METHOD AND SYSTEM FOR FILTERING PACKETS BASED ON SOURCE- AND DESTINATION ADDRESSES
FIELD OF THE INVENTION
The invention relates to telecommunication technique. In particular, the invention relates to a method and system for filtering telecommunication in a telecommunication network.
BACKGROUND OF THE INVENTION
As the amount of telecommunication explo- sively increases, the filtering of non-desired telecommunication has become a necessity. In conventional telecommunication networks, telecommunication is filtered by means of firewalls and blocking lists of routers. A firewall can be implemented either purely as a software application or as a hardware specifically designed for filtering.
Typically, a firewall is used to filter incoming traffic, but the filtering of outgoing traffic is also possible. This is advantageous e.g. in situa- tions in which one wishes to make sure that it is not possible to transfer information e.g. by means of back gate programs. The firewall is arranged in the network to be protected in such a manner that all the traffic going from the network into the outside world goes through the same firewall. In .case there, are other possible routes to the network, they must be protected with corresponding firewalls because the level of protection of the network is determined based on the weakest link. Telecommunication can be filtered based on various principles. Typically, the filtering regards, however, the filtering of certain protocols and addresses. In most cases, the firewall is configured such that it is possible to connect to the network only to certain server devices, and the rest of the network is invisible to the outside world. The access may also be determined in such a manner that some de-
vices can be connected only from determined addresses . With the present systems, various different variations are possible.
The actual filtering is based on rules. The maintainer of the firewall system creates a number of rules which are gone through in a certain order. In the rules it is e.g. possible to describe to what addresses the traffic is allowed or from what addresses the traffic is automatically rejected. The set of rules applies to the whole network, and making exceptions is possible by adding new rules. To clarify the set of rules, the rules may consist of sub rules.. For example, each allowed address need not have to have its own rule, instead in the set of rules, one rule is created to which a set of sub rules or addresses are saved from which the incoming traffic is allowed.
The problem with the prior-art list of rules is their big size. In case there are thousands of devices included in the network to be protected, the list of rules may grow remarkably big. The firewall must, however, check the whole list for each incoming packet. If the packet is rejected, it is possible to stop going through the list as the rejecting rule is realized. Correspondingly, as concerns the allowed traffic, the list is gone through up to the accepting rule. This adds to the power requirements of the firewall and adds to the risk of error.
A conventional firewall is not suitable for filtering wireless terminal devices, since the firewall is arranged in between the company intranet and the public network. When using a wireless terminal device the user first connects to the public network and proceeds via it to the protected network of the company behind • the firewall. In that case, the wire- less terminal device is left without the protection of the firewall, so that it must have a firewall application of its own. However, firewalls of this kind are
quite heavy applications, especially for wireless terminal devices. A prior-art solution is to place another firewall' in the premises of the provider of the wireless data transfer service, but this makes it dif- ficult to answer to the individual needs of the client, especially in situations in which the clients wish to change the settings of their firewalls frequently.
Reference publication WO 02/23831 discloses a system in which there is a specific access node arranged in the wireless telecommunication network. In the case of a GPRS (General Packet Radio Service) network, the access node is preferably placed in the GGSN component (Gateway GPRS Support Node) . In the system according to the reference publication, the filtering is started based on a separate filtering request. The filtering request is transmitted to the access node each time serving. In case there is no request for filtering, the client's terminal device is left with- out protection. The changes and the filtering request are made by means of a separate program arranged in the terminal device, so there must be capacity in the terminal device for running the program.
Also addresses to be dynamically allocated create a problem for a conventional firewall in the wireless environment. In the network of the company's own, the addresses to be dynamically allocated are allocated from a certain space. In case the connection to the public network is to be made from outside the company information network, the address may be any as such. In that case, the rules of the firewall must be changed in real time.
