64
Interception Management System Interception Management System CELLNET Drop 2 © Ericsson Interception Management Systems, 2000 CELLNET Drop 2 1

Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

  • Upload
    others

  • View
    20

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

Interception Management SystemInterception Management System

CELLNET Drop 2

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 1

Page 2: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

C Obj tiCourse Objectives:After this course participants will be able to:After this course, participants will be able to:• Understand the Interception Concept

U d t d th R t C t l E i t• Understand the Remote Control Equipment Subsystem functions

• Overview of XMATE Platform - WIOZ Tool and Transaction Log Tool

• Use the IMS platform functions to:I. Initiate a warrantII. Audit a warrant III. Monitor a warrant IV Terminate a warrant

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 2

IV. Terminate a warrant

Page 3: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

Course Objectives:After this course participants will be able to:After this course, participants will be able to:• To manage the directory structure and files• To manage the security and access control /

authorisation• To have an overview of the Monitoing Tool• To administer the IMS transmission processTo administer the IMS transmission process• To administer the IMS database

T th IMS b k d• To manage the IMS backup and recovery• To have an overview of system upgrade procedure

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 3

• To manage Third Party Software Components

Page 4: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

Table of ContentsTable of Contents1. Overview ....................................................................4

1 1 IMS General Functions1.1 IMS General Functions ………………………….1.2 Ericsson Interception Concept ..............................51.3 IMS Architecture Platform ....................................61.4 IMS Application and Relationship.........................7

2. Remote Control Equipment Subsystem……………. 2 1 R t C t l E i t S b t I l t ti2.1 Remote Control Equipment Subsystem Implementation ...

3. Overview of XMATE Platform Functions …..……..4 IMS Operation 184. IMS Operation .........................................................18

4.1 Network Interface Communication.....................194.2 Warrant handling ................................................23g4.3 Audit process ......................................................294.4 Warrant Management Interface...........................30

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 4

Page 5: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

Table of ContentsTable of Contents3. Administering IMS ………...................................……………....10

3.1 IMS Directory Structure - $AOMPHOME/bin directory …...113.1 IMS Directory Structure $AOMPHOME/bin directory …...113.2 $AOMPHOME/bin/admin directory.. .............................…...233.3 Other directories ……………......…………....................…...363 4 IMS Configuration Files $AOMPHOME/setup/redrs 393.4 IMS Configuration Files - $AOMPHOME/setup/redrs....…...393.5 IMS Configuration Files - $AOMPHOME/setup/redrs/text....613.6 IMS Configuration Files - CTB Run-Time Variables......…....623 7 C fi bl IMS Att ib t 653.7 Configurable IMS Attributes ……...........................................653.8 $AOMPHOME/setup - Parameters of Interest ………………3.9 dcs password Configuration …………………………………3.9 dcs_password Configuration …………………………………

4. Security and Access Control / Authorisation ……………………4.1 Security and Access Control / Authorisation ………………..4.2 Create new

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 5

Page 6: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 O er ie1. OverviewModule Objectives

Be able to explain:

• Intercept Concept• IMS Architecture PlatformIMS Architecture Platform• IMS Application and Relationship

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 6

Page 7: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1.1 IMS General Functions• Server Functions

Sending of commands to the Network Element• Operator Functions

Management of the interception service performed g p pby an IMS operator

• Administration FunctionsAdministration FunctionsConfigure & maintain the application

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 7

Page 8: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 2 Interception Concept1.2 Interception ConceptMonitoring Centre

Law Enforcement Agencies

Monitoring CentreCallContent

CallData (DMC)

MC MC MC

PSDN (X.25)

PSTN/ISDN

X.31

OperatorCall Content(voice and data)

IMS(Interception Management System)

A-party PSDN (X.25)

Call Data(data about call)

ServiceManagement

AXE

AXE AXE AXEB-party

RES

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 8

AXE AXE

Page 9: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 3 S A hi l f1.3 IMS Architecture Platform

Macro CommCommandGraph Al File

Interception Management Application(REDRB) IMS

Application Programming Interface (API)

Macro CommTool(CFB)

CommandTerminal(CHB)

Graph. Al.Presentation(ALGPB)

FileTransfer(FTB)

