tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

 


 

Here          Top          Up          Prev          Next
part:    1     2     3     4     5     6     7     8     9

 

 

D   Information flows for Lawful Interception invocation at the MGW using H.248 [R5]   PDF-p. 265
E   IMS-based VoIP Lawful Interception call scenarios [R12]   PDF-p. 267
E.1   Overview
E.2   Background
E.3   Originating Call from the Target with CC Interception at the PDN-GW/GGSN   PDF-p. 270
E.4   Originating Call from the Target with CC Interception at the IMS-AGW   PDF-p. 272
E.5   Terminating Call to the Target with CC Interception at the PDN-GW/GGSN   PDF-p. 273
E.6   Terminating Call to the Target with CC Interception at the IMS-AGW   PDF-p. 275
E.7   Intra-CSP Forwarded Call with CC Interception at the PDN-GW/GGSN   PDF-p. 276
E.8   Intra-CSP Forwarded Call with CC Interception at the IMS-AGW   PDF-p. 278
E.9   Inter-CSP Forwarded Call to a CS Domain   PDF-p. 279      Up
E.10   Inter-CSP Forwarded Call to an IMS Domain   PDF-p. 280
E.11   Originating Call from the Target with IMS Roaming   PDF-p. 281
E.12   Terminating Call to the Target with IMS Roaming   PDF-p. 282
E.13   Intra-CSP Forwarded Call with IMS Roaming   PDF-p. 283
E.14   Lawful interception in the VPLMN with IMS roaming [R13]   PDF-p. 284

Up          Top          ToC