Skip to Content
Voice over IP Security
book

Voice over IP Security

by Patrick Park
September 2008
Intermediate to advanced
384 pages
9h 5m
English
Cisco Press
Content preview from Voice over IP Security

This chapter covers the methodology of deploying Lawful Interception in the following interfaces:

•  Intercept Request Interface

•  Call Data Connection Interface

•  Call Content Connection Interface

CHAPTER 11Lawful Interception Implementation

Chapter 10 covered the fundamentals of Lawful Interception, such as definition, requirements, basic architecture, and so on. This chapter covers the next step, how to implement each of the fundamentals in the VoIP service environment.

Even if the requirement from Law Enforcement Agent (LEA) is fixed, the implementation varies depending on a Telecommunications Service Provider (TSP). The primary reason for this variance is that there is no single standard that rules the method of implementation for whole ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP

Securing VoIP

Regis Jr (Bud) Bates
Voice Over IP

Voice Over IP

Uyless Black

Publisher Resources

ISBN: 9781587058233Purchase book