Table Of Contents
A - C - D - E - G - I - L - M - N - P - R - S - T - U - V - W -
Index
A
access, restricting MIB 2-8
access rights 2-2
access setup, example 2-10
activating lawful intercept 1-5
admin function (mediation device) 1-4, 1-5
C
CALEA, See Communications Assistance for Law Enforcement Act (CALEA)
CISCO-802-TAP-MIB
overview 1-5
restricting access to 2-9
CISCO-IP-TAP-MIB
citapStreamVRF 2-2
overview 1-5
restricting access to 2-9
CISCO-TAP2-MIB
accessing 2-8
overview 1-5
restricting access to 2-8, 2-9
CISCO-USER-CONNECTION-TAP-MIB
overview 1-6
restricting access to 2-9
collection function 1-3
Communications Assistance for Law Enforcement Act
CALEA for Voice 1-2
lawful intercept 1-1
configuring
lawful intercept 2-9, 2-10, 2-11
SNMP 2-8
content IAP 1-3
cTap2MediationDebug notification 2-11
cTap2MediationNewIndex object 1-5
cTap2MediationTable 1-5
cTap2MediationTimedOut notification 2-11
cTap2MIBActive notification 2-11
cTap2StreamDebug notification 2-11
cTap2StreamTable 1-5
D
DNS, see Domain Name System
Domain Name System 2-2
E
electronic traffic, monitoring 1-4
enabling
lawful intercept 1-5
SNMP notifications 2-10
G
get requests 1-4, 1-5, 2-9
I
ID IAP 1-3
intercept access point (IAP) 1-3
intercept-related information (IRI) 1-3, 1-4
intercepts
VPN traffic 2-5
intercepts, multiple 1-3
L
Law Enforcement Agency (LEA) 1-1
lawful intercept
admin function 1-4, 1-5
collection function 1-3
configuring 2-9, 2-10, 2-11
enabling 1-5
IAP 1-3
IRI 1-3
mediation device 1-3
overview 1-1, 1-2
prerequisites 2-1
processing 1-4
security considerations 2-1
SNMP notifications 2-10, 2-11
VPN-based (per-VRF) 2-5
M
mediation device
admin function 1-4, 1-5
description 1-3
MIBs
CISCO-802-TAP-MIB 1-5
CISCO-IP-TAP-MIB 1-5, 2-2, 2-9
CISCO-TAP2-MIB 1-5, 2-8, 2-9
CISCO-USER-CONNECTION-TAP-MIB 1-6
SNMP-COMMUNITY-MIB 2-2
SNMP-USM-MIB 1-2, 2-2
SNMP-VACM-MIB 1-2, 2-2
monitoring electronic traffic 1-4
N
notifications, See SNMP notifications
P
per-VRF lawful intercept 2-5
prerequisites for lawful intercept 2-1
R
restricting MIB access 2-8, 2-9
S
security considerations 2-1
set requests 1-4, 1-5, 2-9
setting up lawful intercept 1-4
SNMP
configuring 2-8
default view 2-2
get and set requests 1-4, 1-5, 2-9
notifications 2-1, 2-10
SNMP-COMMUNITY-MIB 2-2
SNMP-USM-MIB 1-2, 2-2
SNMP-VACM-MIB 1-2, 2-2
standards, lawful intercept 1-1
surveillance 1-4
T
traps, see SNMP notifications
U
UDP port for SNMP notifications 2-10
V
VPN-based lawful intercept 2-5
W
wiretaps 1-1