Lawful intercept is the process by which law enforcement agencies conduct electronic surveillance of circuit and packet-mode communications, authorized by judicial or administrative order. Service providers worldwide are legally required to assist law enforcement agencies in conducting electronic surveillance in both circuit-switched and packet-mode networks.
Only authorized service provider personnel are permitted to process and configure lawfully authorized intercept orders. Network administrators and technicians are prohibited from obtaining knowledge of lawfully authorized intercept orders, or intercepts in progress. Error messages or program messages for intercepts installed in the router are not displayed on the console.
You must be in a user group associated with a task group that includes the proper task IDs. The command reference guides include the task IDs required for each command. If you suspect user group assignment is preventing you from using a command, contact your AAA administrator for assistance.
Lawful intercept implementation also requires that these prerequisites are met:
Cisco ASR 9000 Series Aggregation Services Router will be used as content Intercept Access Point (IAP) router in lawful interception operation.
router must be
already provisioned. For more information, see
Cisco ASR 9000 Series Aggregation Services Router
Getting Started Guide.
For the purpose of lawful intercept taps, provisioning a loopback interface has advantages over other interface types.
Understanding of SNMP Server commands in Cisco IOS XR software—Simple Network
Management Protocol, version 3 (SNMP v3), which is the basis for lawful intercept
enablement, is configured using commands described in the module SNMP Server
Cisco ASR 9000 Series Aggregation
Services Router System Management Command Reference. To implement lawful
intercept, you must understand how the SNMP server functions. For this reason,
carefully review the information described in the module Implementing SNMP in
Cisco ASR 9000 Series
Aggregation Services Router System Management Configuration Guide.
Lawful intercept must be explicitly disabled—It is automatically enabled on a
provisioned router. However, you should not disable LI if there is an active tap in
progress, because this deletes the tap.
Management plane configured to enable SNMPv3—Allows the
management plane to accept SNMP commands, so that the commands go to the interface
(preferably, a loopback) on the router. This allows the mediation device (MD) to
communicate with a physical interface.
VACM views enabled for SNMP server—View-based access control model (VACM)
views must be enabled on the router.
Provisioned MD—For detailed information, see the vendor
documentation associated with your MD. For a list of MD
equipment suppliers preferred by Cisco, see
VoIP surveillance-specific requirements
Lawful-intercept-enabled call agent—A lawful-intercept-enabled call
agent must support interfaces for communications with the MD,
for the target of interest to provide signaling information to the MD. The MD
extracts source and destination IP addresses and Real-Time Protocol (RTP)
port numbers from the Session Description Protocol (SDP) signaling information
for the target of interest. It uses these to form an SNMPv3 SET, which is sent
to the router acting as the content IAP to provision
the intercept for the target of interest.
The MD uses the CISCO-TAP2-MIB to set up communications between the
router acting as the content IAP, and the MD.
The MD uses the CISCO-IP-TAP-MIB to set up the filter for the IP addresses and port
numbers to be intercepted and derived from the SDP.
Routers to be used for calls by the target number must be provisioned
for this purpose through the MD.
The MD that has been provisioned with the target number to be intercepted.
Data session surveillance-specific requirements
Routers to be used by the data target that have been provisioned for this
purpose through the MD.
The MD that has been provisioned with the user login ID, mac address of the user
CPE device, or the DSLAM physical location ID—The IP address is the
binding that is most frequently used to identify the target in the network. However,
alternative forms of information that uniquely identify the target in the
network might be used in some network architectures. Such alternatives include
the MAC address and the acct-session-id.
The MD can be located anywhere in the network but must be reachable from the content IAP router, which is being used to intercept the target. MD should be reachable ONLY from global routing table and NOT from VRF routing table.
Restrictions for Implementing Lawful Intercept
Lawful intercept does not provide support for these features on Cisco ASR 9000 Series Router:
IPv6 multicast tapping
IPv4 multicast tapping
Per tap drop counter
IPv6 MD encapsulation
Per interface tapping
Replicating a single tap to multiple MDs
Tapping of tag packets
Tapping L2 flows
Encryption and integrity checking of replication device
Per tap drop counter support is available only for ASR9000-SIP-700 line card, and not for ethernet line cards.
Information About Lawful Intercept Implementation
Cisco lawful intercept is based on service-independent intercept (SII) architecture and SNMPv3 provisioning architecture. SNMPv3 addresses the requirements to authenticate data origin and ensure that the connection from the router to the MD is secure. This ensures that unauthorized parties cannot forge an intercept target.
Lawful intercept offers these capabilities:
Voice-over IP (VoIP) and data session intercept provisioning from the MD using SNMPv3
Delivery of intercepted VoIP and data session data to the MD
SNMPv3 lawful intercept provisioning interface
Lawful intercept MIB: CISCO-TAP2-MIB, version 2
CISCO-IP-TAP-MIB manages the Cisco intercept feature for IP and is used along with CISCO-TAP2-MIB to intercept IP traffic.
