Chapter 30: Unified Electronic Surveillance
STANDARD Revision 1.0
C4® CMTS Release 8.3 User Guide
© 2016 ARRIS Enterprises LLC. All Rights Reserved.
884
Data Management and Maintenance
Syslog Reports
The LI feature creates a syslog report whenever a tap is created. The user ID and the interface where the change originated
(either CLI or SNMP) are displayed in this report. The identity of the subscriber (the CM MAC address) is obscured in the
syslog report for security reasons. For the SNMP interface, the trap is sent to the SNMP host and may be reported in the
external Syslog.
For example:
configure cable intercept userid JohnDoe password **********
subscriber 0015.A200.F40B enable md 192.168.180.150 udp 12345 until 01/01/2014-12:34
Tap mib is active on contentId 1 stream index | status |
PC 2.0 Lawfully Authorized Electronic Surveillance
The Packet Cable 2.0 Lawfully Authorized Electronic Surveillance (LAES) feature can be deployed in conjunction with both
PC 1.5 CALEA for legacy NCS-signaled VoIP interception and legacy Legal Intercept (LI) for High Speed Data (HSD)
interception.
There are differences between the other electronic surveillance methods, including LI and legacy CALEA. They include:
PC 2.0 LAES depends solely on the TAP-MIB interface for the MD to remotely control tap sessions at the C4/c CMTS
LI requires CLI commands to configure individual taps
TAP-MIBs are different between legacy LI and PC 2.0 LAES
LI uses CISCO-TAP-MIB to control tap sessions
LAES uses PKTC-ES-TAP-MIB and PKTC-ES-IP-TAP-MIB