®
Junos OS
SRX100, SRX210, SRX220, SRX240, and SRX650
Services Gateways MIB Reference
Release
10.4
Published: 2010-11-11
Revision 01
Copyright © 2010, Juniper Networks, Inc.
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, California 94089
USA
408-745-2000
www.juniper.net
This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright © 1986-1997,
Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part
of them is in the public domain.
This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto.
This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation
and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright ©
1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved.
GateD software copyright © 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through
release 3.0 by Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s
HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD
software copyright © 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright © 1991, D.
L. S. Associates.
This product includes software developed by Maker Communications, Inc., copyright © 1996, 1997, Maker Communications, Inc.
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Release 10.4
Copyright © 2010, Juniper Networks, Inc.
All rights reserved. Printed in USA.
Revision History
October 2010—Revision 01
The information in this document is current as of the date listed in the revision history.
YEAR 2000 NOTICE
Juniper Networks hardware and software products are Year 2000 compliant. The Junos OS has no known time-related limitations through
the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
ii Copyright © 2010, Juniper Networks, Inc.
END USER LICENSE AGREEMENT
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (if the Customer’s principal office is located outside the Americas) (such applicable entity being referred
to herein as “Juniper”), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limits to Customer’s use of the Software. Such limits may restrict use to a maximum number of seats, registered endpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software, in any form, to any third party; (d) remove any proprietary notices, labels, or marks on or in any copy of the Software or any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold in the secondhand market; (f) use any ‘locked’ or key-restricted feature, function, service, application, operation, or capability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Copyright © 2010, Juniper Networks, Inc. iii
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associated documentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statement that accompanies the Software (the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligation to support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTS OR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, OR FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THIS AGREEMENT, THE SOFTWARE, OR ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE. IN NO EVENT SHALL JUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
iv Copyright © 2010, Juniper Networks, Inc.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
Copyright © 2010, Juniper Networks, Inc. v
vi Copyright © 2010, Juniper Networks, Inc.
Abbreviated Table of Contents
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Part 1 Network Management Introduction
Chapter 1 Network Management Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Part 2 Simple Network Management Protocol (SNMP)
Chapter 2 SNMP Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Chapter 3 Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Chapter 4 Standard SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Chapter 5 Juniper Networks Enterprise-Specific SNMP Traps . . . . . . . . . . . . . . . . . . . . 73
Chapter 6 Summary of SNMP Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . 93
Chapter 7 SNMP Remote Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Chapter 8 SNMP Support for Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Chapter 9 SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways
Supported Enterprise-Specific MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Part 3 SRX100, SRX210, SRX220, SRX240, and SRX650 Services
Gateways MIBs
Chapter 10 Interpreting the Structure of Management Information MIB . . . . . . . . . . . 153
Chapter 11 Interpreting the Enterprise-Specific Access Authentication Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Chapter 12 Interpreting the Enterprise-Specific Alarm MIB . . . . . . . . . . . . . . . . . . . . . . . 165
Chapter 13 Interpreting the Enterprise-Specific BGP4 V2 MIB . . . . . . . . . . . . . . . . . . . . 169
Chapter 14 Interpreting the Enterprise-Specific Bidirectional Forwarding Detection
(BFD) MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Chapter 15 Interpreting the Enterprise-Specific Chassis MIBs . . . . . . . . . . . . . . . . . . . . 173
Chapter 16 Interpreting the Enterprise-Specific Configuration Management MIB . . . 269
Chapter 17 Interpreting the Enterprise-Specific Ethernet MAC MIB . . . . . . . . . . . . . . . 275
Chapter 18 Interpreting the Enterprise-Specific Event MIB . . . . . . . . . . . . . . . . . . . . . . . 277
Chapter 19 Interpreting the Enterprise-Specific Firewall MIB . . . . . . . . . . . . . . . . . . . . . 279
Chapter 20 Interpreting the Enterprise-Specific Host Resources MIB . . . . . . . . . . . . . . 283
Chapter 21 Interpreting the Enterprise-Specific Interface MIB . . . . . . . . . . . . . . . . . . . . 285
Chapter 22 Interpreting the Enterprise-Specific IP Forward MIB . . . . . . . . . . . . . . . . . . 291
Copyright © 2010, Juniper Networks, Inc. vii
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Chapter 23 Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Chapter 24 Interpreting the Enterprise-Specific IPsec Monitoring MIB . . . . . . . . . . . . 309
Chapter 25 Interpreting the Enterprise-Specific IPv4 MIB . . . . . . . . . . . . . . . . . . . . . . . . 317
Chapter 26 Interpreting the Enterprise-Specific IPv6 MIB . . . . . . . . . . . . . . . . . . . . . . . . 319
Chapter 27 Interpreting the Enterprise-Specific Network Address Translation Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Chapter 28 Interpreting the Enterprise-Specific Packet Forwarding Engine MIB . . . . 335
Chapter 29 Interpreting the Enterprise-Specific Ping MIB . . . . . . . . . . . . . . . . . . . . . . . . 339
Chapter 30 Interpreting the Enterprise-Specific Policy Objects MIB . . . . . . . . . . . . . . . 355
Chapter 31 Interpreting the Enterprise-Specific Real-Time Media MIB . . . . . . . . . . . . . 361
Chapter 32 Interpreting the Enterprise-Specific Reverse-Path-Forwarding MIB . . . . . 371
Chapter 33 Interpreting the Enterprise-Specific RMON Events and Alarms MIB . . . . . 373
Chapter 34 Interpreting the Enterprise-Specific Security Interface Extension Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Chapter 35 Interpreting the Enterprise-Specific SIP Common MIB . . . . . . . . . . . . . . . . 381
Chapter 36 Interpreting the Enterprise-Specific SNMP IDP MIB . . . . . . . . . . . . . . . . . . 387
Chapter 37 Interpreting the Enterprise-Specific System Log MIB . . . . . . . . . . . . . . . . . 389
Chapter 38 Interpreting the Enterprise-Specific Traceroute MIB . . . . . . . . . . . . . . . . . . 393
Chapter 39 Interpreting the Enterprise-Specific Utility MIB . . . . . . . . . . . . . . . . . . . . . . 395
Chapter 40 Interpreting the Enterprise-Specific VPN Certificate Objects MIB . . . . . . 399
Part 4 Accounting Options
Chapter 41 Accounting Options Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Chapter 42 Configuring Accounting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Part 5 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
viii Copyright © 2010, Juniper Networks, Inc.
Table of Contents
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
SRX Series Documentation and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Requesting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
Self-Help Online Tools and Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Opening a Case with JTAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
Part 1 Network Management Introduction
Chapter 1 Network Management Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Understanding Device Management Functions in Junos OS . . . . . . . . . . . . . . . . . . 3
Part 2 Simple Network Management Protocol (SNMP)
Chapter 2 SNMP Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Understanding the SNMP Implementation in Junos OS . . . . . . . . . . . . . . . . . . . . . 9
SNMP Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Management Information Base (MIB) . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
SNMP Traps and Informs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Junos SNMP Agent Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Standard SNMP MIBs Supported by Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Juniper Networks Enterprise-Specific MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Loading MIB Files to a Network Management System . . . . . . . . . . . . . . . . . . . . . . 35
Chapter 3 Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Configuring SNMP on a Device Running Junos OS . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configuring the System Contact on a Device Running Junos OS . . . . . . . . . . . . . . 40
Configuring the System Location for a Device Running Junos OS . . . . . . . . . . . . . 40
Configuring the System Description on a Device Running Junos OS . . . . . . . . . . . 41
Filtering Duplicate SNMP Requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Configuring the Commit Delay Timer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuring the System Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuring the SNMP Community String . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Adding a Group of Clients to an SNMP Community . . . . . . . . . . . . . . . . . . . . . . . . 44
Configuring SNMP Trap Options and Groups on a Device Running Junos OS . . . . 45
Configuring SNMP Trap Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Configuring the Source Address for SNMP Traps . . . . . . . . . . . . . . . . . . . . . . 46
Configuring the Agent Address for SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . 48
Adding snmpTrapEnterprise Object Identifier to Standard SNMP Traps . . . . 49
Copyright © 2010, Juniper Networks, Inc. ix
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring SNMP Trap Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Spoofing Enterprise-Specific SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuring the Interfaces on Which SNMP Requests Can Be Accepted . . . . . . . 52
Filtering Interface Information Out of SNMP Get and GetNext Output . . . . . . . . . 52
Configuring MIB Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Tracing SNMP Activity on a Device Running Junos OS . . . . . . . . . . . . . . . . . . . . . . 54
Configuring the Number and Size of SNMP Log Files . . . . . . . . . . . . . . . . . . . 55
Configuring Access to the Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Configuring a Regular Expression for Lines to Be Logged . . . . . . . . . . . . . . . . 55
Configuring the Trace Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Configuring the Local Engine ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Chapter 4 Standard SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Standard SNMP Traps Supported on Devices Running Junos OS . . . . . . . . . . . . . 59
Standard SNMP Version 1 Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Standard SNMP Version 2 Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
SNMP Version 2 MPLS Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Unsupported Standard SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Chapter 5 Juniper Networks Enterprise-Specific SNMP Traps . . . . . . . . . . . . . . . . . . . . 73
Juniper Networks Enterprise-Specific SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . 73
Juniper Networks Enterprise-Specific SNMP Version 1 Traps . . . . . . . . . . . . . . . . . 74
Juniper Networks Enterprise-Specific SNMP Version 2 Traps . . . . . . . . . . . . . . . . . 81
Juniper Networks Enterprise-Specific BGP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Juniper Networks Enterprise-Specific LDP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Disabling LDP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Juniper Networks Enterprise-Specific MIMSTP Traps . . . . . . . . . . . . . . . . . . . . . . 88
Enterprise-Specific MPLS Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Configuring SNMP Informs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Configuring SNMPv3 Traps on a Device Running Junos OS . . . . . . . . . . . . . . . . . . 91
Chapter 6 Summary of SNMP Configuration Statements . . . . . . . . . . . . . . . . . . . . . . . . 93
access-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
agent-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
client-list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
client-list-name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
commit-delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
contact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
destination-port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
engine-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
filter-duplicates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
filter-interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
logical-system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
x Copyright © 2010, Juniper Networks, Inc.
Table of Contents
logical-system-trap-filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
nonvolatile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
oid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
routing-instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
routing-instance-access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
source-address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
traceoptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
trap-group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
trap-options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
view (Associating a MIB View with a Community) . . . . . . . . . . . . . . . . . . . . . 113
view (Configuring a MIB View) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Chapter 7 SNMP Remote Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
SNMP Remote Operations Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
SNMP Remote Operation Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Setting SNMP Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Example: Setting SNMP Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Setting Trap Notification for Remote Operations . . . . . . . . . . . . . . . . . . . . . . 116
Example: Setting Trap Notification for Remote Operations . . . . . . . . . . 117
Using Variable-Length String Indexes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Example: Set Variable-Length String Indexes . . . . . . . . . . . . . . . . . . . . . 117
Enabling Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Using the Ping MIB for Remote Monitoring Devices Running Junos OS . . . . . . . . 118
Starting a Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Using Multiple Set Protocol Data Units (PDUs) . . . . . . . . . . . . . . . . . . . . . . . 119
Using a Single Set PDU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Monitoring a Running Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
pingResultsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
pingProbeHistoryTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Generating Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Gathering Ping Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Stopping a Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Interpreting Ping Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Using the Traceroute MIB for Remote Monitoring Devices Running Junos OS . . . 125
Chapter 8 SNMP Support for Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Understanding SNMP Support for Routing Instances . . . . . . . . . . . . . . . . . . . . . . 127
Support Classes for MIB Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Identifying a Routing Instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Enabling SNMP Access over Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community . . . . . . . . 131
Example: Configuring Interface Settings for a Routing Instance . . . . . . . . . . . . . . 132
Configuring Access Lists for SNMP Access over Routing Instances . . . . . . . . . . . 133
Trap Support for Routing Instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
MIB Support Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Copyright © 2010, Juniper Networks, Inc. xi
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Chapter 9 SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways
Supported Enterprise-Specific MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
List of SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways
Supported Enterprise-Specific MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Part 3 SRX100, SRX210, SRX220, SRX240, and SRX650 Services
Gateways MIBs
Chapter 10 Interpreting the Structure of Management Information MIB . . . . . . . . . . . 153
Structure of Management Information MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
jnxProducts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
jnxServices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
jnxMibs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
jnxTraps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
jnxExperiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Chapter 11 Interpreting the Enterprise-Specific Access Authentication Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Access Authentication Objects MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
jnxJsFwAuthStats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
jnxJsAuthTrapVars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
jnxJsAuthNotifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Chapter 12 Interpreting the Enterprise-Specific Alarm MIB . . . . . . . . . . . . . . . . . . . . . . . 165
Alarm MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
jnxAlarmRelayMode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
jnxYellowAlarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
jnxRedAlarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Chapter 13 Interpreting the Enterprise-Specific BGP4 V2 MIB . . . . . . . . . . . . . . . . . . . . 169
BGP4 V2 MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
jnxBgpM2PrefixCountersTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
JnxBgpM2PrefixCountersEntry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Chapter 14 Interpreting the Enterprise-Specific Bidirectional Forwarding Detection
(BFD) MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Bidirectional Forwarding Detection (BFD) MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
jnxBfdSessTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Notifications for the BFD MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Chapter 15 Interpreting the Enterprise-Specific Chassis MIBs . . . . . . . . . . . . . . . . . . . . 173
Chassis MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Textual Convention for Chassis MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
jnxBoxAnatomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Top-Level Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
jnxContainersTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
jnxContentsLastChange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
jnxContentsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
jnxLEDLastChange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
jnxLEDTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
jnxFilledLastChange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
xii Copyright © 2010, Juniper Networks, Inc.
Table of Contents
jnxFilledTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
jnxOperatingTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
jnxRedundancyTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
jnxFruTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
jnxBoxKernelMemoryUsedPercent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
jnxBoxSystemDomainType . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Chassis Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
SNMPv1 Trap Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
SNMPv2 Trap Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
Chassis Definitions for Router Model MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
MIB Objects for the SRX100 Services Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 265
MIB Objects for the SRX210 Services Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 266
MIB Objects for the SRX220 Services Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 267
MIB Objects for the SRX240 Services Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 267
MIB Objects for the SRX650 Services Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 268
Chapter 16 Interpreting the Enterprise-Specific Configuration Management MIB . . . 269
Configuration Management MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Text Conventions in Enterprise-Specific Configuration Management MIB . . . . . 269
Configuration Change Management Objects and jnxCmCfgChgEventTable . . . 270
jnxCmCfgChgEventTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Rescue Configuration Change Management Objects . . . . . . . . . . . . . . . . . . . . . . 272
Configuration Management Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Chapter 17 Interpreting the Enterprise-Specific Ethernet MAC MIB . . . . . . . . . . . . . . . 275
Ethernet MAC MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
jnxMacStatsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Chapter 18 Interpreting the Enterprise-Specific Event MIB . . . . . . . . . . . . . . . . . . . . . . . 277
Event MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
jnxEventAvTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Notifications for the Event MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Chapter 19 Interpreting the Enterprise-Specific Firewall MIB . . . . . . . . . . . . . . . . . . . . . 279
Firewall MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
jnxFirewallsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
jnxFirewallCounterTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280
Chapter 20 Interpreting the Enterprise-Specific Host Resources MIB . . . . . . . . . . . . . . 283
Host Resources MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
jnxHrStorageTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Chapter 21 Interpreting the Enterprise-Specific Interface MIB . . . . . . . . . . . . . . . . . . . . 285
Interface MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
jnxIfTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
ifChassisTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Chapter 22 Interpreting the Enterprise-Specific IP Forward MIB . . . . . . . . . . . . . . . . . . 291
IP Forward MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
jnxIpCidrRouteTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Copyright © 2010, Juniper Networks, Inc. xiii
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Chapter 23 Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
IPsec Generic Flow Monitoring Object MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Branch Tree Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Number of IKE Tunnels Currently Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
IPsec Phase 1 IKE Tunnel Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
IPsec Phase 2 IKE Tunnel Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
IPsec Phase 2 Security Association Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Chapter 24 Interpreting the Enterprise-Specific IPsec Monitoring MIB . . . . . . . . . . . . 309
IPSec Monitoring MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
jnxIkeTunnelTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
jnxIPSecTunnelTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
jnxIPSecSaTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
Chapter 25 Interpreting the Enterprise-Specific IPv4 MIB . . . . . . . . . . . . . . . . . . . . . . . . 317
IPv4 MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
jnxIpv4AddrTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Chapter 26 Interpreting the Enterprise-Specific IPv6 MIB . . . . . . . . . . . . . . . . . . . . . . . . 319
IPv6 MIB Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
jnxIpv6GlobalStats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
jnxIcmpv6GlobalStats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Chapter 27 Interpreting the Enterprise-Specific Network Address Translation Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Network Address Translation Objects MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Source NAT Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
New Source NAT Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
jnxJsNatIfSrcPoolPortTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
NAT Rule Hit Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
NAT Pool Hit Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
NAT Trap Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Chapter 28 Interpreting the Enterprise-Specific Packet Forwarding Engine MIB . . . . 335
Packet Forwarding Engine MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
jnxPfeNotifyGlTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
jnxPfeNotifyTypeTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
jnxPfeNotifyTypeEntry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
Chapter 29 Interpreting the Enterprise-Specific Ping MIB . . . . . . . . . . . . . . . . . . . . . . . . 339
PING MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
jnxPingCtlTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
jnxPingCtlEntry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
jnxPingResultsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
jnxPingProbeHistoryTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
jnxPingLastTestResultTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
xiv Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Chapter 30 Interpreting the Enterprise-Specific Policy Objects MIB . . . . . . . . . . . . . . . 355
Policy Objects MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Security Policy Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
jnxJsPolicyStatsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
Chapter 31 Interpreting the Enterprise-Specific Real-Time Media MIB . . . . . . . . . . . . . 361
Real-Time Media MIB Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
SIP Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Analog Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Peer Call Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Survivable Call Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364
Trunk Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
Digit Manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Attendant Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
Station Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Dial Plan Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Class of Restriction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Media Gateway Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
Trunk Group Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Survivable Call Service Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Chapter 32 Interpreting the Enterprise-Specific Reverse-Path-Forwarding MIB . . . . . 371
Reverse Path Forwarding MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
jnxRpfStatsTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Chapter 33 Interpreting the Enterprise-Specific RMON Events and Alarms MIB . . . . . 373
RMON Events and Alarms MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
jnxRmonAlarmTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
RMON Event and Alarm Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Chapter 34 Interpreting the Enterprise-Specific Security Interface Extension Objects
MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Security Interface Extension Objects MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
jnxJsIfMonTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
Chapter 35 Interpreting the Enterprise-Specific SIP Common MIB . . . . . . . . . . . . . . . . 381
SIP Common MIB Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Common Configuration Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Support for Multiple Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Support for SIP Option Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Supported SIP Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
SIP Timer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Chapter 36 Interpreting the Enterprise-Specific SNMP IDP MIB . . . . . . . . . . . . . . . . . . 387
IDP MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
jnxJsIdpAttackTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
IDP Signature Update and Attack Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
Copyright © 2010, Juniper Networks, Inc. xv
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Chapter 37 Interpreting the Enterprise-Specific System Log MIB . . . . . . . . . . . . . . . . . 389
System Log MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
jnxSyslogTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
jnxSyslogAvTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Chapter 38 Interpreting the Enterprise-Specific Traceroute MIB . . . . . . . . . . . . . . . . . . 393
Traceroute MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
jnxTraceRouteCtlTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Chapter 39 Interpreting the Enterprise-Specific Utility MIB . . . . . . . . . . . . . . . . . . . . . . 395
Utility MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
jnxUtilCounter32Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
jnxUtilCounter64Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
jnxUtilIntegerTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
jnxUtilUintTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
jnxUtilStringTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
Chapter 40 Interpreting the Enterprise-Specific VPN Certificate Objects MIB . . . . . . 399
VPN Certificate Objects MIB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
jnxJsLoadedCaCertTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
jnxJsLoadedLocalCertTable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
Part 4 Accounting Options
Chapter 41 Accounting Options Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Accounting Options Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Chapter 42 Configuring Accounting Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Accounting Options Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Accounting Options—Full Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407
Minimum Accounting Options Configuration . . . . . . . . . . . . . . . . . . . . . . . . 408
Configuring Accounting-Data Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
Configuring the Storage Location of the File . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Configuring the Maximum Size of the File . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Configuring the Maximum Number of Files . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Configuring the Start Time for File Transfer . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Configuring the Transfer Interval of the File . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Configuring Archive Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Configuring the Interface Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
Configuring Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring the File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring the Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Example: Configuring the Interface Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Configuring the Filter Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring the Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring the File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Configuring the Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Example: Configuring a Filter Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Example: Configuring Interface-Specific Firewall Counters and Filter Profiles . . 418
Understanding Source Class Usage and Destination Class Usage Options . . . . 420
xvi Copyright © 2010, Juniper Networks, Inc.
Table of Contents
Configuring SCU or DCU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Creating Prefix Route Filters in a Policy Statement . . . . . . . . . . . . . . . . . . . . 421
Applying the Policy to the Forwarding Table . . . . . . . . . . . . . . . . . . . . . . . . . 421
Enabling Accounting on Inbound and Outbound Interfaces . . . . . . . . . . . . . 421
Configuring SCU on a Virtual Loopback Tunnel Interface . . . . . . . . . . . . . . . . . . 423
Example: Configuring a Virtual Loopback Tunnel Interface on a Provider
Edge Router Equipped with a Tunnel PIC . . . . . . . . . . . . . . . . . . . . . . . . 423
Example: Mapping the VRF Instance Type to the Virtual Loopback Tunnel
Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Example: Sending Traffic Received from the Virtual Loopback Interface Out
the Source Class Output Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Configuring Class Usage Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Configuring a Class Usage Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Configuring the File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Configuring the Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Creating a Class Usage Profile to Collect Source Class Usage Statistics . . . 425
Creating a Class Usage Profile to Collect Destination Class Usage
Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Configuring the MIB Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426
Configuring the File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Configuring the Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Configuring the MIB Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
Configuring MIB Object Names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Example: Configuring a MIB Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Configuring the Routing Engine Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Configuring Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Configuring the File Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Configuring the Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
Example: Configuring a Routing Engine Profile . . . . . . . . . . . . . . . . . . . . . . . 429
Part 5 Index
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Copyright © 2010, Juniper Networks, Inc. xvii
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
xviii Copyright © 2010, Juniper Networks, Inc.
About This Guide
This preface provides the following guidelines for using the Junos OS J-Web Help Reference:
• SRX Series Documentation and Release Notes on page xix
• Objectives on page xix
• Audience on page xx
• Documentation Conventions on page xx
• Requesting Technical Support on page xxii
SRX Series Documentation and Release Notes
For a list of related SRX Series documentation, see
http://www.juniper.net/techpubs/hardware/srx-series-main.html.
If the information in the latest release notes differs from the information in the
documentation, follow the Junos OS Release Notes.
®
To obtain the most current version of all Juniper Networks technical documentation,
see the product documentation page on the Juniper Networks website at
http://www.juniper.net/techpubs/.
Juniper Networks supports a technical book program to publish books by Juniper Networks
engineers and subject matter experts with book publishers around the world. These
books go beyond the technical documentation to explore the nuances of network
architecture, deployment, and administration using the Junos operating system (Junos
OS) and Juniper Networks devices. In addition, the Juniper Networks Technical Library,
published in conjunction with O'Reilly Media, explores improving network security,
reliability, and availability using Junos OS configuration techniques. All the books are for
sale at technical bookstores and book outlets around the world. The current list can be
viewed at http://www.juniper.net/books.
Objectives
This guide provides an overview of the SRX100, SRX210, SRX220, SRX240, and SRX650
Services Gateways MIB specifications of the simple network management protocol
(SNMP). The SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways
information is stored in the form of a virtual storage area called a management information
base (MIB). Each MIB contains several MIB objects that describe the services gateway
components.
Copyright © 2010, Juniper Networks, Inc. xix
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NOTE: For additional information about Junos OS—either corrections to or
information that might have been omitted from this guide—see the software
release notes at http://www.juniper.net/. For information about managing
networks with Junos OS, see the Network Management Configuration Guide.
Also, for information about the SNMP MIBs and Traps supported by Junos
OS, see theSNMP MIBs and Traps Reference.
Audience
This guide is designed for network administrators to configure and monitor the SRX100,
SRX210, SRX220, SRX240, and SRX650 Services Gateways. This guide may also be
useful for application developers who are developing management applications for
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways.
To use this guide, you need a broad understanding of networks in general, the Internet
in particular, networking principles, and network configuration. You must also be familiar
with one or more of the following Internet routing protocols:
• Border Gateway Protocol (BGP)
• Internet Control Message Protocol (ICMP) router discovery
• Internet Group Management Protocol (IGMP)
• Multiprotocol Label Switching (MPLS)
• Open Shortest Path First (OSPF)
• Protocol-Independent Multicast (PIM)
• Simple Network Management Protocol (SNMP)
Personnel operating the equipment must be trained and competent; must not conduct
themselves in a careless, willfully negligent, or hostile manner; and must abide by the
instructions provided by the documentation.
Documentation Conventions
Table 1 on page xxi defines notice icons used in this guide.
xx Copyright © 2010, Juniper Networks, Inc.
About This Guide
Table 1: Notice Icons
Icon Meaning Description
Informational note Indicates important features or instructions.
Caution Indicates a situation that might result in loss of data or hardware damage.
Warning Alerts you to the risk of personal injury or death.
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page xxi defines the text and syntax conventions used in this guide.
Table 2: Text and Syntax Conventions
Convention Description Examples
Bold text like this Represents text that you type. To enter configuration mode, type the
configure command:
user@host> configure
Fixed-width text like this Represents output that appears on the user@host> show chassis alarms
terminal screen.
No alarms currently active
Italic text like this • Introduces important new terms. • A policy term is a named structure
• Identifies book names. that defines match conditions and
actions.
• Identifies RFC and Internet draft titles.
• Junos OS System Basics Configuration
Guide
• RFC 1997, BGP Communities Attribute
Italic text like this Represents variables (options for which Configure the machine’s domain name:
you substitute a value) in commands or
configuration statements. [edit]
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include the
statements, commands, files, and stub statement at the [edit protocols
directories; IP addresses; configuration ospf area area-id] hierarchy level.
hierarchy levels; or labels on routing • The console port is labeled CONSOLE.
platform components.
< > (angle brackets) Enclose optional keywords or variables. stub <default-metric metric>;
Copyright © 2010, Juniper Networks, Inc. xxi
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 2: Text and Syntax Conventions (continued)
Convention Description Examples
| (pipe symbol) Indicates a choice between the mutually broadcast | multicast
exclusive keywords or variables on either
side of the symbol. The set of choices is (string1 | string2 | string3)
often enclosed in parentheses for clarity.
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS only
same line as the configuration statement
to which it applies.
[ ] (square brackets) Enclose a variable for which you can community name members [
substitute one or more values. community-ids ]
Indention and braces ( { } ) Identify a level in the configuration [edit]
hierarchy. routing-options {
static {
route default {
; (semicolon) Identifies a leaf statement at a
nexthop address;
configuration hierarchy level.
retain;
}
}
}
J-Web GUI Conventions
Bold text like this Represents J-Web graphical user • In the Logical Interfaces box, select
interface (GUI) items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of J-Web In the configuration editor hierarchy,
selections. select Protocols>Ospf.
Requesting Technical Support
Technical product support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need postsales technical support, you can access
our tools and resources online or open a case with JTAC.
• JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf .
• Product warranties—For product warranty information, visit
http://www.juniper.net/support/warranty/ .
• JTAC Hours of Operation —The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
xxii Copyright © 2010, Juniper Networks, Inc.
About This Guide
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
• Find CSC offerings: http://www.juniper.net/customers/support/
• Find product documentation: http://www.juniper.net/techpubs/
• Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
• Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
• Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
• Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
• Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verify service entitlement by product serial number, use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
• Use the Case Management tool in the CSC at http://www.juniper.net/cm/ .
• Call 1-888-314-JTAC (1-888-314-5822 toll-free in the USA, Canada, and Mexico).
For international or direct-dial options in countries without toll-free numbers, visit us at
http://www.juniper.net/support/requesting-support.html
Copyright © 2010, Juniper Networks, Inc. xxiii
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
xxiv Copyright © 2010, Juniper Networks, Inc.
