Name: L1-M1

Text: I

' PACKET
--

FORENSIC!

Survei

implif ied.

1U MODUL

ACKMOUNI

The LI-M1 is a purpose-built surveillance platform for

ernet, IP and HPLS

Key Advantages
The LI-M1 is tail
needs in the areas of lawful intercept,

Offering the most affordable approach
to CALEA and other lawful intercept

network intelligence collection, and
communications policy enforcement.
The LI-M1 is a complete turnkey Lawful
Intercept solution fully contained in a
proprietary hardware/software platform.

requirements, the comprehensive
system is designed for flexibility and
can be enhanced to support several
other applications related to network
surveillance.

Allows for drop-rn technical
CALEA compliance
Communrcates directly with ' - ' - l
enforcement using Safe Harh,. Jandards
Provides both IAP/Probe and
L.
Mediation functions
Able to p a r wrth another LI-M1 to
deliver a vrrtual tap in another
physical location
Performs dialed digit extraction
using multiple methods
Records network traffrc with
intelligent ring buffering
Surveils networks using
deep packet inspection
Enables carrier-class performance
and stability
Exceeds standard L1 criteria
;election capabilrt~es
Jses advanced firmware-update
to support evolvrng L1 standards
Allows add-on applications to operate
on separate physical rnterfaces

..
.V$*

capability, the LI-M1 offers a flexible
bring-your-own-disk storage model.
Directly attached US6 IS a qulck and
easy method for adding storage. For
higher capacity or redundancy requirements, the LI-M1 supports managed
RAlD [RAID-O/1/10 and 501 wrth 16
eSATA [3OOMB/sl external ports for up
to 16 terabytes of RAID storage. Simply
connect directly to your existing eSATA
II complrant disk array and The LI-M1
will do the rest. Alternatively, you can
directly integrate with your existing

connecting to your storage area nehrvork
via the industry standard iSCSl pmtocal,
the LI-M1 is poised to support
even greater storage
capabilities.

dg

4

I
I

' *a

'*A

*.
I
.P"="

-

d

-

Surveittance Simplified. L I M .
- .:

-.

-

,

4 ,

'.

Value-Add Solution

LI for Specific Court Orders

Packet Forensics adds value and
reduces costs and installation challenges
by using a unified hardwarelsoftware
solution. This approach eliminates the
expense of traditional systems that
require separate lAPs and mediation
devices, and integrates these functions
into one streamlined system. This
approach also avoids back-haul of
data from edge collection probes back
inside the core to mediation and then
out again to the LEA. Management and
maintenance of the single device is also
greatly simplified to save time and
reduce steps to comply with time-critical
intercept orders.

Unlike many competitive solutions,
Packet Forensics' surveillance software
goes beyond identifying voice traffic and
gives it the special handling it deserves.
instead of delivering a data intercept
containing voice, our solution uses the
proper mediation methodology and
delivery protocol to treat voice intercepts

pper Ion-board1
bypass
rSFP1

-.

differently than data intercepts. Packet
Forensics supports pen-register,
trap-and-trace, and f u l l content voice
intercepts complete with dialed digit
extraction. This affords YOU the most
specific f o r m of compliance while
doing the best Job of upholding the
privacy of Your constituents.

Wedlatlon
Function

SSH Remote Management
LCD Display
Hardware Watchdog

RFG1tBV
Re2138
RFC2139
RE2198
RFC 2327

@p@matFeatwes
G U I f o r W T M a c 05 >
&ARAU~

RE2782

m2814
RfiEt3iBt

V
S
7
7
M%3?m
Rl?Z%%

1Gbps Line Rate*

#@

PACKET FORENSICS

PACKET FORENSICS

-

420 S. S M I T H RD.

,-

TEMPE, AZ 85281
US
--

-

+ l (8001 807-4140

-.

f ?CALEA
f

Buy. Comply. Relax.

WWW.PACKETFORENSICS.COM

-ri

%.,

Document Path: ["brochure445.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh