Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


SNMP Traps for Subscriber Secure Policy LAES Compliance

Table 1 describes the SNMPv3 traps that subscriber secure policy mirroring uses to provide information that maps to messages defined in the Lawfully Authorized Electronic Surveillance (LAES) for IP Network Access, American National Standard for Telecommunications. These messages enable subscriber secure policy to comply with the Communications Assistance for Law Enforcement Act (CALEA). The Juniper Packet Mirroring MIB, jnx-js-packet-mirror.mib, provides the SNMP trap.

Table 1: Subscriber Secure Policy SNMPv3 Traps for LAES Messages

SNMPv3 Trap

LAES Message



  • access-attempt (implied)

  • access-session-accept

  • packet-data-session-start

A subscriber, who is identified to have a mirrored service that is activated at login, has successfully logged in.


  • access-attempt (implied)

  • access-failed (all termination reasons except authentication-reject)

  • access-reject (termination reason is authentication-reject)

A subscriber, who is identified to have a mirrored service that is activated at login, has failed to log in.


  • access-session-end

  • packet-data-session-end

A subscriber, who had an active mirrored service, has logged out.


  • packet-data-session-already-established

A mirrored session has been activated.


A mirrored session for a subscriber has failed.


A mirrored session for an established subscriber has been deactivated.


A mirrored service request failed due to an invalid value in the request.

Note: This trap is not related to LAES messages.


The type of trigger that caused the mirroring session to be activated.


The calling station ID of the subscriber whose traffic is currently being mirrored.


The NAS ID of the session in which traffic is being mirrored.


The IPv6 address of the subscriber interface that is being mirrored.