Vulnerabilities of Mobile Internet (Gprs)

Total Page:16

File Type:pdf, Size:1020Kb

Vulnerabilities of Mobile Internet (Gprs) VULNERABILITIES OF MOBILE INTERNET (GPRS) Dmitry Kurbatov Sergey Puzankov Pavel Novikov 2014 CONTENTS 1. INTRODUCTION 3 2. SUMMARY 3 3. MOBILE NETWORK SCHEME 4 4. GTP PROTOCOL 5 5. SEARCHING FOR MOBILE OPERATOR’S FACILITIES ON THE INTERNET 7 6. THREATS 10 6.1. IMSI BRUTE FORCE 10 6.2. THE DISCLOSURE OF SUBSCRIBER’S DATA VIA IMSI 11 6.3. DisCONNECTION OF AUTHORIZED SUBSCRIBERS FROM THE INTERNET 12 6.4. BLOCKING THE CONNECTION TO THE INTERNET 13 6.5. INTERNET AT THE EXPENSE OF OTHERS 14 6.6. DATA INTERCEPTION 15 6.7. DNS TUNNELING 16 6.8. SUBSTITUTION OF DNS FOR GGSN 17 7. CONCLUSION AND RECOMMENDATIONS 18 VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 2 1. INTRODUCTION Modern mobile networks facilitate the most convenient access to the to this, a great number of security solutions were introduced to pro- Internet without the need for static infrastructures. People can access tect this services sector, such as antivirus software, firewalls, etc. By email, messengers, social networks and online stores whenever and contrast, the level of consciousness about security while using the wherever they need it. A range of businesses use mobile Internet for mobile Internet is relatively low. Most users assume that mobile net- remote administration, financial operations, e-commerce, M2M and work access is much safer because a big mobile-telecoms provider some other purposes. Government organizations provide more and will protect subscribers and has the benefit of the developments in more services via the web, and it results in a significant increase in security from the broadband Internet arena. Unfortunately, as prac- the volume of the world’s mobile data traffic. This traffic is expected tice shows, mobile Internet is a great opportunity for the attacker, to increase significantly in both 3G/3.5G and 4G through 2018, see and can be less secure than more traditional options. This report will table below. provide an analysis of these threats, as well as recommendations to Many users have approached the use of broadband Internet access ensure the safety of mobile Internet services. with caution, due to publicity around security breaches. In response Exabytes per Month 18 16 3% 14 12 46% 10 8 6 4 51% 2/2.5G 9% 2 3/3.5G 60% 0 4G 30% 2013 2014 2015 2016 2017 2018 Source: Cisco VNI Mobile 2014 Fig. 1. The expected growth in mobile data traffic [1] 2. SUMMARY Positive Technologies has determined that there are serious security 2. Obtaining subscriber’s data via IMSI (including his/her location) issues in the networks that support mobile Internet devices. A large 3. Disconnection of subscribers from the Internet or blocking their number of devices belonging to 2G/3G networks of mobile network access to the Internet operators are available via open GTP ports as well as some other open 4. Connecting to the Internet with credentials of the legitimate communication protocols (FTP, Telnet, HTTP). An attacker can connect user and at the expense of others to the node of a mobile network operator by exploiting vulnerabilities 5. Listening to the traffic of the victim (for example, default passwords) in these interfaces. 6. Engage in a fishing attack Having acquired access to the network of any operator, an at- tacker can automatically gain access to the GRX network, which in Security measures required to protect against such attacks include turn allows him/her to perform various attacks on subscribers of any proper configuration of equipment, utilizing a firewall and regular se- operator: curity monitoring. More details on the recommended set of protec- 1. Searching for valid IMSI tive measures is provided in the final part of this review. 2 VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 3 3. MOBILE NETWORK SCHEME Fig. 2. Provider’s mobile network Mobile provider’s network consists of the Circuit Switched Core • Subscriber’s Mobile Station Network (CS core), the Packet Switched Core Network (PS core), • The Internet the base station network and its 2G controllers (BSC and BTS in the • The GRX network, i.e. via another mobile provider scheme), and the base station network and its 3G controllers (Node Thus if an attacker enters the network of any mobile provider in the B and RNC). The scheme shows that 3G network is based on 2G radio world, he/she will be able to affect other providers. access network; the rest of the operator’s network does not undergo Service GPRS Support Node (SGSN) and Gateway GPRS Support any significant changes in the evolution to the third generation. As Node (GGSN) are the basic elements for data transmission. The former clearly outlined in Figure 2.2, the operators’ networks have not under- one is used to provide subscribers with data transmission services and gone any significant changes in terms of security from 2G to 3G to 4G. it also interacts with other network elements; the latter is a gateway Below is the packet data transfer subsystem (PS core). between the internal operator’s network and the Internet. The scheme in Figure 3 illustrates the architecture of the system In addition to the Internet connection, there is a connection to used to transmit data in a 2G network. There are some differences in the GRX network — Global Roaming eXchange, which is based on the chain MS (mobile station) — SGSN within the 3G network (UMTS complicated relationships between individual operators (intercon- network). The scheme shows that an attacker can access the provid- nection of networks) used to provide Internet access to subscribers er’s network using: in roaming. VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 4 Fig. 3. A scheme for the packet data transmission within mobile networks (including information on protocols) 4. GTP PROTOCOL GTP protocol is used to send the traffic within PS core and GRX. This is a other information) contains the login, password, and APN. tunneling protocol, which runs over UDP and utilizes port 2123 (for man- 2. After receiving the APN, SGSN tries to resolve it on the internal agement purposes, GTP-C), port 2152 (for transmitting user data, GTP-U), DNS server; the server resolves the received APN and provides the cor- and 3386 (for billing, GTP’). responding GGSN address. Message Type field in the GTP header is primarily used for manage- 3. The SGSN sends the Create PDP Context request to this address. ment purposes in GTP-C. Usually, in GTP-U Message Type = 0xFF (T-PDU). 4. The GGSN authenticates the submitted login and password, for ex- Tunnel Endpoint Identifier (TEID) is a tunnel identifier that is not associ- ample, on the RADIUS server. ated with an IP address, i.e., packages can be sent with the same TEID but 5. The GGSN obtains an IP address for the mobile phone and transmits from different IP addresses (in case if the subscriber moves and switches all data required for PDP context activation back to the SGSN. to another SGSN). 6. The SGSN accomplishes the activation procedure by sending back PDP Context Activation procedure is executed when the subscriber is to the phone all the data required for establishing a connection. connecting to the Internet. In fact, the PDP Context Activation procedure is the creation of a tun- In simplified form, the procedure is as follows: nel between a cell phone and a gateway (GGSN) on the operator’s mo- 1. The phone sends an Activate PDP Context request, which (amongst bile network. 4 VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 5 Octets 8 7 6 5 4 3 2 1 1 Version PT (*) E S PN 2 Message Type 3 Length (1st Octet) 4 Length (2nd Octet) 5 Tunnel Endpoint Identifier (1st Octet) 6 Tunnel Endpoint Identifier (2nd Octet) 7 Tunnel Endpoint Identifier (3rd Octet) 8 Tunnel Endpoint Identifier (4th Octet) 9 Sequence Number (1st Octet)1) 4) 10 Sequence Number (2nd Octet)1) 4) 11 N-PDU Number2) 4) 12 Next Extension Header Type3) 4) NOTE 0: (*) This bit is a spare bit. It shall be sent as '0'. The receiver shall not evaluate this bit. NOTE 1: 1) This field shall only be evaluated when indicated by the S flag set to 1. NOTE 2: 2) This field shall only be evaluated when indicated by the PN flag set to 1. NOTE 3: 3) This field shall only be evaluated when indicated by the E flag set to 1. NOTE 4: 4) This field shall be present if and only if any one or more of the S, PN and E flags are set. Fig. 4. GTP header structure PDP Context Activation SGSN DNS GGSN RADIUS DHCP 1. Activate PDP 2a. DNS Request 4a. Radius Authenticate Context Request mncXXX.mscXXX.internet Request 2b. DNS Response GGSN IP 4b. Radius Authenticate Response 3. Create PDP Context Request 5a. DHCP Address Request 7. Activate PDP 6. Create PDP Context Response 5a. DHCP Address Assignment Context Accept GTP U GTP C + GTP U Fig. 5. The procedure for establishing a connection VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014 6 5. SEARCHING FOR MOBILE OPERATOR’S FACILITIES ON THE INTERNET We already know that GGSN must be deployed as an edge device. Us- find the required devices by their banners. ing Shodan.io search engine for Internet-connected devices, we can Fig. 6. Search results in Shodan Search result displays about 40 devices using this abbreviation in the world creates this opportunity for attack to many other mobile their banners. The screenshot provides a list of some devices that use networks. There are more ways of using the compromised boundary this abbreviation, including devices with open Telnet and turned off host, for example, DNS spoofing attack (more information about at- password authentication.
Recommended publications
  • User Manual + Apn Settings for All Wireless Carriers in Usa
    www.iDroidUSA.com USER MANUAL + APN SETTINGS FOR ALL WIRELESS CARRIERS IN USA **User Manual in Española, French, Dutch and German is available for Download on Website: www.iDroidUSA.com Facebook Page: www.Facebook.com/iDroidUSA Twitter: @iDroidUSA USA: (215) 589-7118 USA: (713) 574-4737 CANADA: (604) 449-0055 EUROPEAN UNION: +32 487 888 888 Support Email: [email protected] 1 Notice Reproduction or distribution of this manual in any form is prohibited without prior written consent from the Company. The Company retains the right to modify and improve on any product described within this handbook without prior notice. Regardless of the circumstances, the Company shall not assume any liability for any data loss or any other type of losses; or for any special event or accidental damage caused directly or indirectly to or by the device. The content of this manual is provided as is and does not offer any kind of warranties, express or implied, for the accuracy, reliability of the content including, but not limited to, the implied warranty of merchantability and practical guarantee for a particular purpose unless specified by applicable law. The Company reserves the power to amend or withdraw any clause or warranty, in full, at any time without prior notice in this manual. The pictures in this manual are for reference only; if any individual picture does not match with the product please refer to the product material provided within this handbook as a standard. Many network functions described in this manual are special services provided by individual Network Service Providers which are independent of the Company.
    [Show full text]
  • IR.33 GPRS Roaming Guidelines V7.0
    GSM Association Non-confidential Official Document IR.33 - GPRS Roaming Guidelines GPRS Roaming Guidelines Version 8.0 20 May 2015 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2015 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V8.0 Page 1 of 32 GSM Association Non-confidential Official Document IR.33 - GPRS Roaming Guidelines Table of Contents Introduction 4 Overview 4 Scope 4 1 Architecture and Interfaces 4 1.1 1.1 Definition of Terms 5 1.1.11.2 Document Cross-References
    [Show full text]
  • Download Our Sim Card Userguide
    Before leaving, download the My DataSIM app with a Wi-Fi connection: Welcome! We are happy to have you as a new customer! Getting started Once arrived at your travel destination, detach the SIM card in the format corresponding to your device* and insert. Then take a few minutes to configure your device in 3 steps: Configure your APN settings (Access Point Name) as follows: Need more help? Find our videos on: APN = mobiledata / Username = mobiledata www.transatel-datasim.com/video-tutorials All other fields should be left empty For detailed help, please see the reverse side of this form. Activate data roaming and 4G connection in your settings. No worries, there won’t be any extra charges with the data roaming option ON. For detailed help, please see the reverse side of this form. Create your account to check your balance and recharge your SIM card. Using your Transatel DataSIM card’s 3G/4G connection: Open your My DataSIM app and fill in your information. *Make sure your device is not Or simply go to: https://tds-selfcare.com carrier-locked You can now start surfing the web! Checking your balance/recharging Once logged into your My DataSIM account, you can (free of charge): Check your credit Recharge for Buy a recurring and data allowance 100+ destinations bundle Help for configuration APN and data roaming are not situated in the same menus, depending on the device. Please follow the guide below: CONFIGURING APN SETTINGS ENABLING DATA ROAMING ENABLING 4G/LTE Settings More settings Settings More Mobile networks Settings More settings Mobile
    [Show full text]
  • LTE Initial Default Bearer a Quick Overview Application Note
    LTE initial default bearer A quick overview Application note Abstract Introduction to LTE initial default bearer for TOBY-R2, LARA-R2 and TOBY-L2 series modules. www.u-blox.com UBX-20015573 - R01 LTE initial default bearer - Application note Document information Title LTE initial default bearer Subtitle A quick overview Document type Application note Document number UBX-20015573 Revision and date R01 10-Jun-2020 Disclosure restriction This document applies to the following products: Product name TOBY-R2 series LARA-R2 series TOBY-L2 series u-blox or third parties may hold intellectual property rights in the products, names, logos and designs included in this document. Copying, reproduction, modification or disclosure to third parties of this document or any part thereof is only permitted with the express written permission of u-blox. The information contained herein is provided “as is” and u-blox assumes no liability for its use. No warranty, either express or implied, is given, including but not limited to, with respect to the accuracy, correctness, reliability and fitness for a particular purpose of the information. This document may be revised by u-blox at any time without notice. For the most recent documents, visit www.u-blox.com. Copyright © u-blox AG. UBX-20015573 - R01 Page 2 of 11 LTE initial default bearer - Application note Contents Document information ................................................................................................................................ 2 Contents .........................................................................................................................................................
    [Show full text]
  • Use Your Mobile Devices in More Places to Conduct More Business Work Smarter with Accessmylan from AT&T
    AT&T Business Solutions AccessMyLAN from AT&T Use your mobile devices in more places to conduct more business Work smarter with AccessMyLAN from AT&T Potential benefits: • Comprehensive remote access service • Access corporate resources from smartphones, tablets or laptops via the AT&T wireless network • 24x7 control with web administration • Integrates with existing SecurID, RADIUS and Active Directory • Security Features • Nothing to install on end user devices Remote access technology can help keep your workers • Easy management and control connected to each other while letting them build closer Pricing relationships with your customers. But the technology Monthly Service Charge needs to deliver an experience that’s as reliable and • $9.99 per end user device consistent as inside the office. Properly executed, it can help boost the power of your extended enterprise by bringing remote connectivity to new users. The Value Prop using the AT&T wireless network. The service provides flexibility on AccessMyLAN from AT&T is a how users connect and the ability flexible solution for enabling to grow as business needs remote and mobile workers with change. It can be deployed in access to email and business minutes with no changes to the applications. It’s unique on-demand business network and can be platform enables access from installed and managed even by smartphones, tablets, and laptops non-specialist staff. PRODUCT BRIEF AT&T Business Solutions AccessMyLAN from AT&T AccessMyLAN from AT&T Talet APN or VPN over AT&T wireless network SSL cceMyAN Secured email APN or VPN netorae and file access on the device reote acce plator AccessMyLAN VPN agent on customer LAN VPN over Wi-Fi Customer admin portal Cutoer netor Sartphone Just a click to connect mobile end users to the Asavie network-based remote access platform.
    [Show full text]
  • 2.5G/3G Core Network Testing with G35: the Foundation of Packet Switched Connectivity and Reliable IMS Services
    2.5G/3G Core Network Testing with G35: The Foundation of Packet Switched Connectivity and Reliable IMS Services Abstract With the advent of broadband mobile networks like UMTS This whitepaper introduces some of the key procedures and service platforms like IMS, the interaction between needed to establish sessions in the packet-switched them both is leading to entirely new test challenges. 2.5G/3G core network, as well as at the service layer. Ensuring superior end-user Quality of Experience (QoE) is In this document, we will use IMS sessions as specific adequately supported by the underlying UMTS core and example. Related test challenges and how they can be access network infrastructure is just one of these new test addressed by using Tektronix’ G35 protocol test platform challenges being faced by Network Equipment are then highlighted. Finally, the impact of new services Manufacturers and service providers alike. such as Push-to-Talk over Cellular (PoC) and Multimedia Broadcast and Multicast Services (MBMS) on the 2.5G/3G core network infrastructure are explained. White Paper I www.tektronix.com/G35 White Paper | 2.5G / 3G Core Network Testing with G35 Introduction The adoption of recently standardized UMTS R5 and R6 features like HSDPA and HSUPA is transforming mobile networks into real broadband communication systems. Declining voice revenues require carriers to seek out alternative sources of revenues by developing new services for their customers. The advent of IEEE 802.16e, commonly known as “Mobile WiMAX”, as alternative mobile broadband technology will reinforce this trend. With this new technology, competing service providers appear on the horizon, thereby enabling more and more end users to adopt and incorporate IP-based services into their daily lives.
