Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.220
Word version: 18.3.0
1…
4…
4.4…
4.5…
5…
B…
D…
I…
J…
M…
N…
I
2G GBA
I.0
Introduction
I.1
Reference model
I.2
Network elements
I.3
Bootstrapping architecture and reference points
I.4
Requirements and principles for bootstrapping
I.5
Procedures
I.6
TLS Profile
...
I
(Normative) 2G GBA
|R7|
p. 54
I.0
Introduction
|R11|
p. 54
I.1
Reference model
p. 54
I.2
Network elements
p. 54
I.2.1
Bootstrapping server function (BSF)
p. 54
I.2.2
Network application function (NAF)
p. 55
I.2.2a
Zn-Proxy
p. 55
I.2.3
HSS
p. 55
I.2.4
UE
p. 56
I.2.5
SLF
p. 56
I.2.6
HLR
p. 57
I.3
Bootstrapping architecture and reference points
p. 57
I.3.1
Reference point Ub
p. 57
I.3.2
Reference point Ua
p. 57
I.3.3
Reference point Zh
p. 57
I.3.4
Reference point Zn
p. 57
I.3.5
Reference point Dz
p. 57
I.3.6
Reference point Zh'
p. 57
I.4
Requirements and principles for bootstrapping
p. 57
I.4.0
General requirements
|R11|
p. 57
I.4.1
Access Independence
p. 58
I.4.2
Authentication methods
p. 58
I.4.3
Roaming
p. 58
I.4.4
Requirements on reference point Ub
p. 58
I.4.5
Requirements on reference point Zh
p. 59
I.4.6
Requirements on reference point Zn
p. 59
I.4.7
Requirements on Bootstrapping Transaction Identifier
p. 60
I.4.8
Requirements on selection of UICC application and SIM card
p. 61
I.4.9
Requirements on reference point Ua
p. 61
I.4.10
Requirements on reference point Dz
p. 61
I.4.11
Requirements on reference point Zh'
p. 61
I.5
Procedures
p. 61
I.5.1
Initiation of bootstrapping
p. 61
I.5.2
Bootstrapping procedures
p. 61
I.5.3
Procedures using bootstrapped Security Association
p. 64
I.5.4
Procedure related to service discovery
p. 66
I.6
TLS Profile
p. 66
I.6.1
Void
I.6.2
Authentication of the BSF
p. 67
I.6.3
Authentication of the UE
p. 67
I.6.4
Set-up of Security parameters
p. 67