How to Install MOBITEK Q24 GSM Modem Hub’s USB Driver in Linux

This guide applies to the following MOBITEK products:-

  • MOBITEK Q24 GSM Modem
  • MOBITEK Q24 GSM Modem Hub

USB Driver had been pre-installed in the following Linux Distro:-

  • Ubuntu 11.10 and above
  • Any distro based on Ubuntu 11.10 and above such as Linux Mint

For other distro, you may need to compile the driver into Linux kernel which is not covered in this guide.


  1. Optional — install “Cutecom” from Software Manager.

    Linux_USB-01Click on “install”
  2.  Go to “User and Groups”.
  3.  Click on the current user and then click on “Groups”.
  4.  Assign the following “Groups” or permissions to the user:-
    1.  dialout
    2.  root
    3.  sudo
    4. tty
  5.  Restart Linux.
  6.  Open terminal and enter “lsusb”.
  7. If MOBITEK Q24 GSM Modem Hub is detected by Linux, there should be 2 items listed on screen — “Future Technology Devices International, Ltd FT4232H”.
  8.  Open CuteCom (or minicom).
  9.  Manually type “/dev/ttyUSB0”
  10. Click on “Open device”.
  11. For the input method below, change the Input type from “LF line end” (default) to “CR,LF line end”.
  12.  Enter “AT”, and if “OK” is returned or displayed then this mean that the modem is successfully connected to “/dev/ttyUSB0”.
  13. Click “Close device”.
  14. To check next modem in MOBITEK Q24 GSM Modem Hub, then type:-
    1. /dev/ttyUSB1
    2. /dev/ttyUSB2
    3. /dev/ttyUSB7
      and repeat Step 10 until 13.

How to Insert SIM Card

(note: for updated post, please refer to

  1. Before you insert the SIM card into your Modem, you must check the position of SIM Card.
    – MOBITEK MobiGATE or MOBITEK Q24 STK MODEM HUBHow to Insert SIM Card-01
    – The correct position of SIM Card to be inserted:How to Insert SIM Card-02
  2. When insert the SIM Card:-
    – the “gold area” of the SIM Card should be facing at down position;
    – turn on the switch button, you can see the blue LED Blinking which means your modem is connected. to the GSM/3G network

Applies To

  • MOBITEK MobiGATE, Model: SG-B-8-L-W
  • MOBITEK MobiGATE, Model: SG-B-8-U
  • MOBITEK Q24 STK Modem Hub, Model: B-8-U
  • MOBITEK Q24 GSM Modem Hub, Model: B-8-U


New Product: MOBITEK C60T M2M Wireless Gateway


MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

MOBITEK C60T M2M Wireless Gateway

What is MOBITEK C60T M2M Wireless Gateway?

It is a 3G, Wi-Fi and router device that allows your remote machines and terminals to be connected to the internet via 3G network.

How can MOBITEK C60T be used?

With MOBITEK C60T, you can use your PC in office to access these machines at remote sites:-

  1. Kiosk
  2. Vending Machine
  3. CCTV
  4. ATM
  5. Control Panel
  6. Utility Metering
  7. SCADA


  • Model: C60T
  • Connectivity Between C60T and devices:-
    • RJ45
    • IEEE 802.11b/g, Wi-Fi compliant
  • Connectivity Between C60T and Internet:-
    • UMTS 2100/1900/900/850
    • GPRS/GSM 1900/1800/900/850 MHz

Yes, I am Interested and I like to …

How to Set-up MOBITEK C60T

MOBITEK C60T is a M2M Wireless Gateway having 3G, Wi-Fi and Router functions in one single device.

To set-up, connect MOBITEK C60T to the PC using the RJ45 via LAN2 port. The sim card is inserted and turned on the power.

The default gateway of MOBITEK C60T is


The IP address of MOBITEK C60T is type in the browser to access the administration web page.C60T-062

The authentication required the username and password. The “admin” is put on both username and password.


The “Auto select 3G/4G ISP” is unchecked.
The following setting is manually enter values to the TELCO/SIM (Maxis) using:-

  • APN
  • Dialed Number
  • Username
  • PasswordC60T-064

Refer table below for list of TELCOs’ 3G Settings:-

C60T-065source: user manual of C60T

If the above table fail to work, then use this table:-


The configuration of MOBITEK C60T is successfully configured and verified by accessed the web page via 3G network.C60T-068



Description of C60T’s Admin Page


For the Equipment Function, UPNP (Universal Plug and Play) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other’s presence on the network and establish functional network services for data sharing, communications, and entertainment.
There are two options for the remote, disable or enable. If enabling a remote, and enter ‘http://WAN IP:8080′ in your bworser’s address bar, the you can access your device. Figure below as a proof accessed the device.C60T-054Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else’s computer remotely.
System Log The system log file contains events that are logged by the operating system components.
(source: , ,

Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable latency data networks.

Backup and Restore functiong for copying and archiving of computer data so it may be used to restore the original after a data loss event.

Firmware-Upgrade table show the information about the latest software version and the to upgrade the version, just upload the file and begin the upgrade process.

The restart button is located at admin page and once clicked, the router is restart.


Factory defaults will reset all settings back to factory defaults if you messed up with all the configurations.

C60T-060 Explanation:
Admin can change the password at the modify web password. Let say the default password is ‘admin’ and change new password to ‘mobitek’. If the authentication required the password, enter a ‘mobitek’ to access an admin page.



Description of C60T’s Routing Page

Routing Table above display the information about the current routing table.
The Destinantion IP address is the IP address to which message is sent. Networks using the TCP/IP protocol route messages based on the IP address of the destination.

The subnet mask is a binary pattern that is stored in the client machine, server or router. It is matched with the IP address of a packet to determine which network segment the packet is destined for.

Next hop is a routing term that refers to the next closest router a packet can go through. More specifically, next hop is an IP address entry in a router’s routing table, which specifies the next closest/most optimal router in its routing path.

The hop count refers to the number of intermediate devices (like routers) through which data must pass between source and destination.
(source: , , ,


Static Routing allow user to define path reaching to another network or host.

Description of C60T’s Server Page

Passive FTP (File Transferring Protocol) virtual server mode is extensively use to solve the issue of the client firewall blocking the FTP server data connection.
Virtual Server setting is a platform to configure virtual server on the router to change due to the router with default configuration does not allow computers fron Internet access LAN computer trhough the firewall.

Special Application is defined when the firewall found a ‘Trigger Port’ to be opened by a computer, it allow the connections from Internet to pass through the corresponding external port to be established.

DMZ (Demiliterized Zone) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s Local Area Network (LAN).

One-to-One NAT (Network Address Translation) is a way tp make systems behind a firewall and configured with private IP addresses appear to have public IP addresses.

This Sms service is provided by a server to inform the user and messaging a text.

Description of C60T’s Security Page

Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
PPTP (Point-to-Point Tunnelling Protocol) is a method for implementing virtual private networks.
IPSec (Internet Protocol Security) is a protocol suite for securing Internet Protocol (IP) communications by authenticating andd encrypting each IP packet of a communication session.
L2TP (Layer Two Tunnelling Protocol) is an extension of the PPTP used by an Internet Service Provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet.

Website-Block is to allow or deny the website to visit. You can set by adding the website for the action of deny or allow.


MAC Filtering refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to network. You also can allow or forbid MAC Filtering by adding MAC address in the table.

Access Restriction is used to control the behaviors of Internet users.

DoS (Denial-of-Service) Attack is an attempt to make a machine or network resources unavailable to its intended users, such as to temporarily on indefinitely interrupt or sespend services of a host connected to the Internet.

SYN flood Attack is a form of DoS attack in which an attacker sends a succession of SYN requests to a target’s system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

A UDP flood Attack is a DoS attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol.

An ICMP flood typically occurs when ICMP echo requests overload its victim with so many requests that it expends all its resources responding until it can no longer process valid network traffic.

A LAND (Local Area Network Denial) Attack is a Layer 4 Denial of Service (DoS) attack in which, the attacker sets the source and destination information of a TCP segment to be the same. A vulnerable machine will crash or freeze due to the packet being repeatedly processed by the TCP stack.

A Tear Drop Attack is a DoS attack that involves sending fragmented packets to a target machine. Due to the packets that overlapping one another, the target network device can crash.

A Smurf Attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service cause the part of a network become inoperable.

Ping of Death is a DoS attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

Internet Control Message Protocol (ICMP) provides error reporting and network probe capabilities. Because ICMP packets contain very short messages, there is no legitimate reason for ICMP packets to be fragmented. If an ICMP packet is so large that it must be fragmented, something is amiss.

A SYN fragment attack floods the target host with SYN packet fragments. The host catches the fragments, waiting for the remaining packets to arrive so it can reassemble them. So, it results the damage to the host’s operating system.

A Fraggle Attack is a denial-of-service (DoS) attack that involves sending a large amount of spoofed UDP traffic to a router’s broadcast address within a network.

ARP stands for Address Resolution Protocol. The principle of ARP cheating, is a kind of IP addresses into physical addresses. ARP specifically to the network layer (IP layer, which is equivalent to the third layer of the OSI) address resolution for the data link layer, MAC layer, which is equivalent to the OSI layer 2) of the MAC address.
(source:,,,, , ,, , , ,


Description of C60T’s LAN Page

The IP address is assigned on current LAN (Local Area Network) and subnet mask is It can be modified based on need of local LAN.



DHCP servers centrally manage IP addresses and related information and provide it to clients automatically. This allows you to configure client network settings at a server, instead of configuring them on each client computer. So, to make it easier, checked the ‘Enable DHCP’.
On the ‘Start IP Address’ must be set to the LAN port on the same subnet. For default it will start with
On the ‘End IP Address’ the subnet must be same as the LAN port set and the last IP address is
For the ‘Lease time’ the default is 1440 minutes.
(source:, C60T User’s Manual.pdf)



The ‘IP & MAC Binding’ is enable to allow the DHCP server to assign IP addresses according to the added IP & MAC. For the ‘Address binded’ is allowed to control of users modify IP or MAC address strictly.
(source: from C60T User’s Manual.pdf)

The ‘IP & MAC Address Management’ contain the static IP which is when the device is assigned a static IP address, it does not change. The MAC address is a unique identifier assigned to network interfaces for communications on the physical network segment. The username is the name for the device.
(source: ,



The DHCP-Table display all IP address allocated by current DHCP server. So, there are two clients which is DELL-GX280 and android-2f2fbee connected to the C60T.