Juniper Networks
Log in
|
How to Buy
|
Contact Us
|
United States (Change)
Choose Country
Close

Choose Country

North America

  • United States

Europe

  • Deutschland - Germany
  • España - Spain
  • France
  • Italia - Italy
  • Россия - Russia
  • United Kingdom

Asia Pacific

  • Asean Region (Vietnam, Indonesia, Singapore, Malaysia)
  • Australia
  • 中国 - China
  • India
  • 日本 - Japan
  • 대한민국 - Korea
  • 台灣 - Taiwan
Solutions
Products & Services
Company
Partners
Support
Education
Community
Security Intelligence Center

Technical Documentation

Support
Technical Documentation
Content Explorer New
 
Enterprise MIBs
 
EOL Documentation
 
Feature Explorer Login required New
 
File Format Help
 
Glossary
 
Portable Libraries
 
 
Home > Support > Technical Documentation > JunosE Software > CLI-Based Packet Mirroring Sequence of Events
Print
Rate and give feedback:  Feedback Received. Thank You!
Rate and give feedback: 
Close
This document helped resolve my issue.  Yes No

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:  
E-mail: 
Submitting...
 

Related Documentation

  • Enabling and Securing CLI-Based Packet Mirroring
  • Configuring CLI-Based Packet Mirroring
  • Reloading a CLI-Based Packet-Mirroring Configuration
 

CLI-Based Packet Mirroring Sequence of Events

Figure 1 shows the sequence of events that take place during CLI-based mirroring. The tables after the figure describe the events indicated by the numbers and letters in the figure. Table 1 describes the configuration process; Table 2 describes the flow of traffic during a mirroring operation that is initiated when the user logs in; and Table 3 describes the flow of traffic when mirroring a user who is already logged in or when mirroring a static interface.

Figure 1: CLI-Based Packet Mirroring

CLI-Based Packet Mirroring

To create a CLI-based packet mirroring environment, you must complete the processes listed in Table 1.

Table 1: Setting Up the CLI-Based Packet-Mirroring Environment

Process

Description

A

The authorized individual requests packet mirroring of a user’s or interface’s traffic and configures the analyzer device to receive mirrored traffic.

B

An individual who is authorized to use the packet mirroring CLI commands configures the packet mirroring environment, including the secure policy, analyzer interface connection to the analyzer device, and the interface or trigger information.

Table 2 indicates the sequence of steps for a packet-mirroring operation that takes place when a user starts a new session.

Table 2: CLI-Based User-Specific Mirroring During Session Start

Step

Description

1

The user logs in to an E Series router, requesting authentication by AAA.

2

AAA authenticates the user, and the router starts mirroring the user’s traffic.

3

The router sends the user’s original traffic to the intended destination.

4

The router sends the mirrored traffic to the analyzer device.

5

The analyzer device provides information to the requesting individual.

Table 3 indicates the sequence of steps for a packet-mirroring operation that is configured for an interface or for a user who is already logged in.

Table 3: CLI-Based Mirroring of Currently Running Session

Step

Description

1

For user-specific mirroring, the user logs in to the E Series router; no mirroring action is configured.

2

  • CLI-based packet mirroring is configured and enabled on the router.
  • For interface-specific mirroring, the router starts mirroring all traffic for the interface.
  • For user-specific mirroring, AAA verifies that the mirrored user is already logged in, then starts mirroring all subsequent traffic to or from the user.

3

The router sends the original traffic to its intended destination.

4

The router sends mirrored traffic to the analyzer device.

5

The analyzer device provides information for the requesting individual.

 

Related Documentation

  • Enabling and Securing CLI-Based Packet Mirroring
  • Configuring CLI-Based Packet Mirroring
  • Reloading a CLI-Based Packet-Mirroring Configuration
 

Published: 2012-06-21

 
  • About Juniper
  • Investor Relations
  • Press Releases
  • Newsletters
  • Juniper Offices
  • Green Networking
  • Resources
  • How to Buy
  • Partner Locator
  • Image Library
  • Visio Templates
  • Security Center
  • Community
  • Forums
  • Blogs
  • Junos Central
  • Social Media
  • Developers
  • Support
  • Technical Documentation
  • Knowledge Base (KB)
  • Software Downloads
  • Product Licensing
  • Contact Support
Site Map / RSS Feeds / Careers / Accessibility / Feedback / Privacy & Policy / Legal Notices
Copyright© 1999-2012 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out