Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.107
Word version: 18.0.0
0…
4
5…
5A…
6…
7…
7A…
8…
9…
10…
11…
12…
12.2…
12.3…
12.4…
12.5…
13…
14…
15…
16…
17…
18…
19…
20…
21…
22…
23…
A…
B…
C…
D…
E…
F…
G…
H…
I…
J…
L…
15
Invocation of Lawful Interception for IMS-based VoIP
15.1
Overview of VoIP Interception
15.2
Provision of Content of Communications
15.2.0
Overview
15.2.1
General Principles of CC Interception
15.2.2
VoIP CC Interception
15.2.3
Media Information Associated with the CC
15.2.4
CC Interception in HPLMN with IMS Roaming
15.2.5
CC Interception with CUPS
15.3
Provision of Intercept Related Information for VoIP
15.4
Lawful interception in the VPLMN with IMS roaming
15.5
Constraints for IMS VoIP Roaming Interception
...
15
Invocation of Lawful Interception for IMS-based VoIP
|R12|
p. 180
15.1
Overview of VoIP Interception
p. 180
15.2
Provision of Content of Communications
p. 181
15.2.0
Overview
|R13|
p. 181
15.2.1
General Principles of CC Interception
p. 181
15.2.1.1
Intercept Trigger
p. 181
15.2.1.2
X3-Interface
p. 182
15.2.2
VoIP CC Interception
p. 182
15.2.3
Media Information Associated with the CC
|R13|
p. 184
15.2.4
CC Interception in HPLMN with IMS Roaming
|R13|
p. 184
15.2.5
CC Interception with CUPS
|R14|
p. 185
15.3
Provision of Intercept Related Information for VoIP
p. 185
15.4
Lawful interception in the VPLMN with IMS roaming
|R13|
p. 185
15.4.1
Local breakout with P-CSCF in the VPLMN
p. 185
15.5
Constraints for IMS VoIP Roaming Interception
|R14|
p. 185