5G standards were designed with the use of ephemeral key-based encryption.
With the scale of devices, volume of traffic, and virtualization in the 5G core, the ability to gain visibility into the encrypted traffic for effective performance monitoring and security can be quite difficult.
In this session we will explore some of the options for avoiding these challenges.