1 Scope
1.1 Applicability
1.2 Policy rules
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 DPI functional entity requirements
6.1 Flow and application identification
6.2 DPI signature management
6.3 Traffic inspection aspects
6.4 Reporting capability
6.5 Interaction with a policy decision function
6.6 Traffic control
6.7 Session identification
6.8 Inspection of encrypted traffic
6.9 Inspection of compressed traffic
6.10 Detection of abnormal traffic
7 Functional requirements from the network viewpoint
7.1 General requirements
7.2 Data plane, control plane and management plane in DPI node
8 Interfaces of the DPI-functional entity
8.1 External DPI-FE interfaces
8.2 Internal DPI-FE interfaces
8.3 Interface requirements
9 Security considerations and requirements
9.1 Security threats against DPI entities
9.2 Security requirements for DPI entities
Annex A – Specification of a flow descriptor
A.1 Protocol syntactical perspective
A.2 Specifying information element values
A.3 Relation between flow descriptor, IPFIX flow identifier and
IPFIX flow key
Bibliography