Lawful intercept

The lawful intercept (LI) solution is implemented on the cMAG-c and on the user plane (UP). The cMAG-c and the UP share a private key to allow decryption of LI PFCP IEs. This topic describes the LI implementation, the content of LI notifications, and how to configure LI on the cMAG-c.

LI is a legally sanctioned, official access to private communications. To provide intercepted private communications to law enforcement officials, a service provider or network operator collects communication of a private subscriber or organization using an LI security process.

LI typically consists of the following interfaces, irrespective of the access technology:

  • administrative interface – supports LI target provisioning
  • information-related interface – provides event information related to subscribers
  • contents-of-communications interface – sends mirrored packets to the LI gateway (LIG)

The Nokia CUPS architecture supports administrative and information-related interfaces on the cMAG-c and the contents-of-communication interface on each MAG-u.

The cMAG-c provides a centralized location to provision all LI targets, and instructs the UP to perform LI for specific target subscribers by sending encrypted LI PFCP IEs through the Sx interface. The cMAG-c and the UP share a private key to allow decryption of LI PFCP IEs.

To allow the LI target to remain anonymous, every subscriber PFCP session includes encrypted LI PFCP IEs.

LI solution for wireline application

Understand the tools to use and guidelines to follow when configuring cMAG-c LI for wireline applications.

For wireline (BNG) applications, the following criteria apply for the cMAG-c LI:

  • Perform all target provisioning for LI on the cMAG-c through SSH CLI.
  • The cMAG-c sends log events related to LI targets on syslog.
  • Each MAG-u can be configured to send mirrored traffic according to the mirror destination type: SAP, SDP, or IP-UDP SHIM.
Use the following command on the cMAG-c to configure LI targets.
lawful-intercept targets

For wireline subscribers, use the following command to configure the target source. The name (ID) must match the subscriber ID returned from RADIUS, which is VSA Alc-Subsc-ID-Str [11].

lawful-interface targets subscriber

Other parameters including the intercept direction, mirror-instance-name on the UP, intercept ID, and session ID can also be configured.