1 Scope
1.1 Connection model
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Secure RTP package
6.1 Properties
6.2 Events
6.3 Signals
6.4 Statistics
6.5 Error codes
6.6 Procedures
7 Key management using SDP security descriptions
7.1 Overspecification of SRTP parameters and multiple keys
7.2 Wildcarding of SRTP parameters
7.3 Interoperability with offer/answer-based implementations
7.4 SDES and SRTP cryptographic contexts
7.5 Mapping of master keys for sent packets and received packets
statistics
8 Security considerations
Appendix I – Example call flows
I.1 Initial session setup using SDP security
descriptions
I.2 MG1's key is about to expire
I.3 Auditing SRTP capabilities
I.4 Auditing of SRTP Statistics
Appendix II – Sample use-cases of SRTP bearer encryption
II.1 Use-case #1: ITU-T H.248 MG for peering IP and circuit-switched
networks
II.2 Use case #2: ITU-T H.248 MG for peering IP networks
II.3 Use case #3: Transparent SRTP forwarding
Bibliography