| |

Multiple PLCs, Single Public IP: The Ultimate Remote Access Fix

Connecting a remote site to your centralized SCADA system is usually straightforward—until you run out of IP addresses. If you are trying to establish multiple PLCs single public IP remote access, you have likely hit a frustrating roadblock. You have a pump station with 3 different ethernet PLCs, 2 HMIs and an IP camera. But your cellular provider only gave you one 4G SIM card with one public IP address.

Is Your Remote Site Suffering from IP Exhaustion?

Check the symptoms you are experiencing during commissioning:

⚠️ Diagnosis: You are suffering from IPv4 Exhaustion at the edge. Do not buy extra modems! You need a gateway capable of advanced Port Forwarding and NAT (Network Address Translation) to multiplex your single public IP.

Do not order extra SIM cards or pay exorbitant monthly fees for multiple cellular data plans. The hardware you need to solve this is already standard in enterprise networking. In this comprehensive guide we will detail the engineering logic to map a full local subnet of industrial devices through a single WAN bottleneck using an industrial cellular NAT router.

The Nightmare of Remote Access: The Single IP Bottleneck

To understand the problem, we must look at the mathematical limitation of IPv4. Your cellular Internet Service Provider (ISP) assigns exactly one Wide Area Network (WAN) IP address to your modem. Let’s say it is 82.14.55.102.

Inside your control cabinet, you have created a Local Area Network (LAN). You assigned your Siemens S7-1200 the IP 192.168.1.10, your Allen-Bradley CompactLogix the IP 192.168.1.11, and your HMI the IP 192.168.1.12. These are private IPs; they are unroutable on the public internet. If a SCADA server in a different city tries to send a Modbus TCP request directly to 192.168.1.10, the internet backbone simply drops the packet.

Therefore, the remote SCADA server must send the request to your single public IP: 82.14.55.102. But when that packet arrives at your remote site, the basic unmanaged modem doesn’t know which internal device the packet is meant for. Does it go to the Siemens PLC? The Allen-Bradley? The HMI? Without instructions, the modem drops the packet, and your connection fails.

Why Standard VPNs Sometimes Fail When Connecting Multiple PLCs

The standard IT department response is “Just use an IPsec or OpenVPN tunnel.” A VPN is great for encrypting data but doesn’t necessarily solve the routing logic if you have overlapping subnets or if your central SCADA server is on a totally different network segment that doesn’t have the ability to add static routes.

Furthermore, if you are an OEM machine builder maintaining machines across 50 different customer factories, and every customer uses the default 192.168.1.x subnet, a standard VPN will instantly crash due to IP subnet conflicts. You cannot have 50 different devices all claiming to be 192.168.1.10 on the same VPN server. This is where Network Address Translation (NAT) becomes mandatory.

Port Forwarding vs. 1:1 NAT: Which Do You Need?

When you need to funnel multiple local devices through a restricted IP space, industrial routers offer two primary tools. Understanding the difference is critical for automation engineers.

FeaturePort Forwarding (PAT / Port Address Translation)1:1 NAT (Network Address Translation)
How it worksMaps specific Port Numbers on the Public IP to different Internal IPs.Maps an entire Virtual IP to a specific Internal IP.
IP RequirementsRequires only ONE Public IP.Requires a block of multiple Public/Virtual IPs from your ISP/VPN.
Best Use CaseRemote access over a cellular connection with a single SIM card.Integrating an OEM machine into a massive factory network without changing PLC code.

Because you only have one cellular SIM card and one public IP, 1:1 NAT is mathematically impossible for you. Your only option to achieve multiple PLCs single public IP remote access is Port Forwarding.

Quick Decision: Which mode is right for you?

  • 🔹 Standard SIM card + 1 public IP? ➔ Use Port Forwarding.
  • 🔹 Enterprise private network + IP pool? ➔ Use 1:1 NAT.
  • 🔹 Stuck behind CGNAT (Private IP)? ➔ Scroll down to Section 6 (VPN Bypass).

The Ultimate Fix: Access Multiple PLCs on a Single Public IP

Port Forwarding utilizes the transport layer (Layer 4) of the TCP/IP model. Every network request includes an IP address and a destination Port Number (like an apartment number in a building). Instead of sending SCADA requests to the default PLC port, you send them to unique, custom ports on your public IP. The router then acts as a traffic cop, translating the port and forwarding the packet to the correct internal device.

Visualizing Port Forwarding (PAT) Logic

SCADA
(Internet)
VT-LTE400 Gateway
Public IP: 82.14.55.102
PLC 1
192.168.1.10 (Port 502)
PLC 2
192.168.1.11 (Port 502)
5020
5021

The router inspects the incoming port. Port 5020 is translated and sent to PLC 1. Port 5021 is translated and sent to PLC 2. Both share the same public IP.

For example, standard Modbus TCP operates on Port 502.
In your SCADA software, you configure Node 1 to connect to 82.14.55.102 : Port 5020.
You configure Node 2 to connect to 82.14.55.102 : Port 5021.
The industrial router receives both requests, changes the port back to 502, and delivers them to the respective PLCs seamlessly.

Step-by-Step: Configuring Port Forwarding on the VT-LTE400

Consumer routers lack the robust NAT traversal logic required for industrial protocols. If you are deploying an industrial gateway like the Valtoris VT-LTE400, setting this up takes less than five minutes.

Configuring port forwarding on the VT-LTE400 to access multiple PLCs on a single public IP
Figure 1: Translating external ports to standard internal PLC ports within the VT-LTE400 interface.
  1. Access the Firewall: Log into the VT-LTE400 UI and navigate to Network > Firewall > Port Forwards.
  2. Create PLC 1 Rule: Name it PLC_1. Set the Protocol to TCP/UDP. Set External Zone to WAN (your 4G connection) and External Port to 5020.
  3. Map to Internal IP: Set Internal Zone to LAN, Internal IP Address to 192.168.1.10, and Internal Port to 502.
  4. Create PLC 2 Rule: Repeat the process. Set External Port to 5021, map it to Internal IP 192.168.1.11, and keep the Internal Port as 502.
  5. Verify PLC Gateway: Crucial step! Ensure that inside your actual PLC network configuration (via TIA Portal or Studio 5000), the Default Gateway is set to the internal LAN IP of the VT-LTE400 (e.g., 192.168.1.1). If the PLC has no gateway configured, it cannot reply to the external internet.

Troubleshooting: Overcoming the Carrier-Grade NAT (CGNAT) Trap

Many engineers execute the port forwarding steps flawlessly, yet the remote connection still fails. In cellular IoT deployments, the most common culprit is Carrier-Grade NAT (CGNAT).

Because the world has run out of IPv4 addresses, cellular carriers like AT&T, Verizon, or Vodafone often assign your SIM card a “private” IP address (typically starting with 10.x.x.x or 100.x.x.x) and share one real public IP among thousands of smartphones and modems. If your cellular IP is private, incoming requests from the internet will hit the ISP’s massive firewall and be dropped long before they ever reach your Valtoris router. Port forwarding cannot pierce a CGNAT wall.

🛠️ How to bypass CGNAT for remote PLC access:

  • Option A (Costly): Call your cellular provider and request a “Static Public IP” provisioned on a custom APN. This often incurs a hefty monthly fee.
  • Option B (Smart): Use the VPN client embedded in the VT-LTE400. Configure the router to dial out to a central OpenVPN or WireGuard server that you control. The router initiates the connection outbound, making it easy to break through the ISP’s CGNAT wall, and creating a secure, bi-directional tunnel for your SCADA traffic.

Security Warning: Securing Exposed PLC Ports

Opening ports directly to the internet is very effective but requires a lot of responsibility for cybersecurity. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), exposing native industrial protocols like Modbus TCP (502) or EtherNet/IP (44818) to the public web makes your machinery an easy target for automated botnets and ransomware like Stuxnet.

👨‍🔧

“Port forwarding without access control is leaving the front door of your factory wide open. A port-forwarding rule must always be paired with an IP Whitelist or encapsulated within a VPN tunnel.”

—— Marcus Chen, Senior Systems Integration Engineer

For the VT-LTE400, we highly recommend utilizing the Traffic Rules or Advanced Firewall settings to restrict the Source IP. Ensure that only the known, static IP address of your central SCADA server is permitted to traverse external ports 5020 and 5021. The router’s firewall will then silently drop all other unauthorized global traffic.

Frequently Asked Questions (Remote Access & NAT)

Q:
What are the default ports I need to forward for common PLCs?
For Modbus TCP (Schneider, generic), map to internal port 502 TCP. For Allen-Bradley / Rockwell (EtherNet/IP), map to 44818 TCP for messaging and 2222 UDP for implicit I/O. For Siemens S7 (Profinet/Step7), map to 102 TCP.
Q:
I configured port forwarding, but I still cannot ping the PLC remotely. Why?
Ping does not use TCP/UDP but ICMP. Standard port forwarding will only forward specific TCP/UDP ports, it does not forward ICMP pings. Also, ensure that your cellular connection is not blocked by Carrier-Grade NAT (CGNAT) and that the internal network settings of the PLC include the IP address of the router as the “Default Gateway.”
Q:
Can I use 1:1 NAT instead of Port Forwarding on a standard 4G connection?
Generally, no. 1:1 NAT requires your internet service provider to route a block or pool of multiple public IP addresses to your cellular modem. Standard IoT SIM data plans only provide a single public or private IP. Therefore, Port Forwarding (PAT) is the only mathematically viable method for multiple devices on standard cellular plans.
Q:
Is port forwarding safe for SCADA systems?
Port forwarding native, unencrypted industrial protocols over the open internet is highly insecure against cyberattacks. It should only be used if you strictly lock down the “Source IP” in your router’s firewall rules to only allow your trusted SCADA server, or ideally, encapsulated within an encrypted IPSec or WireGuard VPN envelope.

💡 Looking for a comprehensive architecture? To explore our complete distributed modular design and learn how to decouple networks for maximum resilience, please visit our PLC Remote Access Solutions.

Overcome Remote Connectivity Barriers

Don’t let IP limitations or CGNAT lock you out of your critical infrastructure. Equip your edge panels with the VT-LTE400’s advanced NAT and VPN routing engine today.

Advanced NAT Traversal • Global Connectivity • Direct Technical Support

REQUEST A QUOTE

SKU/Part No.