ImageVerifierCode 换一换
格式:PDF , 页数:38 ,大小:677.86KB ,
资源ID:735996      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735996.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 528-2006 Lawful Interception (LI) Interception domain Architecture for IP networks (V1 1 1)《合法侦听(LI) IP网络的拦截域结构(版本1 1 1)》.pdf)为本站会员(sofeeling205)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 528-2006 Lawful Interception (LI) Interception domain Architecture for IP networks (V1 1 1)《合法侦听(LI) IP网络的拦截域结构(版本1 1 1)》.pdf

1、 ETSI TR 102 528 V1.1.1 (2006-10)Technical Report Lawful Interception (LI);Interception domain Architecture for IP networksETSI ETSI TR 102 528 V1.1.1 (2006-10) 2 Reference DTR/LI-00025 Keywords Lawful Interception, architecture, IP, data, security, telephony, multimedia ETSI 650 Route des Lucioles

2、F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www

3、.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printin

4、g on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/por

5、tal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the

6、foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being register

7、ed by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 102 528 V1.1.1 (2006-10) 3 Contents Intellectual Property Rights5 Foreword.5 Introduction 5 1 Scope 6 2 References 6 3 Definitions

8、 and abbreviations.7 3.1 Definitions7 3.2 Abbreviations .10 4 Reference model.11 4.1 Description of functional elements.13 4.1.1 Intercept Related Information Internal Interception Function (IRI-IIF) .13 4.1.2 CC Trigger Function (CCTF) .13 4.1.3 CC Internal Interception Function (CC-IIF) .13 4.1.4

9、Lawful Interception Mediation Function (MF).14 4.1.5 Lawful Intercept Administration Function (AF).14 4.2 Operational considerations .14 5 Internal Network Interfaces (I N I).15 5.1 INI1 15 5.2 INI2 16 5.3 INI3 16 5.4 CC Trigger Interface (CCTI)18 5.5 CC Control Interface (CCCI) .19 5.5.1 Dedicated

10、interface for the control of CC-IIF.19 5.5.2 In-band control of CC-IIF.20 6 Security.21 7 Applying the reference model 22 7.1 CCTF collocated with MF23 7.1.1 Configuration23 7.1.2 Scope 23 7.1.3 Characteristics.24 7.2 CCTF collocated with IRI-IIF 24 7.2.1 Configuration24 7.2.2 Scope 24 7.2.3 Charact

11、eristics.25 7.3 CCTF collocated with IRI-IIF and CC-IIF.25 7.3.1 Configuration25 7.3.2 Scope 25 7.3.3 Characteristics.25 Annex A: Service scenarios26 A.1 IP Multimedia services.26 A.2 Data services 28 Annex B: Deployment scenarios30 B.1 IRI-IIF integrated in Call Agent, CC-IIF integrated in aggregat

12、ion router, CCTF collocated with MF 30 B.1.1 Configuration .30 B.1.2 Scope30 B.2 IRI-IIF integrated in Call Agent, CC-IIF integrated in Media Gateway, CCTF collocated with MF31 ETSI ETSI TR 102 528 V1.1.1 (2006-10) 4 B.2.1 Configuration .31 B.2.2 Scope31 B.3 IRI-IIF and CCTF integrated in Call Agent

13、, CC-IIF integrated in Media Gateway 32 B.3.1 Configuration .32 B.3.2 Scope32 B.4 Stand-alone IRI-IIF, CC-IIF integrated in aggregation router or aggregation router, CCTF collocated with MF.33 B.4.1 Configuration .33 B.4.2 Scope33 B.4.3 Characteristics 33 B.5 IRI-IIF integrated in Call Agent, stand-

14、alone CC-IIF, CCTF collocated with MF34 B.5.1 Configuration .34 B.5.2 Scope34 B.6 IRI-IIF, CCTF and CC-IIF integrated in a device35 B.6.1 Configuration .35 B.6.2 Scope35 B.6.3 Characteristics 35 Annex C: Examples of CCCI.36 C.1 Dedicated CCCI using SNMPv3 MIBs36 C.2 In-band CCCI using H.248.36 Annex

15、 D: Change Request history 37 History 38 ETSI ETSI TR 102 528 V1.1.1 (2006-10) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI mem

