AS/NZS 4471:1997
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Information technology - Open Systems Interconnection - Network layer security protocol
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
30-06-2017
English
05-06-1997
Specifies a protocol to be used by end systems and intermediate systems in order to provide security service in the network layer of the OSI 7-layer model, and is identical to and reproduced from ISO/IEC 11577:1995.
Committee |
IT-001
|
DocumentType |
Standard
|
ISBN |
0 7337 1140 5
|
Pages |
108
|
PublisherName |
Standards Australia
|
Status |
Withdrawn
|
Supersedes |
This ITU-T Recommendation International Standard specifies a protocol to be used by End Systems and Intermediate Systems in order to provide security services in the Network layer, which is defined by CCITT Rec. X.213 ISO/IEC 8348, and ISO 8648. The protocol defined in this ITU-T Recommendation International Standard is called the Network Layer Security Protocol (NLSP).This ITU-T Recommendation International Standard specifies:1) Support for the following security services defined in CCITT Rec. X.800 ISO 7498-2: a) peer entity authentication; b) data origin authentication; c) access control; d) connection confidentiality; e) connectionless confidentiality; f) traffic flow confidentiality;g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected);h) connectionless integrity.2) The functional requirements for implementations that claim conformance to this ITU-T Recommendation International Standard.The procedures of this protocol are defined in terms of:a) requirements on the cryptographic techniques that can be used in an instance of this protocol;b) requirements on the information carried in the security association used in an instance of communication.Although the degree of protection afforded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems.Furthermore, neither the choice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single instance of secure communications. This ITU-T Recommendation International Standard does not require that multiple instances of secure communications involving a single open system must use the same security protocol.Annex D provides the PICS proforma for the Network Layer Security Protocol in compliance with the relevant guidance given in ISO/IEC 9646-2.
Standards | Relationship |
ISO/IEC 11577:1995 | Identical |
First published as AS/NZS 4471:1997.
AS/NZS 3621:1994 | Information technology - Data communications - X.25 packet layer protocol for data terminal equipment |
AS 3622-1989 | Information processing systems - Open Systems Interconnection - Internal organization of the network layer |
AS 4019.8-1992 | Information technology - Open Systems Interconnection - The Directory Authentication framework |
AS 3626-1991 | Information technology - Open Systems Interconnection - Specification of basic encoding rules for Abstract Syntax Notation One (ASN.1) |
AS/NZS 4153.3:1999 | Information technology - Open Systems Interconnection - Procedures for the operation of OSI registration authorities Registration of values of RH-name-tree components for joint ISO and ITU-T use |
AS/NZS 2994:1994 | Information technology - Open Systems Interconnection - Network service definition |
AS/NZS 3604:1994 | Information technology - Telecommunications and information exchange between systems - Use of X.25 to provide the OSI connection-mode network service |
AS/NZS 2777.1:1998 | Information processing systems - Open Systems Interconnection - Basic reference model The basic model |
AS/NZS 4153.1:1994 | Information technology - Open Systems Interconnection - Procedures for the operation of OSI registration authorities General procedures |
AS 2777.2-1990 | Information processing systems - Open systems interconnection - Basic reference model Security architecture |
AS/NZS 3621:2000 | Information technology - Data communications - X.25 packet layer protocol for data terminal equipment |
AS/NZS 13594:1998 | Information technology - Lower layers security |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.