Table Of Contents
Preface
Changes to This Document
Audience
Organization
Document Conventions
Obtaining Documentation, Obtaining Support, and Security Guidelines
Preface
This guide describes the implementation of the Lawful Intercept feature on Cisco 7600 series routers.
Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform electronic surveillance on an individual as authorized by a court order. To assist in the surveillance, the service provider intercepts the target's traffic as it passes through one of their routers, and sends a copy of the intercepted traffic to the LEA without the target's knowledge.
Changes to This Document
Table 1 lists the technical changes made to this document.
Table 1 Changes to This Document
Cisco IOS Release
|
Part Number
|
Date
|
Change Summary
|
Release 15.1(3)S4
|
OL-12352-03
|
August 2012
|
Effective with this release, in RP based LI, taps on the same stream with different port range is accepted.
|
Release 12.2SRC
|
OL-12352-02
|
December 2007
|
Added information about the per-VRF lawful intercept feature and its usage guidelines, and SIP-400-accelerated lawful intercept.
|
Release 12.2SRB
|
OL-12352-03
|
February 2007
|
Initial release
|
Audience
This guide is intended for system administrators who must configure the router to support lawful intercept. This guide may also be useful for application developers who are developing management applications for use with lawful intercept.
Organization
This guide contains the following chapters:
•
Chapter 1 "Lawful Intercept Overview," provides background information about lawful intercept and its implementation. It also describes the CISCO-TAP2-MIB and CISCO-IP-TAP-MIB, which are used for lawful intercept. A Management Information Base (MIB) enables the router to be controlled through the Simple Network Management Protocol (SNMP).
•
Chapter 2 "Configuring Lawful Intercept Support," provides instructions for configuring the router to support lawful intercept.
Document Conventions
In this guide, command descriptions use these conventions:
boldface font
|
Commands, user entry, and keywords appear in bold.
|
italic font
|
Arguments for which you supply values and new terms appear in italics.
|
[ ]
|
Elements in square brackets are optional.
|
{x | y | z}
|
Alternative keywords are grouped in braces and separated by vertical bars.
|
Examples use these conventions:
screen font
|
Terminal sessions and information the system displays are in screen font.
|
bold screen font
|
Information you must enter is in bold screen font.
|
< >
|
Nonprinting characters such as passwords are in angle brackets.
|
[ ]
|
Default responses to system prompts are in square brackets.
|
Notes and cautions use these conventions:
Note
Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.
Caution 
Means
reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html