- Cable ARP Filtering
- Cable Monitor and Intercept Features for the Cisco CMTS Routers
- Cable Duplicate MAC Address Reject for the Cisco CMTS Router
- DOCSIS 3.0 CRL and OCSP on the Cisco CMTS Routers
- Dynamic Shared Secret for the Cisco CMTS Routers
- Cable DHCP Leasequery
- Service Independent Intercept on the Cisco CMTS Routers
- Subscriber Management Packet Filtering Extension for DOCSIS 2.0
- Prerequisites for the Cable Monitor and Intercept Features on the Cisco CMTS Routers
- Restrictions for Cable Monitor and Intercept
- Information About Cable Monitor and Intercept
- How to Configure Cable Intercept and Monitoring Features
- Monitoring the Cable Intercept and Monitor Features
- Configuration Examples
Cable Monitor and
Intercept Features for the Cisco CMTS Routers
First Published: February 14, 2008
Last Updated: December 02, 2012
![]() Note | Cisco IOS Release 12.2(33)SCA integrates support for this feature on the Cisco CMTS routers. This feature is also supported in Cisco IOS Release 12.3BC, and this document contains information that references many legacy documents related to Cisco IOS 12.3BC. In general, any references to Cisco IOS Release 12.3BC also apply to Cisco IOS Release 12.2SC. |
The Cable Monitor and Intercept features for Cisco Cable Modem Termination System (CMTS) routers provide a software solution for monitoring and intercepting traffic coming from a cable network. These features give service providers Lawful Intercept capabilities, such as those required by the Communications Assistance for Law Enforcement Act (CALEA).
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/. An account on http://www.cisco.com/ is not required.
Contents
- Prerequisites for the Cable Monitor and Intercept Features on the Cisco CMTS Routers
- Restrictions for Cable Monitor and Intercept
- Information About Cable Monitor and Intercept
- How to Configure Cable Intercept and Monitoring Features
- Monitoring the Cable Intercept and Monitor Features
- Configuration Examples
- Additional References
- Feature Information for Cable Monitor and Intercept Features for the Cisco CMTS Routers
Prerequisites for the Cable Monitor and Intercept Features on the Cisco CMTS Routers
The Cable Monitor and Intercept Features for the Cisco CMTS Routers is supported on the Cisco CMTS routers in Cisco IOS Release 12.3BC and 12.2SC.
![]() Note | The cable monitor and intercept features began support in Cisco IOS Releases prior to 12.2BC; however, several of these releases and hardware have since reached End-of-Life (EOL) and therefore we are showing only some of the latest Cisco IOS software release trains in this hardware compatibility table. For more information about the complete feature history, see the Feature Information for Cable Monitor and Intercept Features for the Cisco CMTS Routers. |
![]() Note | The hardware components introduced in a given Cisco IOS Release will be supported in all subsequent releases unless otherwise specified. |
CMTS Platform |
Processor Engine |
Cable Interface Cards |
---|---|---|
Cisco uBR10012 Universal Broadband Router |
Cisco IOS Release 12.2(33)SCA and later Cisco IOS Release 12.2(33)SCB and later Cisco IOS Release 12.2(33)SCH and later
|
Cisco IOS Release 12.2(33)SCA and later
Cisco IOS Release 12.2(33)SCC and later
Cisco IOS Release 12.2(33)SCE and later
|
Cisco uBR7246VXR Universal Broadband Router |
Cisco IOS Release 12.2(33)SCA and later
Cisco IOS Release 12.2(33)SCB and later
|
Cisco IOS Release 12.2(33)SCA and later
Cisco IOS Release 12.2(33)SCD and later
|
Cisco uBR7225VXR Universal Broadband Router |
Cisco IOS Release 12.2(33)SCA and later
Cisco IOS Release 12.2(33)SCB and later
|
Cisco IOS Release 12.2(33)SCA and later
Cisco IOS Release 12.2(33)SCD and later
|
Restrictions for Cable Monitor and Intercept
- The cable intercept command by itself does not fulfill the PacketCable requirements for Lawful Intercept capability. To meet these requirements, PacketCable operations must also be enabled and configured on the Cisco CMTS router (see the documents in the Additional References for instructions on enabling PacketCable).
-
For Cisco uBR10012 routers, starting from Cisco IOS Release 12.2(33)SCC, the cable intercept command is configured only under bundle interface and for Cisco uBR7200 series routers, cable intercept is allowed in Cable interface, however it is recommended to configure in Bundle interface.
Note
Starting from Cisco IOS Release 12.2(33)SCH, the cable intercept command is not allowed to configure in Cable Interface, both in Cisco uBR7200 series and Cisco uBR10012 routers. - The WAN interface on which packets are forwarded when using the cable monitor command should be used exclusively by the LAN analyzer. This interface must be an Ethernet, Fast Ethernet, Gigabit Ethernet or Ten Gigabit Ethernet interface.
- Intercepted data from the cable intercept command is sent to a user-specified User Datagram Port (UDP) at a user-specified IP address. The data collector at that IP address must have exclusive use of the specified UDP port.
- The interception of customer traffic is governed by local laws and the service level agreements (SLA) with those customers. Consult the proper legal authorities before intercepting and monitoring third-party traffic. Also see the documents on CALEA and Lawful Intercept in the Additional References.
- The Cable Monitor and Intercept feature does not support monitoring of upstream traffic if upstream channel bonding is configured on a cable interface line card.
- The Cable Monitor feature does not function correctly after a cable line card switchover. To recover from this change in functionality, re-apply the cable monitor command.
- The cable monitor outbound downstream command can be enabled:
- The Cable intercept feature is used to implement lawful intercept to monitor specific data or traffic streams. It is not a management tool. The information related to changes in modem states or CPE states, like DHCP information, cannot be intercepted by cable intercept feature.
Information About Cable Monitor and Intercept
Cisco CMTS routers support the following two complementary commands to intercept traffic being sent or received over a cable interface:
- cable intercept—Forwards copies of the traffic to and from a specific MAC address to a server at a specific IP address and UDP port. This command can be used to respond to CALEA requests from law enforcement for traffic concerning a specific user.
- cable monitor—Forwards copies of selected packets on the cable interface to an external LAN analyzer attached to another interface on the Cisco CMTS router. This command can help in troubleshooting network and application problems.
See the following sections for more information about these commands.
![]() Note | These commands do not monitor or intercept traffic for the purpose of preventing denial-of-service attacks and other types of network attacks. With both of these commands, the traffic continues on to its original destination, and only copies of the selected packets are forwarded to the CALEA server or LAN analyzer. |
- Service Independent Intercept (SII), a superset of the existing Packet Intercept (PI) feature, is one of several systems for law enforcement to monitor traffic on the Cisco CMTS. SII differs from other systems in its ability to monitor both non-voice as well as voice traffic. Whereas the current PI feature supports the interception of UDP packets only, SII supports the interception of any legal IP protocol. In addition, because SII uses SNMP (specifically SNMPv3), its use can be hidden from other users of the CMTS.
SII requires two devices: an interception device with which to intercept monitored traffic, and a mediation device (MD) that filters and reads the intercepted traffic. Here the interception device is the Cisco CMTS, and the MD is an SNMP management workstation.
- Overview of the cable intercept Command
- Overview of the Cable Monitor Command
- Overview of CISCO-TAP-MIB
- Benefits
Overview of the cable intercept Command
The cable intercept command forwards all traffic to and from a particular MAC address on a specific cable interface to a data collection server at a particular IP address and User Datagram Protocol (UDP) port. This command examines the source and destination MAC addresses of each Ethernet frame that is transmitted over the selected cable interface, and when a match is found, a copy of the frame is encapsulated within a UDP packet and forwarded to the specified server.
![]() Note | The MAC address being intercepted is typically the MAC address of a user’s CPE device (PC, Voice-over-IP phone, or so forth), not the MAC address of the cable modem. |
This command can be used to comply with the United States Federal Communications Assistance for Law Enforcement Act (CALEA) and other Lawful Intercept requirements for voice communications. For specifics on CALEA Lawful Intercept, see the PacketCable Electronic Surveillance Specification , as listed in the Additional References.
This command requires that the law enforcement agency (LEA) provide a server at the specified IP address with an application that monitors the given UDP port and collects all of the data sent to that port. The choice of this application is up to the LEA. Although this application could be as simple as a packet sniffer, typically the LEA would desire a more complex application that could reconstruct the user’s original data or voice traffic.
![]() Note | Before Cisco IOS Release 12.1(11b)EC, the destination server had to be within two network hops of the Cisco CMTS router. This restriction was removed in Cisco IOS Release 12.1(11b)EC, 12.2(4)BC1, and all later releases. |
![]() Note | Starting from Cisco IOS Release 12.2(33)SCC, the cable intercept command is configured under bundle interface. |
Overview of the Cable Monitor Command
The cable monitor command sends copies of packets for specific types of traffic that is sent over a particular cable interface to a LAN analyzer, for use in troubleshooting network problems. This command can select packets to be forwarded using one or more of the following parameters:
-
Either incoming or outbound packets
-
Packets that match an IP access list
-
Packets that match a specific MAC address (source and destination)
-
Packets with a specific Service ID (SID)
-
When monitoring a specific SID, select only specific DOCSIS MAC-layer packet types (dynamic service packets, MAP grant packets, and MAP request packets)
In addition, the cable monitor command can forward full DOCSIS packets, or it can strip the DOCSIS headers and forward only the Ethernet frames. Packets can also be timestamped to aid in troubleshooting. The packets are then forwarded out of the specified Ethernet or Fast Ethernet port to the LAN analyzer for additional analysis.
The figure below illustrates a LAN packet analyzer attached to a Fast Ethernet port in a DOCSIS two-way configuration.

![]() Note | The WAN port used for cable monitoring should be exclusively used by the LAN packet analyzer. |
![]() Tip | When you are using the cable monitor command, and are including the DOCSIS header along with the Ethernet frame, it is possible that the total size of the forwarded packet could exceed the maximum allowable size for an Ethernet frame (1500 bytes), if the original Ethernet frame is at or near 1500 bytes. This is because the cable monitor command adds the DOCSIS header to the existing Ethernet frame. If this happens, the console displays a system message similar to the following: %LINK-4-TOOBIG:Interface Ethernet2/0, Output packet size of 1518 bytes too big This error message is typically accompanied by a traceback display. Both the error message and traceback are informational only and can be ignored. They do not indicate a traffic flow problem with the cable modem being monitored. |
![]() Note | All cable modems may be captured while specifying the MAC address for a single cable modem for packets received on the upstream (incoming) and transmitted on the downstream (outbound). This issue occurs while executing the cable monitor interface mac address command and the MAC address of a cable modem is specified. |
Overview of CISCO-TAP-MIB
There is no user-accessible CLI to support the SII feature. All interaction is implemented by means of SNMPv3, and all configurations, both for taps (SII intercepts) as well as the mediation device, are implemented by means of the CISCO-TAP-MIB.
![]() Note | At the time of publication, the Cisco IOS 12.3 BC release train does not support virtual private networks with the SII feature. The CISCO-TAP-MIB does not specify any particular VPN, so this MIB is not assigned to a particular instance of VPN routing/forwarding (VRF). |
Table 1 lists the objects in the MIB, as well as restrictions for the Cisco uBR10012 CMTS other than those listed in the MIB itself.
Object |
Restrictions for Cisco uBR10012 |
---|---|
cTapMediationDestAddressType |
Only IPv4 is supported (ITD restriction) |
cTapMediationDestAddress |
|
cTapMediationDestPort |
|
cTapMediationSrcInterface |
|
cTapMediationRtcpPort |
Not supported (ITD restriction3) |
cTapMediationDscp |
|
cTapMediationDataType |
|
cTapMediationRetransmitType |
Not supported (ITD restriction) |
cTapMediationTimeout |
|
cTapMediationTransport |
UDP only (ITD restriction) |
cTapMediationNotificationEnable |
|
cTapMediationStatus |
|
cTapMediationCapabilities |
|
|
|
cTapStreamCapabilities |
|
cTapStreamIpInterface |
Only if interface is cable |
cTapStreamIpAddrType |
IPv4 only |
cTapStreamIpDestinationAddress |
|
cTapStreamIpDestinationLength |
Must be 32 (no subnets) |
cTapStreamIpSourceAddress |
|
cTapStreamIpSourceLength |
|
cTapStreamIpTosByte |
|
cTapStreamIpTosByteMask |
|
cTapStreamIpFlowId |
Not supported (IPv6 only) |
cTapStreamIpProtocol |
|
cTapStreamIpDestL4PortMin |
Must match ...DestL4PortMax, or zero |
cTapStreamIpDestL4PortMax |
Must match ...DestL4PortMin, or 65535 |
cTapStreamIpSourceL4PortMin |
Must match ...SourceL4PortMin, or zero |
cTapStreamIpSourceL4PortMax |
Must match ...SourceL4PortMax, or 65535 |
cTapStreamIpInterceptEnable |
|
cTapStreamIpInterceptedPackets |
|
cTapStreamIpInterceptDrops |
|
cTapStreamIpStatus |
|
Benefits
The cable intercept command helps the CMTS or network administrator to:
- Comply with CALEA requirements for Lawful Intercept.
- Comply with PacketCable requirements for electronic surveillance.
Monitoring upstream and downstream data packets with the cable monitor command helps the CMTS or network administrator to:
- Manage network variables and understand network issues that affect application performance and functionality.
- Resolve interoperability problems.
SII, with SNMPv3, helps the CMTS or network administrator, in conjunction with law enforcement, to:
- Monitor both voice and non-voice traffic, unlike with PI.
- Hide the use of SII from other users of the Cisco CMTS.
How to Configure Cable Intercept and Monitoring Features
Configuring the Cable Intercept Feature
To enable the cable intercept feature on a particular cable interface, use the following procedure, starting in privileged EXEC mode.
![]() Note | For Cisco uBR10012 router, a maximum of 4095 MAC intercepts can be configured. This includes the MAC intercepts configured using the cable intercept command, and other lawful intercept features (such as SII). The bandwidth used by each MAC intercept is also a deciding factor for the number of MAC intercepts that can be configured. High bandwidth usage by a MAC intercept might reduce the number of MAC intercepts that can be configured. |
Configuring the Cable Monitor Feature
To enable the cable traffic monitoring feature on a particular cable interface, use the following procedure, starting in privileged EXEC mode.
![]() Note | When using ACLs with cable monitor and the Cisco uBR10012 router, combine multiple ACLs into one ACL, and then configure cable monitor with the consolidated ACL. |
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 | enable
Example: Router> enable Example: Router# |
Enables privileged EXEC mode. Enter your password if prompted. | ||
Step 2 | configure
terminal
Example: Router# configure terminal Example: Router(config)# |
Enters global configuration mode. | ||
Step 3 | interface
cable
x/y
Example: Router(config)# interface cable 4/0 Example: Router(config-if)# |
Enters cable interface configuration mode for the specified cable interface. | ||
Step 4 | cable
monitor
incoming |
outbound]
[timestamp]
interface
interface
access-list
name |
number} |
mac-address
address |
sid
sid-number
[packet-type
{data
docsis |
data
ethernet |
mac
[type
type ]}]
Example: Router(config-if)# cable monitor interface e1/2 mac-address 0123.4567.89ab packet-type data docsis Example: Router(config-if)# |
Enables cable monitoring on the cable interface with the following parameters:
Identify the packets to be monitored with one of the following:
You can configure the types of packets to be forwarded with the following options:
| ||
Step 5 | end
Example: Router(config)# end Example: Router# |
Exits global configuration mode. |
Monitoring the Cable Intercept and Monitor Features
To display information about the operation of the cable intercept and cable monitor commands, use the following procedures:
Displaying Information About Intercepted Traffic
To display information about what traffic is being forwarded by the cable intercept command, use the show interface cable intercept command:
Router# show interface c6/0 intercept Destination Destination MAC Address IP Address UDP Port 00C0.0102.0DEF 10.10.10.131 7512
Effective with Cisco IOS Release 12.2(33)SCC, to display information about what traffic is being forwarded by the cable intercept command, use the show interface bundle intercept command:
Router# show interfaces bundle 1 intercept MAC-based intercepts: Source Server Server MAC Address IP Address UDP Port 000c.0102.0304 10.10.10.45 8132
Displaying Information About Monitored Traffic
![]() Note | Effective with Cisco IOS Release 12.2(33)SCA the show interface cable monitor command is replaced by the show interface cable cable-monitor command. |
To display information about what traffic is being sent to the external LAN analyzer by the cable monitor command, use the show interface cable monitor command:
Router# show interface cable 1/0 monitor US/ Time Outbound Flow Flow Type Flow Packet MAC MAC Encap DS Stmp Interface Type Identifier Extn. Type Extn. Type Type all yes Et1/0 mac-addr 0050.5462.008c yes data no - Ethernet us yes Et1/0 acc-list 300 no - no - - us no Et1/0 sid 2 yes mac yes map-grant - all no Et1/0 acc-list rrr no - no - - all no Et1/0 mac-addr 0042.b013.008c yes data no - Ethernet all no Et1/0 upstream 0 yes data no - docsis The following is sample output from the show interface cable cable-monitor command:
Starting with Cisco IOS Release 12.2(33)SCA and later, use the show interface cable cable-monitor command to display information about what traffic is being sent to the external LAN analyzer:
Router# show interface cable 5/0 cable-monitor US/ Time Outbound Flow Flow Type Flow Packet MAC MAC Encap DS Stmp Interface Type Identifier Extn. Type Extn. Type Type us no Et1/2 us-port 0 yes data no - docsis all no Et1/2 acc-list 103 yes data no - docsis all yes Et1/2 mac-addr 0050.0000.0000 yes mac no - -
Configuration Examples
The following examples illustrate sample configurations of the cableintercept and cablemonitor commands and features on the Cisco CMTS:
Example: Cable Intercept Configuration
The following sample configuration shows traffic to and from MAC address 0003.e3fa.5e11 being forwarded to a data collection server at the IP address 172.18.73.189 and UDP port 9999:
! interface cable 1/0 cable monitor timestamp int fe0/0 mac-address 0002.b9ff.8c00 packet-type data ethernet ...
Effective from Cisco IOS Release 12.2(33)SCC, the following is the sample configuration showing traffic to and from MAC address 0003.e3fa.5e11 being forwarded to a data collection server at the IP address 172.18.73.189 and UDP port 9999:
! interface bundle 1 cable intercept 0003.e3fa.5e11 172.18.73.189 9999 ...
Cable Monitor Examples
This section contains the following examples that illustrate the Cable Monitor feature on the Cisco CMTS:
- Cable Monitor Configuration Example (MAC Address)
- Configuration Example for Ethernet, MAC-Layer, and DOCSIS-Data Packets
- Cable Monitor DOCSIS Data Packets Example
- Cable Monitor Timestamped Packets Example
Cable Monitor Configuration Example (MAC Address)
The following example of the cable monitor command on a Cisco uBR7114 router monitors packets with the MAC address of 0002.b9ff.8c00. Both upstream and downstream packets are forwarded to a LAN analyzer on the router’s Fast Ethernet interface (FE0/0).
! interface cable 1/0 cable monitor timestamp int fe0/0 mac-address 0002.b9ff.8c00 packet-type data ethernet ...
Configuration Example for Ethernet, MAC-Layer, and DOCSIS-Data Packets
The following example of the cable monitor command monitors Ethernet, MAC-layer, and DOCSIS-data packets with the MAC address of 0003.e3fa.5e8f, adding a timestamp to the packets before forwarding them to the LAN analyzer.
! interface Cable 3/0 ip address 10.100.100.1 255.255.255.0 cable monitor timestamp int e2/0 mac-address 0003.e3fa.5e8f packet-type data ethernet cable monitor timestamp int e2/0 mac-address 0003.e3fa.5e8f packet-type mac cable monitor timestamp int e2/0 mac-address 0003.e3fa.5e8f packet-type data docsis ...
Cable Monitor DOCSIS Data Packets Example
This example shows sample DOCSIS packets that have been captured by the cable monitor command and forwarded to a LAN analyzer. The hexadecimal dump for the first packet is the following:
LLC: ----- LLC Header ----- LLC: LLC: DSAP Address = E2, DSAP IG Bit = 01 (Group Address) LLC: SSAP Address = FA, SSAP CR Bit = 00 (Command) LLC: I frame, N(R) = 71, N(S) = 47, POLL LLC: DLC: Frame padding= 43 bytes ADDR HEX ASCII 0000:c0 00 00 1c ea 1d 00 03 fe e1 a0 54 00 03 e3 fa | ...........T.... 0010:5e 8f 00 0a 00 00 03 01 04 00 00 03 00 00 00 8a | ^............... 0020:4d 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | Mn.............. 0030:00 00 00 00 00 00 00 00 00 00 00 00 | ............
The relevant DOCSIS bytes are the following:
- Byte 0x16—Control Field. A value of 03 indicates an unnumbered information frame.
- Byte 0x17—Version of the MAC management protocol. A value of 1 indicates a DOCSIS 1.0 message and a value of 2 indicates DOCSIS 1.1 message.
- Byte 0x18—MAC message type. In this example, a value of 04 indicates a Ranging Request (RNG-REQ) message.
The hexadecimal dump of the next packet is the following:
LLC: ----- LLC Header ----- LLC: LLC: DSAP Address = FE, DSAP IG Bit = 00 (Individual Address ) LLC: SSAP Address = E0, SSAP CR Bit = 01 (Response ) LLC: I frame, N(R) = 42, N(S) = 80 LLC: DLC: Frame padding= 43 bytes ADDR HEX ASCII 0000:c2 00 00 2b 00 00 00 03 e3 fa 5e 8f 00 03 fe e1 | ...+......^..... 0010:a0 54 00 19 00 00 03 01 05 00 00 03 01 01 04 00 | .T.............. 0020:00 00 00 02 01 00 03 02 00 00 05 01 03 00 8a 4d | ...............M 0030:6e 00 00 00 00 00 00 00 00 00 00 00 | n...........
This packet has a MAC message type of 05, indicating a Ranging Response (RNG-RSP) message.
![]() Note | For complete information on the DOCSIS MAC packet format, see Chapter 6 in the DOCSIS 1.1 specification (see the Additional References). |
Cable Monitor Timestamped Packets Example
The following example shows how to interpret the four-byte timestamp that is appended to packets that are forwarded by the cable monitor command when using the timestamp option. The following hexadecimal dump shows the 64-byte contents of the first MAP message packet being examined:
0000(0000): C3 02003A 00000000 01E02F00 0001 0008...:....../..... 0010(0016): 0D6F4670 00260000 03010300 01380400 .oFp.&.......8.. 0020(0032): 0061A1C1 0061A07C 00030004 FFFC4000 .a...a.|......@. 0030(0048): 0189401F FFFC4042 0001C043 007EF4EA ..@...@B...C.~..
The relevant portions of this packet are the following:
- Byte 0—C3 indicates a MAP management message.
- Bytes 08 to 0D—Multicast address that is used to address cable modem when transmitting allocation MAP protocol data units (PDUs).
- Bytes 3C to 3F—Timestamp from the cable monitor command in hexadecimal (0x007EF4EA). This value is a 32-bit counter that is incremented every 10 milliseconds.
The following hexadecimal dump shows the second MAP message being forwarded:
0000(0000): C302003A 00000000 01E02F00 00010008 ...:....../..... 0010(0016): 0D6F4670 00260000 03010300 01380400 .oFp.&.......8.. 0020(0032): 0061A5AE 0061A469 00030004 FFFC4000 .a...a.i......@. 0030(0048): 0189401A FFFC403D 0001C03E 007EF4EF ..@...@=...>.~..
In this example, the timestamp is 0x007EF4EF. Subtracting the two timestamps (0x007EF4EF–0x007EF4EA) produces the time difference between the two MAP messages in hundredths of a second (which in this case is a difference of 5, for a total time difference of 50 milliseconds).
Additional References
The following sections provide references related to the Cisco CMTS routers.
Related Documents
Related Topic |
Document Title |
||
---|---|---|---|
CMTS commands |
Cisco IOS CMTS Cable Command Reference http://www.cisco.com/en/US/docs/ios/cable/command/reference/cbl_book.html |
||
Common Open Policy Service (COPS) |
COPS Engine Operation on the Cisco CMTS Routers |
||
PacketCable configuration |
PacketCable and PacketCable Multimedia for the Cisco CMTS Routers |
||
Using the LAN analyzer |
See the documentation for the LAN analyzer or other network interception software you are using for instructions on decoding DOCSIS MAC frames.
|
||
CALEA Information |
See the Communications Assistance for Law Enforcement Act (CALEA), which was passed by the United States Congress in 1994 and is now sections 1001 to 1010 of the United States Code Title 47 (Telegraphs, Telephones, and Radiotelegraphs). Also see the information on Cisco’s web site at the following URL: http://www.cisco.com/wwl/regaffairs/lawful_intercept/index.html |
||
Lawful Intercept technology information |
http://www.cisco.com/en/US/tech/tk583/tk799/tsd_technology_support_protocol_home.html http://www.cisco.com/en/US/tech/tk583/tk799/tsd_technology_support_protocol_home.html |
Standards
Standards4 |
Title |
---|---|
SP-RFIv1.1-I09-020830 |
Data-Over-Cable Service Interface Specifications Radio Frequency Interface Specification, version 1.1 |
PKT-SP-ESP-I01-991229 |
PacketCable™ Electronic Surveillance Specification |
MIBs
MIBs5 |
MIBs Link |
---|---|
CISCO-TAP-MIB |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
Description |
Link |
---|---|
No new or modified RFCs are supported by this feature. |
Technical Assistance
Description |
Link |
---|---|
Technical Assistance Center (TAC) home page, containing 30,000 pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even more content. |
Feature Information for Cable Monitor and Intercept Features for the Cisco CMTS Routers
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://tools.cisco.com/ITDIT/CFN/. An account on http://www.cisco.com/ is not required.
![]() Note | The below table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. |
Feature Name |
Releases |
Feature Information |
---|---|---|
Cable Intercept Feature |
12.0(6)SC, 12.1(2)EC |
This feature was introduced for Cisco uBR7200 series routers. The following new command was introduced: |
Cable Monitor Feature |
12.1(3a)EC |
The cable monitor command was introduced for Cisco uBR7200 series routers. |
Cable Monitor and Intercept Features |
12.1(5)EC |
Support for the cable intercept and cable monitor commands was added for the Cisco uBR7100 series routers. |
Cable Intercept Feature |
12.1(11b)EC |
The cable intercept command was enhanced to allow the data collector to be more than two hops from the Cisco CMTS router. |
Cable Monitor and Intercept Features |
12.1(4)CX |
This feature was integrated into Cisco IOS Release 12.1(4)CX. The sid option was added to the cable monitor command for DOCSIS 1.1 support. |
Cable Monitor and Intercept Features |
12.2(4)BC1 |
This feature was integrated into Cisco IOS Release 12.2(4)BC1 for the Cisco uBR7100 series, Cisco uBR7200 series, and the Cisco uBR10012 routers. However, this release does not support JIB-based cable interface line cards (such as the Cisco uBR-MC28X/U, Cisco uBR-MC16X/U, and Cisco uBR10-MC520S/U). |
Service Independent Intercept |
12.3(13a)BC |
Support for Service Independent Intercept (SII) was introduced using the CISCO-TAP-MIB for SNMPv3. Feature support for the Cisco uBR-MC28X/U, Cisco uBR-MC16X/U, and Cisco uBR10-MC5X20S/U cable interface line cards was added to Cisco uBR7200 series and Cisco uBR10012 routers. |
Cable Monitor and Intercept Features |
12.3(17a)BC |
|
Cable Monitor and Intercept Features |
12.2(33)SCA |
This feature was integrated into Cisco IOS Release 12.2(33)SCA. Support for the Cisco uBR7225VXR Universal Broadband Router was added. |