vALIS: A Transition Path for Lawful Interception in Network Functions Virtualization
The Aqsacom Lawful Interception System (ALIS), Aqsacom's world-recognized LI is a mediation platform managing Lawful Interception for voice and data networks, covering PSTN, GSM, GPRS, 3G, LTE, CDMA, WCDMA, VoIP, xDSL, Satellite, E-Mail, etc. To address the industry trend towards Network Functions Virtulaization, Aqsacom now has available a version of ALIS, called vALIS, that operates over virtual machines that operate on commodity server hardware. Thus, carriers worldwide can take advantage of their server farms and virtualized computing and networking environments to operate Lawful Interception in a highly secure and scalable manner.
The vALIS platform is comprised of the following features:
- Software-based. The software is decoupled from underlying hardware infrastructure.
- Hardware agnostic. vALIS operates over common commodity hardware typically used in data centers.
- APIs for third-party software integration.
- Real-time, Proactive Failure Management. Resource utilization monitoring includes, for example, CPU, vCPU, virtual memory, virtual IO, etc., alarm correlation, and trend analyses.
- Flexible Hypervisor Support.
- Quality of Service in CPU and I/O resources. vALIS accounts for the data processing throughput requirements that LI regulations and the LEAs demand. QoS is currently being addressed within the ETSI NFV ISG and other forums.
- A wide array of Alarms and Statistics Reports. These include, for example, notification when a session is interrupted or running in a degraded condition, statistics such as the number of active interceptions in a given time interval, utilization of LI system resources, and logs for tracking of past LI events.
However, this is only a step towards true Network Functions Virtualization (NFV). Aqsacom is now working as an active player in the ETSI NFV Security Industry Specifications Group to iron out the steps and industry practices that will enable Lawful Interception to operate as a virtualized function over partially and fully virtualized networks.
The following Figure 1 illustrates the architecture of vALIS in addressing full NFV:
Figure 1. vALIS as one of many virtualized functions in an NFV environment.
Aqsacom is active in a number of initiatives to bring Lawful Interception, Data Retention, and other secure carrier-based operations to virtualized network environments. Contact Aqsacom for further information on vALIS.