CONTENTS

 1     Scope 
 2     References 
        2.1     Normative references         
        2.2     Informative references        
 3     Definitions  
 4     Abbreviations   
 5     Conventions     
 6     Basic operation 
        6.1     Endpoint gatekeeper discovery      
        6.2     Endpoint authentication key distribution      
        6.3     Address manipulation         
 7     Signalling details
 8     SG configuration considerations   
        8.1     SG registration       
        8.2     Authentication credentials   
 9     Security considerations    
10     Applicability    
11     Object Identifier