7
Securing Next Generation Mobile Networks Fortinet Security Solutions for LTE Infrastructure A FORTINET WHITE PAPER

Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

  • Upload
    vothuy

  • View
    223

  • Download
    6

Embed Size (px)

Citation preview

Page 1: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

Securing Next Generation Mobile NetworksFortinet Security Solutions for LTE Infrastructure

A FORTINET WHITE PAPER

Page 2: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

Introduction

The mobile network has evolved radically from its original purpose of delivering portable telephony services. Today’s next generation mobile network is all-IP based and delivers significant amount of data. New mobile networks are based on Long Term Evolution (LTE) standard for transmitting traffic to deliver high speed and more variety of services with consolidated infrastructure.

The walled telecommunication networks are disappearing. The transition to data-centric, fully IP-based networks means that operators can expect more threats and security breaches on their infrastructure as they are more deeply connected to other networks. An IP network opens the door for intruders, hackers and other malicious traffic generators.

While it’s clear that threats may come from other networks such as the Internet or other peer networks, it is also highly likely to originate from local subscribers who are now equipped with powerful and sophisticated devices. Thus, it is important that operators are able to completely identify where protection is necessary and implement much-needed security accordingly.

Fortinet FortiGate's robust and flexible security gateways are ideal for protecting operators’ networks against these new threats since it offers comprehensive LTE protocol and Interoperability support, outstanding cost/performance with its unique ASIC based hardware acceleration, and its proven security capabilities.

Page 3: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

Security Threats To An LTE Infrastructure

Offensive activities are often driven by attackers hoping to gain economic returns, hacktivists with political or social agendas, subscribers trying to evade charges for particular services or simply compromised or malware infected user devices. It may also be possible that disgruntled employees conduct these ill-intended attempts.

The entry points of an attack may be from the Internet, peer networks, local subscribers or within the networkinfrastructure itself.

Broadly, threats to a mobile carrier operator can be classified as:

n Violation of Confidentiality: Malicious attempts to gain access to sensitive data such as eavesdroppingon user traffic.

n Violation of Integrity: Unauthorized manipulation of data..

n Denial of Service / Reduced Availability: Disturbing or abusing network infrastructure that leads to reduced or unavailability of services, usually by efforts to exhaust resources.

n Fraud/Unauthorized access to services: Malicious activities aiming to gain access to restricted services.

The common threats and their attack premises are illustrated below.

Page 4: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

LTE Security Requirements, Considerations & Components

In general, operators could organize their security implementation for their LTE network within 3 key areas:

1. LTE BackhaulIP-based transport, unlike its predecessors, is more open and therefore more vulnerable to malicious activities.Moreover, LTE architecture eliminates RNC, resulting in a direct transport path to the core (that is the Evolved Packet Core). Hence, encryption measures are necessary to protect the data across such an unsecured environment.

2. Evolved Packet Core (EPC)The core network of the LTE system, the EPC hosts critical elements such as the Serving Gateway (Serving GW), the PDN Gateway (PDN GW), the MME and the HSS. The communication protocols between these components are often GTP and SCTP. In the LTE network, open IP-based protocol – Diameter is adopted for signaling. The EPC interacts with the backhaul, as well as external networks such as the Internet and peer networks that are essentially untrusted entities. Therefore, protection is required at these perimeters. Further security should also be considered within the EPC itself by having security gateways between the critical components to detect and block invalid communications.

3. The Internet GatewayLike any IP networks, the door to the Internet must be heavily fortified to prevent attacks from the outside. Operators may also use tools like topology hiding to limit visibility of the infrastructure, thereby restricting entry from the Internet. The security gateway should also be robust to handle malicious surge of traffic that is aimed at overloading the infrastructure. Furthermore, it is also useful to note that when coupled with user identity awareness capabilities, carriers can also leverage value-added services by offering differentiated Internet services.

Page 5: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

IPSEC is an important component to protect data transmitted within the backhaul network of an LTE infrastructure, as it helps to establish secure tunneling between eNBs and the various components on the core network. The open standard IPSEC protocol suite helps to protect against threats like theft of user credentials and unauthorized control of network devices. An IPSEC gateway should be deployed either at centralized locations or in distributed fashion.

Network devices and servers in an EPC (Evolved Packet Core) are critical assets that must be protected from attacks or unauthorized access. Network access to any component should be limited as required using firewalls that are able to operate on necessary protocols. Network transactions should be logged and audited. Content inspection should be implemented to prevent malicious activities that can occur at the application layer level, such as unexpected commands or invalid communications.

Finally, powerful security gateways should be deployed to protect the carrier network against threats from the Internet. These devices may also serve as NAT routers between user equipment and the available public IPs. These security devices also provide the capability to enforce content-based policies, enabling operators to provide a range of value-added Internet services.

Page 6: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

The Fortinet LTE Security Solution

Fortinet, with significant deployment on 7 of the Top 10 global telecommunication operators, offers proven security solution for LTE infrastructure. The FortiGate and FortiCarrier product families provide comprehensive networking capabilities such as routing protocol support in a range of high availability deployment options. They are also able to interoperate with other network and management services to support a variety of input and output facilities.

The FortiGate runs on the FortiOS 5 Security Operating System, which provides flexible yet comprehensivesecurity components - from basic firewalling to advanced content scanning and virtualization. The FortiCarrier provides all the advanced security capabilities of the FortiGate, with the advantage of integrated Carrier-specificfeatures, such as GTP and Diameter inspection.

The FortiGate and FortiCarrier employ unique hardware accelerators to provide an outstanding cost/performanceratio to operators. Both families offer high capacity security solutions.

The FortiCarrier 3000 and 5000 series are most suited as the security gateway for both IPSEC termination and protection critical elements in the EPC. Both product families support firewalling, offer rate-limiting capabilities and content inspection on both SCTP and GTP communications. They also enable the validation of Diameter signaling traffic, and can support hundreds of thousands of IPSEC terminations with various authentication options.

The FortiGate 3000 and 5000 series are the preferred Gi Firewalls of the world's major operators. They offer significant performance superiority as well as ease of use and maintenance. The FortiOS 5 Operating System provides granular visibility over network sessions in both real-time and historically which enables carriers to quickly understand and pinpoint abnormal traffic behavior or to aid in investigations.

Page 7: Securing Next Generation Mobile Networks - Blue …bluekarmasecurity.net/wp-content/uploads/2014/10/...whitepaper.pdfSecuring Next Generation Mobile Networks ... Moreover, LTE architecture

Fortinet Security Solutions for LTE Infrastructure

AMERICAS HEADQUARTERS

1090 Kifer RoadSunnyvale, CA 94086United StatesTel +1.408.235.7700Fax +1.408.235.7737www.fortinet.com/sales

EMEA HEADQUARTERS

120 rue Albert CaquotSophia AntipolisFrance 06560Tel +33.4.8987.0510Fax +33.4.8987.0501

APAC HEADQUARTERS

300 Beach Road 20-01The ConcourseSingapore 199555Tel +65.6513.3734Fax +65.6295.0015

Copyright© 2013 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, and FortiGuard®, are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance metrics contained herin were attained in internal lab tests under ideal conditions, and performance may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet's General Counsel, with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet's internal lab tests. Fortinet disclaims in full any guarantees. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

www.fortinet.com

About Fortinet

Fortinet (NASDAQ: FTNT) protects networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content.