1
Scope
2
References
2.1
Normative references
2.2
Informative references
3
Definitions
4
Abbreviations
5
Conventions
6
Basic operation
6.1
Endpoint gatekeeper
discovery
6.2
Endpoint authentication
key distribution
6.3
Address manipulation
7
Signalling details
8
SG configuration
considerations
8.1
SG registration
8.2
Authentication
credentials
9
Security considerations
10
Applicability
11
Object Identifier