LS Base using TCP MiFi Devouring My Data Plan

Eugene Aksyonov

Well-Known Member
Timothy, I have got some idea how to check what was going on. I need you put this unit on RAMS to me, so I can check.
please do it and send me message in private chat to continue this investigation.
Regards,
 

Adam

Well-Known Member
5PLS
Eugene, my base 552 using tcp with a jetpack and my rover 960 connected to tcp with internal cell are on the support server if you need them for any testing. I am not exhibiting any of the over usage symptoms at the moment. I can leave them on for a while. I just reset them to 0.
 

Eugene Aksyonov

Well-Known Member
Thanks, Adam,
but I need at the moment only Timothy's receiver because it behaves not as expected. I need to see the reason why.
 

T.Guisewhite

Active Member
My LS base SN 947
And LS rover SN 876
Are on RAMS now pass
I reset both stats at 10:16 Eastern time

base is counting in MB... rover is counting in KB...
Hope you can catch a glimpse of it there in Moscow.

Thanks!
 

T.Guisewhite

Active Member
Anyone able to look at this?
Still running...Verizon says now down to 200kbps
Looks like It pumped out almost 6 GB last night. Rover only received 17 MB
 

Eugene Aksyonov

Well-Known Member
Timothy,
situation is clear now.
Your base was a victim of hacker attack, I think unintentional, and they used it for data redirect services. Similar to tor networks, like peer to peer proxy connection.
I made your units protected against this attacks at this moment. But we will issue a new patch for OS and Application very soon to all.
My recommendation for jetpack setup is not to make DMZ for IP, but configure PortAddressTranslation (PAT) for incoming ports to receiver behind the jetpack. That is almost same easy as DMZ, but will save you from attackers and finally money.
I want to tell you my personal THANK YOU because you was the one who reported this fast and gave me chance to see the problem which we were hunting for long time!
You can use the units now. I don't think we need it on RAMS now. investigation completed.
Best Regards,
 

T.Guisewhite

Active Member
You are the man!
I’m going to call Verizon and see if they can reinstate some data for me... I’ll report on their customer service ;)
 

Adam

Well-Known Member
5PLS
Timothy,
situation is clear now.
Your base was a victim of hacker attack, I think unintentional, and they used it for data redirect services. Similar to tor networks, like peer to peer proxy connection.
I made your units protected against this attacks at this moment. But we will issue a new patch for OS and Application very soon to all.
My recommendation for jetpack setup is not to make DMZ for IP, but configure PortAddressTranslation (PAT) for incoming ports to receiver behind the jetpack. That is almost same easy as DMZ, but will save you from attackers and finally money.
I want to tell you my personal THANK YOU because you was the one who reported this fast and gave me chance to see the problem which we were hunting for long time!
You can use the units now. I don't think we need it on RAMS now. investigation completed.
Best Regards,
Very good Job Eugene.
 

Adam

Well-Known Member
5PLS
Timothy,
situation is clear now.
Your base was a victim of hacker attack, I think unintentional, and they used it for data redirect services. Similar to tor networks, like peer to peer proxy connection.
I made your units protected against this attacks at this moment. But we will issue a new patch for OS and Application very soon to all.
My recommendation for jetpack setup is not to make DMZ for IP, but configure PortAddressTranslation (PAT) for incoming ports to receiver behind the jetpack. That is almost same easy as DMZ, but will save you from attackers and finally money.
I want to tell you my personal THANK YOU because you was the one who reported this fast and gave me chance to see the problem which we were hunting for long time!
You can use the units now. I don't think we need it on RAMS now. investigation completed.
Best Regards,
Eugene, can you post the instructions on how to set up PAT?
 

Eugene Aksyonov

Well-Known Member
You are the man!
I’m going to call Verizon and see if they can reinstate some data for me... I’ll report on their customer service ;)
I think they will not be responsible for that. I am trying to understand what we can do for you... in terms of an award for the cooperation.
 

Matt Johnson

Well-Known Member
5PLS
I need Verizon jetpack device to guide you through the pages. I will try to find it and make instruction.

Here is the manual and port forwarding instructions: https://ss7.vzw.com/is/content/Veri...n/Userguides/hotspot-vz-jetpack-ac791l-ug.pdf

1611169003396.png


I think TCP ports 8002 and 8010 should be forwarded to the IP address assigned to the LS (can be found in the WiFi screen).
 

Shawn Billings

Shawn Billings
5PLS
It's not a bad idea to also forward 8011, 8012, 8013, and 8014, although those aren't critical. Each port can handle five connections, so if you want access to more connections, the the additional ports will give you more access. Also, you can set each port for different correction types if there is ever a need. 8002 is good for input/output, the rest are output only.
 

Adam

Well-Known Member
5PLS
How is this done with the LS's that have internal cell modems and Verizon sim cards but no jetpack to program it?
 

Matt Johnson

Well-Known Member
5PLS
How is this done with the LS's that have internal cell modems and Verizon sim cards but no jetpack to program it?

Port forwarding is not needed with an internal cellular modem. A OS fix would be needed if hackers are routing traffic through the device.
 
Top