Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.180
Word version: 18.1.0
1…
4…
4.3.4
4.3.5
5…
5.1.3
5.1.4…
5.2…
5.2.3
5.2.4
5.2.5
5.2.6…
5.3…
5.4…
6…
7…
7.3…
8…
9…
9.4…
10…
A…
B…
C…
D…
E…
F…
J…
L…
L
MC Security Gateway (SeGy)
L.1
General
L.2
Functional model for the MC Security Gateway (SeGy)
L.3
Functions of a MC Security Gateway (SeGy)
L.4
Security procedures for the MC Security Gateway (SeGy)
L.5
Interworking using a MC Security Gateway
$
Change history
L
(Normative) MC Security Gateway (SeGy)
|R15|
p. 194
L.1
General
p. 194
L.2
Functional model for the MC Security Gateway (SeGy)
p. 194
L.3
Functions of a MC Security Gateway (SeGy)
p. 195
L.3.1
Components of a MC Security Gateway (SeGy)
p. 195
L.3.2
Pseudo KMS
p. 195
L.3.3
Pseudo GMS
p. 196
L.3.4
Pseudo MCX Server or IS Proxy
p. 196
L.3.5
Pseudo MC clients
p. 196
L.4
Security procedures for the MC Security Gateway (SeGy)
p. 196
L.4.1
General
p. 196
L.4.2
Security procedures for private communication (initiated in the protected MC system)
p. 197
L.4.3
Security procedures for private communication (initiated in the unprotected MC system)
p. 198
L.4.4
Security procedures for group communications (group homed in the protected MC system)
p. 199
L.4.5
Security procedures for group communications (group homed in the unprotected MC system)
p. 201
L.5
Interworking using a MC Security Gateway
p. 202
L.5.1
General
p. 202
L.5.2
MC Security Gateway and the IWF
p. 202
$
Change history
p. 204