Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.928
Word version: 18.4.0
0…
4…
4
ADMF and provisioning
5
LIPF logic
5.1
Background
5.2
Governing scenarios
5.3
Top-level LIPF provisioning logic
5.4
Data
5.5
Voice
5.6
Messaging
5.7
PTC
5.8
LALS
5.10
RCS
C
Bibliography
$
Change history
4
ADMF and provisioning
p. 7
4.1
Overview
p. 7
4.2
General
p. 7
4.3
Destination end points
p. 9
5
LIPF logic
p. 10
5.1
Background
p. 10
5.2
Governing scenarios
p. 11
5.3
Top-level LIPF provisioning logic
p. 11
5.3.1
LIPF logic for initial configuration
p. 11
5.3.2
LI provisioning logic in LIPF
p. 11
5.3.3
Service-based LI provisioning logic in LIPF
p. 12
5.3.4
Location Acquisition
p. 12
5.4
Data
p. 13
5.4.1
Scope of interception
p. 13
5.4.2
Top-level view
p. 14
5.4.3
5GC
p. 14
5.4.3.1
The flow-chart
p. 14
5.4.3.2.1
PDHR
p. 17
5.4.3.2.2
LALS triggering
p. 17
5.4.3.2.3
UDM
p. 17
5.4.3.2.4
Summary
p. 17
5.4.3.3
LI provisioning for additional data services in 5GC
p. 18
5.4.3.3.1
LI provisioning for AKMA
p. 18
5.4.3.3.2
LI provisioning for NEF based services
p. 18
5.4.3.3.2.1
Scope of interception
p. 18
5.4.3.3.2.2
The flow-chart
p. 19
5.4.3.3.2.3
Interception
p. 19
5.4.3.3.3
LI provisioning for Edge Computing Service
p. 20
5.4.3.3.4
LI provisioning for 5G Media Streaming
p. 21
5.4.4
EPC
p. 22
5.4.4.1
The flow-chart
p. 22
5.4.4.2
Interception
p. 25
5.4.4.2.1
PDHR
p. 25
5.4.4.2.2
LALS triggering
p. 25
5.4.4.2.3
SGW/PGW deployment options
p. 25
5.4.4.2.4
HSS
p. 26
5.4.4.2.5
Summary
p. 26
5.4.4.3
LI provisioning for additional data services in EPC
p. 27
5.4.4.3.1
LI provisioning for SCEF/IWK-SCEF based services
p. 27
5.4.4.3.1.1
Scope of interception
p. 27
5.4.4.3.1.2
The flow-chart
p. 28
5.4.4.3.1.3
Interception
p. 28
5.5
Voice
p. 29
5.5.1
Scope of interception
p. 29
5.5.2
Initial configuration for N9HR/S8HR
p. 29
5.5.2.1
General
p. 29
5.5.2.2
Common to all HPLMNs
p. 30
5.5.2.3
Separate configuration for an HPLMN
p. 30
5.5.3
Top level LIPF logic for service type voice
p. 31
5.5.4
LIPF logic for targets that are not non-local ID
p. 32
5.5.4.1
The flowchart
p. 32
5.5.4.2
Interception
p. 38
5.5.4.2.1
IMS deployment
p. 38
5.5.4.2.2
LALS triggering
p. 38
5.5.4.2.3
Summary
p. 38
5.5.4.2.4
STIR/SHAKEN
p. 40
5.5.5
LIPF logic for targets that are non-local ID
p. 42
5.5.5.1
The flowchart
p. 42
5.5.5.2
Interception
p. 46
5.5.5.2.1
IMS deployment
p. 46
5.5.5.2.2
Summary
p. 47
5.5.5.2.3
STIR/SHAKEN
p. 48
5.6
Messaging
p. 48
5.6.1
Scope of interception
p. 48
5.6.2
LIPF logic for service type messaging
p. 49
5.6.2.1
Flowcharts
p. 49
5.6.2.2
Interception
p. 53
5.6.2.2.1
IMS deployment
p. 53
5.6.2.2.2
LALS triggering
p. 53
5.6.2.2.3
Summary
p. 53
5.7
PTC
p. 54
5.7.1
Scope of interception
p. 54
5.7.2
LIPF logic for service type of PTC
p. 55
5.8
LALS
p. 56
5.8.1
Scope of interception
p. 56
5.8.2
LIPF logic for service type of LALS
p. 56
5.9
Void
5.10
RCS
p. 56
5.10.1
Scope of interception
p. 56
5.10.2
LIPF logic for service type of RCS
p. 57
5.10.3
Interception
p. 60
5.10.3.1
Deployment
p. 60
5.10.3.2
Summary
p. 60
C
Bibliography
p. 62
$
Change history
p. 63