Download presentation
Presentation is loading. Please wait.
Published byNicholas Stevens Modified over 9 years ago
1
STAR-GATE for PACKET DATA Arkady Linshitz Product Manager
2
Company Confidential PRODUCT OVERVIEW Introduction Functional Description GPRS and 3G Solutions Product Demonstration ISP Solutions
3
Company Confidential – Covers both administrative and delivery function; – Supports multiple networks and switches; STAR-GATE ARCHITECTURE COMPREHENSIVE SOLUTION
4
Company Confidential Performs the delivery function of communication surveillance STAR-GATE MEDIATION DEVICE Wide Range of Protocols GTP* FTP TIIT ROSE … Multicasting Support 300 MC Up to 5 simultaneous delivery Flexible Architecture
5
Company Confidential GPRS Application Design X1P X2PX3P HI1 Target Session Manager xGSN MD HI3 MD Inside HI2
6
Company Confidential Assigns targets and oversees system administration, maintenance and security STAR- GATE SAS (Surveillance Administration Subsystem)
7
Company Confidential STAR-GATE SAS SINGLE POINT OF ADMINISTRATION
8
Company Confidential STAR-GATE SOLUTION for GPRS
9
Company Confidential STAR-GATE SOLUTION for GPRS Interception Criteria IMSI, MS ISDN, IMEI Delivery Format HI2 FTP ROSE HI3 FTP GTP*
10
Company Confidential STAR-GATE SOLUTION for 3G
11
Company Confidential STAR-GATE SOLUTION for 3G Interception Criteria IMSI, MS ISDN, IMEI, (SIP URL) Location Dependent Interception 1 or more areas in the same 3GMS Charging Aspects Producing intercept-charging data Target List Synchronization
12
Company Confidential 3G Pan European networks - The STARGATE solution
13
Company Confidential STAR-GATE SOLUTION for VoIP New Challenges Communication Content IP to PCM conversion Signaling Protocols SIP H.323
14
Company Confidential 3G MD Application Design X1 HI1 Core Logic 3GMS MD VoIP Gateway X3X2 HI3HI2
15
Company Confidential WELCOME TO STAR-GATE DEMO
16
Company Confidential STAR-GATE SOLUTION for ISP
17
Company Confidential STAR-GATE for ISP - Challenges Operational challenges: –Target Provisioning –Identification of target traffic –Control and maintenance –High Security Technological challenges: –Various network topologies –Fast changing architecture –No interference with ISP Service level
18
Company Confidential STAR-GATE for ISP - Solution Interception Criteria: E-mail address Username/CLI in RADIUS IP address MAC address Access Solution based on: LAN Splitter for mirroring Switching hubs for aggregation and filtering PD MD Software
19
Company Confidential STAR-GATE for ISP - Solution Delivery Method: FTP Stream based Delivery Format: TIIT STAR-GATE Tunneling Protocol
20
Company Confidential ISP Mediation Device S/W Design HI1 Core Logic MD HI3 MD Inside HI2 Access Device Network Access (Interceptor)
21
Company Confidential Interceptors RIPE (RADIUS IP Extractor) Keeps in RAM the target list (Username/CLI) Monitors RADIUS messages Generates HI2 messages to LEMF Activates 3-4 layer switch and IPI based on extracted IP address Stops 3-4 layer switch and IPI upon logout event
22
Company Confidential Interceptors IPI (IP Interceptor) Gets IP address from RIPE Analyze each packet in real-time Collects packets Forwards to LEMF
23
Company Confidential Interceptors SMTPI (SMTP Interceptor) Keeps in RAM the target list (E-mail address) Monitors SMTP (Port # 25) Checks E-mail address in “RCPT TO” or “MAIL FROM” Buffers all E-mail (from DATA command to closing ‘.’) Forwards LEMF
24
Company Confidential Interceptors DHCPE (DHCP Extractor) Keeps in RAM the target list (MAC address) Monitors DHCP Identifies events of IP address assignment Generates HI2 messages to LEMF Updates the system with the new IP address
25
Mr. Adams Mr. Adams Mr. Adams
26
Mr. Adams Mr. Adams
27
Mr. Adams Mr. Adams
28
John@
29
Company Confidential The Access Device
30
Company Confidential Solution Considerations Coverage Intercepting all targets Intercepting all data Minimize number of intercepted links Target Identification RADIUS DHCP Security None intrusive Encryption
31
Company Confidential The Solution
32
Company Confidential System Security Access rights: Access to target activation and database is controlled by user rights. Audit Trail: For user login/logout and target activation/deactivation activities. Centralized Target List Architecture: GSA is the only LI entity where target list is saved on disk Passive interception: No indication for on going interception Encrypted delivery to LEAs: Delivery to LEAs can be encrypted using IP-Sec or TLS.
33
Company Confidential STAR-GATE Source of Requirements GPRS ETSI GSM 03.33 Annex D ETSI ES 201 671 ETSI TR 101331 3G ETSI TS 33.107 ISP TIIT
34
Company Confidential WHY STAR-GATE Comprehensive Solution Any Network Any Switch Any Protocol Unified Administration Center Open Design and Flexible Architecture
35
Company Confidential Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.