MTAS Security Management Guide
MTAS

Contents

1Introduction
1.1Prerequisites
1.2Environment

2

Product Security Functionality
2.1Authentication
2.2Authorization
2.3Accountability
2.4Integrity
2.5Confidentiality

3

Security Configuration
3.1Procedures
3.2Recommended Periodic Operations
3.3Handling of Patches

4

Default Parameter Values

5

Services, Ports, and Protocols

6

Privacy
6.1Notice
6.2Consent
6.3Classification of Personal Data

1   Introduction

This document describes the security functions implemented by the Multimedia Telephony Application Server (MTAS). It also describes the security-related procedures that can be performed by the system administrators.

The MTAS is a telephony application server that is to be deployed as a virtualized network element in an IP Multimedia Subsystem (IMS) network. This deployment is referred to as a Virtualized Network Function (VNF). For details about MTAS, the supported functionality, and the nodes it communicates with, refer to vMTAS 1 Technical Product Description Common Features.

1.1   Prerequisites

This section describes the prerequisites; conditions and information required for performing security management on the MTAS.

1.1.1   Conditions

Before performing the procedures in Section 3.1 Procedures, ensure that the following conditions are met:

1.2   Environment

This section describes the environment requirements for product operations.

MTAS belongs to the core network and is not facing directly to access networks. In addition, the system is to be deployed behind a firewall which offers protection from external attacks.

MTAS is placed in the Service & Control Virtual Private Network (VPN) group which includes Network Functions handling signaling traffic without direct connection to external networks. This includes the following VPN for connecting the IMS Network Nodes in the group:

For more details, refer to MTAS Internal and External Connectivity.

2   Product Security Functionality

The following security functionality is supported in the product:

2.1   Authentication

2.1.1   O&M User Authentication

MTAS supports Local and Centralized O&M password-based user authentication, refer to:

2.1.2   Mutual Authentication of Communication Channel Peers

MTAS supports certificate-based mutual authentication for:

2.2   Authorization

2.2.1   O&M User Authorization

Authorization is the capability to validate if the logged in user is allowed to perform a certain operation to a certain Managed Object (MO). The authorization is role-based, that is, the logged in user is mapped to a role and each role has one or several rules defining the access right to an MO.

The user management principles, user administration, and user roles are described in User Management.

2.3   Accountability

Audit Log function allows the operator tracking of the operator access to system and actions performed over resources such as files, directories managed objects and attributes.

The log allows performing audits to detect fraudulent or misuse on the operations performed in the nodes.

For details, refer to Audit Logs.

2.4   Integrity

2.4.1   Node Integrity

2.4.2   Communication Integrity

2.5   Confidentiality

2.5.1   Communication Confidentiality

3   Security Configuration

This section describes how to operate the security functionality of the product.

3.1   Procedures

This section provides the instructions for operating the security functionality of the product.

3.1.1   Hardening

Perform hardening of the MTAS node according to the procedures described in MTAS Hardening Guide.

This includes:

The operator can have own security policies, where the node must be hardened according to operator requirements, for example defining specific secure protocols or other ports different than the default ones.

After the hardening activities have been performed, create a backup of the system. It is also recommended to upload the backup to external storage.

3.1.2   Authentication and User Management

Create users and user groups, and assign privileges to a group.

Always use personal accounts instead of shared or generic user accounts.

The MTAS has five predefined default roles. These roles, and the corresponding rules, cannot be modified:

LDAP must be configured with the strongest possible ciphers.

For details on LDAP Authentication and Local Authorization, and Roles/Rules refer to User Management.

3.1.3   Audit Trails

The audit log enables logging and tracking access to files, directories, and resources of the system, as well as tracing system calls. It enables monitoring of the system for application misbehavior or code malfunctions.

For information about where to find the audit and syslog log files, and how to read them, refer to Audit Logs.

3.1.4   MTAS Configuration for Provisioning LDAP

There are provisioning related MOs that are not accessible through the normal NBI, a provisioning LDAP connection is used instead.

The procedures for setting up the LDAP connection using Secure Socket Layer (SSL) / Transport Layer Security (TLS) are described in MTAS Configuration for Provisioning LDAP.

3.1.5   MTAS Configuration for XDMS

The XDMS function supports a secured CAI3G interface to allow the operator to manage subscriber data in an encrypted and authenticated way.

The authentication of the MTAS is enabled by a trusted certificate.

The operator has the possibility to perform the operations on the CAI3G certificate, refer to MTAS XDMS Management Guide.

3.1.6   Change Logon Banner

By default, no information is provided to the user when logging on using the CLI. The operator can define own customized greeting message or legal message when a user logs on through the CLI.

The system provides the file /cluster/etc/motd, which allows a text message to be created and later displayed when user logs on to the system through CLI.

3.1.7   IPsec Support

If there are requirements to protect Signaling traffic, for example SIP or Diameter (when transferring charging or malicious call tracing data) IPsec tunnels can be used.

The procedures for setting up IPsec tunnels to protect signaling traffic are described in eVIP Management Guide.

3.1.8   H.248

For H.248, there is a configured white list of MIDs that are supported.

If the Media Resource Function Processor (MRFP) uses any other MID than configured in MTAS, the Stream Control Transmission Protocol (SCTP) link to it is closed down, refer to Managed Object Model (MOM).

3.2   Recommended Periodic Operations

This section describes recommended periodic operations.

The product has to be properly hardened before it is taken into use. Nevertheless, it is important that the daily operations on the product are performed in such a way that the security status of the product is not weakened.

New vulnerabilities which need to be mitigated are frequently found in the existing products. Therefore it is necessary to maintain the security posture of the product in service on a regular, ongoing basis.

The recommended periodic security-related operations are the following:

3.3   Handling of Patches

This section describes handling of patches.

Patches are delivered in the form of Emergency Packages (EPs). The process to load EPs is described in the upgrade instruction for the actual MTAS EP.

4   Default Parameter Values

Not applicable.

5   Services, Ports, and Protocols

The services, ports, and protocols that are used by the products are listed in Table 1.

For details on IP Address Types and Ports, refer to MTAS Hardening Guide.

Table 1    Services, Ports, and Protocols Used by MTAS.

Service or Interface Name

Protocol

IP Address Type

Port

Transport Protocol

IP Version

NETCONF

SSH

Muta MIP

830

TCP

IPv4 or IPv6

 

NETCONF

TLS

Muta MIP

6513

TCP

IPv4 or IPv6

 

ECLI

SSH

Muta MIP

22

TCP

IPv4 or IPv6

 

SNMP


FM

SNMP

Muta MIP

161

UDP

IPv4 or IPv6

 

SSH

SSH

SC-1 IP


SC-2 IP

22

TCP

IPv4 or IPv6

 

SSH, SFTP, SCP

SSH

Muta MIP

22

TCP

IPv4 or IPv6

 

LDAP Provisioning

LDAP(S)

OAM VIP

7323


17323


7423 (S),


17423 (S)

TCP

IPv4 or IPv6

 
 
 

CAI3G

CAI3G/ SOAP/HTTP(S)

CAI3G VIP

8095 8443 (S)

TCP

IPv4 or IPv6

 

Ut

Ut / XCAP

Ut VIP

8090

TCP

IPv4 or IPv6

 

CCMP

CCMP /HTTP

CAI3G VIP

8096

TCP

IPv4 or IPv6

 

ISC

SIP

Traffic VIP

5060


5082 -5088,


5160 -5163

TCP/UDP

IPv4 or IPv6

 
 

Ma

SIP

Traffic VIP

5060


5090

TCP/UDP

IPv4 or IPv6

 

Pw

SIP

Traffic VIP

5086

TCP/UDP

IPv4 or IPv6

 

Mp

H.248

Traffic VIP

2944

SCTP

IPv4 or IPv6

 

Cr

SOAP/HTTP

Traffic VIP

9080

TCP

IPv4 or IPv6

 

Px

SOAP/HTTP

Traffic VIP

9080

TCP

IPv4 or IPv6

 

Sh / Dh

Diameter

Traffic VIP

3868–3872

TCP

IPv4 or IPv6

 

Rf / Ro

Diameter

OAM VIP or Charging VIP

3868–3872

TCP

IPv4 or IPv6

 

CDS

Diameter

Traffic VIP

3868–3872

TCP

IPv4 or IPv6

 

CAPv2 / MAP

CAPv2 / MAP

SIGTRAN VIP1 SIGTRAN VIP2

2905

SCTP

IPv4 or IPv6

 

6   Privacy

MTAS handles personal subscriber data to be able to provide services in the network. The data of the subscribers is handled properly and the product supports different measures to protect the privacy of the subscribers. The personal data is listed in Table 2.

6.1   Notice

This product processes personal information and it can have an impact on the right to privacy of the data subjects (for example, subscribers), whose data is processed.

When operating this product, ensure that personal information processing is performed in a fair and lawful manner, and in accordance to the local data protection regulation in force. This can be achieved by providing notice to subscribers of operator’s privacy policies, for example at the moment of establishing the subscription.

6.2   Consent

This product can process personal data that can be considered sensitive information, such as network location, in addition to basic personal data.

The local data protection regulation where the node is operated can require obtaining subscriber consent to process this kind of personal information. Such consent must be obtained so to:

6.3   Classification of Personal Data

Table 2 lists the personal data handled by the MTAS.

Table 2    Personal Data Handled by MTAS

Personal Data Category

Data Item

Comments

Basic data

IP-Address

 

MSISDN

 

IMSI

 

IMEI code

 

Mobile number

MSISDN

First name

 

Last name

 

Mobile Device Serial Number

IMEI

Logon details

SCC pin

Sensitive data

Call history

 

Connection history

 

Metadata showing user activity

 

Tracing information

 

Location history

 

Location: LAC / CellID

 

Malicious call history

 

Barred calling subscribers (Black list)

 

Diversion numbers

 


Copyright

© Ericsson AB 2016, 2017. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    MTAS Security Management Guide         MTAS