Subscriber Secure Policy Traffic Mirroring Architecture
This topic describes the subscriber secure policy architecture and includes a description of how mirrored traffic flows within the subscriber secure policy environment.
Figure 4 illustrates the RADIUS-initiated subscriber secure policy mirroring environment (in DTCP-initiated mirroring, the DTCP client performs the mirroring-related operations shown for the RADIUS server in the figure).
The Juniper Networks router, functioning as an intercept access point, is the center piece of the subscriber secure policy architecture. The figure indicates the sequence of events that are performed to configure mirroring operations and the traffic flow that occurs during mirroring. The tables after the figure describe the events indicated by the figure. Table 21 describes the configuration sequence. Table 22 and Table 23 describe the sequence of events that occur during mirroring operations.
Figure 4: RADIUS-Initiated Subscriber Secure Policy Architecture

Table 21 lists the high-level steps that are required to configure the subscriber secure policy traffic mirroring environment.
Table 21: Subscriber Secure Policy Configuration Steps
Step | Description |
|---|---|
A | An authorized individual or group requests traffic mirroring. This group also ensures that the mediation device is configured to receive and analyze mirrored traffic. |
B |
|
C | The Juniper Networks router administrator configures the subscriber secure policy service on the router, including the radius-flow-tap service configuration, RADIUS or DTCP server information, and mediation device information. |
RADIUS-Initiated Traffic Mirroring Process
Table 22 shows the process for a RADIUS-initiated subscriber login mirroring operation, which is initiated when the mirrored subscriber logs in. Table 23 shows the procedure for a RADIUS-initiated in-session mirroring operation, in which the subscriber is already logged in.
Table 22: RADIUS-Initiated Mirroring at Subscriber Login
Step | Description |
|---|---|
1 | The subscriber logs in, requesting authentication by the RADIUS server. |
2 |
|
3 | The intercept access point sends the original subscriber traffic to its intended destination. |
4 | The intercept access point sends the mirrored subscriber traffic to the mediation device. |
5 | The mediation device provides information about the mirrored traffic to the requesting authority. |
Table 23: RADIUS-Initiated Mirroring for Current Subscriber
Step | Description |
|---|---|
1 | The subscriber logs in, requesting authentication by the RADIUS server. The RADIUS server authenticates the subscriber (no mirroring activity occurs). |
2 |
|
3 | The intercept access point sends the original subscriber traffic to its intended destination. |
4 | The intercept access point sends the mirrored subscriber traffic to the mediation device. |
5 | The mediation device provides information about the mirrored traffic to the requesting authority. |
DTCP-Initiated Traffic Mirroring Process
Table 24 shows the process for a DTCP-initiated mirroring operation.
Table 24: DTCP-Initiated Traffic Mirroring
Step | Description |
|---|---|
1 |
|
2 | The intercept access point sends the original subscriber traffic to its intended destination. |
3 | The intercept access point sends the mirrored subscriber traffic to the mediation device. |
4 | The mediation device provides information about the mirrored traffic to the requesting authority. |
Hide Navigation Pane
Show Navigation Pane
Download
SHA1