1 Scope
1.1 Applicability statements
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
5.1 Conventions used in signalling flows
5.2 TLS endpoint notations
5.3 Important notation derived from TLS presentation language
6 Use case descriptions
6.1 Use cases related to TLS transport modes
6.2 Bearer connection network use cases with ITU-T H.248 IP-IP
gateways
6.3 Bearer connection network use cases with ITU-T H.248 "TCP
to non-TCP" gateways
6.4 Bearer connection network use cases with multiparty services
using TCP transport (e.g., ITU-T H.248.69 gateway)
7 Models
7.1 Network model from ITU-T H.248 entity point of view
7.2 Bearer connection model
8 TLS basic session control package
8.1 Properties
8.2 Events
8.3 Signals
8.4 Statistics
8.5 Error Codes
8.6 Procedures
9 TLS-specific stream endpoint interlinkage procedures
9.1 Introduction
9.2 Procedures
10 TLS capability negotiation package
10.1 Properties
10.2 Events
10.3 Signals
10.4 Statistics
10.5 Error codes
10.6 Procedures
11 TLS session maintenance package
11.1 Properties
11.2 Events
11.3 Signals
11.4 Statistics
11.5 Error codes
11.6 Procedures
12 TLS traffic volume metrics package
12.1 Properties
12.2 Events
12.3 Signals
12.4 Statistics
12.5 Error codes
12.6 Procedures
13 Package-less TLS control
13.1 Related to TLS session establishment
13.2 Related to TLS authentication
13.3 Related to TLS session release
14 The TLS profile concept
14.1 TLS protocol profiles
14.2 Illustration of TLS profile concept
14.3 Example for the TLS MG profile concept
15 Security considerations
Annex A – State modelling for TLS bearer connection endpoints
A.1 Introduction and purpose
A.2 Original state model for TLS session endpoints
A.3 Simplified state model for ITU-T H.248-based TLS basic session
control
Annex B – TLS protocol layer: Data model
B.1 Motivation
B.2 Data model
B.3 Terminology based on data model
Appendix I – Sample use cases of TLS bearer encryption
I.1 Use case #I.1 "Terminal-to-MG TLS session, provisioned TLS
service negotiation"
I.2 Use case #I.2 "Terminal-to-MG TLS session, MGC-controlled
TLS service negotiation"
I.3 Use case #I.3 "WebRTC to NGN/IMS interworking function
with DTLS-to-TLS support"
I.4 Use case #I.4 "TLS-based transport security for facsimile
packet relay service T.38"
Page
Appendix II – Example call flows
II.1 TLS to non-TLS interworking with TCP as example bearer type
Appendix III – Example TLS profiles
III.1 Typical
Internet TLS profile
III.2 3GPP TLS domain
profile
III.3 OMA TLS domain
profiles
III.4 IETF minimum
TLS domain profile
III.5 IETF example of
a national TLS domain profile
III.6 ITU-T TLS
domain profile for NGN signalling and management plane
Appendix IV – Illustration of protocol semantics of the TLS basic
session control package
IV.1 Overview
IV.2 Conventions
IV.3 Establishment of TLS security sessions
IV.4 Release of TLS security sessions
Appendix V – Illustration of the TLS-specific interlinkage procedures
V.1 Overview
V.2 Conventions
V.3 Usage of SEPP interlinkage
V.4 Usage of protocol layers interlinkage
Appendix VI – TLS alert protocol from ITU-T H.248 gateway perspective
VI.1 Background
VI.2 ITU-T H.248 gateway framework concerning TLS alert handling
VI.3 TLS error alerts categorization
VI.4 Final considerations
Appendix VII – TLS session resumption – Framework
VII.1 Introduction
VII.2 Brief summary of TLS session resumption
VII.3 Example use cases
VII.4 Final considerations and guidelines
Bibliography