This application claims priority to IN Provisional Application No. 202141029386 filed on Jun. 30, 2021, and titled “SYSTEM AND METHOD OF NETWORKING SECURITY FOR VIRTUALIZED BASE STATION,” the contents of which are hereby incorporated by reference in their entirety.
Cloud-based virtualization of Fifth Generation (5G) base stations (also referred to as “g NodeBs” or “gNBs”) is widely promoted by standards organizations, wireless network operators, and wireless equipment vendors. Such an approach can help provide better high-availability and scalability solutions as well as addressing other issues in the network.
In the particular example shown in
Each RU 106 is typically implemented as a physical network function (PNF) and is deployed in a physical location where radio coverage is to be provided. Each DU 104 is typically implemented as a virtual network function (VNF) and, as the name implies, is typically distributed and deployed in a distributed manner in the operator's edge cloud. Each CU-CP 108 and CU-UP 110 are typically implemented as a virtual network functions (VNFs) and are typically centralized and deployed in the operator's central cloud.
When deploying a distributed gNB 100, operators have the option to deploy RUs 106, DUs 104, CU-CP 108, and CU-UPs 110 all in one trusted network or to deploy any one of the DUs 104, RUs 106, the CU-CP 108, and/or the CU-UPs 110 in an edge network, which is likely untrusted. In all deployment cases, there are additional features (for example, the management O1 connection inside/outside an operator's trusted networks, service orchestration virtual network management function (VNMF) inside/outside operators' trusted networks, virtual infrastructure management (VIM) function inside/outside operators' trusted network, etc.) that are utilized when implementing a virtualized gNB. The networking security in all deployment cases on various interfaces is a critical component of implementing a virtualized gNB.
In an example, a system to provide wireless service to user equipment comprises a scalable cloud environment configured to implement a base station using a plurality of virtualized base station entities, wherein each virtualized base station entity of the plurality of virtualized base station entities is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment. The scalable cloud environment is also configured to implement a first Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network. The first IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network and route traffic from the external network to at least one application implemented by a first virtualized base station entity of the plurality of virtualized entities.
In another example, a server comprises an Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network. The server further comprises at least one application virtual network function of a first virtualized base station entity. The at least one application virtual network function is communicatively coupled to the IPsec virtual gateway via an internal network, and the first virtualized base station entity is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment. The IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network and route traffic from the external network to the at least one application virtual network function of the first virtualized base station entity.
In another example, a method of providing wireless service to user equipment comprises using a scalable cloud environment configured to implement a base station using a plurality of virtualized entities, wherein each virtualized entity of the plurality of virtualized entities is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment. The scalable cloud environment is further configured to implement a first Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network. The first IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network and route traffic from the external network to at least one application implemented by a first virtualized entity of the plurality of virtualized entities.
Understanding that the drawings depict only exemplary embodiments and are not therefore to be considered limiting in scope, the exemplary embodiments will be described with additional specificity and detail through the use of the accompanying drawings, in which:
In accordance with common practice, the various described features are not drawn to scale but are drawn to emphasize specific features relevant to the exemplary embodiments.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific illustrative embodiments. However, it is to be understood that other embodiments may be used and that logical, mechanical, and electrical changes may be made. The following detailed description is, therefore, not to be taken in a limiting sense.
In general, the virtualized gNB 200 is configured to provide wireless service to various numbers of user equipment (UEs) 208 using one or more cells 210 (only one of which is shown in
In one configuration (used, for example, in indoor deployments), each RU 206 is co-located with its respective set of antennas 212 and is remotely located from the DU 204 and CU 202 serving it as well as the other RUs 206. In another configuration (used, for example, in outdoor deployments), the respective sets of antennas 212 for multiple RUs 206 are deployed together in a sectorized configuration (for example, mounted at the top of a tower or mast), with each set of antennas 212 serving a different sector. In such a sectorized configuration, the RUs 206 need not be co-located with the respective sets of antennas 212 and, for example, can be co-located together (for example, at the base of the tower or mast structure) and, possibly, co-located with its serving DUs 204. Other configurations can be used.
The virtualized gNB 200 is implemented using a scalable cloud environment 220 in which resources used to instantiate each type of entity can be scaled horizontally (that is, by increasing or decreasing the number of physical computers or other physical devices) and vertically (that is, by increasing or decreasing the “power” (for example, by increasing the amount of processing and/or memory resources) of a given physical computer or other physical device). The scalable cloud environment 220 can be implemented in various ways. For example, the scalable cloud environment 220 can be implemented using hardware virtualization, operating system virtualization, and application virtualization (also referred to as containerization) as well as various combinations of two or more of the preceding. The scalable cloud environment 220 can be implemented in other ways. For example, as shown in
In the example shown in
As shown in
In the example shown in
In the example shown in
In the example shown in
Bringing a virtualized gNB (such as virtualized gNB 200) up to service is generally performed in multiple stages by a variety of entities. The virtualization infrastructure/environment required for gNB VNFs is brought up from bare metal servers and relevant network and storage equipment (for example, using platform orchestration through an edge cloud node management network or controller). The gNB VNFs are then deployed and orchestrated into service providing entities (for example, using service orchestration through a virtual network function manager (VNFM)). The gNB VNFs are also configured and activated to make them service ready (for example, using service configuration with an Operations and Maintenance (OAM) entity or Device Management System (DMS)). The gNB VNFs will be communicatively coupled to many other components in different networks, which can include but are not limited to a platform orchestration network, a service orchestration network, a service management network, a mobile network (for example, an operator's mobile infrastructure including LTE/5G core and access networks), and a time service network (for example, 1588 traffic used for synchronization).
When deploying and managing gNB VNFs, the location of the network elements determines the different networking and security requirements. When the virtual network functions (VNFs) used to implement a virtualized gNB are outside a trusted network (for example, outside the operator's mobile core network), the tunnel mode of Internet Protocol Security (IPsec) can generally be used between the VNF and each trusted network that communicates data with the VNF. In many situations, the number of IPsec tunnels connected to a mobile core operator's network is limited by an operator in order to reduce the exposure or vulnerability of the operator network because more IPsec tunnels generally increase the vulnerability of a network. The number of IPsec tunnels connected to a mobile core operator's network can also be limited by operator IPsec resource availability or operator network topology restrictions. If each IPsec tunnel is terminated by the relevant VNF, a prohibitively large amount of IPsec tunnels could be required to implement a distributed deployment (such as a deployment shown in and described with respect to
In the example shown in
In the example shown in
The CU-CP VNF 306, CU-UP VNF 308, and DU VNF 310 are separate network elements and treated as physical entities from a network point of view. In the example shown in
In some examples, each node has a respective IP subnetwork for each type of traffic where an IPsec connection is used. In such examples, each VNF 306, 308, 310 is assigned a respective IP address for each type of traffic that is communicated to/from that VNF 306, 308, 310, which is used as an inner IP address for each type of traffic transmitted through an IPsec tunnel.
In some such examples, when an IPsec virtual gateway 312, 314 is used to connect the VNF 306, 308, 310 to an external network 322 via an IPsec tunnel, the IPsec virtual gateway 312, 314 is assigned an IPv6 address as the gateway IP address of the subnetwork serving the VNFs 306, 308, 310 and an IPv4 address (used as an outer IP address for IPsec tunnel traffic) for the tunnel network interface communicatively coupled to the external network security gateway 320, and the VNFs 306, 308, 310 are each assigned an IPv6 address (used as an inner source IP address of each of the VNFs traffic to be encapsulated inside the IPsec tunnel traffic) for the VNF network interface communicatively coupled to the IPsec virtual gateway 312, 314. The first IPsec virtual gateway 312 is configured to route traffic to/from the CU-CP VNF 306 and the CU-UP VNF 308 using the IPv6 address for the CU-CP VNF 306 and the CU-UP VNF 308, and the second IPsec virtual gateway 314 is configured to route traffic to/from the DU VNF 310 using the IPv6 address for the DU VNF 310.
In other examples, when an IPsec virtual gateway 312, 314 is used to connect the VNF 306, 308, 310 to an external network 322, the IPsec virtual gateway 312, 314 is assigned an IPv4 address as the gateway IP address of the subnetwork serving the VNFs 306, 308, 310 and an IPv6 address (used as an outer IP address for IPsec tunnel traffic) for the tunnel network interface communicatively coupled to the external network security gateway 320, and the VNFs 306, 308, 310 are each assigned an IPv4 address (used as an inner source IP address of each of the VNFs traffic to be encapsulated inside the IPsec tunnel traffic) for the VNF network interface communicatively coupled to the IPsec virtual gateway 312, 314. In such examples, the first IPsec virtual gateway 312 is configured to route traffic to/from the CU-CP VNF 306 and the CU-UP VNF 308 using the IPv4 address for the CU-CP VNF 306 and the CU-UP VNF 308, and the second IPsec virtual gateway 314 is configured to route traffic to/from the DU VNF 310 using the IPv4 address for the DU VNF 310.
In some examples, the traffic routed to/from the CU-CP VNF 306 and CU-UP VNF 308 via the first IPsec virtual gateway 312 is the same type of traffic (for example, O1 traffic from a service management network). In other examples, the traffic routed to the CU-CP VNF 306 is a different type of traffic than the traffic routed to the CU-UP VNF 308 via the first IPsec virtual gateway 312. In one such example, the IPsec virtual gateway 312 is configured to communicate traffic with a mobile core network, route X2-C traffic transmitted using the IPsec tunnel 316 to the CU-CP VNF 306, and route X2-U/S1-U traffic transmitted using the IPsec tunnel 316 to the CU-UP VNF 308. In another such example, the IPsec virtual gateway 312 is configured to communicate traffic with a 5G mobile core network, route Xn-C/N2 traffic transmitted using the IPsec tunnel 316 to the CU-CP VNF 306, and route Xn-U/N3 traffic transmitted using the IPsec tunnel 316 to the CU-UP VNF 308.
In either case, when multiple VNFs (for example, CU-CP VNF 306 and CU-UP VNF 308) are connecting to the same external network 322, an IPsec virtual gateway 312 can be shared by those VNFs. In some examples, the VNFs are manually configured to utilize the same IPsec virtual gateway 312. In other examples, the VNFs and/or IPsec virtual gateway 312 utilize internal discovery capabilities to determine whether/when the VNFs will be configured to utilize the same IPsec virtual gateway 312.
While the CU node 302 and the DU node 304 are shown as including separate IPsec virtual gateways 312, 314, this may not be necessary if the CU node 302 and the DU node 304 are deployed on the same platform (for example, same server). In particular, if the CU node 302 (including the CU-CP VNF 306 and CU-UP VNF 308) and the DU node 304 (include the DU VNF(s) 310) are deployed on the same platform, then a single instance of an IPsec virtual gateway can be used for each respective traffic type. In such examples, the IPsec virtual gateway is configured to terminate the IPsec tunnel (including removing encapsulation) for a respective traffic type and route traffic to the CU-CP VNF 306, CU-UP VNF 308, and DU VNF 310 using the respective IP addresses for those entities. However, if the CU node 302 and the DU node 304 are deployed on different platforms (for example, different servers), then the separate IPsec virtual gateways 312, 314 are needed in order to prevent exposing the subnetwork of an application in an untrusted environment.
In the example shown in
In the example shown in
In some examples, each application has a respective IP address for each type of traffic where an IPsec connection is used. In such examples, the access network interface and the tunnel network interface for each respective VNF 406, 408 are assigned a respective IP address for each type of traffic that is communicated to/from that VNF 406, 408. In some examples, the VNFs 406, 408 are assigned an IPv6 address (used as an inner IP address for IPsec tunnel traffic) and an IPv4 address for the tunnel network interface (used as an outer IP address for IPsec tunnel traffic). In other examples, the VNFs 406, 408 are assigned an IPv4 address (used as an inner IP address for IPsec tunnel traffic) and an IPv6 address for the tunnel network interface (used as an outer IP address for IPsec tunnel traffic).
The traffic communicated to the CU-CP VNF 406 via the first IPsec tunnel 417 is a different type of traffic than the traffic communicated to the CU-UP VNF 408 via the second IPsec tunnel 419. For example, the CU-CP VNF 406 is configured to communicate X2-C traffic via the first IPsec tunnel 417 with a mobile core network 422, and the CU-UP VNF 408 is configured to communicate X2-U/S1-U traffic via the second IPsec tunnel 419 with the mobile core network 422. In another example, the CU-CP VNF 406 is configured to communicate Xn-C/N2 traffic via the first IPsec tunnel 417 with a mobile core network 422, and the CU-UP VNF 408 is configured to communicate Xn-U/N3 traffic via the second IPsec tunnel 419 with the mobile core network 422.
The example shown in
The example shown in
In some examples, the network interface 510 of the application VNF 502 is assigned an IPv6 address (inner IP address), the IPsec virtual gateway 504 is assigned an IPv6 address as the gateway IP address of the subnetwork, and the tunnel network interface 514 of the IPsec virtual gateway is assigned an IPv4 address (outer IP address). In such examples, the security gateway 506 is assigned an IPv4 address (outer IP address) and the end points in the external network subnet are assigned IPv6 addresses (inner IP address).
In other examples, the network interface 510 of the application VNF 502 is assigned an IPv4 address (inner IP address), the IPsec virtual gateway 504 is assigned an IPv4 address as the gateway IP address of the subnetwork, and the tunnel network interface 514 of the IPsec virtual gateway is assigned an IPv6 address (outer IP address). In such examples, the security gateway 506 is assigned an IPv6 address (outer IP address) and the end points in the external network subnet are assigned IPv4 addresses (inner IP address).
In the example shown in
The CU node 602 of a virtualized gNB will always include at least one CU-CP VNF 606 and at least one CU-UP VNF 608, but the other components of the virtualized gNB shown in
In the example shown in
In the example shown in
In the example shown in
In the example shown in
In the example shown in
In the example shown in
In the example shown in
In the example shown in
In some examples, the virtualized gNBs described above can be deployed in a venue in conjunction with a Long-Term Evolution (LTE) Evolved NodeB (eNB). In some such examples, the LTE eNB is configured to communicate X2-C and X2-U/S1-U traffic with the security gateway of the mobile network using IPsec tunnels. In some examples, the LTE eNB can be implemented using virtualization techniques similar to those described above with respect to the virtualized gNBs. In such examples, the IPsec techniques described above with respect to
Other examples are implemented in other ways.
The systems and methods described herein provide flexible solutions for ensuring network security for virtualized base stations. The systems and methods described herein reduce the exposure or vulnerability of the operator network and enable compliance with operator network topology restrictions and implementation of the virtualized base station even with limited operator IPsec resource availability.
The methods and techniques described here may be implemented in digital electronic circuitry, or with a programmable processor (for example, a special-purpose processor or a general-purpose processor such as a computer) firmware, software, or in combinations of them. Apparatus embodying these techniques may include appropriate input and output devices, a programmable processor, and a storage medium tangibly embodying program instructions for execution by the programmable processor. A process embodying these techniques may be performed by a programmable processor executing a program of instructions to perform desired functions by operating on input data and generating appropriate output. The techniques may advantageously be implemented in one or more programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. Generally, a processor will receive instructions and data from a read-only memory and/or a random-access memory. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and DVD disks. Any of the foregoing may be supplemented by, or incorporated in, specially-designed application-specific integrated circuits (ASICs).
Example 1 includes a system to provide wireless service to user equipment, the system comprising: a scalable cloud environment configured to implement: a base station using a plurality of virtualized base station entities, wherein each virtualized base station entity of the plurality of virtualized base station entities is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment; and a first Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network, wherein the first IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network, wherein the first IPsec virtual gateway is configured to route traffic from the external network to at least one application implemented by a first virtualized base station entity of the plurality of virtualized entities.
Example 2 includes the system of Example 1, wherein the plurality of virtualized base station entities include: a central unit (CU), wherein the CU is configured to implement at least one CU-control-plane (CU-CP) virtual network function and at least one CU-user-plane (CU-UP) virtual network function; and a distributed unit (DU) served by the CU, wherein the DU is configured to serve at least some of the user equipment, wherein the DU is configured to implement at least one DU virtual network function.
Example 3 includes the system of Example 2, wherein the system comprises one or more radio units (RUs), each RU is communicatively coupled to the DU and is associated with a respective set of one or more antennas via which downlink radio frequency signals are radiated to at least some of the user equipment and via which uplink radio frequency signals transmitted by at least some of the user equipment are received.
Example 4 includes the system of any of Examples 1-3, wherein the first IPsec virtual gateway is communicatively coupled to at least one virtual network function implemented by the first virtualized base station entity, wherein the first IPsec virtual gateway is configured to route traffic from the external network to the at least one virtual network function.
Example 5 includes the system of any of Examples 1-4, wherein the first IPsec virtual gateway is communicatively coupled to a first virtual network function implemented by the first virtualized base station entity and a second virtual network function implemented by the first virtualized base station entity, wherein the traffic routed to the first virtual network function by the first IPsec virtual gateway is a different type of traffic compared to the traffic routed to the second virtual network function by the first IPsec virtual gateway.
Example 6 includes the system of any of Examples 1-5, wherein a first virtual network function implemented by the first virtualized base station entity is configured to terminate a first IPsec tunnel between the first virtual network function and a second network.
Example 7 includes the system of any of Examples 1-6, wherein the traffic includes one of: O1 traffic from a service management network; O2 traffic from a platform or service orchestration network; X2/S1 traffic from a first mobile core network; or Xn/N2/N3 traffic from a second mobile core network.
Example 8 includes the system of any of Examples 1-7, wherein the scalable cloud environment is further configured to implement a second virtualized base station entity of the plurality of virtualized base station entities; wherein the first virtualized base station entity is configured to implement a second IPsec virtual gateway and the second virtualized base station entity is configured to implement a third IPsec virtual gateway, wherein the second IPsec virtual gateway is communicatively coupled to the third IPsec virtual gateway, wherein the second IPsec virtual gateway and the third IPsec virtual gateway are configured to terminate an IPsec tunnel between the first virtualized base station entity and the second virtualized base station entity, wherein the first virtualized base station entity and the second virtualized base station entity are configured to communicate traffic via the second IPsec virtual gateway and the third IPsec virtual gateway.
Example 9 includes the system of any of Examples 1-8, further comprising an Evolved Node B (eNB) communicatively coupled to the external network, wherein the scalable cloud environment is configured to implement the eNB, wherein the eNB is configured to implement an IPsec virtual gateway configured to be communicatively coupled to a core network of an operator.
Example 10 includes a server, comprising: an Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network; and at least one application virtual network function of a first virtualized base station entity, wherein the at least one application virtual network function is communicatively coupled to the IPsec virtual gateway via an internal network, wherein the first virtualized base station entity is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment; wherein the IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network, wherein the IPsec virtual gateway is configured to route traffic from the external network to the at least one application virtual network function of the first virtualized base station entity.
Example 11 includes the server of Example 10, wherein the internal network is an IP network.
Example 12 includes the server of any of Examples 10-11, wherein the at least one application virtual network function includes a first virtual network function and a second virtual network function, wherein the first virtual network function is configured to terminate a first IPsec tunnel between the first virtual network function and a second network, wherein the second virtual network function is configured to terminate a second IPsec tunnel between the second virtual network function and the second network.
Example 13 includes the server of any of Examples 10-12, wherein the server comprises a second IPsec virtual gateway, wherein the second IPsec virtual gateway is configured to terminate an IPsec tunnel between the first virtualized base station entity and a second virtualized base station entity configured to implement at least some functions for one or more layers of the wireless interface used to communicate with user equipment, wherein the first virtualized base station entity is configured to communicate traffic with the second virtualized base station entity via the second IPsec virtual gateway.
Example 14 includes the server of any of Examples 10-13, wherein the traffic includes one of: O1 traffic from a service management network; O2 traffic from a platform or service orchestration network; X2/S1 traffic from a first mobile core network; or Xn/N2/N3 traffic from a second mobile core network.
Example 15 includes a method of providing wireless service to user equipment, the method comprising: using a scalable cloud environment configured to implement: a base station using a plurality of virtualized entities, wherein each virtualized entity of the plurality of virtualized entities is configured to implement at least some functions for one or more layers of a wireless interface used to communicate with user equipment; and a first Internet Protocol Security (IPsec) virtual gateway configured to be communicatively coupled to an external network, wherein the first IPsec virtual gateway is configured to terminate an IPsec tunnel with the external network, wherein the first IPsec virtual gateway is configured to route traffic from the external network to at least one application implemented by a first virtualized entity of the plurality of virtualized entities.
Example 16 includes the method of Example 15, wherein the plurality of virtualized entities include: a central unit (CU), wherein the CU is configured to implement at least one CU-control-plane (CU-CP) virtual network function and at least one CU-user-plane (CU-UP) virtual network function; and a distributed unit (DU) served by the CU, wherein the DU is configured to serve at least some of the user equipment, wherein the DU is configured to implement at least one DU virtual network function.
Example 17 includes the method of any of Examples 15-16, wherein the first IPsec virtual gateway is communicatively coupled to at least one virtual network function implemented by the first virtualized entity, wherein the first IPsec virtual gateway is configured to route traffic from the external network to the at least one virtual network function.
Example 18 includes the method of any of Examples 15-17, wherein the first IPsec virtual gateway is communicatively coupled to a first virtual network function and a second virtual network function, wherein the traffic routed to the first virtual network function by the first IPsec virtual gateway is a different type of traffic compared to the traffic routed to the second virtual network function by the first IPsec virtual gateway.
Example 19 includes the method of any of Examples 15-18, wherein the first IPsec virtual gateway is communicatively coupled to at least one virtual network function implemented by the first virtualized entity, wherein the at least one virtual network function is configured to terminate a first IPsec tunnel between the at least one virtual network function and a second network.
Example 20 includes the method of any of Examples 15-19, wherein the scalable cloud environment is further configured to implement a second IPsec virtual gateway configured to be communicatively coupled to a second external network or a second virtualized entity of the plurality of virtualized entities, wherein the second IPsec virtual gateway is configured to terminate an IPsec tunnel with the second external network or the second virtualized entity of the plurality of virtualized entities, wherein the first IPsec virtual gateway is configured to route traffic from the external network or the second virtualized entity of the plurality of virtualized entities to at least one application implemented by the first virtualized entity of the plurality of virtualized entities.
A number of embodiments of the invention defined by the following claims have been described. Nevertheless, it will be understood that various modifications to the described embodiments may be made without departing from the spirit and scope of the claimed invention. Accordingly, other embodiments are within the scope of the following claims.
Number | Date | Country | Kind |
---|---|---|---|
202141029386 | Jun 2021 | IN | national |