Configuring GTP Message Filtering
By default, the security device permits all GTP message types. You can configure a security
device to filter GTP packets and drop them based on their message type.
A GTP message type includes one or many messages. When you drop a message type,
you automatically drop all messages of the specified type. For example, if you select to
drop the
sgsn-context
message type, you also drop “ sgsn context request” , “ sgsn
context response” , and “ sgsn context acknowledge” messages.
You drop message types based on the GTP version number, enabling you to drop message
types for one version and permit them for another version.
Configuring Subscriber Tracing (Lawful Interception)
You can configure a security device to identify subscribers based on IMSI prefixes or
Mobile Station-Integrated Services Data Network (MS-ISDN) identification, then log the
contents of their GTP-User Data (GTP-U) or GTP-Control (GTP-C) messages.
To enable subscriber tracing, you must configure the following:
•
Set Subscribers—Set the number of number of subscribers that the security device
actively traces concurrently. The default number of simultaneous active traces is three
(3).
•
Specify Log Bytes—Specify the number of bytes of data to log for a GTP-U packet.
The default value is zero, meaning that the device does not log any content from a
GTP-U packet. When you enter a number other than zero, the security device sends
the logged packets to an external server (such as Syslog) dedicated to Lawful
Interception operations.
•
Set ID—For each subscriber you want to trace, enter their ID number and select Based
on IMSI or Based on MSISDN.
Example: Creating a GTP Object
1.
In Object Manager, select
GTP Objects
, then click the Add icon in the main display
area. The New GTP Object dialog box appears.
2.
In the Info tab, configure the following settings:
•
For Name, enter
GPRS1
, then enter a color and comment for the object.
•
Select
Sequence Number Validation
.
•
Select
GTP in GTP Denied
.
•
Leave all other defaults.
3.
In the GTP navigation tree, select
Traffic Logging/Counting
. Configure the following:
Copyright © 2010, Juniper Networks, Inc.
386
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...