Lawful Intercept Configuration Guide
Index
Downloads: This chapterpdf (PDF - 123.0KB) The complete bookPDF (PDF - 497.0KB) | Feedback

Index

Table Of Contents

A - C - D - E - F - G - I - L - M - N - P - R - S - T - U - W -

Index

A

access, restricting MIB 2-5

access rights 2-2

access setup, example 2-6

activating lawful intercept 1-6

admin function (mediation device) 1-4, 1-6

administration, definition 1-3

C

CALEA, See Communications Assistance for Law Enforcement Act (CALEA)

CISCO-IP-TAP-MIB

citapStreamVRF 2-2

overview 1-6

restricting access to 2-5, 2-6

CISCO-TAP2-MIB

accessing 2-4

overview 1-6

restricting access to 2-5, 2-6

collection function 1-4

Communications Assistance for Law Enforcement Act

CALEA for Voice 1-2

lawful intercept 1-1

configuring

lawful intercept 2-5, 2-6, 2-7

SNMP 2-5

content IAP 1-4

cTap2MediationDebug notification 2-7

cTap2MediationNewIndex object 1-6

cTap2MediationTable 1-6

cTap2MediationTimedOut notification 2-7

cTap2MIBActive notification 2-7

cTap2StreamDebug notification 2-7

cTap2StreamTable 1-6

D

DNS, See Domain Name System

DNS, see Domain Name System

Domain Name System 2-3

E

electronic traffic, monitoring 1-4

enabling

lawful intercept 1-6

SNMP notifications 2-7

F

figure

lawful intercept overview 1-3

G

get requests 1-4, 1-6, 2-6

I

IAP

content IAP 1-4

definition 1-4

content IAP 1-4

identification IAP 1-4

types of

ID IAP 1-4

intercept access point

See IAP

intercept-related information (IRI) 1-4

intercepts, multiple 1-3, 1-4

L

Law Enforcement Agency (LEA) 1-1

lawful intercept

admin function 1-4, 1-6

collection function 1-4

configuring 2-5, 2-6, 2-7

enabling 1-6

IRI 1-4

mediation device 1-3

overview 1-1, 1-2

prerequisites 2-1

processing 1-4, 1-5

security considerations 2-2

SNMP notifications 2-7

lawful intercept processing 1-4

M

mediation device

admin function 1-4, 1-6

definition 1-3

description 1-3

MIBs

CISCO-IP-TAP-MIB 1-6, 2-2, 2-5

CISCO-TAP2-MIB 1-6, 2-4, 2-5

SNMP-COMMUNITY-MIB 2-2

SNMP-USM-MIB 1-2, 2-2

SNMP-VACM-MIB 1-2, 2-2

monitoring electronic traffic 1-4

N

notifications, See SNMP notifications

P

prerequisites for lawful intercept 2-1

R

restricting MIB access 2-5, 2-6

S

security considerations 2-2

set requests 1-4, 1-6, 2-6

setting up lawful intercept 1-4

SNMP

configuring 2-5

default view 2-2

get and set requests 1-4, 1-6, 2-6

notifications 2-2, 2-7

SNMP-COMMUNITY-MIB 2-2

SNMP-USM-MIB 1-2, 2-2

SNMP-VACM-MIB 1-2, 2-2

standards, lawful intercept 1-1

surveillance 1-4

T

traps, see SNMP notifications

U

UDP port for SNMP notifications 2-7

W

wiretaps 1-1