Cisco Architecture for Lawful Intercept in IP Networks
This document outlines Cisco's architecture for supporting lawful intercept in IP networks, detailing a general solution with common interfaces for monitoring telecommunication networks by law enforcement agencies worldwide.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp
Outline Introduction Reference Model Interfaces Reference
Introduction Lawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. This document describes Cisco's Architecture for supporting lawful intercept in IP networks. It provides a general solution that has a minimum set of common interfaces.
Reference Model Lawful Intercept (LI) Administration Function Intercept Access Point (IAP) Content IAP IRI IAP Law Enforcement Agency Mediation Device
Location and Address Information for Content Intercepts Content Encryption Detection by the Intercept Subject Unauthorized Creation and Detection Capacity
Interfaces Content Intercept Request Interface A Filter specification for classifying the packets to be intercepted. The destination address of the MD (where to send the packets). Encapsulation and Transport parameters.
Interfaces Intercept Content Interface Source and destination addresses Payload An identifier for correlating the packets with the IRI
Reference RFC3924