Tech-
invite
3GPP
space
IETF
RFCs
SIP
index
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 43.033
Word version: 13.0.0
1…
4…
A…
4
Functional architecture
5
Activation, deactivation and interrogation
6
Invocation of Lawful Interception
7
Security
4
Functional architecture
5
Activation, deactivation and interrogation
Word‑p. 9
5.1
Activation
Word‑p. 10
5.1.1
X1_1-interface
5.1.2
X1_2-interface (IRI)
Word‑p. 11
5.1.3
X1_3-interface (IP)
5.2
Deactivation
Word‑p. 12
5.2.1
X1_1-interface
5.2.2
X1_2-interface (IRI)
Word‑p. 13
5.2.3
X1_3-interface (IP)
5.3
Interrogation
Word‑p. 14
5.3.1
Interrogation of the MSC/VLR and the GMSC
5.3.2
Interrogation of Delivery Functions
6
Invocation of Lawful Interception
Word‑p. 15
6.1
Provision of Intercept Product - Circuit Switched
Word‑p. 16
6.1.1
Void
6.1.2
Two stubline configuration (circuit switched data or speech) to LEA
Word‑p. 17
6.1.3
X3-interface
6.2
Provision of Intercept Product - Short Message Service
Word‑p. 18
6.3
Provision of Intercept Related Information
6.3.1
X2-interface
Word‑p. 19
6.3.2
Structure of the events
6.3.3
Call Related events
Word‑p. 21
6.3.3.1
Call establishment
6.3.3.2
Answer
6.3.3.3
Supplementary Services
Word‑p. 22
6.3.3.4
Handover
6.3.3.5
Release
6.3.4
Non Call Related events
Word‑p. 23
6.3.4.1
SMS
6.3.4.2
Location update
6.3.4.3
Subscriber Controlled Input (SCI)
6.4
Intercept cases for supplementary services
Word‑p. 24
6.4.1
Interception of Multiparty call
6.4.1.1
Intercept Product only for Multiparty
6.4.1.2
Intercept Related Information for Multiparty
Word‑p. 25
6.4.2
Interception for Call Forwarding / Call Deflection
6.4.3
Interception on Call Hold / Call Waiting
6.4.4
Interception after ECT
7
Security
Word‑p. 26
7.1
Security
7.1.1
Administration security
7.1.2
IRI security
7.1.2.1
Normal operation
7.1.2.2
Communication failure
7.1.3
IP security
Word‑p. 27
7.1.4
Security aspects of Lawful Interception charging
7.1.5
Other security issues
7.1.5.1
Log files
7.1.5.2
Data consistency