tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here          Top          Up          Prev          Next
part:    1     2     3     4     5     6     7     8     9

 

 

12   Lawful Interception for Evolved Packet System [R8]   PDF-p. 110      Up
12.1   LI functional architecture for EPS
12.2   Functional requirements for LI in case of E-UTRAN access and GTP based S5/S8.   PDF-p. 113
12.3   Functional requirements for LI in case of E-UTRAN access and PMIP based S5/S8 interfaces      Up
12.4   Functional requirements for LI in case of trusted non-3GPP IP access   PDF-p. 137
12.4.0   General [R12]
12.4.1   Provision of Intercept Related Information   PDF-p. 138      Up
12.4.2   X3-interface   PDF-p. 143
12.4.3   LI events for trusted Non-3GPP IP access
12.5   Functional requirements for LI in case of untrusted non-3GPP IP access   PDF-p. 152
12.5.0   Introduction [R12]      Up
12.5.1   Provision of Intercept Related Information
12.5.2   X3-interface   PDF-p. 158
12.5.3   LI events for untrusted Non-3GPP IP access
12.6   Functional requirements for LI in case of Handovers between E-UTRAN and CDMA2000 Accesses.   PDF-p. 166
12.7   Functional requirements for LI in case of interworking between SGSN and EPS nodes over S4/S12 interfaces
12.8   Functional requirements for LI in case of interworking between SGSN and PDN-GW over Gn/Gp interfaces
12.9   Functional Requirements for LI in case of Control and User Plane Separation [R14]   PDF-p. 167      Up

Up          Top          ToC