The following figures show the use of H.248 in setting up a bearer intercept point at the MGW.
Figure D.1 shows the network model for interception of a mobile-to-mobile call, where the originating mobile subscriber is the target for interception.
Figure D.2 message sequence only shows the H.248 elements related to the necessary topology, which could be used in this example.
Normal call establishment using other H.248 elements shall be in accordance with TS 23.205
It should be noted that other means exist with H.248 to achieve similar interception.