Open Log Viewer; Configuring Gtp Objects; Configuring Info; Limiting Gtp Message Length - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Configuring GTP Objects

Configuring Info

376
type will have a special dialog that allows you to edit the value contained within. After
saving the change, it is reflected in all rules using that object.

Open Log Viewer

You can open the Log Viewer from any rule in the policy. NSM will open the Log Viewer
screen to display only those logs that were generated as a result of the selected rule.
This option is available only if the policy has not been edited since the last time it was
pushed to a device. Otherwise, the action is displayed as disabled. You can right-click
the policy to access this option.
To enable a security device to manage GTP traffic, you must create a GTP object and
then apply it to a security policy rule. The rule with the GTP object defines how the device
handles GTP packets: If a GTP packet matches the rule, the device attempts to further
match the packet data with the parameters set in the GTP object.
For detailed information on GTP, refer to the Concepts & Examples ScreenOS Reference
Guide, Volume 13: General Packet Radio Service.
Using GTP objects, you can configure multiple rules that enforce different GTP
configurations in the same security policy. For example, you can configure a security
policy that enables a device to control GTP traffic differently based on source and
destination zones and addresses, action, and so on.
You configure GTP objects in the Object Manager. From the main navigation tree, select
Object Manager > GTP Objects, then click the Add icon to display the New GTP Object
configuration screens. For each object, you can configure the following settings:
"Configuring Info" on page 376
"Configuring Traffic Logging and Counting" on page 378
"Configuring IMSI Prefix and APN Filtering" on page 379
"Configuring GTP Message Filtering" on page 381
"Configuring Subscriber Tracing (Lawful Interception)" on page 381
The following sections detail each GTP setting. For an example on creating a GTP object,
see "Example: Creating a GTP Object" on page 381.
The Info settings define the basic properties of the GTP object, and specify how the
security device should handle GTP messages and tunnels.

Limiting GTP Message Length

To limit the length of a GTP message, you can specify the minimum and maximum
number of bytes permitted in a message length field. In the GTP header, the message
length field indicates the length of the GTP payload. It does not include the length of the
GTP header itself, the UDP header, or the IP header.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents