User guide

GX400 HSPA+ User Guide
16 2140712
Connection Methods
You can connect the GX400 to a USB (micro A/B) or an Ethernet (RJ45) port on a
computer. When connected to a USB or Ethernet port, the GX400 behaves like a
network card.
USB
The GX400 is equipped with a USB port which increases the methods by which
you can send and receive data. The USB port can be set to work as either a
virtual Ethernet port or a virtual serial port. A driver installation is required to use
the USB port in either mode.
It is recommended that you use a USB 2.0 cable with your GX400 and connect
directly to your computer for best throughput.
Virtual Serial Port (VSP)
The GX400 supports one virtual serial port over USB. This VSP can be used to
send AT commands or to run such serial-based applications such as
HyperTerminal
®
.
Networking
IPsec
The IP protocol that drives the Internet is inherently insecure. Internet Protocol
Security (IPsec), which is a standards-based protocol, secures communications
of IP packets over public networks.
IPsec is a common network layer security control and is used to create a virtual
private network (VPN).
The advantages of the IPsec feature includes:
Data Protection: Data Content Confidentiality allows users to protect their
data from any unauthorized view, because the data is encrypted (encryption
algorithms are used).
Access Control: Access Control implies a security service that prevents
unauthorized use of a Security Gateway, a network behind a gateway or
bandwidth on that network.
Data Origin Authentication: Data Origin Authentication verifies the actual
sender, thus eliminating the possibility of forging the actual sender’s identifi-
cation by a third-party.
Data Integrity: Data Integrity Authentication allows both ends of the communi-
cation channel to confirm that the original data sent has been received as
transmitted, without being tampered with in transit. This is achieved by using
authentication algorithms and their outputs.