Simplifying Security for Mobile Networks

Similar documents
Managing the Migration to IPv6 Throughout the Service Provider Network White Paper

Large FSI DDoS Protection Reference Architecture

Securing LTE Networks What, Why, and How

OPTIMIZE. MONETIZE. SECURE. Agile, scalable network solutions for service providers.

Complying with PCI DSS 3.0

Deploying a Next-Generation IPS Infrastructure

F5 and Nuage Networks Partnership Overview for Enterprises

Deploying a Next-Generation IPS Infrastructure

Enhancing VMware Horizon View with F5 Solutions

Network Functions Virtualization - Everything Old Is New Again

Unified Application Delivery

Multi-Tenancy Designs for the F5 High-Performance Services Fabric

Prompta volumus denique eam ei, mel autem

The Myth of Network Address Translation as Security

Protecting Against Application DDoS A acks with BIG-IP ASM: A Three- Step Solution

Securing the Cloud. White Paper by Peter Silva

Validating Microsoft Exchange 2010 on Cisco and NetApp FlexPod with the F5 BIG-IP System

Archived. h h Health monitoring of the Guardium S-TAP Collectors to ensure traffic is sent to a Collector that is actually up and available,

Enabling Long Distance Live Migration with F5 and VMware vmotion

Meeting the Challenges of an HA Architecture for IBM WebSphere SIP

Improving VDI with Scalable Infrastructure

The F5 Intelligent DNS Scale Reference Architecture

The Programmable Network

Geolocation and Application Delivery

Data Center Virtualization Q&A

F5 Reference Architecture for Cisco ACI

WHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN

Optimize and Accelerate Your Mission- Critical Applications across the WAN

Considerations for VoLTE Implementation

Optimizing NetApp SnapMirror Data Replication with F5 BIG-IP WAN Optimization Manager

ANNUAL REPORT SOLUTIONS FOR AN APPLICATION WORLD.

VMware vcenter Site Recovery Manager

OVERVIEW. Virtual Solutions for Your NFV Environment

Load Balancing 101: Nuts and Bolts

DESIGN GUIDE. VMware NSX for vsphere (NSX-v) and F5 BIG-IP Design Guide

Archived. Configuring a single-tenant BIG-IP Virtual Edition in the Cloud. Deployment Guide Document Version: 1.0. What is F5 iapp?

Load Balancing 101: Nuts and Bolts

Solutions Guide. F5 solutions for the emerging 5G landscape

The F5 Application Services Reference Architecture

Protect Against Evolving DDoS Threats: The Case for Hybrid

Distributing Applications for Disaster Planning and Availability

Deploying the BIG-IP LTM with IBM QRadar Logging

Automating the Data Center

Deploying the BIG-IP System v11 with DNS Servers

Archived. Deploying the BIG-IP LTM with IBM Cognos Insight. Deployment Guide Document version 1.0. What s inside: 2 Products and versions tested

Deploying the BIG-IP System with Oracle Hyperion Applications

Prompta volumus denique eam ei, mel autem

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

Session Initiated Protocol (SIP): A Five-Function Protocol

Providing Security and Acceleration for Remote Users

Resource Provisioning Hardware Virtualization, Your Way

Vulnerability Assessment with Application Security

Control and Optimize Your 4G LTE Network with Diameter

Deploying the BIG-IP System with CA SiteMinder

Addressing Security Loopholes of Third Party Browser Plug ins UPDATED FEBRUARY 2017

Managing BIG-IP Devices with HP and Microsoft Network Management Solutions

F5 iapps: Moving Application Delivery Beyond the Network

BIG-IP Global Traffic Manager

Enabling Flexibility with Intelligent File Virtualization

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

A Practical Approach to IPv6

Never Drop a Call With TecInfo SIP Proxy White Paper

Maintain Your F5 Solution with Fast, Reliable Support

SOA Infrastructure Reference Architecture: Defining the Key Elements of a Successful SOA Infrastructure Deployment

Changing the Voice of

Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems

Sichere Applikations- dienste

The Dynamic DNS Infrastructure

SOLUTION GUIDE. F5 Security Solutions

SEVEN Networks Open Channel Traffic Optimization

A GUIDE TO DDoS PROTECTION

Document version: 1.0 What's inside: Products and versions tested Important:

TCP Optimization for Service Providers

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

Server Virtualization Incentive Program

Protecting Against Online Banking Fraud with F5

F5 IPv6 Solutions. Ariel Santa Cruz FSE SoLA F5 Networks Inc. F5 Networks, Inc.

How to Future-Proof Application Delivery

Benefits of SD-WAN to the Distributed Enterprise

Hitachi Unified Compute Platform Pro for VMware vsphere

F5 in AWS Part 3 Advanced Topologies and More on Highly Available Services

Pulse Secure Application Delivery

SNMP: Simplified. White Paper by F5

VMware vsphere 4. The Best Platform for Building Cloud Infrastructures

Virtualized Network Services SDN solution for enterprises

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III

Global Distributed Service in the Cloud with F5 and VMware

Intel Network Builders Solution Brief. Etisalat* and Intel Virtualizing the Internet. Flexibility

Technical and Service Provider Breakouts

F5 icontrol. In this white paper, get an introduction to F5 icontrol service-enabled management API. F5 White Paper

Cisco SAN Analytics and SAN Telemetry Streaming

eclipse packet node aviat networks transforming networks to all-ip

Deploy F5 Application Delivery and Security Services in Private, Public, and Hybrid IT Cloud Environments

SECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Optimizing your network for the cloud-first world

Myths of Bandwidth Optimization

Secure Mobile Access to Corporate Applications

Creating a Hybrid ADN Architecture with both Virtual and Physical ADCs

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Transcription:

Simplifying Security for Mobile Networks Communications service providers face an array of complex challenges, from network growth and increasing security threats to technology transitions. The comprehensive F5 S/Gi firewall solution ensures security and high availability, provides insight for new services and revenues to protect margins, and positions CSPs for more growth in the future. White Paper by Geoffrey Huang

Introduction At a time of growing demand on their mobile networks, communications service providers (CSPs) are increasingly challenged to provide highly available service and excellent subscriber experiences without further eroding service margins. Several trends are working against CSPs: the exploding number of subscriber devices, the expanding use of bandwidth-intensive applications such as video streaming, and two significant and simultaneous technology transitions the IPv4 to IPv6 migration and the 3G to 4G/LTE migration. In the face of these challenges, CSPs still need to plan for growth. The shift to LTE which provides higher bandwidth and more reliable connections virtually guarantees additional bandwidth consumption by subscribers, as well as a substantial increase in the number of connections per subscriber. Meanwhile, malicious attackers are advancing on another front, threatening the availability of the mobility infrastructure itself. Providing security for the mobility infrastructure and for mobile subscriber connections has been the task of network firewalls deployed at the Gi interface for 3G networks and at the SGi interface for 4G/LTE networks. Until now, the only options have been legacy firewalls with limited scale and performance. While some of these legacy firewalls offer new line cards with better scaling, they still only represent incremental scale improvement not the generational shift in architecture needed to match the generational shift in mobile network standards. As a consequence of the limitations of such legacy systems, CSPs planning for growth must include additional instances of firewalls to keep pace with demands while maintaining secure services. This leads to not only a significant increase in capital expenditures, but also additional strain on the network operations team and the resulting increase in operational costs. Fortunately, there is another solution that incorporates high availability, security, and immense scalability, while positioning CSPs with the flexibility and unified management necessary to ease technology transitions and infrastructure changes. That answer is the F5 S/Gi firewall solution. Ensuring Network Availability The first challenge to network availability is malicious activity. The IP infrastructure of mobile CSP networks is subject to the same increase in attacks endured by wireline and application networks today. With mobile networks, attacks can be mobileto-mobile, Internet-to-mobile, or mobile-to-infrastructure. 1

Attack Type Mobile-tomobile Internet-tomobile Mobile-toinfrastructure Resulting Damage Virus-infected mobile devices scan each other to look for the next victim, bogging down the radio access network (RAN) and mobility infrastructure. High-scale sweeps and floods degrade the RAN and mobility infrastructure, as well as the customer experience. Mobile devices can launch attacks directed at the CSP infrastructure, leading to outages and data loss. Figure 1: Mobile networks are under attack on multiple fronts. In all cases, the result is the same as in any distributed denial-of-service (DDoS) attack: the network degrades or becomes unavailable. Just as with a wire-line infrastructure, the first line of defense for a mobility infrastructure is the firewall. Basic perimeter protection is necessary to separate the mobility infrastructure from the Internet. For GSM networks, this perimeter is protected at the Gi interface, and CDMA networks are similarly protected at an analogous part of the mobile network. In 4G/LTE networks, perimeter protection is done at the SGi interface. Preparing for the Future In the face of increasing attacks, CSPs still need to run their businesses: securing subscribers today while simultaneously planning for the future. As part of a CSP's day-to-day network operations, standard functions such as service enforcement are critical. For instance, a CSP must segment its IP network, allowing only specific devices on its mobile infrastructure to gain access to or from internal and external applications and services. Such segmentation commonly: Defines security policies that enforce the acceptable-use policy for different subscriber plans. Customizes security policies for enterprise customers. Provides restricted network access for over-the-air firmware updates. Restricts Internet endpoints connecting to mobile devices. Limits abusive applications and services. Aside from these standard aspects of the mobility infrastructure, CSPs are busy 2

