Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.302
Word version: 18.6.0
1…
4…
5…
6…
7…
8…
A…
6
UE - EPC Network protocols
6.1
General
6.2
Trusted and Untrusted Accesses
6.3
IP Mobility Mode Selection
6.4
Authentication and authorization for accessing EPC via a trusted non-3GPP access network
6.4.1
General
6.4.1A
TWAN connection modes
6.4.2
UE procedures
6.4.3
3GPP AAA server procedures
6.4.4
Multiple PDN support for trusted non-3GPP access
6.5
Authentication and authorization for accessing EPC via an untrusted non-3GPP access network
6.6
UE - 3GPP EPC (cdma2000® HRPD Access)
6.7
UE - 3GPP EPC (WiMAX Access)
6.8
Communication over the S14
6.9
Handling of Protocol Configuration Options information
6.10
Integration with access stratum layer of 3GPP access
...
6
UE - EPC Network protocols
p. 35
6.1
General
p. 35
6.2
Trusted and Untrusted Accesses
p. 35
6.2.1
General
p. 35
6.2.2
Pre-configured policies in the UE
p. 35
6.2.3
Dynamic Indication
p. 35
6.2.4
No trust relationship information
p. 35
6.3
IP Mobility Mode Selection
p. 36
6.3.1
General
p. 36
6.3.2
Static configuration of inter-access mobility mechanism
p. 36
6.3.3
Dynamic configuration of inter-access mobility mechanism
p. 36
6.3.3.0
General
p. 36
6.3.3.1
IPMS indication
p. 36
6.3.3.1.1
IPMS indication from UE to 3GPP AAA server
p. 36
6.3.3.1.2
IPMS indication from 3GPP AAA server to UE
p. 37
6.4
Authentication and authorization for accessing EPC via a trusted non-3GPP access network
p. 37
6.4.1
General
p. 37
6.4.1A
TWAN connection modes
|R12|
p. 38
6.4.2
UE procedures
p. 38
6.4.2.1
Identity Management
p. 38
6.4.2.1A
Identity Management - emergency session
|R14|
p. 39
6.4.2.2
EAP-AKA and EAP-AKA' based Authentication
p. 39
6.4.2.3
Full Authentication and Fast Re-authentication
p. 39
6.4.2.4
Handling of the Access Network Identity
p. 40
6.4.2.4.1
General
p. 40
6.4.2.4.2
ANID indication from 3GPP AAA server to UE
p. 40
6.4.2.4.3
UE check of ANID for HRPD CDMA 2000® access networks
p. 40
6.4.2.4.4
UE check of ANID for WiMAX access networks
p. 40
6.4.2.4.5
UE check of ANID for WLAN access networks
p. 40
6.4.2.4.6
UE check of ANID for ETHERNET access networks
p. 41
6.4.2.5
Full name for network and short name for network
|R11|
p. 41
6.4.2.6
TWAN connection modes
|R12|
p. 41
6.4.2.6.1
General
p. 41
6.4.2.6.2
Usage of single-connection mode (SCM)
p. 41
6.4.2.6.2A
Usage of single-connection mode (SCM) - emergency
|R14|
p. 44
6.4.2.6.3
Usage of multi-connection mode (MCM)
p. 45
6.4.2.6.3A
Usage of multi-connection mode (MCM) - emergency
|R14|
p. 46
6.4.2.6.3B
Usage of transparent single-connection mode (TSCM) - emergency
|R14|
p. 47
6.4.2.6.4
Network support not available
p. 47
6.4.2.7
Mobile Equipment Identity Signalling
|R13|
p. 49
6.4.3
3GPP AAA server procedures
p. 49
6.4.3.1
Identity Management
p. 49
6.4.3.1A
Identity Management - emergency session
|R14|
p. 49
6.4.3.2
EAP-AKA and EAP-AKA' based Authentication
p. 49
6.4.3.3
Full authentication and Fast Re-authentication
p. 50
6.4.3.4
Full name for network and short name for network
|R11|
p. 50
6.4.3.5
TWAN connection modes
|R12|
p. 50
6.4.3.5.1
General
p. 50
6.4.3.5.1A
Emergency session connection mode negotiation for unauthenticated UEs
|R14|
p. 50
6.4.3.5.2
Usage of single-connection mode (SCM)
p. 51
6.4.3.5.2A
Usage of single-connection mode (SCM) - emergency
|R14|
p. 53
6.4.3.5.3
Usage of multi-connection mode (MCM)
p. 54
6.4.3.5.3A
Usage of multi-connection mode (MCM) - emergency
|R14|
p. 55
6.4.3.5.3B
Usage of transparent single-connection mode (TSCM) - emergency
|R14|
p. 56
6.4.3.5.4
Network support not available
p. 56
6.4.3.6
Mobile Equipment Identity Signalling
|R13|
p. 56
6.4.4
Multiple PDN support for trusted non-3GPP access
p. 57
6.5
Authentication and authorization for accessing EPC via an untrusted non-3GPP access network
p. 58
6.5.1
General
p. 58
6.5.2
Full authentication and authorization
p. 58
6.5.2.1
General
p. 58
6.5.2.2
UE procedures
p. 58
6.5.2.2.1
General
|R12|
p. 58
6.5.2.2.2
EAP AKA
|R12|
p. 58
6.5.2.3
3GPP AAA server procedures
p. 59
6.5.2.3.1
General
|R12|
p. 59
6.5.2.3.2
EAP-AKA
|R12|
p. 59
6.5.2.4
ePDG procedures
|R12|
p. 60
6.5.3
Multiple PDN support for untrusted non-3GPP access network
p. 60
6.6
UE - 3GPP EPC (cdma2000® HRPD Access)
p. 61
6.6.1
General
p. 61
6.6.2
Non-emergency case
p. 62
6.6.2.1
General
p. 62
6.6.2.2
UE identities
p. 62
6.6.2.3
cdma2000® HRPD access network identity
p. 62
6.6.2.4
PLMN system selection
p. 62
6.6.2.5
Trusted and untrusted accesses
p. 62
6.6.2.6
IP mobility mode selection
p. 62
6.6.2.7
Authentication and authorization for accessing EPC
p. 62
6.6.3
Emergency case
p. 62
6.6.3.1
General
|R9|
p. 62
6.6.3.2
UE identities
|R9|
p. 62
6.6.3.3
Authentication and authorization for accessing EPC
|R9|
p. 63
6.7
UE - 3GPP EPC (WiMAX Access)
p. 63
6.7.1
General
p. 63
6.7.2
Non-emergency case
p. 63
6.7.2.1
General
p. 63
6.7.2.2
UE identities
p. 63
6.7.2.3
WiMAX access network identity
p. 63
6.7.2.4
Selection of the Network Service Provider
p. 63
6.7.2.5
Trusted and untrusted accesses
p. 63
6.7.2.6
IP mobility mode selection
p. 64
6.7.2.7
Authentication and authorization for accessing EPC
p. 64
6.7.3
Emergency case
p. 64
6.8
Communication over the S14
p. 64
6.8.1
General
p. 64
6.8.2
Interaction with the Access Network Discovery and Selection Function
p. 65
6.8.2.1
General
p. 65
6.8.2.2
UE procedures
p. 65
6.8.2.2.1
UE discovering the ANDSF
p. 65
6.8.2.2.1A
ANDSF communication security
p. 66
6.8.2.2.2
Role of UE for Push model
p. 66
6.8.2.2.3
Role of UE for Pull model
p. 66
6.8.2.2.4
UE using information provided by ANDSF
p. 67
6.8.2.3
ANDSF procedures
p. 72
6.8.2.3.1
General
p. 72
6.8.2.3.2
Role of ANDSF for Push model
p. 72
6.8.2.3.3
Role of ANDSF for Pull model
p. 72
6.9
Handling of Protocol Configuration Options information
p. 72
6.10
Integration with access stratum layer of 3GPP access
|R12|
p. 73
6.10.1
General
p. 73
6.10.2
Selection of control of WLAN access selection and traffic routing
p. 73
6.10.3
Additional procedures when WLAN access selection and traffic routing is controlled by ANDSF rules
p. 74
6.10.4
Additional procedures when WLAN access selection and traffic routing is controlled by RAN rules
p. 75