PART 1
Network Management Introduction
• Network Management Overview on page 3
Copyright © 2010, Juniper Networks, Inc. 1
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
2 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 1
Network Management Overview
This chapter contains the following topic:
• Understanding Device Management Functions in Junos OS on page 3
Understanding Device Management Functions in Junos OS
After you have installed a device into your network, you need to manage the device within
your network. Device management can be divided into five tasks:
• Fault management—Monitor the device; detect and fix faults.
• Configuration management—Configure device attributes.
• Accounting management—Collect statistics for accounting purposes.
• Performance management—Monitor and adjust device performance.
• Security management—Control device access and authenticate users.
The Junos OS network management features work in conjunction with an operations
support system (OSS) to manage the devices within the network. Junos OS can assist
you in performing these management tasks, as described in Table 3 on page 4.
Copyright © 2010, Juniper Networks, Inc. 3
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 3: Device Management Features in Junos OS
Task Junos OS Feature
Fault management Monitor and see faults using:
• Operational mode commands—For more information about
operational mode commands, see the Junos OS System Basics and
Services Command Reference, Junos OS Interfaces Command
Reference, and Junos OS Routing Protocols and Policies Command
Reference.
• SNMP MIBs—For more information about SNMP MIBs supported by
Junos OS, see ““Standard SNMP MIBs Supported by Junos OS” on
page 12” and ““Juniper Networks Enterprise-Specific MIBs” on
page 23” in the Junos SNMP MIBs and Traps Reference.
• Standard SNMP traps—For more information about standard SNMP
traps, see the “Standard SNMP Traps Supported on Devices Running
Junos OS” in the Junos OS SNMP MIBs and Traps Reference.
• Enterprise-specific SNMP traps—For more information about
enterprise-specific traps, see “Juniper Networks Enterprise-Specific
SNMP Traps” in the Junos SNMP MIBs and Traps Reference.
• System log messages—For more information about how to configure
system log messages, see the Junos OS System Basics Configuration
Guide. For more information about how to view system log messages,
see the Junos OS System Log Messages Reference.
Configuration • Configure router attributes using the command-line interface (CLI),
management the Junos XML management protocol, and the NETCONF XML
management protocol. For more information about configuring the
router using the CLI, see the Junos OS System Basics Configuration
Guide. For more information about configuring the router using the
APIs, see the Junos XML Management Protocol Guide and NETCONF
XML Management Protocol Guide.
• Configuration Management MIB—For more information about the
Configuration Management MIB, see the ““Configuration Management
MIB” on page 269” in the Junos SNMP MIBs and Traps Reference.
4 Copyright © 2010, Juniper Networks, Inc.
Chapter 1: Network Management Overview
Table 3: Device Management Features in Junos OS (continued)
Task Junos OS Feature
Accounting Perform the following accounting-related tasks:
management
• Collect statistics for interfaces, firewall filters, destination classes,
source classes, and the Routing Engine. For more information about
collecting statistics, see “Accounting Options Configuration” on
page 407.
• Use interface-specific traffic statistics and other counters, available
in the Standard Interfaces MIB, Juniper Networks enterprise-specific
extensions to the Interfaces MIB, and media-specific MIBs, such as
the enterprise-specific ATM MIB.
• Use per-ATM virtual circuit (VC) counters, available in the
enterprise-specific ATM MIB. For more information about the ATM
MIB, see the Junos SNMP MIBs and Traps Reference.
• Group source and destination prefixes into source classes and
destination classes and count packets for those classes. Collect
destination class and source class usage statistics. For more
information about classes, see “Destination Class Usage MIB” and
“Source Class Usage MIB” in the Junos SNMP MIBs and Traps
Reference, “Configuring Class Usage Profiles” on page 424, the Junos
OS Network Interfaces Configuration Guide, and the Junos OS Policy
Framework Configuration Guide.
• Count packets as part of a firewall filter. For more information about
firewall filter policies, see ““Juniper Networks Enterprise-Specific
MIBs” on page 23” in the Junos SNMP MIBs and Traps Reference and
the Junos OS Policy Framework Configuration Guide.
• Sample traffic, collect the samples, and send the collection to a host
running the CAIDA cflowd utility. For more information about CAIDA
and cflowd, see the Junos OS Policy Framework Configuration Guide.
Performance Monitor performance in the following ways:
management
• Use operational mode commands. For more information about
monitoring performance using operational mode commands, see
the Junos OS System Basics and Services Command Reference.
• Use firewall filter. For more information about performance
monitoring using firewall filters, see the Junos OS Policy Framework
Configuration Guide.
• Sample traffic, collect the samples, and send the samples to a host
running the CAIDA cflowd utility. For more information about CAIDA
and cflowd, see the Junos OS Policy Framework Configuration Guide.
• Use the enterprise-specific Class-of-Service MIB. For more
information about this MIB, see the “Class-of-Service MIB” in the
Junos SNMP MIBs and Traps Reference.
Security management Assure security in your network in the following ways:
• Control access to the router and authenticate users. For more
information about access control and user authentication, see the
Junos OS System Basics Configuration Guide.
• Control access to the router using SNMPv3 and SNMP over IPv6. For
more information, see “Configuring the Local Engine ID” on page 57
and “Tracing SNMP Activity on a Device Running Junos OS” on
page 54.
Copyright © 2010, Juniper Networks, Inc. 5
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • Understanding the Integrated Local Management Interface
Documentation
• Understanding the SNMP Implementation in Junos OS on page 9
• Understanding Measurement Points, Key Performance Indicators, and Baseline Values
• Accounting Options Overview on page 405
6 Copyright © 2010, Juniper Networks, Inc.
PART 2
Simple Network Management Protocol
(SNMP)
• SNMP Overview on page 9
• Configuring SNMP on page 37
• Standard SNMP Traps on page 59
• Juniper Networks Enterprise-Specific SNMP Traps on page 73
• Summary of SNMP Configuration Statements on page 93
• SNMP Remote Operations on page 115
• SNMP Support for Routing Instances on page 127
• SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways Supported
Enterprise-Specific MIBs on page 145
Copyright © 2010, Juniper Networks, Inc. 7
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
8 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 2
SNMP Overview
This chapter contains the following topics:
• Understanding the SNMP Implementation in Junos OS on page 9
• Standard SNMP MIBs Supported by Junos OS on page 12
• Juniper Networks Enterprise-Specific MIBs on page 23
• Loading MIB Files to a Network Management System on page 35
Understanding the SNMP Implementation in Junos OS
SNMP enables the monitoring of network devices from a central location. This topic
provides an overview of SNMP and describes how SNMP is implemented in Junos OS.
This topic includes the following sections:
• SNMP Architecture on page 9
• Junos SNMP Agent Features on page 12
SNMP Architecture
The SNMP agent exchanges network management information with SNMP manager
software running on a network management system (NMS), or host. The agent responds
to requests for information and actions from the manager. The agent also controls access
to the agent’s MIB, the collection of objects that can be viewed or changed by the SNMP
manager.
The SNMP manager collects information about network connectivity, activity, and events
by polling managed devices.
Communication between the agent and the manager occurs in one of the following
forms:
• Get, GetBulk, and GetNext requests—The manager requests information from the agent;
the agent returns the information in a Get response message.
• Set requests—The manager changes the value of a MIB object controlled by the agent;
the agent indicates status in a Set response message.
• Traps notification—The agent sends traps to notify the manager of significant events
that occur on the network device.
Copyright © 2010, Juniper Networks, Inc. 9
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
This topic contains the following sections:
• Management Information Base (MIB) on page 10
• SNMP Traps and Informs on page 10
Management Information Base (MIB)
A MIB is a hierarchy of information used to define managed objects in a network device.
The MIB structure is based on a tree structure, which defines a grouping of objects into
related sets. Each object in the MIB is associated with an object identifier (OID), which
names the object. The “leaf” in the tree structure is the actual managed object instance,
which represents a resource, event, or activity that occurs in your network device.
MIBs are either standard or enterprise-specific. Standard MIBs are created by the Internet
Engineering Task Force (IETF) and documented in various RFCs. Depending on the vendor,
many standard MIBs are delivered with the NMS software. You can also download the
standard MIBs from the IETF website, www.ietf.org, and compile them into your NMS, if
necessary.
For a list of standard supported MIBs, see ““Standard SNMP MIBs Supported by Junos
OS” on page 12” in the Junos SNMP MIBs and Traps Reference.
Enterprise-specific MIBs are developed and supported by a specific equipment
manufacturer. If your network contains devices that have enterprise-specific MIBs, you
must obtain them from the manufacturer and compile them into your network
management software.
For a list of Juniper Networks enterprise-specific supported MIBs, see ““Juniper Networks
Enterprise-Specific MIBs” on page 23” in the Junos SNMP MIBs and Traps Reference.
SNMP Traps and Informs
Routers can send notifications to SNMP managers when significant events occur on a
network device, most often errors or failures. SNMP notifications can be sent as traps or
inform requests. SNMP traps are unconfirmed notifications. SNMP informs are confirmed
notifications.
SNMP traps are defined in either standard or enterprise-specific MIBs. Standard traps
are created by the IETF and documented in various RFCs. The standard traps are compiled
into the network management software. You can also download the standard traps from
the IETF website, www.ietf.org.
For more information about standard traps supported by Junos OS, see “Standard SNMP
Traps Supported on Devices Running Junos OS” in Junos OS SNMP MIBs and Traps
Reference.
Enterprise-specific traps are developed and supported by a specific equipment
manufacturer. If your network contains devices that have enterprise-specific traps, you
must obtain them from the manufacturer and compile them into your network
management software.
For more information about enterprise-specific traps supported by Junos OS, see “Juniper
Networks Enterprise-Specific SNMP Traps” in the Junos SNMP MIBs and Traps Reference.
10 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
For information about system logging severity levels for SNMP traps, see “System Logging
Severity Levels for SNMP Traps” on page 11.
With traps, the receiver does not send any acknowledgment when it receives a trap and
the sender cannot determine if the trap was received. To increase reliability, SNMP informs
are supported in SNMPv3. An SNMP manager that receives an inform acknowledges the
message with a response. For information about SNMP informs, see “Configuring SNMP
Informs” on page 90.
SNMP Trap Queuing
Junos OS supports trap queuing to ensure that traps are not lost because of temporary
unavailability of routes. Two types of queues, destination queues and a throttle queue,
are formed to ensure delivery of traps and control the trap traffic.
Junos OS forms a destination queue when a trap to a particular destination is returned
because the host is not reachable, and adds the subsequent traps to the same destination
to the queue. Junos OS checks for availability of routes every 30 seconds, and sends the
traps from the destination queue in a round-robin fashion. If the trap delivery fails, the
trap is added back to the queue, and the delivery attempt counter and the next delivery
attempt timer for the queue are reset. Subsequent attempts occur at progressive intervals
of 1 minute, 2 minutes, 4 minutes, and 8 minutes. The maximum delay between the
attempts is 8 minutes, and the maximum number of attempts is ten. After ten
unsuccessful attempts, the destination queue and all the traps in the queue are deleted.
Junos OS also has a throttle mechanism to control the number of traps (throttle threshold;
default value of 500 traps) sent during a particular time period (throttle interval; default
of 5 seconds) and to ensure consistency in trap traffic, especially when large number of
traps are generated because of interface status changes. The throttle interval period
begins when the first trap arrives at the throttle. All traps within the trap threshold are
processed, and the traps beyond the threshold limit are queued. The maximum size of
trap queues (that is, the throttle queue and the destination queue combined) is 40,000
traps; however, on EX Series switches, the maximum size of trap queue is 1000 traps
The maximum size of any one queue is 20,000 traps for devices other than EX Series
switches. On EX Series switches, the maximum size of one queue is 500 traps. If a trap
is sent from a destination queue when the throttle queue has exceeded the maximum
size, the trap is added back to the top of the destination queue, and all subsequent
attempts from the destination queue are stopped for a 30-second period, after which
the destination queue restarts sending the traps.
NOTE: Users cannot configure Junos OS for trap queuing. Users cannot view
any information about trap queues except what is available in the syslog.
System Logging Severity Levels for SNMP Traps
For some traps, when a trap condition occurs, regardless of whether the SNMP agent
sends a trap to an NMS, the trap is logged if the system logging is configured to log an
event with that system logging severity level. For more information about system logging
severity levels, see the Junos OS System Basics Configuration Guide.
Copyright © 2010, Juniper Networks, Inc. 11
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
For more information about system logging severity levels for standard traps, see
““Standard SNMP Version 1 Traps” on page 59” and ““Standard SNMP Version 2 Traps”
on page 63” in the Junos SNMP MIBs and Traps Reference. For more information about
system logging severity levels for enterprise-specific traps, see ““Juniper Networks
Enterprise-Specific SNMP Version 1 Traps” on page 74” and ““Juniper Networks
Enterprise-Specific SNMP Version 2 Traps” on page 81” in the Junos SNMP MIBs and Traps
Reference.
Junos SNMP Agent Features
The Junos SNMP agent software consists of an SNMP master agent that delegates all
SNMP requests to subagents. Each subagent is responsible for the support of a specific
set of MIBs.
Junos OS supports the following versions of SNMP:
• SNMPv1—The initial implementation of SNMP that defines the architecture and
framework for SNMP.
• SNMPv2c—The revised protocol, with improvements to performance and
manager-to-manager communications. Specifically, SNMPv2c implements community
strings, which act as passwords when determining who, what, and how the SNMP
clients can access the data in the SNMP agent. The community string is contained in
SNMP Get, GetBulk, GetNext, and Set requests. The agent may require a different
community string for Get, GetBulk, and GetNext requests (read-only access) than it
does for Set requests (read-write access).
• SNMPv3—The most up-to-date protocol focuses on security. SNMPv3 defines a security
model, user-based security model (USM), and a view-based access control model
(VACM). SNMPv3 USM provides data integrity, data origin authentication, message
replay protection, and protection against disclosure of the message payload. SNMPv3
VACM provides access control to determine whether a specific type of access (read
or write) to the management information is allowed.
In addition, the Junos SNMP agent software accepts IPv4 and IPv6 addresses for transport
over IPv4 and IPv6. For IPv6, Junos OS supports the following features:
• SNMP data over IPv6 networks
• IPv6-specific MIB data
• SNMP agents for IPv6
Related • SNMPv3 Overview
Documentation
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
Standard SNMP MIBs Supported by Junos OS
Table 4 on page 13 contains the list of standard SNMP MIBs and RFCs that are supported
on various devices running Junos OS. RFCs can be found at http://www.ietf.org .
12 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
NOTE: In Table 4 on page 13, a value of 1 in any of the platform columns (M,
T, J, MX, EX, and SRX) denotes that the corresponding MIB is supported on
that particular platform, and a value of 0 denotes that the MIB is not
supported on the platform.
Table 4: Standard MIBs Supported on Devices Running Junos OS
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
IEEE 802.1ab section 12.1, Link Layer Discovery 0 0 0 0 1 0
Protocol (LLDP) MIB
IEEE, 802.3ad, Aggregation of Multiple Link 1 1 1 1 1 1 1 1
Segments
Supported tables and objects:
• dot3adAggPortTable, dot3adAggPortListTable,
dot3adAggTable, and dot3adAggPortStatsTable
• dot3adAggPortDebugTable (only
dot3adAggPortDebugRxState,
dot3adAggPortDebugMuxState,
dot3adAggPortDebugActorSyncTransitionCount,
dot3adAggPortDebugPartnerSyncTransitionCount,
dot3adAggPortDebugActorChangeCount, and
dot3adAggPortDebugPartnerChangeCount)
• dot3adTablesLastChanged
NOTE: Gigabit Ethernet interfaces on J Series
Services Routers do not support the 802.3ad MIB.
RFC 1155, Structure and Identification of 1 1 1 1 1 1 1 1
Management Information for TCP/IP-based
Internets
RFC 1157, A Simple Network Management Protocol 1 1 1 1 1 1 1 1
(SNMP)
RFC 1195, Use of OSI IS-IS for Routing in TCP/IP 1 1 1 1 1 1 1 1
and Dual Environments (only the objects
isisSystem, isisMANAreaAddr, isisAreaAddr,
isisSysProtSupp, isisSummAddr, isisCirc,
isisCircLevel, isisPacketCount, isisISAdj,
isisISAdjAreaAddr, isisAdjIPAddr,
isisISAdjProtSupp, isisRa, and isisIPRA are
supported)
RFC 1212, Concise MIB Definitions 1 1 1 1 1 0 0 1
Copyright © 2010, Juniper Networks, Inc. 13
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 1213, Management Information Base for 1 1 1 1 1 0 0 1
Network Management of TCP/IP-Based Internets:
MIB-II. Junos OS supports the following areas:
• MIB II and its SNMP version 2 derivatives,
including:
• Statistics counters
• IP, except for ipRouteTable, which has been
replaced by ipCidrRouteTable (RFC 2096, IP
Forwarding Table MIB)
• SNMP management
• Interface management
• SNMPv1 Get, GetNext requests, and version 2
GetBulk request
• Junos OS-specific secured access list
• Master configuration keywords
• Reconfigurations upon SIGHUP
RFC 1215, A Convention for Defining Traps for use 1 1 1 1 1 0 0 1
with the SNMP (only MIB II SNMP version 1 traps
and version 2 notifications)
RFC 1406, Definitions of Managed Objects for the 1 1 1 0 0 1 0 0
DS1 and E1 Interface Types (T1 MIB is supported)
RFC 1407, Definitions of Managed Objects for the 1 1 1 0 0 0 0 0
DS3/E3 Interface Type (T3 MIB is supported)
RFC 1657, Definitions of Managed Objects for the 1 1 1 1 1 0 0 0
Fourth Version of the Border Gateway Protocol
(BGP-4) using SMIv2
RFC 1695, Definitions of Managed Objects for ATM 1 1 1 0 0 0 0 0
Management Version 8.0 Using SMIv2
RFC 1850, OSPF Version 2 Management 1 1 1 1 1 1 0 0
Information Base (except for the
ospfOriginateNewLsas and ospfRxNewLsas
objects, the Host Table, and the traps
ospfOriginateLSA, ospfLsdbOverflow, and
ospfLsdbApproachingOverflow)
RFC 1901, Introduction to Community-based 1 1 1 1 1 1 1 1
SNMPv2
14 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 2011, SNMPv2 Management Information Base 1 1 1 1 1 0 0 0
for the Internet Protocol Using SMIv2
RFC 2012, SNMPv2 Management Information Base 1 1 1 1 1 1 0 1
for the Transmission Control Protocol Using SMIv2
RFC 2013, SNMPv2 Management Information Base 1 1 1 1 1 1 0 1
for the User Datagram Protocol Using SMIv2
RFC 2024, Definitions of Managed Objects for Data 1 1 1 1 0 0 0 0
Link Switching Using SMIv2 (except for the
dlswInterface and dlswSdlc object groups; the
dlswDirLocateMacTable, dlswDirNBTable, and
dlswDirLocateNBTable tables; the
dlswCircuitDiscReasonLocal and
dlswCircuitDiscReasonRemote tabular objects;
and the dlswDirMacCacheNextIndex and
dlswDirNBCacheNextIndex scalar objects;
read-only access)
RFC 2096, IP Forwarding Table MIB (The 1 1 1 1 1 0 0 1
ipCidrRouteTable has been extended to include
the tunnel name when the next hop is through an
RSVP-signaled LSP.)
RFC 2115, Management Information Base for Frame 1 1 1 1 0 1 0 0
Relay DTEs Using SMIv2 (frDlcmiTable only;
frCircuitTable and frErrTable are not supported)
RFC 2233, The Interfaces Group MIB Using SMIv2 1 1 1 1 1 1 0 1
NOTE: RFC 2233 has been replaced by RFC 2863,
IF MIB. However, Junos OS supports both RFC
2233 and RFC 2863.
RFC 2287, Definitions of System-Level Managed 1 1 1 1 1 1 0 1
Objects for Applications (only the objects
sysApplInstallPkgTable, sysApplInstallElmtTable,
sysApplElmtRunTable, and sysApplMapTable)
RFC 2465, Management Information Base for IP 1 1 1 1 0 1 0 0
Version 6: Textual Conventions and General Group
(except for IPv6 interface statistics)
Copyright © 2010, Juniper Networks, Inc. 15
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 2495, Definitions of Managed Objects for the 1 1 1 0 0 1 0 0
DS1, E1, DS2, and E2 Interface Types (except for
dsx1FarEndConfigTable, dsx1FarEndCurrentTable,
dsx1FarEndIntervalTable, dsx1FarEndTotalTable,
and dsx1FracTable)
RFC 2515, Definitions of Managed Objects for ATM 1 1 1 0 0 0 0 0
Management (except atmVpCrossConnectTable,
atmVcCrossConnectTable, and aal5VccTable)
RFC 2570, Introduction to Version 3 of the 1 1 1 1 1 0 0 1
Internet-standard Network Management
Framework
RFC 2571, An Architecture for Describing SNMP 1 1 1 1 1 1 0 1
Management Frameworks (read-only access)
NOTE: RFC 2571 has been replaced by RFC 3411.
However, Junos OS supports both RFC 2571 and
RFC 3411.
RFC 2572, Message Processing and Dispatching 1 1 1 1 1 1 0 1
for the Simple Network Management Protocol
(SNMP) (read-only access)
NOTE: RFC 2572 has been replaced by RFC 3412.
However, Junos OS supports both RFC 2572 and
RFC 3412.
RFC 2576, Coexistence between Version 1, Version 1 1 1 1 1 1 0 1
2, and Version 3 of the Internet-standard Network
Management Framework
NOTE: RFC 2576 has been replaced by RFC 3584.
However, Junos OS supports both RFC 2576 and
RFC 3584.
RFC 2578, Structure of Management Information 1 1 1 1 1 0 0 1
Version 2 (SMIv2)
RFC 2579, Textual Conventions for SMIv2 1 1 1 1 1 0 0 1
RFC 2580, Conformance Statements for SMIv2 1 1 1 1 1 0 0 1
RFC 2662, Definitions of Managed Objects for 1 1 1 1 0 1 0 0
ADSL Lines (J Series Services Routers. All MIB
tables, objects, and traps are applicable for the
ADSL ATU-R agent.)
16 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 2665, Definitions of Managed Objects for the 1 1 1 1 1 1 0 1
Ethernet-like Interface Types
RFC 2787, Definitions of Managed Objects for the 1 1 1 1 1 1 0 1
Virtual Router Redundancy Protocol (except row
creation, the Set operation, and the object
vrrpStatsPacketLengthErrors)
RFC 2790, Host Resources MIB 1 1 1 1 1 1 0 1
• Only the hrStorageTable. The file systems /,
/config, /var, and /tmp always return the same
index number. When SNMP restarts, the index
numbers for the remaining file systems might
change.
• Only the objects of the hrSystem and
hrSWInstalled groups.
RFC 2819, Remote Network Monitoring 1 1 1 1 1 1 0 1
Management Information Base
• etherStatsTable (for Ethernet interfaces
only),alarmTable, eventTable, and logTable are
supported on all devices running Junos OS.
• historyControlTable and etherHistoryTable
(except etherHistoryUtilization object) are
supported only on EX Series switches.
RFC 2863, The Interfaces Group MIB 1 1 1 1 1 0 0 1
NOTE: RFC 2863 replaces RFC 2233. However,
Junos OS supports both RFC 2233 and RFC 2863.
RFC 2864, The Inverted Stack Table Extension to 1 1 1 1 0 0 0 1
the Interfaces Group MIB
RFC 2922, The Physical Topology (PTOPO) MIB 0 0 0 0 1 1 0 1
RFC 2925, Definitions of Managed Objects for 1 1 1 1 1 1 0 1
Remote Ping, Traceroute, and Lookup Operations
(only the objects pingCtlTable, pingResultsTable,
pingProbeHistoryTable,
pingMaxConcurrentRequests, traceRouteCtlTable,
traceRouteResultsTable,
traceRouteProbeHistoryTable, and
traceRouteHopsTable)
RFC 2932, IPv4 Multicast Routing MIB 1 1 1 1 1 1 0 1
Copyright © 2010, Juniper Networks, Inc. 17
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 2933, Internet Group Management Protocol 1 1 1 1 1 1 0 0
(IGMP) MIB
RFC 2934, Protocol Independent Multicast MIB for 1 1 1 1 1 1 0 0
IPv4
RFC 2981, Event MIB 1 1 1 1 0 0 0 0
RFC 3014, Notification Log MIB 1 1 1 1 0 0 0 0
RFC 3019, IP Version 6 Management Information 1 1 1 1 0 0 0 1
Base for The Multicast Listener Discovery Protocol
RFC 3410 Introduction and Applicability 1 1 1 1 1 0 0 1
Statements for Internet-Standard Management
Framework
RFC 3411, An Architecture for Describing Simple 1 1 1 1 1 0 0 1
Network Management Protocol (SNMP)
Management Frameworks
NOTE: RFC 3411 replaces RFC 2571. However,
Junos OS supports both RFC 3411 and RFC 2571.
RFC 3412, Message Processing and Dispatching 1 1 1 1 1 0 0 1
for the Simple Network Management Protocol
(SNMP)
NOTE: RFC 3412 replaces RFC 2572. However,
Junos OS supports both RFC 3412 and RFC 2572.
RFC 3413, Simple Network Management Protocol 1 1 1 1 1 1 0 1
(SNMP) Applications (except for the Proxy MIB)
RFC 3414, User-based Security Model (USM) for 1 1 1 1 1 0 0 1
version 3 of the Simple Network Management
Protocol (SNMPv3)
RFC 3415, View-based Access Control Model 1 1 1 1 1 0 0 1
(VACM) for the Simple Network Management
Protocol (SNMP)
18 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 3416, Version 2 of the Protocol Operations for 1 1 1 1 1 0 0 1
the Simple Network Management Protocol
(SNMP)
NOTE: RFC 3416 replaces RFC 1905, which was
supported in earlier versions of Junos OS.
RFC 3417, Transport Mappings for the Simple 1 1 1 1 1 1 0 1
Network Management Protocol (SNMP)
RFC 3418, Management Information Base (MIB) 1 1 1 1 1 0 0 1
for the Simple Network Management Protocol
(SNMP)
NOTE: RFC 3418 replaces RFC 1907, which was
supported in earlier versions of Junos OS.
RFC 3498, Definitions of Managed Objects for 1 1 1 0 0 0 0 0
Synchronous Optical Network (SONET) Linear
Automatic Protection Switching (APS)
Architectures (implemented under the Juniper
Networks enterprise branch [jnxExperiment])
RFC 3584 Coexistence between Version 1, Version 1 1 1 1 1 0 0 1
2, and Version 3 of the Internet-standard Network
Management Framework
RFC 3591 Managed Objects for the Optical 1 1 1 0 0 0 0 0
Interface Type
optIfOTMnTable (except optIfOTMnOpticalReach,
optIfOTMnInterfaceType, and optIfOTMnOrder),
optIfOChConfigTable (except
optIfOChDirectionality and
optIfOChCurrentStatus), optIfOTUkConfigTable
(except optIfOTUkTraceIdentifierAccepted,
optIfOTUkTIMDetMode, optIfOTUkTIMActEnabled,
optIfOTUkTraceIdentifierTransmitted,
optIfOTUkDEGThr, optIfOTUkDEGM,
optIfOTUkSinkAdaptActive, and
optIfOTUkSourceAdaptActive), and
optIfODUkConfigTable (except
optIfODUkPositionSeqCurrentSize and
optIfODUkTtpPresent)
RFC 3592, Definitions of Managed Objects for the 1 1 1 1 0 0 0 0
Synchronous Optical Network/Synchronous Digital
Hierarchy (SONET/SDH) Interface Type
Copyright © 2010, Juniper Networks, Inc. 19
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 3621, Power Ethernet MIB 0 0 0 0 1 0 0 0
RFC 3637, Definitions of Managed Objects for the 1 1 1 1 0 0 0 0
Ethernet WAN Interface Sublayer (except
etherWisDeviceTable,
etherWisSectionCurrentTable, and
etherWisFarEndPathCurrentTable)
RFC 3811, Definitions of Textual Conventions (TCs) 1 1 1 1 0 1 0 0
for Multiprotocol Label Switching (MPLS)
Management
RFC 3812, Multiprotocol Label Switching (MPLS) 1 1 1 1 0 0 0 0
Traffic Engineering (TE) Management Information
Base (MIB) (read only access)
• MPLS tunnels as interfaces are not supported.
• The following objects in the TunnelResource
table are not supported:
mplsTunnelResourceMeanRate,
mplsTunnelResourceMaxBurstSize,
mplsTunnelResourceMeanBurstSize,
mplsTunnelResourceExBurstSize,
mplsTunnelResourceWeight.
• mplsTunnelPerfTable and
mplsTunnelCRLDPResTable are not supported.
• mplsTunnelCHopTable supported on ingress
routers only.
NOTE: The branch used by the proprietary LDP
MIB (ldpmib.mib) conflicts with RFC 3812.
ldpmib.mib has been deprecated and replaced
by jnx-mpls-ldp.mib.
RFC 3813, Multiprotocol Label Switching (MPLS) 1 1 1 1 0 1 0 0
Label Switching Router (LSR) Management
Information Base (MIB) (read-only access)
mplsInterfacePerfTable, mplsInSegmentPerfTable,
mplsOutSegmentPerfTable,
mplsInSegmentMapTable, mplsXCUp, and
mplsXCDown are not supported.
RFC 3815, Definitions of Managed Objects for the 1 1 1 1 0 0 0 0
Multiprotocol Label Switching (MPLS), Label
Distribution Protocol (LDP) (only mplsLdpLsrID
and mplsLdpSesPeerAddrTable)
20 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 3826, The Advanced Encryption Standard 1 1 1 1 1 0 0 1
(AES) Cipher Algorithm in the SNMP User-based
Security Model
RFC 3896, Definitions of Managed Objects for the 1 1 1 0 0 0 0 0
DS3/E3 Interface Type (except
dsx3FarEndConfigTable, dsx3FarEndCurrentTable,
dsx3FarEndIntervalTable, dsx3FarEndTotalTable,
and dsx3FracTable)
RFC 4188, Definitions of Managed Objects for 0 0 0 1 1 0 0 0
Bridges—Supports 802.1D STP(1998). Supports
only the following subtrees and objects:
• dot1dStp subtree is supported on MX Series
Ethernet Services Routers.
• dot1dTpFdbAddress, dot1dTpFdbPort, and
dot1dTpFdbStatus objects from the
dot1dTpFdbTable of the dot1dTp subtree are
supported on EX Series Ethernet Switches.
NOTE: dot1dTpLearnedEntryDiscards and
dot1dTpAgingTime objects are supported on M
and T Series routers.
RFC 4318, Definitions of Managed Objects for 1 1 1 1 1 0 0 0
Bridges with Rapid Spanning Tree
Protocol—Supports 802.1w and 802.1t extensions
for RSTP.
RFC 4363b, Q-Bridge VLAN MIB 0 0 0 1 1 0 0 0
RFC 4801, Definitions of Textual Conventions for 1 1 1 1 0 0 0 0
Generalized Multiprotocol Label Switching
(GMPLS) Management Information Base (MIB)
(read-only access)
RFC 4802, Generalized Multiprotocol Label 1 1 1 1 0 0 0 0
Switching (GMPLS) Traffic Engineering (TE)
Management Information Base (MIB) (read-only
access. gmplsTunnelReversePerfTable,
gmplsTeScalars, gmplsTunnelTable,
gmplsTunnelARHopTable,
gmplsTunnelCHopTable, and
gmplsTunnelErrorTable are not supported.)
Copyright © 2010, Juniper Networks, Inc. 21
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
RFC 4803, Generalized Multiprotocol Label 1 1 1 1 0 0 0 0
Switching (GMPLS) Label Switching Router (LSR)
Management Information Base (MIB) (read-only
access. gmplsLabelTable and
gmplsOutsegmentTable are not supported.)
NOTE: The tables in GMPLS TE (RFC 4802) and
LSR (RFC 4803) MIBs are extensions of the
corresponding tables from the MPLS TE (RFC
3812) and LSR (RFC 3813) MIBs and use the same
index as the MPLS MIB tables.
Internet Assigned Numbers Authority, IANAiftype 1 1 1 1 1 1 0 0
Textual Convention MIB (referenced by RFC 2233,
available at
http://www.iana.org/assignments/ianaiftype-mib)
Internet draft 1 1 1 1 0 0 0 0
draft-ietf-atommib-sonetaps-mib-10.txt,
Definitions of Managed Objects for SONET Linear
APS Architectures (as defined under the Juniper
Networks enterprise branch [jnxExperiment] only)
Internet draft draft-ieft-bfd-mib-02.txt, 1 1 1 1 1 0 0 1
Bidirectional Forwarding Detection Management
Information Base (Represented by
mib-jnx-bfd-exp.txt and implemented under the
Juniper Networks enterprise branch
[jnxExperiment]. Read only. Includes bfdSessUp
and bfdSessDown traps. Does not support
bfdSessPerfTable and bfdSessMapTable.)
Internet draft draft-ietf-idmr-igmp-mib-13.txt, 1 1 1 1 1 0 0 1
Internet Group Management Protocol (IGMP) MIB
Internet draft draft-ietf-idr-bgp4-mibv2-04.txt, 1 1 1 1 1 0 0 1
Definitions of Managed Objects for the Fourth
Version of Border Gateway Protocol (BGP-4),
Second Version (only jnxBgpM2PrefixInPrefixes,
jnxBgpM2PrefixInPrefixesAccepted, and
jnxBgpM2PrefixInPrefixesRejected objects)
Internet draft 1 1 1 1 1 0 0 1
draft-reeder-snmpv3-usm-3desede-00.txt,
Extension to the User-Based Security Model (USM)
to Support Triple-DES EDE in ‘Outside’ CBC Mode
22 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Table 4: Standard MIBs Supported on Devices Running Junos OS (continued)
Platforms
SRX
MIB/RFC M T J MX EX Low-End Mid-Range High-End
Internet draft draft-ietf-isis-wg-mib-07.txt, 1 1 1 1 1 1 0 0
Management Information Base for IS-IS, (only
isisISAdjTable, isisISAdjAreaAddrTable,
isisISAdjIPAddrTable, and isisISAdjProtSuppTable)
Internet draft 1 1 1 1 0 0 0 0
draft-ietf-ppvpn-mpls-vpn-mib-04.txt,
MPLS/BGP Virtual Private Network Management
Information Base Using SMIv2 (only
mplsVpnScalars, mplsVpnVrfTable,
mplsVpnPerTable, and
mplsVpnVrfRouteTargetTable)
Internet draft draft-ietf-ospf-ospfv3-mib-11.txt, 1 1 1 1 0 0 0 1
Management Information Base for OSPFv3
(Represented by mib-jnx-ospfv3mib.txt and
implemented under the Juniper Networks
enterprise branch {jnxExperiment}. Support for
ospfv3NbrTable only. Read only. Object names
are prefixed by jnx. For example,
jnxOspfv3NbrTable, jnxOspfv3NbrAddressType,
and jnxOspfv3NbrPriority.)
Internet draft draft-ietf-idmr-pim-mib-09.txt, 1 1 1 1 1 0 0 1
Protocol Independent Multicast (PIM) MIB
ESO Consortium MIB, which can be found at 1 1 1 1 1 1 0 0
http://www.snmp.com/eso/
NOTE: The ESO Consortium MIB has been
replaced by RFC 3826.
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Loading MIB Files to a Network Management System on page 35
Juniper Networks Enterprise-Specific MIBs
Junos OS supports the following enterprise-specific MIBs:
Copyright © 2010, Juniper Networks, Inc. 23
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• AAA Objects MIB—Provides support for monitoring user authentication, authorization,
and accounting through the RADIUS, LDAP, SecurID, and local authentication servers.
This MIB is currently supported by Junos OS for J Series and SRX Series devices only.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-user-aaa.txt
.
For more information, see AAA Objects MIB.
• Access Authentication Objects MIB—Provides support for monitoring firewall
authentication, including data about the users trying to access firewall-protected
resources and the firewall authentication service itself. This MIB is currently supported
by Junos OS for J Series and SRX Series devices only. For a downloadable version of
this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-auth.txt
.
For more information, see “Access Authentication Objects MIB” on page 161.
• Alarm MIB—Provides support for alarms from the router. For a downloadable version
of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-chassis-alarm.txt
.
For more information, see “Alarm MIB” on page 165.
• Analyzer MIB—Contains analyzer and remote analyzer data related to port mirroring
on the EX Series Ethernet Switches. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-analyzer.txt
.
For more information, see Analyzer MIB.
• Antivirus Objects MIB—Provides information about the antivirus engine, antivirus scans,
and antivirus scan-related traps. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-utm-av.txt
.
For more information, see Antivirus Objects MIB.
• ATM CoS MIB—Provides support for monitoring Asynchronous Transfer Mode, version
2 (ATM2) virtual circuit (VC) class-of-service (CoS) configurations. It also provides
CoS queue statistics for all VCs that have CoS configured. For a downloadable version
of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-atm-cos.txt
.
For more information, see ATM Class-of-Service MIB.
• ATM MIB—Provides support for ATM interfaces and virtual connections. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-atm.txt
.
For more information, see ATM MIB.
24 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
• BFD MIB—Provides support for monitoring Bidirectional Forwarding Detection (BFD)
sessions. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-bfd.txt
.
For more information, see “Bidirectional Forwarding Detection (BFD) MIB” on page 171.
• BGP4 V2 MIB—Contains objects used to monitor BGP peer-received prefix counters.
It is based upon similar objects in the MIB documented in Internet draft
draft-ietf-idr-bgp4-mibv2-03.txt, Definitions of Managed Objects for the Fourth Version
of BGP (BGP-4), Second Version. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-bgpmib2.txt
.
For more information, see “BGP4 V2 MIB” on page 169.
• Chassis MIB—Provides support for environmental monitoring (power supply state,
board voltages, fans, temperatures, and air flow) and inventory support for the chassis,
System Control Board (SCB), System and Switch Board (SSB), Switching and
Forwarding Module (SFM), Flexible PIC Concentrators (FPCs), and PICs. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-chassis.txt
.
For more information, see Chassis MIBs.
• Chassis Definitions for Router Model MIB—Contains the object identifiers (OIDs) that
are used by the Chassis MIB to identify platform and chassis components. The Chassis
MIB provides information that changes often, whereas the Chassis Definitions for Router
Model MIB provides information that changes less often. For a downloadable version
of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-chas-defines.txt
.
For more information, see “BGP4 V2 MIB” on page 169.
• Chassis Forwarding MIB—Enables J Series Services Routers to fully support the Junos
OS health monitor. This MIB extends the scope of health monitoring to include Junos
forwarding process (fwdd) components. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-chassis-fwdd.txt
.
For more information, see Chassis Forwarding MIB.
• Class-of-Service MIB—Provides support for monitoring interface output queue statistics
per interface and per forwarding class. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-cos.txt
.
For more information, see Class-of-Service MIB.
• Configuration Management MIB—Provides notification for configuration changes as
SNMP traps. Each trap contains the time at which the configuration change was
committed, the name of the user who made the change, and the method by which the
change was made. A history of the last 32 configuration changes is kept in
Copyright © 2010, Juniper Networks, Inc. 25
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxCmChgEventTable. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-cfgmgmt.txt
.
For more information, see “Configuration Management MIB” on page 269.
• Digital Optical Monitoring MIB—Provides support for the SNMP Get request for statistics
and SNMP Trap notifications for alarms. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-dom.txt
.
For more information, see Digital Optical Monitoring MIB.
• Destination Class Usage MIB—Provides support for monitoring packet counts based
on the ingress and egress points for traffic transiting your networks. Ingress points are
identified by input interface. Egress points are identified by destination prefixes grouped
into one or more sets, known as destination classes. One counter is managed per
interface per destination class, up to a maximum of 16 counters per interface. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-dcu.txt
.
For more information, see Destination Class Usage MIB.
• DNS Objects MIB—Provides support for monitoring DNS proxy queries, requests,
responses, and failures. This MIB is currently supported by Junos OS for J Series and
SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-dns.txt
.
For more information, see DNS Objects MIB.
• Dynamic Flow Capture MIB—Provides support for monitoring the operational status
of dynamic flow capture PICs. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-dfc.txt
.
For more information, see Dynamic Flow Capture MIB.
• Ethernet MAC MIB—Monitors media access control (MAC) statistics on Gigabit Ethernet
intelligent queuing (IQ) interfaces. It collects MAC statistics; for example, inoctets,
inframes, outoctets, and outframes on each source MAC address and virtual LAN (VLAN)
ID for each Ethernet port. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/jnx-mac.txt
.
For more information, see “Ethernet MAC MIB” on page 275.
• Event MIB—Defines a generic trap that can be generated using an op script or event
policy. This MIB provides the ability to specify a system log string and raise a trap if
that system log string is found. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-event.txt
.
For more information, see “Event MIB” on page 277.
26 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
• Experimental MIB—Contains object identifiers for experimental MIBs. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-exp.txt
.
For more information, see “jnxExperiment” on page 158.
• Firewall MIB—Provides support for monitoring firewall filter counters. Routers must
have the Internet Processor II ASIC to perform firewall monitoring. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-firewall.txt
.
For more information, see “Firewall MIB” on page 279.
• Flow Collection Services MIB—Provides statistics on files, records, memory, FTP, and
error states of a monitoring services interface. It also provides SNMP traps for
unavailable destinations, unsuccessful file transfers, flow overloading, and memory
overloading. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-coll.txt
.
For more information, see Flow Collection Services MIB.
• Host Resources MIB—Extends the hrStorageTable object, providing a measure of the
usage of each file system on the router in percentage. Previously, the objects in the
hrStorageTable measured the usage in allocation units—hrStorageUsed and
hrStorageAllocationUnits—only. Using the percentage measurement, you can more
easily monitor and apply thresholds on usage. For a downloadable version of this MIB,
see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-hostresources.txt
.
For more information, see “Host Resources MIB” on page 283.
• SNMP IDP Objects MIB—Provides support for monitoring SNMP IDP queries, requests,
responses, and failures. This MIB defines the key monitoring and threshold crossing
trap support, IDP database update status and trap support, attack-related monitoring
and trap support for SRX100, SRX210, SRX220, SRX240, and SRX650 Services
Gateways. This MIB models IDP attributes specific to the appropriate Juniper Networks
implementation. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-idp.txt.
For more information, see “IDP MIB” on page 387.
• Interface MIB—Extends the standard ifTable (RFC 2863) with additional statistics and
Juniper Networks enterprise-specific chassis information. For a downloadable version
of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-if-extensions.txt
.
For more information, see “Interface MIB” on page 285.
• IP Forward MIB—Extends the standard IP Forwarding Table MIB (RFC 2096) to include
CIDR forwarding information. For a downloadable version of this MIB, see
Copyright © 2010, Juniper Networks, Inc. 27
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipforward.txt
.
For more information, see “IP Forward MIB” on page 291.
• IPsec Monitoring MIB—Provides operational and statistical information related to the
IPsec and IKE tunnels on Juniper Networks routers. For a downloadable version of this
MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipsec-monitor.txt
.
For more information, see “IPSec Monitoring MIB” on page 309.
• IPsec Generic Flow Monitoring Object MIB—Based on jnx-ipsec-monitor-mib, this MIB
provides support for monitoring IPsec and IPsec VPN management objects. This MIB
is currently supported by Junos OS for J Series and SRX Series devices only. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipsec-flow-mon.txt
.
For more information, see “IPsec Generic Flow Monitoring Object MIB” on page 293.
• IPsec VPN Objects MIB—Provides support for monitoring IPsec and IPsec VPN
management objects for Juniper security product lines. This MIB is an extension of
jnx-ipsec-flow-mon.mib. This MIB is currently supported by Junos OS for J Series and
SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-ipsec-vpn.txt
.
For more information, see IPsec VPN Objects MIB.
• IPv4 MIB—Provides additional Internet Protocol version 4 (IPv4) address information,
supporting the assignment of identical IPv4 addresses to separate interfaces. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipv4.txt
.
For more information, see “IPv4 MIB” on page 317.
• IPv6 and ICMPv6 MIB—Provides IPv6 and Internet Control Message Protocol version
6 (ICMPv6) statistics. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipv6.txt
. For more information, see “IPv6 MIB Overview” on page 319.
• L2ALD MIB—Contains information about Layer 2 Address Learning Daemon and related
traps, such as the routing instance MAC limit trap and the interface MAC limit trap. For
a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-l2ald.txt
.
For more information, see L2ALD MIB.
• L2CP Features MIB—Provides information about Layer 2 Control Protocols-based
features on MX Series Ethernet Services Routers. Currently, Junos OS supports only
the jnxDot1dStpPortRootProtectEnabled, jnxDot1dStpPortRootProtectState, and
jnxPortRootProtectStateChangeTrap objects. For a downloadable version of this MIB,
28 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-l2cp-features.txt
.
For more information, see Layer 2 Control Protocol (L2CP) MIB.
• L2TP MIB—Provides information about Layer 2 Transport Protocol (L2TP) tunnels and
sessions. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-l2tp.txt
.
For more information, see Layer 2 Transport Protocol (L2TP) MIB.
• LDP MIB—Provides LDP statistics and defines LDP label-switched path (LSP)
notifications. LDP traps support only IPv4 standards. For a downloadable version of
this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ldp.txt
.
For more information, see LDP MIB.
• Multiple Instance Multiple Spanning Tree Protocol (MIMSTP) MIB—Provides information
about MSTP instances (that is, routing instances of type Virtual Switch/Layer 2 control,
also known as virtual contexts), MSTIs within the MSTP instance, and VLANs associated
with the MSTI. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-mimstp.txt
.
For more information, see MIMSTP MIB.
• MPLS MIB—Provides MPLS information and defines MPLS notifications. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-mpls.txt
.
NOTE: To collect information about MPLS statistics on transit routers, use
the enterprise-specific RSVP MIB (mib-jnx-rsvp.txt) instead of the
enterprise-specific MPLS MIB (mib-jnx-mpls.txt).
For more information, see MPLS MIB.
• MPLS LDP MIB—Contains object definitions as described in RFC 3815, Definitions of
Managed Objects for the Multiprotocol Label Switching (MPLS), Label Distribution
Protocol (LDP). For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-mpls-ldp.txt
.
Copyright © 2010, Juniper Networks, Inc. 29
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NOTE: Objects in the MPLS LDP MIB were supported in earlier releases of
Junos OS as a proprietary LDP MIB (mib-ldpmib.txt). Because the branch
used by the proprietary LDP (mib-ldpmib.txt) conflicts with RFC 3812, the
proprietary LDP MIB (mib-ldpmib.txt) has been deprecated and replaced
by the enterprise-specific MPLS LDP MIB (mib-jnx-mpls-ldp.txt).
For more information, see MPLS LDP MIB.
• Network Address Translation (NAT) Objects MIB—Provides support for monitoring
network address translation (NAT). This MIB is currently supported by Junos OS for J
Series and SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-nat.txt
.
For more information, see “Network Address Translation Objects MIB” on page 327.
• Optical Transport Network (OTN) MIB—Defines objects for managing OTN interfaces
on devices running Junos OS. For a downloadable version of the MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-otn.txt
.
For more information, see OTN Interface Management MIB.
• Packet Forwarding Engine MIB—Provides notification statistics for Packet Forwarding
Engines. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-pfe.txt
.
For more information, see “Packet Forwarding Engine MIB” on page 335.
• PAE Extension MIB—Extends the standard IEEE802.1x PAE Extension MIB, and contains
information for Static MAC Authentication. The enterprise-specific PAE Extension MIB
is supported only on EX Series Ethernet Switches. For a downloadable version of this
MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-pae-extension.txt
.
For more information, see PAE Extension MIB.
• Passive Monitoring MIB—Performs traffic flow monitoring and lawful interception of
packets transiting between two routers. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-pmon.txt
.
For more information, see Passive Monitoring MIB.
• Ping MIB—Extends the standard Ping MIB control table (RFC 2925). Items in this MIB
are created when entries are created in pingCtlTable of the Ping MIB. Each item is
indexed exactly as it is in the Ping MIB. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ping.txt
.
For more information, see “PING MIB” on page 339.
30 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
• Policy Objects MIB—Provides support for monitoring the security policies that control
the flow of traffic from one zone to another. This MIB is currently supported by Junos
OS for J Series and SRX Series devices only. For a downloadable version of this MIB,
see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-policy.txt
.
For more information, see “Policy Objects MIB” on page 355.
• Power Supply Unit MIB—Enables monitoring and managing of power supply on a device
running Junos OS. This MIB is currently supported only on EX Series Ethernet Switches.
For a downloadable version of this MIB, see For a downloadable version of this MIB,
see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-power-supply-unit.txt
.
For more information, see Power Supply Unit MIB.
• Pseudowire TDM MIB—Extends the standard Pseudowire MIB, and contains information
about configuration and statistics for specific pseudowire types. The enterprise-specific
Pseudowire TDM MIB is the Juniper Networks implementation of the standard Managed
Objects for TDM over Packet Switched Network MIB (draft-ietf-pwe3-tdm-mib-08.txt).
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-pwtdm.txt
.
• Real-Time Media MIB—Defines a Real-Time Media configuration. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/jnx-rtm.txt .
For more information, see “Real-Time Media MIB Overview” on page 361.
• Real-time Performance Monitoring Protocol (RPM) MIB—Provides real-time
performance-related data and enables you to access jitter measurements and
calculations using SNMP. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rpm.txt
.
For more information, see Real-Time Performance Monitoring (RPM) MIB.
• Reverse-Path-Forwarding MIB—Monitors statistics for traffic that is rejected because
of reverse-path-forwarding (RPF) processing. For a downloadable version of this MIB,
see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rpf.txt
.
NOTE: The enterprise-specific RPF MIB is not supported on EX Series
Ethernet Switches.
For more information, see “Reverse Path Forwarding MIB” on page 371.
Copyright © 2010, Juniper Networks, Inc. 31
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• RSVP traffic engineering (TE) MIB—Provides information about RSVP-traffic engineering
sessions that correspond to MPLS LSPs on transit routers in the service provider core
network. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rsvp.txt
.
NOTE: To collect information about MPLS statistics on transit routers, use
the enterprise-specific RSVP MIB (mib-jnx-rsvp.txt) instead of the
enterprise-specific MPLS MIB (mib-jnx-mpls.txt).
For more information, see RSVP MIB.
• RMON Events and Alarms MIB—Supports the Junos extensions to the standard Remote
Monitoring (RMON) Events and Alarms MIB (RFC 2819). The extension augments
alarmTable with additional information about each alarm. Two new traps are also
defined to indicate when problems are encountered with an alarm. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rmon.txt
.
For more information, see “RMON Events and Alarms MIB” on page 373.
• Security Interface Extension Objects MIB—Provides support for the security
management of interfaces. This MIB is currently supported by Junos OS for J Series
and SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-if-ext.txt
.
For more information, see “Security Interface Extension Objects MIB” on page 377.
• Security Screening Objects MIB—Defines the MIB for the Juniper Networks Enterprise
Firewall screen functionality. This MIB is currently supported by Junos OS for J Series
and SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-screening.txt
.
For more information, see Security Screening Objects MIB.
• Services PIC MIB—Provides statistics for Adaptive Services (AS) PICs and defines
notifications for AS PICs. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-sp.txt
.
For more information, see Services PIC MIB.
• SIP Common MIB—Defines objects that are common to all SIP entities. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/jnx-sipcommon.txt.
For more information, see “SIP Common MIB Overview” on page 381.
32 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
• SONET/SDH Interface Management MIB—Monitors the current alarm for each
SONET/SDH interface. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-sonet.txt
.
For more information, see SONET/SDH Interface Management MIB.
• SONET Automatic Protection Switching MIB—Monitors any SONET interface that
participates in Automatic Protection Switching (APS). For a downloadable version of
this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-sonetaps.txt
.
For more information, see SONET APS MIB.
• Source Class Usage MIB—Counts packets sent to customers by performing a lookup
on the IP source address and the IP destination address. The Source Class Usage (SCU)
MIB makes it possible to track traffic originating from specific prefixes on the provider
core and destined for specific prefixes on the customer edge. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-scu.txt
.
For more information, see Source Class Usage MIB.
• SPU Monitoring MIB—Provides support for monitoring SPUs on SRX5600 and SRX5800
devices. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-spu-monitoring.txt
.
For more information, see SPU Monitoring MIB.
• Structure of Management Information MIB—Explains how the Juniper Networks
enterprise-specific MIBs are structured. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-smi.txt
.
For more information, see “Structure of Management Information MIB” on page 153.
• Structure of Management Information MIB for EX Series Ethernet Switches—Defines
a MIB branch for switching-related MIB definitions for the EX Series Ethernet switches.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ex-smi.txt
.
For more information, see EX Series SMI MIB.
• Structure of Management Information MIB—Contains object identifiers (OIDs) for the
security branch of the MIBs used in Junos OS for J Series and SRX Series devices,
services and traps. This MIB is currently supported by Junos OS for J Series and SRX
Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-smi.txt
• System Log MIB—Enables notification of an SNMP trap-based application when an
important system log message occurs. For a downloadable version of this MIB, see
Copyright © 2010, Juniper Networks, Inc. 33
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-syslog.txt
.
For more information, see “System Log MIB” on page 389.
• Traceroute MIB—Supports the Junos extensions of traceroute and remote operations.
Items in this MIB are created when entries are created in the traceRouteCtlTable of
the Traceroute MIB. Each item is indexed exactly the same way as it is in the Traceroute
MIB. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-traceroute.txt
.
For more information, see “Traceroute MIB” on page 393.
• Utility MIB—Provides SNMP support for exposing Junos data and has tables that contain
information about each type of data, such as integer and string. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-util.txt
.
For more information, see “Utility MIB” on page 395.
• Virtual Chassis MIB—Contains information about virtual chassis on EX Series Ethernet
Switches. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-virtualchassis.txt
.
For more information, see Virtual Chassis MIB.
• VLAN MIB—Contains information about prestandard IEEE 802.10 VLANs and their
association with LAN emulation clients. The enterprise-specific VLAN MIB is supported
only on EX Series Ethernet Switches. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-vlan.txt
.
For more information, see VLAN MIB.
• VPN MIB—Provides monitoring for Layer 3 VPNs, Layer 2 VPNs, and virtual private LAN
service (VPLS) (read access only). For a downloadable version of the MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-vpn.txt
.
For more information, see VPN MIB.
• VPN Certificate Objects MIB—Provides support for monitoring the local and CA
certificates loaded on the router. This MIB is currently supported by Junos OS for J
Series and SRX Series devices only. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-cert.txt
.
For more information, see “VPN Certificate Objects MIB” on page 399.
Related • Standard SNMP MIBs Supported by Junos OS on page 12
Documentation
• Loading MIB Files to a Network Management System on page 35
34 Copyright © 2010, Juniper Networks, Inc.
Chapter 2: SNMP Overview
Loading MIB Files to a Network Management System
For your network management system (NMS) to identify and understand the MIB objects
used by Junos OS, you must first load the MIB files to your NMS using a MIB compiler. A
MIB compiler is a utility that parses the MIB information such as MIB object name, IDs,
and data type for the NMS.
You can download the Junos MIB package from the Enterprise-Specific MIBs and Traps
section of the Junos OS Technical Publications index page at
http://www.juniper.net/techpubs/software/junos/index.html. The Junos MIB package is
available in .zip and .tar packages; you can download the appropriate format based on
your requirements.
The Junos MIB package contains two folders, namely StandardMibs and JuniperMibs. The
StandardMibs folder contains the standard MIBs and RFCs that are supported on devices
running Junos OS, whereas the JuniperMibs folder contains the Juniper Networks
enterprise-specific MIBs.
To load MIB files that are required for managing and monitoring devices running Junos
OS:
1. Go to the Junos OS Technical Publications index page
(http://www.juniper.net/techpubs/software/junos/index.html).
2. Click the tab that corresponds to the Junos OS Release for which you want to download
the MIB files.
3. On the selected tab, click the + (plus) sign that corresponds to the Enterprise-Specific
MIBs and Traps section to expand the section.
4. Click the TAR or ZIP link that corresponds to the Enterprise MIBs link under the
Enterprise-Specific MIBs and Traps section to download the Junos MIB package.
5. Decompress the file (.tar or .zip) using an appropriate utility.
6. Load the standard MIB files (from the StandardMibs folder) in the following order:
NOTE: Some of the MIB compilers that are commonly used have the
standard MIBs preloaded on them. If the standard MIBs are already loaded
on the MIB compiler that you are using, skip this step and the next, and
proceed to Step 7.
a. mib-SNMPv2-SMI.txt
b. mib-SNMPv2-TC.txt
c. mib-IANAifType-MIB.txt
d. mib-IANA-RTPROTO-MIB.txt
e. mib-rfc1907.txt
Copyright © 2010, Juniper Networks, Inc. 35
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
f. mib-rfc2011a.txt
g. mib-rfc2012a.txt
h. mib-rfc2013a.txt
i. mib-rfc2863a.txt
7. Load the remaining standard MIB files.
NOTE: You must follow the order specified in this procedure, and ensure
that all standard MIBs are loaded before you load the enterprise-specific
MIBs. There may be dependencies that require a particular MIB to be
present on the compiler before loading some other MIB. You can find such
dependencies listed in the IMPORT section of the MIB file.
8. After loading the standard MIBs, load the Juniper Networks enterprise-specific SMI
MIB, mib-jnx-smi.txt and the following optional SMI MIBs based on your requirements.
• mib-jnx-js-smi.txt—(Optional) For Juniper Security MIB tree objects
• mib-jnx-ex-smi.txt—(Optional) For EX Series Ethernet Switches
• mib-jnx-exp.txt—(Recommended) For Juniper Networks experimental MIB objects
9. Load the remaining enterprise-specific MIBs from the JuniperMibs folder.
TIP: While loading a MIB file, if the compiler returns an error message saying
that any of the objects is undefined, open the MIB file using a text editor and
ensure that all the MIB files listed in the IMPORT section are loaded on the
compiler. If any of the MIB files listed in the IMPORT section is not loaded on
the compiler, load that MIB file, and then try to load the MIB file that failed
to load.
For example, the enterprise-specific PING MIB, mib-jnx-ping.txt, has
dependencies on RFC 2925, DiSMAN-PING-MIB, mib-rfc2925a.txt. If you try
to load mib-jnx-ping.txt before loading mib-rfc2925a.txt, the compiler returns
an error message saying that certain objects in mib-jnx-ping.txt are undefined.
Load mib-rfc2925a.txt, and then try to load mib-jnx-ping.txt. The
enterprise-specific PING MIB, mib-jnx-ping.txt, then loads without any issue.
Related • Standard SNMP MIBs Supported by Junos OS on page 12
Documentation
• Juniper Networks Enterprise-Specific MIBs on page 23
36 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 3
Configuring SNMP
This chapter contains the following topics:
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuring the System Contact on a Device Running Junos OS on page 40
• Configuring the System Location for a Device Running Junos OS on page 40
• Configuring the System Description on a Device Running Junos OS on page 41
• Filtering Duplicate SNMP Requests on page 41
• Configuring the Commit Delay Timer on page 42
• Configuring the System Name on page 42
• Configuring the SNMP Community String on page 43
• Adding a Group of Clients to an SNMP Community on page 44
• Configuring SNMP Trap Options and Groups on a Device Running Junos OS on page 45
• Configuring SNMP Trap Options on page 46
• Configuring SNMP Trap Groups on page 49
• Spoofing Enterprise-Specific SNMP Traps on page 51
• Configuring the Interfaces on Which SNMP Requests Can Be Accepted on page 52
• Filtering Interface Information Out of SNMP Get and GetNext Output on page 52
• Configuring MIB Views on page 53
• Tracing SNMP Activity on a Device Running Junos OS on page 54
• Configuring the Local Engine ID on page 57
Copyright © 2010, Juniper Networks, Inc. 37
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring SNMP on a Device Running Junos OS
By default, SNMP is disabled on devices running Junos OS. To enable SNMP on a router
or switch, you must include the SNMP configuration statements at the [edit snmp]
hierarchy level.
To configure the minimum requirements for SNMP, include the following statements at
the [edit snmp] hierarchy level of the configuration:
[edit]
snmp {
community public;
}
The community defined here as public grants read access to all MIB data to any client.
To configure complete SNMP features, include the following statements at the [edit
snmp] hierarchy level:
snmp {
client-list client-list-name {
ip-addresses;
}
community community-name {
authorization authorization;
client-list-name client-list-name;
clients {
address restrict;
}
routing-instance routing-instance-name {
clients {
addresses;
}
}
logical-system logical-system-name {
routing-instance routing-instance-name {
clients {
addresses;
}
}
}
view view-name;
}
contact contact;
description description;
engine-id {
(local engine-id | use-mac-address | use-default-ip-address);
}
filter-duplicates;
health-monitor {
falling-threshold integer;
interval seconds;
rising-threshold integer;
}
interface [ interface-names ];
38 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
location location;
name name;
nonvolatile {
commit-delay seconds;
}
rmon {
alarm index {
description text-description;
falling-event-index index;
falling-threshold integer;
falling-threshold-interval seconds;
interval seconds;
request-type (get-next-request | get-request | walk-request);
rising-event-index index;
sample-type type;
startup-alarm alarm;
syslog-subtag syslog-subtag;
variable oid-variable;
}
event index {
community community-name;
description text-description;
type type;
}
}
traceoptions {
file filename <files number> <size size> <world-readable | no-world-readable> <match
regular-expression>;
flag flag;
}
trap-group group-name {
categories {
category;
}
destination-port port-number;
routing-instance instance;
targets {
address;
}
version (all | v1 | v2);
}
trap-options {
agent-address outgoing-interface;
source-address address;
}
view view-name {
oid object-identifier (include | exclude);
}
}
Related • Understanding the SNMP Implementation in Junos OS on page 9
Documentation
• Configuration Statements at the [edit snmp] Hierarchy Level
• Complete SNMPv3 Configuration Statements
Copyright © 2010, Juniper Networks, Inc. 39
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring the System Contact on a Device Running Junos OS
You can specify an administrative contact for each system being managed by SNMP.
This name is placed into the MIB II sysContact object. To configure a contact name,
include the contact statement at the [edit snmp] hierarchy level:
[edit snmp]
contact contact;
If the name contains spaces, enclose it in quotation marks (" ").
To define a system contact name that contains spaces:
[edit]
snmp {
contact "Juniper Berry, (650) 555-1234";
}
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuring the System Location for a Device Running Junos OS on page 40
• Configuring the System Description on a Device Running Junos OS on page 41
• Configuring the System Name on page 42
• Configuration Statements at the [edit snmp] Hierarchy Level
Configuring the System Location for a Device Running Junos OS
You can specify the location of each system being managed by SNMP. This string is
placed into the MIB II sysLocation object. To configure a system location, include the
location statement at the [edit snmp] hierarchy level:
[edit snmp]
location location;
If the location contains spaces, enclose it in quotation marks (" ").
To specify the system location:
[edit]
snmp {
location "Row 11, Rack C";
}
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuring the System Contact on a Device Running Junos OS on page 40
• Configuring the System Description on a Device Running Junos OS on page 41
• Configuring the System Name on page 42
• Configuration Statements at the [edit snmp] Hierarchy Level
40 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
Configuring the System Description on a Device Running Junos OS
You can specify a description for each system being managed by SNMP. This string is
placed into the MIB II sysDescription object. To configure a description, include the
description statement at the [edit snmp] hierarchy level:
[edit snmp]
description description;
If the description contains spaces, enclose it in quotation marks (" ").
To specify the system description:
[edit]
snmp {
description "M40 router with 8 FPCs";
}
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuring the System Contact on a Device Running Junos OS on page 40
• Configuring the System Location for a Device Running Junos OS on page 40
• Configuring the System Name on page 42
• Configuration Statements at the [edit snmp] Hierarchy Level
Filtering Duplicate SNMP Requests
By default, filtering duplicate get, getNext, and getBulk SNMP requests is disabled on
devices running Junos OS. If a network management station retransmits a Get, GetNext,
or GetBulk SNMP request too frequently to the router, that request might interfere with
the processing of previous requests and slow down the response time of the agent.
Filtering these duplicate requests improves the response time of the SNMP agent. Junos
OS uses the following information to determine if an SNMP request is a duplicate:
• Source IP address of the SNMP request
• Source UDP port of the SNMP request
• Request ID of the SNMP request
To filter duplicate SNMP requests, include the filter-duplicates statement at the
[edit snmp] hierarchy level:
[edit snmp]
filter-duplicates;
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuring the Interfaces on Which SNMP Requests Can Be Accepted on page 52
• Filtering Interface Information Out of SNMP Get and GetNext Output on page 52
• Configuration Statements at the [edit snmp] Hierarchy Level
Copyright © 2010, Juniper Networks, Inc. 41
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring the Commit Delay Timer
When a router or switch first receives an SNMP nonvolatile Set request, a Junos OS XML
protocol session opens and prevents other users or applications from changing the
candidate configuration (equivalent to the command-line interface [CLI]
configure exclusive command). If the router does not receive new SNMP Set requests
within 5 seconds (the default value), the candidate configuration is committed and the
Junos OS XML protocol session closes (the configuration lock is released). If the router
receives new SNMP Set requests while the candidate configuration is being committed,
the SNMP Set request is rejected and an error is generated. If the router receives new
SNMP Set requests before 5 seconds have elapsed, the commit-delay timer (the length
of time between when the last SNMP request is received and the commit is requested)
resets to 5 seconds.
By default, the timer is set to 5 seconds. To configure the timer for the SNMP Set reply
and start of the commit, include the commit-delay statement at the
[edit snmp nonvolatile] hierarchy level:
[edit snmp nonvolatile]
commit-delay seconds;
seconds is the length of the time between when the SNMP request is received and the
commit is requested for the candidate configuration. For more information about the
configure exclusive command and locking the configuration, see the Junos OS CLI User
Guide.
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuration Statements at the [edit snmp] Hierarchy Level
Configuring the System Name
Junos OS enables you to override the system name by including the name statement at
the [edit snmp] hierarchy level:
[edit snmp]
name name;
If the name contains spaces, enclose it in quotation marks (" ").
To specify the system name override:
[edit]
snmp {
name "snmp 1";
}
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuring the System Contact on a Device Running Junos OS on page 40
• Configuring the System Location for a Device Running Junos OS on page 40
• Configuring the System Description on a Device Running Junos OS on page 41
42 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
• Configuration Statements at the [edit snmp] Hierarchy Level
Configuring the SNMP Community String
The SNMP community string defines the relationship between an SNMP server system
and the client systems. This string acts like a password to control the clients’ access to
the server. To configure a community string in a Junos OS configuration, include the
community statement at the [edit snmp] hierarchy level:
[edit snmp]
community name {
authorization authorization;
clients {
default restrict;
address restrict;
}
view view-name;
}
If the community name contains spaces, enclose it in quotation marks (" ").
The default authorization level for a community is read-only. To allow Set requests within
a community, you need to define that community as authorization read-write. For Set
requests, you also need to include the specific MIB objects that are accessible with
read-write privileges using the view statement. The default view includes all supported
MIB objects that are accessible with read-only privileges; no MIB objects are accessible
with read-write privileges. For more information about the view statement, see
“Configuring MIB Views” on page 53.
The clients statement lists the IP addresses of the clients (community members) that
are allowed to use this community. If no clients statement is present, all clients are
allowed. For address, you must specify an IPv4 or IPv6 address, not a hostname. Include
the default restrict option to deny access to all SNMP clients for which access is not
explicitly granted. We recommend that you always include the default restrict option to
limit SNMP client access to the local router.
NOTE: Community names must be unique. You cannot configure the same
community name at the [edit snmp community] and [edit snmp v3
snmp-community community-index] hierarchy levels.
Related • Adding a Group of Clients to an SNMP Community on page 44
Documentation
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
• Examples: Configuring the SNMP Community String
Copyright © 2010, Juniper Networks, Inc. 43
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Adding a Group of Clients to an SNMP Community
Junos OS enables you to add one or more groups of clients to an SNMP community. You
can include the client-list-name name statement at the [edit snmp community
community-name] hierarchy level to add all the members of the client list or prefix list to
an SNMP community.
To define a list of clients, include the client-list statement followed by the IP addresses
of the clients at the [edit snmp] hierarchy level:
[edit snmp]
client-list client-list-name {
ip-addresses;
}
You can configure a prefix list at the [edit policy options] hierarchy level. Support for
prefix lists in the SNMP community configuration enables you to use a single list to
configure the SNMP and routing policies. For more information about the prefix-list
statement, see the Junos OS Policy Framework Configuration Guide.
To add a client list or prefix list to an SNMP community, include the client-list-name
statement at the [edit snmp community community-name] hierarchy level:
[edit snmp community community-name]
client-list-name client-list-name;
NOTE: The client list and prefix list must not have the same name.
The following example shows how to define a client list:
[edit]
snmp {
client-list clentlist1 {
10.1.1.1/32;
10.2.2.2/32;
}
}
The following example shows how to add a client list to an SNMP community:
[edit]
snmp {
community community1 {
authorization read-only;
client-list-name clientlist1;
}
}
The following example shows how to add a prefix list to an SNMP community:
[edit]
policy-options {
prefix-list prefixlist {
10.3.3.3/32;
44 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
10.5.5.5/32;
}
}
snmp {
community community2 {
client-list-name prefixlist;
}
}
Configuring SNMP Trap Options and Groups on a Device Running Junos OS
Some carriers have more than one trap receiver that forwards traps to a central NMS.
This allows for more than one path for SNMP traps from a router to the central NMS
through different trap receivers. A device running Junos OS can be configured to send
the same copy of each SNMP trap to every trap receiver configured in the trap group.
The source address in the IP header of each SNMP trap packet is set to the address of
the outgoing interface by default. When a trap receiver forwards the packet to the central
NMS, the source address is preserved. The central NMS, looking only at the source address
of each SNMP trap packet, assumes that each SNMP trap came from a different source.
In reality, the SNMP traps came from the same router, but each left the router through
a different outgoing interface.
The statements discussed in the following sections are provided to allow the NMS to
recognize the duplicate traps and to distinguish SNMPv1 traps based on the outgoing
interface.
To configure SNMP trap options and trap groups, include the trap-options and trap-group
statements at the [edit snmp] hierarchy level:
[edit snmp]
trap-options {
agent-address outgoing-interface;
source-address address;
}
trap-group group-name {
categories {
category;
}
destination-port port-number;
targets {
address;
}
version (all | v1 | v2);
}
Related • Configuring SNMP Trap Options on page 46
Documentation
• Configuring SNMP Trap Groups on page 49
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
Copyright © 2010, Juniper Networks, Inc. 45
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring SNMP Trap Options
Using SNMP trap options, you can set the source address of every SNMP trap packet
sent by the router to a single address regardless of the outgoing interface. In addition,
you can set the agent address of the SNMPv1 traps. For more information about the
contents of SNMPv1 traps, see RFC 1157.
NOTE: SNMP cannot be associated with any routing instances other than
the master routing instance.
To configure SNMP trap options, include the trap-options statement at the [edit snmp]
hierarchy level:
[edit snmp]
trap-options {
agent-address outgoing-interface;
enterprise-oid
logical-system
routing-instance
source-address address;
}
You must also configure a trap group for the trap options to take effect. For information
about trap groups, see “Configuring SNMP Trap Groups” on page 49.
This topic contains the following sections:
• Configuring the Source Address for SNMP Traps on page 46
• Configuring the Agent Address for SNMP Traps on page 48
• Adding snmpTrapEnterprise Object Identifier to Standard SNMP Traps on page 49
Configuring the Source Address for SNMP Traps
You can configure the source address of trap packets in many ways: lo0, a valid IPv4
address configured on one of the router interfaces, a logical-system address, or the
address of a routing-instance. The value lo0 indicates that the source address of the
SNMP trap packets is set to the lowest loopback address configured on the interface
lo0.
You can configure the source address of trap packets in one of the following formats:
• a valid IPv4 address configured on one of the router interfaces
• lo0; that is the lowest loopback address configured on the interface lo0.
• a logical-system name
• a routing-instance name
46 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
A valid IPv4 Address To specify a valid interface address as the source address for SNMP traps on one of the
As the Source Address router interfaces, include the source-address statement at the [edit snmp trap-options]
hierarchy level:
[edit snmp trap-options]
source-address address;
address is a valid IPv4 address configured on one of the router interfaces.
The Lowest Loopback To specify the source address of the SNMP traps so that they use the lowest loopback
Address As the Source address configured on the interface lo0 as the source address, include the source-address
Address statement at the [edit snmp trap-options] hierarchy level:
[edit snmp trap-options]
source-address lo0;
To enable and configure the loopback address, include the address statement at the
[edit interfaces lo0 unit 0 family inet] hierarchy level:
[edit interfaces]
lo0 {
unit 0 {
family inet {
address ip-address;
}
}
}
To configure the loopback address as the source address of trap packets:
[edit snmp]
trap-options {
source-address lo0;
}
trap-group "urgent-dispatcher" {
version v2;
categories link startup;
targets {
192.168.10.22;
172.17.1.2;
}
}
[edit interfaces]
lo0 {
unit 0 {
family inet {
address 10.0.0.1/32;
address 127.0.0.1/32;
}
}
}
In this example, the IP address 10.0.0.1 is the source address of every trap sent from this
router.
Copyright © 2010, Juniper Networks, Inc. 47
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Logical System Name To specify a logical system name as the source address of SNMP traps, include the
as the Source Address logical-system logical-system-name statement at the [edit snmp trap-options] hierarchy
level.
For example, the following configuration sets logical system name ls1 as the source
address of SNMP traps:
[edit snmp]
trap-options{
logical-system ls1;
}
Routing Instance To specify a routing instance name as the source address of SNMP traps, include the
Name as the Source routing-instance routing-instance-name statement at the [edit snmp trap-options] hierarchy
Address level.
For example, the following configuration sets the routing instance name ri1 as the source
address for SNMP traps:
[edit snmp]
trap-options {
routing-instance ri1;
}
Configuring the Agent Address for SNMP Traps
The agent address is only available in SNMPv1 trap packets (see RFC 1157). By default,
the router’s default local address is used in the agent address field of the SNMPv1 trap.
To configure the agent address, include the agent-address statement at the [edit snmp
trap-options] hierarchy level. Currently, the agent address can only be the address of the
outgoing interface:
[edit snmp]
trap-options {
agent-address outgoing-interface;
}
To configure the outgoing interface as the agent address:
[edit snmp]
trap-options {
agent-address outgoing-interface;
}
trap-group “ urgent-dispatcher” {
version v1;
categories link startup;
targets {
192.168.10.22;
172.17.1.2;
}
}
In this example, each SNMPv1 trap packet sent has its agent address value set to the IP
address of the outgoing interface.
48 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
Adding snmpTrapEnterprise Object Identifier to Standard SNMP Traps
The snmpTrapEnterprise object helps you identify the enterprise that has defined the
trap. Typically, the snmpTrapEnterprise object appears as the last varbind in
enterprise-specific SNMP version 2 traps. However, starting Release 10.0, Junos OS
enables you to add the snmpTrapEnterprise object identifier to standard SNMP traps as
well.
To add snmpTrapEnterprise to standard traps, include the enterprise-oid statement at
the [edit snmp trap-options] hierarchy level. If the enterprise-oid statement is not included
in the configuration, snmpTrapEnterprise is added only for enterprise-specific traps.
[edit snmp]
trap-options {
enterprise-oid;
}
Related • Configuring SNMP Trap Options and Groups on a Device Running Junos OS on page 45
Documentation
• Configuring SNMP Trap Groups on page 49
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
Configuring SNMP Trap Groups
You can create and name a group of one or more types of SNMP traps and then define
which systems receive the group of SNMP traps. The trap group must be configured for
SNMP traps to be sent. To create an SNMP trap group, include the trap-group statement
at the [edit snmp] hierarchy level:
[edit snmp]
trap-group group-name {
categories {
category;
}
destination-port port-number;
routing-instance instance;
targets {
address;
}
version (all | v1 | v2);
}
The trap group name can be any string and is embedded in the community name field
of the trap. To configure your own trap group port, include the destination-port statement.
The default destination port is port 162.
For each trap group that you define, you must include the target statement to define at
least one system as the recipient of the SNMP traps in the trap group. Specify the IPv4
or IPv6 address of each recipient, not its hostname.
Copyright © 2010, Juniper Networks, Inc. 49
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Specify the types of traps the trap group can receive in the categories statement. For
information about the category to which the traps belong, see the “Standard SNMP Traps
Supported on Devices Running Junos OS” and “Juniper Networks Enterprise-Specific
SNMP Traps” topics in the Junos OS SNMP MIBs and Traps Reference.
Specify the routing instance used by the trap group in the routing-instance statement.
All targets configured in the trap group use this routing instance.
A trap group can receive the following categories:
• authentication—Authentication failures
• chassis—Chassis or environment notifications
• configuration—Configuration notifications
• link—Link-related notifications (up-down transitions, DS-3 and DS-1 line status change,
IPv6 interface state change, and Passive Monitoring PIC overload)
NOTE: To send Passive Monitoring PIC overload interface traps, select the
link trap category.
• remote-operations—Remote operation notifications
• rmon-alarm—Alarm for RMON events
• routing—Routing protocol notifications
• sonet-alarms—SONET/SDH alarms
NOTE: If you omit the SONET/SDH subcategories, all SONET/SDH trap
alarm types are included in trap notifications.
• loss-of-light—Loss of light alarm notification
• pll-lock—PLL lock alarm notification
• loss-of-frame—Loss of frame alarm notification
• loss-of-signal—Loss of signal alarm notification
• severely-errored-frame—Severely errored frame alarm notification
• line-ais—Line alarm indication signal (AIS) alarm notification
• path-ais—Path AIS alarm notification
• loss-of-pointer—Loss of pointer alarm notification
• ber-defect—SONET/SDH bit error rate alarm defect notification
• ber-fault—SONET/SDH error rate alarm fault notification
50 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
• line-remote-defect-indication—Line remote defect indication alarm notification
• path-remote-defect-indication—Path remote defect indication alarm notification
• remote-error-indication—Remote error indication alarm notification
• unequipped—Unequipped alarm notification
• path-mismatch—Path mismatch alarm notification
• loss-of-cell—Loss of cell delineation alarm notification
• vt-ais—Virtual tributary (VT) AIS alarm notification
• vt-loss-of-pointer—VT loss of pointer alarm notification
• vt-remote-defect-indication—VT remote defect indication alarm notification
• vt-unequipped—VT unequipped alarm notification
• vt-label-mismatch—VT label mismatch error notification
• vt-loss-of-cell—VT loss of cell delineation notification
• startup—System warm and cold starts
• vrrp-events—Virtual Router Redundancy Protocol (VRRP) events such as new-master
or authentication failures
If you include SONET/SDH subcategories, only those SONET/SDH trap alarm types are
included in trap notifications.
The version statement allows you to specify the SNMP version of the traps sent to targets
of the trap group. If you specify v1 only, SNMPv1 traps are sent. If you specify v2 only,
SNMPv2 traps are sent. If you specify all, both an SNMPv1 and an SNMPv2 trap are sent
for every trap condition. For more information about the version statement, see version.
Related • Configuring SNMP Trap Options and Groups on a Device Running Junos OS on page 45
Documentation
• Configuring SNMP Trap Options on page 46
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
• Example: Configuring SNMP Trap Groups
Spoofing Enterprise-Specific SNMP Traps
You can use the request snmp spoof-trap operational mode command to mimic SNMP
trap behavior. The contents of the traps (the values and instances of the objects carried
in the trap) can be specified on the command line or they can be spoofed automatically.
This feature is useful if you want to trigger SNMP traps from routers and ensure they are
processed correctly within your existing network management infrastructure, but find it
Copyright © 2010, Juniper Networks, Inc. 51
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
difficult to simulate the error conditions that trigger many of the traps on the router. For
more information, see the Junos OS System Basics and Services Command Reference.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Configuring the Interfaces on Which SNMP Requests Can Be Accepted
By default, all router interfaces have SNMP access privileges. To limit the access through
certain interfaces only, include the interface statement at the [edit snmp] hierarchy level:
[edit snmp]
interface [ interface-names ];
Specify the names of any logical or physical interfaces that should have SNMP access
privileges. Any SNMP requests entering the router from interfaces not listed are discarded.
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuration Statements at the [edit snmp] Hierarchy Level
• Example: Configuring Secured Access List Checking
Filtering Interface Information Out of SNMP Get and GetNext Output
Junos OS enables you to filter out information related to specific interfaces from the
output of SNMP Get and GetNext requests performed on interface-related MIBs such as
IF MIB, ATM MIB, RMON MIB, and the Juniper Networks enterprise-specific IF MIB.
You can use the following options of the filter-interfaces statement at the [edit snmp]
hierarchy level to specify the interfaces that you want to exclude from SNMP Get and
GetNext queries:
• interfaces—Interfaces that match the specified regular expressions.
• all-internal-interfaces—Internal interfaces.
[edit]
snmp {
filter-interfaces {
interfaces {
interface1;
interface2;
}
all-internal-interfaces;
}
}
52 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
However, note that these settings are limited to SNMP operations, and the users can
continue to access information related to the interfaces (including those hidden using
the filter-interfaces options) using the appropriate Junos OS command-line interface
(CLI) commands.
Related • Configuring the Interfaces on Which SNMP Requests Can Be Accepted on page 52
Documentation
• Configuring SNMP on a Device Running Junos OS on page 38
• Configuration Statements at the [edit snmp] Hierarchy Level
Configuring MIB Views
By default, an SNMP community grants read access and denies write access to all
supported MIB objects (even communities configured as authorization read-write). To
restrict or grant read or write access to a set of MIB objects, you must configure a MIB
view and associate the view with a community.
To configure MIB views, include the view statement at the [edit snmp] hierarchy level:
[edit snmp]
view view-name {
oid object-identifier (include | exclude);
}
The view statement defines a MIB view and identifies a group of MIB objects to which
access is granted or denied; the include option grants access to the specified objects,
whereas the exclude option denies access to the specified objects. Each MIB object of a
view has a common object identifier (OID) prefix. Each object identifier represents a
subtree of the MIB object hierarchy. The subtree can be represented either by a sequence
of dotted integers (such as 1.3.6.1.2.1.2) or by its subtree name (such as interfaces). A
configuration statement uses a view to specify a group of MIB objects on which to define
access. You can also use wildcard character asterisk (*) to include OIDs that match a
particular pattern in the SNMP view. To enable a view, you must associate the view with
a community.
NOTE: To remove an OID completely, use the delete view all oid oid-number
command but omit the include parameter.
To associate MIB views with a community, include the view statement at the [edit snmp
community community-name] hierarchy level:
[edit snmp community community-name]
view view-name;
For more information about the Ping MIB, see RFC 2925 and the “PING MIB” on page 339
topic in the Junos SNMP MIBs and Traps Reference.
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuration Statements at the [edit snmp] Hierarchy Level
Copyright © 2010, Juniper Networks, Inc. 53
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Example: Ping Proxy MIB
Tracing SNMP Activity on a Device Running Junos OS
SNMP tracing operations track activity for SNMP agents and record the information in
log files. The logged error descriptions provide detailed information to help you solve
problems faster.
By default, Junos OS does not trace any SNMP activity. If you include the traceoptions
statement at the [edit snmp] hierarchy level, the default tracing behavior is the following:
• Important activities are logged in files located in the /var/log directory. Each log is
named after the SNMP agent that generates it. Currently, the following log files are
created in the /var/log directory when the traceoptions statement is used:
• chassisd
• craftd
• ilmid
• mib2d
• rmopd
• serviced
• snmpd
• When a trace file named filename reaches its maximum size, it is renamed filename.0,
then filename.1, and so on, until the maximum number of trace files is reached. Then
the oldest trace file is overwritten. (For more information about how log files are created,
see the Junos OS System Log Messages Reference.)