Aside from these standard aspects of the mobility infrastructure, CSPs are busy rolling out (or planning the roll out of) 4G/LTE. Without a doubt, LTE has significant implications for CSP operations. On the one hand, the technology brings increased bandwidth per subscriber, but on the other, modern devices consume more concurrent connections due to their increased processing power and highbandwidth network access. CSPs that already have LTE networks need to execute their deployments efficiently controlling expenses while deploying long-life equipment that can scale as needed. CSPs that have not yet rolled out LTE need to begin planning today for tomorrow's network. This means deploying 3G infrastructure equipment that not only has the capacity for scaling vertically to accommodate the higher bandwidth and connection needs of 4G/LTE, but also the ability to scale horizontally to add additional functionality without more equipment. With all this going on, CSPs must also manage IPv4 address exhaustion and the migration to IPv6. This migration pressure is exacerbated by the increasing number of subscriber devices and the demands of all-ip LTE infrastructure deployments. Migration to a voice-over-lte (VoLTE) approach makes the problem even worse, as it requires always-on connectivity. CSPs must protect their security infrastructure investments and minimize operational impacts by deploying systems that handle IPv6 with minimal performance or scale degradation compared to IPv4. These systems must also handle the transition from IPv4 to IPv6 seamlessly. Beyond the need to support IPv6, CSPs are also looking for ways to maximize the efficiency of routing traffic within their networks. Visibility into subscriber traffic patterns is essential for this kind of efficiency, which helps reduce costs by gaining the maximum utilization of existing network resources. Paramount to maximizing efficiency is the insight that comes from visibility into subscriber traffic patterns. CSPs can use this insight to offer new types of services that can increase the revenue per subscriber. Massive Density: The F5 Way 3

Massive Density: The F5 Way The F5 solution to these issues is the S/Gi firewall, which separates the mobility infrastructure from threats on the Internet as well as threats from other subscribers. The F5 S/Gi firewall is so named because it is ideal for both 3G deployments at the Gi interface and 4G/LTE deployments at the SGi interface. The foundation of this solution is F5 BIG-IP Advanced Firewall Manager (AFM), the highest scaling, highest performing network firewall on the market. The S/Gi firewall solution optionally includes BIG-IP Carrier-Grade NAT (CGNAT), which enables high-scale, seamless migration of IPv4 to IPv6 on a single platform. To manage firewall policies across the network, F5 offers BIG-IQ Security, a central management solution built on top of the extensible BIG-IQ platform, which facilitates the federation of application network and delivery services across clouds, regardless of their underlying network standards frameworks. Finally, CSPs can take advantage of the F5 intelligent services framework, which enables the deployment of additional network and security functions on the same BIG-IP platform. The World's Most Scalable, Highest Performing Firewall Handling up to 576 million concurrent connections on a single, unified device, BIG- IP AFM has the capacity to meet the future needs of the most demanding networks. BIG-IP AFM also has the performance, with up to 640 Gbps of throughput and the ability to process 8 million connections per second. When deployed on F5 VIPRION chassis platforms, BIG-IP AFM provides exceptional linear scalability. When CSPs need more capacity or performance, they simply add a blade to the chassis. At the same time, the VIPRION platform streamlines network operations with a single type of blade that provides network interface ports, security, and management services. This not only simplifies expansion, but also eases the management of spare blades for contingency planning. As part of its core functionality, the BIG-IP AFM network firewall enables operators to delineate network boundaries based on the common security building blocks: prefixes, protocols, ports, VLANs, route domains, and virtual servers. Thus CSPs can secure service offerings and implement flexible security models with the lowest cost. Defense Against A acks 4

Defense Against A acks BIG-IP AFM defends the mobility infrastructure and mobile subscribers from attacks, regardless of the source of the attacks. This capability includes mitigation of large-scale DDoS attacks such as network floods, port scans and sweeps, or connection floods. By detecting and stopping these types of attacks, BIG-IP AFM can prevent congestion and overloading of the control and bearer planes of the radio access network. BIG-IP AFM protection against DDoS attack vectors continues to increase with each version released, and with many BIG-IP platforms, DDoS protection functions are accelerated with specialized hardware. BIG-IP AFM offers the protection of a full-proxy firewall, meaning that it fully terminates and inspects incoming client connections for threats. The end result, and the benefit to CSPs, is the assurance of network availability and an improved subscriber experience. Built with Availability in Mind As with all F5 solutions, BIG-IP AFM, BIG-IP CGNAT, and the other modules that comprise F5's S/Gi firewall solution are built with availability in mind. At the platform level, F5 hardware architectures provide redundant power supplies that can be hotswapped. On the multi-line-card VIPRION chassis, the line cards can also be hotswapped. At the system level, BIG-IP solutions provide active/active and active/standby high availability, with multiple levels of redundancy. At layer 2, BIG-IP devices support link aggregation technologies such as LACP. At layer 3, the BIG-IP system achieves redundancy by monitoring next-hop status, routing table information, and ICMP probes. Finally, at the software level, the F5 TMOS operating system that forms the basis of the BIG-IP system provides configuration and session synchronization. Advanced functionality such as automatic failback the ability to revert to the primary system in a high-availability cluster is also supported. High-Scale, Seamless IPv4 to IPv6 Transition Since the network perimeter separates the "inside" of the mobility infrastructure from the "outside" Internet, it makes an ideal location to handle address translation. Networks that currently run IPv4 addressing are faced with a dwindling pool of available public addresses but the number of subscriber devices these networks need to support is increasing. BIG-IP CGNAT solves this problem, and it does so at a high scale. At the same time, the BIG-IP system natively supports IPv6 while minimizing 5

At the same time, the BIG-IP system natively supports IPv6 while minimizing degradation in scale. BIG-IP CGNAT simplifies the migration from IPv4 to IPv6, supporting a variety of transition technologies: NAT64, DNS64, DS-Lite, and deterministic NAT. This means that CSPs can deploy the S/Gi firewall solution for both IPv4 and IPv6 on a single platform. Combine this advantage with massive scalability, and the network investment is protected for years to come. Centralized Management with BIG-IQ Security To manage policies for a network of multiple firewalls, F5 offers BIG-IQ Security, an advanced central management solution. BIG-IQ Security provides several key features to simplify the management of distributed network security: Management authority over BIG-IP AFM instances. Firewall policy management, including policy search, viewing, creation, editing, and deployment, with a contextually aware, modern user interface. Audit logging that delivers the ability to track changes for compliance and troubleshooting. The log includes information about who made a change, when the change was made, and what the change was. Monitoring that enables administrators to view the activity across policies and provides a useful way to tune policies. Simplify and Secure the Network The F5 S/Gi firewall solution takes advantage of the F5 intelligent services framework. This means that CSPs can layer additional functionality within a common architecture, simplifying the network even further. This additional functionality is available as licensable solution modules, eliminating the need for, and administrative challenges of, separate hardware from different vendors. Optional modules include networking functions such as: BIG-IP Policy Enforcement Manager (PEM), providing carrier-class subscriber and application visibility, policy enforcement, and traffic steering. This module helps CSPs not only maximize the efficiency of the existing infrastructure, but also delivers insights into new types of subscriber services to offer. BIG-IP Local Traffic Manager (LTM), providing high-scale traffic management and load balancing. BIG-IP Global Traffic Manager (GTM), providing a complete DNS-based infrastructure solution including DNS DDoS protection. Security for the Next-Generation Mobile Network Available security modules include: BIG-IP Application Security Manager (ASM), providing security for webbased applications as well as application-layer DDoS protection. BIG-IP Access Policy Manager (APM), providing flexible application access 6

BIG-IP Access Policy Manager (APM), providing flexible application access management and user access management. Additionally, added contextual information is available through IP intelligence and geolocation, which gives CSPs the ability to make policy decisions based on IP address reputations and location information. Conclusion CSPs are under consistent pressure to streamline operations and increase service margins. Yet the simultaneous complexities of defending against attacks while preparing for disruptive technology shifts are complicating matters. The F5 S/Gi firewall solution enables CSPs to protect their mobility infrastructures and subscribers with BIG-IP AFM, the highest-scaling, highest-performing network firewall on the market. Likewise, CSPs can deploy BIG-IP CGNAT for high-scale IPv4 address management and IPv4 to IPv6 migration. The results of this unmatched service performance and density are significant cost reduction and network simplification, with room to grow to meet future scale demands. The vertical scalability of the S/Gi firewall solution is matched by the solution's horizontal scalability that is, its ability to add functionality within a common solution architecture. This flexibility is made possible by the F5 intelligent services framework, which consolidates multiple network and security functions within one unified framework. With the S/Gi firewall solution, F5 enables CSPs to deliver an excellent subscriber experience by ensuring the security and availability of the mobile network. The massive scalability and excellent programmability of F5 products protect providers from an unknown future full of complex threats, bringing certainty of highly available security, at scale, to that future. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888-882-4447 www.f5.com Americas info@f5.com Asia-Pacific apacinfo@f5.com Europe/Middle-East/Africa emeainfo@f5.com Japan f5j-info@f5.com 2015 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. No Doc Number Available 0113 7