Applying IPS signatures to IP packets within GTP-U tunnels
GTP-U (GTP user data tunnelling) tunnels carry user data packets, signalling messages and error information. GTP-U uses UDP port 2152. Carrier-enabled FortiGate units can apply IPS intrusion protection and detection to GTP-U user data sessions.
To apply IPS to GTP-U user data sessions, add an IPS Sensor to a profile and add the profile to a security policy that accepts GTP-U tunnels. The security policy Service field must be set to GTP or ANY to accept GTP-U packets.
The Carrier-enabled FortiGate unit intercepts packets with destination port 2152, removes the GTP header and handles the packets as regular IP packets. Applying an IPS sensor to the IP packets, the Carrier-enabled FortiGate unit can log attacks and pass or drop packets depending on the configuration of the sensor.
If the packet is GTP-in-GTP, or a nested tunnel, the packets are passed or blocked without being inspected.
To apply an IPS sensor to GTP-U tunnels
- Go to Security Profiles > Intrusion Protection and select Create New (+) to add an IPS Sensor.
- Configure the IPS Sensor to detect attacks and log, drop, or pass attack packets. See the Intrusion Protection section of the FortiOS UTM Guide.
- Go to Policy & Objects > IPv4 Policy and apply the IPS sensor to the security policy.
- Go to Policy & Objects > IPv4 Policy and select Create New to add a security policy or select a security policy.
- Configure the security policy to accept GTP traffic.
In the security policy configure the source and destination settings to match the GTP traffic. Service to GTP or ANY so that the security policy accepts GTP traffic.
- Select the GTP profile within the security policy.
- Configure any other required security policy settings.
- Select OK to save the security policy.
GTP packets are not moving along your network
When GTP packets are not getting to their destination, this could be caused by any one of a number of issues. General troubleshooting principals apply here.
The following sections provide some suggestions on how to troubleshoot this issue:
- Attempt to identify the section of your network with the problem l Ensure you have an APN configured l Check the logs and adjust their settings if required l Check the routing table l Perform a sniffer trace
- Generate specific packets to test the network
Attempt to identify the section of your network with the problem
The first step is to determine how widespread this problem is. Does it affect the whole GPRS network, or just one or two devices?
If the entire network is has this problem, the solution is likely a more general one such as ensuring the security policies allow GTP traffic to pass, the GTP profile specifies SSGNs and GSGNs, or ensuring the GTP general settings are not overly limiting.
If one part of the network is affected, the problem is more likely centered around configurations with those network devices specified such as the handover group, or authorized SGSNs/GGSNs. It is also possible that small portions of the network may have hardware related issues such as cabling or faulty hardware. This section does not address those issues, and assumes hardware is not the problem.
The handover group is a whitelist of GTP addresses allowed to handle GTP messages. If a device’s address is not on this list, it will be denied.
GTP packets are not moving along your network
Ensure you have an APN configured
When you configure your GTP profile, ensure you first configure the APN. Without it, there will be no flow of traffic. The APN is used in nearly all GTP communications and without it, the Carrier-enabled FortiGate unit doesn’t have the information it needs.