AS NZS 4471-1997 PDF
Name in English:
St AS NZS 4471-1997
Name in Russian:
Ст AS NZS 4471-1997
Original standard AS NZS 4471-1997 in PDF full version. Additional info + preview on request
Full title and description
AS/NZS 4471:1997 — Information technology — Open Systems Interconnection — Network layer security protocol. This joint Australia/New Zealand adoption reproduces ISO/IEC 11577:1995 and defines the Network Layer Security Protocol (NLSP) for providing security services at the OSI network layer.
Identical reproduction of ISO/IEC 11577:1995 (Network Layer Security Protocol).
Abstract
This standard specifies the NLSP: functional requirements and protocol procedures used by end systems and intermediate systems to provide security services in the OSI network layer. Services covered include peer‑entity authentication, data origin authentication, various confidentiality modes, access control and integrity services. The document also sets requirements on cryptographic technique use and the information carried in security associations.
General information
- Status: Withdrawn (withdrawn without replacement).
- Publication date: AS/NZS adoption published 1997 (listed as 6 May 1997 on Standards Australia product records); original ISO/IEC parent standard published 11 May 1995.
- Publisher: Standards Australia / Standards New Zealand (joint adoption of ISO/IEC 11577).
- ICS / categories: Telecommunications / network layer security — ICS 35.100.30 (network layer).
- Edition / version: Edition 1 (AS/NZS adoption of the 1995 ISO/IEC text; AS/NZS publication 1997).
- Number of pages: 108 pages.
Scope
Specifies a protocol to be used by End Systems and Intermediate Systems to provide security services at the OSI network layer (as defined by X.213 / ISO/IEC 8348 / ISO 8648). The NLSP defines supported security services, functional requirements for conformance, requirements on cryptographic techniques, and the information carried in security associations. Annex material includes a PICS proforma for NLSP.
Key topics and requirements
- Definition of the Network Layer Security Protocol (NLSP) and its message/association semantics.
- Supported security services: peer‑entity authentication, data origin authentication, access control, connection confidentiality, connectionless confidentiality, traffic flow confidentiality, connection integrity (with and without recovery), and connectionless integrity.
- Functional conformance requirements for implementations claiming compliance with NLSP.
- Requirements and guidance on allowable cryptographic techniques and on information carried in security associations (local choice of specific algorithms left to implementers).
- Conformance/implementation support material (PICS proforma and test guidance in annexes).
Typical use and users
Intended for protocol implementers, OSI stack developers, network equipment vendors, systems integrators working with OSI-based networks, and standards or security architects studying network‑layer security models. Historically used where OSI network‑layer security mechanisms were required or where ISO/ITU-T OSI recommendations were being implemented.
Related standards
International parent: ISO/IEC 11577:1995 (identical). Normative references include CCITT/ITU‑T and ISO OSI documents such as X.213 / ISO/IEC 8348 and ISO 8648, and ISO 7498‑2 (security services). Within the AS/NZS family, related documents include other OSI and information‑technology parts reproduced from ISO/IEC series.
Keywords
Network Layer Security Protocol, NLSP, OSI, network‑layer security, ISO/IEC 11577, authentication, confidentiality, integrity, security association, Standards Australia, Standards New Zealand.
FAQ
Q: What is this standard?
A: AS/NZS 4471:1997 is the Australia/New Zealand adoption of the ISO/IEC 11577:1995 standard specifying the Network Layer Security Protocol (NLSP) for security services at the OSI network layer.
Q: What does it cover?
A: It defines NLSP message procedures, the set of supported security services (authentication, confidentiality, integrity, access control, traffic‑flow confidentiality), functional conformance requirements, requirements on cryptographic technique use, and information to be carried in security associations. It also includes implementation/conformance support material (e.g., a PICS proforma).
Q: Who typically uses it?
A: Protocol implementers, network equipment vendors, systems integrators, security architects and researchers working with OSI network‑layer designs or studying historical OSI security mechanisms.
Q: Is it current or superseded?
A: AS/NZS 4471:1997 has been withdrawn (the AS/NZS entry is withdrawn and the document is no longer current for normative use). Records show the AS/NZS entry was withdrawn (listed withdrawn in catalogue records; withdrawal entries for a number of legacy AS/AS‑NZS IT standards were recorded around 2017). For up‑to‑date guidance, consult current ISO/IEC standards and contemporary network/security standards; the original ISO/IEC 11577 text dates from 1995.
Q: Is it part of a series?
A: Yes — it is part of the OSI / information‑technology family of standards (ISO/IEC and corresponding AS/AS‑NZS adoptions) covering OSI reference model parts and security (examples: ISO/IEC 7498‑2, ISO/IEC 8348 and related OSI documents). AS/NZS 4471:1997 is the AS/AS‑NZS adoption of the ISO/IEC 11577 document.
Q: What are the key keywords?
A: NLSP, network layer security, OSI, ISO/IEC 11577, authentication, confidentiality, integrity, security association, Standards Australia, Standards New Zealand.