Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TR 29.828  Word version:  12.1.0

Top   Top   Up   Prev   None
1…   2…

 

2  References

3  Definitions and abbreviationsWord‑p. 11

4  Key issues and Design considerations for Extended IMS media plane security featuresWord‑p. 13

4.1  Media security for Session based messaging (MSRP)

4.2  Media security for conferencing (BFCP)Word‑p. 20

4.3  TLS proceduresWord‑p. 22

4.4  TCP procedures

4.5  MGC information baseline for gateway control decisionsWord‑p. 35

4.6  Media security for T.38 fax over UDPTL/UDP transport

5  IMS-ALG/ IMS-AGW interface (Iq)Word‑p. 38

5.1  Requirements

5.1.1  End-to-access edge security for TCP-based media using TLS

5.1.2  End-to-end security for TCP-based media using TLS

5.1.3  End-to-access edge security for UDP-based media using DTLS

5.1.4  MSRP handlingWord‑p. 43

5.2  Procedures

5.2.1  End-to-access edge security for TCP-based media using TLS

5.2.2  End-to-end security for TCP-based media using TLSWord‑p. 62

5.2.3  End-to-access edge security for UDP-based media using DTLS

6  IBCF/ TrGW interface (Ix)Word‑p. 67

7  MRFC/ MRFP interface (Mp)Word‑p. 68

8  3GPP- ITU-T H.248 requirements gap analysisWord‑p. 81

9  Conclusions and recommendationsWord‑p. 82

A  Impacts on existing specificationsWord‑p. 83

B  Release 12 requirements and procedures for extended media securityWord‑p. 84

C  Interworking between sessmatch and CEMAWord‑p. 97

D  Preventing TLS establishment collision without a TLS B2BUAWord‑p. 101

E  Example end-to-end network scenarioWord‑p. 102

F  Example traffic flow (communication establishment phase)Word‑p. 108

$  Change historyWord‑p. 111


Up   Top