User guide
Raven XT
6 20070914
Networking
IPSec
The IP protocol that drives the Internet is inherently insecure. Internet Protocol 
Security (IPSec), which is a standards-based protocol, secures communications 
of IP packets over public networks. 
IPSec is a common network layer security control and is used to create a virtual 
private network (VPN). 
The advantages of the IPSec feature includes:
• Data Protection: Data Content Confidentiality allows users to protect their 
data from any unauthorized view, because the data is encrypted (encryption 
algorithms are used).
• Access Control: Access Control implies a security service that prevents 
unauthorized use of a Security Gateway, a network behind a gateway or 
bandwidth on that network.
• Data Origin Authentication: Data Origin Authentication verifies the actual 
sender, thus eliminating the possibility of forging the actual sender’s identifi-
cation by a third-party.
• Data Integrity: Data Integrity Authentication allows both ends of the communi-
cation channel to confirm that the original data sent has been received as 
transmitted, without being tampered with in transit. This is achieved by using 
authentication algorithms and their outputs.
The IPSec architecture model includes the Sierra Wireless AirLink gateway as a 
remote gateway at one end communicating, through a VPN tunnel, with a VPN 
gateway at the other end. The remote gateway is connected to a Remote network 
and the VPN is connected to the Local network. The communication of data is 
secure through the IPSec protocols.
Figure 1-5: IPSec Architecture










