Dear Antony, Thanks again for your hard work to put this DMM requirements draft together.
Per my promise to you to suggest the definitions for the trusted and untrusted network access, here is my proposal: >>>>> For a trusted network access, the communication between the MN and the network is trusted to secure. For an untrusted network access, the communication between the MN and the network is not trusted to be secure. For a trusted network access, all communication between the network administrative domains is transferred over pre-established secure links. For an untrusted network access, a secured tunnel (e.g. IPSec) needs to be established on a per access basis, if required, to secure communication between the MN and the access network. >>>>> Please feel free to comment and modify. Cheers. Tricci -------------------------------------------------------- ZTE Information Security Notice: The information contained in this mail (and any attachment transmitted herewith) is privileged and confidential and is intended for the exclusive use of the addressee(s). If you are not an intended recipient, any disclosure, reproduction, distribution or other dissemination or use of the information contained is strictly prohibited. If you have received this mail in error, please delete it and notify us immediately.
_______________________________________________ dmm mailing list [email protected] https://www.ietf.org/mailman/listinfo/dmm
