Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
        5.1     Conventions used in signalling flows   
        5.2     DTLS endpoint notations          
 6     Use case descriptions           
        6.1     Use cases related to DTLS transport modes     
        6.2     Bearer connection network use cases with ITU-T H.248 IP-IP gateways               
        6.3     Bearer connection network use cases with DTLS transport mode change           
        6.4     Bearer connection network use cases with multiparty services               
 7     Models       
        7.1     Network model from ITU-T H.248 entity point of view
        7.2     Bearer connection model         
 8     Basic session control package (for DTLS)       
 9     DTLS-specific stream endpoint interlinkage procedures        
10     Capability negotiation package (for DTLS)   
11     DTLS extended capabilities package              
       11.1     Properties     
       11.2     Events             
       11.3     Signals             
       11.4     Statistics         
       11.5     Error codes    
       11.6     Procedures   
12     Session maintenance package (for DTLS)    
13     Traffic volume metrics package (for DTLS)  
14     Package-less DTLS control 
       14.1     Related to DTLS authentication            
Annex A – State modelling for  DTLS bearer connection endpoints    
Annex B – DTLS protocol layer: Data model    
Appendix I – Sample use cases of DTLS bearer encryption    
        I.1                   Use cases for "application protocol agnostic DTLS handling"        
        I.2                   Use cases for "DTLS-based transport security for facsimile packet relay service ITU‑T       T.38"    
        I.3                   Use cases for "WebRTC data traffic"       
        I.4                   Use cases for "DTLS-based key exchange for SRTP"        
Appendix II – Signalling flows for basic DTLS session establishment and release    
       II.1     Overview         
       II.2     Conventions   
       II.3     Establishment of DTLS security sessions             
       II.4     Release of DTLS security sessions          
Bibliography