SNMP secure packet mirroring traps enable you to capture and report packet mirroring information to an external device; you can then view the secure information on the remote device. The secure packet mirroring traps feature is an extension of the router’s standard SNMP implementation, and is only available to SNMPv3 users who are authorized to use packet mirroring.
You can also log mirror traps to local volatile memory for debugging purposes by enabling the SNMP secure log feature. See Capturing SNMP Secure Audit Logs for details of secure audit logging. Normal console and syslog audit logs for packet mirroring traps and packet Mirror-MIB accesses are suppressed due to security concerns.
![]() |
Note: The contents of secure logs are not preserved across a reboot. |
The mirror-enable command must be enabled to make packet mirroring-related commands, command options, and show command output visible.
![]() |
Note: You must use the CLI to configure the secure packet mirroring trap category to allow transmission of secure packet mirroring traps through the router—you cannot use SNMP to configure the secure packet mirroring trap category. However, after you have configured the secure packet mirroring trap category using the CLI, you can then use SNMP (juniPacketMirrorMIB.mi2) to enable and disable secure packet mirroring traps. |
Table 51 indicates the events that trigger secure packet-mirroring traps and lists the information sent in the trap for each event.
Table 51: Packet-Mirroring SNMP Traps
You can use the packet-mirroring traps shown in Table 52 to help support compliance with the Communications Assistance for Law Enforcement Act (CALEA), which defines electronic surveillance guidelines for telecommunications companies. For example, a third-party vendor of mediation devices might receive packet mirroring traps from the router and convert the traps to messages that comply with CALEA, such as Lawfully Authorized Electronic Surveillance (LAES) for IP Network Access, American Nation Standard For Telecommunications messages. Individual traps might map to multiple LAES messages to provide additional compliance-related information.
Table 52: Packet-Mirroring Traps for CALEA Compliance
Table 53 lists the default severity levels for packet mirroring traps. See the JUNOSe System Basics Configuration Guide for descriptions of the severity levels.
Table 53: Packet Mirroring Trap Severity Levels