ixMachine LI Edition
Product: Lawful lnterception
Applications: Lawful Interception,
Users: LI Solution Vendors,
Law Enforcement Agencies,
Key features: Identification of
targets and interception of IP
Lawful lnterception Probe
for IP Communications
Fore more info:
Qosmos ixMachine LI Edition
Full IP traffic interception based on Virtual
has been specifically designed to meet
the technological challenges of Lawful
lntercept all target traffic from a physical
lnterception with support for increasingly
access point (IP address, IMSI, etc.)
complex communication protocols.
ldentify targets across all their virtual
Versatile: Accurately identify targets across all
lnternet applications, virtual IDs, and physical
Track target across applications, virtual IDs
identifiers (e.g. a Webmail login or an email
Laser Sharp: Identify targets and intercept
Email Interception (ETSI TS 102232-2)
flows based on real-time parsing of the complex
Intercept entire SMTP session or a specific
grammar of network flows.
email within an SMTP session
Standards - compliant: Compliant with ETSl
Set triggers on any emailing identifier: sender
address, receiver address, login etc
standard for the HI2 and H13 interfaces.
Beyond standards: Intercept emails within an
SMTP session; intercept Webmails, IM and non-standard communication channels; intercept
Qosmos ixM L1 Edition
has been designed to
in terface seamlessly
SSH Remote Access
across multiple applications, physical locations,
terminals and Web identities.
Fits your LI solutions: Passive probe designed
for seamless integration with mediation device
and management systems.
VolP interception (ETSI TS 102232-5)
lntercept VolP traffic
Set triggers on any SIP identifier: IMSi, etc.
Full IP traffic intercept based on
authentication data (ETSI TS 102232-3)
Non-standard service interception
lntercept all IP traffic for a given target
lntercept traffic of IP services such as IM,
Set triggers on DHCP, Radius, Diameter
Set triggers on service(s) identifiers
Your Network is Information
ixMachine LI Edition
Intercept Related Information (IRI) delivery
Traffic flow parsing
Leveraging a portfolio of 4 000 traffic attributes
100% reliability of interception: no false
-far beyond traditional probes - ixMachine LI
positives. Dynamic parsing of flows according
Edition identifies and delivers in real time all
to protocol grammar (unlike static pattern
communication, service and location associated
information required to feed the HI2 interface.
Protocol and Application Tools
Protocol Plugin Library
The widest and deepest protocol and
No use of TCPIUDP ports for classification:
protocols identification based on syntactic
and semantic analysis
Correlation of flows into sessions and
The real-time parsing of each flow - whether
communication records to meet regulatory data
applicat~onknowledge on the market allows
LEASto Intercept any trafflc lncludlng the latest
Webmails or regional IP-based communications
Over 300 protocols and applications
lnstant Messaging: Skype, MSN, Gtalk, etc.
Webma~ls:Gmall, Hotmall, YahooMall, etc.
VolP: H323, SIP, MGCP, etc.
Moblle telephony: WAP, GTP, etc.
Network: TCPIIP, DNS, DHCP, Radius etc
Peer-to-Peer: eMule, BitTorrent, etc.
Others: online gaming, business appllcatlons
intercepted or not - delivers fine-grained
Detection of obfuscated and encrypted
retention requirements. Communication records
may include VolP, email, Webmail, lnstant
Messaging, file transfer, P2P and other IP-based
Triggers and ldentification
ixMachine LI Edition Probes parse traffic in real
time, identifying all traffic attributes (sender,
receiver, caller, called party, login etc.) necessary
Hardware or software probe
to pinpoint a target.
ldentification of targets with authentication
ixMachine L1 Edition
Hardware probe for intercepting traffic up to
ldentification of virtual IDs
core network speeds.
Detection of obfuscated and encrypted
protocols such as Skype, BitTorent, VPN, SSH
lnterception based on payload keywords
On the fly deciphering of encrypted protocols
Probes are configured through the HI1
ixMOS LI Edition
Qosmos firmware (including interception
such as SSL (requires that keys are provided
The Virtual ID Manager correlates the
virtual identities of a person when using IP
ixMachine LI Edition Soft Probe
communication applications (e.g. username)
Qosmos software for Linux distribution.
Protocol Watch Service
Protocol evolutions are monitored to enaole
fast response and updates t o evolving and
with the network identification (e.g. IP address).
On-demand addition of new or customtzed
This enables tracking of a target across all Web
protocol plugins to the library
identities and physical locations.
Interception of communication content
ixMachine LI Edition probe architecture enables
ixMachine LI Edition probes can be configured
interception of very large quantity of targets.
to fit the exact requirements of the LEA.
The number of rules set has no significant
lnterception of all IP traffic for a given trigger
impact on performance. The multi-gigabit
Selective interception of traffic (e.g. Email,
surveillance capacity of the ixMachine LI Edition
Webmail, lnstant Messaging, VolP, etc.)
allows users to manage millions of concurrent
Compatible with the X3 interface to feed
sessions and hundreds of thousands of rules.
by the Law Enforcement Agency)
software and OS) that can be installed on COTS
Virtual ID Manager
Protad Plugin SDK
Allows users t o create their own specific
mediation device with all communication
5 Impasse Chalabre
75017 Paris - France
Phone: +33 1 78 09 1440
Depending on LEA objectives and system
architecture, probes can intercept all the IP
traffic or specific parts of the traffic (e.g. Ernail
traffic, VolP traffic, etc).
Germantown, MD, USA
301 528 8301
Phone: +65 6396 6401
protocoi plugim and Integrate them In the IXM
content required by the H13 interface
Document Path: ["brochure514.pdf"]