Cisco 7600 Lawful Intercept Configuration Guide
Downloads: This chapterpdf (PDF - 331.0 KB) The complete bookPDF (PDF - 1.0 MB) | Feedback


Table Of Contents


Changes to This Document



Document Conventions

Obtaining Documentation, Obtaining Support, and Security Guidelines


This guide describes the implementation of the Lawful Intercept feature on Cisco 7600 series routers.

Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform electronic surveillance on an individual as authorized by a court order. To assist in the surveillance, the service provider intercepts the target's traffic as it passes through one of their routers, and sends a copy of the intercepted traffic to the LEA without the target's knowledge.

Changes to This Document

Table 1 lists the technical changes made to this document.

Table 1 Changes to This Document

Cisco IOS Release
Part Number
Change Summary

Release 15.1(3)S4


August 2012

Effective with this release, in RP based LI, taps on the same stream with different port range is accepted.

Release 12.2SRC


December 2007

Added information about the per-VRF lawful intercept feature and its usage guidelines, and SIP-400-accelerated lawful intercept.

Release 12.2SRB


February 2007

Initial release


This guide is intended for system administrators who must configure the router to support lawful intercept. This guide may also be useful for application developers who are developing management applications for use with lawful intercept.


This guide contains the following chapters:

Chapter 1 "Lawful Intercept Overview," provides background information about lawful intercept and its implementation. It also describes the CISCO-TAP2-MIB and CISCO-IP-TAP-MIB, which are used for lawful intercept. A Management Information Base (MIB) enables the router to be controlled through the Simple Network Management Protocol (SNMP).

Chapter 2 "Configuring Lawful Intercept Support," provides instructions for configuring the router to support lawful intercept.

Document Conventions

In this guide, command descriptions use these conventions:

boldface font

Commands, user entry, and keywords appear in bold.

italic font

Arguments for which you supply values and new terms appear in italics.

[   ]

Elements in square brackets are optional.

{x | y | z}

Alternative keywords are grouped in braces and separated by vertical bars.

Examples use these conventions:

screen font

Terminal sessions and information the system displays are in screen font.

bold screen font

Information you must enter is in bold screen font.

<   >

Nonprinting characters such as passwords are in angle brackets.

[   ]

Default responses to system prompts are in square brackets.

Notes and cautions use these conventions:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: