dn0976647 0900d805808e69ff
dn0976647 0900d805808e69ff
Documentation
Radio Access
Daughter Document
DN0976647
Issue 01C
The information in this document applies solely to the hardware/software product (“Product”) specified herein, and only as
specified herein.
This document is intended for use by Nokia Networks' customers (“You”) only, and it may not be used except for the
purposes defined in the agreement between You and Nokia Networks (“Agreement”) under which this document is
distributed. No part of this document may be used, copied, reproduced, modified or transmitted in any form or means without the
prior written permission of Nokia Networks. If you have not entered into an Agreement applicable to the Product, or
if that Agreement has expired or has been terminated, You may not use this document in any manner and You are obliged to
return it to Nokia Networks and destroy or delete any copies thereof.
The document has been prepared to be used by professional and properly trained personnel, and You assume full responsibility
when using it. Nokia Networks welcome Your comments as part of the process of continuous development and
improvement of the documentation.
This document and its contents are provided as a convenience to You. Any information or statements concerning the suitability,
capacity, fitness for purpose or performance of the Product are given solely on an “as is” and “as available” basis in this document,
and Nokia Networks reserves the right to change any such information and statements without notice. Nokia
Networks has made all reasonable efforts to ensure that the content of this document is adequate and free of material
errors and omissions, and Nokia Networks will correct errors that You identify in this document. But, Nokia
Networks' total liability for any errors in the document is strictly limited to the correction of such error(s). Nokia
Networks does not warrant that the use of the software in the Product will be uninterrupted or error-free.
NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF AVAILABILITY,
ACCURACY, RELIABILITY, TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, IS MADE IN
RELATION TO THE CONTENT OF THIS DOCUMENT. IN NO EVENT WILL NOKIA NETWORKS BE LIABLE FOR ANY
DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH
AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA THAT MAY
ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT, EVEN IN THE CASE OF ERRORS IN OR OMISSIONS FROM
THIS DOCUMENT OR ITS CONTENT.
This document is Nokia Networks’ proprietary and confidential information, which may not be distributed or
disclosed to any third parties without the prior written consent of Nokia Networks.
Nokia is a registered trademark of Nokia Corporation. Other product names mentioned in this document may be trademarks of
their respective owners, and they are mentioned for identification purposes only.
Copyright © 2014 Nokia Networks. All rights reserved.
Nokia Networks is continually striving to reduce the adverse environmental effects of its products and services. We
would like to encourage you as our customers and users to join us in working towards a cleaner, safer environment. Please recycle
product packaging and follow the recommendations for power use and proper disposal of our products and their components.
If you should have questions regarding our Environmental Policy or any of the environmental services we offer, please contact us
at Nokia Networks for any additional information.
Table of contents
1 Introduction ..................................................................................................... 8
1.1 Target and scope ............................................................................................ 8
2 Concepts....................................................................................................... 10
2.1 Abbreviations ................................................................................................ 10
2.2 Concepts and terminology............................................................................. 12
3 References ................................................................................................... 13
List of Figures
List of Tables
Summary of changes
Changes between document issues are cumulative. Therefore, the latest document issue contains all
changes made to previous issues.
1 Introduction
This document describes the Security Gateway Recommended for BSC Site
Solution in terms of:
• Security Gateway High level Description
• Setup and configuration (not the used commands) in relation to the
reference Network Scenarios/use cases as listed in the BSC Site
Solution Mother Document /A/.
2 Concepts
2.1 Abbreviations
ABBR Explanation
HA High Availability
PPS Packets-per-Second
SA Security Association
Concept\Term Description
small form-factor The small form-factor pluggable (SFP) is a compact, hot-pluggable
pluggable (SFP) transceiver used for both telecommunication and data
communications applications. It interfaces a network device mother
board (for a switch, router, media converter or similar device) to a
fiber optic or copper networking cable. It is a popular industry format
supported by many network component vendors.
Encapsulating Encapsulating Security Payload (ESP) is a member of the IPsec
Security Payload protocol suite. In IPsec it provides origin authenticity, integrity, and
(ESP) confidentiality protection of packets.
Cell Broadcast It is the center responsible for Cell Broadcast (CB) messaging. Cell
messaging center Broadcast messaging is a mobile technology feature defined by the
(CBC) ETSI’s GSM committee and is part of the GSM standard. It is also
known as Short Message Service - Cell Broadcast (SMS-CB). Cell
Broadcast is designed for simultaneous delivery of messages to
multiple users in a specified area.
De-militarized zone A de-militarized zone is a physical or logical subnetwork that
(DMZ) contains and exposes an organization's external services to a larger
untrusted network, usually the Internet. It is sometimes referred to
as a Perimeter Network. The purpose of a DMZ is to add an
additional layer of security to an organization's Local Area Network
(LAN); an external attacker only has access to equipment and
services in the DMZ, rather than any other part of the network.
VIrtual system Some Juniper Networks security devices support virtual systems
(VSYS) (vsys). A virtual system is a subdivision of the main system that
appears to the user to be a standalone entity. Virtual systems
reside separately from each other and from the root system within
the same security device.
