Intelligent Security, also known as User Equipment to IP Address Mapping or
UEIP, helps to correlate mobile user
equipment (UE) with IP addresses for security policy enforcement. By mapping the
subscriber ID and equipment ID to the IP address associated with traffic from the
user equipment (UE), Intelligent Security allows you to create security policy rules
for mobile network traffic and helps to ensure consistent application of the
security policy rules throughout all of the devices on your network. Configuring
Intelligent Security for UEIP Correlation helps you to apply subscriber and
equipment identity-based security policy in an enterprise 5G network and to provide
advanced threat prevention service for your enterprise 5G customers.
To enable even more deployment options when using Intelligent Security for your
mobile infrastructure security policy, Intelligent Security now supports the GPRS
tunneling protocol (
GTP) traffic in addition to Packet
Forwarding Control Protocol (
PFCP) and Remote Authentication Dial-In
Service (
RADIUS) traffic. When you select GTP as
the source for UEIP Correlation with Intelligent Security, you can also optionally
apply a number of additional security measures, such as protocol validity checks, as
well as gain important context through additional visibility for important
information contained in GTP session logs.
By providing a simple method to secure your mobile network traffic, whether it is for
perimeter security, RAN security, core security, or roaming security, Intelligent
Security helps you to establish a zero trust security policy for the traffic on your
5G and 4G/LTE mobile networks.