Table of Contents

 1     Scope          
        1.1     Applicability statements           
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
        5.1     Conventions used in signalling flows   
        5.2     TLS endpoint notations             
        5.3     Important notation derived from TLS presentation language   
 6     Use case descriptions           
        6.1     Use cases related to TLS transport modes        
        6.2     Bearer connection network use cases with ITU-T H.248 IP-IP gateways               
        6.3     Bearer connection network use cases with ITU-T H.248 "TCP to non-TCP" gateways     
        6.4     Bearer connection network use cases with multiparty services using TCP transport (e.g., ITU-T H.248.69 gateway)    
 7     Models       
        7.1     Network model from ITU-T H.248 entity point of view
        7.2     Bearer connection model         
 8     TLS basic session control package    
        8.1     Properties       
        8.2     Events              
        8.3     Signals              
        8.4     Statistics          
        8.5     Error Codes    
        8.6     Procedures     
 9     TLS-specific stream endpoint interlinkage procedures           
        9.1     Introduction   
        9.2     Procedures     
10     TLS capability negotiation package 
       10.1     Properties     
       10.2     Events             
       10.3     Signals             
       10.4     Statistics         
       10.5     Error codes    
       10.6     Procedures   
11     TLS session maintenance package 
       11.1     Properties     
       11.2     Events             
       11.3     Signals             
       11.4     Statistics         
       11.5     Error codes    
       11.6     Procedures   
12     TLS traffic volume metrics package
       12.1     Properties     
       12.2     Events             
       12.3     Signals             
       12.4     Statistics         
       12.5     Error codes    
       12.6     Procedures   
13     Package-less TLS control    
       13.1     Related to TLS session establishment
       13.2     Related to TLS authentication
       13.3     Related to TLS session release              
14     The TLS profile concept      
       14.1     TLS protocol profiles  
       14.2     Illustration of TLS profile concept        
       14.3     Example for the TLS MG profile concept          
15     Security considerations      
Annex A – State modelling for  TLS bearer connection endpoints    
        A.1     Introduction and purpose       
        A.2     Original state model for TLS session endpoints              
        A.3     Simplified state model for ITU-T H.248-based TLS basic session control               
Annex B – TLS protocol layer: Data model    
        B.1     Motivation     
        B.2     Data model    
        B.3     Terminology based on data model       
Appendix I – Sample use cases of TLS bearer encryption    
        I.1     Use case #I.1 "Terminal-to-MG TLS session, provisioned TLS service negotiation"           
        I.2     Use case #I.2 "Terminal-to-MG TLS session, MGC-controlled TLS service negotiation"    
        I.3     Use case #I.3 "WebRTC to NGN/IMS interworking function with DTLS-to-TLS support"    
        I.4     Use case #I.4 "TLS-based transport security for facsimile packet relay service T.38"        
      Page
Appendix II – Example call flows    
       II.1     TLS to non-TLS interworking with TCP as example bearer type 
Appendix III – Example TLS profiles    
      III.1     Typical Internet TLS profile       
      III.2     3GPP TLS domain profile           
      III.3     OMA TLS domain profiles         
      III.4     IETF minimum TLS domain profile         
      III.5     IETF example of a national TLS domain profile 
      III.6     ITU-T TLS domain profile for NGN signalling and management plane    
Appendix IV – Illustration of protocol semantics  of the TLS basic session control package    
       IV.1     Overview       
       IV.2     Conventions 
       IV.3     Establishment of TLS security sessions              
       IV.4     Release of TLS security sessions           
Appendix V – Illustration of the TLS-specific interlinkage procedures    
        V.1     Overview        
        V.2     Conventions  
        V.3     Usage of SEPP interlinkage     
        V.4     Usage of protocol layers interlinkage 
Appendix VI – TLS alert protocol from ITU-T H.248 gateway perspective    
       VI.1     Background   
       VI.2     ITU-T H.248 gateway framework concerning TLS alert handling              
       VI.3     TLS error alerts categorization               
       VI.4     Final considerations   
Appendix VII – TLS session resumption – Framework    
      VII.1     Introduction 
      VII.2     Brief summary of TLS session resumption       
      VII.3     Example use cases     
      VII.4     Final considerations and guidelines    
Bibliography