您的浏览器禁用了JavaScript(一种计算机语言,用以实现您与网页的交互),请解除该禁用,或者联系我们。 [GSMA]:IR.77操作员间IP骨干网安全要求。适用于服务和运营商间IP骨干提供商v5.1 - 发现报告

IR.77操作员间IP骨干网安全要求。适用于服务和运营商间IP骨干提供商v5.1

信息技术 2025-06-04 GSMA 话唠
报告封面

IR.77InterOperator IP Backbone Security Req. For Serviceand Inter-operator IP backbone Providers Version5.115 April 2025 Security Classification:Non-Confidential Access to and distribution of this document is restricted to the personspermitted by the securityclassification. This document is subject tocopyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not bedisclosed or in any other way made available, in whole or in part,to persons other than thosepermitted under the securityclassification withoutthe prior written approval of the Association. Copyright Notice Copyright ©2025GSM Association Disclaimer The GSMA makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, andhereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information containedin this document may be subject to change without prior notice. Compliance Notice The information contain herein is in full compliance with the GSMAAntitrustCompliancePolicy. This Permanent Reference Document is classified by GSMA as an Industry Specification, as such it has been developed and is maintained byGSMA inaccordance with the provisions set out GSMA AA.35-Procedures for Industry Specifications. GSMAOfficial DocumentIR.77 InterOperator IP Backbone Security Req. For Service and Inter-operator IPbackbone Providers Table of Contents 1Introduction41.1Overview41.2Scope41.3Motivation51.4Definitions51.5Abbreviations81.6References91.7Conventions92Security Basics and Principles102.1Introduction102.2High Level Security Objectives113Binding Security Requirements113.1Packet Filters113.2Isolation of the IPX Network133.3Routing173.4Assignment of IP Addresses183.5IPX Tunnelling Through Public Networks193.6User Equipment Traffic Tunnelling Through the IPX Network203.7Secure Configuration of Network Elements, Network Services and IPXServices213.8IPX Provider Peering223.9Incident Response233.10Security Documentation233.11Signalling Security244Non-binding Security Requirements264.1Secure Configuration of Network Elements264.2Continuous Availability and Robustness264.3IPX Provider Peering274.4Routing28AnnexASecurity Code of Conduct30A.1General Security Requirements30A.2Security Requirements30A.2.1IPX Security Measures30A.2.2Connectivity Configuration Requirements31A.2.3Network Configuration:31A.2.4Transit Traffic32A.3Voluntary Bilateral Agreements32A.3.1Authentication and Encryption:32A.3.2Exceptions to Fulfilment of Non-Binding Security Requirements32A.3.3OtherRequirementsAgreed between the Parties32A.3.4Other Agreements32A.4Signatures32 GSMAOfficial DocumentIR.77 InterOperator IP Backbone Security Req. For Service and Inter-operator IPbackbone Providers AnnexBDocument Management33B.1Document History33B.2Other Information33 GSMAOfficial DocumentIR.77 InterOperator IP Backbone Security Req. For Service and Inter-operator IPbackbone Providers 1Introduction 1.1Overview The need to define an adequate level of security is critical and this document sets out howthis can be achieved. This document, together with the Permanent Reference Document(PRD) IR.34Error! Reference source not found., describes a set of common guidelines toachieve an adequate security level on the IPX Network. This PRD contains a set of binding and non-binding security requirements. All therequirements which are classified as binding are mandatory for all current and future IPXservices and all participants on the IPX, unless stated otherwise. Participants on the IPX areany entities which send/receive IP packets on the IPX, such as IPX Providers and PLMNOperators, Fixed Network Operators and any other Service Providers. All participants on the IPX are required to contribute to overall IPX security. Only if all theparticipants deploy and maintain their part of the security measures, can it be ensured thatthe IPX is a secure and reliable network for inter-Service Providerdata exchange. Having asecure and reliable IPX Network is a prerequisite for mobile roaming and interconnect. The Inter-Service Provider IP Backbone is called IPX in this document and is defined inGSMA PRD IR.34Error! Reference source not found.. Additional information is defined inGSMA PRD IR.400and GSMA PRD IR.670. Services which are defined on top of the IPX–the so-called IPX Services–are defined in GSMA PRD IR.34Error! Reference source notfound., GSMA PRD IR.880and GSMA PRD IR.900. More IPX Services may be defined inthe future, which may lead to the creation and publication of additional GSMA PRDs. In addition to collaboratively contributing to IPX security, each participant needs to protecttheir own internal network by themselves. 1.2Scope The document defines security requirements for Service Providers and IPX Providers toenhance their network security. In particular, this document focuses o