: Configure 4G Equipment ID Security
Focus
Focus

Configure 4G Equipment ID Security

Table of Contents

Configure 4G Equipment ID Security

Configure 4G equipment ID security.
Configure network security based on the equipment identity of any device or equipment that is trying to access your 4G network.
Before you begin configuring 4G Equipment ID Security, gather the IP addresses of the following devices in your topology so that you can use them as source and destination addresses in Security policy rules controlling traffic to and from these devices:
  • eNodeB (eNB)
  • Mobility Management Entity (MME)
  • Serving Gateway (SGW)
  • Packet Gateway (PGW)
  1. Enable GTP Security.
    1. Select
      Device
      Setup
      Management
      General Settings
      . Select
      GTP Security
      .
    2. Click
      OK
      .
    3. Commit
      the change.
    4. Select
      Device
      Setup
      Operations
      and
      Reboot Device
      .
  2. Enable inspection of 4G GTPv2-C control packets and content inspection of GTP-U packets; create a Mobile Network Protection profile.
    1. Select
      Objects
      Security Profiles
      Mobile Network Protection
      .
    2. Add
      a profile by
      Name
      , for example, 4G Mobile security.
    3. Enter a
      Description
      .
    4. On the
      GTP Inspection
      tab, select
      GTP-C
      .
    5. Enable
      GTPv2-C Stateful Inspection
      to enable inspection of GTPv2 control packets.
    6. Select
      GTP-U
      and enable
      GTP-U Content Inspection
      to correlate context from 4G GTPv2-C control packets (Subscriber IDs and Equipment IDs) to IP user traffic inside a GTP-U tunnel.
    7. Select
      Filtering Options
      and
      RAT Filtering
      ; for example, you can allow
      UTRAN
      ,
      GERAN
      ,
      HSPA EVOLUTION
      ,
      EUTRAN
      ,
      EUTRAN-NB-IOT
      , and
      LTE-M
      and block other RATs.
    8. (
      Optional
      ) Select
      Other Log Settings
      and
      Log User Location
      .
    9. (
      Optional
      ) To troubleshoot, select
      Other Log Settings
      and select GTPv2-C Allowed Messages for
      Tunnel Management
      ,
      Path Management
      , and
      Others
      . You can also enable GTP-U Allowed Messages for
      Tunnel Management
      ,
      Path Management
      , and
      G-PDU
      .
    10. Click
      OK
      .
  3. Create address objects for the IP addresses assigned to the network elements in your topology, such as in deployment option 1: the MME on the S11 interface, the eNB on the S1-U interface, and the SGW on the S1-U and S11 interface; or deployment option 2: the SGW on the S5/S8 interface and PGW on the S5/S8 interface.
  4. (
    Optional
    ) Create an External Dynamic List (EDL) of Type
    Equipment Identity List
    ; the
    Source
    of the list provides access to a server that provides identifiers of devices connected to the 4G network, for which you want to allow traffic.
  5. Create a Security policy rule that applies your Mobile Network Protection profile to application traffic.
    1. Select
      Policies
      Security
      and
      Add
      a Security policy rule by
      Name
      .
    2. Select
      Source
      tab and
      Add
      a
      Source Zone
      or select
      Any
      .
    3. For
      Source Address
      ,
      Add
      the address objects for the 4G network elements that you want to allow.
    4. For
      Destination
      ,
      Add
      the
      Destination Address
      address objects for the 4G network elements that you want to allow.
    5. Add
      the
      Applications
      to allow, such
      gtp-u
      for user plane and
      gtpv2-c
      for control plane traffic.
    6. On the
      Actions
      tab, select the
      Action
      , such as
      Allow
      .
    7. Select the
      Mobile Network Protection
      profile you created.
    8. Select Log Settings, such as
      Log at Session Start
      and
      Log at Session End
      .
    9. Click
      OK
      .
  6. Create another Security policy rule based on Equipment ID.
    1. Select
      Policies
      Security
      and
      Add
      a Security policy rule by
      Name
      , for example, Equipment ID Security.
    2. Select
      Source
      tab and
      Add
      a
      Source Zone
      or select
      Any
      .
    3. Add
      one or more
      Source Equipment
      IDs in any of the following formats (if you configured an EDL, specify that EDL in this step):
      • IMEI (15 to 16 digits)
      • IMEI prefix of eight digits for Type Allocation Code (TAC)
      • External dynamic list (EDL) that specifies IMEIs
    4. (
      Optional
      ) You can add
      Source Subscriber
      identities to this Security policy rule to make the rule more restrictive.
    5. Specify
      Destination Zone
      ,
      Destination Address
      , and
      Destination Device
      as
      Any
      .
    6. Add
      the
      Applications
      to allow, for example,
      ssh
      ,
      ssl
      ,
      radmin
      , and
      telnet
      .
    7. On the
      Actions
      tab, select the
      Action
      , such as
      Allow
      .
    8. Select profiles you want to apply, such as
      Antivirus
      ,
      Vulnerability Protection
      , and
      Anti-Spyware
      .
    9. Select Log Settings, such as
      Log at Session Start
      and
      Log at Session End
      .
    10. Click
      OK
      .
  7. Commit
    .

Recommended For You