This use case relates only to SNPNs that provide services in a similar way as provided by WLAN hotspots.
Today's PLMNs have a centralized database of IP addresses of all operator nodes that connect to the inter-PLMN IP backbone network, including AAA Servers/Proxies. This information is used for firewall and Border Gateway configuration. Signalling connections between VPLMN and HPLMN are long-lived (Diameter and HTTP-based N32f) and support bidirectional (inbound and outbound) signalling.
In contrast, there is no administrative entity that manages the interconnect of SNPNs on one hand and SNPN Credential Providers on the other hand. In addition, the number of interconnected SNPNs and SNPN Credential Providers is expected to be considerably greater than the number of PLMNs today. Given the large number of SNPN Credential Providers with which a SNPN needs to interconnect, it is not feasible to maintain permanently established signalling connections between them. Instead, the signalling connection needs to be established dynamically. Ideally, a signalling connection between SNPN A and SNPN Credential Provider B should be established only when a subscriber of SNPN Credential Provider B attempts to connect to SNPN A, and should be released when the last subscriber of SNPN Credential Provider B disconnects from SNPN A.
The dynamic establishment of a signalling connection between the SNPN and the SNPN Credential Provider raises several new issues, as follows:
-
Outbound signalling issue: The SNPN might not know the IP address of the SNPN Credential Provider's signalling endpoints and vice versa. In some cases, the SNPN Credential Provider may be operated using a cloud provider using dynamic IP address assignment.
-
Inbound signalling issue: The SNPN and/or the SNPN Credential Provider may reside behind a firewall or a Network Address Translation (NAT) device.
-
End-to-end signalling issue: The SNPN and/or the SNPN Credential Provider need to have assurance that they are indeed establishing a signalling connection with each other, and that the signalling connection is secure.
The issues related to dynamic establishment of a signalling connection between the SNPN and the SNPN Credential Provider are illustrated in
Figure 5.1.1-1.
None. The existing interface for interconnect between SNPN and SNPN Credential Provider (aka Credentials Holder) relies on permanent signalling connection between the SNPN and the SNPN Credential Provider.
[PR 5.1.6-001]
Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to interconnect with a large number of SNPN Credential Providers with which the SNPN might not have preconfigured information detailing the IP addresses used by these SNPN Credential Providers to interconnect with the SNPN.
[PR 5.1.6-002]
Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN Credential Provider to be able to interconnect with a large number of Standalone Non-Public Networks (SNPNs) with which the SNPN Credential Provider might not have preconfigured information detailing the IP addresses used by these SNPNs to interconnect with the SNPN Credential Provider.
[PR 5.1.6-003]
Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to determine how to connect to a SNPN Credential Provider capable of verifying the identity presented by a user attempting to connect to that SNPN.
[PR 5.1.6-004]
Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to be able to securely interconnect with a SNPN Credential Provider in deployments where the required security information is not preconfigured.
[PR 5.1.6-005]
Based on the Standalone Non-Public Network (SNPN) configuration, the 5G system shall support a mechanism for a SNPN to enable a SNPN Credential Provider to securely notify events (e.g., a user's subscription ending) to the Standalone Non-Public Network (SNPN).