5G Multi-access Edge Computing Security
5G Multi-access Edge Computing Security provides granular visibility and control for Packet Forwarding Control Protocol (PFCP) traffic by extracting information (such as subscriber ID or equipment ID) at the mobile edge, so you can apply security policy by subscriber, by equipment, or by network slice. It provides security at the protocol level through stateful inspection for PFCP traffic on 4G/LTE and 5G networks, in addition to reduced latency and higher bandwidth.
By providing context-based visibility into threats, 5G Multi-access Edge Computing Security protects networks from potential threats such as vulnerabilities, malware, and viruses. It secures devices and user that connect to multi-access edge computing (MEC), as well as applications hosted on MEC from attacks such as Denial of Service (DoS) and spoofing.
The following platforms support 5G Multi-Edge Security:
- PA-5200 Series
- VM-300 Series
- VM-500 Series
- VM-700 Series
- CN-Series on Openshift
The following log events have been added for 5G Multi-access Edge Computing Security:
5G Multi-Edge Security Log Events
PFCP session message not matching existing PFCP association
PFCP association message sequence number mismatch
PFCP session message sequence number mismatch
PFCP association message is out of order
PFCP session message is out of order
PFCP association message
PFCP session message
PFCP association start
PFCP association end
PFCP session start
PFCP session end
- Enable GTP Security, commit your changes, and reboot.If you enable stateful inspection for PFCP traffic, the following options are not available:
- IMSI/APN/RAT filtering
- GTP-U tunnel limiting
- GTPv1-C stateful inspection
- GTPv2-C stateful inspection
- 5G-HTTP2 for 5G-C
- End User IP Address Spoofing for GTP-U
- Create a Mobile Network Protection Profile and enable 5G Multi-access Edge Computing Security.
- Select.ObjectsSecurity ProfilesMobile Network Protection
- Adda profile and enter aName, such as5G Multi-access Edge Computing Security.
- On thePFCPtab, enableStateful Inspection.
- Select which state checks you want the firewall to perform on PFCP traffic and the action you want the firewall to take if a state check is not successful.
- Determine the state checks you want to use.
- Check Association Messages—Checks for any PFCP association messages that are out of order or that have been rejected.
- Check Session Messages—Checks for any PFCP session messages that are out of order or that have been rejected.
- Check Sequence Number—Confirms that the sequence number in the PFCP matches the sequence number in the PFCP request message.
- Select the action you want the firewall to take if a state check is not successful.
- allow—Allow the traffic and do not generate a log entry in the GTP log.
- block—Block the traffic and generate a high-severity log entry in the GTP log.
- alert—(Default) Allow the traffic and generate a high-severity log entry in the GTP log.
- (Optional) Configure logging for PFCP traffic.
- Select when you want the firewall to generate a log entry.
- Log at PFCP association start
- Log at PFCP association end
- Log at PFCP session start
- Log at PFCP session end
- On theOther Log Settingstab, select the type ofPFCP Allowed Messagesyou want to include in the logs.
- Session Establishment—These PFCP messages set up the session, including establishing the GTP-U tunnel.
- Session Modification—These PFCP messages are sent if the session ID or PDR ID changes (for example, as a result of moving from a 4G to a 5G network). It includes messages such as PFCP Session Modification Request and PFCP Session Modification Response.
- Session Deletion—These PFCP messages terminate the PFCP session, including releasing associated resources.
- Create a Security policy rule that applies your Mobile Network Protection profile to PFCP traffic by selecting theMobile Network Protectionprofile you created.
- Commityour changes.
Recommended For You
Recommended videos not found.