OBJECTIVE OF THE INVENTION
The objective of the invention is to eliminate the disadvantages referred to above, or at least
significantly to alleviate them. One specific objective of the invention is to disclose a new type of filtering method and system of telecommunication specifically for filtering the telecommunication of mo- bile devices.
SUMMARY OF THE INVENTION
The present invention relates to a new type of firewall solution that is particularly advantageous when using wireless terminal devices that move within the public network. The addresses of the terminal devices can be allocated dynamically, and they need not be allocated from a protected network or from an oth- erwise restricted address space.
The system according to the invention includes at least two terminal devices, a firewall component and a telecommunication system. The telecommunication system may be e.g. a conventional mobile com- munication network in which the data traffic is transmitted by means of packet switching. The telecommunication may also be transmitted to another public network, such as the Internet.
In the system according to the invention, the firewall is placed in the telecommunication system such that all the traffic goes through the firewall. Advantageously, the firewall is arranged to retrieve the rules from a database which is common to all the firewall components of the telecommunication network. Since the terminal devices may be disposed in the same cell, the firewall component must be arranged such that also the internal traffic of the cell gets filtered. Typically, in a telecommunication network, the telecommunication goes through the component that is aware of the location of the terminal device. The firewall component of the invention is advantageous to arrange in conjunction with the component that is
aware of the location of the terminal device. In case the terminal devices are located in the same cell, the telecommunication can be filtered directly without directing the traffic to a separate firewall component. In the system according to the invention, the telecommunication is filtered step by step for each terminal device specifically. Arranged in the firewall component, for each terminal device specifically, is a collection of rules which the client can freely mod- ify. When a .packet is sent from the client's terminal device, the firewall component first checks the firewall settings of the terminal's own. In case the transmission of the packet in question is not allowed, the packet is immediately rejected. In case the packet is allowed, it is forwarded further. In the next phase it is advantageous to filter the telecommunication using the rules of the service provider. These rules are used to check whether it is at all possible to transmit the transferred telecommunication. This phase is not obligatory. In case the telecommunication is in accordance with the rules of the service provider, the collection of rules of the recipient is loaded. In case the rules of the recipient allow the reception of the telecommunication, the packets are transmitted to their destination. The order of the filtering rules is not important from the point of view of the application, instead they may be arranged as desired.
The present invention improves the information security of terminal devices. The invention is particularly advantageous because by means of the system according to the invention the client can customize his or her own firewall application without changing the terminal device or acquiring a separate firewall application in his or her terminal device. As concerns the telecommunication network, the invention is advantageous because by means of it is possible to eliminate unnecessary telecommunication. By means of
the system according to the invention it is possible to check the authenticity and permissibility of the packets in time. This arrangement allows one to save band for allowed useful traffic. Furthermore, the sys- tem according to the invention is advantageous for controlling a big number of devices. The filtering rules allocated for each terminal device specifically can be retrieved from the database by means of a unique identifier of the terminal device. If as the identifier, e.g. the IMSI number of the terminal device is used, then the terminal's telecommunication address, typically the IP address, need not be fixed but can be dynamically allocated from anywhere from the address space.
LIST OF FIGURES
In the following, the invention will be described in detail by means of its embodiments, in which
Fig. 1 shows one embodiment of the firewall system according to the invention, and
Fig. 2 shows the system as shown in Fig. 2 in more detail, and Fig. 3 shows a functional block diagram of the system according to Fig. 1, and
Fig. 4 shows a firewall component according to the invention.
DETAILED DESCRIPTION OF THE INVENTION
The system as shown in Fig. 1 comprises two telecommunication networks 12 and 13 independent of each other. Connected to the telecommunication network 12 are terminal devices MTE and DTE1. Connected to the telecommunication network 13 is a terminal device DTE2. The present invention does not limit the number
of terminal devices connected to the telecommunication networks, instead there may be several of them within the telecommunication network's own restrictions. The networks are connected to each other by means of a firewall component FW, which filters the traffic between the networks. The telecommunication in Fig. 1 is illustrated by means of two connections. Connection 11 represents the internal traffic of the telecommunication network 12, and connection 10 represents the traffic between the telecommunication networks.
The telecommunication connection 10 represents a typical connection from a mobile terminal device DTE1 to a server or to the second terminal device DTE2. The mobile terminal device may be connected to the information network e.g. by means of a mobile station or a wireless local area network. In Fig. 1, the terminal device DTE1 utilising the telecommunication connection 10 establishes a connection via the first telecommunication network 12. Since the traffic is di- rected to the second telecommunication network 13, it is directed through the firewall component FW. The firewall component FW filters based on predetermined rules. The filtered message is forwarded to the destination DTE2. The telecommunication connection 11 represents a connection in which the mobile terminal devices communicate directly with each other. In the telecommunication connection 11 both of the terminal devices MTE and DTE1 communicate with each other via the telecommunication network 12. Since the terminal devices are located in the area of the same network, a firewall arranged at the point of interconnection traffic of two telecommunication networks does not protect the connections. Due to this, the telecommuni- cation connection 11 must be circulated via the firewall component FW.
Fig. 2 shows the system of Fig. 1 in more detail. In the example of Fig. 2, the first telecommunication network is a mobile communication network provided with the GPRS facility (General Packet Radio Service) that includes base stations BTS1 and BTS2 (Base Transceiver Station) . Connected to the base station BTS1 is one terminal device TE1, and connected to the base station BTS2' are the terminal devices TE2 and TE3. The present invention does not restrict th num- ber of base stations or the number of terminal devices connected to them. In the system as shown in the figure, the cell -specific components of the base station BTS1 include base station controller BSC1, serving GPRS support node SGSN1 and gateway GPRS support node GGSNl . The corresponding components of the base station BTS2 are BSC2 , SGSN2 and GGSN2. A GPRS core network 20 is arranged in between the service nodes and gateway nodes. In Fig. 2 also the firewall component of the telecommunication system is arranged for each cell specifically. The firewall components FWl and FW2 are components of the first telecommunication system, and they are connected to the common database of rules DB. The embodiment according to the invention uses advantageously the database of rules, but if necessary, the rules may also be downloaded from the terminal device as the terminal device connects to the network. The firewall components are connected to the second telecommunication network 21, which may be e.g. the Internet. The terminal device TE4 of Fig. 2 is located in the local area network separated from the internet by means of a firewall FW3. The firewall FW3 is typically a conventional firewall solution, but if necessary, also it can be connected to the database of rules DB. In Fig. 2, substantial from the point of view of the invention is the placing of the firewall component. The GPRS traffic is routed such that the trans-
mitted and received packets always go through the gateway GGSN. In case the terminal devices are located in the area of the same cell, such as TE2 and TE3 , the gateway directly routes the traffic back to where it came from. Since the firewall component must be arranged in the telecommunication network such that all the packets go through the firewall, the firewall cannot be placed behind the gateway GGSN. If the firewall is placed behind the gateway, then all the packets must be routed also to the firewall. In Fig. 2, the firewall components FWl and FW2 have been depicted as being located in front of the gateways GGSNl and GGSN2. In the most preferred implementation mode, the firewall component is arranged in conjunction with the gateway. In that case, all the packets go through the firewall component.
Fig. 3 illustrates the operation of one embodiment of the filtering system according to the invention. The operation of the embodiment starts with the receiving of a packet, step 31. When the address has been received, it is checked whether the address belongs to a wireless terminal device, step 32. In case the terminal device is wireless, the identifier corresponding to the address is retrieved, step 33. As the identifier of the address, e.g. the IMSI code of the mobile station or some other corresponding unique identifier saved to the SIM card can be used. The relationship between the address and the identifier can be saved to a cache memory for a prescribed time. The information can be saved e.g. when the user logs into the network or out of the network. The piece of identification information corresponding to the piece of address information can be retrieved from an external database or from a network component . In the case of a GPRS system, the external network component is a GGSN. It must be noted that when necessary, by means of the piece of identification information it is also possi-
I2003/000577
10
ble to retrieve the necessary IP address when retrieving or handling the rules, since the relationship between the address and the identifier is two-way. When the terminal device has been identified, the filtering rules of the transmitting terminal device are retrieved, step 34. Since the filtering rules are retrieved based on the user's identifier, the IP address of the terminal device need not be fixed. In case the terminal device has no separate address, default, rules can be used, or the traffic can be transmitted without filtering. The firewall component interprets the filtering rules and checks whether the packet is in accordance with the rules, step 35. In case the packet is against the rules, it is rejected, step 36. If the packet is in accordance with the rules of the sender, the default rules of the service are retrieved, step 37. Using these rules the service provider can determine what services can be used in the network. Additional services can be activated with an additional charge, in which case the user's information has an effect on the service rules to be loaded. The client can also order an unlimited service in which no service rules are loaded. When the rules have been loaded, it is checked whether the packet is in accordance with the service rules, step 38. In case the packet is against the rules, it is rejected, step 39.
As the last filtering step, the packet is filtered based on the destination address. If the service rules are fulfilled, the destination address of the packet is retrieved, step 310. When the address has been received, it is checked whether the address belongs to a wireless terminal device, step 311. In case the terminal device is wireless, the identifier corresponding to the address is retrieved, step 312. When the terminal device has been identified, the filtering rules of the transmitting terminal device are
T FI2003/000577
11
retrieved, step 313. The firewall component interprets the filtering rules and checks whether the packet is in accordance with the rules, step 314. In case the packet is against the rules, it is rejected, step 315. In case the packet is allowed, it is transmitted to the recipient, step 316.
It must be noted that the firewall application according to the invention can also be configured in some other manner. The telecommunication can be filtered in a firewall also in such a manner that the firewall application first retrieves all the rules and then interpreters them all in a row. The filtering described above can be arranged to be assigned to the first firewall, but the task can also be divided be- tween the firewall of both the transmitting and receiving cell. By means of a divided filtering the firewall also functions in situations in which the clients are located in the networks of different operators and the operators do not have a common data- base of rules.
It is possible to increase the number of filtering rules and levels of filtering, if necessary. In that case, the traffic can be first filtered e.g. based on the unique rules of the sender and then based on the group-specific rules of the sender. In case both rules are fulfilled, one proceeds to the rules of the service provider. Correspondingly, the rules of the recipient can be divided into unique ones and group-specific ones. In the system according to the invention, each user has got his or her own rules, which are divided into incoming and outgoing traffic. The users can freely modify these rules. In the database, the rules are indexed based on the user's address informa- tion or the address identifier. In this manner, the client's rules can be easily managed and quickly re-
trieved. The system according to the invention enables one to arrange unique rules for a big number of users .
Fig. 4 shows the firewall component FW according to the invention. The firewall component FW receives incoming traffic IN. In order to filter the telecommunication, the firewall is provided with means 40 for filtering the telecommunication based on the sender's filtering rules and means 41 for filtering the telecommunication based on the recipient's filter- ing rules. Further, the firewall FW is provided with means 42 for filtering the telecommunication based on the service provider's rules. Each filtering rule is handled separately. The number of filtering means can be added, if necessary. Additional rules of this kind can include e.g. group-specific rules. The rules can be saved to the firewall FW, or they can be retrieved from a separate database server DB . Since the filtering rules are handled based on the piece of unique identification information of the terminal device, the firewall can further comprise means 43 for establishing a connection between the address of the public network of the user, e.g. a dynamic IP address, and the unique identifier of the terminal device, e.g. an IMSI code. The invention is not limited merely to the examples of its embodiments referred to above, instead many variations are possible within the scope of the inventive idea defined in the claims.