ETSI TR 102 528-2006 Lawful Interception (LI) Interception domain Architecture for IP networks (V1 1 1)《合法侦听(LI) IP网络的拦截域结构(版本1 1 1)》.pdf
《ETSI TR 102 528-2006 Lawful Interception (LI) Interception domain Architecture for IP networks (V1 1 1)《合法侦听(LI) IP网络的拦截域结构(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 102 528-2006 Lawful Interception (LI) Interception domain Architecture for IP networks (V1 1 1)《合法侦听(LI) IP网络的拦截域结构(版本1 1 1)》.pdf(38页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 102 528 V1.1.1 (2006-10)Technical Report Lawful Interception (LI);Interception domain Architecture for IP networksETSI ETSI TR 102 528 V1.1.1 (2006-10) 2 Reference DTR/LI-00025 Keywords Lawful Interception, architecture, IP, data, security, telephony, multimedia ETSI 650 Route des Lucioles
2、F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www
3、.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printin
4、g on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/por
5、tal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the
6、foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being register
7、ed by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 102 528 V1.1.1 (2006-10) 3 Contents Intellectual Property Rights5 Foreword.5 Introduction 5 1 Scope 6 2 References 6 3 Definitions
8、 and abbreviations.7 3.1 Definitions7 3.2 Abbreviations .10 4 Reference model.11 4.1 Description of functional elements.13 4.1.1 Intercept Related Information Internal Interception Function (IRI-IIF) .13 4.1.2 CC Trigger Function (CCTF) .13 4.1.3 CC Internal Interception Function (CC-IIF) .13 4.1.4
9、Lawful Interception Mediation Function (MF).14 4.1.5 Lawful Intercept Administration Function (AF).14 4.2 Operational considerations .14 5 Internal Network Interfaces (I N I).15 5.1 INI1 15 5.2 INI2 16 5.3 INI3 16 5.4 CC Trigger Interface (CCTI)18 5.5 CC Control Interface (CCCI) .19 5.5.1 Dedicated
10、interface for the control of CC-IIF.19 5.5.2 In-band control of CC-IIF.20 6 Security.21 7 Applying the reference model 22 7.1 CCTF collocated with MF23 7.1.1 Configuration23 7.1.2 Scope 23 7.1.3 Characteristics.24 7.2 CCTF collocated with IRI-IIF 24 7.2.1 Configuration24 7.2.2 Scope 24 7.2.3 Charact
11、eristics.25 7.3 CCTF collocated with IRI-IIF and CC-IIF.25 7.3.1 Configuration25 7.3.2 Scope 25 7.3.3 Characteristics.25 Annex A: Service scenarios26 A.1 IP Multimedia services.26 A.2 Data services 28 Annex B: Deployment scenarios30 B.1 IRI-IIF integrated in Call Agent, CC-IIF integrated in aggregat
12、ion router, CCTF collocated with MF 30 B.1.1 Configuration .30 B.1.2 Scope30 B.2 IRI-IIF integrated in Call Agent, CC-IIF integrated in Media Gateway, CCTF collocated with MF31 ETSI ETSI TR 102 528 V1.1.1 (2006-10) 4 B.2.1 Configuration .31 B.2.2 Scope31 B.3 IRI-IIF and CCTF integrated in Call Agent
13、, CC-IIF integrated in Media Gateway 32 B.3.1 Configuration .32 B.3.2 Scope32 B.4 Stand-alone IRI-IIF, CC-IIF integrated in aggregation router or aggregation router, CCTF collocated with MF.33 B.4.1 Configuration .33 B.4.2 Scope33 B.4.3 Characteristics 33 B.5 IRI-IIF integrated in Call Agent, stand-
14、alone CC-IIF, CCTF collocated with MF34 B.5.1 Configuration .34 B.5.2 Scope34 B.6 IRI-IIF, CCTF and CC-IIF integrated in a device35 B.6.1 Configuration .35 B.6.2 Scope35 B.6.3 Characteristics 35 Annex C: Examples of CCCI.36 C.1 Dedicated CCCI using SNMPv3 MIBs36 C.2 In-band CCCI using H.248.36 Annex
15、 D: Change Request history 37 History 38 ETSI ETSI TR 102 528 V1.1.1 (2006-10) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI mem
16、bers and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.e
17、tsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, e
18、ssential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Lawful Interception (LI). Introduction The objective of the present document is to describe a high level architecture in IP networks for use by both telecommunications service provider
19、s and network operators, including Internet Service Providers that will deliver the interception information required by Law Enforcement Authorities under various European treaties and national regulations. The distributed nature of IP networks, and the increasing number of access technologies requi
20、re Internal Intercept functions in a large number of devices. The present document provides a general reference architecture that has a minimum set of common Internal Network functions and Interfaces. It is intended to be general enough to be used in a variety of situations, including but not limite
21、d to lawful interception of IP Multimedia services, layer 2 data services and layer 3 data services, delivered over any access technology. ETSI ETSI TR 102 528 V1.1.1 (2006-10) 6 1 Scope The present document describes a high level reference architecture for supporting lawful interception in network
22、operator and communication service providers“ domain for IP networks. The document contains: A reference model in the network operator and communication service provider domain. A High level description of Internal Network Functions and Interfaces. Application of the reference model to voice and mul
23、timedia over IP services, data layer 3 and layer 2 services. It does not intend to replace any existing document which specifies network operator and communication service providers architecture and internal network interfaces. The present document does not override or supersede any specifications o
24、r requirements for the lawful interception within GSM/UMTS PS domain, which is defined in TS 133 106 9 and TS 33 107 8. 2 References For the purposes of this Technical Report (TR) the following references apply: 1 ETSI TS 101 331: “Lawful Interception (LI); Requirements of Law Enforcement Agencies“.
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1025282006LAWFULINTERCEPTIONLIINTERCEPTIONDOMAINARCHITECTUREFORIPNETWORKSV111 合法 侦听 LIIP 网络 拦截

链接地址:http://www.mydoc123.com/p-735996.html