Table of Contents

 1     Scope          
 2     References
 3     Definitions 
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Negotiation description       
        6.1     Call establishment security      
        6.2     Negotiation of security mechanism     
 7     Feature description securityProtocolNegotiation     
        7.1     tlsSecurityProtocol      
        7.2     ipsecSecurityProtocol
        7.3     dtlsSecurityProtocol   
 8     NAT traversal considerations