Lawful Interception (LI);Handover Interface and Service-Specific Details (SSD) for IP delivery;Part 5: Service-specific details for IP Multimedia Services

The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].

Zakonito prestrezanje (LI) - Izročilna specifikacija in storitveno specifične podrobnosti (SSD) za IP-dostavo - 5. del: Storitveno specifične podrobnosti za multimedijske storitve IP

Ta dokument določa prestrezanje IP multimedijskih storitev na podlagi protokola SIP, protokola RTP in protokola MSRP ter IP multimedijskih storitev, kot je opisano v priporočilih ITU-T H.323 [6] in H.248 [7]. Ta dokument je skladen z definicijo izročilne specifikacije, kot je opisano v dokumentu ETSI TS 102 232-1 [2].
Ta dokument ne razveljavlja ali nadomešča nobene specifikacije ali zahteve v dokumentih 3GPP TS 33.108 [9] in ETSI TS 101 671 [1].

General Information

Status
Published
Publication Date
06-Jan-2016
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
05-Nov-2015
Due Date
10-Jan-2016
Completion Date
07-Jan-2016

Buy Standard

Standard
ETSI TS 102 232-5 V3.5.1 (2015-10) - Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services
English language
27 pages
sale 15% off
Preview
sale 15% off
Preview
Technical specification
TS ETSI/TS 102 232-5 V3.5.1:2016
English language
27 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Technical specification
TS ETSI/TS 102 232-5 V3.5.1:2016
English language
27 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

ETSI TS 102 232-5 V3.5.1 (2015-10)






TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 5: Service-specific details for IP Multimedia Services



---------------------- Page: 1 ----------------------
2 ETSI TS 102 232-5 V3.5.1 (2015-10)



Reference
RTS/LI-00129-5
Keywords
IMS, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2015.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI

---------------------- Page: 2 ----------------------
3 ETSI TS 102 232-5 V3.5.1 (2015-10)
Contents
Intellectual Property Rights . 5
Foreword . 5
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions and abbreviations . 7
3.1 Definitions . 7
3.2 Abbreviations . 7
4 General . 8
4.1 Reference Model for Lawful Interception . 8
4.2 Reference system model . 10
4.2.1 Network layer Interception . 10
4.2.2 Service layer Interception . 11
4.3 General Requirements . 11
5 Interception of IP Multimedia services . 12
5.1 Identification of target of interception . 12
5.1.1 SIP Target Identification . 12
5.1.2 H.323 Target Identification . 12
5.2 Interception of signalling . 12
5.2.1 Provisioning of the SIP IRI IIF . 12
5.2.2 Provisioning of the H.323 IRI IIF . 12
5.2.3 Location information . 13
5.3 Assigning a value to the Communication Identity Number . 13
5.3.1 Assigning a CIN value to SIP related IRI . 13
5.3.2 Assigning a CIN value to H.323 related IRI . 13
5.4 Events and IRI record types . 13
5.5 Interception of Content of Communication . 14
5.6 Direction for IMS IRI for Signalling Messages . 14
5.7 Direction for IMS sessions . 15
5.7.1 Direction for SIP sessions . 15
5.7.2 Direction for H.323 sessions . 15
6 Handover Interface . 15
6.1 Intercepted Related Information . 15
6.2 Correlation of IRI and CC . 15
7 ASN.1 specification for IRI and CC. 15
Annex A (informative): Interception using H.248 . 19
A.1 Purpose of this annex . 19
A.2 Notes on interception using H.248 . 19
A.2.1 Target identification (see also clause 5.1) . 19
A.2.2 Provisioning of the H.248 IRI IIF (see also clause 5.2) . 20
A.3 Problems in H.248 interception . 20
A.3.1 Missing information in H.248 signalling . 20
A.3.2 Missing call content. 21
Annex B (normative): Minimum set of functional attributes to be provided . 22
B.1 General requirements . 22
ETSI

---------------------- Page: 3 ----------------------
4 ETSI TS 102 232-5 V3.5.1 (2015-10)
B.2 Result of interception . 22
B.3 Location information . 23
B.4 Time constraints . 23
B.5 Technical handover interfaces and format requirements . 24
Annex C (informative): Change request history . 25
History . 27

ETSI

---------------------- Page: 4 ----------------------
5 ETSI TS 102 232-5 V3.5.1 (2015-10)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 5 of a multi-part deliverable. Full details of the entire series can be found in part 1 [2].
The ASN.1 module is also available as an electronic attachment to the original document from the ETSI site (see
clause 7 for details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
The present document focuses on Lawful Interception of IP Multimedia Services. It is to be used in conjunction with
ETSI TS 102 232-1 [2], in which the handling of the intercepted information is described.
ETSI

---------------------- Page: 5 ----------------------
6 ETSI TS 102 232-5 V3.5.1 (2015-10)
1 Scope
The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: Periodically TS 101 671 is published as ES 201 671. A reference to the latest version of the TS as above
reflects the latest stable content from ETSI/TC LI.
[2] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 1: Handover specification for IP delivery".
[3] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[4] IETF RFC 3261: "SIP: Session Initiation Protocol".
[5] IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications".
[6] Recommendation ITU-T H.323: "Packet-based multimedia communications systems".
[7] Recommendation ITU-T H.248: "Gateway control protocol".
NOTE: H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I
were included in H.248.1. Subsequent annexes were sequentially numbered in the series, e.g. H.248
Annex F became H.248.2.
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;
Handover interface for Lawful Interception (LI) (3GPP TS 33.108 Release 9)".
[10] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[11] ATIS-PP-1000678.2006: "Lawfully Authorized Electronic Surveillance (LAES) for Voice over
Packet Technologies in Wireline Telecommunications Networks", Version 2 (Revision of
T1.678-2004).
ETSI

---------------------- Page: 6 ----------------------
7 ETSI TS 102 232-5 V3.5.1 (2015-10)
[12] Recommendation ITU-T H.225.0: "Call signalling protocols and media stream packetization for
packet-based multimedia communication systems".
[13] Recommendation ITU-T H.245: "Control protocol for multimedia communication".
[14] Void.
[15] IETF RFC 4975: "The Message Session Relay Protocol (MSRP)".
[16] Recommendation ITU-T T.38: "Procedures for real-time Group 3 facsimile communication over
IP networks".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TR 102 528: "Lawful Interception (LI); Interception domain Architecture for IP networks".
[i.2] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 101 671 [1], ETSI
TS 102 232-1 [2] and the following apply:
context: logical collection of H.248 terminations
IP MultiMedia service: multimedia service that utilizes the Internet Protocol (IP) for the transport of data
MultiMedia (MM): use of computers to present text, graphics, video, animation, and sound in an integrated way
MultiMedia service: communication service that offers Multimedia communication to end-users
termination: entity in H.248 that acts as a source or sink of media
NOTE: Terminations may be physical, such as a given channel on a TDM line, or ephemeral, such as an IP
endpoint.
TSAP identifier: piece of information used to multiplex several transport connections of the same type on a single
H.323 entity with all transport connections sharing the same Network Address (e.g. the port number in a TCP/UDP/IP
environment)
NOTE: Transport layer Service Access Point (TSAP) identifiers may be (pre)assigned statically by some
international authority or may be allocated dynamically during the setup of a call. Dynamically assigned
TSAP identifiers are of transient nature, i.e. their values are only valid for the duration of a single call.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AF Administration Function
ASN.1 Abstract Syntax Notation One
CC IIF CC Internal Interception Function
ETSI

---------------------- Page: 7 ----------------------
8 ETSI TS 102 232-5 V3.5.1 (2015-10)
CC Content of Communication
CCCI Content of Communication Control Interface
CCTF Content of Communication Trigger Function
CCTI Content of Communication Trigger Interface
CID Communication IDentifier
CIN Communication Identity Number
CLI Calling Line Identity
CSP Communications Service Provider (covers all AP/NWO/SvP)
DTMF Dual Tone Multi Frequency
GW GateWay
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
IAP Internet Access Provider
ID IDentity
IF Interception Function
IIF Internal Interception Function
INI Internal Network Interface
IP Internet Protocol
IRI IIF IRI Internal Interception Function
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
LIAF Lawful Interception Administration Function
LIID Lawful Interception IDentifier
MF Mediation Function
MG Media Gateway
MGC Media Gateway Controller
MM MultiMedia
MSRP Message Session Relay Protocol
OID Object IDentifier
PDU Protocol Data Unit
RAS Registration, Administration and Status
RTCP RTP Control Protocol
RTP Realtime Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
SSD Service-Specific Details
SvP Service Provider
TCP Transmission Control Protocol
TDM Time Division Multiplex
TSAP Transport layer Service Access Point
UDP User Datagram Protocol
UDPTL Facsimile UDP Transport Layer (protocol)
URI Uniform Resource Identifier
URL Uniform Resource Locator
4 General
4.1 Reference Model for Lawful Interception
The present document adopts the generic reference model for the interception domain from ETSI TR 102 528 [i.1], its
internal intercept functions, Intercept Related Information Interception Function (IRI IIF), Content of Communication
Trigger Function (CCTF), and Content of Communication Internal Interception Function (CC IIF), and the Internal
Network Interfaces INI1, INI2, INI3, Content of Communication Trigger Interface (CCTI) and Content of
Communication Control Interface (CCCI) as shown in figure 1.
ETSI

---------------------- Page: 8 ----------------------
9 ETSI TS 102 232-5 V3.5.1 (2015-10)

NWO/AP/SP DOMAIN LEA DOMAIN
HI
LEA
HI1
Administration Function (AF)
Administration
Function
INI1b INI1a
INI1c
IRI Internal Intercept
Function
INI2

(IRI IIF)
HI2




Law
Mediation
Enforcement
CCTI Function
Monitoring
CC Trigger
(MF)
Facility
Function
(LEMF)
(CCTF)
CCCI
CC Internal Intercept
Function
HI3
INI3
(CC IIF)

Figure 1: Reference Model for Lawful Interception
The reference model depicts the following functions and interfaces:
• INI1a provisions Intercept Related Information Internal Interception Function (IRI IIF).
• INI1b may (statically) provision Content of Communications Trigger Function (CCTF).
• INI1c provisions the Mediation Function (MF).
• Intercept Related Information Internal Intercept Function (IRI IIF) generates IRI.
• Content of Communication Internal Interception Function (CC IIF) generates CC.
• Content of Communication Trigger Function (CCTF) controls CC IIF.
• Content of Communication Control Interface (CCCI) provisions CC IIF.
• Content of Communication Trigger Interface (CCTI) may trigger CCTF for provisioning of the CC IIF.
• Content of Communication Control Interface (CCCI) may dynamically provision the CC IIF.
• Internal interface INI1 carries provisioning information from LIAF to the Internal Intercept Functions (IIF).
• Internal interface INI2 carries Intercept Related Information (IRI) from IRI IIF to the MF.
• Internal interface INI3 carries Content of Communication (CC) information from CC IIF to the MF.
For an in-depth explanation of the functions and interface, refer to clause 4 of ETSI TR 102 528 [i.1].
ETSI

---------------------- Page: 9 ----------------------
10 ETSI TS 102 232-5 V3.5.1 (2015-10)
4.2 Reference system model
The reference system model applied in the present document, as depicted in figure 2, provides a simplified model of a
technology independent, IP MultiMedia (MM) service platform, accessed by multiple different access networks. The
access networks may provide different forms of network access, using different technologies; they all have in common
that they provide IP connectivity among end-users and between end-users and the IP MM services provided by the IP
MM service platform.

Communication Signalling server

services

SvP IP Core network
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 2: Reference System Model
Access from the access networks into the IP Core network of the IP MM service provider is assumed to be protected by
some gateway device (e.g. a session border controller, border gateway controller or a firewall/router combination).
The IP MM Service platform contains a signalling server that provides session initiation functionality (e.g. a SIP call
manager or an H.323 gatekeeper) among end-users and between end-users and communication services (e.g. unified
messaging, audio or video conference servers).
4.2.1 Network layer Interception
Network Layer interception requires a copy of all signalling information as well as call content exchanged in the
platform to be available at a central point in the infrastructure.

Communication Signalling server
services
IRI

IIF
MF
CC
SvP IP Core network
IIF
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 3: Network layer Interception Model
ETSI

---------------------- Page: 10 ----------------------
11 ETSI TS 102 232-5 V3.5.1 (2015-10)
This can be achieved by means of span-ports in the layer 2 switching backbone or by means of passive splitters (either
copper or fibre) at strategic points in the SvP's core network. Either way, due to the bandwidth of copied network
traffic, some form of filtering will most likely be required (e.g. by means of a layer 3 switch).
4.2.2 Service layer Interception
Service Layer interception requires LI interfaces and functionality to be available in both the signalling server and the
gateways.

Communication Signalling
IRI


services server
IIF

MF
SvP IP Core network
CC CC CC
GW  GW  GW
IP MM SvP IIF IIF IIF
IAP / NWO
Access Access Access
network network network

Figure 4: Service layer Interception Model
Typically the IRI IIF in the signalling server is provisioned with the target ID. At detection of a session setup for a
target, the IRI IIF will provide the IRI for the intercepted session and may provide session information to be used for
ad-hoc provisioning of the gateway devices. In some implementations, the gateway devices are also provisioned with
the target ID beforehand and are capable of detecting sessions independent from the signalling server.
4.3 General Requirements
The following requirements regarding the interception of signalling shall apply:
1) Annex B provides the functional description of the minimal set of information that is to be provided to Law
Enforcement for each intercepted communication.
2) The present document supports the interception of communication services defined in the following
IETF/ITU-T standards and recommendations:
- IETF RFC 3261 [4] (SIP);
- IETF RFC 3550 [5] (RTP);
- IETF RFC 4975 [15] (MSRP);
- Recommendation ITU-T H.323 [6];
- Recommendation ITU-T H.225.0 [12];
- Recommendation ITU-T H.245 [13];
- Recommendation ITU-T T.38 [16].
3) Any deviation from the supported IETF and ITU-T specifications identified in item 2, e.g. vendor specific
parameters, shall be agreed in advance between the Communications Service Provider (CSP) and Law
Enforcement Agency (LEA).
4) The present document specifies the handover of intercepted signalling containing all information required in
ETSI TS 101 331 [10] by encapsulating that intercepted signalling.
ETSI

---------------------- Page: 11 ----------------------
12 ETSI TS 102 232-5 V3.5.1 (2015-10)
5) IRI that is not part of intercepted signalling shall also be delivered. The format of such information on the
handover interface shall be agreed in advance between the CSP and LEA.
6) As a national option, mapping of the IRI information onto specific messages at the handover interface may be
mandated, e.g. according to the ATIS-PP-1000678 [11] specification.
5 Interception of IP Multimedia services
5.1 Identification of target of interception
5.1.1 SIP Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• TEL URI;
• SIP URI;
• E.164 Number.
5.1.2 H.323 Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• H.323 URL;
• H.323 ID;
• E.164 Number.
5.2 Interception of signalling
5.2.1 Provisioning of the SIP IRI IIF
SIP messaging IETF RFC 3261 [4] is reported as Intercept Related Information (IRI) for the interception of multi-media
service. All SIP messages executed on behalf of a target subscriber are subject to interception at the IRI Internal
Interception Function (IIF). Based upon network configuration, the Administration Function (AF) shall provision IRI
IIF with SIP Uniform Resource Identifier (URI) or TEL Uniform Resource Locator (URL) target identifiers. These
resulting intercepted SIP messages shall be sent to the Mediation Function (MF) over the INI2 interface for mediation
prior to transmittal across the HI2 interface.
5.2.2 Provisioning of the H.323 IRI IIF
H.323 call signalling, call control and subscriber controlled input messages are reported as Intercepted Related
Information (IRI) for the interception of multi-media services. H.323 call signalling and control messages refer to the
basic call signalling (H.225.0), call control (H.245) and those messages required for the signalling of supplementary
services (i.e.: H.450.x). Subscriber controlled input messages refer to those messages generated as a result of user
procedures for the control of Supplementary Services (activation/deactivation/interrogation).
All H.323 call signalling, call control and subscriber controlled input messages that are transmitted on behalf of the
target subscriber are subject to intercept at the IRI IIF. Based upon the network configuration, the AF shall provision
IRI IIF with either a H.323 Unique Resource Locator (H.323-URL), or a H.323 Identity (H.323-ID), or a public E.164
telephone number.
If available events related to the Regist
...

SLOVENSKI STANDARD
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
01-februar-2016
Zakonito prestrezanje (LI) - Izročilna specifikacija in storitveno specifične
podrobnosti (SSD) za IP-dostavo - 5. del: Storitveno specifične podrobnosti za
multimedijske storitve IP
Lawful Interception (LI);Handover Interface and Service-Specific Details (SSD) for IP
delivery;Part 5: Service-specific details for IP Multimedia Services
Ta slovenski standard je istoveten z: ETSI TS 102 232-5 V3.5.1 (2015-10)
ICS:
35.240.95 Spletne uporabniške rešitve Internet applications
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016

---------------------- Page: 2 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
ETSI TS 102 232-5 V3.5.1 (2015-10)






TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 5: Service-specific details for IP Multimedia Services



---------------------- Page: 3 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 2 ETSI TS 102 232-5 V3.5.1 (2015-10)



Reference
RTS/LI-00129-5
Keywords
IMS, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2015.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI

---------------------- Page: 4 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 3 ETSI TS 102 232-5 V3.5.1 (2015-10)
Contents
Intellectual Property Rights . 5
Foreword . 5
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions and abbreviations . 7
3.1 Definitions . 7
3.2 Abbreviations . 7
4 General . 8
4.1 Reference Model for Lawful Interception . 8
4.2 Reference system model . 10
4.2.1 Network layer Interception . 10
4.2.2 Service layer Interception . 11
4.3 General Requirements . 11
5 Interception of IP Multimedia services . 12
5.1 Identification of target of interception . 12
5.1.1 SIP Target Identification . 12
5.1.2 H.323 Target Identification . 12
5.2 Interception of signalling . 12
5.2.1 Provisioning of the SIP IRI IIF . 12
5.2.2 Provisioning of the H.323 IRI IIF . 12
5.2.3 Location information . 13
5.3 Assigning a value to the Communication Identity Number . 13
5.3.1 Assigning a CIN value to SIP related IRI . 13
5.3.2 Assigning a CIN value to H.323 related IRI . 13
5.4 Events and IRI record types . 13
5.5 Interception of Content of Communication . 14
5.6 Direction for IMS IRI for Signalling Messages . 14
5.7 Direction for IMS sessions . 15
5.7.1 Direction for SIP sessions . 15
5.7.2 Direction for H.323 sessions . 15
6 Handover Interface . 15
6.1 Intercepted Related Information . 15
6.2 Correlation of IRI and CC . 15
7 ASN.1 specification for IRI and CC. 15
Annex A (informative): Interception using H.248 . 19
A.1 Purpose of this annex . 19
A.2 Notes on interception using H.248 . 19
A.2.1 Target identification (see also clause 5.1) . 19
A.2.2 Provisioning of the H.248 IRI IIF (see also clause 5.2) . 20
A.3 Problems in H.248 interception . 20
A.3.1 Missing information in H.248 signalling . 20
A.3.2 Missing call content. 21
Annex B (normative): Minimum set of functional attributes to be provided . 22
B.1 General requirements . 22
ETSI

---------------------- Page: 5 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 4 ETSI TS 102 232-5 V3.5.1 (2015-10)
B.2 Result of interception . 22
B.3 Location information . 23
B.4 Time constraints . 23
B.5 Technical handover interfaces and format requirements . 24
Annex C (informative): Change request history . 25
History . 27

ETSI

---------------------- Page: 6 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 5 ETSI TS 102 232-5 V3.5.1 (2015-10)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 5 of a multi-part deliverable. Full details of the entire series can be found in part 1 [2].
The ASN.1 module is also available as an electronic attachment to the original document from the ETSI site (see
clause 7 for details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
The present document focuses on Lawful Interception of IP Multimedia Services. It is to be used in conjunction with
ETSI TS 102 232-1 [2], in which the handling of the intercepted information is described.
ETSI

---------------------- Page: 7 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 6 ETSI TS 102 232-5 V3.5.1 (2015-10)
1 Scope
The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: Periodically TS 101 671 is published as ES 201 671. A reference to the latest version of the TS as above
reflects the latest stable content from ETSI/TC LI.
[2] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 1: Handover specification for IP delivery".
[3] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[4] IETF RFC 3261: "SIP: Session Initiation Protocol".
[5] IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications".
[6] Recommendation ITU-T H.323: "Packet-based multimedia communications systems".
[7] Recommendation ITU-T H.248: "Gateway control protocol".
NOTE: H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I
were included in H.248.1. Subsequent annexes were sequentially numbered in the series, e.g. H.248
Annex F became H.248.2.
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;
Handover interface for Lawful Interception (LI) (3GPP TS 33.108 Release 9)".
[10] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[11] ATIS-PP-1000678.2006: "Lawfully Authorized Electronic Surveillance (LAES) for Voice over
Packet Technologies in Wireline Telecommunications Networks", Version 2 (Revision of
T1.678-2004).
ETSI

---------------------- Page: 8 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 7 ETSI TS 102 232-5 V3.5.1 (2015-10)
[12] Recommendation ITU-T H.225.0: "Call signalling protocols and media stream packetization for
packet-based multimedia communication systems".
[13] Recommendation ITU-T H.245: "Control protocol for multimedia communication".
[14] Void.
[15] IETF RFC 4975: "The Message Session Relay Protocol (MSRP)".
[16] Recommendation ITU-T T.38: "Procedures for real-time Group 3 facsimile communication over
IP networks".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TR 102 528: "Lawful Interception (LI); Interception domain Architecture for IP networks".
[i.2] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 101 671 [1], ETSI
TS 102 232-1 [2] and the following apply:
context: logical collection of H.248 terminations
IP MultiMedia service: multimedia service that utilizes the Internet Protocol (IP) for the transport of data
MultiMedia (MM): use of computers to present text, graphics, video, animation, and sound in an integrated way
MultiMedia service: communication service that offers Multimedia communication to end-users
termination: entity in H.248 that acts as a source or sink of media
NOTE: Terminations may be physical, such as a given channel on a TDM line, or ephemeral, such as an IP
endpoint.
TSAP identifier: piece of information used to multiplex several transport connections of the same type on a single
H.323 entity with all transport connections sharing the same Network Address (e.g. the port number in a TCP/UDP/IP
environment)
NOTE: Transport layer Service Access Point (TSAP) identifiers may be (pre)assigned statically by some
international authority or may be allocated dynamically during the setup of a call. Dynamically assigned
TSAP identifiers are of transient nature, i.e. their values are only valid for the duration of a single call.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AF Administration Function
ASN.1 Abstract Syntax Notation One
CC IIF CC Internal Interception Function
ETSI

---------------------- Page: 9 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 8 ETSI TS 102 232-5 V3.5.1 (2015-10)
CC Content of Communication
CCCI Content of Communication Control Interface
CCTF Content of Communication Trigger Function
CCTI Content of Communication Trigger Interface
CID Communication IDentifier
CIN Communication Identity Number
CLI Calling Line Identity
CSP Communications Service Provider (covers all AP/NWO/SvP)
DTMF Dual Tone Multi Frequency
GW GateWay
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
IAP Internet Access Provider
ID IDentity
IF Interception Function
IIF Internal Interception Function
INI Internal Network Interface
IP Internet Protocol
IRI IIF IRI Internal Interception Function
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
LIAF Lawful Interception Administration Function
LIID Lawful Interception IDentifier
MF Mediation Function
MG Media Gateway
MGC Media Gateway Controller
MM MultiMedia
MSRP Message Session Relay Protocol
OID Object IDentifier
PDU Protocol Data Unit
RAS Registration, Administration and Status
RTCP RTP Control Protocol
RTP Realtime Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
SSD Service-Specific Details
SvP Service Provider
TCP Transmission Control Protocol
TDM Time Division Multiplex
TSAP Transport layer Service Access Point
UDP User Datagram Protocol
UDPTL Facsimile UDP Transport Layer (protocol)
URI Uniform Resource Identifier
URL Uniform Resource Locator
4 General
4.1 Reference Model for Lawful Interception
The present document adopts the generic reference model for the interception domain from ETSI TR 102 528 [i.1], its
internal intercept functions, Intercept Related Information Interception Function (IRI IIF), Content of Communication
Trigger Function (CCTF), and Content of Communication Internal Interception Function (CC IIF), and the Internal
Network Interfaces INI1, INI2, INI3, Content of Communication Trigger Interface (CCTI) and Content of
Communication Control Interface (CCCI) as shown in figure 1.
ETSI

---------------------- Page: 10 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 9 ETSI TS 102 232-5 V3.5.1 (2015-10)

NWO/AP/SP DOMAIN LEA DOMAIN
HI
LEA
HI1
Administration Function (AF)
Administration
Function
INI1b INI1a
INI1c
IRI Internal Intercept
Function
INI2

(IRI IIF)
HI2




Law
Mediation
Enforcement
CCTI Function
Monitoring
CC Trigger
(MF)
Facility
Function
(LEMF)
(CCTF)
CCCI
CC Internal Intercept
Function
HI3
INI3
(CC IIF)

Figure 1: Reference Model for Lawful Interception
The reference model depicts the following functions and interfaces:
• INI1a provisions Intercept Related Information Internal Interception Function (IRI IIF).
• INI1b may (statically) provision Content of Communications Trigger Function (CCTF).
• INI1c provisions the Mediation Function (MF).
• Intercept Related Information Internal Intercept Function (IRI IIF) generates IRI.
• Content of Communication Internal Interception Function (CC IIF) generates CC.
• Content of Communication Trigger Function (CCTF) controls CC IIF.
• Content of Communication Control Interface (CCCI) provisions CC IIF.
• Content of Communication Trigger Interface (CCTI) may trigger CCTF for provisioning of the CC IIF.
• Content of Communication Control Interface (CCCI) may dynamically provision the CC IIF.
• Internal interface INI1 carries provisioning information from LIAF to the Internal Intercept Functions (IIF).
• Internal interface INI2 carries Intercept Related Information (IRI) from IRI IIF to the MF.
• Internal interface INI3 carries Content of Communication (CC) information from CC IIF to the MF.
For an in-depth explanation of the functions and interface, refer to clause 4 of ETSI TR 102 528 [i.1].
ETSI

---------------------- Page: 11 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 10 ETSI TS 102 232-5 V3.5.1 (2015-10)
4.2 Reference system model
The reference system model applied in the present document, as depicted in figure 2, provides a simplified model of a
technology independent, IP MultiMedia (MM) service platform, accessed by multiple different access networks. The
access networks may provide different forms of network access, using different technologies; they all have in common
that they provide IP connectivity among end-users and between end-users and the IP MM services provided by the IP
MM service platform.

Communication Signalling server

services

SvP IP Core network
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 2: Reference System Model
Access from the access networks into the IP Core network of the IP MM service provider is assumed to be protected by
some gateway device (e.g. a session border controller, border gateway controller or a firewall/router combination).
The IP MM Service platform contains a signalling server that provides session initiation functionality (e.g. a SIP call
manager or an H.323 gatekeeper) among end-users and between end-users and communication services (e.g. unified
messaging, audio or video conference servers).
4.2.1 Network layer Interception
Network Layer interception requires a copy of all signalling information as well as call content exchanged in the
platform to be available at a central point in the infrastructure.

Communication Signalling server
services
IRI

IIF
MF
CC
SvP IP Core network
IIF
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 3: Network layer Interception Model
ETSI

---------------------- Page: 12 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 11 ETSI TS 102 232-5 V3.5.1 (2015-10)
This can be achieved by means of span-ports in the layer 2 switching backbone or by means of passive splitters (either
copper or fibre) at strategic points in the SvP's core network. Either way, due to the bandwidth of copied network
traffic, some form of filtering will most likely be required (e.g. by means of a layer 3 switch).
4.2.2 Service layer Interception
Service Layer interception requires LI interfaces and functionality to be available in both the signalling server and the
gateways.

Communication Signalling
IRI


services server
IIF

MF
SvP IP Core network
CC CC CC
GW  GW  GW
IP MM SvP IIF IIF IIF
IAP / NWO
Access Access Access
network network network

Figure 4: Service layer Interception Model
Typically the IRI IIF in the signalling server is provisioned with the target ID. At detection of a session setup for a
target, the IRI IIF will provide the IRI for the intercepted session and may provide session information to be used for
ad-hoc provisioning of the gateway devices. In some implementations, the gateway devices are also provisioned with
the target ID beforehand and are capable of detecting sessions independent from the signalling server.
4.3 General Requirements
The following requirements regarding the interception of signalling shall apply:
1) Annex B provides the functional description of the minimal set of information that is to be provided to Law
Enforcement for each intercepted communication.
2) The present document supports the interception of communication services defined in the following
IETF/ITU-T standards and recommendations:
- IETF RFC 3261 [4] (SIP);
- IETF RFC 3550 [5] (RTP);
- IETF RFC 4975 [15] (MSRP);
- Recommendation ITU-T H.323 [6];
- Recommendation ITU-T H.225.0 [12];
- Recommendation ITU-T H.245 [13];
- Recommendation ITU-T T.38 [16].
3) Any deviation from the supported IETF and ITU-T specifications identified in item 2, e.g. vendor specific
parameters, shall be agreed in advance between the Communications Service Provider (CSP) and Law
Enforcement Agency (LEA).
4) The present document specifies the handover of intercepted signalling containing all information required in
ETSI TS 101 331 [10] by encapsulating that intercepted signalling.
ETSI

---------------------- Page: 13 ----------------------
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 12 ETSI TS 102 232-5 V3.5.1 (2015-10)
5) IRI that is not part of intercepted signalling shall also be delivered. The format of such information on the
handover interface shall be agreed in advance between the CSP and LEA.
6) As a national option, mapping of the IRI information onto specific messages at the handover interface may be
mandated, e.g. according to the ATIS-PP-1000678 [11] specification.
5 Interception of IP Multimedia services
5.1 Identification of target of interception
5.1.1 SIP Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• TEL URI;
• SIP URI;
• E.164 Number.
5.1.2 H.323 Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• H.323 URL;
• H.323 ID;
• E.164 Number.
5.2 Interception of signalling
5.2.1 Provisioning of the SIP IRI IIF
SIP messaging IETF RFC 3261 [4] is reported as Intercept Related Information (IRI) for the interception of multi-media
service. All SIP messages executed on behalf of a target subscriber are subject to interception at the IRI Internal
Interception Function (IIF). Based upon network configuration, the Administrati
...

SLOVENSKI STANDARD
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
01-februar-2016
=DNRQLWRSUHVWUH]DQMH /, ,]URþLOQDVSHFLILNDFLMDLQVWRULWYHQRVSHFLILþQH
SRGUREQRVWL 66' ]D,3GRVWDYRGHO6WRULWYHQRVSHFLILþQHSRGUREQRVWL]D
PXOWLPHGLMVNHVWRULWYH,3
Lawful Interception (LI);Handover Interface and Service-Specific Details (SSD) for IP
delivery;Part 5: Service-specific details for IP Multimedia Services
Ta slovenski standard je istoveten z: ETSI TS 102 232-5 V3.5.1 (2015-10)
ICS:
35.020 Informacijska tehnika in Information technology (IT) in
tehnologija na splošno general
SIST-TS ETSI/TS 102 232-5 V3.5.1:2016 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016

---------------------- Page: 2 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
ETSI TS 102 232-5 V3.5.1 (2015-10)






TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 5: Service-specific details for IP Multimedia Services



---------------------- Page: 3 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 2 ETSI TS 102 232-5 V3.5.1 (2015-10)



Reference
RTS/LI-00129-5
Keywords
IMS, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2015.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI

---------------------- Page: 4 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 3 ETSI TS 102 232-5 V3.5.1 (2015-10)
Contents
Intellectual Property Rights . 5
Foreword . 5
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions and abbreviations . 7
3.1 Definitions . 7
3.2 Abbreviations . 7
4 General . 8
4.1 Reference Model for Lawful Interception . 8
4.2 Reference system model . 10
4.2.1 Network layer Interception . 10
4.2.2 Service layer Interception . 11
4.3 General Requirements . 11
5 Interception of IP Multimedia services . 12
5.1 Identification of target of interception . 12
5.1.1 SIP Target Identification . 12
5.1.2 H.323 Target Identification . 12
5.2 Interception of signalling . 12
5.2.1 Provisioning of the SIP IRI IIF . 12
5.2.2 Provisioning of the H.323 IRI IIF . 12
5.2.3 Location information . 13
5.3 Assigning a value to the Communication Identity Number . 13
5.3.1 Assigning a CIN value to SIP related IRI . 13
5.3.2 Assigning a CIN value to H.323 related IRI . 13
5.4 Events and IRI record types . 13
5.5 Interception of Content of Communication . 14
5.6 Direction for IMS IRI for Signalling Messages . 14
5.7 Direction for IMS sessions . 15
5.7.1 Direction for SIP sessions . 15
5.7.2 Direction for H.323 sessions . 15
6 Handover Interface . 15
6.1 Intercepted Related Information . 15
6.2 Correlation of IRI and CC . 15
7 ASN.1 specification for IRI and CC. 15
Annex A (informative): Interception using H.248 . 19
A.1 Purpose of this annex . 19
A.2 Notes on interception using H.248 . 19
A.2.1 Target identification (see also clause 5.1) . 19
A.2.2 Provisioning of the H.248 IRI IIF (see also clause 5.2) . 20
A.3 Problems in H.248 interception . 20
A.3.1 Missing information in H.248 signalling . 20
A.3.2 Missing call content. 21
Annex B (normative): Minimum set of functional attributes to be provided . 22
B.1 General requirements . 22
ETSI

---------------------- Page: 5 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 4 ETSI TS 102 232-5 V3.5.1 (2015-10)
B.2 Result of interception . 22
B.3 Location information . 23
B.4 Time constraints . 23
B.5 Technical handover interfaces and format requirements . 24
Annex C (informative): Change request history . 25
History . 27

ETSI

---------------------- Page: 6 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 5 ETSI TS 102 232-5 V3.5.1 (2015-10)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 5 of a multi-part deliverable. Full details of the entire series can be found in part 1 [2].
The ASN.1 module is also available as an electronic attachment to the original document from the ETSI site (see
clause 7 for details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
The present document focuses on Lawful Interception of IP Multimedia Services. It is to be used in conjunction with
ETSI TS 102 232-1 [2], in which the handling of the intercepted information is described.
ETSI

---------------------- Page: 7 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 6 ETSI TS 102 232-5 V3.5.1 (2015-10)
1 Scope
The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 [9] and
ETSI TS 101 671 [1].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: Periodically TS 101 671 is published as ES 201 671. A reference to the latest version of the TS as above
reflects the latest stable content from ETSI/TC LI.
[2] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 1: Handover specification for IP delivery".
[3] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[4] IETF RFC 3261: "SIP: Session Initiation Protocol".
[5] IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications".
[6] Recommendation ITU-T H.323: "Packet-based multimedia communications systems".
[7] Recommendation ITU-T H.248: "Gateway control protocol".
NOTE: H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I
were included in H.248.1. Subsequent annexes were sequentially numbered in the series, e.g. H.248
Annex F became H.248.2.
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;
Handover interface for Lawful Interception (LI) (3GPP TS 33.108 Release 9)".
[10] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[11] ATIS-PP-1000678.2006: "Lawfully Authorized Electronic Surveillance (LAES) for Voice over
Packet Technologies in Wireline Telecommunications Networks", Version 2 (Revision of
T1.678-2004).
ETSI

---------------------- Page: 8 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 7 ETSI TS 102 232-5 V3.5.1 (2015-10)
[12] Recommendation ITU-T H.225.0: "Call signalling protocols and media stream packetization for
packet-based multimedia communication systems".
[13] Recommendation ITU-T H.245: "Control protocol for multimedia communication".
[14] Void.
[15] IETF RFC 4975: "The Message Session Relay Protocol (MSRP)".
[16] Recommendation ITU-T T.38: "Procedures for real-time Group 3 facsimile communication over
IP networks".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TR 102 528: "Lawful Interception (LI); Interception domain Architecture for IP networks".
[i.2] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 101 671 [1], ETSI
TS 102 232-1 [2] and the following apply:
context: logical collection of H.248 terminations
IP MultiMedia service: multimedia service that utilizes the Internet Protocol (IP) for the transport of data
MultiMedia (MM): use of computers to present text, graphics, video, animation, and sound in an integrated way
MultiMedia service: communication service that offers Multimedia communication to end-users
termination: entity in H.248 that acts as a source or sink of media
NOTE: Terminations may be physical, such as a given channel on a TDM line, or ephemeral, such as an IP
endpoint.
TSAP identifier: piece of information used to multiplex several transport connections of the same type on a single
H.323 entity with all transport connections sharing the same Network Address (e.g. the port number in a TCP/UDP/IP
environment)
NOTE: Transport layer Service Access Point (TSAP) identifiers may be (pre)assigned statically by some
international authority or may be allocated dynamically during the setup of a call. Dynamically assigned
TSAP identifiers are of transient nature, i.e. their values are only valid for the duration of a single call.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AF Administration Function
ASN.1 Abstract Syntax Notation One
CC IIF CC Internal Interception Function
ETSI

---------------------- Page: 9 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 8 ETSI TS 102 232-5 V3.5.1 (2015-10)
CC Content of Communication
CCCI Content of Communication Control Interface
CCTF Content of Communication Trigger Function
CCTI Content of Communication Trigger Interface
CID Communication IDentifier
CIN Communication Identity Number
CLI Calling Line Identity
CSP Communications Service Provider (covers all AP/NWO/SvP)
DTMF Dual Tone Multi Frequency
GW GateWay
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
IAP Internet Access Provider
ID IDentity
IF Interception Function
IIF Internal Interception Function
INI Internal Network Interface
IP Internet Protocol
IRI IIF IRI Internal Interception Function
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
LIAF Lawful Interception Administration Function
LIID Lawful Interception IDentifier
MF Mediation Function
MG Media Gateway
MGC Media Gateway Controller
MM MultiMedia
MSRP Message Session Relay Protocol
OID Object IDentifier
PDU Protocol Data Unit
RAS Registration, Administration and Status
RTCP RTP Control Protocol
RTP Realtime Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
SSD Service-Specific Details
SvP Service Provider
TCP Transmission Control Protocol
TDM Time Division Multiplex
TSAP Transport layer Service Access Point
UDP User Datagram Protocol
UDPTL Facsimile UDP Transport Layer (protocol)
URI Uniform Resource Identifier
URL Uniform Resource Locator
4 General
4.1 Reference Model for Lawful Interception
The present document adopts the generic reference model for the interception domain from ETSI TR 102 528 [i.1], its
internal intercept functions, Intercept Related Information Interception Function (IRI IIF), Content of Communication
Trigger Function (CCTF), and Content of Communication Internal Interception Function (CC IIF), and the Internal
Network Interfaces INI1, INI2, INI3, Content of Communication Trigger Interface (CCTI) and Content of
Communication Control Interface (CCCI) as shown in figure 1.
ETSI

---------------------- Page: 10 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 9 ETSI TS 102 232-5 V3.5.1 (2015-10)

NWO/AP/SP DOMAIN LEA DOMAIN
HI
LEA
HI1
Administration Function (AF)
Administration
Function
INI1b INI1a
INI1c
IRI Internal Intercept
Function
INI2

(IRI IIF)
HI2




Law
Mediation
Enforcement
CCTI Function
Monitoring
CC Trigger
(MF)
Facility
Function
(LEMF)
(CCTF)
CCCI
CC Internal Intercept
Function
HI3
INI3
(CC IIF)

Figure 1: Reference Model for Lawful Interception
The reference model depicts the following functions and interfaces:
• INI1a provisions Intercept Related Information Internal Interception Function (IRI IIF).
• INI1b may (statically) provision Content of Communications Trigger Function (CCTF).
• INI1c provisions the Mediation Function (MF).
• Intercept Related Information Internal Intercept Function (IRI IIF) generates IRI.
• Content of Communication Internal Interception Function (CC IIF) generates CC.
• Content of Communication Trigger Function (CCTF) controls CC IIF.
• Content of Communication Control Interface (CCCI) provisions CC IIF.
• Content of Communication Trigger Interface (CCTI) may trigger CCTF for provisioning of the CC IIF.
• Content of Communication Control Interface (CCCI) may dynamically provision the CC IIF.
• Internal interface INI1 carries provisioning information from LIAF to the Internal Intercept Functions (IIF).
• Internal interface INI2 carries Intercept Related Information (IRI) from IRI IIF to the MF.
• Internal interface INI3 carries Content of Communication (CC) information from CC IIF to the MF.
For an in-depth explanation of the functions and interface, refer to clause 4 of ETSI TR 102 528 [i.1].
ETSI

---------------------- Page: 11 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 10 ETSI TS 102 232-5 V3.5.1 (2015-10)
4.2 Reference system model
The reference system model applied in the present document, as depicted in figure 2, provides a simplified model of a
technology independent, IP MultiMedia (MM) service platform, accessed by multiple different access networks. The
access networks may provide different forms of network access, using different technologies; they all have in common
that they provide IP connectivity among end-users and between end-users and the IP MM services provided by the IP
MM service platform.

Communication Signalling server

services

SvP IP Core network
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 2: Reference System Model
Access from the access networks into the IP Core network of the IP MM service provider is assumed to be protected by
some gateway device (e.g. a session border controller, border gateway controller or a firewall/router combination).
The IP MM Service platform contains a signalling server that provides session initiation functionality (e.g. a SIP call
manager or an H.323 gatekeeper) among end-users and between end-users and communication services (e.g. unified
messaging, audio or video conference servers).
4.2.1 Network layer Interception
Network Layer interception requires a copy of all signalling information as well as call content exchanged in the
platform to be available at a central point in the infrastructure.

Communication Signalling server
services
IRI

IIF
MF
CC
SvP IP Core network
IIF
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 3: Network layer Interception Model
ETSI

---------------------- Page: 12 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 11 ETSI TS 102 232-5 V3.5.1 (2015-10)
This can be achieved by means of span-ports in the layer 2 switching backbone or by means of passive splitters (either
copper or fibre) at strategic points in the SvP's core network. Either way, due to the bandwidth of copied network
traffic, some form of filtering will most likely be required (e.g. by means of a layer 3 switch).
4.2.2 Service layer Interception
Service Layer interception requires LI interfaces and functionality to be available in both the signalling server and the
gateways.

Communication Signalling
IRI


services server
IIF

MF
SvP IP Core network
CC CC CC
GW  GW  GW
IP MM SvP IIF IIF IIF
IAP / NWO
Access Access Access
network network network

Figure 4: Service layer Interception Model
Typically the IRI IIF in the signalling server is provisioned with the target ID. At detection of a session setup for a
target, the IRI IIF will provide the IRI for the intercepted session and may provide session information to be used for
ad-hoc provisioning of the gateway devices. In some implementations, the gateway devices are also provisioned with
the target ID beforehand and are capable of detecting sessions independent from the signalling server.
4.3 General Requirements
The following requirements regarding the interception of signalling shall apply:
1) Annex B provides the functional description of the minimal set of information that is to be provided to Law
Enforcement for each intercepted communication.
2) The present document supports the interception of communication services defined in the following
IETF/ITU-T standards and recommendations:
- IETF RFC 3261 [4] (SIP);
- IETF RFC 3550 [5] (RTP);
- IETF RFC 4975 [15] (MSRP);
- Recommendation ITU-T H.323 [6];
- Recommendation ITU-T H.225.0 [12];
- Recommendation ITU-T H.245 [13];
- Recommendation ITU-T T.38 [16].
3) Any deviation from the supported IETF and ITU-T specifications identified in item 2, e.g. vendor specific
parameters, shall be agreed in advance between the Communications Service Provider (CSP) and Law
Enforcement Agency (LEA).
4) The present document specifies the handover of intercepted signalling containing all information required in
ETSI TS 101 331 [10] by encapsulating that intercepted signalling.
ETSI

---------------------- Page: 13 ----------------------

SIST-TS ETSI/TS 102 232-5 V3.5.1:2016
 12 ETSI TS 102 232-5 V3.5.1 (2015-10)
5) IRI that is not part of intercepted signalling shall also be delivered. The format of such information on the
handover interface shall be agreed in advance between the CSP and LEA.
6) As a national option, mapping of the IRI information onto specific messages at the handover interface may be
mandated, e.g. according to the ATIS-PP-1000678 [11] specification.
5 Interception of IP Multimedia services
5.1 Identification of target of interception
5.1.1 SIP Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• TEL URI;
• SIP URI;
• E.164 Number.
5.1.2 H.323 Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be an address type that
uniquely identifies the target in the CSP's network and by means of which sessions among users can be established,
such as:
• H.323 URL;
• H.323 ID;
• E.164 Number.
5.2 Interception of signalling
5.2.1 Provisioning of the SIP IRI IIF
SIP messaging IETF RFC 3261 [4] is reported as Intercept Related Information (IRI) for the interception of multi-media
service. All SIP messages executed on behalf of a target subscriber are subject to interception at the IRI Internal
Interception Function
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.