Table of Contents
1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviationsandacronyms
5Conventions
6OverviewoftheCorrelativeReactingSystem
7CRSdescription
7.1Preconditions
7.2CRSobjectives
7.3CRSsystemarchitecture
7.4CRSentities
7.5CRSinterfaces
8CRSpolicy
8.1Securityevaluationpolicy
8.2Securitycontrolpolicy
8.3Groupattributemanagement
9CommunicationbetweenSCAandSCS
9.1Messagecarrierprotocol
9.2Security
9.3Messages
10CommunicationbetweentheNAC/ASCandtheSCS
10.1General
10.2Messagesecurity
10.3Messages
11GeneralproceduresinCRS
11.1ThediscoveryofSCA/SCS
11.2SCIreportandMScontrolprocedure
11.3SCAauto-installationandauto-updating
11.4Generationanddeliveryofcontrolpolicy
11.5MSsecurityupdating
11.6MSleavedatanetwork
12Specialprocessingprocedures
12.1Large-scaleupdating
13HandlingCRSroaming
13.1CRSroamingdefinition
13.2CRSroamingwithinoneCRS-deployednetwork
13.3CRSroamingbetweenCRS-deployednetworks
13.4CRSroamingbetweenCRS-deployednetworkand
CRS-undeployednetwork
AnnexA-CRSAPmessages
A.1XMLschemadefinition
A.2TheequivalentASN.1specificationoftheCRSAP
messages
AppendixI-SomeconsiderationsonCRSimplementation
I.1DeploymentofSCA
I.2DeploymentofSCS
I.3DeploymentofCRSinmobileIPnetworks
AppendixII-AnexampleofCRSAPmessageexchange
II.1AnexampleSCIreport
II.2AnexampleSCIresponse
Bibliography Abstract
Purpose of this recommendation is to protect mobile networks against the threats of insecure terminals that do not conform to the security policy of the network, such as terminals that have been compromised.