Overview
SafeNetworking provides specialized logging and enrichment for service provider protocols GPRS Tunneling Protocol (GTP) and Stream Control Transmission Protocol (SCTP). These features enable mobile network operators to monitor subscriber traffic, detect anomalies, and troubleshoot network issues.GTP/SCTP support was introduced in SafeNetworking 3.5 and enhanced in Version 4.0 with full EventCode enrichment.
What are GTP and SCTP?
GTP (GPRS Tunneling Protocol)
Protocol used in mobile networks (3G/4G/5G) to encapsulate and route subscriber data between network nodes. Carries user traffic, signaling, and billing information.
SCTP (Stream Control Transmission Protocol)
Transport protocol used in telecommunications for reliable, message-oriented communication. Common in SS7 signaling networks and diameter authentication.
Why Monitor These Protocols?
Service providers need visibility into GTP/SCTP traffic for:- Subscriber tracking - Monitor IMSI, IMEI, MSISDN across network sessions
- Roaming analysis - Track international roaming patterns and costs
- Fraud detection - Identify SIM box fraud, roaming fraud, and subscription fraud
- Network troubleshooting - Debug session establishment failures and handoff issues
- Capacity planning - Analyze data usage patterns by APN, cell site, and device type
- Regulatory compliance - Retain lawful intercept records and subscriber metadata
Service Provider Use Cases
Mobile Virtual Network Operator (MVNO)
Mobile Virtual Network Operator (MVNO)
Scenario: MVNO needs to monitor subscriber data usage across host network infrastructureRequirements:
- Track GTP sessions by IMSI to correlate with billing system
- Monitor APN usage to enforce data plan limits
- Detect roaming events for cost allocation
- Identify high-volume users for QoS policies
Tier 1 Mobile Carrier
Tier 1 Mobile Carrier
Scenario: National carrier operating LTE network needs to detect SS7 signaling attacksRequirements:
- Monitor SCTP associations for abnormal patterns
- Detect SMS interception attempts via MAP spoofing
- Track diameter authentication failures
- Alert on suspicious IMSI lookups
Managed Security Service Provider (MSSP)
Managed Security Service Provider (MSSP)
Scenario: MSSP providing security monitoring for multiple telecom customersRequirements:
- Centralized logging from multiple carrier networks
- Correlation of GTP events with threat intelligence
- Detection of SIM box fraud and IRSF (International Revenue Share Fraud)
- Compliance reporting for lawful intercept
Architecture
Logstash Pipeline
PAN-OS firewalls send GTP and SCTP logs via syslog to Logstash, which parses and enriches them before indexing in Elasticsearch:Input Configuration
Logstash listens for GTP/SCTP logs on UDP port 5516:Log Parsing
SCTP Log Format
SCTP logs contain 56 fields including association details, chunk information, and SCCP parameters:GTP Log Format
GTP logs contain 68 fields including subscriber identifiers (IMSI, MSISDN), location data (MCC, MNC, Cell ID), and session metrics:EventCode Enrichment
GTP EventCodes provide detailed information about message types and protocol events. SafeNetworking enriches logs by looking up EventCode descriptions from a reference index.Enrichment Process
EventCode Reference Index
Thetest-gtp-codes index contains EventCode mappings:
Common GTP EventCodes
| EventCode | Version | Message Type | Description |
|---|---|---|---|
| 14410 | GTPv1 | Create PDP Context Request | Initiate new data session |
| 14411 | GTPv1 | Create PDP Context Response | Acknowledge session creation |
| 14412 | GTPv1 | Update PDP Context Request | Modify existing session parameters |
| 14413 | GTPv1 | Update PDP Context Response | Confirm session update |
| 14414 | GTPv1 | Delete PDP Context Request | Terminate data session |
| 14415 | GTPv1 | Delete PDP Context Response | Acknowledge session termination |
| 14416 | GTPv2 | Create Session Request | GTPv2 equivalent of PDP context creation |
| 14417 | GTPv2 | Create Session Response | GTPv2 session creation response |
| 14418 | GTPv2 | Delete Session Request | GTPv2 session termination |
Geographic Enrichment
Logstash adds geographic location data for non-RFC1918 IP addresses:Flow Fingerprinting
Each GTP/SCTP session is fingerprinted using a SHA1 hash of the 5-tuple:- Deduplication of repeated log entries
- Efficient “top N flows” queries in Kibana
- Session correlation across log entries
Output Configuration
Logs are indexed separately by protocol type:Index Patterns
GTP Logs
Index Pattern:
gtp-YYYY.MMExample: gtp-2026.03Monthly indices for subscriber session logsSCTP Logs
Index Pattern:
sctp-YYYY.MMExample: sctp-2026.03Monthly indices for signaling protocol logsFirewall Configuration
Configure your PAN-OS firewall to send GTP/SCTP logs to SafeNetworking:Create Syslog Server Profile
Navigate to Device > Server Profiles > Syslog
- Name:
SafeNetworking-GTP - Server:
<SafeNetworking-IP> - Protocol: UDP
- Port: 5516
- Format: BSD
Create Log Forwarding Profile
Navigate to Objects > Log Forwarding
- Name:
Forward-GTP-SCTP - Log Type: GTP
- Syslog Profile:
SafeNetworking-GTP
Apply to GTP Security Policy
Navigate to Policies > SecurityEdit your GTP/SCTP policy rules:
- Actions > Log Forwarding:
Forward-GTP-SCTP - Log at Session Start: Yes
- Log at Session End: Yes
Index Mapping Considerations
TunnelID_IMSI Field Type
IMSI (International Mobile Subscriber Identity) values are stored inTunnelID_IMSI field:
In SafeNetworking 3.5,
TunnelID_IMSI was incorrectly mapped as long, causing indexing failures for IMSI values with leading zeros. Version 4.0 corrects this to text/keyword mapping.Kibana Dashboards
SafeNetworking 4.0 includes dedicated workspaces for GTP/SCTP analysis:GTP Dashboard Components
Subscriber Activity
Subscriber Activity
- Active sessions by IMSI/MSISDN
- Session creation/deletion rate timeline
- Top APNs by data volume
- Device type distribution (IMEI analysis)
Roaming Analysis
Roaming Analysis
- International roaming sessions by MCC/MNC
- Roaming partner traffic volumes
- Geographic heat map of roaming locations
- Cost allocation by roaming destination
Network Topology
Network Topology
- GTP tunnel endpoints (SGSN, GGSN, PGW, SGW)
- TEID allocation and reuse patterns
- Interface type distribution (S1-U, S5/S8, S11)
- Network element availability
Traffic Patterns
Traffic Patterns
- Data volume by APN and RAT (Radio Access Technology)
- Peak usage hours and bandwidth consumption
- Session duration distribution
- Protocol violations and error rates
SCTP Dashboard Components
Association Management
Association Management
- Active SCTP associations
- Association establishment/teardown rate
- Verification tag validation failures
- Association endpoint distribution
Chunk Analysis
Chunk Analysis
- Chunk type distribution (DATA, SACK, INIT, etc.)
- Retransmission rates
- Congestion window behavior
- Out-of-order delivery events
Diameter Signaling
Diameter Signaling
- Command code frequency (e.g., CER, CEA, DWR, DWA)
- Application ID distribution (e.g., Gx, Gy, S6a)
- AVP analysis for authentication
- Result code trending (success/failure)
SS7/SCCP Events
SS7/SCCP Events
- Calling/Called party SSN distribution
- Global Title translations
- SCCP opcodes and message types
- MAP operation success rates
Query Examples
Find All Sessions for Specific IMSI
Top 10 APNs by Data Volume
Detect Roaming Fraud Pattern
- Valid IMSI
- Over 1GB data transfer
- Duration under 5 minutes
- Foreign MCC (not US 310)
SCTP Association Failures
Troubleshooting
No GTP/SCTP logs appearing
No GTP/SCTP logs appearing
Check firewall configuration:Verify Logstash is listening:Test UDP connectivity:Check
/var/log/logstash/failed_gtp_events-*.log for parsing errors.EventCode enrichment not working
EventCode enrichment not working
Verify reference index exists:Check index has data:If missing, import EventCode reference data:
TunnelID_IMSI indexing errors
TunnelID_IMSI indexing errors
Symptoms: Logs with message:Resolution: Delete and recreate index with correct mapping:
High Logstash memory usage
High Logstash memory usage
GTP/SCTP logs can be high volume. Tune Logstash JVM heap:Increase batch size for better throughput:Restart Logstash:
Compliance and Privacy
Recommended Security Controls
Performance Tuning
Expected Log Volumes
| Network Size | GTP Events/Day | Storage/Month |
|---|---|---|
| Small MVNO (10K subscribers) | 500K - 1M | ~50 GB |
| Regional Carrier (500K subscribers) | 25M - 50M | ~2 TB |
| National Carrier (5M+ subscribers) | 250M+ | ~20 TB |
Index Lifecycle Management
Implement ILM for GTP/SCTP indices:See Also
DNS Enrichment
DNS threat intelligence processing
IoT Threats
IoT honeypot integration
Logstash Configuration
Pipeline tuning and optimization
