisite for bidding on and winning government contracts, providing access to a lucrative market segment.
  2. Global Market Access: Compliance facilitates entry into global markets through trade agreements, expanding opportunities for growth and revenue generation.
  3. Enhanced Reputation: Demonstrating commitment to ethical practices enhances a company’s reputation, fostering trust among stakeholders and attracting new business opportunities.
  4. Risk Mitigation: Compliance mitigates the risk of penalties and legal repercussions associated with non-compliance, safeguarding the company’s interests.
  5. Meeting Customer Requirements: Many private sector companies also prioritize TAA compliance, ensuring alignment with customer expectations and retaining existing business relationships.
  6. Improved Supply Chain Management: TAA compliance necessitates robust supply chain management practices, leading to efficiency and transparency in operations.

Tips for Maintaining TAA Compliance

To ensure ongoing compliance, businesses should:

  1. Understand TAA requirements thoroughly.
  2. Stay updated on regulatory changes.
  3. Implement internal controls and conduct regular audits.
  4. Provide comprehensive training to employees.
  5. Work with reputable suppliers and vendors.
  6. Maintain accurate records of compliance efforts.

TAA-Compliant Devices and Suppliers

Companies like Cradlepoint, Digi, Inseego, Peplink, and Sierra Wireless (now Semtech) offer TAA-compliant products, ensuring adherence to regulatory standards and ethical manufacturing practices. Contact the sales team at 5Gstore.com for assistance finding an appropriate solution for your application. We’re available Monday through Friday from 9am to 6pm CT at 833-547-8673 or sales@5gstore.com

The Factors Impacting Your 5G Bandwidth Speeds

The dawn of 5G promised lightning-fast internet speeds, heralding a new era of connectivity. However, the reality often falls short of these lofty expectations, leaving many users frustrated and wondering why their 5G speeds are not as blazing fast as advertised. Several factors can affect your 5G bandwidth speeds, ranging from technical limitations to network congestion. Let’s delve into some key points to understand what could be influencing your 5G experience.

Frequency Band(s) Your Modem or Phone is Connected To

One of the primary determinants of your 5G bandwidth speed is the frequency band your device is connected to. 5G operates across three main frequency bands: low, mid, and high. Each band has its advantages and limitations. Low-band 5G offers wider coverage but relatively modest speed enhancements compared to existing 4G LTE networks. Mid-band 5G strikes a balance between coverage and speed, providing faster speeds than low-band but with middling coverage. High-band, also known as mmWave, offers the highest speeds but suffers from limited coverage and poor penetration through obstacles. Therefore, your proximity to a cell tower and the band it employs can significantly impact your 5G speeds.

Limitations of Your Modem or Phone

The capabilities of your modem or phone play a crucial role in determining the speeds you can achieve. Different devices support different frequency bands, and their performance may vary accordingly. For instance, a device equipped with support for high-band frequencies will likely achieve faster speeds in areas where high-band 5G is available compared to a device limited to low-band frequencies. Upgrading to newer devices that support a wider range of frequency bands can potentially enhance your 5G experience.

User Load at the Cell Tower

Network congestion is another key factor that can affect 5G bandwidth speeds. If too many users are connected to the same cell tower simultaneously, it can lead to decreased speeds for everyone. During peak hours or in densely populated areas, the demand for bandwidth may exceed the capacity of the cell tower, resulting in slower speeds for users. Network operators are continuously expanding infrastructure and optimizing networks to mitigate congestion, but it remains a persistent challenge in densely populated areas.

Limitations on Your Data Plan

Even if your device and the network infrastructure are capable of delivering high-speed 5G connectivity, your data plan may impose limitations. Some data plans throttle speeds after reaching a certain threshold of data usage, while others prioritize certain types of traffic, such as video streaming or gaming, which can impact overall bandwidth speeds. Understanding the terms and conditions of your data plan and choosing an appropriate plan that aligns with your usage patterns is essential for maximizing your 5G experience.

The Speed of Your WiFi or Ethernet Adapter

Lastly, the speed of your WiFi or Ethernet adapter can affect the performance of your 5G connection, especially when using a home or office network. Even if you have a fast 5G connection, a slow WiFi router or Ethernet adapter can become a bottleneck, limiting the speeds you can achieve on your devices. Upgrading to newer networking equipment capable of handling higher speeds can help unleash the full potential of your 5G connection.

As you can see, achieving optimal 5G bandwidth speeds involves a combination of factors. This includes the frequency band your device is connected to, the capabilities of your device, network congestion, data plan limitations, and the speed of your networking equipment. By understanding these factors and taking appropriate measures, users can enhance their 5G experience and unlock the full potential of next-generation connectivity.

T-Mobile’s 5G Revolution: Nationwide Coverage Just Got Faster!

In a groundbreaking move, T-Mobile has announced the activation of its 2.5 GHz mid-band spectrum, acquired through FCC Auction 108 in August 2022. With over 60 million subscribers eagerly anticipating improved 5G experiences in the coming days, the Un-carrier is set to reshape the 5G landscape across the United States.

The 5G SALE Act Unleashes T-Mobile’s Potential

T-Mobile’s journey to utilize the acquired mid-band spectrum was marked by challenges. Despite winning 7,156 licenses covering 2,724 counties in the auction, the company faced regulatory hurdles. The FCC auction authority expiration and subsequent legislation, namely the 5G SALE Act, paved the way for T-Mobile to unleash the potential of its acquired licenses.

Mid-Band Spectrum: The Goldilocks of 5G

The 2.5 GHz mid-band spectrum is a big deal for T-Mobile subscribers. Unlike high-band mmWave spectrum, mid-band offers a balance between speed and coverage. It travels longer distances and is less prone to obstruction by obstacles like buildings or trees. Often referred to as the “Goldilocks of 5G spectrum,” mid-band strikes a perfect balance between the ultra-fast mmWave and the more widespread, but slower, low-band spectrum.

T-Mobile’s Ultra Capacity 5G Expansion

On March 6, 2024, T-Mobile announced a significant expansion of its Ultra Capacity 5G coverage. By activating the 2.5 GHz spectrum, the Un-carrier aims to enhance the 5G experience for tens of millions of users, particularly those in rural areas. The added capacity will result in an immediate performance boost for customers, marking a crucial step in bridging the digital divide.

Mike Sievert, CEO of T-Mobile, expressed excitement about the development, stating, “This type of execution is exactly why T-Mobile is the new network leader in the U.S., and we continue to give customers the greatest value at the same time.”

Impact on Rural Communities

T-Mobile’s strategic investment of $304 million in FCC Auction 108 covered over 7,000 county-based licenses, impacting more than 80 million people, nearly a quarter of the U.S. population. With a focus on rural areas, the Un-carrier is delivering improved connectivity and performance, fostering healthy competition and choice for millions of Americans.

In the coming days, T-Mobile will activate the spectrum, covering nearly 60 million customers over almost 300,000 square miles. The company plans to deploy the rest as new towers are built, ensuring a comprehensive and robust 5G network.

Nationwide Reach: What to Expect

Wondering if you’ll benefit from the added capacity? T-Mobile secured licenses in nearly every county across the U.S., ensuring widespread 5G coverage. Even if you aren’t in one of the 80 million+ areas directly impacted, you’re likely to experience a 5G boost wherever you go – whether traveling, working, or playing.

For example, in Louisiana, the spectrum activation will benefit customers in 92% of the counties, leading to immediate improvements in connectivity for more than 1.7 million people, with nearly 500,000 in rural areas. Similar enhancements will be seen in Pennsylvania, reaching 2.2 million people, including nearly one million in rural communities.

T-Mobile’s Unmatched 5G Network

T-Mobile’s commitment to expanding its 5G network has propelled it to the top of the industry. The Un-carrier is now crowned the overall network leader in the U.S., boasting the largest, fastest, and most awarded 5G network. With coverage extending over 330 million people across two million square miles, T-Mobile surpasses the combined reach of AT&T and Verizon. More than 300 million people nationwide are covered by T-Mobile’s super-fast Ultra Capacity 5G, with over twice the square miles of coverage compared to its closest competitors.

For those yet to experience T-Mobile’s network, the company offers a free trial with Network Pass. Users with unlocked eSIM-compatible phones can enjoy three months of T-Mobile’s unlimited smartphone data, including 5G. The transition to T-Mobile is made seamless with Easy Switch, allowing users to make the move in just minutes from their phones.

In conclusion, T-Mobile’s activation of the 2.5 GHz mid-band spectrum marks a significant milestone in the evolution of 5G connectivity across the United States. As the Un-carrier continues to enhance its network, millions of subscribers can look forward to a faster, more reliable 5G experience, solidifying T-Mobile’s position as the new leader in the U.S. telecom landscape.