The default minimum and maximum GTP message lengths are 0 and 65535, respectively.
Limiting GTP Message Rate
To limit the rate of network traffic from a security device to a GPRS Support Node (GSN),
you can specify the number of packets per second permitted for GTP-Control (GTP-C)
messages.
Because GTP-C messages require processing and replying, they can overwhelm a GSN.
Setting a rate limit on GTP-C messages can protect your GSNs from Denial-of-Service
(DoS) attacks such as:
•
Border Gateway bandwidth saturation—A malicious operator connected to the same
GRX as your PLMN can generate enough network traffic directed at your Border
Gateway, so that legitimate traffic is starved for bandwidth in or out of your PLMN,
thus denying roaming access to or from your network.
•
GTP flood—GTP traffic can flood a GSN, forcing it to spend its CPU cycles processing
illegitimate data. This can prevent subscribers from roaming, forwarding data to external
networks, or prevent a GPRS attach to the network.
To limit the GTP message rate, enable Limit (packets/second) and enter the maximum
number of packets per second that a security device can send to a GSN (the default is
unlimited).
Limiting GTP Tunnels
GSNs use GTP tunnels to transmit GTP traffic using the GPRS Tunneling Protocol (GTP).
Because GSNs have a limited capacity for GTP tunnels, you might want to configure the
security device to limit the number of GTP tunnels created.
To limit GTP tunnels, enable Limit (tunnels/GSN) and enter the maximum number of
tunnels permitted for each GSN (the default is unlimited).
Removing Inactive GTP Tunnels
To configure a security device to detect and remove inactive GTP tunnels automatically,
configure the GTP Tunnel Inactivity Timeout (hours). A GTP tunnel might hang (become
inactive) when a “ delete pdp context response” message gets lost on a network, or a
GSN does not properly shut down.
The security device automatically removes a GTP tunnel that is idle for the specified
timeout value. The default timeout value is 24 hours.
Validating Sequence Numbers
When using a security device between the GGSNs, you can configure the device to validate
sequence numbers for the GGSN and drop out-of-sequence packets. This helps conserve
GGSN resources by preventing the unnecessary processing of invalid packets.
The header of a GTP packet contains a Sequence Number field, which indicates the order
of the packets arriving at the GGSN. During the PDP context activation stage:
•
The sending GGSN uses zero (0) as the Sequence Number value for the first G-PDU
it sends through a tunnel to another GGSN. The sending GGSN then increments the
Copyright © 2010, Juniper Networks, Inc.
382
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...