tech-invite   World Map
3GPP     Specs     Glossaries     UICC       T+       IETF     RFCs     Groups     SIP     ABNFs       Search     Home
 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6     7     8     9

 

 

12   Lawful Interception for Evolved Packet System [R8]   PDF-p. 113      Up
12.1   LI functional architecture for EPS
12.2   Functional requirements for LI in case of E-UTRAN access and GTP based S5/S8.   PDF-p. 116
12.3   Functional requirements for LI in case of E-UTRAN access and PMIP based S5/S8 interfaces      Up
12.4   Functional requirements for LI in case of trusted non-3GPP IP access   PDF-p. 140
12.4.0   General [R12]
12.4.1   Provision of Intercept Related Information   PDF-p. 141      Up
12.4.2   X3-interface   PDF-p. 146
12.4.3   LI events for trusted Non-3GPP IP access
12.5   Functional requirements for LI in case of untrusted non-3GPP IP access   PDF-p. 155
12.5.0   Introduction [R12]      Up
12.5.1   Provision of Intercept Related Information
12.5.2   X3-interface   PDF-p. 161
12.5.3   LI events for untrusted Non-3GPP IP access
12.6   Functional requirements for LI in case of Handovers between E-UTRAN and CDMA2000 Accesses.   PDF-p. 169
12.7   Functional requirements for LI in case of interworking between SGSN and EPS nodes over S4/S12 interfaces
12.8   Functional requirements for LI in case of interworking between SGSN and PDN-GW over Gn/Gp interfaces
12.9   Functional Requirements for LI in case of Control and User Plane Separation [R14]   PDF-p. 170      Up

Up        Top        ToC