For enterprises and service providers that use Multi-access
Edge Computing (MEC), 5G Multi-access Edge Computing Security not
only provides security at the subscriber, equipment, and network
slice level, but also at the protocol level through stateful inspection
for Packet Forwarding Control Protocol (PFCP) traffic in 5G networks.
This level of security protects and secures devices and users that
connect to MEC, as well as applications hosted on MEC, from attacks
such as Denial of Service (DoS) and spoofing, as well as other potential threats
such as vulnerabilities, malware, and viruses. 5G Multi-access Edge Computing
Security delivers granular visibility and control, as well as context-based
visibility into threats.
In the following 5G MEC deployment scenario, the User Plane Function
(UPF) is located on the MEC in the service provider’s edge location
or on the public cloud edge and the 5G Core is located remotely
in a central core site or the public cloud. To enforce security
policy for user and control traffic, the firewall must be positioned
on the 5G interfaces, including the User Plane (N3) and the Control
Plane (N4).
For complete subscriber-level
and equipment-level visibility and security policy control for network
traffic threats, enable GTP Security.
The
second firewall in the diagram is positioned on the perimeter (the
N6 interface connected to the internet and the enterprise IT datacenter).
The following platforms support 5G Multi-access Edge Computing
Security: