Table of Contents

 1     Scope          
        1.1     Applicability    
        1.2     Policy rules     
 2     References               
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Recommendation            
 4     Abbreviations and acronyms             
 5     Conventions             
 6     DPI functional entity requirements
        6.1     Flow and application identification       
        6.2     DPI signature management     
        6.3     Traffic inspection aspects         
        6.4     Reporting capability    
        6.5     Interaction with a policy decision function        
        6.6     Traffic control
        6.7     Session identification 
        6.8     Inspection of encrypted traffic              
        6.9     Inspection of compressed traffic          
       6.10     Detection of abnormal traffic
 7     Functional requirements from the network viewpoint          
        7.1     General requirements               
        7.2     Data plane, control plane and management plane in DPI node
 8     Interfaces of the DPI-functional entity          
        8.1     External DPI-FE interfaces        
        8.2     Internal DPI-FE interfaces        
        8.3     Interface requirements            
 9     Security considerations and requirements  
        9.1     Security threats against DPI entities    
        9.2     Security requirements for DPI entities               
Annex A – Specification of a flow descriptor    
        A.1     Protocol syntactical perspective           
        A.2     Specifying information element values             
        A.3     Relation between flow descriptor, IPFIX flow identifier and IPFIX flow key       
Bibliography