Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.107  Word version:  18.0.0

Top   Top   Up   Prev   Next
0…   4   5…   5A…   6…   7…   7A…   8…   9…   10…   11…   12…   12.2…   12.3…   12.4…   12.5…   13…   14…   15…   16…   17…   18…   19…   20…   21…   22…   23…   A…   B…   C…   D…   E…   F…   G…   H…   I…   J…   L…

 

E  IMS-based VoIP Lawful Interception call scenarios |R12|p. 318

E.1  Overviewp. 318

E.2  Backgroundp. 318

E.3  Originating Call from the Target with CC Interception at the PDN-GW/GGSNp. 321

E.4  Originating Call from the Target with CC Interception at the IMS-AGWp. 323

E.5  Terminating Call to the Target with CC Interception at the PDN-GW/GGSNp. 324

E.6  Terminating Call to the Target with CC Interception at the IMS-AGWp. 326

E.7  Intra-CSP Forwarded Call with CC Interception at the PDN-GW/GGSNp. 327

E.8  Intra-CSP Forwarded Call with CC Interception at the IMS-AGWp. 329

E.9  Inter-CSP Forwarded Call to a CS Domainp. 330

E.10  Inter-CSP Forwarded Call to an IMS Domainp. 331

E.11  Originating Call from the Target with IMS Roamingp. 332

E.12  Terminating Call to the Target with IMS Roamingp. 333

E.13  Intra-CSP Forwarded Call with IMS Roamingp. 334

E.14  Lawful interception in the VPLMN with IMS roaming |R13|p. 335


Up   Top   ToC