Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 32.371
Word version: 18.0.0
0…
2…
2
References
3
Definitions and abbreviations
4
Security Management background
5
Security Management context and architecture
6
Security threats in IRP context
7
Security requirement of Itf-N
A
Protocols for IP Network Security to Support Itf-N
B
Firewalls for Network Security to Support Itf-N
$
Change History
2
References
p. 6
3
Definitions and abbreviations
p. 7
3.1
Definitions
p. 7
3.2
Abbreviations
p. 8
4
Security Management background
p. 9
4.1
Security domains
p. 9
4.2
Security objectives
p. 10
4.3
Security threats
p. 10
4.4
Security Mechanisms and services
p. 11
4.5
TMN perspective regarding security threats
p. 11
5
Security Management context and architecture
p. 12
5.1
Context
p. 12
5.2
Architecture
p. 13
6
Security threats in IRP context
p. 13
6.1
Security threats to IRPs
p. 13
6.2
Mapping of Security requirements and Threats in IRP Context
p. 15
7
Security requirement of Itf-N
p. 16
A
Protocols for IP Network Security to Support Itf-N
p. 18
B
Firewalls for Network Security to Support Itf-N
p. 26
$
Change History
p. 27