Browse Prior Art Database

Cisco Architecture for Lawful Intercept in IP Networks (RFC3924)

IP.com Disclosure Number: IPCOM000032315D
Original Publication Date: 2004-Oct-01
Included in the Prior Art Database: 2004-Oct-30
Document File: 19 page(s) / 41K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

F. Baker: AUTHOR [+3]

Abstract

For the purposes of this document, lawful intercept is the lawfully authorized interception and monitoring of communications. Service providers are being asked to meet legal and regulatory requirements for the interception of voice as well as data communications in IP networks in a variety of countries worldwide. Although requirements vary from country to country, some requirements remain common even though details such as delivery formats may differ. This document describes Cisco's Architecture for supporting lawful intercept in IP networks. It provides a general solution that has a minimum set of common interfaces. This document does not attempt to address any of the specific legal requirements or obligations that may exist in a particular country.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 7% of the total text.

Network Working Group                                           F. Baker

Request for Comments: 3924                                     B. Foster

Category: Informational                                         C. Sharp

                                                           Cisco Systems

                                                            October 2004

        Cisco Architecture for Lawful Intercept in IP Networks

Status of this Memo

   This memo provides information for the Internet community.  It does

   not specify an Internet standard of any kind.  Distribution of this

   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2004).

IESG Note

   This RFC is not a candidate for any level of Internet Standard.  The

   IETF disclaims any knowledge of the fitness of this RFC for any

   purpose, and in particular notes that the decision to publish is not

   based on IETF review for such things as security, congestion control

   or inappropriate interaction with deployed protocols.  The RFC Editor

   has chosen to publish this document at its discretion.  Readers of

   this document should exercise caution in evaluating its value for

   implementation and deployment.

Abstract

   For the purposes of this document, lawful intercept is the lawfully

   authorized interception and monitoring of communications.  Service

   providers are being asked to meet legal and regulatory requirements

   for the interception of voice as well as data communications in IP

   networks in a variety of countries worldwide.  Although requirements

   vary from country to country, some requirements remain common even

   though details such as delivery formats may differ.  This document

   describes Cisco's Architecture for supporting lawful intercept in IP

   networks.  It provides a general solution that has a minimum set of

   common interfaces.  This document does not attempt to address any of

   the specific legal requirements or obligations that may exist in a

   particular country.

Baker, et al.                Informational                      [Page 1]

RFC 3924           Architecture for Lawful Intercept        October 2004

Table of Contents

   1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . .  2

      1.1. Requirements Motivating the Architecture . . . . . . . . .  3

      1.2. Document Organization. . . . . . . . . . . . . . . . . . .  4

   2. Reference Model . . . . . . . . . . . . . . . . . . . . . . . .  5

      2.1. Reference Model Components . . . . . . . . . . . . . . . .  6

      2.2. Operational Considerations . . . . . . . . . . ....