• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Lawful Interception (LI); Internal Network Interfaces; Part 1: X1

ETSI TS 103 221-1 V1.21.1

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025

ETSI - European Telecommunications Standards Institute

URI: http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347664
Subject: INTERFACE
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (644.5Kb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Lawful Interception (LI); Internal Network Interfaces; Part 1: X1

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2025-09-30T23:00:17Z
date available2025-09-30T23:00:17Z
date copyright2025.08
date issued2025
identifier otherts_10322101v012101p.pdf
identifier urihttp://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347664
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleLawful Interception (LI); Internal Network Interfaces; Part 1: X1en
titleETSI TS 103 221-1 V1.21.1num
typestandard
page76
statusPublished
treeETSI - European Telecommunications Standards Institute:;2025
contenttypefulltext
subject keywordsINTERFACE
subject keywordsLawful Interception
scopeThe internal network interface covers wide area connections between LI systems and (depending on the network) lots of network elements from different vendors. Nearly every network element has its own interface with different transport protocols, authentication (if any), encryption (if any), commands etc. This makes every new connection highly complicated and costly. The interfaces between Administration and Mediation Functions are usually proprietary and internally within a product for LI and therefore need not be compatible between products of different vendors. Traditionally X1 and HI1 interfaces have not been standardized. Given the experience of standardization in HI2 and HI3 industry has received benefits from this by way of interoperability, security and cost reduction. This WI does not intend to force compatibility on legacy equipment although should that be possible it will be welcomed. An inability by the LEMF to support this proposed standard should not allow a fall back to a less secure protocol. The initial focus is on newer IP related systems (but not limited to IP). However there is no intention to exclude circuit switch or other elements from using this output. With a view to the future, as network and services become virtualized this WI intends to support newer implementations by ensuring a standard interface is available to the provisioning equipment or service. The ADMF (provisioning system) translates HI1 messages to X1 and vice versa. It is effectively a proxy between the LEA/LEMF and the network operator. This allows insulation for the CSP to manage their network as they see fit without untoward impact on the LEMF, and vice versa. It also allows for enhanced security management. Maintaining this concept is key to this work item. It is intended to start work with the X1 interface and follow with interfaces X3 and X2. Scope 1.Alignment to Dynamic Triggering 2.Usage scenarios a.Start of an interception b.Modification of a running interception c.Stopping an interception d.Retrieval of details of a running interception e.Retrieval of details of all running interceptions f.Error reporting 3.Transport protocol 4.Transport Security / Encryption 5.Authorisation and authentication 6.Communication Protocol (or command line interface?) 7.Nomenclature and data model This revision is to provide a Tasking flow annex
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian