Configuring GTP Message Filtering
By default, the security device permits all GTP message types. You can configure a security
device to filter GTP packets and drop them based on their message type.
A GTP message type includes one or many messages. When you drop a message type,
you automatically drop all messages of the specified type. For example, if you select to
drop the
sgsn-context
message type, you also drop “ sgsn context request” , “ sgsn
context response” , and “ sgsn context acknowledge” messages.
You drop message types based on the GTP version number, enabling you to drop message
types for one version and permit them for another version.
Configuring Subscriber Tracing (Lawful Interception)
You can configure a security device to identify subscribers based on IMSI prefixes or
Mobile Station-Integrated Services Data Network (MS-ISDN) identification, then log the
contents of their GTP-User Data (GTP-U) or GTP-Control (GTP-C) messages.
To enable subscriber tracing, you must configure the following:
•
Set Subscribers—Set the number of number of subscribers that the security device
actively traces concurrently. The default number of simultaneous active traces is three
(3).
•
Specify Log Bytes—Specify the number of bytes of data to log for a GTP-U packet.
The default value is zero, meaning that the device does not log any content from a
GTP-U packet. When you enter a number other than zero, the security device sends
the logged packets to an external server (such as Syslog) dedicated to Lawful
Interception operations.
•
Set ID—For each subscriber you want to trace, enter their ID number and select Based
on IMSI or Based on MSISDN.
Example: Creating a GTP Object
1.
In Object Manager, select
GTP Objects
, then click the Add icon in the main display
area. The New GTP Object dialog box appears.
2.
In the Info tab, configure the following settings:
•
For Name, enter
GPRS1
, then enter a color and comment for the object.
•
Select
Sequence Number Validation
.
•
Select
GTP in GTP Denied
.
•
Leave all other defaults.
3.
In the GTP navigation tree, select
Traffic Logging/Counting
. Configure the following:
381
Copyright © 2010, Juniper Networks, Inc.
Chapter 8: Configuring Objects
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...