Security Edge Protection Proxy(SEPP), 5G Roaming Function-IPLOOK

Security Edge Protection Proxy(SEPP)

The IPLOOK Security Edge Protection Proxy (IPLOOK SEPP) enables secure interconnect between 5G networks. The SEPP ensures end-to-end confidentiality and/or integrity between source and destination network for all 5G interconnect roaming messages.
Security Edge Protection Proxy(SEPP)
Key Benefits
Low CAPEX & OPEX Single integrated platform for DRA and DEA 
A 100% software solution by design
Interoperability Allow to work different Diameter products and brands
Centralized and uniform IT integration
High Scalability NFV compliant allowing delivery on a range of cloud 
Easy to operate, uniform operations across domains
Support multiple network  Diameter, RADIUS, SS7 and various IT protocols
Centralized and uniform use of common network applications
Flexibility required  for Roaming DEA for connection to IPX and other operators
Single capacity license with free traffic mix across supported protocols
Future-proof, extendable approach New interfaces and features can be supported by the same solution.
On-board capability for interworking and interoperability
IPLOOK's SEPP 
For MNO roaming between standalone 5G cores (5GC)
The IPLOOK SEPP enables operators to achieve end-to-end confidentiality and integrity between source and destination network for designated message elements. The IPLOOK SEPP offers unique flexibility through an extensive, integrated set of routing and service creation capabilities. It supports the relevant standards as well as HTTP/2 based signaling scenarios. 
The IPLOOK SEPP is a single engine software product design – not an afterthought, project, or patchwork solution – enabling operators to achieve consolidation of network functions, operations, management and licenses.
5GC SEPP
Features
 
Support for the N32-f and the N32-c interface
On-board session database key negotiation
Support for transport layer security (TLS)
Support security key management and lookup
Supports message modification instruction inclusion via JSON PATCH method.
Support for remote SEPP authorization/authentication
Support for topology hiding
Support for load balancing
Support for Egress/Ingress limitation
 Optional (on-board) support for:
»  IPLOOK Steering Of Roaming (SoR)
»  IPLOOK SS7 Firewall (SS7FW) 
»  IPLOOK Diameter Firewall (DFW) 
»  IPLOOK Number Portability (NP)
»  IPLOOK Equipment Identity Register (EIR)
»  IPLOOK Diameter Signaling Controller (DRA, DEA, IWF)
»  IPLOOK 5G Service Communication Proxy (SCP)
»  IPLOOK 5G Security Edge Protection Proxy (SEPP)
On-board non-volatile database for key repository/storage
Powerful (any-to-any) interworking across all supported protocols (including SS7, Diameter, RADIUS, HTTP, LDAP, ENUM, etc.)
Single view, reporting, GUI based management, provisioning
License mix across all supported protocols, not just HTTP/2
Support for PRINS (PRotocol for N32 INterconnect Security, JWE/JWS) – please note there are ongoing standardization developments
Support for malformed N32 messages detection
Support for anti-spoofing
Supporting high available and geo-redundant deployment models
Full GUI based signaling  orchestration and system management, configurable service logic, no need for scripting or development
Related Products
User Plane Function(UPF)
User Plane Function(UPF)
The User Plane Function (UPF) represents the data plane evolution of a Control and User Plane Separation (CUPS) strategy, which is a fundamental component of the 3GPP 5G core network(5GC).

The UPF plays the most critical role in the process of data transfer. It provides the interconnect point between the mobile infrastructure and the Data Network (DN), i.e. encapsulation and decapsulation of GTP-U.
Learn More
Network Exposure Function(NEF)
Network Exposure Function(NEF)
NEF, located between the 5G core network and external third-party application functionaries (and possibly some internal AFs), is responsible for managing the external open network data, and all external applications that want to access the internal data of the 5G core must pass through the NEF.

By opening the network capability to third-party applications, it can realize the friendly connection between network capability and business requirements, improve business experience and optimize network resource allocation.
Learn More
Network Repository Function(NRF)
Network Repository Function(NRF)
NRF, one of the network functions of the 5G core network(5GC). It supports the service discovery feature, which receives NF discovery requests from NF instances and provides information about the discovered NF instance (discovered) to another NF instance. Registration information includes NF type, address, service list, etc.
Learn More
Network Slice Selection Function(NSSF)
Network Slice Selection Function(NSSF)
Network slicing is a key native capability of 5G that can maximize the performance of communication networks and reduce network construction and operation and maintenance costs, and it has become an industry consensus that 'slicing is capability and slicing is product' in the 5G era.
The core network, as a key anchor point for network differentiation and operation, has emerged as a more important network in the 5G era, providing the ability to deploy network functions and resources on-demand to meet the diverse business needs of future vertical industries.
Learn More
Unified Data Management(UDM) / Authentication Server Function(AUSF)
Unified Data Management(UDM) / Authentication Server Function(AUSF)
UDM: The same as 4G’ s HSS (Home Subscriber Services), UDM is a centralized way to process network user data in 5G through Nudm interfaces to provide services for AMF, SMF, SMSF, AUSF, NEF and GMLC. It also provides services such as authorization of accessing, registration, uninterrupted services.

AUSF: As a major part of 5GC to facilitate security processes, AUSF performs the authentication function of identifying UEs and storing authentication keys.
Learn More
Policy Control Function(PCF)
Policy Control Function(PCF)
The 5G PCF performs the same function as the PCRF in 4G networks.

• Provides policy rules for control plane functions. This includes network slicing, roaming and mobility management.
• Accesses subscription information for policy decisions taken by the UDR.
• Supports the new 5G QoS policy and charging control functions.
Learn More
Session Management Function(SMF)
Session Management Function(SMF)
SMF is a fundamental element of the 5G Service-Based Architecture (SBA). The SMF keeps trace of PDU sessions and QoS Flows in the 5GC for UEs and make sure their states and status are in sync between Network Functions in Control and User Planes.
It also receives PCC (Policy and Charging Control) Rules from PCF (Policy Charging Function) and convert PCC Rules into SDF Templates, QoS Profiles and QoS Rules for UPF, gNB and UE respectively for QoS Flows establishment, modification and release etc.
Learn More
Access and Mobility Management Function(AMF)
Access and Mobility Management Function(AMF)
AMF terminates the control plane of different access networks onto the 5G Core Network(5GC) and control which UEs can access the 5GC to exchange traffic with DNs. It also manages the mobility of UEs when they roam from one gNB to another for session continuity, whenever possible.
Learn More
N3IWF (Non-3GPP InterWorking Function)
N3IWF (Non-3GPP InterWorking Function)
N3IWF (Non-3GPP InterWorking Function) is responsible for connecting untrusted non-3GPP access network to 5GC. UE and N3IWF establish an IPSec tunnel, N3IWF connects to the User Plane and Control Plane of 5GC through N2 interface and N3 interface separately.
Learn More
User Plane Function(UPF)
User Plane Function(UPF)
The User Plane Function (UPF) represents the data plane evolution of a Control and User Plane Separation (CUPS) strategy, which is a fundamental component of the 3GPP 5G core network(5GC).

The UPF plays the most critical role in the process of data transfer. It provides the interconnect point between the mobile infrastructure and the Data Network (DN), i.e. encapsulation and decapsulation of GTP-U.
Learn More
Network Exposure Function(NEF)
Network Exposure Function(NEF)
NEF, located between the 5G core network and external third-party application functionaries (and possibly some internal AFs), is responsible for managing the external open network data, and all external applications that want to access the internal data of the 5G core must pass through the NEF.

By opening the network capability to third-party applications, it can realize the friendly connection between network capability and business requirements, improve business experience and optimize network resource allocation.
Learn More
Network Repository Function(NRF)
Network Repository Function(NRF)
NRF, one of the network functions of the 5G core network(5GC). It supports the service discovery feature, which receives NF discovery requests from NF instances and provides information about the discovered NF instance (discovered) to another NF instance. Registration information includes NF type, address, service list, etc.
Learn More
Network Slice Selection Function(NSSF)
Network Slice Selection Function(NSSF)
Network slicing is a key native capability of 5G that can maximize the performance of communication networks and reduce network construction and operation and maintenance costs, and it has become an industry consensus that 'slicing is capability and slicing is product' in the 5G era.
The core network, as a key anchor point for network differentiation and operation, has emerged as a more important network in the 5G era, providing the ability to deploy network functions and resources on-demand to meet the diverse business needs of future vertical industries.
Learn More
Unified Data Management(UDM) / Authentication Server Function(AUSF)
Unified Data Management(UDM) / Authentication Server Function(AUSF)
UDM: The same as 4G’ s HSS (Home Subscriber Services), UDM is a centralized way to process network user data in 5G through Nudm interfaces to provide services for AMF, SMF, SMSF, AUSF, NEF and GMLC. It also provides services such as authorization of accessing, registration, uninterrupted services.

AUSF: As a major part of 5GC to facilitate security processes, AUSF performs the authentication function of identifying UEs and storing authentication keys.
Learn More
Policy Control Function(PCF)
Policy Control Function(PCF)
The 5G PCF performs the same function as the PCRF in 4G networks.

• Provides policy rules for control plane functions. This includes network slicing, roaming and mobility management.
• Accesses subscription information for policy decisions taken by the UDR.
• Supports the new 5G QoS policy and charging control functions.
Learn More
Session Management Function(SMF)
Session Management Function(SMF)
SMF is a fundamental element of the 5G Service-Based Architecture (SBA). The SMF keeps trace of PDU sessions and QoS Flows in the 5GC for UEs and make sure their states and status are in sync between Network Functions in Control and User Planes.
It also receives PCC (Policy and Charging Control) Rules from PCF (Policy Charging Function) and convert PCC Rules into SDF Templates, QoS Profiles and QoS Rules for UPF, gNB and UE respectively for QoS Flows establishment, modification and release etc.
Learn More
Access and Mobility Management Function(AMF)
Access and Mobility Management Function(AMF)
AMF terminates the control plane of different access networks onto the 5G Core Network(5GC) and control which UEs can access the 5GC to exchange traffic with DNs. It also manages the mobility of UEs when they roam from one gNB to another for session continuity, whenever possible.
Learn More
N3IWF (Non-3GPP InterWorking Function)
N3IWF (Non-3GPP InterWorking Function)
N3IWF (Non-3GPP InterWorking Function) is responsible for connecting untrusted non-3GPP access network to 5GC. UE and N3IWF establish an IPSec tunnel, N3IWF connects to the User Plane and Control Plane of 5GC through N2 interface and N3 interface separately.
Learn More
Contact Us
Send us a message with the form below. We will contact you as soon as possible.
*
*
*
*
GET IN TOUCH WITH OUR EXPERTS
GET IN TOUCH WITH OUR EXPERTS
Tell us your business needs, and we' ll find the perfect solution.
Book a free consultation
GET IN TOUCH WITH OUR EXPERTS
GET IN TOUCH WITH OUR EXPERTS
Tell us your business needs, and we' ll find the perfect solution.
Book a free consultation