• Log files can be accessed only by the user who configures the tracing operation.
You cannot change the directory (/var/log) in which trace files are located. However,
you can customize the other trace file settings by including the following statements at
the [edit snmp] hierarchy level:
[edit snmp]
traceoptions {
file <files number> <match regular-expression> <size size> <world-readable |
no-world-readable>;
flag flag;
no-remote-trace;
}
These statements are described in the following sections:
• Configuring the Number and Size of SNMP Log Files on page 55
• Configuring Access to the Log File on page 55
54 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
• Configuring a Regular Expression for Lines to Be Logged on page 55
• Configuring the Trace Operations on page 56
Configuring the Number and Size of SNMP Log Files
By default, when the trace file reaches 128 kilobytes (KB) in size, it is renamed filename.0,
then filename.1, and so on, until there are three trace files. Then the oldest trace file
(filename.2) is overwritten.
You can configure the limits on the number and size of trace files by including the following
statements at the [edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
file files number size size;
For example, set the maximum file size to 2 MB, and the maximum number of files to 20.
When the file that receives the output of the tracing operation (filename) reaches 2 MB,
filename is renamed filename.0, and a new file called filename is created. When the new
filename reaches 2 MB, filename.0 is renamed filename.1 and filename is renamed
filename.0. This process repeats until there are 20 trace files. Then the oldest file
(filename.19) is overwritten by the newest file (filename.0).
The number of files can be from 2 through 1000 files. The file size of each file can be from
10 KB through 1 gigabyte (GB).
Configuring Access to the Log File
By default, log files can be accessed only by the user who configures the tracing operation.
To specify that any user can read all log files, include the file world-readable statement
at the [edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
file world-readable;
To explicitly set the default behavior, include the file no-world-readable statement at the
[edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
file no-world-readable;
Configuring a Regular Expression for Lines to Be Logged
By default, the trace operation output includes all lines relevant to the logged activities.
You can refine the output by including the match statement at the [edit snmp traceoptions
file filename] hierarchy level and specifying a regular expression (regex) to be matched:
[edit snmp traceoptions]
file filename match regular-expression;
Copyright © 2010, Juniper Networks, Inc. 55
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring the Trace Operations
By default, only important activities are logged. You can specify which trace operations
are to be logged by including the following flag statement (with one or more tracing
flags) at the [edit snmp traceoptions] hierarchy level:
[edit snmp traceoptions]
flag {
all;
configuration;
database;
events;
general;
interface-stats;
nonvolatile-sets;
pdu;
policy:
protocol-timeouts;
routing-socket;
server;
subagent;
timer;
varbind-error;
}
Table 5 on page 56 describes the meaning of the SNMP tracing flags.
Table 5: SNMP Tracing Flags
Flag Description Default Setting
all Log all operations. Off
configuration Log reading of configuration at the [edit snmp] Off
hierarchy level.
database Log events involving storage and retrieval in Off
events database.
events Log important events. Off
general Log general events. Off
interface-stats Log physical and logical interface statistics. Off
nonvolatile-set Log nonvolatile SNMP set request handling. Off
pdu Log SNMP request and response packets. Off
policy Log policy processing. Off
protocol-timeouts Log SNMP response timeouts. Off
routing-socket Log routing socket calls. Off
56 Copyright © 2010, Juniper Networks, Inc.
Chapter 3: Configuring SNMP
Table 5: SNMP Tracing Flags (continued)
Flag Description Default Setting
server Log communication with processes that are Off
generating events.
subagent Log subagent restarts. Off
timer Log internal timer events. Off
varbind-error Log variable binding errors. Off
To display the end of the log for an agent, issue the show log agentd | last operational
mode command:
[edit]
user@host# run show log agentd | last
where agent is the name of an SNMP agent.
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
• Configuration Statements at the [edit snmp] Hierarchy Level
• Example: Tracing SNMP Activity
Configuring the Local Engine ID
By default, the local engine ID uses the default IP address of the router. The local engine
ID is the administratively unique identifier for the SNMPv3 engine. This statement is
optional. To configure the local engine ID, include the engine-id statement at the [edit
snmp] hierarchy level:
[edit snmp]
engine-id {
(local engine-id-suffix | use-default-ip-address | use-mac-address);
}
• local engine-id-suffix—The engine ID suffix is explicitly configured.
• use-default-ip-address—The engine ID suffix is generated from the default IP address.
• use-mac-address—The SNMP engine identifier is generated from the Media Access
Control (MAC) address of the management interface on the router.
The local engine ID is defined as the administratively unique identifier of an SNMPv3
engine, and is used for identification, not for addressing. There are two parts of an engine
ID: prefix and suffix. The prefix is formatted according to the specifications defined in
RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP)
Management Frameworks. You can configure the suffix here.
Copyright © 2010, Juniper Networks, Inc. 57
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NOTE: SNMPv3 authentication and encryption keys are generated based on
the associated passwords and the engine ID. If you configure or change the
engine ID, you must commit the new engine ID before you configure SNMPv3
users. Otherwise the keys generated from the configured passwords are
based on the previous engine ID. For the engine ID, we recommend using the
master IP address of the device if the device has multiple routing engines
and has the master IP address configured. Alternatively, you can use the MAC
address of fxp0 if the device has only one Routing Engine.
Related • Complete SNMPv3 Configuration Statements
Documentation
• Minimum SNMPv3 Configuration on a Device Running Junos OS
• Example: SNMPv3 Configuration
58 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 4
Standard SNMP Traps
This chapter contains the following topics:
• Standard SNMP Traps Supported on Devices Running Junos OS on page 59
• Standard SNMP Version 1 Traps on page 59
• Standard SNMP Version 2 Traps on page 63
• Unsupported Standard SNMP Traps on page 67
Standard SNMP Traps Supported on Devices Running Junos OS
This topic gives you pointers to the standard SNMP traps supported by Junos OS.
NOTE: For scalability reasons, the MPLS traps are generated by the ingress
router only. For information about disabling the generation of MPLS traps,
see the Junos MPLS Applications Configuration Guide.
• Standard SNMP Version 1 Traps on page 59
• Standard SNMP Version 2 Traps on page 63
• Unsupported Standard SNMP Traps on page 67
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Standard SNMP Version 1 Traps
Table 6 on page 60 provides an overview of the standard traps for SNMPv1. The traps
are organized first by trap category and then by trap name, and include their enterprise
ID, generic trap number, and specific trap number. The system logging severity levels are
listed for those traps that have them with their corresponding system log tag. Traps that
do not have corresponding system logging severity levels are marked with an en dash
(–) in the table.
Copyright © 2010, Juniper Networks, Inc. 59
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
For more information about system log messages, see the Junos OS System Log Messages
Reference. For more information about configuring system logging, see the Junos OS
System Basics Configuration Guide.
Table 6: Standard Supported SNMP Version 1 Traps
System
Generic Specific Logging
Trap Trap Severity
Defined in Trap Name Enterprise ID Number Number Level Syslog Tag Supported on
Startup Notifications
RFC 1215, authenticationFailure 1.3.6.1.4.1.2636 4 0 Notice SNMPD_ TRAP_ All devices running
Conventions GEN_FAILURE Junos OS.
for Defining
Traps for
coldStart 1.3.6.1.4.1.2636 0 0 Critical SNMPD_TRAP_ All devices running
Use with
COLD_START Junos OS.
the SNMP
warmStart 1.3.6.1.4.1.2636 1 0 Error SNMPD_TRAP_ All devices running
WARM_START Junos OS.
Link Notifications
RFC 1215, linkDown 1.3.6.1.4.1.2636 2 0 Warning SNMP_ TRAP_ All devices running
Conventions LINK_DOWN Junos OS.
for Defining
Traps for
linkUp 1.3.6.1.4.1.2636 3 0 Info SNMP_TRAP_ All devices running
Use with
LINK_UP Junos OS.
the SNMP
Remote Operations Notifications
RFC 2925, pingProbeFailed 1.3.6.1.2.1.80.0 6 1 Info SNMP_TRAP _PING_ All devices running
Definitions PROBE_ FAILED Junos OS.
of Managed
Objects for pingTestFailed 1.3.6.1.2.1.80.0 6 2 Info SNMP_TRAP_ All devices running
Remote PING_TEST _FAILED Junos OS.
Ping,
Traceroute,
pingTestCompleted 1.3.6.1.2.1.80.0 6 3 Info SNMP_TRAP_ All devices running
and Lookup
PING_TEST_ Junos OS.
Operations
COMPLETED
traceRoutePathChange 1.3.6.1.2.1.81.0 6 1 Info SNMP_TRAP_ All devices running
TRACE_ROUTE_ Junos OS.
PATH_CHANGE
traceRouteTestFailed 1.3.6.1.2.1.81.0 6 2 Info SNMP_TRAP_ All devices running
TRACE_ROUTE_ Junos OS.
TEST_FAILED
traceRouteTestCompleted 1.3.6.1.2.1.81.0 6 3 Info SNMP_TRAP_ All devices running
TRACE_ROUTE_ Junos OS.
TEST_COMPLETED
60 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
Table 6: Standard Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity
Defined in Trap Name Enterprise ID Number Number Level Syslog Tag Supported on
RMON Alarms
RFC 2819a, fallingAlarm 1.3.6.1.2.1.16 6 2 – – All devices running
RMON MIB Junos OS.
risingAlarm 1.3.6.1.2.1.16 6 1 – – All devices running
Junos OS.
Routing Notifications
BGP 4 MIB bgpEstablished 1.3.6.1.2.1.15.7 6 1 – – M, T, MX, J, EX, and
SRX for branch
devices.
bgpBackwardTransition 1.3.6.1.2.1.15.7 6 2 – – M, T, MX, J, EX, and
SRX for branch
devices.
Copyright © 2010, Juniper Networks, Inc. 61
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 6: Standard Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity
Defined in Trap Name Enterprise ID Number Number Level Syslog Tag Supported on
OSPF TRAP ospfVirtIfStateChange 1.3.6.1.2.1.14.16.2 6 1 – – M, T, MX, J, EX, and
MIB SRX for branch
devices.
ospfNbrStateChange 1.3.6.1.2.1.14.16.2 6 2 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfVirtNbrStateChange 1.3.6.1.2.1.14.16.2 6 3 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfIfConfigError 1.3.6.1.2.1.14.16.2 6 4 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfVirtIfConfigError 1.3.6.1.2.1.14.16.2 6 5 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfIfAuthFailure 1.3.6.1.2.1.14.16.2 6 6 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfVirtIfAuthFailure 1.3.6.1.2.1.14.16.2 6 7 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfIfRxBadPacket 1.3.6.1.2.1.14.16.2 6 8 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfVirtIfRxBadPacket 1.3.6.1.2.1.14.16.2 6 9 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfTxRetransmit 1.3.6.1.2.1.14.16.2 6 10 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfVirtIfTxRetransmit 1.3.6.1.2.1.14.16.2 6 11 – – M, T, MX, J, EX, and
SRX for branch
devices.
ospfMaxAgeLsa 1.3.6.1.2.1.14.16.2 6 13 – – M, T, MX, J, EX, and
SRX for branch
devices.
62 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
Table 6: Standard Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity
Defined in Trap Name Enterprise ID Number Number Level Syslog Tag Supported on
ospfIfStateChange 1.3.6.1.2.1.14.16.2 6 16 – – M, T, MX, J, EX, and
SRX for branch
devices.
VRRP Notifications
RFC 2787, vrrpTrapNewMaster 1.3.6.1.2.1.68 6 1 Warning VRRPD_NEW All devices running
Definitions MASTER_TRAP Junos OS.
of Managed
Objects for
vrrpTrapAuthFailure 1.3.6.1.2.1.68 6 2 Warning VRRPD_AUTH_ All devices running
the Virtual
FAILURE_TRAP Junos OS.
Router
Redundancy
Protocol
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Standard SNMP Version 2 Traps
Table 7 on page 63 provides an overview of the standard SNMPv2 traps supported by
Junos OS. The traps are organized first by trap category and then by trap name and
include their snmpTrapOID. The system logging severity levels are listed for those traps
that have them with their corresponding system log tag. Traps that do not have
corresponding system logging severity levels are marked with an en dash (–) in the table.
For more information about system log messages, see the Junos OS System Log Messages
Reference. For more information about configuring system logging, see the Junos OS
System Basics Configuration Guide.
Table 7: Standard Supported SNMP Version 2 Traps
System
Logging
Severity
Defined in Trap Name snmpTrapOID Level Syslog Tag Supported on
Startup Notifications
RFC 1907, coldStart 1.3.6.1.6.3.1.1.5.1 Critical SNMPD_TRAP_ All devices running
Management COLD_START Junos OS.
Information Base
Copyright © 2010, Juniper Networks, Inc. 63
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 7: Standard Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Defined in Trap Name snmpTrapOID Level Syslog Tag Supported on
for Version 2 of warmStart 1.3.6.1.6.3.1.1.5.2 Error SNMPD_TRAP_ All devices running
the Simple WARM_START Junos OS.
Network
Management
authenticationFailure 1.3.6.1.6.3.1.1.5.5 Notice SNMPD_TRAP_ All devices running
Protocol
GEN_FAILURE Junos OS.
(SNMPv2),
Link Notifications
RFC 2863, The linkDown 1.3.6.1.6.3.1.1.5.3 Warning SNMP_TRAP_ All devices running
Interfaces Group LINK_DOWN Junos OS.
MIB
linkUp 1.3.6.1.6.3.1.1.5.4 Info SNMP_TRAP_ All devices running
LINK_UP Junos OS.
Remote Operations Notifications
RFC 2925, pingProbeFailed 1.3.6.1.2.1.80.0.1 Info SNMP_TRAP_ All devices running
Definitions of PING_PROBE_ Junos OS.
Managed Objects FAILED
for Remote Ping,
Traceroute, and
pingTestFailed 1.3.6.1.2.1.80.0.2 Info SNMP_TRAP_PING_ All devices running
Lookup
TEST_FAILED Junos OS.
Operations
pingTestCompleted 1.3.6.1.2.1.80.0.3 Info SNMP_TRAP_PING_ All devices running
TEST_COMPLETED Junos OS.
traceRoutePathChange 1.3.6.1.2.1.81.0.1 Info SNMP_TRAP_TRACE_ All devices running
ROUTE_PATH_ Junos OS.
CHANGE
traceRouteTestFailed 1.3.6.1.2.1.81.0.2 Info SNMP_TRAP_TRACE_ All devices running
ROUTE_TEST_FAILED Junos OS.
traceRouteTestCompleted 1.3.6.1.2.1.81.0.3 Info SNMP_TRAP_TRACE_ All devices running
ROUTE_TEST_ Junos OS.
COMPLETED
RMON Alarms
RFC 2819a, RMON fallingAlarm 1.3.6.1.2.1.16.0.1 – – All devices running
MIB Junos OS.
risingAlarm 1.3.6.1.2.1.16.0.2 – – All devices running
Junos OS.
64 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
Table 7: Standard Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Defined in Trap Name snmpTrapOID Level Syslog Tag Supported on
Routing Notifications
BGP 4 MIB bgpEstablished 1.3.6.1.2.1.15.7.1 – – M, MX, T, EX, J, and
SRX for branch
devices.
bgpBackwardTransition 1.3.6.1.2.1.15.7.2 – – M, MX, T, EX, J, and
SRX for branch
devices.
OSPF Trap MIB ospfVirtIfStateChange 1.3.6.1.2.1.14.16.2.1 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfNbrStateChange 1.3.6.1.2.1.14.16.2.2 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfVirtNbrStateChange 1.3.6.1.2.1.14.16.2.3 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfIfConfigError 1.3.6.1.2.1.14.16.2.4 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfVirtIfConfigError 1.3.6.1.2.1.14.16.2.5 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfIfAuthFailure 1.3.6.1.2.1.14.16.2.6 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfVirtIfAuthFailure 1.3.6.1.2.1.14.16.2.7 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfIfRxBadPacket 1.3.6.1.2.1.14.16.2.8 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfVirtIfRxBadPacket 1.3.6.1.2.1.14.16.2.9 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfTxRetransmit 1.3.6.1.2.1.14.16.2.10 – – M, MX, T, EX, J, and
SRX for branch
devices.
Copyright © 2010, Juniper Networks, Inc. 65
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 7: Standard Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Defined in Trap Name snmpTrapOID Level Syslog Tag Supported on
ospfVirtIfTxRetransmit 1.3.6.1.2.1.14.16.2.11 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfMaxAgeLsa 1.3.6.1.2.1.14.16.2.13 – – M, MX, T, EX, J, and
SRX for branch
devices.
ospfIfStateChange 1.3.6.1.2.1.14.16.2.16 – – M, MX, T, EX, J, and
SRX for branch
devices.
RFC 2787, vrrpTrapNewMaster 1.3.6.1.2.1.68.0.1 Warning VRRPD_ All devices running
Definitions of NEWMASTER_ TRAP Junos OS.
Managed Objects
for the Virtual
vrrpTrapAuthFailure 1.3.6.1.2.1.68.0.2 Warning VRRPD_AUTH_ All devices running
Router
FAILURE_ TRAP Junos OS.
Redundancy
Protocol
Junos OS also supports the following standard SNMP version 2 traps:
• SNMP Version 2 MPLS Traps on page 66
SNMP Version 2 MPLS Traps
Junos OS supports the MPLS SNMP version 2 traps defined in RFC 3812, Multiprotocol
Label Switching (MPLS) Traffic Engineering (TE) Management Information Base.
You can disable the MPLS traps by including the no-trap option at the [edit protocol mpls
log-updown] hierarchy level. For information about disabling the generation of MPLS
traps, see the Junos MPLS Applications Configuration Guide.
Junos OS supports the following MPLS traps:
• mplsTunnelUp—Generated when an mplsTunnelOperStatus object for one of the
configured tunnels leaves the down state and transitions into another state, other than
the notPresent state.
• mplsTunnelDown—Generated when an mplsTunnelOperStatus object for one of the
configured tunnels enters the down state from a state other than the notPresent state.
NOTE: When an LSP flaps, only the ingress and egress routers of that LSP
generate the mplsTunnelUp and mplsTunnelDown traps. Previously, all the
routers associated with an LSP—that is, the ingress, egress, and transit
routers—used to generate the traps when the LSP flaps.
66 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
• mplsTunnelRerouted—Generated when a tunnel is rerouted.
• mplsTunnelReoptimized—Generated when a tunnel is reoptimized.
NOTE: In Junos OS Release 8.3 and earlier, mplsTunnelReoptimized was
generated every time the optimization timer expired; that is, when the
optimization timer exceeded the value set for the optimize-timer statement
at the [edit protocols mpls label-switched-path path-name] hierarchy level.
However, in Release 8.4 and later, this trap is generated only when the path
is reoptimized, and not when the optimization timer expires.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Unsupported Standard SNMP Traps
Standard SNMP traps that are defined in Junos OS but are not generated are shown in
Table 8 on page 68.
Copyright © 2010, Juniper Networks, Inc. 67
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 8: Unsupported Standard SNMP Traps
MIB Trap Name Description
isismib.mib isisDatabaseOverload Generated when the system enters or leaves the overload
state.
isisManualAddressDrops Generated when one of the manual areaAddresses assigned
to the system is ignored when computing routes.
isisCorruptedLSPDetected Generated when an LSP stored in memory becomes
corrupted.
isisAttemptToExceedMaxSequence Generated when the sequence number on a generated LSP
wraps the 32-bit sequence counter and the number is purged.
isisIDLenMismatch Generated when a protocol data unit (PDU) is received with
a different value for the system ID length. This trap includes
an index to identify the circuit where the PDU was received
and the PDU header.
isisMaxAreaAddressesMismatch Generated when a PDU with a different value for the
maximum area addresses is received.
isisOwnLSPPurge Generated when a PDU is received with a system ID and zero
age. This notification includes the circuit index if available.
isisSequenceNumberSkip Generated when an LSP is received with a system ID and
different contents, indicating the LSP may require a higher
sequence number.
isisAuthenticationTypeFailure Generated when a PDU with the wrong authentication type
field is received.
isisAuthenticationFailure Generated when a PDU with an incorrect authentication
information field is received.
isisVersionSkew Generated when a hello PDU from an IS running a different
version of the protocol is received.
isisAreaMismatch Generated when a hello PDU from an IS which does not share
any area address is received.
isisRejectedAdjacency Generated when a hello PDU from an IS is received, but no
adjacency is established because of a lack of resources.
isisLSPTooLargeToPropagate Generated when a link-state PDU that is larger than the
dataLinkBlockSize for a circuit is attempted, but not
propagated.
isisOriginatingLSPBufferSizeMismatch
68 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
Table 8: Unsupported Standard SNMP Traps (continued)
MIB Trap Name Description
Generated when a Level 1 link-state PDU or Level 2 link-state
PDU is received that is larger than the local value for
originating L1LSPBufferSize or originating L2LSPBufferSize,
respectively, or when a Level 1 link-state PDU or Level 2
link-state PDU is received containing the originating
LSPBufferSize option and the value in the PDU option field
does not match the local value for originating L1LSPBufferSize
or originating L2LSPBufferSize, respectively.
isisProtocolsSupportedMismatch Generated when a nonpseudonode, segment 0 link-state
PDU is received that has no matching protocols.
l3vpnmib.mib mplsVrfIfUp Generated when the ifOperStatus of an interface associated
with a VRF table changes to the up(1) state, or when an
interface with ifOperStatus = up(1) is associated with a VRF
table.
mplsVrfIfDown Generated when the ifOperStatus of an interface associated
with a VRF table changes to the down(1) state, or when an
interface with ifOperStatus = up(1) state is disassociated from
a VRF table.
mplsNumVrfRouteMidThreshExceeded Generated when the number of routes contained by the
specified VRF table exceeds the value indicated by
mplsVrfMidRouteThreshold.
mplsNumVrfRouteMaxThreshExceeded Generated when the number of routes contained by the
specified VRF table reaches or attempts to exceed the
maximum allowed value as indicated by
mplsVrfMaxRouteThreshold.
mplsNumVrfSecIllglLblThrshExcd Generated when the number of illegal label violations on a
VRF table as indicated by mplsVpnVrfSecIllegalLblVltns has
exceeded mplsVpnVrfSecIllegalLblRcvThrsh.
ldpmib.mib mplsLdpInitSesThresholdExceeded Generated when the value of mplsLdpEntityInitSesThreshold
is not zero and the number of session initialization messages
exceeds the value of mplsLdpEntityInitSesThreshold.
mplsLdpPathVectorLimitMismatch Generated when the mplsLdpEntityPathVectorLimit does not
match the value of the mplsLdpPeerPathVectorLimit for a
specific entity.
mplsLdpSessionUp Generated when the value of mplsLdpSesState enters the
operational(5) state.
mplsLdpSessionDown Generated when the value of mplsLdpSesState leaves the
operational(5) state.
Copyright © 2010, Juniper Networks, Inc. 69
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 8: Unsupported Standard SNMP Traps (continued)
MIB Trap Name Description
msdpmib.mib msdpEstablished Generated when the Multicast Source Discovery Protocol
(MSDP) finite state machine (FSM) enters the Established
state.
msdpBackwardTransition Generated when the MSDP FSM moves from a higher
numbered state to a lower numbered state.
ospf2trap.mib ospfOriginateLsa Generated when a new LSA is originated by the router because
of a topology change.
ospfLsdbOverflow Generated when the number of LSAs in the router's link-state
database exceeds the value of ospfExtLsdbLimit.
ospfLsdbApproachingOverflow Generated when the number of LSAs in the router's link-state
database exceeds 90 percent of the value of
ospfExtLsdbLimit.
rfc1747.mib sdlcPortStatusChange Generated when the state of an SDLC port transitions to
active or inactive.
sdlcLSStatusChange Generated when the state of an SDLC link station transitions
to contacted or disconnected.
rfc2115a.mib frDLCIStatusChange Generated when a virtual circuit changes state (has been
created or invalidated, or has toggled between the active and
inactive states).
rfc2662.mib adslAtucRateChangeTrap Generated when the ATUCs transmit rate has changed
(RADSL mode only).
adslAtucPerfLofsThreshTrap Generated when the loss of framing 15-minute interval
threshold is reached.
adslAtucInitFailureTrap Generated when ATUC initialization fails.
adslAturPerfLprsThreshTrap Generated when the loss of power 15-minute interval
threshold is reached.
adslAturRateChangeTrap Generated when the ATURs transmit rate changes (RADSL
mode only).
rfc3020.mib mfrMibTrapBundleLinkMismatch Generated when a bundle link mismatch is detected.
rfc3813.mib mplsXCUp Generated when mplsXCOperStatus for one or more
contiguous entries in mplsXCTable enters the up(1) state from
some other state.
mplsXCDown Generated when mplsXCOperStatus for one or more
contiguous entries in mplsXCTable enters the down(2) state
from some other state.
70 Copyright © 2010, Juniper Networks, Inc.
Chapter 4: Standard SNMP Traps
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 71
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
72 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 5
Juniper Networks Enterprise-Specific
SNMP Traps
This chapter contains the following topics:
• Juniper Networks Enterprise-Specific SNMP Traps on page 73
• Juniper Networks Enterprise-Specific SNMP Version 1 Traps on page 74
• Juniper Networks Enterprise-Specific SNMP Version 2 Traps on page 81
• Juniper Networks Enterprise-Specific BGP Traps on page 87
• Juniper Networks Enterprise-Specific LDP Traps on page 88
• Juniper Networks Enterprise-Specific MIMSTP Traps on page 88
• Enterprise-Specific MPLS Traps on page 89
• Configuring SNMP Informs on page 90
• Configuring SNMPv3 Traps on a Device Running Junos OS on page 91
Juniper Networks Enterprise-Specific SNMP Traps
This topic gives you pointers to the enterprise-specific SNMP traps supported by Junos
OS.
NOTE: All enterprise-specific SNMP traps supported by Junos OS can be
sent in version 1, 2, and 3 formats.
• Juniper Networks Enterprise-Specific SNMP Version 1 Traps on page 74
• Juniper Networks Enterprise-Specific SNMP Version 2 Traps on page 81
• Juniper Networks Enterprise-Specific BGP Traps on page 87
• Juniper Networks Enterprise-Specific LDP Traps on page 88
• Juniper Networks Enterprise-Specific MIMSTP Traps on page 88
• Enterprise-Specific MPLS Traps on page 89
Copyright © 2010, Juniper Networks, Inc. 73
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NOTE: For scalability reasons, the MPLS traps are generated by the ingress
router only. For information about disabling the generation of MPLS traps,
see the Junos MPLS Applications Configuration Guide.
Related • Standard SNMP Traps Supported on Devices Running Junos OS
Documentation
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Juniper Networks Enterprise-Specific SNMP Version 1 Traps
Junos OS supports enterprise-specific SNMP version 1 traps shown in Table 9 on page 74.
The traps are organized first by trap category and then by trap name. The system logging
severity levels are listed for those traps that have them. Traps that do not have
corresponding system logging severity levels are marked with an en dash (–).
For more information about system log messages, see the Junos OS System Log Messages
Reference. For more information about configuring system logging, see the Junos OS
System Basics Configuration Guide. To view the Juniper Networks enterprise-specific
SNMP version 2 traps, see “Juniper Networks Enterprise-Specific SNMP Version 2 Traps”
on page 81. For more information about chassis traps, see “Chassis Traps” on page 260.
Table 9 on page 74 lists the Juniper Networks enterprise-specific supported SNMP version
1 traps.
