What a time to be alive: Cisco now offering 5G routers to ride along in cars

Switchzilla adds 5G options to edge routers and gateways, bets you'd rather buy its kit than run multiple networks


Cisco has announced industrial routers and internet gateways with baked in 5G as it tries to extend the enterprise network and SD-WAN to the edge.

Three new modular routers run Cisco IOS XE and have built-in edge compute capabilities.

The Catalyst IR1800 Rugged Series is for mobile and remote use cases, like the tricked out vehicles used by first responders or out on oil and gas pipelines. The shock and vibration resistant devices offer dead reckoning GPS, LTE, private LTE, 5G, Wi-Fi, CBRS, SSD, and advanced global navigation satellite system. FirstNet certification is in progress.

The IR1800 series of heavy duty routers offer a slot for one or more cellular modems, plus PoE/PoE+, ADR GNSS slot, SSD slot, four digital I/O ports and one RS232/485 combo port.

Cisco Catalyst IR8100 Heavy Duty Series Routers

Catalyst IR8100 Heavy Duty Series, Click to enlarge

The two models in the Catalyst IR8100 Heavy Duty Series are modular, made for outdoors and operates under extreme temperatures. The IP67-rated devices are undeterred by dust or water and include public and private LTE, 5G, Wi-SUN, and promise easy upgrades thanks to replaceable internals.

Cisco Catalyst IR8300 Rugged Series Router

Catalyst IR8300 Rugged Series Router, Click to enlarge

The Catalyst IR8300 Rugged Series Router is designed for industrial environments with loads of in-house security products: Cisco TrustSec, Unified Threat Defense, and Cisco® Cyber Vision. The tech company is boasting that the IR8300 is their first product to have both Cisco QuantumFlow and Unified Access Data Plane Technologies. It’s also equipped with Cisco Edge Intelligence, 5G, and SD-WAN.

The new IOT Gateway series is for use indoor and outdoor and comes with an Cisco’s own IoT Operations Dashboard.

Cisco's play here is providing devices that use its familiar software, but capable of connecting over 5G. A reminder: 5G is designed to perform better in odd places than predecessor standards. Cisco is therefore making sure its networks can reach anywhere 5G can go, which helps it to stake a claim on the edge by showing customers they don't need to build special purpose networks that create complexity.

“As organizations accelerate digitization, they need a way to simplify management and security across the network and edge devices,” says Cisco's announcement of the new range, which is already on sale. ®

Narrower topics


Other stories you might like

  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading
  • UK government having hard time complying with its own IR35 tax rules
    This shouldn't come as much of a surprise if you've been reading the headlines at all

    Government departments are guilty of high levels of non-compliance with the UK's off-payroll tax regime, according to a report by MPs.

    Difficulties meeting the IR35 rules, which apply to many IT contractors, in central government reflect poor implementation by Her Majesty's Revenue & Customs (HMRC) and other government bodies, the Public Accounts Committee (PAC) said.

    "Central government is spending hundreds of millions of pounds to cover tax owed for individuals wrongly assessed as self-employed. Government departments and agencies owed, or expected to owe, HMRC £263 million in 2020–21 due to incorrect administration of the rules," the report said.

    Continue reading
  • Internet went offline in Pakistan as protestors marched for ousted prime minister
    Two hour outage 'consistent with an intentional disruption to service' said NetBlocks

    Internet interruption-watcher NetBlocks has reported internet outages across Pakistan on Wednesday, perhaps timed to coincide with large public protests over the ousting of Prime Minister Imran Khan.

    The watchdog organisation asserted that outages started after 5:00PM and lasted for about two hours. NetBlocks referred to them as “consistent with an intentional disruption to service.”

    Continue reading
  • Suspected phishing email crime boss cuffed in Nigeria
    Interpol, cops swoop with intel from cybersecurity bods

    Interpol and cops in Africa have arrested a Nigerian man suspected of running a multi-continent cybercrime ring that specialized in phishing emails targeting businesses.

    His alleged operation was responsible for so-called business email compromise (BEC), a mix of fraud and social engineering in which staff at targeted companies are hoodwinked into, for example, wiring funds to scammers or sending out sensitive information. This can be done by sending messages that impersonate executives or suppliers, with instructions on where to send payments or data, sometimes by breaking into an employee's work email account to do so.

    The 37-year-old's detention is part of a year-long, counter-BEC initiative code-named Operation Delilah that involved international law enforcement, and started with intelligence from cybersecurity companies Group-IB, Palo Alto Networks Unit 42, and Trend Micro.

    Continue reading

Biting the hand that feeds IT © 1998–2022