Sierra Wireless AirLink Users: Plan To Mitigate GPS Rollover Impact

Jesse Rothschild M2M World News, Sierra Wireless News

Action is required for users of Sierra Wireless gateways who have GPS or Location Services enabled on their gateways and who do not have the most current firmware running on their gateways. (Note: This issue could affect you even if you do not have a GPS antenna connected.)

  • ISSUE IMPACT: Your Sierra Wireless gateways will no longer be able to be remotely managed; all gateway hosted certificate-based communication will stop working; and Location Services reporting will be inaccurate.
  • ISSUE CATALYST: GPS Rollover, which will impact Sierra Wireless gateways on November 3rd 2019.
    • RV50 (1102555)
    • GX450
    • LS300/GX400
    • GX440
  • NOT IMPACTED: RV50X ( 1103052), MG90, MP70, ES440, ES450, LX60, LX40
  • ISSUE MITIGATION: Mitigation can be achieved by updating the firmware to a current ALEOS firmware on the gateway. Mitigation can also be achieved by disabling the GPS or Location Services on the gateway or enabling a functional System Network Time Protocol (SNTP) time server. These actions can be achieved by using AceManager, ALMS or AM/AMM.  Instructions for applying a firmware update via AceManager can be viewed here: The firmware version that must be successfully applied to the Sierra Wireless Gateway to mitigate the issue must be at or above the following ALEOS version:  
    • RV50 (1102555)–ALEOS 4.12.0
    • GX450–ALEOS 4.9.4
    • LS300/GX400—ALEOS 4.4.8 (In addition, for 3G CDMA devices, GPS must be disabled)
    • GX440—ALEOS 4.4.8 (In addition, GX440s settings should be set to “LTE Only Mode”)
  • ISSUE SUMMARY: GPS rollover is a worldwide event that impacts all GPS devices. It impacts the system time that is reported on the Sierra Wireless gateways if GPS or Location Services are enabled. If not enabled, the gateway pulls system time from other available resources. Any application that queries the Transport Layer Security (TLS) Digital Certificate on a gateway that shows an incorrect system time will fail the security handshake with the Sierra Wireless gateway. In addition to the reporting accuracy of all Location Services, this will impact the performance of any applications that require a security handshake. Applications that require a security handshake include all Sierra Wireless device health management systems and other applications including:
    • Sierra Wireless AceManager
    • Sierra WirelessALMS
    • Sierra Wireless AM/AMM
    •  All gateway hosted certificate-based applications which can include applications like the following examples: certain VPN tunnel methods, event-based email communications, LDAP authentication, remote logging

Additional information is available within the original Sierra Wireless Product Bulletin on this matter that can be read here:

Share Article: