1.1.2.1.1.5.6 GAP Security (Encryption) procedure

Example of central security (encryption) procedure

    

    

Example of peripheral security (encryption) procedure