Secure your 5G traffic with Security policy rules that
specify source equipment identifiers.
Detection of threats in 5G mobile networks
requires identification of compromised equipment and devices. Prevention
requires the ability to apply network security based on equipment
ID, which is a Permanent Equipment Identifier (PEI) including
International Mobile Equipment Identity (IMEI).
You can now
apply network security based on the equipment identity of any device
or equipment that is trying to access your 5G network. Security
policy rules and correlation based on 5G PEI including IMEI are
PA-7000 Series firewalls that use the PA-7000-100G-NPC-A,
the PA-7050-SMC-B or PA-7080-SMC-B card, and the PA-7000-LFC card
(the firewall must use all three cards)
PA-5200 Series firewalls
VM-700, VM-500, VM-300, and VM-100 firewalls
deciding which firewall model to purchase, consider the total number
of 3G, 4G, and 5G network identifiers (Subscriber IDs and Equipment
IDs) you need to include as external dynamic list (EDL) entries
or static entries. Each firewall model supports a number of EDL entries and static
Enable inspection of 5G HTTP/2 control
packets and content inspection of GTP-U packets; create a Mobile
Network Protection profile.
a profile by
5G Mobile security
to enable inspection of
5G HTTP/2 control packets.
Create address objects for
the IP addresses assigned to the network elements in your topology,
such as the AMF on the N11 interface, the gNB on the N3 interface,
the SMF on the N11 interface, and the UPF on the N3 interface.