blob: 9c062d8ca7bcb2b9c0f3b88da5eca1be69a56111 [file] [log] [blame]
Ankur Upadhyaya71795a32023-04-17 10:05:47 +05301..
2 SPDX-FileCopyrightText: 2023-present Intel Corporation
3 SPDX-FileCopyrightText: © 2020 Open Networking Foundation <support@opennetworking.org>
4 SPDX-License-Identifier: Apache-2.0
5
6.. _rogue-subscriber:
7
8Rogue Subscriber Blocking
9=========================
10
11.. image:: ../_static/images/rogue-subscriber.png
12 :width: 500px
13
14This feature enables 5G network to revoke subscription of malicious UE. It is required that UPF is
15configured to support malicious subscriber identification. The custom user application can read the malicious
16subscriber's IP Address identified by the UPF and can make available to 5G core network via Metric-Function.
17The 5G network shall revoke malicious UEs subscription based on UE IP-Addresses received.
18
19Please follow detailed flow
20
21* The UPF shall detect malicious UE IP-Address and the user application shall learn it.
22* The user application shall maintain the malicious subscriber's IP Address.
23* The Controller functionality of the MetricFunction shall keep polling the user application to fetch malicious
24 subscriber's IP
25 Address.
26* The metricfunc manages all subscriber contexts, so the Controller identifies the IMSI associated to malicious
27 Subscriber IP.
28* The MetricFunc Pod notifies the ROC to disable the SIM Card associated with malicious subscriber.
29* ROC updates the Config Server(webui) with updated Device Group(s) and slice(s) information.
30* AMF initiates a network-triggered deregistration procedure to detach the UE from the 5G core.
31
32The Metric-Function configuration to poll the user application
33
34.. code-block::
35
36 userAppApiServer:
37 addr: "userapp.omec.svc"
38 port: 9301
39 rocEndPoint:
40 addr: "aether-roc-umbrella-aether-roc-gui-v2-1-external.aether-roc.svc"
41 port: 80