Cli-Based Packet Mirroring Sequence Of Events; Figure 20: Cli-Based Packet Mirroring; Table 48: Setting Up The Cli-Based Packet-Mirroring Environment - Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04 Configuration Manual

Software for e series broadband services routers policy management configuration guide
Hide thumbs Also See for JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04:
Table of Contents

Advertisement

CLI-Based Packet Mirroring Sequence of Events

Copyright © 2010, Juniper Networks, Inc.
Configure the majority of the vty lines and the console to use the authorization
2.
configuration from Step 1. (Users who use Telnet on these lines are denied access to
the mirror-enable command.)
On the remaining vty lines (without the TACACS+ authorization) create an access list
3.
that contains the IP addresses of the users that you want to grant access to these vty
lines—these users are granted access to the mirror-enable command, and therefore,
the packet-mirroring feature.
This configuration grants access to the packet mirroring CLI commands to the users from
the specified IP addresses. The packet mirroring commands remain hidden for all other
users.
Figure 20 on page 223 shows the sequence of events that take place during CLI-based
mirroring. The tables after the figure describe the events indicated by the numbers and
letters in the figure. Table 48 on page 223 describes the configuration process; Table 49
on page 224 describes the flow of traffic during a mirroring operation that is initiated when
the user logs in; and Table 50 on page 224 describes the flow of traffic when mirroring a
user who is already logged in or when mirroring a static interface.

Figure 20: CLI-Based Packet Mirroring

To create a CLI-based packet mirroring environment, you must complete the processes
listed in Table 48 on page 223.

Table 48: Setting Up the CLI-Based Packet-Mirroring Environment

Process
Description
A
The authorized individual requests packet mirroring of a user's or interface's traffic and
configures the analyzer device to receive mirrored traffic.
B
An individual who is authorized to use the packet mirroring CLI commands configures
the packet mirroring environment, including the secure policy, analyzer interface
connection to the analyzer device, and the interface or trigger information.
Chapter 11: Configuring CLI-Based Packet Mirroring
223

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents