List of Tables List of Tables 1-1 Acronyms 2-1 Deployment Environment 3-1 5G Network Functions 3-2 4G Network Functions 5-1 Key Trust Boundaries 5-2 External Data Flows 9-1 Updating admusr SSH Keys A-1 NF Port Flows