Using SNMP Secure Packet Mirroring Traps
SNMP secure packet mirroring traps enable you to capture and report packet mirroring information to an external device; you can then view the secure information on the remote device. The secure packet mirroring traps feature is an extension of the router’s standard SNMP implementation, and is only available to SNMPv3 users who are authorized to use packet mirroring.
You can also log mirror traps to local volatile memory for debugging purposes by enabling the SNMP secure log feature. See Capturing SNMP Secure Audit Logs for details of secure audit logging. Normal console and syslog audit logs for packet mirroring traps and packet Mirror-MIB accesses are suppressed due to security concerns.
![]() |
Note: The contents of secure logs are not preserved across a reboot. |
The mirror-enable command must be enabled to make packet mirroring-related commands, command options, and show command output visible.
![]() |
Note: You must use the CLI to configure the secure packet mirroring trap category to allow transmission of secure packet mirroring traps through the router—you cannot use SNMP to configure the secure packet mirroring trap category. However, after you have configured the secure packet mirroring trap category using the CLI, you can then use SNMP (juniPacketMirrorMIB.mi2) to enable and disable secure packet mirroring traps. |
Table 1 indicates the events that trigger secure packet-mirroring traps and lists the information sent in the trap for each event.
Table 1: Packet-Mirroring SNMP Traps
Additional Packet-Mirroring Traps for CALEA Compliance
You can use the packet-mirroring traps shown in Table 2 to help support compliance with the Communications Assistance for Law Enforcement Act (CALEA), which defines electronic surveillance guidelines for telecommunications companies. For example, a third-party vendor of mediation devices might receive packet mirroring traps from the router and convert the traps to messages that comply with CALEA, such as Lawfully Authorized Electronic Surveillance (LAES) for IP Network Access, American Nation Standard For Telecommunications messages. Individual traps might map to multiple LAES messages to provide additional compliance-related information.
Table 2: Packet-Mirroring Traps for CALEA Compliance
Packet Mirroring Trap Severity Levels
Table 3 lists the default severity levels for packet mirroring traps. See the JUNOSe System Basics Configuration Guide for descriptions of the severity levels.
Table 3: Packet Mirroring Trap Severity Levels

