Subscriber secure policy mirroring triggers are RADIUS attributes that identify a subscriber whose traffic is to be mirrored. The actual traffic mirroring session starts when the router (intercept access point) receives a RADIUS packet that contains a trigger and then applies the subscriber secure policy configuration to the appropriate interface.
The router receives subscriber secure policy triggers in the following types of RADIUS messages:
Table 21 lists the mirroring triggers that the RADIUS server administrator adds to the RADIUS record of the subscriber whose traffic is to be mirrored. In addition, the RADIUS VSAs listed in Table 22 must be included in the mirrored subscriber’s RADIUS record.
Table 21 lists the subscriber secure policy mirroring triggers (RADIUS attributes) that can be present in RADIUS Access-Accept and CoA messages. The attributes identify the subscriber whose traffic is to be mirrored.
Table 21: RADIUS Attributes Used as Traffic Mirroring Triggers
Attribute Number | Attribute Name |
---|---|
[1] |
User-Name |
[8] |
Framed-IP-Address |
[31] |
Calling-Station-ID |
[44] |
Acct-Session-ID |
[87] |
Nas-Port-ID |
Table 22 lists the RADIUS VSAs that you must include in the RADIUS record of the subscriber whose traffic is to be mirrored. The VSAs carry mirroring-related information.
The AAA Service Framework uses vendor ID 4874, which is assigned to Juniper Networks by the Internet Assigned Numbers Authority (IANA).
![]() |
Note: VSA 26-10 uses vendor ID 2636. |
Table 22: RADIUS-Based Mirroring Attributes
When using RADIUS attributes and VSAs for the subscriber secure policy service, keep the following considerations in mind:
Table 23: LI-Action VSA Action