Check Point Software Technologies, Inc
Total Page:16
File Type:pdf, Size:1020Kb
FireWall-1_GX.book Page 1 Tuesday, March 27, 2007 10:03 AM FireWall-1 GX Administration Guide Version 4.0 October 2006 FireWall-1_GX.book Page 2 Tuesday, March 27, 2007 10:03 AM FireWall-1_GX.book Page 3 Tuesday, March 27, 2007 10:03 AM © 2003-2006 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: ©2003-2006 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security Alliance, Eventia, Eventia Analyzer, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, Open Security Extension, OPSEC, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge, SecurePlatform, SecuRemote, SecureXL Turbocard, SecureServer, SecureUpdate, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turboc ard, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 VSX, VPN-1 XL, Web Intelligence, ZoneAlarm, ZoneAlarm Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered trademark s of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935 and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications. For third party notices, see THIRD PARTY TRADEMARKS AND COPYRIGHTS. FireWall-1_GX.book Page 4 Tuesday, March 27, 2007 10:03 AM FireWall-1_GX.book Page 5 Tuesday, March 27, 2007 10:03 AM Contents Preface Who Should Use This Guide.............................................................................. 10 Summary of Contents....................................................................................... 11 Appendices ................................................................................................ 11 More Information ............................................................................................. 12 Chapter 1 GPRS/UMTS Overview A Global System for Mobile Communications...................................................... 14 General Packet Radio Services .......................................................................... 15 Universal Mobile Telecommunications System.................................................... 16 IP Multimedia Subsystem................................................................................. 17 Basic Components of GPRS/UMTS Networks ...................................................... 18 On the Network .......................................................................................... 18 Interfaces................................................................................................... 19 Signalling Protocol...................................................................................... 19 Comparing GTP Versions 0 and 1 ...................................................................... 21 Port Changes.............................................................................................. 21 Multiple PDP Contexts for the Same PDP Address.......................................... 21 Secondary PDP Context Activation................................................................ 22 Tunnel Update Initiated by the GGSN........................................................... 22 Delete Teardown Flag.................................................................................. 22 Chapter 2 Introducing FireWall-1 GX The Need for Security on GPRS/UMTS Networks................................................. 24 GTP - Insecure By Design ............................................................................ 24 Check Point Protects GPRS/UMTS Networks ...................................................... 25 The Check Point GPRS/UMTS Commitment................................................... 25 Overview of FireWall-1 GX............................................................................ 26 Logging, Alerts, and Reporting ..................................................................... 26 Before Installing FireWall-1 GX .................................................................... 26 Deploying FireWall-1 GX................................................................................... 27 Chapter 3 Securing GPRS/UMTS Networks Introduction to Securing GPRS/UMTS Networks.................................................. 30 GTP Protocol Security ...................................................................................... 31 Introduction to GTP Protocol Security ........................................................... 31 Understanding the Overbilling Attack............................................................ 31 Deleting PDP Contexts From the Command Line ............................................ 33 GTP-Aware Security Policy................................................................................ 34 Introduction to GTP-Aware Security Policy..................................................... 34 GSN Address Filtering ................................................................................. 34 GTP Tunnel Management/ User Traffic.......................................................... 35 Table of Contents 5 FireWall-1_GX.book Page 6 Tuesday, March 27, 2007 10:03 AM GTP Path Management Message Support ...................................................... 38 GTP Mobility Management Message Support ................................................. 39 Dynamic Configuration of New GTP Messages and Information Elements ......... 40 Intra-Tunnel Inspection .................................................................................... 41 Introduction to Intra-Tunnel Inspection......................................................... 41 GTP Address Anti-Spoofing.......................................................................... 41 Block GTP in GTP....................................................................................... 42 MS to Gn Network Policy Enforcement.......................................................... 43 APN Domain End User Address Enforcement................................................. 43 Wildcard APN Matching .............................................................................. 44 MS to MS Policy Enforcement...................................................................... 44 Mobile Subscriber Traffic Security..................................................................... 46 Cellular Specific Services ................................................................................. 47 WAP.......................................................................................................... 47 MMS Over WAP .......................................................................................... 47 Configuring Security......................................................................................... 48 Creating a Basic Security Policy ................................................................... 48 Enabling Overbilling Attack Protection .......................................................... 54 Enforcing a More Granular GTP Security Policy.............................................. 58 Using FW SAM to Close PDP Contexts .......................................................... 69 Adding Support for New GTP Messages and Information Elements .................. 71 Adjusting Settings with GUI Dbedit .............................................................. 72 Chapter 4 Using QoS to Manage GTP Bandwidth Introduction to GTP Bandwidth Management using QoS ...................................... 76 How it Works................................................................................................... 77 Unsupported Features ...................................................................................... 79 Configuring QoS with FireWall-1 GX................................................................... 80 Chapter 5 Monitoring GPRS Network Security Introduction to Monitoring GPRS Network Security ............................................. 82 GTP Tracking Logs and Alerts ..........................................................................