Internet Key Internet Key Exchange (IKEv1 or IKEv2) is the protocol used to set
Exchange up a security association (SA) in the IPsec protocol suite. IKE builds
upon the Oakley protocol and ISAKMP and uses a Diffie–Hellman
key exchange to set up a shared session secret, from which
cryptographic keys are derived. Public key techniques or,
alternatively, a pre-shared key, are used to mutually authenticate
the communicating parties.
3 References
Public references:
Standards, publications
/1/ NetScreen-5000 Series Hardware Installation and Configuration
Guide
http://www.juniper.net/techpubs/en_US/release-
independent/screenos/information-products/pathway-
pages/netscreen-series/product/index.html
http://www.juniper.net/techpubs/en_US/screenos6.3.0/information-
products/pathway-pages/screenos/index.html
http://www.juniper.net/techpubs/en_US/screenos6.3.0/information-
products/pathway-pages/screenos/index.html
Release 6.3.0
http://www.juniper.net/techpubs/en_US/screenos6.3.0/information-
products/pathway-pages/screenos/index.html
BSC provides
integrated IPSEC
only for O&M/CBC
MLS SGW
DNS
Backhaul Network
L2 or L3 ATS
MLS
SSE-M
(*)
PTP-M
SSE
Equipment
(*) SSE-M, ATS, PTP-M may be placed in NetAct Site or in CN Site or in BSC Site.
5.1.1 Overview
M a na gem e nt
m odu le
S e cur e po rt m od ules
Loa d sh arin g ho t
sw a ppa ble po w er
sup plies ( AC o r D C )
The NetScreen 5200 systems (“empty Chassis”) are provided with the
following options:
The NetScreen 5400 systems (“empty Chassis”) are provided with the
following options:
NS-5400: NS-5400 system, no SPM or MGT modules, includes fan tray, 3 x
AC power supply, 19” rack mount.
NS-5400-DC: NS-5400 system, no SPM or MGT modules, includes fan tray, 3
x DC power supply, 19” rack mount.
Table 2 shows the configurations for each management module and SPM and
shows whether the firmware version is included on the management module
or if it needs to be downloaded.
Table 2: Configurations for Management and Secure Port Modules
Secure Port Modules (SPMs) perform general packet processing and device
connection tasks for devices that communicate with the NetScreen-5000
Series. SPMs handle packets as they enter and exit the system, providing
packet parsing, classification, and flow-level processing. SPMs also provide
encryption, decryption, Network Address Translation (NAT), and session
lookup features. When packets require processing beyond that provided by an
SPM, the NetScreen-5000 Series hands them off to the management module
for further processing. There are currently the following families of SPMs:
• The NS-5000-8G2 and NS-5000-8G2-G4 SPMs provide eight 1-
Gigabit Small Form factor Pluggable (SFP) sockets. These SPMs
are supplied with SX gigabit fiber SFP transceivers. These
modules are also capable of supporting a total of four aggregate
interfaces, with up to four ports for each aggregate interface.
Minimum configuration:
• The NetScreen 5400 systems (“empty Chassis”)
• 1 Management Module 5000-MGT3 with following main
characteristics
Firewall session setup performance: 26K+ new sessions per second
VPN tunnel setup performance: Establish 120 IKE tunnels/second with pre-shared keys.
• 1 NetScreen-5000 8G2-G4-TX SPM module with following main
characteristics
8 port mini-GBIC interfaces
8 Gbps Firewall / 4 Gbps 3DES/AES IPsec
4 port link aggregation
Untrusted zone
Trusted zone
SLMC CA/
NetAct
CR
BSC
VNP MSS MGW ATS
BSC
TCSM SSM
CBC SGSN
(*)
DNS PTP-M
TCSM
Interfaces, relevant for Nokia site solution, bound to a security zone may be:
• Physical interface:
A physical interface relates to components that are physically
present on the security device.
• Subinterface:
On devices that support virtual LANs (VLANs), a physical interface
can be logically divided into several virtual sub-interfaces, each of
which borrows the bandwidth it needs from the physical interface
from which it stems. A sub-interface is an abstraction that functions
identically to a physical interface and is distinguished by 802.1Q
VLAN tagging. The security device directs traffic to and from a
zone with a sub-interface via its IP address and VLAN tag.
• Aggregate Interfaces:
In Nokia site solution the two pre-defined routers ( trust-vr and untrust vr ) are
used.
5.3.4 Policies
Every time a packet attempts to pass from one zone to another (or even
between two interfaces bound to the same zone), the security device checks
its policy set lists for a policy that permits such traffic. To allow traffic to pass
from one security zone to another—for example, from zone A to zone B—you
must configure a policy that permits zone A to send traffic to zone B. To allow
traffic to flow the other way, you must configure another policy permitting
traffic from zone B to zone A. For any traffic to pass from one zone to another
there must be a policy that permits it. Also, if intrazone blocking is enabled,
there must be a policy to permit traffic to pass from one interface to another
within that zone.
5.3.5 VPN
5.3.6 PKI
Juniper NetScreen supports PKI. See Juniper Documentation /2/ for details.
5.3.7 Firewall
In Nokia site solution both the SCREEN options and the firewall policies, at the
inter-zone level are recommended (see section 6.3.)
In Nokia BSC site solution the NSRP cluster will contain two
security devices.
• Virtual security device (VSD) groups and Virtual Security
Interfaces (VSI)
Virtual security device (VSD) groups are created each with its own
virtual security interfaces (VSIs). It is possible to assign two
NetScreen devices to one or more VSD groups. In each single
group, one of the devices is defined as primary (i.e. it processes
the traffic within the group) and the other one as secondary (i.e. it
does not process any traffic until the primary device goes out of
service). The role of primary/secondary NetScreen device inside a
VSD group is assigned by means of a priority value. The device
with the priority number closest to 0 becomes the primary device
(the default is 100).
After you create a VSD group, it must bind VSIs to the VSD group.
Virtual Security Interfaces (VSIs) are the virtual interfaces that two
security devices forming a virtual security device (VSD) share
when operating in High Availability (HA) mode:
Each VSI has its own IP address.
You must manually assign VSIs to VSDs for each security zone
configured on the security device.
The high availability schema adopted in Nokia's BSC site solution
foresees to use the two NetScreens in active/active configuration.
For this is needed to group the two NetScreen (e.g. NetScreen A
and NetScreen B) into:
Two VSD groups (e.g. VSD 0 and VSD 1) in case of no M-plane separation. NetScreen A is
primary device in VSD 0 and NetScreen B is primary device in VSD 1.
Three VSD groups (e.g. VSD 0, VSD 1 and VSD2) in case of M-plane separation. NetScreen
A is primary device in VSD 0and NetScreen B is primary device in VSD 1 and VSD2. See
also section 6.2.2.
Virtual Interface
Trusted zone
VSI1
VSD VSI2 BSC
ATS
group 0
SSM 1
Untrusted zone (*)
Virtual Devices
BSC
3
ATS
SSM
(*)
Untrusted zone VSI1 VSI2
VSI1:1 VSI2:1 PTP-M
TCSM
Physical
Interfaces
5.3.9 Management
There are different means available for managing Juniper NetScreen both
locally and/or remotely.
The management traffic may be aggregated with the BSC traffic over
Backbone port (so called in-band management) or the dedicated Management
ports may be used.
5.3.9.1 Monitoring
NetScreen provides Log and Alarms to allow Operator to monitor the systems.
Main Log generated is the following:
• Event Log
ScreenOS provides an event log for monitoring system events
such as configuration changes, and self-generated messages and
alarms regarding operational behavior and attacks. The event log
displays the date, time, level and description of each system event.
It is possible to view system events for each category stored in
flash storage on the security device through the WebUI or the CLI.
To view the file it is possible to use an ASCII text editor (such as
Notepad or WordPad). Alternatively, it is possible also to send
such files to an external storage space.
• Traffic log
The Juniper Networks security device can monitor and record
traffic that it permits or denies based on previously configured
policies. You can view traffic log entries stored in flash storage on
the security device using either the WebUI or the CLI.
• Self Log
ScreenOS provides a self log to monitor and record all packets
terminated at the security device. For example, if you disable some
management options on an interface—such as WebUI, SNMP,
and ping—and HTTP, SNMP, or ICMP traffic is sent to that
interface, entries appear in the self log for each dropped packet.
You can view the self log, which is stored in flash storage on the
security device, through either the CLI or WebUI.
• SysLog
A security device can generate syslog messages for system
events at predefined severity levels and, optionally, for traffic that
policies permit across a firewall. It sends these messages to up to
four designated syslog hosts running on UNIX and Linux systems.
The security device supports traffic alarms when traffic exceeds thresholds
that you have defined in policies. You can configure the security device to alert
you through one or more of the following methods whenever the security
device generates a traffic alarm e.g
• Console
• Internal (Event Log)
• Email
• SNMP
• Syslog
5.4.1 NetScreen-5200
• Firewall performance:
Up to 10 Gbps FW (4 Gbps for 64 byte packets)
6 million pps FW
1 million concurrent sessions (e.g. ICMP/UDP/TCP sessions)
5.4.1.1 NetScreen-5400
• Interfaces: Up to 24 GE interfaces (3NetScreen-5000 8G2-G4
SPM modules ) or 6x10 GE (3 NetScreen-5000 2XGE-G4 SPM
modules) + 1 5000-MGT3 management module
• VLAN: Up to 4,094 VLANs
• VPN performance:
25,000 IPsec VPN tunnels
9 million pps VPN
15 Gbps 3DES and VPN (6 Gbps for 64 byte packets)
• Firewall performance:
Up to 30 Gbps FW (12 Gbps for 64 byte packets)
18 million pps FW
2 million concurrent sessions (e.g. ICMP/UDP/TCP sessions)
Note:
Description in this section does not cover the exact
configuration order; the selected order is for readability
purpose
6.1 Installation
The physical layouts including NetScreen devices at the BSC site is depicted
in Figure 7:
NS0
1
SWU-2 SWU-0
active
PTP-M
HA links
ETP PCU CPU
NS1
ATS
active
2
SWU-3 SWU-1
Backhaul
Interface in Untrust zone
MLS-1
Interface in Trust zone
MLS-0
BSC
Backbone L3
NS0
1
SWU-2 SWU-0
3
active
PTP-M
HA links
ETP PCU CPU
NS1
ATS
active 4
2
SWU-3 SWU-1
Backhaul
Interface in Untrust zone
MLS-1
Interface in Trust zone
6.2.1 General
From BTS point of view there is one IPsec Security Association (IPsec SA) for
each plane. This means maximum 14 unidirectional IPsec SA per BTS given
by:
• 2 (C-plane)
• 2 (U-Plane-CS)
• 2 (Packet Delay Measurement)
• 2 (U-Plane-PS)
• 2 (M-Plane)
• 2 (Site Support Equipment)
• 2 (Timing over Packet)
Notes:
1. At BTS-side, the security association related to Packet Delay
Measurement (PDM) traffic is automatically enabled/disabled as
BTS A
a.b.50.1
SGW
VPN tunnel
Max 7 vpn per BTS
a.b.4.2
BTS
a.b.50.2
BSC Site
BTS BTS
B1 a.b.50.1
B2
a.b.50.1
SGW SGW
a.b.60.1 a.b.60.1
a.b.4.2 a.b.4.2
BTS
BTS a.b.4.5
a.b.4.5
a.b.50.2 a.b.50.1
BSC Site BSC Site
a.b.60.2 a.b.60.1
BTS
SGW
C D
a.b.50.1 a.b.80.1
a.b.50.1
Figure 11: Packet Abis, AoIP/ETPSIG and SIGTRAN vpn (with active/active
SGW configuration)
Figure 12: Packet Abis, AoIP/ETPSIG and SIGTRAN vpn (with m-plane
separation and active/active SGW configuration)
6.2.2 HA provisioning
Also Packet Abis U-plane is depicted on the picture to show how the traffic
goes through the SGW.
BSC Site
MLS-0 BSC
SWU-0
SWU-2
active
SGW-0
a.b.50.1 ETP
Device failover
triggered
HA Link
by IP tracking
a.b.5.2 U-00
T-00
U-00 T-00
a.b.4.2
SGW-1
a.b.50.2
active
SWU-1
SWU-3
MLS1
BSC Site
MLS-0 BSC
SWU-0
SWU-2
active
SGW-0
a.b.50.1 ETP
Device failover
a.b.60.1 triggered
HA Link
by IP tracking
a.b.5.5
a.b.5.2
T-00 U-00
U-00 T-00
a.b.4.2
SGW-1
a.b.50.2
a.b.4.5
active
a.b.60.2
SWU-1
SWU-3
MLS1
When security device receives traffic matching the rule, it executes one of
following actions: deny, permit, reject, or tunnel;
• Deny blocks the packet from traversing the firewall.
• Permit allows the packet to pass the firewall.
• Reject blocks the packet from traversing the firewall. The security
device drops the packet and sends a TCP reset (RST) segment to
the source host for TCP traffic and an ICMP “destination
unreachable, port unreachable” message (type 3, code3) for UDP
traffic. For types of traffic other than TCP and UDP, the security
device drops the packet without notifying the source host, which is
also what occurs when the action is “deny.”
• Tunnel: the traffic subject to IPsec processing.
Policies, in general, are used to setup VPN tunnels and to define firewall rules.
Examples in the next sections.
NetScreen allows the configuration of IPsec VPNs with two basic methods: the
route-based VPNs and the policy-based VPNs.
With policy-based VPN method, the IPsec SAs are defined at policy level, i.e.
• A policy, having action=tunnel, identifies an IPsec SA.
• The traffic that matches with the traffic selectors indicated in the
policy will be protected by IPsec.
Figure 15: Packet Abis relationships among traffic flows, IP endpoints and
IPsec security associations
C-plane
CS U-plane
PS U-plane
PDM
VPN tunnel (i.e. “IPSEC SA bidiectional”)
S-plane
SSE PTP-M
SSE IKE SA negotiates
SSE-M multiple child IPSEC SA
M-plane C-plane
BSC CS U-plane
C-plane
PS U-plane
CS U-plane PDM
PS U-plane S-plane
PDM SSE PTP-M
B1 S-plane
PTP-M
SSE
SSE-M
Table 7: Hints to configure the security associations for Packet Abis traffic
will succeed.
If in NetScreen (with
policy-based VPN) are
configured policies
that provide list of IPs
and related ports, then
NetScreen will send,
via IKE, the list of IP
addresses and ports.
This means that IKE
negotiation with BTS
will fail.
-SSE List of IPs (because Policies, containing a Route-based or policy-
there may be more list of IPs, are installed based VPNs
than one SSE at BTS both in BTS and SGW.
side). Port selector is
BTS sends, via IKE,
“any”.
list of IPs with port
selector=“any”.
NetScreen (policy-
based VPN) sends, via
IKE, list of IPs with
port selector=“any”.
NetScreen (route-
based) sends only one
IP address and
port=ANY.
In both cases above
the IKE negotiation
succeeds.
-PTP Single IP, port is any BTS sends via IKE the Route-based or policy-
IP address and port based VPNs
selector=”any”;
NetScreen (policy-
based VPN) sends IP
address and and port
selector=”any”.
NetScreen (route-
based VPN) sends IP
address and and port
selector=”any”.
In both cases above
the IKE negotiation
succeeds.
Note: Re-keying of IKE SAs shall be proactive i.e. the new IKE SA shall be
established before the old one expires and becomes unusable.
Note:
Operator hint for configuration of IPsec for Packet
Abis:
Change of tunnel IP endpoint at SGW should not happen
before the new security gateway’s IP tunnel endpoint has
been configured within BTS.
Note:
Depending on the SGW SW version, the following
issue may occur:
Juniper does not send alarm when IPsec SA mismatch
occurs during phase 2 proposal in IKE_AUTH. Operator is
not informed that IPsec SAs are not established.
Note:
Depending on the SGW SW version, the following issue may
occur:
When parameters related to SA configuration (for example, encryption
algorithm) are changed, SA has to be re-established. Both BTS and
SGW initiate CHILD_SA procedure. During this procedure continuous
traffic is received from BSC, for that reasons Juniper is not able to
close the procedure and then it does not activate CHILD SA. This
means that traffic can not be protected by IPsec and it is not
transmitted to BTS.
Use Juniper release 6.3.0r4-cu3.0, as it contains the fix for issue
mentioned above.
If this version of Juniper is not available, use the following work-
around:
• Block the traffic at Juniper. This means disabling the policies at Juniper before any SA
configuration change at BTS. Policies of both trust to untrust and untrust to trust for
the respective SA have to be blocked.
• After SA re-establishment, enable the policies again and the traffic for the
corresponding planes start flowing again.
• Make the configuration changes using the element manager in Local mode (not
Remote mode).
Disabling/enabling policies is a check box near the policy that is used for
traffic based SA triggering:
• If policy is enabled, then depending on the policy the traffic is either protected or not
protected.
• If policy is disabled, then as no rules are found for traffic, the traffic is blocked.
Traffic is required to be blocked for only those planes (SA) whose configuration is to be
changed. If configuration change affects all planes, then all traffic should be blocked.
Note:
There is one issue when all following conditions are satisfied:
• IPsec is enabled both for C-plane and M-plane.
• One single IP address in BTS for M/C/U/ToP-plane.
• BSC M-plane and BSC C-plane IP addresses are the same.
I.e. following kinds of configuration is not accepted in Juniper NetScreen.
Selectors
Traffic Inner BSC Inner BTS Protocol BSC port BTS port Action Outer Outer Dest
flow IP IP Source IP IP
M-plane BSC- BTS- UDP BSC U_PS BTS U_PS tunnel ** **
SA MC@ MCUS@ port port
C-plane UDP any any tunnel ** **
SA
Note:
When M-plane is configured in probe mode, if an
IPsec - protected M-plane cannot be established, BTS
will try to establish a not IPsec -protected M-plane
towards BSC. However NetScreen has in its database
a policy that allows only encrypted M-plane.
For this, not-encrypted M-plane will be dropped by
NetScreen.
Note:
NetScreen's rekeying feature requires also the activation
of VPN monitoring feature in NetScreen. VPN monitoring
feature makes use of ICMP messages that are sent over
each monitored VPN, however VPN solution in BTS
doesn’t allow ICMP traffic to pass through VPNs. For this
reason the VPN monitoring and the rekeying features
don’t work when NetScreen interoperates with BTS.
Therefore it is recommended that operator does not
enable VPN monitoring and rekeying features. Instead
responsibility of IKE SA rekeying and CHILD SA rekeying
lies with BTS alone. Operator should take care, during
configuration, that lifetime of IKE SA and CHILD SAs
configured at BTS are less than that configured at
NetScreen.
Table 8: SGW policy-based VPN configuration: example (Use Case B1) for Packet Abis interface
Traffic Direction Inner Source Inner protocol Source port Destination Action VPN tunnel Outer Outer Security
flow IP Destination port Source Destinat measures
(source (IPsec bi-
IP IP ion IP
zone directional
destinatio SA)
n zone)
Site Trust SSE_manager SSE@ any any any tunnel SSE_SA VSI_U2 BTS@1 Encryption(
Support untrust @ @ optional)+a
traffic uth.
M- Trust BSC-M@ BTS-M@ SCTP M-plane port M-plane port tunnel M-plane SA Encryption(
Plane untrust optional)+a
uth.
C-Plane Trust BSC-C@1 BTS-CUS@ SCTP any any tunnel C-plane SA VSI_U1 BTS@2 authenticati
untrust @ on
BSC-C@2 any any
BSC-C@3 any any
U-Plane Trust BSC-U@ UDP U_CS- port U_CS- port tunnel U-plane_CS Encryption(
CS untrust plane SA optional)+a
uth.
