23.0023GPPNetwork architectureRelease 17TS
The general configuration for Lawful Interception is shown in figure 5.15. The definition of the LI functional entities and interfaces is provided in TS 33.107 .
The reference configuration is only a logical representation of the entities involved in lawful interception and does not mandate separate physical entities. There is one Administration Function (ADMF) in the network. Every physical Intercepting Control Element (ICE) is linked by its own X1_1-interface to the ADMF. Consequently, every single ICE performs interception (activation, deactivation, interrogation as well as invocation) independently from other ICEs.
Figure 5.15: General Lawful Interception Architecture