Over night the US could be dead for MT.
![Crying or Very sad :cry:](./images/smilies/icon_cry.gif)
That sounds like a workable solution except. Apparently the FCC and DOJ has dicatated how to do this. They want it in a standardized format with all providers. They have decided on T1.IAS and LAES.either enable sniffer on the mikrotik box, and save all packet data to some file ... or better - just get a switch that can mirror a port to another one. the second option is better, it won't overload your router.
Here are some companies i have com across offering Third party solutions for providers:Regarding the switched end:
Switches need to be managed. This is a requirement for any access switch that connects to a user device. If unmanaged switches are used then port spanning cannot be implemented, and port-port traffic cannot be forwarded to the probe. There are unmanaged switches in the diagram.
Regarding the wireless RF end:
There are wireless routers missing from the bottom left of the diagram (not CPE, but infrastructural routers). I'll need detailed info on how they're connected. Wireless is a different kind of problem - our probe doesn't have a wirless interface. So the wireless router has to support LI, at the very least bridging. Bridging will require internal network renumbering, since the wireless network will spill over up to the primary Mikrotik router. A quick check of this companies LI/CALEA support position suggests these units may need replacement:
http://forum.mikrotik.com/viewtopic.php ... a470d3ec44
It may be possible to re-engineer this network by introducing tagged traffic port mirroring on the units. This requires a lot more info than that in the diagram, starting with vendor and software release on each device, free ports on each unit, VLAN's that have been configured on the switches, etc.
Many vendors don't implement full port mirroring - like SMC which allows mirroring of sent or received port traffic but not both - this may require replacement of the unit in such cases.
The cheapest solution for this customer may end up being the purchase of a replacement provisioning system from us.
My apologies for the number of issues and questions raised.
Is anyone else dealing with this? What are some of you other small ISP's out there in US doing about this?□ All switches - access, distribution, and core - must support complete port mirroring/port spanning
□ All routers, CMTS systems, and multilayer switches - must either support Lawful Intercept compliant Operating Systems (RFC3924 or equivalent), OR must support full transparent L2 bridging to the Orwell device (as with a bridge IRB/IEEE type configuration) and the transparently bridged end must constitute the only transit interface to other network devices (CPE gear not regarded as network devices for the purpose of interpretation of this section). Most devices in this category will support the first or second criterion.
□ All wireless devices must be in transparent bridging/AP mode, and the transparently bridged end must constitute the only transit interface to other devices. Any L3/IP assignment on a wireless unit must be for management purposes alone.
□ Smaller sites will require the OSS4 Intercept to be place within the direct traffic flow.
□ Larger sites will have OSS4 Intercept placed to allow Port replication VLAN for any subject within the site.
If I interpret this correctly, this means, the FCC considers wireless internet as an Information Service, but the Law Enforcement agencies, can determine it to be whatever they want basically, which sounds like they are saying.. yes... you need to comply with the CALEA laws.47. Nor does our interpretation of section 332 of the Communications Act and its
implementing regulations here alter either our decision in the CALEA proceeding to apply CALEA
obligations to all wireless broadband Internet access providers, including mobile wireless providers, or
our interpretations of the provisions of CALEA itself. As the Commission found, and the U.S. Court of
Appeals for the D.C. Circuit affirmed, the purposes and intent of CALEA are strikingly different than
those of the 1996 Telecommunications Act, which is embedded in the Communications Act. As the
Court noted, “CALEA--unlike the 1996 Act--is a law-enforcement statute . . . (requiring
telecommunications carriers to enable ‘the government’ to conduct electronic surveillance) . . . . The Communications Act (of which the Telecom Act is part), by contrast, was enacted ‘[f]or the purpose of
regulating interstate and foreign commerce in communication by wire and radio’ . . . . The Commission's
interpretation of CALEA reasonably differs from its interpretation of the 1996 Act, given the differences
between the two statutes.”121 Thus, our interpretation of the separate statutory provisions in section 332
of the Communications Act, whose purposes closely track those of the Telecommunications Act of 1996
and the Communications Act generally, in no way affects our determination that mobile wireless
broadband Internet access service providers are subject to the CALEA statute.122
Well, there's no longer habeas corpus here, requirement for warrants for wiretaps, etc. So yeah, it's whatever they say it is. If you're all lawyered-up you'll be fine, or at least it'll be quite a while before actual jail time or fines. Big price for complacency, now the horse is out of the barn... but I guess this is really not the place to discuss those issues.ok so after reading the latest released FCC ruling on wireless, i came across this:If I interpret this correctly, this means, the FCC considers wireless internet as an Information Service, but the Law Enforcement agencies, can determine it to be whatever they want basically, which sounds like they are saying.. yes... you need to comply with the CALEA laws.47. Nor does our interpretation of section 332 of the Communications Act and its
implementing regulations here alter either our decision in the CALEA proceeding to apply CALEA
obligations to all wireless broadband Internet access providers, including mobile wireless providers, or
our interpretations of the provisions of CALEA itself. As the Commission found, and the U.S. Court of
Appeals for the D.C. Circuit affirmed, the purposes and intent of CALEA are strikingly different than
those of the 1996 Telecommunications Act, which is embedded in the Communications Act. As the
Court noted, “CALEA--unlike the 1996 Act--is a law-enforcement statute . . . (requiring
telecommunications carriers to enable ‘the government’ to conduct electronic surveillance) . . . . The Communications Act (of which the Telecom Act is part), by contrast, was enacted ‘[f]or the purpose of
regulating interstate and foreign commerce in communication by wire and radio’ . . . . The Commission's
interpretation of CALEA reasonably differs from its interpretation of the 1996 Act, given the differences
between the two statutes.”121 Thus, our interpretation of the separate statutory provisions in section 332
of the Communications Act, whose purposes closely track those of the Telecommunications Act of 1996
and the Communications Act generally, in no way affects our determination that mobile wireless
broadband Internet access service providers are subject to the CALEA statute.122