Created on
09-15-2025
10:05 AM
Edited on
09-16-2025
12:22 AM
By
Jean-Philippe_P
Description | This article describes what FortiCarrier, as a GRX firewall, is capable of regarding the GTPv2 inter-PLMN handover via the S10 interface. And explain the options for GTPv2 S10 Message Filtering. |
Scope | The FortiCarrier (the FortiGate with CarrierOS license) is deployed as a GRX firewall. |
Solution |
What can be done with GTPv2 S10 messages in a GRX firewall:
Initial information: Those S10 messages are covered by the 3GPP TS 29.274 standard in section 7.3, 'Mobility Management Messages' [1].
FortiCarrier v7.0.2 implemented partial S10 and Mobility Management Messages handling.
Note: Select the drop-down OS version menu and choose another OS version to read details on any newer FortiCarrier OS version above v7.0.2.
S10 interface support depicted in the first document includes only specific message filtering for the following GTPv2 messages on S10 interfaces:
Any other GTPv2 messages described in 3GPP Technical Specification [1], possibly transmitted on S10 interfaces, are handled slightly differently. For those, see the GTPv2 message filtering document above.
Base S10 message filtering options: To configure GTPv2 message filtering on S10 interfaces, the config gtp message-filter-v2 section includes the following option keys (the default values are 'allow'):
These Context and Forward Relocation procedures have full support and a dissector implemented into the GTP-C helper.
Example of GTP-C session helper:
Example of related custom service using the helper above:
By default, this custom service helper configuration has 'set helper auto'.
The respective service is then used in the firewall policy for traffic inspection.
Note: If it is necessary to block GTP-U inspection, a custom service needs to be set, like the one in the example below. This will document the disabled helper, and such GTP-U services (or as part of a service group) can be used in the firewall policy handling the GTP User-plane traffic.
The helper will still be loaded to the kernel because of the 'config system session-helper' command, but it will not actively be used because of this service setting.
There is quite often no need to inspect the actual traffic payload, GTP-U (user-plane). However, it could be beneficial in some scenarios, like for OT/IoT traffic towards specific APNs. And this way, a helper permanently loaded into the kernel can be enabled or disabled, as needed for specific traffic flows.
Additional S10 messages filtering options: In section 7.3, 'Mobility Management Messages [1]', 3GPP TS 29.274 describes various other messages which can be seen on the S10 interface and therefore can possibly be seen on a GRX firewall. For example, a 'Relocation Cancel Request' can be seen on S10 as part of an inter-RAT handover cancel procedure. A complete set of the GTPv2 messages known to the FortiCarrier OS is documented in this document GTPv2 Message Filtering.
Note: All message types are set to 'allow' by default, so they will be 'forwarded' and pass through the firewall, unless explicitly set otherwise via 'config gtp message-filter-v2'.
Example of a more complete 'Deny' filter for S10 messages: By default, all GTPv2 messages in the message filter are 'allowed'. Some S10 messages can be seen on peering interfaces alongside S8 and S6a messages. To deny S10 Mobility Management Messages on a GRX firewall, identify those S10 messages first.
GTPv2 Message Filter example:
Note: This example focuses mainly on Forward Relocation, Trace Session, Configuration Transfer, and Relocation Cancel procedures. Therefore, it does not block a complete set of all possible S10 messages.
Additionally, except for messages in the Initial info and 'Filtering S10 interface Mobility Management tunnels' documentation, the other S10 messages are not fully covered by the GTP-C helper and dissector.
This lack of granularity, logging options, etc., could be partially handled via custom IPS signatures.
Related documents: [1] 3GPP TS 29.274 has been published by ETSI as 129.274 (note that the FortiCarrier is currently based on version 15.9.0 of those documents). [2] Technical-Tip: FortiCarrier GTP Message Filtering via IPS custom signatures |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.