Tech-
invite
3GPP
space
IETF
space
◀
▶
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.180
Word version: 19.2.0
1…
4…
4.3.4
4.3.5
5…
5.1.3
5.1.4…
5.2…
5.2.3
5.2.4
5.2.5
5.2.6…
5.3…
5.4…
6…
7…
7.3…
8…
9…
9.4…
10…
A…
B…
C…
D…
E…
F…
J…
L…
L
MC Security Gateway (SeGy)
L.1
General
L.2
Functional model for the MC Security Gateway (SeGy)
L.3
Functions of a MC Security Gateway (SeGy)
L.4
Security procedures for the MC Security Gateway (SeGy)
L.5
Interworking using a MC Security Gateway
$
Change history
L
(Normative) MC Security Gateway (SeGy)
|R15|
p. 195
L.1
General
p. 195
L.2
Functional model for the MC Security Gateway (SeGy)
p. 195
L.3
Functions of a MC Security Gateway (SeGy)
p. 196
L.3.1
Components of a MC Security Gateway (SeGy)
p. 196
L.3.2
Pseudo KMS
p. 196
L.3.3
Pseudo GMS
p. 197
L.3.4
Pseudo MCX Server or IS Proxy
p. 197
L.3.5
Pseudo MC clients
p. 197
L.4
Security procedures for the MC Security Gateway (SeGy)
p. 197
L.4.1
General
p. 197
L.4.2
Security procedures for private communication (initiated in the protected MC system)
p. 198
L.4.3
Security procedures for private communication (initiated in the unprotected MC system)
p. 199
L.4.4
Security procedures for group communications (group homed in the protected MC system)
p. 200
L.4.5
Security procedures for group communications (group homed in the unprotected MC system)
p. 202
L.5
Interworking using a MC Security Gateway
p. 203
L.5.1
General
p. 203
L.5.2
MC Security Gateway and the IWF
p. 203
$
Change history
p. 205