About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?
Charlie, great presentation on "Deployment Options"
About the security between Core Networks and Access networks(5GC -- RAN), (1) How a secure session is created? What do security needs - integrity & authentication only? (2) Does it use IPsec or DTLS? (3) Does the security session has a time latency limit? (4) What is the capacity of the devices used to create the secure session ?