Gi and SGi Interfaces
Gi and SGi Interfaces
Gi and SGi Interfaces
Service Overview
As network traffic increases and
business initiatives evolve, network
security requirements may change.
Juniper Networks Mobile Data Center
SGi/Gi Security Evaluation service
enables wireless service providers to
determine if the security statement
and capabilities for their existing
mobile data centers are sufficient
for current and anticipated business
requirements.
The service provides analysis and
recommendations for enhancing
alignment between the existing
security statement and the security
capabilities currently in place with
regard to the SGi/Gi interface(s). Our
expert security consultants provide
guidance on how any identified
deficiencies can be addressed
and, where appropriate, make
recommendations to consider when
planning for future growth.
Service Description
Juniper Networks Mobile Data Center SGi/Gi Security Evaluation service is recommended
for large wireless service providers who:
Are deploying a Third-Generation Partnership Project (3GPP) Long Term Evolution (LTE) or
universal mobile telecommunications system (UMTS)
Have their own data center for mobile subscribers
Have a formal security statement (a documented guide that describes the security posture
including rules of engagement, log retention, who has change authorization, problem
resolution process, and related topics)
It is particularly applicable for organizations in which data center security is essential for
continued business operation, e.g., emerging or growing mobile carriers.
As network traffic increases and business initiatives evolve, the associated security
requirements of the network may change. These requirements will often vary from zone
to zone and even vary within a zone. In the 3GPP reference architecture, there are several
major zones in the network:
The evolved packet core (EPC) or mobile packet core (for UMTS) that handles the routing
of packets, anchors the mobile network, and is interconnected by the Mobile Packet
Network (MPN)
Mobile subscriber services such as the Home Location Register (HLR) for UMTS or legacy
2G networks, or the Home Subscriber Server (HSS) for LTE and UMTS networks
Operators IP-based services typically provided through the IP Multimedia Subsystem
(IMS), e.g., Voice over LTE delivered through IMS
Connection to enterprise customers services
Connection to the open Internet
Each of these network connections is defined by the SGi (LTE) or Gi (UMTS) interfaces.
The diagram below provides more details.
Gx
RNC
Mc
luC5(s)
MSC
MGW
GGSN
lur
Gp
Gn
luPS
Roaming
Partner
SGSN
Gi
RNC
56d
Gi
GN/53
Home
Subscriber
Server (HSS)
Internet
Gi
Gx
56a
54
Mobile
Management
Entity (MME)
Enterprise/
Services
SGi
Policy Charging
and Rules
Function (PCRF)
SGi
Gxc
Gx
511
SGi
Operators
IP Services
S5
Serving Gateway
(S-GW)
Figure 1: LTE and UMTS packet cores with SGi/Gi and Gi interfaces
The complexity of the environment makes it essential that
there is frequent review and enhancement of both the security
statement(s) and also the appliances in place to facilitate the
security. Many service providers that use firewall appliances plan
for a refresh cycle of at least five years; however, the speed of
change in business activities and traffic volume often initiate a
more frequent review of firewalls and associated security policies.
Examples of the times when companies should consider this
service include:
The requirement for different security considerations has evolved
since the security policy implementation, e.g., additional user
environments are now required.
The creation of a new security statement demands an audit
of existing security capabilities to ensure alignment of the
capabilities with the statement, e.g., the security statement is
being enhanced to incorporate policies driven by social media.
Anticipated increases in network traffic volume, or new business
initiatives, require evaluation of the potential for the current
environment to handle the expected changes and an understanding
of the requirement for enhanced security capabilities.
Review Current
Environments
(max of 4)
Security Statement
Current congurations
Trac data and anticipated growth
Review Security
Architecture
Develop
Enhancement
Recommendations
Security Statement
Network design
Service Deliverables
The Juniper consultant will provide a written report summarizing
the review and providing suggestions for improvements in SGi/
Gi environments. For example, the consultant will provide
suggestions about where to combine environments or create
additional environments, and recommend subsequent changes to
the security policies for these environments to align to the Security
Statement or to offer new services or additional protections.
Ordering Information
The Juniper Networks Mobile Data Center SGi/Gi Security
Evaluation service may be ordered using the part number
identified in the table below. You can also contact your Juniper
Account Manager for more details. For each engagement, a
statement of work (SOW) will be established outlining the scope
of effort to be performed.
Model Number
Name
PRO-MDC-SEC-EVAL
1119 PZ Schiphol-Rijk
or 408.745.2000
Phone: 31.0.207.125.700
Fax: 408.745.2100
Fax: 31.0.207.125.701
www.juniper.net
Copyright 2013 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,
NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered marks, or registered service marks are the property of
their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.