: 5G Multi-access Edge Computing Security
Focus
Focus

5G Multi-access Edge Computing Security

Table of Contents
End-of-Life (EoL)

5G Multi-access Edge Computing Security

For enterprises and service providers that use Multi-access Edge Computing (MEC), 5G Multi-access Edge Computing Security not only provides security at the subscriber, equipment, and network slice level, but also at the protocol level through stateful inspection for Packet Forwarding Control Protocol (PFCP) traffic in 5G networks. This level of security protects and secures devices and users that connect to MEC, as well as applications hosted on MEC, from attacks such as Denial of Service (DoS) and spoofing, as well as other potential threats such as vulnerabilities, malware, and viruses. 5G Multi-access Edge Computing Security delivers granular visibility and control, as well as context-based visibility into threats.
In the following 5G MEC deployment scenario, the User Plane Function (UPF) is located on the MEC in the service provider’s edge location or on the public cloud edge and the 5G Core is located remotely in a central core site or the public cloud. To enforce security policy for user and control traffic, the firewall must be positioned on the 5G interfaces, including the User Plane (N3) and the Control Plane (N4).
For complete subscriber-level and equipment-level visibility and security policy control for network traffic threats, enable GTP Security.
The second firewall in the diagram is positioned on the perimeter (the N6 interface connected to the internet and the enterprise IT datacenter).
The following platforms support 5G Multi-access Edge Computing Security:
  • PA-7000b Series
  • PA-5400 Series
  • PA-5200 Series
  • PA-3440 and PA-3430 firewalls
  • VM-100 Series
  • VM-300 Series
  • VM-500 Series
  • VM-700 Series
  • CN-Series on Openshift
Select one of the following topics to learn more about 5G Multi-access Edge Computing Security: