Product

Static public IP SIM: secure remote access to routers, IP cameras and PLCs

Dedicated public IP per SIM, with managed port forwarding and per-source allowlist. Reach the router, IP camera, PLC, or Linux gateway directly from your platform — no device-side VPN, no CGNAT, no need to open the customer's firewall. Rules are API-configurable, with full access audit logs.

Key features

Dedicated public IP per SIM

A public IPv4 permanently assigned to your SIM. It does not change between sessions or when the device re-attaches to a different carrier.

Managed port forwarding

Define which device ports to expose, on which external ports, and from which source IPs they can be reached.

Per-source allowlist

Only IPs you declare may connect. Everything else is dropped silently — no scan possible.

REST API for automation

Create, modify and remove rules from your own platform. Ideal for multi-tenant or large-scale deployments.

Access audit log

Every connection attempt is recorded: timestamp, source IP, port, result (allowed or blocked).

Works with any industrial router

No VPN client or special device-side config required. Validated with Teltonika, Robustel, MikroTik, Cradlepoint and most commercial 4G/5G routers.

Technical specifications

IP typeDedicated public IPv4 (routed)
APNStatic-IP-specific (configuration provided)
Max ports per SIMNo operational limit (recommended <20 active rules)
Allowed trafficTCP, UDP
Audit log30 days online, exportable to S3 or webhook
Added latency<5 ms (within Europe)
REST APIYes, with HMAC and ICCID idempotency
MTU1500 bytes

Use cases

  • Remote access to industrial routers (Teltonika, Robustel, MikroTik, Cradlepoint)
  • Remote management of IP cameras and NVRs (Hikvision, Dahua, Axis)
  • Modbus TCP polling of PLCs in solar plants
  • SSH maintenance of Linux gateways (Raspberry Pi, IOT2050)
  • SNMP monitoring of distributed network equipment
  • WAN backup with remote access to the failover router
  • SCADA integration with OPC UA over public IP
  • Multi-tenant management: each customer gets their SIM, IP, and rules

Routing model

Direct public IP vs. routed public IP vs. private IP via VPN

Not every SIM advertised with a "static IP" solves the same problem. Here is the technical difference:

FeatureDirect public IPRouted public IPPrivate IP via VPN
How it worksThe SIM receives a directly routable public IP. Anyone with the IP can reach the device if it exposes ports.The SIM holds a private IP on the carrier network. A monitored gateway port-forwards from a dedicated public IP to the device, with a source-IP allowlist.The SIM holds a private IP inside a private APN. The device opens (or receives) a VPN tunnel — IPsec, WireGuard or OpenVPN — into your infrastructure.
Who can reach the device?Anyone who knows the IP. Defense: firewall on the device itself.Only IPs in the gateway's allowlist.Only hosts inside the VPN.
Added latencyNone (direct access).Minimal (one extra hop through the gateway, typically <5 ms within Europe).Variable (5-30 ms depending on VPN concentrator location and overlap with the carrier's path).
Device-side configurationThe modem exposes ports. Static-IP-specific APN.No special configuration on the modem — it benefits automatically from the gateway's port forwarding.The modem or an upstream gateway must run a VPN client. More maintenance, larger bug surface.
Access auditabilityOnly what the device firewall logs (often nothing).Central audit log at the gateway: who connected, when, on which port.Logs at the VPN concentrator; depends on the implementation.
Typical use caseDevices in hostile networks where you do not want any intermediate transit (rare outside defense/finance).Remote access to industrial router, IP camera, PLC, NVR, Linux gateway, managed switch.When a corporate VPN already exists and the device must join the internal network.
Misconfiguration riskHigh — the entire Internet can scan the device.Low — the allowlist is the barrier; if configured correctly, only your IPs get through.Low on the network, but high if the VPN is compromised (access to the whole internal network).
Availability at iot.cardsYes (SIM with direct public IP).Yes (SIM with routed public IP — recommended for most cases).Yes (via private APN — see /products/private-apn).

Use cases by protocol

Routed public IP is transparent to the device protocol. Examples by real-world use:

ProtocolTypical devices
HTTP / HTTPS (ports 80, 443)Web UI of Teltonika RUTX/RUT, MikroTik (Webfig), Cradlepoint, Robustel routers; IP camera dashboards.
RTSP (port 554) and ONVIFHikvision, Dahua, Axis IP cameras. Remote access to streams from a video-surveillance platform.
Modbus TCP (port 502)Siemens S7, Schneider M340, Allen-Bradley Micro800 PLCs. Reading industrial variables remotely.
SSH (port 22)Linux gateways (Raspberry Pi, IOT2050, BeagleBone), MikroTik routers via CLI.
SNMP (port 161)Managed switches and routers, monitoring via Zabbix/PRTG/LibreNMS.
OPC UA (port 4840)SCADA systems, integration with modern industrial platforms.

Security model

The iot.cards monitored gateway applies an allowlist per SIM or per SIM group. Only the public IPs or CIDR ranges you declare may initiate connections to the device. Every access attempt is logged.

  • Source-IP allowlist, configurable per SIM or per group.
  • Per-port rules: you can allow HTTP but not SSH, for example.
  • Persistent audit log: timestamp, source IP, destination port, result (allowed / blocked).
  • IP rotation without swapping the SIM if a public IP is compromised.

REST API: manage rules dynamically

All port-forwarding and allowlist rules are manageable via REST API. Useful when you provision a new device from your own platform, or when a field technician needs temporary access from a new source IP.

Example: open HTTPS to the device from two CIDR ranges

POST /api/v1/sim/{iccid}/port-forwarding
{
  "external_port": 8443,
  "internal_port": 443,
  "protocol": "tcp",
  "allowlist": ["203.0.113.10/32", "198.51.100.0/24"]
}
View REST API documentation

Explore also

Frequently asked questions

What is the difference between direct public IP and routed public IP?
With a direct public IP, the IP terminates on the modem and the device exposes ports directly to the Internet. With a routed public IP, a gateway port-forwards from the public IP to the device with an allowlist. Routed is more secure by default: only the source IPs you declare can connect, and there is centralized audit logging.
Can I change port-forwarding rules at any time?
Yes, via portal or REST API. Changes take effect within seconds. This lets you, for example, open SSH temporarily for a field technician from a specific IP and then close it again automatically.
Does it work with any 4G/5G industrial router?
Yes. The SIM needs no special device-side configuration beyond the static-IP APN we provide. We have validated with Teltonika RUT/RUTX, MikroTik LtAP/Chateau, Cradlepoint IBR/E300, Robustel R1511/R3000, and most commercial models.
Is it compatible with CCTV (Hikvision, Dahua)?
Yes. Routed public IP allows you to expose RTSP (554), ONVIF, and the admin web of NVRs and IP cameras. We recommend restricting to the required port and to your management-platform IPs only — do not open all ports.
What happens if an authorized source IP changes (e.g. office dynamic IP)?
Three options: (a) update the allowlist via API when it changes, (b) use a wide CIDR range from the office provider, or (c) reach the device through a bastion with a static public IP. Customers with many dynamic accesses usually find the bastion the simplest path.
Is there a per-rule cost for port forwarding?
No. The price of the routed static-IP SIM includes the gateway and all active rules. We only scale price if monthly traffic exceeds the contracted plan.
How does this compare to private APN with VPN?
Private APN with VPN is the right answer when the device must join your internal network or when you have many SIMs and want a single management point. Routed public IP is the right answer when you need to reach individual devices from your SaaS platform and you do not want to maintain a VPN concentrator. See /products/private-apn for the private-APN case.