Lawful Intercept Configuration Guide
Preface
Downloads: This chapterpdf (PDF - 84.0KB) The complete bookPDF (PDF - 497.0KB) | Feedback

Preface

Table Of Contents

Preface

Audience

Organization

Document Conventions

Obtaining Documentation, Obtaining Support, and Security Guidelines


Preface


This guide describes the implementation of the Lawful Intercept feature on Catalyst 6500 series switches.

Lawful intercept is a process that enables a Law Enforcement Agency (LEA) to perform electronic surveillance on an individual as authorized by a court order. To assist in the surveillance, the service provider intercepts the target's traffic as it passes through one of their routers, and sends a copy of the intercepted traffic to the LEA without the target's knowledge.

Audience

This guide is intended for system administrators who must configure the router to support lawful intercept. This guide may also be useful for application developers who are developing management applications for use with lawful intercept.

Organization

This guide contains the following chapters:

Chapter 1, "Lawful Intercept Overview," provides background information about lawful intercept and its implementation. It also describes the CISCO-TAP2-MIB and CISCO-IP-TAP-MIB, which are used for lawful intercept. A Management Information Base (MIB) enables the router to be controlled through the Simple Network Management Protocol (SNMP).

Chapter 2, "Configuring Lawful Intercept Support," provides instructions for configuring the router to support lawful intercept.

Document Conventions

In this guide, command descriptions use these conventions:

boldface font

Commands, user entry, and keywords appear in bold.

italic font

Arguments for which you supply values and new terms appear in italics.

[   ]

Elements in square brackets are optional.

{x | y | z}

Alternative keywords are grouped in braces and separated by vertical bars.


Examples use these conventions:

screen font

Terminal sessions and information the system displays are in screen font.

bold screen font

Information you must enter is in bold screen font.

<   >

Nonprinting characters such as passwords are in angle brackets.

[   ]

Default responses to system prompts are in square brackets.


Notes and cautions use these conventions:


Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.



Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Obtaining Documentation, Obtaining Support, and Security Guidelines

For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html