HG G-76354

Photo Radio Modem HG G-76354ZA 5G

Radio Modem WiFi 6 | optional 5G | Serial | Ethernet | USB


  • WLAN client for 802.11a/b/g/n/ac/ax via 2.4 + 5 GHz WLAN WiFi 6, data rate up to 2,402 MBit/s
  • Variant 5G: Worldwide 3G/4G/5G in multi-mode, date rates up to 3.3 Gbps download/900 Mbps Upload
  • Integrated OpenVPN client
  • Bridge modes for connecting LAN clients: NAT / Single Client NAT / Single Client Cloning / Level 2 Bridge / MWLC Mode
  • WPA Enterprise 802.1x PEAP LEAP TLS TTLS
  • Certificate management for the authentication via 802.1x
  • SCEP (Simple Certificate Enrollment Protocol)
  • MQTT (Message Queuing Telemetry Transport)
  • 2x Gigabit LAN interfaces
  • 1x serial interface: RS232, Serial-Client via TCP/UDP
  • 1x USB 2.0 interface, also for additional interfaces
  • 1x switching relay controllable via network (e.g. to wake up vehicles from sleep mode)
  • Voltage supply 10-60V or via PoE (LAN)
  • Robust aluminum housing with various mounting options and screwable connectors
  • Configuration via the internal web server, REST-API or with the help of the dedicated MC-Config program
Sketch: Application example Radio Modem HG G-76354ZA 5G Application example Radio Modem HG G-76354ZA 5G

The radio modem HG G-76354-A connects devices that communicate via Ethernet or serial interfaces with other networks via WLAN, and in the 5G variant also via mobile networks (see table Variant overview on the back). This includes applications with mobile vehicles such as forklifts or AGV.

The communication partners can be additional radio modems or computers that communicate via a suitable application. Furthermore, extensions are possible via the USB port, which offer additional serial or I/O interfaces, for example.


The radio modem is available in different variants. The differences are the casing and the number of available interfaces. All variants can use the firmware file and can be configured with the MC-Config program attached at the bottom of this page.

  • HG G-76354XA: Top hat rail mounting narrow side
  • HG G-76354XA 5G: Casing like XA with option 5G
  • HG G-76354YA: Top hat rail mounting long side
  • HG G-76354YA 5G: Casing like YA with option 5G
  • HG G-76354ZA: Flange casing
  • HG G-76354ZA 5G: Casing like ZA with option 5G

Security Notes

  • Firmware 3.14: All firmware versions of line 3.14 contain security relevant updates related to line 3.14, see also complete Changelog. The firmware must be kept up to date.

Release Notes for the Firmware Updates (Changelog)

Changelog 3.14i –> 3.14o

Firmware 3.14i –> 3.14k

Functional changes:
  1. The relay is now controllable via REST API and using statement sequences.
  2. Authentication of individual API/URLs: This makes it possible to secure access to specific API functions with a separate user/password without having to use the user/password for device configuration.
  3. 5G/LTE: Firmware update support for RM520N-GL
  • Segfault error in the MQTT function fixed (TLS-Write).
  • Segfault error in the timer module fixed (Blacklist + ConfigChange)
Firmware 3.14k --> 3.14m

Security updates:
  • Change of Linux kernel version from 6.1.23 → 6.1.33
Functional changes:
  1. wpa_supplicant updated to 2.11-dev (Git Rev. 95C3f0d1)
  2. Improvement in relay control via REST API: Erroneous sequences and relay commands are now rejected with HTTP Error 400.
  3. Output a warning in the debug log if all matching SSIDs are evaluated with 0 during the score calculation. This indicates that one of the crypto settings does not fit.
  4. Warning in debug log after startup if certificates (client and CA certificates) are loaded that are about to expire or have already expired.
Firmware 3.14m --> 3.14n

Security updates:
  • Change Linux kernel version from 6.1.33 → 6.1.36
Functional changes:
  1. Web server security:
    - Preferences for the TLS session handshake algorithms can now be set.
    - New option Send HSTS header
  2. EAP: EAP-TTLS can now also be performed without certificates. (similar to EAP-PEAP)
  3. Wireless: wpa_supplicant now with 802.11v support.
  4. Wireless: now shows in the AP list whether an access point supports 802.11v.
  5. Serial: The serial interface can now also communicate via TLS. Certificates for authentication can also be installed for this purpose
  6. Bridge/NAT: now with warnings for conflicts of local services of the device with NAT rules defined by setup.
  7. MQTT Bridge: Now also with local web socket port (default 8080)
  • Serial: Approx. 1.5KB of memory were not released on each TCP reconnect.
  • WLAN dump: If a filter was set in LAN client cloning to record only its own traffic, then the correct MAC was not taken to define the filter.
Firmware 3.14n --> 3.14o

Security updates:
  • Change Linux kernel version from 6.1.36 → 6.1.44
Functional changes:
  1. SYN flood detection increased to 40 SYN burst. On average 5 SYN / second is still ok.
  2. SNMP: Addition of status values from the info of /proc/net/dev
  3. Improvement for IPv6 bridging
  4. SCEP: If the CA Identity parameter for the URL contains illegal characters the value is URL-Encoded
  5. Display of additional warnings in MCConfig (from Vers.: 2_0_3_9) in the column "Status":
    - For certificates that are about to expire or have already expired.
    - For incorrectly configured ping test.
  6. After a "reset to defaults" of the config via the web interface or also when uploading a configuration, the view automatically changes to the configuration web page after 2 seconds.
  1. the AuxIn is now processed correctly
  2. The USB voltage is now switched on earlier, so that an inserted USB memory can be detected early. Thus the Config-Stick detection works now also reliably.
  3. Correction when uploading a configuration via the web interface: The passwords are now processed correctly

Open Source Compliance Information

The firmware of the radio modems described on this page includes software code developed by third parties under the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL"). More information about the terms of use and how to access the GPL code and LGPL code used in this product can be found on our Open Source page.