PDM Trust UDP PDM port PDM port tunnel PDM SA Encryption(
untrust optional)+a
uth.
U-Plane Trust UDP U_PS- port U_PS- port tunnel U-plane_PS authenticati
PS untrust SA on
Top Trust PTP-M@ UDP any any tunnel S-plane SA authenticati
PTP untrust on
(IEEE
1588v2)
Table 9: SGW policy-based VPN configuration: example (Use Case B1) for Packet Abis interface (continued)
Traffic Direction Inner Inner protoc Source Destination Action VPN tunnel Outer Outer Security
flow Source IP Destination ol port port Source Destinati measures
(source (IPsec bi-
IP IP on IP
zone directional SA)
destination
zone)
Site Untrust SSE@ SSE_M@ any any any tunnel SSE_SA BTS@1 VSI_U2@ Encryption(opt
Support trust ional)+auth.
traffic
M-Plane Untrust BTS-M@ BSC-M@ SCTP M-plane M-plane port tunnel M-plane SA Encryption(opt
trust port ional)+auth.
C-Plane Untrust BTS- BSC-C@1 SCTP any any tunnel C-plane SA BTS@2 VSI_U1@ authentication
trust CUS@
BSC-C@2 any any
BSC-C@3 any any
U-Plane Untrust BSC-U@ UDP U_CS- port U_CS- port tunnel U-plane_CS SA Encryption(opt
CS trust ional)+auth.
PDM Untrust UDP PDM port PDM port tunnel PDM SA Encryption(opt
trust ional)+auth.
U-Plane Untrust UDP U_PS- port U_PS- port tunnel U-plane_PS SA authentication
PS trust
Top PTP Untrust PTP-M@ UDP any any tunnel S-plane SA authentication
(IEEE trust
1588v2)
Table 10: SGW route-based VPN configuration: example (Use Case B1) for Packet Abis interface
Traffic Direction Inner Inner protocol Source port Destination Action VPN tunnel Outer Outer Security
flow Source IP Destinati port Source IP Destina measures
(source (IPsec bi-
on IP tion IP
zone directional
destination SA)
zone)
Site Trust untrust SSE_man SSE@ any any any permit SSE_SA VSI_U2@ BTS@1 Encryption(o
Support ager@ ptional)+auth.
traffic
M-Plane Trust untrust BSC-M@ BTS-M@ SCTP M-plane port M-plane port permit M-plane SA Encryption(o
ptional)+auth.
C-Plane Trust untrust BSC-C@1 BTS- SCTP C-plane port1 C-plane permit C-plane SA VSI_U1@ BTS@2 authenticatio
CUS@ port1 n
BSC-C@2 C-plane port2 C-plane
port2
BSC-C@3 C-plane port3 C-plane
port3
U-Plane Trust untrust BSC-U@ UDP U_CS- port U_CS- port permit U-plane_CS Encryption(o
CS plane SA ptional)+auth.
PDM Trust untrust UDP PDM port PDM port permit PDM SA Encryption(o
ptional)+auth.
U-Plane Trust untrust UDP U_PS- port U_PS- port permit U-plane_PS authenticatio
PS SA n
Top PTP Trust untrust PTP-M@ UDP any any permit S-plane SA authenticatio
(IEEE n
1588v2)
Table 11: SGW route-based VPN configuration: example (Use Case B1) for Packet Abis interface (continued)
Traffic Directio Inner Source Inner protocol Source Destination Action VPN tunnel Outer Outer Security
flow n IP Destination port port Source Destinati measures
(IPsec bi-
IP IP on IP
(source directional
zone SA)
destinat
ion
zone)
Site Untrust SSE@ SSE_M@ any any any permit SSE_SA BTS@1 VSI_U2@ Encryption(opt
Support trust ional)+auth.
traffic
M-Plane Untrust BTS-M@ BSC-M@ SCTP M-plane M-plane port permit M-plane SA Encryption(opt
trust port ional)+auth.
C-Plane Untrust BTS-CUS@ BSC-C@1 SCTP C-plane C-plane port permit C-plane SA BTS@2 VSI_U1@ authentication
trust port 1 1
BSC-C@2 C-plane C-plane
port2 port2
BSC-C@3 C-plane C-plane
port3 port3
U-Plane Untrust BSC-U@ UDP U_CS- port U_CS- port permit U-plane_CS Encryption(opt
CS trust SA ional)+auth.
PDM Untrust UDP PDM port PDM port permit PDM SA Encryption(opt
trust ional)+auth.
U-Plane Untrust UDP U_PS port U_PS- port permit U-plane_PS authentication
PS trust SA
Top PTP Untrust PTP-M@ UDP any any permit S-plane SA authentication
(1588v2) trust
Table 12: SGW policy-based VPN configuration example for AoIP, external ETPSIG, SIGTRAN interface
Traffic flow Direction(s Inner source Inner protoco Sourc Destinati action VPN Outer Outer Security
ource IP destinatio l e port on port tunnel source IP destinatio measure
zone n IP (IPsec bi- n IP s
destination directional
zone) SA)
AoIP trust ETPA subnet Remote any any any tunnel AoIP SA VSI_U0 @) Remote auth.+
untrust AovIP SGW IP@ encrypt.
subnet
Sigtran-1 trust Sigtran1 Remote any any any tunnel Sigtran1 Remote auth.+
(A,VNP,Lb ) untrust Subnet Sigtran SA SGW IP@ encrypt.
subnet
Packet Ater trust Packet Ater Remote any any any tunnel Packet Ater Remote auth.+
untrust subnet Packet SA Packet Ater encrypt.
Ater IP@
subnet
Sigtran-2 trust Sigtran2 Remote any any any tunnel Sigtran2 VSI_U1 @) Remote auth.+
A,VNP,Lb untrust subnet Sigtran SA SGW IP@ encrypt.
subnet
External trust ETPSIG Remote any any any tunnel ETPSIG Remote auth.+
untrust subnet ETPSIG SA SGW IP@ encrypt.
ETPSIG
subnet
AoIP untrust Remote AovIP ETPA any any any tunnel AoIP SA Remote VSI_U0 @) auth.+
trust subnet subnet SGW IP@ encrypt.
Sigtran-1 untrust Remote Sigtran1 any any any tunnel Sigtran1 Remote auth.+
(A,VNP,Lb) untrust Sigtran subnet Subnet SA SGW IP@ encrypt.
Packet Ater untrust Remote Packet any any any tunnel Packet Ater Remote auth.+
trust Packet Ater Ater SA Packet Ater encrypt.
subnet subnet IP@
Sigtran-2 untrust Sigtran2 Remote any any any tunnel Sigtran2 Remote VSI_U1 @) auth.+
DN0976647 © 2014 Nokia Networks 65 / 78
Issue 01C
BSC TRANSPORT SITE SOLUTION BSC site solution: SGW Setup
Table 13: SGW policy-based VPN configuration example for SIGTRAN-BBI interface
Traffic Direction Inner Inner destination protocol Source Destination action VPN Outer Outer Security
flow source IP IP port port tunnel source IP destination measures
(source
IP
zone (IPsec bi-
destination directional
zone) SA)
Sigtran-1 trust Sigtran1 Remote Sigtran any any any tunnel BBI-1 SA VSI_U0 Remote auth.+
(BBI) untrust Subnet subnet @) SGW encrypt.
IP@1
Sigtran-2 trust Sigtran2 Remote Sigtran any any any tunnel BBI-2 SA VSI_U1@) Remote auth.+
(BBI) untrust subnet subnet SGW encrypt.
IP@2
Sigtran-1 untrust Remote Sigtran1 subnet any any any tunnel BBI-1 SA Remote VSI_U0 @) auth.+
(BBI) trust Sigtran SGW encrypt.
subnet IP@1
Sigtran-2 untrust Remote Sigtran2 subnet any any any tunnel BBI-2 SA Remote VSI_U1 @) auth.+
(BBI) trust Sigtran SGW encrypt.
subnet IP@2
CMP, LDAP
NETACT site
NetAct CA/
CR SSE-M
BSC
ATS
SSE traffic
Policies shall be configured in order to allow traffic coming from untrust zone
to the trust zone.
The NetScreen’s security policy basic concept is described in section 6.2.5.
The policy contains the source and destination zones, source and destination
addresses, one or more services, and an action (permit, deny, reject, tunnel).
The rules to be configured concern the policies for the traffic flows allowed
(protected and not). These rules are indicated within the table below. Traffic
not indicated in this table is considered protected by IPsec see section 6.2.7.
protocol Source Destination Source Destination Source port Destination Action Notes
zone zone address address port
UDP(dummy untrust trust BTS IP of PWE IP of PWE BTS UDP port Port of PWE permit
PWE Abis) tunnel external for PWE external
equipment) equipment
UDP (PWE untrust trust BTS IP of PWE IP of BSC ETIP BTS UDP port BSC ETIP UDP permit
Abis) tunnel for PWE port
UDP(PWE untrust trust IP of TCSM IP of BSC ETIP UDP port of BSC ETIP UDP permit
Ater) ETIP TCSM ETIP port
UDP(PWE A) untrust trust IP of PWE of IP of TCSM UDP port of UDP port of permit
external ETIP external TCSM ETIP
equipment in equipment in
front of Media front of Media
gateway’s gateway’s
ESP untrust trust Security OMU IP Not applicable Not applicable permit This rule
gateway IP at address allows
(O&M/ CBC)
NetAct site O&M/CBC
traffic
ESP--
protected
coming
from
NetAct
site.
UDP untrust trust addresses of BSC/ TCSM, any For traceroutes permit
BTS or Core ATS,PTP-M towards BSC
(UDP – based
Network that pingable the port range
traceroute)
may send addresses is 33434 -
pings. 33533
ICMP untrust trust addresses of BSC/ TCSM, Not applicable Not applicable permit
BTS or Core ATS,PTP-M
Network that pingable
may send addresses
pings.
(O&M untrust trust Synchronization Synchronization Synchronization Synchronization permit
protocols for equipment’s equipment’s IP equipment’s equipment
synchronization manager IP address Manager port(s) port(s)
equipments) address
UDP (Gb over untrust trust SGSN IP BCSU IP Port range Gb Port range Gb permit
IP) address address over IP over IP
any trust untrust any any any any permit All traffic
exiting
from BSC
is allowed
by
firewall.
IP address sweep
An address sweep occurs when one source IP address sends 10 ICMP
packets to different hosts within a defined interval (5000 microseconds is the
default). The purpose of this scheme is to send ICMP packets—typically echo
requests—to various hosts in the hopes that at least one replies, thus
uncovering an address to target. The security device internally logs the
number of ICMP packets to different addresses from one remote source.
Using the default settings, if a remote host sends ICMP traffic to 10 addresses
in 0.005 seconds (5000 microseconds), the security device flags this as an
address sweep attack, and rejects all further ICMP echo requests from that
host for the remainder of the specified threshold time period.
It is suggested to enable this measure on the untrust zone.
Port scanning
A port scan occurs when one source IP address sends IP packets containing
TCP SYN segments to 10 different ports at the same destination IP address
within a defined interval (5000 microseconds is the default). The purpose of
this scheme is to scan the available services in the hopes that at least one
port will respond, thus identifying a service to target. The security device
internally logs the number of different ports scanned from one remote source.
Using the default settings, if a remote host scans 10 ports in 0.005 seconds
(5000 microseconds), the device flags this as a port scan attack and rejects all
further packets from the remote source for the remainder of the specified
timeout period.
It is suggested to enable this measure on the untrust zone.
It is not suggested to configure this measure, due to possibility that (if the
NetScreen thresholds are not well dimensioned) it may interfere with the
normal connection behavior among GSM network elements (especially for
UDP traffic flows).
Evasion techniques
One of the Evasion techniques is the Non-SYN Flags and this measure
avoids accepting TCP packets not being part of a regular TCP session (i.e. a
session initiated by a TCP SYN packet).
It is suggested to enable this measure on the untrust zone.
Another evasion technique is the IP spoof checking, i.e. it is the mechanism
to detect IP spoofing relies on route table entries. If, for example, a packet with
source IP address 10.1.1.6 arrives at ethernet3, but the NetScreen has a route
to 10.1.1.0/24 through ethernet1, IP spoof checking notes that this address
arrived at an invalid interface—as defined in the route table, a valid packet
from 10.1.1.6 can only arrive via ethernet1, not ethernet3.Therefore, the
device concludes that the packet has a spoofed source IP address and
discards it.
Measures not suggested, because it may introduce not-deterministic
behaviors of NetScreen during e.g. routing table updates.
When enabling the ICMP flood protection feature, you can set a
threshold that once exceeded invokes the ICMP flood attack
protection feature. (The default threshold value is 1000 packets
per second.) If the threshold is exceeded, the security device
ignores further ICMP echo requests for the remainder of that
second plus the next second as well.
This is a suggested measure to be configured in untrust zone.
• UDP flood protection:
Similar to the ICMP flood, UDP flooding occurs when an attacker
sends IP packets containing UDP datagrams with the purpose of
slowing down the victim to the point that it can no longer handle
valid connections. After enabling the UDP flood protection feature,
you can set a threshold that, once exceeded, invokes the UDP
flood attack protection feature. (The default threshold value is 1000
packets per second). If the number of UDP datagrams from one or
more sources to a single destination exceeds this threshold, the
security device ignores further UDP datagrams to that destination
for the remainder of that second plus the next second as well.
It is suggested to implement such a feature only if it may be well
dimensioned. Otherwise it could disturb the communication
among GSM RAN equipments.
• Land Attack protection
A land attack occurs when an attacker sends spoofed SYN
packets containing the IP address of the victim as both the
destination and source IP address. The receiving system responds
by sending the SYN-ACK packet to itself, creating an empty
connection that lasts until the idle timeout value is reached.
Flooding a system with such empty connections can overwhelm
the system, causing a denial of service.
It is suggested to configure the Land attack protection in Untrust
zone
• Ping of Death protection
Many ping implementations allow the user to specify a packet size
larger than 65,507 bytes. A grossly oversized ICMP packet can
trigger a range of adverse system reactions such as denial of
service (DoS), crashing, freezing, and rebooting. When the Ping of
Death protection is enabled , the security device detects and
rejects such oversized and irregular packet sizes, even when the
attacker hides the total packet size by purposefully fragmenting it.
It is suggested to configure the Ping of Death protection in Untrust
zone.
• Teardrop attack protection
3DES-192 CBC;
- IKE SA authentication/integrity protection HMAC-SHA1-96;
- Diffie-Hellmann group 2.
- NAT-T negotiation is not required at Abis side because GSM Flexi
EDGE BTS/FlexiMultiRadio BTS does not implement NAT-t.