Enforcement during or after Registration

To authenticate the UE, control integrity protection, and encoding, you can use the 5GMM procedures. These procedures are used for tracing, following, and identifying the address, locality, and the vicinity of the UE.

The following procedures are used during this process:

  • When the subscriber interacts for the first time with the AMF and if restrictions are applicable, the AMF enforces the restrictions by sending Registration Reject with a cause code value towards the UE.

  • When the subscriber is already registered, a required change in RAT or Core Network Type restriction is triggered through the UDM data change notification. This data notification requires the AMF to apply fresh enforcements.

  • If these restrictions are applicable, the AMF deregisters the subscriber or else continues to allow the subscriber to be in the network.

  • The AMF saves the changed RAT and Core Network Type restrictions in the UE context.

  • The AMF sends the changed RAT and Core network restriction values in the next outgoing Handover Request or Initial Context Setup Request (ICSR).