tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here        Top        Up        Prev        Next
part:    1     2     3     4     5     6     7     8     9

 

 

D   Information flows for Lawful Interception invocation at the MGW using H.248 [R5]   PDF-p. 285
E   IMS-based VoIP Lawful Interception call scenarios [R12]   PDF-p. 287
E.1   Overview
E.2   Background
E.3   Originating Call from the Target with CC Interception at the PDN-GW/GGSN   PDF-p. 290
E.4   Originating Call from the Target with CC Interception at the IMS-AGW   PDF-p. 292
E.5   Terminating Call to the Target with CC Interception at the PDN-GW/GGSN   PDF-p. 293
E.6   Terminating Call to the Target with CC Interception at the IMS-AGW   PDF-p. 295
E.7   Intra-CSP Forwarded Call with CC Interception at the PDN-GW/GGSN   PDF-p. 296
E.8   Intra-CSP Forwarded Call with CC Interception at the IMS-AGW   PDF-p. 298
E.9   Inter-CSP Forwarded Call to a CS Domain   PDF-p. 299
E.10   Inter-CSP Forwarded Call to an IMS Domain   PDF-p. 300
E.11   Originating Call from the Target with IMS Roaming   PDF-p. 301
E.12   Terminating Call to the Target with IMS Roaming   PDF-p. 302
E.13   Intra-CSP Forwarded Call with IMS Roaming   PDF-p. 303      Up
E.14   Lawful interception in the VPLMN with IMS roaming [R13]   PDF-p. 304

Up        Top        ToC