Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

3GPP SA3 Lawful Intercept
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. Craig Mulholland Consulting Engineer February 8, 2006 Cisco Systems Lawful Intercept Capabilities The.
EduCause LI Overview February 2007
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Using COTS Routers for Lawful Intercept Annual Member Meeting.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Implementing a Highly Available Network
1 ETSI and Lawful Interception Robin Gape Chair TC Sec WG LI.
Overview of CALEA Conformance Proposed Standard PTSC-LAES R6 Manish Karir, Merit – Research and Development.
Lawful Interception in 3G IP Multimedia Subsystem
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
Implementing a Distributed Firewall
Detection of Promiscuous nodes Using Arp Packets By Engin Arslan.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
© 2006, The Technology FirmWWW.THETECHFIRM.COM 1 WINDOWS XP SUPPORT TOOLS.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
A fast identification method for P2P flow based on nodes connection degree LING XING, WEI-WEI ZHENG, JIAN-GUO MA, WEI- DONG MA Apperceiving Computing and.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Internet Protocol (IP)
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 13 – Network Security
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Network Protocols and Communications Introduction to Networks.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
CALEA and J-STD-025 revisions. CALEA  Communications Assistance for Law Enforcement Act (1994)  Standardized access to telecommunications systems using.
24/10/2015draft-novak-bmwg-ipflow-meth- 03.txt 1 IP Flow Information Accounting and Export Benchmarking Methodology
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Chapter 3: Network Protocols and Communications
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 9 Basic Router Troubleshooting.
February 24, 2004 TR-45 Lawfully Authorized Electronic Surveillance (LAES) Packet Solutions Industry Meeting March 19 th, 2004 Terri L. Brooks Chair TR-45.
Routing Information Protocol
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 9 Basic Router Troubleshooting.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
 Router Configurations part2 2 nd semester
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Unique Packet Identifiers for Multipoint Monitoring of QoS Parameters Juraj Giertl, František Jakab Gorazd Baldovský, Ján Genči.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
CSCI 465 Data Communications and Networks Lecture 26
Chapter 3: Network Protocols and Communications
Chapter 3: Network Protocols and Communications
Introduction to Networks v6.0
IPsec Problems and Solutions
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Instructor Materials Chapter 5: Ethernet
IT443 – Network Security Administration Instructor: Bo Sheng
VPN: Virtual Private Network
Internet Security CS457 Seminar Zhao Cheng
Internet Protocol (IP)
Chapter 8: Monitoring the Network
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Introduction to Network Security
Transport service discussion
draft-ietf-bier-ipv6-requirements-01
Chapter 6 IP Security.
Presentation transcript:

Cisco Architecture for Lawful Intercept in IP Networks October 2004,rfc3924 Author(s): F. Baker,B. Foster,C. Sharp

Outline Introduction Reference Model Interfaces Reference

Introduction Lawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. This document describes Cisco's Architecture for supporting lawful intercept in IP networks. It provides a general solution that has a minimum set of common interfaces.

Reference Model

Lawful Intercept (LI) Administration Function Intercept Access Point (IAP) Content IAP IRI IAP Law Enforcement Agency Mediation Device

Location and Address Information for Content Intercepts Content Encryption Detection by the Intercept Subject Unauthorized Creation and Detection Capacity

Interfaces Content Intercept Request Interface – A Filter specification for classifying the packets to be intercepted. – The destination address of the MD (where to send the packets). – Encapsulation and Transport parameters.

Interfaces Intercept Content Interface – Source and destination addresses – Payload – An identifier for correlating the packets with the IRI

Reference RFC3924