16、bers and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.e

17、tsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, e

18、ssential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Lawful Interception (LI). Introduction The objective of the present document is to describe a high level architecture in IP networks for use by both telecommunications service provider

19、s and network operators, including Internet Service Providers that will deliver the interception information required by Law Enforcement Authorities under various European treaties and national regulations. The distributed nature of IP networks, and the increasing number of access technologies requi

20、re Internal Intercept functions in a large number of devices. The present document provides a general reference architecture that has a minimum set of common Internal Network functions and Interfaces. It is intended to be general enough to be used in a variety of situations, including but not limite

21、d to lawful interception of IP Multimedia services, layer 2 data services and layer 3 data services, delivered over any access technology. ETSI ETSI TR 102 528 V1.1.1 (2006-10) 6 1 Scope The present document describes a high level reference architecture for supporting lawful interception in network

22、operator and communication service providers“ domain for IP networks. The document contains: A reference model in the network operator and communication service provider domain. A High level description of Internal Network Functions and Interfaces. Application of the reference model to voice and mul

23、timedia over IP services, data layer 3 and layer 2 services. It does not intend to replace any existing document which specifies network operator and communication service providers architecture and internal network interfaces. The present document does not override or supersede any specifications o

24、r requirements for the lawful interception within GSM/UMTS PS domain, which is defined in TS 133 106 9 and TS 33 107 8. 2 References For the purposes of this Technical Report (TR) the following references apply: 1 ETSI TS 101 331: “Lawful Interception (LI); Requirements of Law Enforcement Agencies“.

25、 2 ETSI ES 201 158: “Telecommunications Security; Lawful Interception (LI); Requirements for network functions“. 3 ETSI ETR 332: “Security Techniques Advisory Group (STAG); Security requirements capture“. 4 ETSI TS 101 671: “Lawful Interception (LI); Handover interface for the Lawful Interception of

26、 telecommunications traffic“. NOTE: Periodically TS 101 671 is published as ES 201 671. A reference to the latest version of the TS as above reflects the latest stable content from ETSI/TC LI. 5 ETSI TS 133 108: “Universal Mobile Telecommunications System (UMTS); 3G security; Handover interface for

27、Lawful Interception (LI) (3GPP TS 33.108)“. 6 ETSI TS 102 232-01: “Lawful Interception (LI); Handover specification for IP delivery“. 7 ETSI TS 102 232-03: “Lawful Interception (LI); Service-specific details for internet access services“. 8 ETSI TS 133 107: “Universal Mobile Telecommunications Syste

28、m (UMTS); 3G security; Lawful interception architecture and functions (3GPP TS 33.107)“. 9 ETSI TS 133 106: “Universal Mobile Telecommunications System (UMTS); Lawful interception requirements (3GPP TS 33.106)“. 10 ETSI TS 142 033: “Digital cellular telecommunications system (Phase 2+); Lawful Inter

29、ception; Stage 1 (3GPP TS 42.033 version 5.0.0 Release 5)“. 11 ETSI TS 143 033: “Digital cellular telecommunications system (Phase 2+); Lawful Interception; Stage 2 (3GPP TS 43.033 version 5.0.0 Release 5)“. 12 ETSI TS 102 227: “Telecommunications and Internet Protocol Harmonization Over Networks (T

30、IPHON) Release 4; Functional Entities, Information Flow and Reference Point Definitions; Lawful Interception“. 13 IETF RFC 3924: “Cisco Architecture for Lawful Intercept in IP Networks“. 14 PKT-SP-ESP1.5-I01-050128: “PacketCable Electronic Surveillance Specification“. ETSI ETSI TR 102 528 V1.1.1 (20

31、06-10) 7 15 IETF RFC 3414: “User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)“. 16 IETF RFC 3415: “View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)“. 17 Warnicke, E.: “A Suggested Scheme for DNS Resolution of Netw

32、orks and Gateways“. NOTE: Work in Progress. 18 IETF RFC 3261: “SIP: Session Initiation Protocol“. 19 IETF RFC 3435: “Media Gateway Control Protocol (MGCP) Version 1.0“. 20 ITU-T Recommendation H.248.1: “Gateway Control Protocol: Version 3“. 21 ITU-T Recommendation H.323: “Packet-based Multimedia Com

33、munications Systems“. 22 ITU-T Recommendation H.245: “Control Protocol for Multimedia Communications“. 23 IETF RFC 2327: “SDP: Session Description Protocol“. 24 IETF RFC 4588: Rey, J., Leon, D., Miyazaki, A., Varsa, V., and R. Hakenber: “RTP Retransmission Payload Format“. NOTE: Work in Progress. 25

34、 IETF RFC 3550: “RTP: A Transport Protocol for Real Time Applications“. 26 IETF RFC 2474: “Definition of the Differentiated Services (DS Field) in the IPv4 and IPv6 Headers“. 27 IETF RFC 2475: “An Architecture for Differentiated Services“. 28 ETSI TS 102 815: “Lawful Interception (LI); Service-speci

35、fic details for Layer 2 Lawful Interception“. 29 ETSI TS 101 909-20-2: “Digital Broadband Cable Access to the Public Telecommunications Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 2: Streamed multimedia services“. 30 PKT-SP-ES-INF-I01-060406: “PacketCable El

36、ectronic Surveillance Intra-Network Specification“. 31 IETF RFC 3603: “Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for Supporting the PacketCable Distributed Call Signaling Architecture “. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present documen

37、t, the terms and definitions given in TS 101 331 1, ES 201 158 2 and the following apply: Access Provider (AP): provides a user of some network with access from the users terminal to that network NOTE 1: This definition applies specifically to the present document. In a particular case, the access p

38、rovider and network operator may be a common commercial entity. NOTE 2: The definitions from TS 101 331 1 have been expanded to include reference to an access provider, where appropriate. authorizing authority: authority, such as court of law, that is entitled to authorize Lawful Interception (LI) E

39、TSI ETSI TR 102 528 V1.1.1 (2006-10) 8 call: any connection (fixed or temporary) capable of transferring information between two or more users of a telecommunications system. NOTE: In this context a user may be a person or a machine CC (CC): information exchanged between two or more users of a telec

40、ommunications service, excluding Intercept Related Information (IRI). NOTE: This includes information which may, as part of some telecommunications service, be stored by one user for subsequent retrieval by another. Domain Name System (DNS): set of network elements, which function as translators bet

41、ween logical names and network addresses on the Internet NOTE: This type of element is widely used for IP traffic today. It can be anticipated that similar functionality will be introduced also for telephony in the near future. Handover Interface (HI): physical and logical interface across which the

42、 interception measures are requested from an AP/NWO/SvP, and the results of interception are delivered from an AP/NWO/SvP to an LEMF identity: technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunication

43、s identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis Intercept Related Information (IRI): collection of information or data associated with

44、telecommunication services involving the target identity, specifically call associated information or data (e.g. unsuccessful call attempts), and service associated information or data (e.g. service profile management by subscriber) and location information Interception (or Lawful Interception): act

45、ion (based on applicable laws and regulations), performed by an AP/NWO/SvP, of making available certain information and providing that information to an LEMF NOTE: In the present document the term interception is not used to describe the action of observing communications by an LEA (see below). inte

46、rception interface: physical and logical locations within the access providers/network operators/service providers telecommunications facilities where access to the CC and Intercept Related Information is provided NOTE: The interception interface is not necessarily a single, fixed point. interceptio

47、n subject: person or persons, specified in a lawful authorization, whose telecommunications are to be intercepted Internal Intercepting Function: point within a network or network element at which the CC is made available Internal Network Interface: networks internal interface between the Internal I

48、ntercepting Function and a mediation function Internet Service Provider (ISP): business entity that offers connectivity to the Internet, primarily for dial-in subscribers NOTE: The ISP will generally also provide e-mail facilities and other higher-level Internet services. Law Enforcement Agency (LEA

49、): organization authorized, by a lawful authorization based on a national law, to request interception measures and to receive the results of telecommunications interceptions Law Enforcement Monitoring Facility (LEMF): law enforcement facility designated as the transmission destination for the results of interception relating to a particular interception subject lawful authorization: permission granted to a LEA under certain conditions to intercept specified telecommunications and requiring co-

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1