Tech-invite  3GPPspecsRELsGlossariesSIP
Info21222324252627282931323334353637384‑5x

Top   in Index   Prev   Next

TS 33.127SA3
Lawful Interception Architecture and Functions

use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V16.3.0 (Wzip)2020/03  88 p.
V15.4.0 (PDF)2020/03  55 p.

WI Acronym:  LI15
Rapporteur:  Mr. Jaspers, Koen

The present document specifies both the architectural and functional system requirements for Lawful Interception (LI) in 3GPP networks. The present document provides an LI architecture supporting both network layer based and service layer based Interception.
National regulations determine the specific set of LI functional capabilities that are applicable to a specific 3GPP operator deployment.

full Table of Contents for  TS 33.127  Word version:   16.2.0

Here   Top
1  ScopeWord-p. 8
2  References
3  Definitions, symbols and abbreviationsWord-p. 9
4  Requirements realisationWord-p. 11
5  Functional architecture
5.1  General
5.2  High-level generic LI architectureWord-p. 12
5.3  Functional entitiesWord-p. 13
5.4  LI interfaces
5.5  LI service discovery
5.6  LI in a virtualised environmentWord-p. 21
6  Network layer based interception
6.1  General
6.2  5GWord-p. 26
6.3  EPC
6.4  3G
6.5  VoNR
6.6  4G/5G Interworking [R16]Word-p. 46
7  Service layer based interception
7.1  GeneralUp
7.2  Central subscriber management
7.3  Location
7.4  IMSWord-p. 54
7.5  MMS [R16]
7.6  PTC service [R16]
8  LI security and deployment considerationsUp
A  5G LI network topology viewsWord-p. 72
Z  Change historyWord-p. 80

Up   Top