User datagram protocol (UDP) encapsulation to the MD
Replication and forwarding of intercepted packets to the MD
Voice-over IP (VoIP) call intercept, based on any rules configured for received packets.
Voice-over IP (VoIP) intercept with LI-enabled call agent
Lawful Intercept provisioning for VoIP occurs in these ways:
Security and authentication occurs because users define this through SNMPv3.
The MD provisions lawful intercept information using SNMPv3.
Network management occurs through standard MIBs.
VoIP calls are intercepted in this manner:
The MD uses configuration commands to configure the intercept on the call control entity.
The call control entity sends intercept-related information about the target to the MD.
The MD initiates call content intercept requests to the content IAP router or trunk gateway through SNMPv3.
The content IAP router or trunk gateway intercepts the call content, replicates it, and sends it to the MD in Packet Cable Electronic Surveillance UDP format. Specifically, the original packet starting at the first byte of the IP header is prefixed with a four-byte CCCID supplied by the MD in TAP2-MIB. It is then put into a UDP frame with the destination address and port of the MD.
After replicated VoIP packets are sent to the MD, the MD then forwards a copy to a law-enforcement-agency-owned collection function, using a recognized standard.
Provisioning for Data Sessions
Provisioning for data sessions occurs in a similar way to the way it does for lawful intercept for VoIP calls. (See Provisioning for VoIP Calls.)
Data are intercepted in this manner:
If a lawful intercept-enabled authentication or accounting server is not available, a sniffer device can be used to detect the presence of the target in the network.
The MD uses configuration commands to configure the intercept on the sniffer.
The sniffer device sends intercept-related information about the target to the MD.
The MD initiates communication content intercept requests to the content IAP router using SNMPv3.
The content IAP router intercepts the communication content, replicates it, and sends it to the MD in UDP format.
Intercepted data sessions are sent from the MD to the collection function of the law enforcement agency, using a supported delivery standard for lawful intercept.
Information About the MD
The MD performs these tasks:
Activates the intercept at the authorized time and removes it when the authorized time period elapses.
Periodically audits the elements in the network to ensure that:
only authorized intercepts are in place.
all authorized intercepts are in place.
Lawful Intercept Topology
This figure shows intercept access points and interfaces in a lawful
intercept topology for both voice and data interception.
Figure 1. Lawful Intercept Topology for Both Voice and Data Interception
Scale or Performance Improvement
New enhancements introduced on the Cisco ASR 9000 Series Router in terms of scalability and performance for lawful intercept are:
IPv4 lawful intercept tap limit is 1000 taps per IPv4.
IPv6 lawful intercept tap limit is 1000 taps per IPv6.
Interception rate is:
50 Mbps per network processor (NP) for ASR9000-SIP-700 line card.
100 Mbps for Gigabit Ethernet line cards.
Support upto 512 MDs.
How to Configure SNMPv3 Access for Lawful Intercept on the Cisco ASR 9000 Series Router
Perform these procedures in the order presented to configure SNMPv3 for the purpose of Lawful Intercept enablement:
All SNMP-based taps are dropped when lawful intercept is disabled.
Configuring the Inband Management Plane Protection Feature
If MPP was not earlier configured to work with another protocol, then ensure that the MPP feature is also not configured to enable the SNMP server to communicate with the mediation device for lawful interception. In such cases, MPP must be configured specifically as an inband interface to allow SNMP commands to be accepted by the router, using a specified interface or all interfaces.
Ensure this task is performed, even if you have recently migrated to Cisco IOS XR Software from Cisco IOS, and you had MPP
configured for a given protocol.
For lawful intercept, a loopback interface is often the choice for SNMP messages. If you choose this interface type, you must include it in your
inband management configuration.
RP/0//CPU0:router(config)# snmp-server view TapName ciscoTap2MIB included
Creates or modifies a view record and includes the CISCO-TAP2-MIB family in the view. The SNMP management objects in the CISCO-TAP2-MIB that controls lawful intercepts
are included. This MIB is used by the mediation device to configure and run lawful intercepts on targets sending traffic through the router.
RP/0//CPU0:router(config)# snmp-server view TapName ciscoUserConnectionTapMIB included
Creates or modifies a view record and includes the CISCO-USER-CONNECTION-TAP-MIB family, to manage the Cisco intercept feature for user connections. This MIB is used along with the CISCO-TAP2-MIB to intercept and
filter user traffic.
Configuring the Inband Management Plane Protection Feature: Example
You must specifically enable management activities, either globally or on a
per-inband-port basis, using this procedure. To globally enable
inbound MPP, use the keyword all with the
interface command, rather than use a particular
interface type and instance ID with it.
Cisco Architecture for Lawful Intercept in IP Networks
The Cisco Technical Support website contains thousands of pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access more content.