EW50 Industrial LTE Cellular Gateway
161
5.1.1 IPSec
Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by
authenticating and encrypting each IP packet of a communication session. IPsec includes protocols for
establishing mutual authentication between agents at the beginning of the session and negotiation of
cryptographic keys to be used during the session.
An IPsec VPN tunnel is established between IPsec client and server. Sometimes, we call the IPsec VPN client
the initiator and the IPsec VPN server the responder. This gateway can be configured as different roles and
establish a number of tunnels with various remote devices. Before going to set up the VPN connections, you
may need to decide on the scenario type for the tunneling.
IPsec Tunnel Scenario
s
To build an IPsec tunnel, you need to
enter the remote gateway global IP,
and optional subnet if the hosts behind
IPsec peer can access the remote site
or hosts. Under such configuration,
there are four scenarios:
Site to Site:
You need to set up remote
gateway IP and subnet of both
gateways. After the IPsec tunnel is
established,
hosts
behind
both
gateways can communicate with each
other through the tunnel.
Site to Host:
Site to Host is suitable for tunneling between clients in a subnet and an application