Mobile Network Protection Profile
Table of Contents
Expand all | Collapse all
-
- Intelligent Security and the UEIP Database
- Intelligent Security with PFCP for User Equipment to IP Address Correlation
- Configure Intelligent Security using PFCP for User Equipment to IP Address Correlation
- Configure Intelligent Security using RADIUS for User Equipment to IP Address Correlation
- Configure Intelligent Security using GTP for User Equipment to IP Address Correlation
Mobile Network Protection Profile
Use these fields to create a Mobile Network Protection
profile to define how the firewall inspects, validates, and filters
GTP traffic.
The Mobile Network Protection profile (ObjectsSecurity ProfilesMobile Network Protection) enables the firewall to inspect Mobile Network traffic. Based on your
deployment type, the options in the profile allow you to enable stateful inspection of
GTPv1-C, GTPv2-C, PFCP, and 5G-C, as well as enable protocol validation for these
protocols. You can also Configure Intelligent Security using PFCP for User Equipment to IP Address Correlation and enable GTP-U content inspection to scan user data
within GTP-U tunnels.
The other options allow you to filter GTP sessions based on APN, IMSI-Prefix, and RAT,
and prevent end-user IP address spoofing to protect the mobile subscribers from being
overbilled.
You must attach the Mobile Network Protection profile to a Security policy rule for a zone.
Field | Description |
---|---|
GTP Inspection GTP Inspection
applies to the following deployment types:
| |
GTP-C |
NAT
for outer GTP sessions is not supported with GTP stateful inspection. |
GTP-U |
Enabling Stateful Inspection for
GTPv1-C and/or
GTPv2-C automatically enables
GTP-U stateful inspection. Enabling
PFCP Stateful Inspection or
Intelligent Security Correlation also
enables GTP-U stateful inspection. You
can specify the following validity checks for GTP-U payloads and Block or Alert upon
a validity check failure:
You can also allow, block or alert on:
|
GTP-U (cont) | Enable GTP-U Content Inspection if
you want to inspect and apply policy to the user data payload within
a GTP-U packet. Inspecting GTP-U content allows you to correlate
IMSI and IMEI information learned from GTP-C messages with the IP
traffic encapsulated in GTP-U packets. You don’t need
a Tunnel Content Inspection policy to perform content inspection
inside GTP-U tunnels if you use a GTP Protection profile and enable GTP-U
Content Inspection. GTP-U inner sessions
do not support decryption, NAT, or policy-based forwarding (PBF). |
5G-C | For 5G, enable 5G-HTTP2 to
enable inspection of 5G HTTP/2 control packets, which can contain
subscriber IDs, equipment IDs, and network slice information. This
allows you to correlate subscriber ID (IMSI), equipment ID (IMEI),
and network slice ID information learned from HTTP/2 messages with
the IP traffic encapsulated in GTP-U packets. Enabling 5G-HTTP2 disables GTP-C for the profile and enables GTP-U. |
PFCP | For Packet Forwarding Control Protocol (PFCP), enable Stateful Inspection
to inspect PFCP traffic. When you enable stateful inspection for
PFCP traffic, the firewall inspects the traffic between the 5G core
and the UPF to help prevent attacks such as Denial of Service (DOS)
or spoofing. The UPF can be on the MEC site and the 5G Core can be
in a central core site or the public cloud. If you enable
this option, Actions for GTP-U End User IP Address Spoofing are
not available. You can specify the following state checks:
You can then specify the Action (Allow, Alert,
or Block) you want the firewall to take when
the check is unsuccessful. You can also select if you want
the firewall to create a log at the beginning or ending of the PFCP
associations or sessions. |
Correlation Correlation options
apply for deployments using Intelligent Security Correlation with
GTP, PFCP or
RADIUS. | |
UEIP Correlation | Enables correlation between the subscriber ID and equipment ID to user equipment (UE) IP-based
traffic for GTP-U content inspection. |
Mode |
|
User Plane with GTP-U encapsulation | Based on your deployment, select whether you want to use
User Plane GTP-U Encapsulation:
|
Source |
Select the source that you want the firewall to use to correlate the
control plane and user plane information for enforcement of
subscriber-level and equipment-level Security policy. The firewall
inspects traffic for the source type you select to process and
extracts 5G/4G identity information, such as subscriber ID (SUPI or
IMSI), equipment ID (PEI or IMEI), and the IP address of the user
equipment (UE), to correlate with 5G/4G subscriber IP traffic.
|
Log at UEIP Start | Log UEIP correlation events when the firewall allocates an IP address to the UE. |
Log at UEIP End | Log UEIP correlation events when the firewall releases
the allocated IP address. |
Filtering Options Filtering options
apply to 4G and 3G deployments with GTP Stateful
Inspection. | |
RAT Filtering | By default all Radio Access Technologies
(RAT) are allowed. GTP-C Create-PDP-Request and Create-Session-Request
messages are filtered or allowed based on the RAT filter. You can
specify whether to allow, block or alert on
the following Remote Access Technologies (RAT) that the user equipment
uses to access the mobile core network:
The following RATs are available when enabling
5G-HTTP2:
|
IMSI Filtering | IMSI (International Mobile Subscriber Identity) is a unique identification associated with a
subscriber in GSM, UMTS, and LTE networks that is provisioned in the
Subscriber Identity Module (SIM) card. An IMSI is usually presented as a 15-digit
number (8 bytes), but can be shorter. IMSI has three parts:
The IMSI
Prefix combines the MCC and MNC and allows you to allow, block,
or alert on GTP traffic from a specific PLMN.
By default all IMSI are allowed. You can either manually enter
or import a csv file with IMSI or IMSI prefixes into the firewall.
The IMSI can include a wildcard, for example, 310* or 240011*. The firewall
supports a maximum of 5,000 IMSI or IMSI prefixes. |
APN Filtering | The Access Point Name (APN) is a reference
to a GGSN/ PGW that a user equipment requires to connect to the
internet. The APN is composed of two parts:
By
default all APNs are allowed. The APN filter allows you to allow, block,
or alert on GTP traffic based on the APN
value. GTP-C Create-PDP-Request and Create-Session-Request messages
are filtered or allowed based on the rules defined for APN filtering. You
can manually add or import an APN filtering list into the firewall.
The value for the APN must include the network ID or the domain
name of the network (for example, example.com) and, optionally,
the operator ID. For APN filtering, the wildcard (*) allows
you to match for all APN. A combination of * and other characters
is not supported for wildcards. For example, internet.mnc* will
be treated as regular APN and will not filter all entries that start
with internet.mnc. The firewall supports a maximum of 1,000
APN filters. |
GTP Tunnel Limit GTP Tunnel Limit
settings apply to 4G and 3G deployments with GTP Stateful
Inspection. | |
Max Concurrent Tunnels Allowed per Destination | Allows you to limit the maximum number of
GTP-U tunnels to a destination IP address, for example, to the GGSN.
Range: 0 to 100,000,000 tunnels. |
Alert at Max Concurrent Tunnels per Destination | Specify the threshold at which the firewall
triggers an alert when the maximum number of GTP-U tunnels to a
destination has been established. A GTP log message of high severity
is generated when the configured tunnel limit is reached. |
Logging Frequency | The number of events that the firewall counts before
it generates a log when the configured GTP tunnel limits are exceeded.
This setting allows you to reduce the volume of messages logged.
Default: 100; range: 1 to 100,000,000 |
Overbilling Protection | Select the virtual system that serves as
the Gi/ SGi firewall on your firewall. The Gi/ SGi firewall inspects
the mobile subscriber IP traffic traversing the Gi/ SGi interface
from the PGW/ GGSN to the external PDN (packet data network) such
as the internet and secures internet access for mobile subscribers. Overbilling
can occur when a GGSN assigns a previously used IP address from
the End User IP address pool to a mobile subscriber. When a malicious
server on the internet continues to send packets to this IP address as
it did not close the session initiated for the previous subscriber
and the session is still open on the Gi Firewall. To disallow data
from being delivered, whenever a GTP tunnel is deleted (detected
by delete-PDP or delete-session message) or timed-out, the firewall enabled
for overbilling protection notifies the Gi/ SGi firewall to delete
all the sessions that belong to the subscriber from the session
table. GTP Security and SGi/ Gi firewall should be configured on
the same physical firewall, but can be in different virtual systems. In
order to delete sessions based on GTP-C events, the firewall needs
to have all the relevant session information and this is possible
only when you manage traffic from the SGi + S11 or S5 interfaces
for GTPv2 and Gi + Gn interfaces for GTPv1 in the mobile core network. |
Other Log Settings By default the firewall does not log
allowed messages for mobile network events. You should be selective
if you enable logging of Allowed Messages for
troubleshooting when needed, because such logging will generate a
high volume of logs. In addition to logging Allowed
Messages, this tab also allows you to selectively
enable logging of user location information. | |
GTPv1-C Allowed Messages | Allows you to selectively enable logging
of allowed GTPv1-C messages, if you have enabled Stateful
Inspection for GTPv1-C. These messages generate logs
to help you troubleshoot issues as needed. By default, the firewall does
not log allowed messages. The logging options for allowed GTPv1-C
messages are:
|
Log User Location | Allows you to include the user location
information (as area code and Cell ID) in GTP logs. |
Packet Capture | Enables you to capture events. |
GTPv2-C Allowed Messages | Allows you to selectively enable logging
of the allowed GTPv2-C messages, if you have enabled Stateful
Inspection for GTPv2-C. These messages generate logs
to help you troubleshoot issues as needed. By default, the firewall does
not log allowed messages. The logging options for allowed GTPv2-C
messages are:
|
GTP-U Allowed Messages | Allows you to selectively enable logging
of the allowed GTP-U messages, if you have enabled Stateful
Inspection for GTPv2-C and/or GTPv1-C. These messages
generate logs to help you troubleshoot issues as needed. The
logging options for allowed GTP-U messages are:
|
G-PDU Packets Logged per New GTP-U Tunnel | Enable this option to verify that the firewall
is inspecting GTP-U PDUs. The firewall generates a log for the specified
number of G-PDU packets in each new GTP-U tunnel. Range is 1 to
10; default is 1. |
Packet Capture | Enable this log setting to capture a GTP packet that
is any of the following types of GTP event:
|
5G-C Allowed Messages | Select N11 to selectively enable
logging of allowed N11 messages. N11 messages help you with troubleshooting
and provide deeper visibility into the HTTP/2 messages exchanged
over an N11 interface for different procedures. This field is available
only if you enabled 5G-HTTP2 on the 5G-C tab
in the Mobile Network Protection profile. |
PFCP Allowed Messages | Allows you to selectively enable logging
of the allowed PFCP messages if you enabled stateful inspection for
PFCP. These messages generate logs to help you troubleshoot issues
as needed. The logging options for allowed PFCP messages are:
|