XMATE

MonitorBlock(AMB)

AuthorityAdmin.(AOMPB)

DataCommun.(DCB)

AlarmHandling(AHB)

CommandLog(CLB)

OperatingSystemSolaris (UNIX)

UserInterface(CDE&Applix)

X.25 OSI/FTAMSolsticesecurityManager

Computer Platform (Sun Ultra Sparc)

ThirdPartyComponents

p ( p )

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 9

Page 10: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

k f i i1.4 Network Interface Communication

Administration commandsIMS AXE

Administration commands

RESRESCollects the data output

RCEFILE via communication portport

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 10

Page 11: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 5 Communication to AXE1.5 Communication to AXELink supervision

OMC

Supervision based on the heart-beat reception from AXE(1 min)

IMSS

Supervision based on the time scheduled polling from IMS(defined by Administrator recommended 5-10 min)(defined by Administrator, recommended 5-10 min)

Includes supervision of:

• Data Communication Server (DCS)• Physical connection to the data network (IMS connection)

Ph i l ti f AXE t th d t t k

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 11

• Physical connection of AXE to the data network

Page 12: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 6 Warrant Handling1.6 Warrant HandlingCharacteristics

• Warrant Activation/deactivation• Warrant Activation/deactivation

• Warrant subscription monitoring (Audit, reload relatedWarrant subscription monitoring (Audit, reload related update)

• Checking Monitoring number operational status

• Security access control

• Event logging

S it i t f th i t ti iti i f ti

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 12

• Security input of the interception sensitive information

Page 13: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1.7 Broadcast Ordering

Activation

IMS AXESends the MML commands for

ordering of monitoring of an warrant RCSUI

Deactivation

Sends the MML commands &

Deactivation

IMS AXESends the MML commands &

update the databaseRCSUE

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 13

Page 14: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 8 Warrant Handling1.8 Warrant HandlingInitiate State machine model

Action: InitiateActor : OperatorTool : Warrant Init.L Y

IdleInitiate

D l t (1)

Log : YesDescr. : Warrant initiated in

the IMS DB but not in the network

InitiatedDelete(1)

Action: DeleteActor : AdministratorTool : DB AdminLog : YesLog : YesDescr. :

(1) Deletion of the warrantin the IMS DB.in the IMS DB.No warrant in the network

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 14

Page 15: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 8 Warrant Handling1.8 Warrant HandlingInitiate State machine model

A ti I iti tAction: InitiateActor : System (automatic)Tool : n/aLog : YesD W t i iti t d i

IdleInitiate

InitiateD l t (1)

Descr. : Warrant initiated inthe IMS DB andin the network.Send Start Data Record.I t ti

InitiatedDelete(1) Increment respective

warrant statistic counter

Initiated

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 15

Page 16: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 8 Warrant Handling1.8 Warrant HandlingTerminate State machine model

Action: TerminateActor : System (automatic)

IdleInitiate

InitiateD l t (1)

Actor : System (automatic)Tool : n/aLog : YesDescr. : Warrant deinitiated in

the network but the infoInitiated

T i t

Delete(1) the network but the info.still in the IMS DB.Send Stop Data Record

Initiated Terminate

Delete(1)

Action: DeleteActor : AdministratorTool : DB AdminLog : YesD

Terminated

Delete(1)Descr. :

(1) Deletion of the warrantin the IMS DB.N t i th t k

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 16

No warrant in the network

Page 17: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1 8 Warrant Handling1.8 Warrant HandlingState machine modelAction: Initiate

Actor : Operator Action: InitiatepTool : Warrant Init.Log : YesDescr. : Warrant initiated in

the IMS DB but not in the network

Actor : System (automatic)Tool : n/aLog : YesDescr. : Warrant initiated in

the IMS DB andin the network

IdleInitiate

InitiateD l t (1)

in the network.Send Start Data Record.Increment respectivewarrant statistic counter

Action: TerminateActor : System (automatic)Tool : n/aLog : Yes

Initiated

T i t

Delete(1) Descr. : Warrant deinitiated inthe network but the info.still in the IMS DB.Send Stop Data RecordAction: Delete

Actor : AdministratorTool : DB Admin

Initiated Terminate

Delete(1)

Tool : DB AdminLog : YesDescr. :

(1) Deletion of the warrantin the IMS DB.No warrant in the network

Terminated

Delete(1)No warrant in the network

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 17

Page 18: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

1.9 Grouping of Network Element

• NE can be grouped according to characteristics like location, and type of , ypservices

• A NE can be member of multiple groups• A NE can be member of multiple groups• Benefit of grouping NE:

– time saving when updating, upgrading and maintainingmaintaining

– centralize the controlling function

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 18

Page 19: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

2 Remote Control Equipment Subsystem2. Remote Control Equipment SubsystemModule Objectives

Be able to:

• Use the AXE MML commands

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 19

Page 20: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

2.1 Remote Control Equipment Subsystem

• The content of the call can be speech or data• Both calls to & from a target subscriber can be monitored

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 20

Page 21: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

2 1 Remote Control Equipment2.1 Remote Control Equipment Subsystem Implementationy p

• IMS functions are implemented as a function block (REDRB) on the XMATE systemblock (REDRB) on the XMATE system application platform.C i i i h h l i• Communication with the external system is provided via DCB

• DCB provides a gateway function between the internal network based on TCP/IP protocol & external communication networks based on the X.25 protocol

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 21

Page 22: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

2.2 Remote Control Equipment Subsystem

AXE 10

APZ APT System Level

Subsystem LevelGSS TCS RES Level

Function BlockFunction Block

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 22

Page 23: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

2 3 f l S C d2.3 Useful RES CommandsHere are some sample RES commands:

• RCSUI for initiating of a monitoringParameters: MONB, MCNB, CTYPE, RCE, CUG, NI, SUPPRESS and MUID

• RCSUE for ending of a monitoringParameters: MONB, MUID

• RCSUP for printing defined dataParameters: MONB, MUID

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 23

Page 24: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 Overview of XMATE Platform3. Overview of XMATE Platform Module Objectives

Be able to operate:

• WIOZ ToolMan Machine Language (MML) CommandMan Machine Language (MML) Command Terminal ToolT ti L T l• Transaction Log Tool

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 24

Page 25: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 1 Man Machine Language3.1 Man Machine LanguageCommand (MML) Terminal Tool

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 25

Page 26: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.2 MML Terminal ToolInteraction with theInteraction with the electronic manual

Supports:• Automatic log of commands and

responses (Autolog)• Authority and access control

Cat & Paste

Authority and access control• Dangerous command

notification• Command log• Support for the remote FC

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 26

Page 27: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 3 S i f3.3 Setting up user preferences• The system administrator may set up various

standard preferences when installing XMATE which you may wish to change to suit yourself.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 27

Page 28: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.4 Connecting to a network element• You can only connect a WiOZ Communication Tool

session to a single network element at a time. WiOZ C i ti T l i t t• WiOZ Communication Tool session may connect to any network element via a DCS gateway running on any host on you local area networkany host on you local area network.

• The DCS gateway handles the external connection to remote network elements.remote network elements.

• If you need to connect to several elements, launch additional sessions.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 28

Page 29: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 5 To open a connection to a network3.5 To open a connection to a network element

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 29

Page 30: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 6 To view your authorisation3.6 To view your authorisation settings

• The system administrator sets up your user authorisation file so that you can yonly connect to particular network elements and send them particularelements and send them particular commands. You can view permitted network elements and commandsnetwork elements and commands.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 30

Page 31: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 7 Sending commands to network3.7 Sending commands to network elements

• You send all commands to a network element from the command input box.

• The network element returns all responses –whether immediate printout (IPO) or delayed p ( ) yresult printout (RPO) – to the printout box.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 31

Page 32: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 8 To edit and re-send a command sent3.8 To edit and re send a command sent previously

• Find the command in the history list and click it only once The command copies to theit only once. The command copies to the command input box.

• Edit the command as required and press• Edit the command as required and press Return to send it. When the IPO Window button is visible an immediate responsebutton is visible, an immediate response appears in the printout box. The command also appends to the history list regardless ifalso appends to the history list regardless if any changes have been made.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 32

Page 33: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 9 To immediately re-send a3.9 To immediately re send a command sent previously

• Find the command in the history list and double-click itdouble click it.

• WiOZ Communication Tool sends the command immediately without copying it tocommand immediately without copying it to the command input box. When the IPO Window button is visible an immediateWindow button is visible, an immediate response appears in the printout box. The command does not append to the history listcommand does not append to the history list compare with ‘To edit and resend a command sent previously’ above

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 33

sent previously above.

Page 34: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 10 Entry Commands and Sub3.10 Entry Commands and Sub Commands

• Entry command is a command which yestablishes a session with the specified Support Processor Group (SPG) for variousSupport Processor Group (SPG) for various sub-system. I bl h b l• It enables the operator to subsequently enter sub-commands which are executed in the SPG.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 34

Page 35: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 11 D d3.11 Dangerous commands

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 35

Page 36: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 10 To step through a command file3.10 To step through a command file – in sequence

• You must create command files before you can send any to a network element – see.

• This method only lets you send commands in strict sequence from first to last. And you can q yonly see one command at a time.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 36

Page 37: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 11 To step through a command file –3.11 To step through a command file out of sequence

• You must create command files before you can send any to a network element. y y

• This method lets you see all the commands in a command file beforecommands in a command file before you begin sending them.

• You can also send them in any order.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 37

Page 38: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 12 Handling the output from3.12 Handling the output from network elements

• If the IPO window is currently being displayed, the RPO indicator at the top p y , pright will illuminate when WiOZ Communication Tool receives a resultCommunication Tool receives a result printout (RPO).

• You can then switch the printout box to view the contents of the RPO.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 38

Page 39: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 13 To view either immediate or3.13 To view either immediate or result printouts (IPO or RPO)

• Click the IPO Window button in the WiOZ –Communication Terminal window.

• The button changes to ‘RPO Window’ and the printout box displays the delayed RPO buffer.p p y y

• Click the RPO Window button in the WiOZ –Communication Terminal window.Communication Terminal window.

• The button changes to ‘IPO Window’ and the printout box displays the IPO bufferprintout box displays the IPO buffer.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 39

Page 40: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 14 To end a lengthy printout3.14 To end a lengthy printout prematurely

• Acknowledgement responses in the immediate printout (IPO) buffer are usually ed ate p tout ( O) bu e a e usua yshort.

• Result printouts (RPO) can be lengthy and• Result printouts (RPO) can be lengthy and you may wish to cut them short.

• Click the Break button in the WiOZ• Click the Break button in the WiOZ –Communication Terminal window.Th i th i t t b d• The response in the printout box ends immediately when viewing either the IPO or

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 40

• RPO buffer.

Page 41: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 15 To save all or part of session3.15 To save all or part of session printouts to log files

• You may save all or part of the printout box to a log filebox to a log file.

• You can save only the immediate printout (IPO) or only the Result printout (RPO), or you have been switching auto(RPO), or you have been switching auto logging on and off, and need to save the entire sessionentire session.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 41

Page 42: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 16 To delete the contents of the3.16 To delete the contents of the printout box

• You may want to start with a clean printout box, especially if you wish to p , p y ysave a record of a new session of commands and responsescommands and responses.

• Right-click in the printout box and choose the Clear Window menu option.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 42

Page 43: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.17 Working with the history list• When you send a man-machine language (MML)

command to a network element, WiOZ Communication Tool appends the command to theCommunication Tool appends the command to the history list.

• As you send commands WiOZ Communication ToolAs you send commands, WiOZ Communication Tool appends them to the top of the history list box, that is, the earliest command is at the bottom and the latest at the top. The line numbers show you the order and help you keep track when resending commands.

• When you save the history list to a command file, the file is ordered as you would expect – earliest commands at the beginning and latest commands at

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 43

commands at the beginning and latest commands at the end.

Page 44: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.18 Working with command files• Command files consist of a series of man-machine

language (MML) statements, one to a line, in the same syntax as you would type them in the command input box.syntax as you would type them in the command input box.

• In a command file, the first command to execute is at the ‘top’ or beginning of the file and the last to execute is at the ‘bottom’ or end.

• When you open a command file in the history list, WiOZ Communication Tool reverses the displayed orderCommunication Tool reverses the displayed order.

• The line numbers tell you which are earlier or later. Keep these differences in mind when you are creating andthese differences in mind when you are creating and editing command files.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 44

Page 45: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 19 To save the history list to a3.19 To save the history list to a command file

• Right-click in the history list and choose the Save To CmdFile menu option.pThe File Selection Box dialogueopens at the default directory foropens at the default directory for command files.You may navigate to a differentYou may navigate to a different directory if you wish.

• Type the name for the new command file and click OK

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 45

file and click OK.

Page 46: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.20 To create new command files

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 46

Page 47: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.21 To edit command files

• A command file is just an ordinary ASCII text file. So you may prefer another editor, such as Text Editor. Or you may use a traditional UNIX editor, such as vi or emacs.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 47

Page 48: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 22 To open or import existing3.22 To open or import existing command files

• Consider clearing the current contents of the Edit Command File window.A fil d t i t i d I t d• A file does not open into a new window. Instead, WiOZ Communication Tool inserts the file at the location of the insertion point in the current windowlocation of the insertion point in the current window.

• Choose the File > New menu option to start with an empty window.empty window.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 48

Page 49: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.23 To end an editing session

• CAUTION No warning of unsaved file WiOZ Communication Tool does not warn you if you quit the Edit Command File window while its contents are unsaved.

• Choose the File > Save menu option and save the contents of the Edit Command File window if not already saved.

• Choose the File > Quit menu option.Choose the File Quit menu option.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 49

Page 50: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3 24 M i d fil3.24 Managing command files• You may use the File Manager of the Common Desktop

Environment (CDE) to copy, rename, and move command files. See the Common Desktop Environment.

• CAUTION Deleted files are gone forever Once you delete a command file the only way you might be able to recover it is if the system administrator canable to recover it is if the system administrator can restore it from a back-up tape.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 50

Page 51: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.25 Working with session log files

• Log files are a permanent record of the commands sent to a network element and its responses as displayed in the printout box.

• They are useful when you are developing y y p gcommand files and you need a record of the interactions with an network element for debugging.

• Log files can be an audit trail during networkLog files can be an audit trail during network operations to record how the behaviour of the network is altered.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 51

network is altered.

Page 52: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

3.26 Transaction Log ToolLog Tool

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 52

Page 53: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 IMS Operation4. IMS OperationModule Objectives

Be able to:

• Initialise a warrant• Stop a warrantStop a warrant• Audit the network• Monitor network status

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 53

Page 54: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 1 WARRANT MANAGEMENT4.1 WARRANT MANAGEMENT USER INTERFACE

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 54

Page 55: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 2 Warrant Initiation4.2 Warrant Initiation

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 55

Page 56: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 3 W t I iti ti4.3 Warrant Initiation

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 56

Page 57: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 4 S i4.4 Warrant Stopping

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 57

Page 58: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 5 W S i4.5 Warrant Stopping

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 58

Page 59: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4.6 Audit the NetworkThe audit function can be used to obtain

what interceptions have been initiated for a

The audit function can be used to obtain these details:• what interceptions have been initiated for a

particular network element or group of network elementsnetwork elements.

• which network elements or groups of network elements are actively intercepting calls.

• which subscribers are the targets of interceptions.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 59

Page 60: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 7 Synchronise the IMS & NE4.7 Synchronise the IMS & NE Database

• Synchronising forces the specified network elements to be updated based on the audit report contents.p

• The IMS Database is assumed to be correct hence all activation in thecorrect, hence all activation in the network elements are synchronised to be consistent with the IMS Database.

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 60

Page 61: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4.8 Audit Process

• Provides a comparison between the list of monitored subscribers in an AXE & the IMS.

List of List of monitored subscribers

in IMC

monitored subscribers

in AXE

compare

Generate

Audit Report

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 61

Page 62: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 9 Audit User Interface4.9 Audit User Interface

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 62

Page 63: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4.10 Audit Output

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 63

Page 64: Interception Management SystemInterception …...Sending of commands to the Network Element • Operator Functions Managgppement of the interception service performed by an IMS operator

4 11 Monitoring Status4.11 Monitoring Status

© Ericsson Interception Management Systems, 2000 CELLNET Drop 2 64