Logging Packet Mirroring Information - Juniper JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04 Configuration Manual

Software for e series broadband services routers policy management configuration guide
Hide thumbs Also See for JUNOSE SOFTWARE FOR E SERIES 11.3.X - POLICY MANAGEMENT CONFIGURATION GUIDE 2010-10-04:
Table of Contents

Advertisement

Logging Packet Mirroring Information

Copyright © 2010, Juniper Networks, Inc.
(A + 2X + Y) must be less than the maximum fabric bandwidth supported from this
line module.
(2X + Y) must be less than 100Mbps (the enforced queue limit).
The 100 Mbps limit does not apply to the following line modules:
GE-2 line module (Juniper Networks ERX310 and ERX1440 Broadband Services
Routers)
GE-HDE line module (ERX310 and ERX1440 router)
OC48 Frame APS I/O module (ERX1440 router only)
ES2 4G LM (E120 router and E320 Broadband Services Routers)
ES2 10G LM (E120/E320)
(B + X ) must be less than the maximum supported egress bandwidth.
The number of mirrored interfaces per line module must be less than 1023 (the
configuration enforced for secure policy attachments).
The number of interfaces mirrored per chassis must be less than 2400 (the
configuration enforced for secure policy attachments).
NOTE: Packet mirroring can also affect the forwarding controller's packet
handling performance.
The JunosE Software's packet mirroring feature provides two secure methods of capturing
and displaying packet mirroring-related information. Both methods ensure security by
requiring the mirror-enable command to be enabled.
Secure logging—Captures packet mirroring information to a local secure log on the
router.
SNMP secure packet mirroring traps—Captures and reports packet mirroring information
to an external device; you can then use the privileged show mirror trap and show
snmp traps CLI commands to view secure trap configuration information.
SNMP agent also implements a secure audit logging facility for the debugging of packet
mirroring traps and packet Mirror-MIB accesses. When secure audit logging is enabled,
SNMP agent logs reported mirror traps and packet Mirror-MIB get/set operations to
local volatile memory on the router.
By default, the JunosE Software captures packet mirroring-related activity to a secure
local mirror log. No action is required on your part to enable or disable the logging process;
however, only authorized users can access the secure log.
The secure logging feature includes the clear mirror log and show mirror log commands.
The mirror-enable command must be enabled to make the commands visible in the CLI.
Chapter 13: Managing Packet Mirroring
249

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junose 11.3

Table of Contents