4 Functional architecture

03.333G security3GPPLawful InterceptionStage 2TS

The following picture contains the reference configuration for the lawful interception. The various entities and interfaces are described in more detail in the succeeding subclauses.

There is one Administration Function (ADMF) in the network. Together with the delivery functions it is used to hide from the MSC/VLR and GMSC that there might be multiple activations by different Law Enforcement Agencies (LEAs) on the same target.

Figure 1: Reference configuration

The reference configuration is only a logical representation of the entities involved in lawful interception and does not mandate separate physical entities. This allows for higher levels of integration.