    [Show full text]
  • LTE Cellular Connectivity on Windows OS
    LTE CELLULAR CONNECTIVITY ON WINDOWS LTE cellular connectivity on Windows operating system Purpose of the Document The purpose of this document is to explain how to setup and configure LTE cellular connectivity to the Internet on Windows operating system. This applies to LTE modems such as BG96, EG91, EG95, EC25, or Raspberry PI HAT. Document History Version Author Date Description A 5G HUB 02.27.2021 Initial Document Table of Contents Purpose of the Document .................................................................................................................... 2 Document History ................................................................................................................................ 2 1 Introduction ............................................................................................................................. 4 2 Install LTE&GNSS Windows Driver ........................................................................................... 5 3 Using the USIM card ................................................................................................................. 6 4 Setting the Access Point Name (APN) ...................................................................................... 6 5 Connecting Windows OS to the Internet ................................................................................. 9 6 Troubleshooting ..................................................................................................................... 12 1 Introduction This document describes
    [Show full text]
  • LTE Modem Models LB1120 and LB1121 User Manual
    LTE Modem Models LB1120 and LB1121 User Manual February 2017 202-11679-01 350 E. Plumeria Drive San Jose, CA 95134 USA LTE Modem LB1120 and LB1121 Support Thank you for purchasing this NETGEAR product.You can visit www.netgear.com/support to register your product, get help, access the latest downloads and user manuals, and join our community. We recommend that you use only official NETGEAR support resources. Conformity For the current EU Declaration of Conformity, visit http://kb.netgear.com/app/answers/detail/a_id/11621. Compliance For regulatory compliance information, visit http://www.netgear.com/about/regulatory. See the regulatory compliance document before connecting the power supply. Trademarks © NETGEAR, Inc., NETGEAR, and the NETGEAR Logo are trademarks of NETGEAR, Inc. Any non-NETGEAR trademarks are used for reference purposes only. 2 Contents Chapter 1 Introduction and Hardware Overview Introduction............................................................................................................7 Supported Mobile Broadband Bands.....................................................................7 Package Contents..................................................................................................8 Install the Micro SIM Card......................................................................................8 Top Panel With Status LEDs................................................................................11 Back Panel With Connectors, Buttons, and a Port...............................................12
    [Show full text]
  • SGSN CDR Field Descriptions
    SGSN CDR Field Descriptions This chapter describes the CDR fields supported by the system for use in SGSN. Listed below are the types of CDRs supported by SGSN: • SGSN CDRs (S-CDRs) • Mobility CDRs (M-CDRs) • Mobile originated SMS CDRs (S-SMO-CDRs) • Mobile terminated SMS CDRs (S-SMT-CDRs) • Mobile terminated location request CDRs (LCS-MT-CDRs) • Mobile originated location request CDRs (LCS-MO-CDRs) The following information is provided for each field: • Description: The field's description. • Format: The field's data format. • Length: The field's size, in bytes. Based on the following standards: • 3GPP TS 32.298 V6.5.0 (2006-09): 3rd Generation Partnership Project; Technical Specification Group Service and System Aspects; Telecommunication management; Charging management; Charging Data Record (CDR) parameter description (Release 6) • 3GPP TS 32.251 V6.10.0 (2007-06): 3rd Generation Partnership Project; Group Services and System Aspects; Telecommunication management; Charging management; Packet Switched (PS) domain charging (Release 6) Also see the SGSN CDR Field Reference chapter for information on CDR fields supported in S-CDRs and M-CDRs. • CDR Fields, page 2 GTPP Interface Administration and Reference, StarOS Release 21.6 1 SGSN CDR Field Descriptions CDR Fields CDR Fields Access Point Name Network Identifier The network identifier (NI) portion of the access point name (APN). The APN typically corresponds to a registered Internet domain name and represents the external packet data network (PDN). It is sent to the SGSN by the MS (or determined locally by the HLR or configuration) and is relayed to the GGSN in the Create PDP Context Request message.
    [Show full text]
  • Southern Asian Region SOUTHERN ASIAN
    For communications professionals in the southern Asian region SOUTHERN ASIAN WIRELESSCOMMUNICATIONS Q1 2021 Volume 14 Number 1 l Satellite: a thing of the past or a thing of the future? l The growing importance of FWA and Wi-Fi on the move l Southern Asian mobile fraud, according to Evina Experts in RF over Fiber SASIA 21Q1 p1 (Cover).indd 1 01/04/2021 17:12 NEWS 4 SOUTHERN AFRICAN WIRELESS COMMUNICATIONS January/February 2019 SASIA 19Q4 p4 (Rajant).indd 4 01/04/2021 13:03 SOUTHERN ASIAN CONTENTS COMMUNICATIONSWIRELESS Q1 2021 5 NEWS 5 NEWS u Volume 14 Cambodia’s NIG going ahead u Globe sees traffic spike Number 1 u Nokia chosen for 5G rollout u NBTC considers payment for 5G licences u SES supplies broadband to villages u Etisalat launches 4G LTE service u Wireless Logic expands global footprint 18 FEATURE I u Thaicom searches for LEO partner u Bangladeshi players fork out ViaLite designs and manufactures u Pakistan’s internet disrupted RF over fiber links and systems for a u Maldives to Sri Lanka subsea cable goes live range of applications including Satcom, 13 WIRELESS BUSINESS LEO and MEO; transporting satellite Vyke and x-Mobility sign two new deals for signals between antennas and control APAC expansion rooms. The links are also used in Mil- 25 FEATURE II 18 FEATURE Aero, Defence, Broadcast, Cellular and Shaping the future of satcoms Network Timing etc. ViaLite’s links 22 INDUSTRY VIEW include: L-Band HTS, VSAT, C-Band Evina’s David Lofti explains how mobile (covering 500 MHz-7.5 GHz), Hyper- carriers can stop the financial havoc Wide Dynamic Range, Ultra-Wideband, 25 FEATURE UHF/VHF, Satellite IF, SIGINT, GPS & 28 WIRELESS SOLUTIONS Fixed wireless access and Wi-Fi on the move more.
    [Show full text]
  • AVPN LMC Training Courses
    Wireless WAN (WWAN) with AT&T Commercial Connectivity Service (CCS) I. Service Overview II. Service Components, standard and options I. Service Overview Wireless WAN (WWAN) with AT&T Commercial Connectivity Service (CCS) is a network-based option that extends the reach of the corporate network to mobile devices and workers with security enhanced back-end connectivity between the customer’s WAN and the AT&T Mobility network. WWAN is ideal for backup connectivity for bandwidths up to T1.5 and for primary connectivity where wired network connectivity is unavailable. CCS with network-based connectivity to AVPN or IPeFR allows customers to connect directly to AT&T MPLS solutions using customer or 3rd party managed routers. The example here depicts a Cisco router with an integrated 3G HWIC to provide cellular capabilities. A customer with older Cisco routers that cannot accept the 3G HWIC, may choose to go with a dual router configuration, using one of the devices from the WWAN portfolio. This allows the continued use of existing resources and eliminates the need for costly router upgrades. WWAN with CCS works by configuring the routers with a CCS Access Point Name (APN) which segregates traffic from other customer traffic. Traffic is then routed from the Cellular network to the customer AVPN or IPeFR network via a backend connection between the Mobility network and the MPLS networks. Traffic from multiple customer remote locations is aggregated into a single stream based on the APN. Traffic does not traverse the public Internet and IPSec from the remote device is not required as part of the solution.
    [Show full text]
  • Access Point Name Setting - APN for India | Indian Mobile Operator | 15 November 2012 Update
    Search APN | Access Point Name | APN Settings India | Global Apn Settings | Mobile Internet Settings | GPRS Settings | EVDO Settings | 2G 3G 4G LTE Settings | Idea | Airtel | Aircel | Videocon | Uninor | Tata Docomo | Bsnl | Vodafone | Aircel | Reliance | 2G | 3G | 4G | APN Internet Settings | 2G 3G 4G Datacard Profile & APN Settings All about APN | Access Point Name | Learn | How it works? | How to Enter APN in Mobile | 2G 3G Datacard | TAB | Ipad1 | Ipad2 What is APN ( Access Point Name - Internet Term ) Access Point Name - APN is a computer protocol that typically allows a user's computer to access the Internet using the mobile phone or any mobile device network like internet datacard , tab, ipad, ipod etc. On a technical level it is a configurable network identifier used by a mobile device when connecting to a GSM carrier. The carrier will then examine this identifier to determine what type of network connection should be created, for example: what IP addresses should be assigned to the wireless device, what security methods should be used, and how/or if, it should be connected to some private customer network. More specifically, the Access Point Name (APN) identifies an IP Packet Data Network (PDN), that a mobile data user wants to communicate with. In addition to identifying a PDN, an APN may also be used to define the type of service, (e.g. connection to wireless application protocol (WAP) server, multimedia messaging service (MMS)), that is provided by the PDN. APN is used in 3GPP data access networks, e.g. general packet radio service ( GPRS ) , EDGE , 2G , 3G , 4G 5G , evolved packet core (EPC).
    [Show full text]