Sierra Wireless AceView User's Guide Page 16

  • Download
  • Add to my manuals
  • Print
  • Page
    / 47
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 15
AirLink GX440 for Verizon LTE User Guide
16 2140712
Security
CDMA data transmissions are highly secure. Originally developed based upon
the “spread spectrum” pioneered by the US Department of Defense, security in
CDMA technologies is obtained by spreading the digital information contained in
a particular signal of interest over multiple coded paths, and over a much greater
bandwidth than the original signal.
Connection Methods
You can connect the AirLink GX440 to a USB (micro A/B), an Ethernet (RJ45), or
a serial (RS232) port on a computer. When connected to a USB or Ethernet port,
the AirLink GX440 behaves like a network card.
USB
The AirLink GX440 is equipped with a USB port which increases the methods by
which you can send and receive data. The USB port can be set to work as either
a virtual Ethernet port or a virtual serial port. A driver installation is required to
use the USB port in either mode.
It is recommended that you use a USB 2.0 cable with your AirLink GX440 and
connect directly to your computer for best throughput.
Virtual Serial Port
The AirLink GX440 supports one virtual serial port over USB. This VSP can be
used, for example, to send AT commands or to run many serial based
applications such as HyperTerminal
!
.
Networking
IPsec
The IP protocol that drives the Internet is inherently insecure. Internet Protocol
Security (IPsec), which is a standards-based protocol, secures communications
of IP packets over public networks.
IPSec is a common network layer security control and is used to create a virtual
private network (VPN).
The advantages of the IPsec feature includes:
Data Protection: Data Content Confidentiality allows users to protect their
data from any unauthorized view, because the data is encrypted (encryption
algorithms are used).
Access Control: Access Control implies a security service that prevents
unauthorized use of a Security Gateway, a network behind a gateway or
bandwidth on that network.
Page view 15
1 2 ... 11 12 13 14 15 16 17 18 19 20 21 ... 46 47

Comments to this Manuals

No comments