Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.107
Word version: 18.0.0
0…
4
5…
5A…
6…
7…
7A…
8…
9…
10…
11…
12…
12.2…
12.3…
12.4…
12.5…
13…
14…
15…
16…
17…
18…
19…
20…
21…
22…
23…
A…
B…
C…
D…
E…
F…
G…
H…
I…
J…
L…
20
Lawful interception in the VPLMN with S8HR Roaming Architecture
20.1
Architecture
20.2
Provision of Content of Communications
20.3
Provision of Intercept Related Information
20.4
Lawful Interception with CUPS architecture
20.5
S8HR LI and Target UE Mobility
...
20
Lawful interception in the VPLMN with S8HR Roaming Architecture
|R14|
p. 229
20.1
Architecture
p. 229
20.1.1
Overview
p. 229
20.1.2
LI specific Reference Points
p. 230
20.1.3
LI Specific Functions
p. 230
20.1.3.1
Void
20.1.3.2
BBIFF: Bearer Binding Intercept and Forward Function
p. 230
20.1.3.3
LMISF: LI Mirror IMS State Function
p. 231
20.2
Provision of Content of Communications
p. 232
20.2.1
Overview
p. 232
20.2.1.1
General
p. 232
20.2.1.2
S-GW/BBIFF Procedures for CC Interception
p. 233
20.2.1.3
Void
20.2.1.4
LMISF Procedures for CC Interception
p. 234
20.2.2
X3-Interface
p. 234
20.3
Provision of Intercept Related Information
p. 234
20.3.1
Overview
p. 234
20.3.1.1
General
p. 234
20.3.1.2
Void
20.3.1.3
S-GW/BBIFF Procedures for IRI interception
p. 235
20.3.1.4
LMISF Procedures for IRI interception
p. 235
20.3.2
IRI Events
p. 236
20.3.2.1
General
p. 236
20.3.2.2
IMEI-based interception
p. 236
20.3.2.3
Mid-call Interception
p. 236
20.3.2.4
Signalling Compression
p. 236
20.3.2.5
Limitations
p. 237
20.3.3
X2-Interface
p. 237
20.4
Lawful Interception with CUPS architecture
p. 237
20.5
S8HR LI and Target UE Mobility
p. 239
20.5.1
Overview
p. 239
20.5.2
S-GW Relocation
p. 239