Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TS 33.127
Lawful Interception Architecture and Functions

V19.2.0 (Wzip)  2025/03  193 p.
V18.11.0 (PDF)  2025/03  186 p.
V17.15.0  2024/12  166 p.
V16.14.0  2024/12  109 p.
V15.5.0  2024/09  55 p.
Rapporteur:
Mr. Jaspers, Koen
PIDS

essential Table of Contents for  TS 33.127  Word version:  19.2.0

each title, in the "available" or "not available yet" area, links to the equivalent title in the CONTENT
Here   Top

Up   Top

List of Figures and Tables

Figure 5.2-1A high-level generic view of LI architecture
Figure 5.3.4-1MDF2 and MDF3
Figure 5.4.1-1High-level interception architecture diagram with key point-to-point LI interfaces
Figure 5.4.1-2High-level acquisition architecture diagram with key point-to-point LI interfaces
Figure 5.6.2-1Simplified virtualised LI system with provisioning infrastructure for a direct provisioned POI
Figure 5.6.3.2-1Example simplified flow-diagram for OSS / BSS originated LI instantiation procedures
Figure 5.7.1-1High-level identifier retrieval via Query and Response.
Figure 6.2.1-15G EPC-anchored LI architecture
Figure 6.2.1-25G core-anchored LI architecture
Figure 6.2.2.1-1LI architecture for LI at AMF
Figure 6.2.3.1-1LI architecture showing LI at SMF/UPF
Figure 6.2.3.8-1LI architecture diagram for SMF/UPF interception when using SMF sets and LISSF
Figure 6.2.3.9-1Use of the LI_ST interface in the LI architecture.
Figure 6.2.5.1-1LI architecture for LI at SMSF
Figure 6.2.6.1-1LI Architecture depicting NRF as an SIRF
Figure 6.3.2.1-1LI architecture for LI at MME
Figure 6.3.3.1.2-1LI architecture for LI at non-CUPS SGW/PGW
Figure 6.3.3.1.3-1LI architecture for LI at EPS CUPS SGW/PGW
Figure 6.3.4.1-1LI architecture for LI at ePDG
Figure 6.6-1EPC/5G Interworking LI architecture
Figure 7.2.2.1-1LI architecture for LI at UDM
Figure 7.2.3.1-1LI architecture for LI at HSS
Figure 7.3.3.2.1-1LALS model for target positioning
Figure 7.3.3.3-1LALS model for triggered location (POI/LTF option)
Figure 7.3.3.3-2LALS Model for triggered location (MDF/LTF option)
Figure 7.3.4-1CSP and OAM Systems Cell Databases
Figure 7.3.5.2.1-1Delivery of the retrieved location information via the LI_HILA
Figure 7.3.5.2.2-1Delivery of the retrieved location information via the LI_HI2
Figure 7.4.1-1EPS/5GS-Anchored IMS High Level LI Architecture
Figure 7.4.2.1-1IMS LI architecture
Table 7.4.6.2-1IMS Network Functions providing the IRI-POI functions (non-roaming case)
Table 7.4.6.2-2IMS Network Functions providing the IRI-POI functions (roaming case)
Table 7.4.6.2-3Extension of Table 7.4.6.2-2
Table 7.4.6.3-1Mapping between the IMS Network Functions providing the CC-TF and the CC-POI functions
Table 7.4.6.3-2IMS Media Functions providing the CC-POI functions (non-roaming case)
Table 7.4.6.3-3IMS Media Functions providing the CC-POI functions (roaming case)
Figure 7.4.7.4.2-1VPLMN generic LI architecture for home-routed roaming
Figure 7.8.1.2.1-15GS Architecture for NIDD using NEF
Figure 7.8.1.2.2-15GS Architecture for NIDD using a PtP N6 tunnel
Figure 7.8.1.3.1-15GS Architecture for NIDD using NEF in roaming situation
Figure 7.8.1.3.2-15GS Architecture of NIDD using a PtP N6 tunnel in roaming situation
Figure 7.8.2.1.2-1LI architecture for NIDD using NEF showing LI at V-SMF
Figure 7.9.2.1-1LI architecture for NIDD using NEF showing LI at NEF
Figure 7.9.3.1-15GS architecture for device triggering
Figure 7.9.4.1-15GS architecture for MSISDN-less MO SMS
Figure 7.9.5.1-15GS architecture for Parameter provisioning
Figure 7.9.6.1-15GS architecture for AF session with QoS
Figure 7.9.7.1-15GS architecture for 5G LAN parameter provisioning
Figure 7.10.1.2.1-1EPS Architecture for NIDD using SCEF
Figure 7.10.1.2.2-1EPS Architecture for NIDD using a PtP SGi tunnel
Figure 7.10.1.3.1-1EPS Architecture for NIDD using SCEF in roaming situation
Figure 7.10.1.3.2-1EPS Architecture for NIDD using a PtP SGi tunnel in roaming situation
Figure 7.11.2.1-1LI architecture for NIDD using SCEF showing LI at SCEF/IWK-SCEF
Figure 7.11.3.1-1EPS architecture for device triggering
Figure 7.11.4.1-1EPS architecture for MSISDN-less MO SMS
Figure 7.11.5.1-1EPS architecture for Parameter Provisioning
Figure 7.11.6.1-1EPS architecture for AS session with QoS
Figure 7.13.2.1-1LI architecture for RCS services
Table 7.14.2-1IMS Network Functions providing the IRI-POI functions for STIR/SHAKEN and RCD
Table 7.14.2-2IMS Network Functions providing the IRI-POI functions for eCNAM
Table 7.14.2-3IMS Network Functions providing the IRI-POI functions when UE is not roaming (originating end)
Table 7.14.2-4IMS Network Functions providing the IRI-POI functions when UE is not roaming (terminating end)
Figure 7.15.2-1General architecture, STF using 5G native identifiers.
Figure 7.15.2-2General architecture, STF not relying on 5G native identifiers.
Figure 7.15.3.1.2-1General AKMA LI Architecture
Table 7.15.3.1.2-1Mapping functions between the general architecture and AKMA
Table 7.15.3.1.2-2Mapping xIRI between the general architecture and AKMA
Figure 7.16.1-1Edge computing network
Figure 7.16.2-1LI architecture for Edge Computing showing LI at EES
Figure 7.17.2-1LI architecture for 5G Media Streaming showing LI at 5GMS AF
Figure 7.18.2-1LI architecture for 5G data analytics showing LI at NWDAF
Figure 7.19.2-1LI architecture for WebRTC access to the IMS
Figure 7.20.2-1LI architecture for 5G ProSe showing LI at 5G DDNMF
Figure 8.5-1Embedded vs. external POIs
Figure 8.5-2POI state capture
Figure 8.5-3POI state capture security
Figure 8.6.2-1LI architecture showing CC-PAG
Figure A.1.2-1Network topology showing LI for 5G (service-based representation) with point-to-point LI system
Figure A.2.2-1Network topology showing LI for interworking with EPC/E-UTRAN
Figure A.3.2-1Network topology showing CC-POI at one UPF
Figure A.3.2-2Network topology showing CC-POI at two UPFs
Figure A.4.2-1Network topology showing LI for non-3GPP access to 5G via N3IWF
Figure A.4.2-2Network topology showing LI for non-3GPP access to 5G via TNGF
Figure A.4.2-3Network topology showing LI for non-3GPP access to 5G via TWIF
Figure E.2.1-1SHAKEN reference architecture for end-to-end SIP signalling
Figure E.2.2-1SHAKEN reference architecture for intra-network telephony
Figure E.2.4-1Out of band SHAKEN reference architecture for non end-to-end SIP signalling
Figure E.2.4-2Out of band SHAKEN reference architecture for end-to-end TDM signalling
Figure E.4-1SHAKEN reference call flow using end-to-end SIP signalling
Figure G.2.1-1High level Direct Discovery procedure

Top