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
Chassis Notifications (Alarm Conditions)
Chassis MIB jnxPowerSupplyFailure 1.3.6.1.4.1.2636.4.1 6 1 Warning CHASSISD_ All devices
(jnx-chassis. SNMP_ running Junos
mib) TRAP OS.
jnxFanFailure 1.3.6.1.4.1.2636.4.1 6 2 Critical CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxOverTemperature 1.3.6.1.4.1.2636.4.1 6 3 Alert CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxRedundancySwitchOver 1.3.6.1.4.1.2636.4.1 6 4 Critical CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
74 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
jnxFruRemoval 1.3.6.1.4.1.2636.4.1 6 5 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruInsertion 1.3.6.1.4.1.2636.4.1 6 6 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruPowerOff 1.3.6.1.4.1.2636.4.1 6 7 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruPowerOn 1.3.6.1.4.1.2636.4.1 6 8 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruFailed 1.3.6.1.4.1.2636.4.1 6 9 Warning CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruOffline 1.3.6.1.4.1.2636.4.1 6 10 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruOnline 1.3.6.1.4.1.2636.4.1 6 11 Notice CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFruCheck 1.3.6.1.4.1.2636.4.1 6 12 Warning CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxFEBSwitchover 1.3.6.1.4.1.2636.4.1 6 13 Warning CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxHardDiskFailed 1.3.6.1.4.1.2636.4.1 6 14 Warning CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxHardDiskMissing 1.3.6.1.4.1.2636.4.1 6 15 Warning CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxPowerSupplyOk 1.3.6.1.4.1.2636.4.2 6 1 Critical CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
Copyright © 2010, Juniper Networks, Inc. 75
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
jnxFanOK 1.3.6.1.4.1.2636.4.2 6 2 Critical CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
jnxTemperatureOK 1.3.6.1.4.1.2636.4.2 6 3 Alert CHASSISD_ All devices
SNMP_ running Junos
TRAP OS.
Configuration Notifications
Configuration jnxCmCfgChange 1.3.6.1.4.1.2636.4.5 6 1 – – All devices
Management running Junos
MIB (jnx- OS.
configmgmt.
mib)
jnxCmRescueChange 1.3.6.1.4.1.2636.4.5 6 2 – – All devices
running Junos
OS.
76 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
Link Notifications
Flow jnxCollUnavailableDest 1.3.6.1.4.1.2636.4.8 6 1 – – Devices that
Collection run Junos OS
Services MIB and have
(jnx-coll.mib) collector PICs
installed.
jnxCollUnavailableDestCleared 1.3.6.1.4.1.2636.4.8 6 2 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollUnsuccessfulTransfer 1.3.6.1.4.1.2636.4.8 6 3 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollFlowOverload 1.3.6.1.4.1.2636.4.8 6 4 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollFlowOverloadCleared 1.3.6.1.4.1.2636.4.8 6 5 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollMemoryUnavailable 1.3.6.1.4.1.2636.4.8 6 6 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollMemoryAvailable 1.3.6.1.4.1.2636.4.8 6 7 – – Devices that
run Junos OS
and have
collector PICs
installed.
jnxCollFtpSwitchover 1.3.6.1.4.1.2636.4.8 6 8 – – Devices that
run Junos OS
and have
collector PICs
installed.
Copyright © 2010, Juniper Networks, Inc. 77
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
Passive jnxPMonOverloadSet 1.3.6.1.4.1.2636. 6 1 – – Devices that
Monitoring 4.7.0.1 run Junos OS
MIB and have PICs
(jnx-pmon.mib) that support
passive
monitoring
installed.
jnxPMonOverloadCleared 1.3.6.1.4.1.2636. 6 2 – – Devices that
4.7.0.2 run Junos OS
and have PICs
that support
passive
monitoring
installed.
SONET APS apsEventChannelMismatch 1.3.6.1.4.1.2636. 6 3 – – Devices that
MIB (jnx- 3.24.2 run Junos OS
sonetaps. and have
mib) SONET PICs
installed.
apsEventPSBF 1.3.6.1.4.1.2636. 6 4 – – Devices that
3.24.2 run Junos OS
and have
SONET PICs
installed.
apsEventFEPLF 1.3.6.1.4.1.2636. 6 5 – – Devices that
3.24.2 run Junos OS
and have
SONET PICs
installed.
Remote Operations
PING MIB jnxPingRttThresholdExceeded 1.3.6.1.4.1.2636.4.9 6 1 – – All devices
(jnx-ping.mib) running Junos
OS.
jnxPingRttStdDevThreshold 1.3.6.1.4.1.2636.4.9 6 2 – – All devices
Exceeded running Junos
OS.
jnxPingRttJitterThreshold Exceeded 1.3.6.1.4.1.2636.4.9 6 3 – – All devices
running Junos
OS.
jnxPingEgressThreshold Exceeded 1.3.6.1.4.1.2636.4.9 6 4 – – All devices
running Junos
OS.
78 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
jnxPingEgressStdDev 1.3.6.1.4.1.2636.4.9 6 5 – – All devices
ThresholdExceeded running Junos
OS.
jnxPingEgressJitter 1.3.6.1.4.1.2636.4.9 6 6 – – All devices
ThresholdExceeded running Junos
OS.
jnxPingIngressThreshold Exceeded 1.3.6.1.4.1.2636.4.9 6 7 – – All devices
running Junos
OS.
jnxPingIngressStddevThreshold 1.3.6.1.4.1.2636.4.9 6 8 – – All devices
Exceeded running Junos
OS.
jnxPingIngressJitterThreshold 1.3.6.1.4.1.2636.4.9 6 9 – – All devices
Exceeded running Junos
OS.
Routing Notifications
BFD bfdSessUp 1.3.6.1.4.1. 6 1 – – All devices
Experimental 2636.5.3.1 running Junos
MIB jnx-bfd- OS.
exp.mib
bfdSessDown 1.3.6.1.4.1. 6 2 – – All devices
2636.5.3.1 running Junos
OS.
LDP MIB jnxLdpLspUp 1.3.6.1.4.1.2636.4.4 6 1 – – M, T, and MX
(jnx-ldp.mib) Series routers.
jnxLdpLspDown 1.3.6.1.4.1.2636.4.4 6 2 – – M, T, and MX
Series routers.
jnxLdpSesUp 1.3.6.1.4.1.2636.4.4 6 3 – – M, T, and MX
Series routers.
jnxLdpSesDown 1.3.6.1.4.1.2636.4.4 6 4 – – M, T, and MX
Series routers.
Copyright © 2010, Juniper Networks, Inc. 79
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 9: Juniper Networks Enterprise-Specific Supported SNMP Version 1 Traps (continued)
System
Generic Specific Logging
Trap Trap Severity System Supported
Defined in Trap Name Enterprise ID Number Number Level Log Tag on
MPLS MIB mplsLspUp (Deprecated) 1.3.6.1.4.1.2636.3.2.4 6 1 – –
(jnx-mpls.mib)
mplsLspDown (Deprecated) 1.3.6.1.4.1.2636.3.2.4 6 2 – –
mplsLspChange (Deprecated) 1.3.6.1.4.1.2636.3.2.4 6 3 – –
mplsLspPathDown (Deprecated) 1.3.6.1.4.1.2636.3.2.4 6 4 – –
VPN MIB jnxVpnIfUp 1.3.6.1.4.1.2636. 6 1 – – M, T, and MX
(jnx-vpn.mib) 3.26 Series routers.
jnxVpnIfDown 1.3.6.1.4.1.2636. 6 2 – – M, T, and MX
3.26 Series routers.
jnxVpnPwUp 1.3.6.1.4.1.2636. 6 3 – – M, T, and MX
3.26 Series routers.
jnxVpnPwDown 1.3.6.1.4.1.2636. 6 4 – – M, T, and MX
3.26 Series routers.
RMON Alarms
RMON MIB jnxRmonAlarmGetFailure 1.3.6.1.4.1.2636.4.3 6 1 – – All devices
(jnx-rmon. running Junos
mib) OS.
jnxRmonGetOk 1.3.6.1.4.1.2636.4.3 6 2 – – All devices
running Junos
OS.
SONET Alarms
SONET MIB jnxSonetAlarmSet 1.3.6.1.4.1.2636.4.6 6 1 – – Devices that
(jnx-sonet. run Junos OS
mib) and have
SONET PICs
installed.
jnxSonetAlarmCleared 1.3.6.1.4.1.2636.4.6 6 2 – – Devices that
run Junos OS
and have
SONET PICs
installed.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
80 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
• Standard SNMP MIBs Supported by Junos OS on page 12
Juniper Networks Enterprise-Specific SNMP Version 2 Traps
Junos OS supports the enterprise-specific SNMP version 2 traps shown in Table 10 on
page 81. The traps are organized first by trap category and then by trap name. The system
logging severity levels are listed for those traps that have them. Traps that do not have
corresponding system logging severity levels are marked with an en dash (–).
For more information about system messages, see the Junos OS System Log Messages
Reference. For more information about configuring system logging, see the Junos OS
System Basics Configuration Guide. To view the Juniper Networks enterprise-specific
SNMP version 1 traps, see “Juniper Networks Enterprise-Specific SNMP Version 1 Traps”
on page 74. For more information about chassis traps, see “Chassis Traps” on page 260.
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
Chassis (Alarm Conditions) Notifications
Chassis MIB jnxPowerSupplyFailure 1.3.6.1.4.1.2636.4.1.1 Alert CHASSISD_ SNMP_ All devices running Junos
(jnx-chassis. TRAP OS.
mib)
jnxFanFailure 1.3.6.1.4.1.2636.4.1.2 Critical CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxOverTemperature 1.3.6.1.4.1.2636.4.1.3 Critical CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxRedundancySwitchOver 1.3.6.1.4.1.2636.4.1.4 Critical CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruRemoval 1.3.6.1.4.1.2636.4.1.5 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruInsertion 1.3.6.1.4.1.2636.4.1.6 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruPowerOff 1.3.6.1.4.1.2636.4.1.7 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruPowerOn 1.3.6.1.4.1.2636.4.1.8 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruFailed 1.3.6.1.4.1.2636.4.1.9 Warning CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruOffline 1.3.6.1.4.1.2636.4.1.10 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
Copyright © 2010, Juniper Networks, Inc. 81
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
jnxFruOnline 1.3.6.1.4.1.2636.4.1.11 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFruCheck 1.3.6.1.4.1.2636.4.1.12 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFEBSwitchover 1.3.6.1.4.1.2636.4.1.13 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxHardDiskFailed 1.3.6.1.4.1.2636.4.1.14 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxHardDiskMissing 1.3.6.1.4.1.2636.4.1.15 Notice CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxPowerSupplyOK 1.3.6.1.4.1.2636.4.2.1 Critical CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxFanOK 1.3.6.1.4.1.2636.4.2.2 Critical CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
jnxTemperatureOK 1.3.6.1.4.1.2636.4.2.3 Alert CHASSISD_ SNMP_ All devices running Junos
TRAP OS.
Configuration Notifications
Configuration jnxCmCfgChange 1.3.6.1.4.1.2636.4.5.0.1 – – All devices running Junos
Management OS.
MIB (jnx-
cfgmgmt.mib)
jnxCmRescueChange 1.3.6.1.4.1.2636.4.5.0.2 – – All devices running Junos
OS.
Link Notifications
82 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
Flow jnxCollUnavailableDest 1.3.6.1.4.1.2636.4.8.0.1 – – Devices that run Junos OS
Collection and have collector PICs
Services MIB installed.
(jnx-coll.mib)
jnxCollUnavailableDestCleared 1.3.6.1.4.1.2636.4.8.0.2 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollUnsuccessfulTransfer 1.3.6.1.4.1.2636.4.8.0.3 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollFlowOverload 1.3.6.1.4.1.2636.4.8.0.4 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollFlowOverloadCleared 1.3.6.1.4.1.2636.4.8.0.5 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollMemoryUnavailable 1.3.6.1.4.1.2636.4.8.0.6 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollMemoryAvailable 1.3.6.1.4.1.2636.4.8.0.7 – – Devices that run Junos OS
and have collector PICs
installed.
jnxCollFtpSwitchover 1.3.6.1.4.1.2636.4.8.0.8 – – Devices that run Junos OS
and have collector PICs
installed.
PMON MIB jnxPMonOverloadSet 1.3.6.1.4.1.2636.4.7.0.1 – – Devices that run Junos OS
(jnx-pmon.mib) and have PICs that
support passive
monitoring installed.
jnxPMonOverloadCleared 1.3.6.1.4.1.2636.4.7.0.2 – – Devices that run Junos OS
and have PICs that
support passive
monitoring installed.
Copyright © 2010, Juniper Networks, Inc. 83
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
SONET APS apsEventChannelMismatch 1.3.6.1.4.1.2636.3. – – Devices that run Junos OS
MIB (jnx- 24.2.0.3 and have SONET PICs
sonetaps.mib) installed.
apsEventPSBF 1.3.6.1.4.1.2636.3. – – Devices that run Junos OS
24.2.0.4 and have SONET PICs
installed.
apsEventFEPLF 1.3.6.1.4.1.2636.3. – – Devices that run Junos OS
24.2.0.5 and have SONET PICs
installed.
Remote Operations Notifications
PING MIB jnxPingRttThreshold Exceeded 1.3.6.1.4.1.2636.4.9.0.1 – – All devices running Junos
(jnx-ping.mib) OS.
jnxPingRttStdDevThreshold 1.3.6.1.4.1.2636.4.9.0.2 – – All devices running Junos
Exceeded OS.
jnxPingRttJitterThreshold 1.3.6.1.4.1.2636.4.9.0.3 – – All devices running Junos
Exceeded OS.
jnxPingEgressThreshold 1.3.6.1.4.1.2636.4.9.0.4 – – All devices running Junos
Exceeded OS.
jnxPingEgressStdDevThreshold 1.3.6.1.4.1.2636.4.9.0.5 – – All devices running Junos
Exceeded OS.
jnxPingEgressJitterThreshold 1.3.6.1.4.1.2636.4.9.0.6 – – All devices running Junos
Exceeded OS.
jnxPingIngressThreshold 1.3.6.1.4.1.2636.4.9.0.7 – – All devices running Junos
Exceeded OS.
jnxPingIngressStddevThreshold 1.3.6.1.4.1.2636.4.9.0.8 – – All devices running Junos
Exceeded OS.
jnxPingIngressJitterThreshold 1.3.6.1.4.1.2636.4.9.0.9 – – All devices running Junos
Exceeded OS.
Routing Notifications
BFD bfdSessUp 1.3.6.1.4.1.2636. – – All devices running Junos
Experimental 5.3.1.0.1 OS.
MIB jnx-bfd-
exp.mib
bfdSessDown 1.3.6.1.4.1.2636.5.3.1.0.2 – – All devices running Junos
OS.
84 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
BGP4 V2 MIB jnxBgpM2Established 1.3.6.1.4.1.2636.5.1.1.1.0.1 – – All devices running Junos
(jnx-bgpmib2. OS.
mib)
jnxBgpM2BackwardTransition 1.3.6.1.4.1.2636.5.1.1.1.0.2 – – All devices running Junos
OS.
LDP MIB jnxLdpLspUp 1.3.6.1.4.1.2626.4.4.0.1 – – M, T, and MX Series
(jnx-ldp.mib) routers.
jnxLdpLspDown 1.3.6.1.4.1.2626.4.4.0.2 – – M, T, and MX Series
routers.
jnxLdpSesUp 1.3.6.1.4.1.2626.4.4.0.3 – – M, T, and MX Series
routers.
jnxLdpSesDown 1.3.6.1.4.1.2626.4.4.0.4 – – M, T, and MX Series
routers.
MPLS MIB mplsLspUp (Deprecated) 1.3.6.1.4.1.2636.3.2.4.1 – –
(jnx-mpls.mib)
mplsLspInfoUp 1.3.6.1.4.1.2636.3.2.0.1 – – M, T, and MX Series
routers.
mplsLspDown (Deprecated) 1.3.6.1.4.1.2636.3.2.4.2 – –
mplsLspInfoDown 1.3.6.1.4.1.2636.3.2.0.2 – – M, T, and MX Series
routers.
mplsLspChange (Deprecated) 1.3.6.1.4.1.2636.3.2.4.3 – –
mplsLspInfoChange 1.3.6.1.4.1.2636.3.2.0.3 – – M, T, and MX Series
routers.
mplsLspPathDown 1.3.6.1.4.1.2636.3.2.4.4 – –
(Deprecated)
mplsLspInfoPathDown 1.3.6.1.4.1.2636.3.2.0.4 – – M, T, and MX Series
routers.
mplsLspInfoPathUp 1.3.6.1.4.1.2636.3.2.0.5 – – M, T, and MX Series
routers.
Copyright © 2010, Juniper Networks, Inc. 85
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
VPN MIB jnxVpnIfUp 1.3.6.1.4.1.2636.3. – – M, T, and MX Series
(jnx-vpn.mib) 26.0.1 routers.
jnxVpnIfDown 1.3.6.1.4.1.2636.3. – – M, T, and MX Series
26.0.2 routers.
jnxVpnPwUp 1.3.6.1.4.1.2636.3. – – M, T, and MX Series
26.0.3 routers.
jnxVpnPwDown 1.3.6.1.4.1.2636.3.26.0.4 – – M, T, and MX Series
routers.
AAA MIB jnxAccessAuthServiceUp 1.3.6.1.4.1.2636.3.51. – – J Series and SRX devices.
(jnx-user- 1.0.1
aaa.mib)
jnxAccessAuthServiceDown 1.3.6.1.4.1.2636.3.51. – – J Series and SRX devices.
1.0.2
jnxAccessAuthServerDisabled 1.3.6.1.4.1.2636.3.51. – – J Series and SRX devices.
1.0.3
jnxAccessAuthServerEnabled 1.3.6.1.4.1.2636.3.51. – – J Series and SRX devices.
1.0.4
Access jnxJsFwAuthFailure 1.3.6.1.4.1.2636.3.39.1.2. – – J Series and SRX devices.
Authentication 1.0.1
Methods MIB
(jnx-js-auth.
jnxJsFwAuthServiceUp 1.3.6.1.4.1.2636.3.39.1.2. – – J Series and SRX devices.
mib)
1.0.2
jnxJsFwAuthServiceDown 1.3.6.1.4.1.2636.3.39.1.2. – – J Series and SRX devices.
1.0.3
jnxJsFwAuthCapacity Exceeded 1.3.6.1.4.1.2636.3.39.1.2. – – J Series and SRX devices.
1.0.4
Network jnxJsNatAddrPool 1.3.6.1.4.1.2636.3.39.1.7. – – J Series and SRX devices.
Address ThresholdStatus 1.0.1
Translation
MIB
(jnx-js-nat.mib)
86 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 10: Enterprise-Specific Supported SNMP Version 2 Traps (continued)
System
Logging
Severity
Source MIB Trap Name snmpTrapOID Level System Log Tag Supported on
Security jnxJsScreenAttack 1.3.6.1.4.1.2636.3.39.1.8. Warning RT_SCREEN_ICMP, J Series and SRX devices.
Screening 1.0.1 RT_SCREEN_IP,
Objects MIB RT_SCREEN_
(jnx-js- SESSION_LIMIT,
screening.mib) RT_SCREEN_TCP,
RT_SCREEN_UDP
jnxJsScreenCfgChange 1.3.6.1.4.1.2636.3.39.1.8. – – J Series and SRX devices.
1.0.2
RMON Alarms
RMON MIB jnxRmonAlarmGetFailure 1.3.6.1.4.1.2636.4. – – All devices running Junos
(jnx-rmon.mib) 3.0.1 OS.
jnxRmonGetOk 1.3.6.1.4.1.2636.4. – – All devices running Junos
3.0.2 OS.
SONET Alarms
SONET MIB jnxSonetAlarmSet 1.3.6.1.4.1.2636.4. – – Devices that run Junos OS
(jnx-sonet.mib) 6.0.1 and have SONET PICs
installed.
jnxSonetAlarmCleared 1.3.6.1.4.1.2636.4. – – Devices that run Junos OS
6.0.2 and have SONET PICs
installed.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Juniper Networks Enterprise-Specific BGP Traps
Junos OS Release 10.0 introduces two enterprise-specific traps, jnxBgpM2Established
and jnxBgpM2BackwardTransition, to support BGP clients that follow IPv6 addressing.
The previous versions of Junos OS supported only the standard BGP traps,
BgpM2Established and BgpM2BackwardTransition. The standard BGP traps support only
IPv4 addresses, and return 0.0.0.0 as the IP address of the BGP remote peer if the remote
peer is configured with an IPv6 address. The newly introduced enterprise-specific traps
support IPv6 addressing and contain the proper IPv6 address of the remote peer if the
remote peer is configured with an IPv6 address. However, Junos OS continues to support
Copyright © 2010, Juniper Networks, Inc. 87
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
the standard traps and generates them when the BGP clients are configured with IPv4
addresses.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Juniper Networks Enterprise-Specific LDP Traps
For information about the enterprise-specific LDP traps, see LDP MIB.
Disabling LDP Traps
You can disable the LDP LSP notifications by including the trap disable statement at the
[show protocols ldp log-updown] hierarchy level.
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Juniper Networks Enterprise-Specific MIMSTP Traps
Table 11 on page 88 lists the Juniper Networks enterprise-specific MIMSTP traps.
Table 11: Juniper Networks Enterprise-Specific MIMSTP Traps
Object Object Identifier Description
jnxMIMstGenTrap jnxMIMstTraps 1 Generated when any of the general events such as protocol up
or protocol down occurs.
jnxMIMstErrTrap jnxMIMstTraps 2 Generated when any of the error events such as memory failure,
buffer failure, protocol migration, or new root or topology change
occurs.
jnxMIMstNewRootTrap jnxMIMstTraps 3 Generated when a new root bridge is selected in the topology.
The jnxMIMstNewRootTrap indicates that the sending agent
has become the new root of the spanning-tree; the trap is sent
by a bridge soon after its election as the new root
jnxMIMstTopologyChgTrap jnxMIMstTraps 4 Generated when a topology change is detected.
jnxMIMstProtocolMigrationTrap jnxMIMstTraps 5 Generated when a port protocol migration happens on the port.
jnxMIMstInvalidBpduRxdTrap jnxMIMstTraps 6 Generated when an invalid packet is received for
bpdu/stp/rstp/maximum age/forward delay/hello time.
88 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Table 11: Juniper Networks Enterprise-Specific MIMSTP Traps (continued)
Object Object Identifier Description
jnxMIMstRegionConfigChangeTrap jnxMIMstTraps 7 Generated when the multiple spanning-tree region's
configuration identifier changes.
Related • MIMSTP MIB
Documentation
• jnxMIDot1sJuniperMstTable
• Juniper Networks MSTI Bridge Table
• jnxMIMstVlanInstanceMappingTable
• jnxMIMstCistPortTable
• jnxMIMstMstiPortTable
Enterprise-Specific MPLS Traps
Table 12 on page 89 lists the enterprise-specific MPLS traps based on mplsLspInfoName.
Table 12: MPLS Traps
Object Object ID Description
mplsLspInfoUp mplsLspTraps 1 Indicates that the LSP (mplsLspInfoName) is up. The current active
path is represented by mplsPathInfoName.
mplsLspInfoDown mplsLspTraps 2 Indicates that the LSP (mplsLspInfoName) is down because the current
active path (mplsPathInfoName) has gone down.
mplsLspInfoChange mplsLspTraps 3 Indicates that the LSP (mplsLspInfoName) has switched traffic to a
new active path (mplsPathInfoName) without changing the state (up)
before or after the switch.
mplsLspInfoPathDown mplsLspTraps 4 Indicates that the specified path (mplsPathInfoName) for the LSP
(mplsLspInfoName) has gone down.
mplsLspInfoPathUp mplsLspTraps 5 Indicates that the specified path (mplsPathInfoName) for the LSP
(mplsLspInfoName) has come up.
Related • MPLS MIB
Documentation
• MPLS Info Table
• MPLS Traffic Engineering (TE) Info Table
• mplsAdminGroup
• mplsLspInfoList
Copyright © 2010, Juniper Networks, Inc. 89
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring SNMP Informs
Junos OS supports two types of notifications: traps and informs. With traps, the receiver
does not send any acknowledgment when it receives a trap. Therefore, the sender cannot
determine if the trap was received. A trap may be lost because a problem occurred during
transmission. To increase reliability, an inform is similar to a trap except that the inform
is stored and retransmitted at regular intervals until one of these conditions occurs:
• The receiver (target) of the inform returns an acknowledgment to the SNMP agent.
• A specified number of unsuccessful retransmissions have been attempted and the
agent discards the inform message.
If the sender never receives a response, the inform can be sent again. Thus, informs are
more likely to reach their intended destination than traps are. Informs use the same
communications channel as traps (same socket and port) but have different protocol
data unit (PDU) types.
Informs are more reliable than traps, but they consume more network and router resources
(see Figure 1 on page 90). Unlike a trap, an inform is held in memory until a response is
received or the timeout is reached. Also, traps are sent only once, whereas an inform may
be retried several times. Use informs when it is important that the SNMP manager receive
all notifications. However, if you are more concerned about network traffic or router
memory, use traps.
Figure 1: Inform Request and Response
For information about configuring SNMP traps, see “Configuring SNMPv3 Traps on a
Device Running Junos OS” on page 91.
Related • Configuring SNMPv3 Traps on a Device Running Junos OS on page 91
Documentation
• Configuring the Remote Engine and Remote User
• Configuring the Inform Notification Type and Target Address
• Complete SNMPv3 Configuration Statements
• Minimum SNMPv3 Configuration on a Device Running Junos OS
90 Copyright © 2010, Juniper Networks, Inc.
Chapter 5: Juniper Networks Enterprise-Specific SNMP Traps
Configuring SNMPv3 Traps on a Device Running Junos OS
In SNMPv3, traps and informs are created by configuring the notify, target-address, and
target-parameters parameters. Traps are unconfirmed notifications, whereas informs
are confirmed notifications. This section describes how to configure SNMP traps. For
information about configuring SNMP informs, see “Configuring SNMP Informs” on page 90.
The target address defines a management application’s address and parameters to be
used in sending notifications. Target parameters define the message processing and
security parameters that are used in sending notifications to a particular management
target. SNMPv3 also lets you define SNMPv1 and SNMPv2c traps.
NOTE: When you configure SNMP traps, make sure your configured access
privileges allow the traps to be sent. Access privileges are configured at the
[edit snmp v3 vacm access] and [edit snmp v3 vacm security-to-group] hierarchy
levels.
To configure SNMP traps, include the following statements at the [edit snmp v3] hierarchy
level:
[edit snmp v3]
notify name {
tag tag-name;
type trap;;
}
notify-filter name {
oid object-identifier (include | exclude);
}
target-address target-address-name {
address address;
address-mask address-mask;
logical-system logical-system;
port port-number;
routing-instance instance;
tag-list tag-list;
target-parameters target-parameters-name;
}
target-parameters target-parameters-name {
notify-filter profile-name;
parameters {
message-processing-model (v1 | v2c | v3);
security-level (authentication | none | privacy);
security-model (usm | v1 | v2c);
security-name security-name;
}
}
Related • Configuring the SNMPv3 Trap Notification
Documentation
• Configuring the Trap Notification Filter
• Configuring the Trap Target Address
Copyright © 2010, Juniper Networks, Inc. 91
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Defining and Configuring the Trap Target Parameters
• Configuring SNMP Informs on page 90
• Configuring the Remote Engine and Remote User
• Configuring the Inform Notification Type and Target Address
• Complete SNMPv3 Configuration Statements
• Minimum SNMPv3 Configuration on a Device Running Junos OS
92 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 6
Summary of SNMP Configuration
Statements
The following sections explain each of the SNMP configuration statements. The
statements are organized alphabetically.
access-list
Syntax [edit snmp]
routing-instance-access {
access-list {
routing-instance;
routing-instance restrict;
}
}
Hierarchy Level [edit snmp routing-instance-access]
Release Information Statement introduced in Junos OS Release 8.4.
Description Create access lists to control SNMP agents in routing instances from accessing SNMP
information. To enable the SNMP agent on a routing instance to access SNMP information,
specify the routing instance name. To disable the SNMP agent on a routing instance from
accessing SNMP information, include the routing-instance name followed by the restrict
keyword.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • routing-instance-access on page 107
Documentation
Copyright © 2010, Juniper Networks, Inc. 93
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
agent-address
Syntax agent-address outgoing-interface;
Hierarchy Level [edit snmp trap-options]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Set the agent address of all SNMPv1 traps generated by this router. Currently, the only
option is outgoing-interface, which sets the agent address of each SNMPv1 trap to the
address of the outgoing interface of that trap.
Options outgoing-interface—Value of agent address of all SNMPv1 traps generated by this router.
The outgoing-interface option sets the agent address of each SNMPv1 trap to the
address of the outgoing interface of that trap.
Default: disabled (The agent address is not specified in SNMPv1 traps.)
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the Agent Address for SNMP Traps on page 48
Documentation
authorization
Syntax authorization authorization;
Hierarchy Level [edit snmp community community-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Set the access authorization for SNMP Get, GetBulk, GetNext, and Set requests.
Options authorization—Access authorization level:
• read-only—Enable Get, GetNext, and GetBulk requests.
• read-write—Enable all requests, including Set requests. You must configure a view to
enable Set requests.
Default: read-only
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the SNMP Community String on page 43
Documentation
94 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
categories
Syntax categories {
category;
}
Hierarchy Level [edit snmp trap-group group-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define the types of traps that are sent to the targets of the named trap group.
Default If you omit the categories statement, all trap types are included in trap notifications.
Options category—Name of a trap type.
Values: authentication, chassis, configuration, link, remote-operations, rmon-alarm, routing,
sonet-alarms, startup, vrrp-events
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
client-list
Syntax client-list client-list-name {
ip-addresses;
}
Hierarchy Level [edit snmp]
Release Information Statement introduced in Junos OS Release 8.5.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define a list of SNMP clients.
Options client-list-name—Name of the client list.
ip-addresses—IP addresses of the SNMP clients to be added to the client list,
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Adding a Group of Clients to an SNMP Community on page 44
Documentation
Copyright © 2010, Juniper Networks, Inc. 95
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
client-list-name
Syntax client-list-name client-list-name;
Hierarchy Level [edit snmp community community-name]
Release Information Statement introduced in Junos OS Release 8.5.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Add a client list or prefix list to an SNMP community.
Options client-list-name—Name of the client list or prefix list.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Adding a Group of Clients to an SNMP Community on page 44
Documentation
clients
Syntax clients {
address <restrict>;
}
Hierarchy Level [edit snmp community community-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Specify the IPv4 or IPv6 addresses of the SNMP client hosts that are authorized to use
this community.
Default If you omit the clients statement, all SNMP clients using this community string are
authorized to access the router.
Options address—Address of an SNMP client that is authorized to access this router. You must
specify an address, not a hostname. To specify more than one client, include multiple
address options.
restrict—(Optional) Do not allow the specified SNMP client to access the router.
Default: The client is granted access.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the SNMP Community String on page 43
Documentation
96 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
commit-delay
Syntax commit-delay seconds;
Hierarchy Level [edit snmp nonvolatile]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure the timer for the SNMP Set reply and start of the commit.
Options seconds—Delay between affirmative SNMP Set reply and start of the commit.
Default: 5 seconds
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the Commit Delay Timer on page 42
Documentation
Copyright © 2010, Juniper Networks, Inc. 97
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
community
Syntax community community-name {
authorization authorization;
client-list-name client-list-name;
clients {
address restrict;
}
view view-name;
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define an SNMP community. An SNMP community authorizes SNMP clients based on
the source IP address of incoming SNMP request packets. A community also defines
which MIB objects are available and the operations (read-only or read-write) allowed
on those objects.
The SNMP client application specifies an SNMP community name in Get, GetBulk, GetNext,
and Set SNMP requests.
Default If you omit the community statement, all SNMP requests are denied.
Options community-name—Community string. If the name includes spaces, enclose it in quotation
marks (" ").
The remaining statements are explained separately.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the SNMP Community String on page 43
Documentation
98 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
contact
Syntax contact contact;
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define the value of the MIB II sysContact object, which is the contact person for the
managed system.
Options contact—Name of contact person. If the name includes spaces, enclose it in quotation
marks (" ").
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the System Contact on a Device Running Junos OS on page 40
Documentation
description
Syntax description description;
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define the value of the MIB II sysDescription object, which is the description of the system
being managed.
Options description—System description. If the name includes spaces, enclose it in quotation
marks (" ").
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the System Description on a Device Running Junos OS on page 41
Documentation
Copyright © 2010, Juniper Networks, Inc. 99
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
destination-port
Syntax destination-port port-number;
Hierarchy Level [edit snmp trap-group]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Assign a trap port number other than the default.
Default If you omit this statement, the default port is 162.
Options port-number—SNMP trap port number.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
engine-id
See engine-id
filter-duplicates
Syntax filter-duplicates;
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Filter duplicate Get, GetNext, or GetBulk SNMP requests.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Filtering Duplicate SNMP Requests on page 41
Documentation
100 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
filter-interfaces
Syntax filter-interfaces {
interfaces {
all-internal-interfaces;
interface 1;
interface 2;
}
}
Hierarchy Level [edit snmp]
Release Information Statement introduced in Junos OS Release 9.4.
Statement introduced in Junos OS Release 9.4 for EX Series Switches.
Description Filter out information related to specific interfaces from the output of SNMP Get and
GetNext requests performed on interface-related MIBs.
Options all-internal-interfaces—Filters out information related to internal interfaces from the
output of SNMP Get and GetNext requests.
interfaces—Specifies the interfaces to filter out from the output of SNMP Get and GetNext
requests.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Filtering Interface Information Out of SNMP Get and GetNext Output on page 52
Documentation
Copyright © 2010, Juniper Networks, Inc. 101
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
interface
Syntax interface [ interface-names ];
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure the interfaces on which SNMP requests can be accepted.
Default If you omit this statement, SNMP requests entering the router through any interface are
accepted.
Options interface-names—Names of one or more logical interfaces.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the Interfaces on Which SNMP Requests Can Be Accepted on page 52
Documentation
location
Syntax location location;
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define the value of the MIB II sysLocation object, which is the physical location of the
managed system.
Options location—Location of the local system. You must enclose the name within quotation
marks (" ").
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the System Location for a Device Running Junos OS on page 40
Documentation
102 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
logical-system
Syntax logical-system logical-system-name {
routing-instance routing-instance-name;
}
Hierarchy Level [edit snmp community community-name],
[edit snmp trap-group],
[edit snmp trap-options]
[edit snmp v3target-address target-address-name]
Release Information Statement introduced in Junos OS Release 9.3
Statement introduced in Junos OS Release 9.0 for EX Series switches.
NOTE: The logical-system statement replaces the logical-router statement,
and is backward-compatible with Junos OS Release 8.3 and later.
Description Specify a logical system name for SNMP v1 and v2c clients.
Include at the [edit snmp trap-options] hierarchy level to specify a logical-system address
as the source address of an SNMP trap.
Include at the [edit snmp v3 target-address] hierarchy level to specify a logical-system
name as the destination address for an SNMPv3 trap or inform.
Options logical-system-name–Name of the logical system.
routing-instance routing-instance-name–Statement to specify a routing instance associated
with the logical system.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
Documentation
• Configuring the Trap Target Address
Copyright © 2010, Juniper Networks, Inc. 103
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
logical-system-trap-filter
Syntax logical-system-trap-filter;
Hierarchy Level [edit snmp]
Release Information Statement introduced in Junos OS Release 8.4.
Description Restrict the routing instances from receiving traps that are not related to the logical
system networks to which they belong.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Trap Support for Routing Instances on page 134
Documentation
name
Syntax name name;
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Set the system name from the command-line interface.
Options name—System name override.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the System Name on page 42
Documentation
104 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
nonvolatile
Syntax nonvolatile {
commit-delay seconds;
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
The commit-delay statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure options for SNMP Set requests.
The statement is explained separately.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the Commit Delay Timer on page 42
Documentation
• commit-delay on page 97
oid
Syntax oid object-identifier ( exclude| include );
Hierarchy Level [edit snmp view view-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Specify an object identifier (OID) used to represent a subtree of MIB objects.
Options exclude—Exclude the subtree of MIB objects represented by the specified OID.
include—Include the subtree of MIB objects represented by the specified OID.
object-identifier—OID used to represent a subtree of MIB objects. All MIB objects
represented by this statement have the specified OID as a prefix. You can specify
the OID using either a sequence of dotted integers or a subtree name.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring MIB Views on page 53
Documentation
Copyright © 2010, Juniper Networks, Inc. 105
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
routing-instance
Syntax routing-instance routing-instance-name;
Hierarchy Level [edit snmp community community-name],
[edit snmp community community-name logical-system logical-system-name],
[edit snmp trap-group group]
Release Information Statement introduced in Junos OS Release 8.3.
Added to the [edit snmp community community-name] hierarchy level in Junos OS
Release 8.4.
Added to the [edit snmp community community-name logical-system logical-system-name]
hierarchy level in Junos OS Release 9.1.
Statement introduced in Junos OS Release 9.1 for EX Series switches.
Description Specify a routing instance for SNMPv1 and SNMPv2 trap targets. All targets configured
in the trap group use this routing instance.
If the routing instance is defined within a logical system, include the logical-system
logical-system-name statement at the [edit snmp community community-name] hierarchy
level and specify the routing-instance statement under the [edit snmp community
community-name logical-system logical system-name] hierarchy level.
Options routing-instance-name—Name of the routing instance.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
• Configuring the Source Address for SNMP Traps on page 46
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
106 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
routing-instance-access
Syntax [edit snmp]
routing-instance-access {
access-list {
routing-instance;
routing-instance restrict;
}
}
Hierarchy Level [edit snmp]
Release Information Statement introduced in Junos OS Release 8.4.
Description Enable SNMP managers in routing instances other than the default routing instance to
access SNMP information. For information about the access-list option, see access-list.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Enabling SNMP Access over Routing Instances on page 130
Documentation
snmp
Syntax snmp { ... }
Hierarchy Level [edit]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure SNMP.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP on a Device Running Junos OS on page 38
Documentation
Copyright © 2010, Juniper Networks, Inc. 107
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
source-address
Syntax source-address address;
Hierarchy Level [edit snmp trap-options]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Set the source address of every SNMP trap packet sent by this router to a single address
regardless of the outgoing interface. If the source address is not specified, the default is
to use the address of the outgoing interface as the source address.
Options address—Source address of SNMP traps. You can configure the source address of trap
packets two ways: lo0 or a valid IPv4 address configured on one of the router
interfaces. The value lo0 indicates that the source address of all SNMP trap packets
is set to the lowest loopback address configured at interface lo0.
Default: disabled (The source address is the address of the outgoing interface.)
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the Source Address for SNMP Traps on page 46
Documentation
targets
Syntax targets {
address;
}
Hierarchy Level [edit snmp trap-group group-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Configure one or more systems to receive SNMP traps.
Options address—IPv4 or IPv6 address of the system to receive traps. You must specify an address,
not a hostname.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
108 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
traceoptions
Syntax traceoptions {
file filename <files number> <match regular-expression> <size size> <world-readable |
no-world-readable>;
flag flag;
no-remote-trace;
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
file filename option added in Junos OS Release 8.1.
world-readable | no-world-readable option added in Junos OS Release 8.1.
match regular-expression option added in Junos OS Release 8.1.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description The output of the tracing operations is placed into log files in the /var/log directory. Each
log file is named after the SNMP agent that generates it. Currently, the following logs are
created in the /var/log directory when the traceoptions statement is used:
• chassisd
• craftd
• ilmid
• mib2d
• rmopd
• serviced
• snmpd
Options file filename—By default, the name of the log file that records trace output is the name
of the process being traced (for example, mib2d or snmpd). Use this option to specify
another name.
files number—(Optional) Maximum number of trace files per SNMP subagent. When a
trace file (for example, snmpd) reaches its maximum size, it is archived by being
renamed to snmpd.0. The previous snmpd.1 is renamed to snmpd.2, and so on. The
oldest archived file is deleted.
Range: 2 through 1000 files
Default: 10 files
flag flag—Tracing operation to perform. To specify more than one tracing operation,
include multiple flag statements:
• all—Log all SNMP events.
• configuration—Log reading of configuration at the [edit snmp] hierarchy level.
Copyright © 2010, Juniper Networks, Inc. 109
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• database—Log events involving storage and retrieval in the events database.
• events—Log important events.
• general—Log general events.
• interface-stats—Log physical and logical interface statistics.
• nonvolatile-sets—Log nonvolatile SNMP set request handling.
• pdu—Log SNMP request and response packets.
• policy—Log policy processing.
• protocol-timeouts—Log SNMP response timeouts.
• routing-socket—Log routing socket calls.
• server—Log communication with processes that are generating events.
• subagent—Log subagent restarts.
• timer-events—Log internally generated events.
• varbind-error—Log variable binding errors.
match regular-expression—(Optional) Refine the output to include lines that contain the
regular expression.
size size—(Optional) Maximum size, in kilobytes (KB), of each trace file before it is closed
and archived.
Range: 10 KB through 1 GB
Default: 1000 KB
world-readable | no-world-readable—(Optional) By default, log files can be accessed
only by the user who configures the tracing operation. The world-readable option
enables any user to read the file. To explicitly set the default behavior, use the
no-world-readable option.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Tracing SNMP Activity on a Device Running Junos OS on page 54
Documentation
110 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
trap-group
Syntax trap-group group-name {
categories {
category;
}
destination-port port-number;
routing-instance instance;
targets {
address;
}
version (all | v1 | v2);
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Create a named group of hosts to receive the specified trap notifications. The name of
the trap group is embedded in SNMP trap notification packets as one variable binding
(varbind) known as the community name. At least one trap group must be configured
for SNMP traps to be sent.
Options group-name—Name of the trap group. If the name includes spaces, enclose it in quotation
marks (" ").
The remaining statements are explained separately.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
Copyright © 2010, Juniper Networks, Inc. 111
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
trap-options
Syntax trap-options {
agent-address outgoing-interface;
source-address address;
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Using SNMP trap options, you can set the source address of every SNMP trap packet
sent by the router to a single address, regardless of the outgoing interface. In addition,
you can set the agent address of each SNMPv1 trap. For more information about the
contents of SNMPv1 traps, see RFC 1157.
The remaining statements are explained separately.
Default Disabled
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Options on page 46
Documentation
version
Syntax version (all | v1 | v2);
Hierarchy Level [edit snmp trap-group group-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Specify the version number of SNMP traps.
Options all—Send an SNMPv1 and SNMPv2 trap for every trap condition.
v1—Send SNMPv1 traps only.
v2—Send SNMPv2 traps only.
Default: all
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring SNMP Trap Groups on page 49
Documentation
112 Copyright © 2010, Juniper Networks, Inc.
Chapter 6: Summary of SNMP Configuration Statements
view
See the following sections:
• view (Associating a MIB View with a Community) on page 113
• view (Configuring a MIB View) on page 114
view (Associating a MIB View with a Community)
Syntax view view-name;
Hierarchy Level [edit snmp community community-name]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Associate a view with a community. A view represents a group of MIB objects.
Options view-name—Name of the view. You must use a view name already configured in the view
statement at the [edit snmp] hierarchy level.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring the SNMP Community String on page 43
Documentation
Copyright © 2010, Juniper Networks, Inc. 113
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
view (Configuring a MIB View)
Syntax view view-name {
oid object-identifier (include | exclude);
}
Hierarchy Level [edit snmp]
Release Information Statement introduced before Junos OS Release 7.4.
Statement introduced in Junos OS Release 9.0 for EX Series switches.
Description Define a MIB view. A MIB view identifies a group of MIB objects. Each MIB object in a view
has a common OID prefix. Each object identifier represents a subtree of the MIB object
hierarchy. The view statement uses a view to specify a group of MIB objects on which to
define access. To enable a view, you must associate the view with a community by
including the view statement at the [edit snmp community community-name] hierarchy
level.
NOTE: To remove an OID completely, use the delete view all oid oid-number
command but omit the include parameter.
Options view-name—Name of the view
The remaining statement is explained separately.
Required Privilege snmp—To view this statement in the configuration.
Level snmp-control—To add this statement to the configuration.
Related • Configuring MIB Views on page 53
Documentation
• Associating MIB Views with an SNMP User Group
• community on page 98
114 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 7
SNMP Remote Operations
This chapter contains the following topics:
• SNMP Remote Operations Overview on page 115
• Using the Ping MIB for Remote Monitoring Devices Running Junos OS on page 118
• Starting a Ping Test on page 118
• Monitoring a Running Ping Test on page 119
• Gathering Ping Test Results on page 122
• Stopping a Ping Test on page 124
• Interpreting Ping Variables on page 124
• Using the Traceroute MIB for Remote Monitoring Devices Running Junos OS on page 125
SNMP Remote Operations Overview
A SNMP remote operation is any process on the router that can be controlled remotely
using SNMP. Junos OS currently provides support for two SNMP remote operations: the
Ping MIB and Traceroute MIB, defined in RFC 2925. Using these MIBs, an SNMP client in
the network management system (NMS) can:
• Start a series of operations on a router
• Receive notification when the operations are complete
• Gather the results of each operation
Junos OS also provides extended functionality to these MIBs in the Juniper Networks
enterprise-specific extensions jnxPingMIB and jnxTraceRouteMIB. For more information
about jnxPingMIB and jnxTraceRouteMIB, see the “PING MIB” on page 339 and “Traceroute
MIB” on page 393 topics in the Junos SNMP MIBs and Traps Reference.
This topic covers the following sections:
• SNMP Remote Operation Requirements on page 116
• Setting SNMP Views on page 116
• Setting Trap Notification for Remote Operations on page 116
• Using Variable-Length String Indexes on page 117
• Enabling Logging on page 117
Copyright © 2010, Juniper Networks, Inc. 115
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
SNMP Remote Operation Requirements
To use SNMP remote operations, you should be experienced with SNMP conventions.
You must also configure Junos OS to allow the use of the remote operation MIBs.
Setting SNMP Views
All remote operation MIBs supported by Junos OS require that the SNMP clients have
read-write privileges. The default SNMP configuration of Junos OS does not provide
clients with a community string with such privileges.
To set read-write privileges for an SNMP community string, include the following
statements at the [edit snmp] hierarchy level:
[edit snmp]
community community-name {
authorization authorization;
view view-name;
}
view view-name {
oid object-identifier (include | exclude);
}
Example: Setting SNMP Views
To create a community named remote-community that grants SNMP clients read-write
access to the Ping MIB, jnxPing MIB, Traceroute MIB, and jnxTraceRoute MIB, include the
following statements at the [edit snmp] hierarchy level:
snmp {
view remote-view {
oid 1.3.6.1.2.1.80 include; # pingMIB
oid 1.3.6.1.4.1.2636.3.7 include; # jnxPingMIB
oid 1.3.6.1.2.1.81 include; # traceRouteMIB
oid 1.3.6.1.4.1.2636.3.8 include; # jnxTraceRouteMIB
}
community remote-community {
view remote-view;
authorization read-write;
}
}
For more information about the community statement, see “Configuring the SNMP
Community String” on page 43 and community.
For more information about the view statement, see “Configuring MIB Views” on page 53,
view (Associating a MIB View with a Community), and view (Configuring a MIB View).
Setting Trap Notification for Remote Operations
In addition to configuring the remote operations MIB for trap notification, you must also
configure Junos OS. You must specify a target host for remote operations traps.
To configure trap notification for SNMP remote operations, include the categories and
targets statements at the [edit snmp trap-group group-name] hierarchy level:
[edit snmp trap-group group-name]
116 Copyright © 2010, Juniper Networks, Inc.
Chapter 7: SNMP Remote Operations
categories {
category;
}
targets {
address;
}
}
Example: Setting Trap Notification for Remote Operations
Specify 172.17.12.213 as a target host for all remote operation traps:
snmp {
trap-group remote-traps {
categories remote-operations;
targets {
172.17.12.213;
}
}
}
For more information about trap groups, see “Configuring SNMP Trap Groups” on page 49.
Using Variable-Length String Indexes
All tabular objects in the remote operations MIBs supported by Junos OS are indexed by
two variables of type SnmpAdminString. For more information about SnmpAdminString,
see RFC 2571.
Junos OS does not handle SnmpAdminString any differently from the octet string variable
type. However, the indexes are defined as variable length. When a variable length string
is used as an index, the length of the string must be included as part of the object identifier
(OID).
Example: Set Variable-Length String Indexes
To reference the pingCtlTargetAddress variable of a row in pingCtlTable where
pingCtlOwnerIndex is bob and pingCtlTestName is test, use the following object identifier
(OID):
pingMIB.pingObjects.pingCtlTable.pingCtlEntry.pingCtlTargetAddress."bob"."test"
1.3.6.1.2.1.80.1.2.1.4.3.98.111.98.4.116.101.115.116
For more information about the definition of the Ping MIB, see RFC 2925.
Enabling Logging
The SNMP error code returned in response to SNMP requests can only provide a generic
description of the problem. The error descriptions logged by the remote operations
process can often provide more detailed information about the problem and help you
to solve the problem faster. This logging is not enabled by default. To enable logging,
include the flag general statement at the [edit snmp traceoptions] hierarchy level:
[edit]
snmp {
traceoptions {
flag general;
}
Copyright © 2010, Juniper Networks, Inc. 117
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
For more information about traceoptions, see “Tracing SNMP Activity on a Device Running
Junos OS” on page 54.
If the remote operations process receives an SNMP request that it cannot accommodate,
the error is logged in the /var/log/rmopd file. To monitor this log file, issue the monitor
start rmopd command in operational mode of the command-line interface (CLI).
Related • Using the Ping MIB for Remote Monitoring Devices Running Junos OS on page 118
Documentation
• Using the Traceroute MIB for Remote Monitoring Devices Running Junos OS on page 125
Using the Ping MIB for Remote Monitoring Devices Running Junos OS
A ping test is used to determine whether packets sent from the local host reach the
designated host and are returned. If the designated host can be reached, the ping test
provides the approximate round-trip time for the packets. Ping test results are stored in
pingResultsTable and pingProbeHistoryTable.
RFC 2925 is the authoritative description of the Ping MIB in detail and provides the ASN.1
MIB definition of the Piing MIB.
Related • SNMP Remote Operations Overview on page 115
Documentation
• Starting a Ping Test on page 118
• Monitoring a Running Ping Test on page 119
• Gathering Ping Test Results on page 122
• Stopping a Ping Test on page 124
• Interpreting Ping Variables on page 124
Starting a Ping Test
Before you start a ping test, configure a Ping MIB view. This allows SNMP Set requests
on pingMIB. To start a ping test, create a row in pingCtlTable and set pingCtlAdminStatus
to enabled. The minimum information that must be specified before setting
pingCtlAdminStatus to enabled is:
• pingCtlOwnerIndexSnmpAdminString
• pingCtlTestNameSnmpAdminString
• pingCtlTargetAddressInetAddress
• pingCtlTargetAddressTypeInetAddressType
• pingCtlRowStatusRowStatus
For all other values, defaults are chosen unless otherwise specified. pingCtlOwnerIndex
and pingCtlTestName are used as the index, so their values are specified as part of the
118 Copyright © 2010, Juniper Networks, Inc.
Chapter 7: SNMP Remote Operations
object identifier (OID). To create a row, set pingCtlRowStatus to createAndWait or
createAndGo on a row that does not already exist. A value of active for pingCtlRowStatus
indicates that all necessary information has been supplied and the test can begin;
pingCtlAdminStatus can be set to enabled. An SNMP Set request that sets
pingCtlRowStatus to active will fail if the necessary information in the row is not specified
or is inconsistent. For information about how to configure a view, see “Setting SNMP
Views” on page 116.
There are two ways to start a ping test:
• Using Multiple Set Protocol Data Units (PDUs) on page 119
• Using a Single Set PDU on page 119
Using Multiple Set Protocol Data Units (PDUs)
You can use multiple Set request PDUs (multiple PDUs, with one or more varbinds each)
and set the following variables in this order to start the test:
• pingCtlRowStatus to createAndWait
• All appropriate test variables
• pingCtlRowStatus to active
Junos OS now verifies that all necessary information to run a test has been specified.
• pingCtlAdminStatus to enabled
Using a Single Set PDU
You can use a single Set request PDU (one PDU, with multiple varbinds) to set the
following variables to start the test:
• pingCtlRowStatus to createAndGo
• All appropriate test variables
• pingCtlAdminStatus to enabled
Monitoring a Running Ping Test
When pingCtlAdminStatus is successfully set to enabled, the following is done before
the acknowledgment of the SNMP Set request is sent back to the client:
• pingResultsEntry is created if it does not already exist.
• pingResultsOperStatus transitions to enabled.
For more information, see the following sections:
• pingResultsTable on page 120
• pingProbeHistoryTable on page 121
• Generating Traps on page 122
Copyright © 2010, Juniper Networks, Inc. 119
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
pingResultsTable
While the test is running, pingResultsEntry keeps track of the status of the test. The value
of pingResultsOperStatus is enabled while the test is running and disabled when it has
stopped.
The value of pingCtlAdminStatus remains enabled until you set it to disabled. Thus, to
get the status of the test, you must examine pingResultsOperStatus.
The pingCtlFrequency variable can be used to schedule many tests for one pingCtlEntry.
After a test ends normally (you did not stop the test) and the pingCtlFrequency number
of seconds has elapsed, the test is started again just as if you had set pingCtlAdminStatus
to enabled. If you intervene at any time between repeated tests (you set
pingCtlAdminStatus to disabled or pingCtlRowStatus to notInService), the repeat feature
is disabled until another test is started and ends normally. A value of 0 for
pingCtlFrequency indicates this repeat feature is not active.
pingResultsIpTgtAddr and pingResultsIpTgtAddrType are set to the value of the resolved
destination address when the value of pingCtlTargetAddressType is dns. When a test
starts successfully and pingResultsOperStatus transitions to enabled:
• pingResultsIpTgtAddr is set to null-string.
• pingResultsIpTgtAddrType is set to unknown.
pingResultsIpTgtAddr and pingResultsIpTgtAddrType are not set until
pingCtlTargetAddress can be resolved to a numeric address. To retrieve these values,
poll pingResultsIpTgtAddrType for any value other than unknown after successfully setting
pingCtlAdminStatus to enabled.
At the start of a test, pingResultsSentProbes is initialized to 1 and the first probe is sent.
pingResultsSentProbes increases by 1 each time a probe is sent.
As the test runs, every pingCtlTimeOut seconds, the following occur:
• pingProbeHistoryStatus for the corresponding pingProbeHistoryEntry in
pingProbeHistoryTable is set to requestTimedOut.
• A pingProbeFailed trap is generated, if necessary.
• An attempt is made to send the next probe.
NOTE: No more than one outstanding probe exists for each test.
For every probe, you can receive one of the following results:
• The target host acknowledges the probe with a response.
• The probe times out; there is no response from the target host acknowledging the
probe.
• The probe could not be sent.
120 Copyright © 2010, Juniper Networks, Inc.
Chapter 7: SNMP Remote Operations
Each probe result is recorded in pingProbeHistoryTable. For more information about
pingProbeHistoryTable, see “pingProbeHistoryTable” on page 121.
When a response is received from the target host acknowledging the current probe:
• pingResultsProbeResponses increases by 1.
• The following variables are updated:
• pingResultsMinRtt—Minimum round-trip time
• pingResultsMaxRtt—Maximum round-trip time
• pingResultsAverageRtt—Average round-trip time
• pingResultsRttSumOfSquares—Sum of squares of round-trip times
• pingResultsLastGoodProbe—Timestamp of the last response
NOTE: Only probes that result in a response from the target host
contribute to the calculation of the round-trip time (RTT) variables.
When a response to the last probe is received or the last probe has timed out, the test is
complete.
pingProbeHistoryTable
An entry in pingProbeHistoryTable (pingProbeHistoryEntry) represents a probe result and
is indexed by three variables:
• The first two variables, pingCtlOwnerIndex and pingCtlTestName, are the same ones
used for pingCtlTable, which identifies the test.
• The third variable, pingProbeHistoryIndex, is a counter to uniquely identify each probe
result.
The maximum number of pingProbeHistoryTable entries created for a given test is limited
by pingCtlMaxRows. If pingCtlMaxRows is set to 0, no pingProbeHistoryTable entries are
created for that test.
Each time a probe result is determined, a pingProbeHistoryEntry is created and added to
pingProbeHistoryTable. pingProbeHistoryIndex of the new pingProbeHistoryEntry is 1
greater than the last pingProbeHistoryEntry added to pingProbeHistoryTable for that test.
pingProbeHistoryIndex is set to 1 if this is the first entry in the table. The same test can be
run multiple times, so this index keeps growing.
If pingProbeHistoryIndex of the last pingProbeHistoryEntry added is 0xFFFFFFFF, the next
pingProbeHistoryEntry added has pingProbeHistoryIndex set to 1.
The following is recorded for each probe result:
Copyright © 2010, Juniper Networks, Inc. 121
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• pingProbeHistoryResponse—Time to live (TTL)
• pingProbeHistoryStatus—What happened and why
• pingProbeHistoryLastRC—Return code (RC) value of ICMP packet
• pingProbeHistoryTime—Timestamp when probe result was determined
When a probe cannot be sent, pingProbeHistoryResponse is set to 0. When a probe times
out, pingProbeHistoryResponse is set to the difference between the time when the probe
was discovered to be timed out and the time when the probe was sent.
Generating Traps
For any trap to be generated, the appropriate bit of pingCtlTrapGeneration must be set.
You must also configure a trap group to receive remote operations. A trap is generated
under the following conditions:
• A pingProbeFailed trap is generated every time pingCtlTrapProbeFailureFilter number
of consecutive probes fail during the test.
• A pingTestFailed trap is generated when the test completes and at least
pingCtlTrapTestFailureFilter number of probes fail.
• A pingTestCompleted trap is generated when the test completes and fewer than
pingCtlTrapTestFailureFilter probes fail.
NOTE: A probe is considered a failure when pingProbeHistoryStatus of the
probe result is anything besides responseReceived.
For information about how to configure a trap group to receive remote operations, see
“Configuring SNMP Trap Groups” on page 49 and “Example: Setting Trap Notification
for Remote Operations” on page 117.
Gathering Ping Test Results
You can either poll pingResultsOperStatus to find out when the test is complete or request
that a trap be sent when the test is complete. For more information about
pingResultsOperStatus, see “pingResultsTable” on page 120. For more information about
Ping MIB traps, see “Generating Traps” on page 122.
The statistics calculated and then stored in pingResultsTable include:
• pingResultsMinRtt—Minimum round-trip time
• pingResultsMaxRtt—Maximum round-trip time
• pingResultsAverageRtt—Average round-trip time
• pingResultsProbeResponses—Number of responses received
• pingResultsSentProbes—Number of attempts to send probes
122 Copyright © 2010, Juniper Networks, Inc.
Chapter 7: SNMP Remote Operations
• pingResultsRttSumOfSquares—Sum of squares of round-trip times
• pingResultsLastGoodProbe—Timestamp of the last response
You can also consult pingProbeHistoryTable for more detailed information about each
probe. The index used for pingProbeHistoryTable starts at 1, goes to 0xFFFFFFFF, and
wraps to 1 again.
For example, if pingCtlProbeCount is 15 and pingCtlMaxRows is 5, then upon completion
of the first run of this test, pingProbeHistoryTable contains probes like those in Table 13
on page 123.
Table 13: Results in pingProbeHistoryTable: After the First Ping Test
pingProbeHistoryIndex Probe Result
11 Result of 11th probe from run 1
12 Result of 12th probe from run 1
13 Result of 13th probe from run 1
14 Result of 14th probe from run 1
15 Result of 15th probe from run 1
Upon completion of the first probe of the second run of this test, pingProbeHistoryTable
will contain probes like those in Table 14 on page 123.
Table 14: Results in pingProbeHistoryTable: After the First Probe of the
Second Test
pingProbeHistoryIndex Probe Result
12 Result of 12th probe from run 1
13 Result of 13th probe from run 1
14 Result of 14th probe from run 1
15 Result of 15th probe from run 1
16 Result of 1st probe from run 2
Upon completion of the second run of this test, pingProbeHistoryTable will contain probes
like those in Table 15 on page 123.
Table 15: Results in pingProbeHistoryTable: After the Second Ping Test
pingProbeHistoryIndex Probe Result
26 Result of 11th probe from run 2
Copyright © 2010, Juniper Networks, Inc. 123
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 15: Results in pingProbeHistoryTable: After the Second Ping
Test (continued)
pingProbeHistoryIndex Probe Result
27 Result of 12th probe from run 2
28 Result of 13th probe from run 2
29 Result of 14th probe from run 2
30 Result of 15th probe from run 2
History entries can be deleted from the MIB in two ways:
• More history entries for a given test are added and the number of history entries exceeds
pingCtlMaxRows. The oldest history entries are deleted to make room for the new ones.
• You delete the entire test by setting pingCtlRowStatus to destroy.
Stopping a Ping Test
To stop an active test, set pingCtlAdminStatus to disabled. To stop the test and remove
its pingCtlEntry, pingResultsEntry, and any pingHistoryEntry objects from the MIB, set
pingCtlRowStatus to destroy.
Interpreting Ping Variables
This section clarifies the ranges for the following variables that are not explicitly specified
in the Ping MIB:
• pingCtlDataSize—The value of this variable represents the total size of the payload (in
bytes) of an outgoing probe packet. This payload includes the timestamp (8 bytes)
that is used to time the probe. This is consistent with the definition of pingCtlDataSize
(maximum value of 65,507) and the standard ping application.
If the value of pingCtlDataSize is between 0 and 8 inclusive, it is ignored and the payload
is 8 bytes (the timestamp). The Ping MIB assumes all probes are timed, so the payload
must always include the timestamp.
For example, if you wish to add an additional 4 bytes of payload to the packet, you
must set pingCtlDataSize to 12.
• pingCtlDataFill—The first 8 bytes of the data segment of the packet is for the timestamp.
After that, the pingCtlDataFill pattern is used in repetition. The default pattern (when
pingCtlDataFill is not specified) is (00, 01, 02, 03 ... FF, 00, 01, 02, 03 ... FF, ...).
• pingCtlMaxRows—The maximum value is 255.
• pingMaxConcurrentRequests—The maximum value is 500.
• pingCtlTrapProbeFailureFilter and pingCtlTrapTestFailureFilter—A value of 0 for
pingCtlTrapProbeFailureFilter or pingCtlTrapTestFailureFilter is not well defined by the
124 Copyright © 2010, Juniper Networks, Inc.
Chapter 7: SNMP Remote Operations
Ping MIB. If pingCtlTrapProbeFailureFilter is 0, pingProbeFailed traps will not be
generated for the test under any circumstances. If pingCtlTrapTestFailureFilter is 0,
pingTestFailed traps will not be generated for the test under any circumstances.
Using the Traceroute MIB for Remote Monitoring Devices Running Junos OS
A traceroute test approximates the path packets take from the local host to the remote
host.
RFC 2925 is the authoritative description of the Traceroute MIB in detail and provides
the ASN.1 MIB definition of the Traceroute MIB.
Related • SNMP Remote Operations Overview on page 115
Documentation
• Starting a Traceroute Test
• Monitoring a Running Traceroute Test
• Monitoring Traceroute Test Completion
• Gathering Traceroute Test Results
• Stopping a Traceroute Test
• Interpreting Traceroute Variables
Copyright © 2010, Juniper Networks, Inc. 125
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
126 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 8
SNMP Support for Routing Instances
This chapter contains the following topics:
• Understanding SNMP Support for Routing Instances on page 127
• Support Classes for MIB Objects on page 128
• Identifying a Routing Instance on page 129
• Enabling SNMP Access over Routing Instances on page 130
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
• Example: Configuring Interface Settings for a Routing Instance on page 132
• Configuring Access Lists for SNMP Access over Routing Instances on page 133
• Trap Support for Routing Instances on page 134
• MIB Support Details on page 134
Understanding SNMP Support for Routing Instances
Junos OS enables SNMP managers for all routing instances to request and manage SNMP
data related to the corresponding routing instances and logical system networks.
In Junos OS:
• Clients from routing instances other than the default can access MIB objects and
perform SNMP operations only on the logical system networks to which they belong.
• Clients from the default routing instance can access information related to all routing
instances and logical system networks.
Before Junos OS Release 8.4, only the SNMP manager in the default routing instance
(inet.0) had access to the MIB objects
With the increase in virtual private network (VPN) service offerings, this feature is useful
particularly for service providers who need to obtain SNMP data for specific routing
instances (see Figure 2 on page 128). Service providers can use this information for their
own management needs or export the data for use by their customers.
Copyright © 2010, Juniper Networks, Inc. 127
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Figure 2: SNMP Data for Routing Instances
If no routing instance is specified in the request, the SNMP agent operates as before:
• For nonrouting table objects, all instances are exposed.
• For routing table objects, only those associated with the default routing instance are
exposed.
NOTE: The actual protocol data units (PDUs) are still exchanged over the
default (inet.0) routing instance, but the data contents returned are dictated
by the routing instance specified in the request PDUs.
Related • Support Classes for MIB Objects on page 128
Documentation
• Trap Support for Routing Instances on page 134
• Identifying a Routing Instance on page 129
• Enabling SNMP Access over Routing Instances on page 130
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
• Configuring Access Lists for SNMP Access over Routing Instances on page 133
Support Classes for MIB Objects
When a routing instance is specified, all routing-related MIB objects return data maintained
by the routing instance in the request. For all other MIB objects, the data returned is
segregated according to that routing instance. For example, only those interfaces assigned
to that routing instance (for example, the logical interfaces [ifls] as well as their
corresponding physical interfaces [ifds]) are exposed by the SNMP agent. Similarly,
objects with an unambiguous attachment to an interface (for example, addresses) are
segregated as well.
For those objects where the attachment is ambiguous (for example, objects in
sysApplMIB), no segregation is done and all instances are visible in all cases.
128 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Another category of objects is visible only when no logical system is specified (only within
the default logical system) regardless of the routing instance within the default logical
system. Objects in this category are Chassis MIB objects, objects in the SNMP group,
RMON alarm, event and log groups, Ping MIB objects, configuration management objects,
and V3 objects.
In summary, to support routing instances, MIB objects fall into one of the following
categories:
• Class 1—Data is segregated according to the routing instance in the request. This is the
most granular of the segregation classes.
• Class 2—Data is segregated according to the logical system specified in the request.
The same data is returned for all routing instances that belong to a particular logical
system. Typically, this applies to routing table objects where it is difficult to extract
routing instance information or where routing instances do not apply.
• Class 3—Data is exposed only for the default logical system. The same set of data is
returned for all routing instances that belong to the default logical system. If you specify
another logical system (not the default), no data is returned. Typically this class applies
to objects implemented in subagents that do not monitor logical system changes and
register their objects using only the default context (for example, Chassis MIB objects).
• Class 4—Data is not segregated by routing instance. The same data is returned for all
routing instances. Typically, this applies to objects implemented in subagents that
monitor logical system changes and register or deregister all their objects for each
logical system change. Objects whose values cannot be segregated by routing instance
fall into this class.
See “MIB Support Details” on page 134 for a list of the objects associated with each class.
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Trap Support for Routing Instances on page 134
Identifying a Routing Instance
With this feature, routing instances are identified by either the context field in v3 requests
or encoded in the community string in v1 or v2c requests.
When encoded in a community string, the routing instance name appears first and is
separated from the actual community string by the @ character.
To avoid conflicts with valid community strings that contain the @ character, the
community is parsed only if typical community string processing fails. For example, if a
routing instance named RI is configured, an SNMP request with RI@public is processed
within the context of the RI routing instance. Access control (views, source address
restrictions, access privileges, and so on) is applied according to the actual community
string (the set of data after the @ character—in this case public). However, if the
community string RI@public is configured, the protocol data unit (PDU) is processed
according to that community and the embedded routing instance name is ignored.
Copyright © 2010, Juniper Networks, Inc. 129
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Logical systems perform a subset of the actions of a physical router and have their own
unique routing tables, interfaces, policies, and routing instances. When a routing instance
is defined within a logical system, the logical system name must be encoded along with
the routing instance using a slash ( / ) to separate the two. For example, if the routing
instance RI is configured within the logical system LS, that routing instance must be
encoded within a community string as LS/RI@public. When a routing instance is configured
outside a logical system (within the default logical system), no logical system name (or
/ character) is needed.
Also, when a logical system is created, a default routing instance (named default) is
always created within the logical system. This name should be used when querying data
for that routing instance (for example, LS/default@public). For v3 requests, the name
logical system/routing instance should be identified directly in the context field.
NOTE: To identify a virtual LAN (VLAN) spanning-tree instance (VSTP on
MX Series Ethernet Services Routers), specify the routing instance name
followed by a double colon (::) and the VLAN ID. For example, to identify
VSTP instance for VLAN 10 in the global default routing instance, include
default::10@public in the context (SNMPv3) or community (SNMPv1 or v2)
string.
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Enabling SNMP Access over Routing Instances on page 130
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
Enabling SNMP Access over Routing Instances
To enable SNMP managers in routing instances other than the default routing instance
to access SNMP information, include the routing-instance-access statement at the [edit
snmp] hierarchy level:
[edit snmp]
routing-instance-access;
If this statement is not included in the SNMP configuration, SNMP managers from routing
instances other than the default routing instance cannot access SNMP information.
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Identifying a Routing Instance on page 129
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
• Configuring Access Lists for SNMP Access over Routing Instances on page 133
130 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community
You can specify the routing instance along with the client information when you add a
client to an SNMP community. To specify the routing instance to which a client belongs,
include the routing-instance statement followed by the routing instance name and client
information in the SNMP configuration.
The following example shows the configuration statement to add routing instance test-ri
to SNMP community community1.
NOTE: Routing instances specified at the [edit snmp community
community-name] hierarchy level are added to the default logical system in
the community.
[edit snmp]
community community1 {
clients {
10.209.152.33/32;
}
routing-instance test-ri {
clients {
10.19.19.1/32;
}
}
}
If the routing instance is defined within a logical system, include the routing-instance
statement at the [edit snmp community community-name logical-system
logical-system-name] hierarchy level, as in the following example:
[edit snmp]
community community1 {
clients {
10.209.152.33/32;
}
logical-system test-LS {
routing-instance test-ri {
clients {
10.19.19.1/32;
}
}
}
}
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Identifying a Routing Instance on page 129
• Enabling SNMP Access over Routing Instances on page 130
• Configuring Access Lists for SNMP Access over Routing Instances on page 133
• Example: Configuring Interface Settings for a Routing Instance on page 132
Copyright © 2010, Juniper Networks, Inc. 131
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Example: Configuring Interface Settings for a Routing Instance
This example shows an 802.3ad ae0 interface configuration allocated to a routing instance
named INFrtd:
[edit chassis]
aggregated-devices {
ethernet {
device-count 5;
}
}
[edit interfaces ae0]
vlan-tagging;
aggregated-ether-options {
minimum-links 2;
link-speed 100m;
}
unit 0 {
vlan-id 100;
family inet {
address 10.1.0.1/24;
}
}
[edit interfaces fe-1/1/0]
fastether-options {
802.3ad ae0;
}
[edit interfaces fe-1/1/1]
fastether-options {
802.3ad ae0;
}
[edit routing-instances]
INFrtd {
instance-type virtual-router;
interface fe-1/1/0.0;
interface fe-1/1/1.0;
interface fe-1/1/5.0;
interface ae0.0;
protocols {
ospf {
area 0.0.0.0 {
interface all;
}
}
}
}
The following snmpwalk command shows how to retrieve SNMP-related information
from router1 and the 802.3ae bundle interface belonging to routing instance INFrtd with
the SNMP community public:
router# snmpwalk -Os router1 INFrtd@public dot3adAggTable
dot3adAggMACAddress.59 = 0:90:69:92:93:f0
dot3adAggMACAddress.65 = 0:90:69:92:93:f0
dot3adAggActorSystemPriority.59 = 0
132 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
dot3adAggActorSystemPriority.65 = 0
dot3adAggActorSystemID.59 = 0:0:0:0:0:0
dot3adAggActorSystemID.65 = 0:0:0:0:0:0
dot3adAggAggregateOrIndividual.59 = true(1)
dot3adAggAggregateOrIndividual.65 = true(1)
dot3adAggActorAdminKey.59 = 0
dot3adAggActorAdminKey.65 = 0
dot3adAggActorOperKey.59 = 0
dot3adAggActorOperKey.65 = 0
dot3adAggPartnerSystemID.59 = 0:0:0:0:0:0
dot3adAggPartnerSystemID.65 = 0:0:0:0:0:0
dot3adAggPartnerSystemPriority.59 = 0
dot3adAggPartnerSystemPriority.65 = 0
dot3adAggPartnerOperKey.59 = 0
dot3adAggPartnerOperKey.65 = 0
dot3adAggCollectorMaxDelay.59 = 0
dot3adAggCollectorMaxDelay.65 = 0
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
Configuring Access Lists for SNMP Access over Routing Instances
You can create and maintain access lists to manage access to SNMP information. Access
list configuration enables you to allow or deny SNMP access to clients of a specific routing
instance.
The following example shows how to create an access list:
[edit snmp]
routing-instance-access {
access-list {
ri1 restrict;
ls1/default;
ls1/ri2;
ls1*;
}
}
The configuration given in the example:
• Restricts clients in ri1 from accessing SNMP information.
• Allows clients in ls1/default, ls1/ri2, and all other routing instances with names starting
with ls1 to access SNMP information.
You can use the wildcard character (*) to represent a string in the routing instance name.
NOTE: You cannot restrict the SNMP manager of the default routing instance
from accessing SNMP information.
Copyright © 2010, Juniper Networks, Inc. 133
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Enabling SNMP Access over Routing Instances on page 130
• Specifying a Routing Instance in an SNMPv1 or SNMPv2c Community on page 131
Trap Support for Routing Instances
You can restrict the trap receivers from receiving traps that are not related to the logical
system networks to which they belong. To do this, include the logical-system-trap-filter
statement at the [edit snmp] hierarchy level:
[edit snmp]
logical-system-trap-filter;
If the logical-system-trap-filter statement is not included in the SNMP configuration, all
traps are forwarded to the configured routing instance destinations. However, even when
this statement is configured, the trap receiver associated with the default routing instance
will receive all SNMP traps.
When configured under the trap-group object, all v1 and v2c traps that apply to routing
instances (or interfaces belonging to a routing instance) have the routing instance name
encoded in the community string. The encoding is identical to that used in request PDUs.
For traps configured under the v3 framework, the routing instance name is carried in the
context field when the v3 message processing model has been configured. For other
message processing models (v1 or v2c), the routing instance name is not carried in the
trap message header (and not encoded in the community string).
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Support Classes for MIB Objects on page 128
• MIB Support Details on page 134
MIB Support Details
Table 16 on page 134 shows enterprise-specific MIB objects supported by Junos OS and
provides notes detailing how they are handled when a routing instance is specified in an
SNMP request. An en dash (–) indicates that the item is not applicable.
Table 16: MIB Support for Routing Instances (Juniper Networks MIBs)
Object Support Class Description/Notes
jnxProducts(1) – Product Object IDs
jnxServices(2) – Services
jnxMibs(3) Class 3 Objects are exposed only for the default
logical system.
jnxBoxAnatomy(1)
134 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Table 16: MIB Support for Routing Instances (Juniper Networks
MIBs) (continued)
Object Support Class Description/Notes
mpls(2) Class 2 All instances within a logical system are
exposed. Data will not be segregated down
to the routing instance level.
ifJnx(3) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
a specific routing instance are exposed.
jnxAlarms(4) Class 3 Objects are exposed only for the default
logical system.
jnxFirewalls(5) Class 4 Data is not segregated by routing instance.
All instances are exposed.
jnxDCUs(6) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
a specific routing instance are exposed.
jnxPingMIB(7) Class 3 Objects are exposed only for the default
logical system.
jnxTraceRouteMIB(8) Class 3 Objects are exposed only for the default
logical system.
jnxATM(10) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
a specific routing instance are exposed.
jnxIpv6(11) Class 4 Data is not segregated by routing instance.
All instances are exposed.
jnxIpv4(12) Class 1 jnxIpv4AddrTable(1). Only those logical
interfaces (and their parent physical
interfaces) that belong to a specific routing
instance are exposed.
jnxRmon(13) Class 3 jnxRmonAlarmTable(1). Objects are
exposed only for the default logical
system.
jnxLdp(14) Class 2 jnxLdpTrapVars(1). All instances within a
logical system are exposed. Data will not
be segregated down to the routing
instance level.
Copyright © 2010, Juniper Networks, Inc. 135
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 16: MIB Support for Routing Instances (Juniper Networks
MIBs) (continued)
Object Support Class Description/Notes
jnxCos(15) Class 3 Objects are exposed only for the default
logical system.
jnxCosIfqStatsTable(1)
jnxCosFcTable(2)
jnxCosFcIdTable(3)
jnxCosQstatTable(4)
jnxScu(16) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxScuStatsTable(1) a specific routing instance are exposed.
jnxRpf(17) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxRpfStatsTable(1) a specific routing instance are exposed.
jnxCfgMgmt(18) Class 3 Objects are exposed only for the default
logical system.
jnxPMon(19) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxPMonFlowTable(1) a specific routing instance are exposed.
jnxPMonErrorTable(2)
jnxPMonMemoryTable(3)
jnxSonet(20) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxSonetAlarmTable(1) a specific routing instance are exposed.
jnxAtmCos(21) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxCosAtmVcTable(1) a specific routing instance are exposed.
jnxCosAtmScTable(2)
jnxCosAtmVcQstatsTable(3)
jnxCosAtmTrunkTable(4)
ipSecFlowMonitorMIB(22) – –
jnxMac(23) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
jnxMacStats(1) a specific routing instance are exposed.
apsMIB(24) Class 3 Objects are exposed only for the default
logical system.
jnxChassisDefines(25) Class 3 Objects are exposed only for the default
logical system.
136 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Table 16: MIB Support for Routing Instances (Juniper Networks
MIBs) (continued)
Object Support Class Description/Notes
jnxVpnMIB(26) Class 2 All instances within a logical system are
exposed. Data will not be segregated down
to the routing instance level.
jnxSericesInfoMib(27) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
a specific routing instance are exposed.
jnxCollectorMIB(28) Class 1 Only those logical interfaces (and their
parent physical interfaces) that belong to
a specific routing instance are exposed.
jnxHistory(29) – –
jnxSpMIB(32) Class 3 Objects are exposed only for the default
logical system.
Table 17 on page 138 shows Class 1 MIB objects (standard and enterprise-specific MIBs)
supported by Junos OS. With Class 1 objects, only those logical interfaces (and their
parent physical interfaces) that belong to a specific routing instance are exposed.
Copyright © 2010, Juniper Networks, Inc. 137
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 17: Class 1 MIB Objects (Standard and Juniper MIBs)
Class MIB Objects
Class 1 802.3ad.mib (dot3adAgg) MIB objects:
dot3adAggTable
dot3adAggPortListTable
(dot3adAggPort)
dot3adAggPortTable
dot3adAggPortStatsTable
dot3adAggPortDebugTable
rfc2863a.mib ifTable
ifXTable
ifStackTable
rfc2011a.mib ipAddrTable
ipNetToMediaTable
rtmib.mib ipForward (ipCidrRouteTable)
rfc2665a.mib dot3StatsTable
dot3ControlTable
dot3PauseTable
rfc2495a.mib dsx1ConfigTable
dsx1CurrentTable
dsx1IntervalTable
dsx1TotalTable
dsx1FarEndCurrentTable
dsx1FarEndIntervalTable
dsx1FarEndTotalTable
dsx1FracTable ...
rfc2496a.mib dsx3 (dsx3ConfigTable)
rfc2115a.mib frDlcmiTable (and related MIB objects)
rfc3592.mib sonetMediumTable (and related MIB
objects)
138 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Table 17: Class 1 MIB Objects (Standard and Juniper MIBs) (continued)
Class MIB Objects
rfc3020.mib mfrMIB
mfrBundleTable
mfrMibBundleLinkObjects
mfrBundleIfIndexMappingTable
(and related MIB objects)
ospf2mib.mib All objects
ospf2trap.mib All objects
bgpmib.mib All objects
rfc2819a.mib Example: etherStatsTable
Copyright © 2010, Juniper Networks, Inc. 139
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 17: Class 1 MIB Objects (Standard and Juniper MIBs) (continued)
Class MIB Objects
Class 1 rfc2863a.mib Examples:
ifXtable
ifStackTable
rfc2665a.mib etherMIB
rfc2515a.mib atmMIB objects
Examples:
atmInterfaceConfTable
atmVplTable
atmVclTable
rfc2465.mib ip-v6mib
Examples:
ipv6IfTable
ipv6AddrPrefixTable
ipv6NetToMediaTable
ipv6RouteTable
rfc2787a.mib vrrp mib
rfc2932.mib ipMRouteMIB
ipMRouteStdMIB
mroutemib.mib ipMRoute1MIBObjects
isismib.mib isisMIB
pimmib.mib pimMIB
msdpmib.mib msdpmib
jnx-if-extensions.mib Examples:
ifJnxTable
ifChassisTable
jnx-dcu.mib jnxDCUs
jnx-atm.mib
140 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Table 17: Class 1 MIB Objects (Standard and Juniper MIBs) (continued)
Class MIB Objects
Examples:
jnxAtmIfTable
jnxAtmVCTable
jnxAtmVpTable
jnx-ipv4.mib jnxipv4
Example: jnxIpv4AddrTable
jnx-cos.mib Examples:
jnxCosIfqStatsTable
jnxCosQstatTable
jnx-scu.mib Example: jnxScuStatsTable
jnx-rpf.mib Example: jnxRpfStatsTable
jnx-pmon.mib Example: jnxPMonFlowTable
jnx-sonet.mib Example: jnxSonetAlarmTable
Class 1 jnx-atm-cos.mib Examples:
jnxCosAtmVcTable
jnxCosAtmVcScTable
jnxCosAtmVcQstatsTable
jnxCosAtmTrunkTable
jnx-mac.mib Example: jnxMacStatsTable
jnx-services.mib Example: jnxSvcFlowTableAggStatsTable
jnx-coll.mib jnxCollectorMIB
Examples:
jnxCollPicIfTable
jnxCollFileEntry
Table 18 on page 142 shows Class 2 MIB objects (standard and enterprise-specific MIBs)
supported by Junos OS. With Class 2 objects, all instances within a logical system are
exposed. Data will not be segregated down to the routing instance level.
Copyright © 2010, Juniper Networks, Inc. 141
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 18: Class 2 MIB Objects (Standard and Juniper MIBs)
Class MIB Objects
Class 2 rfc3813.mib mplsLsrStdMIB
Examples:
mplsInterfaceTable
mplsInSegmentTable
mplsOutSegmentTable
mplsLabelStackTable
mplsXCTable
(and related MIB objects)
igmpmib.mib igmpStdMIB
l3vpnmib.mib mplsVpnmib
jnx-mpls.mib Example: mplsLspList
jnx-ldp.mib jnxLdp
Example: jnxLdpStatsTable
jnx-vpn.mib jnxVpnMIB
jnx-bgpmib2.mib jnxBgpM2Experiment
Table 19 on page 143 shows Class 3 MIB objects (standard and enterprise-specific MIBs)
supported by Junos OS. With Class 3, objects are exposed only for the default logical
system.
142 Copyright © 2010, Juniper Networks, Inc.
Chapter 8: SNMP Support for Routing Instances
Table 19: Class 3 MIB Objects (Standard and Juniper MIBs)
Class MIB Objects
Class 3 rfc2819a.mib rmonEvents
alarmTable
logTable
eventTable
agentxMIB
rfc2925a.mib pingmib
rfc2925b.mib tracerouteMIB
jnxchassis.mib jnxBoxAnatomy
jnx-chassis-alarm.mib jnxAlarms
jnx-ping.mib jnxPingMIB
jnx-traceroute.mib jnxTraceRouteMIB
jnx-rmon.mib jnxRmonAlarmTable
jnx-cos.mib Example: jnxCosFcTable
jnx-cfgmgmt.mib Example: jnxCfgMgmt
jnx-sonetaps.mib apsMIBObjects
jnx-sp.mib jnxSpMIB
ggsn.mib ejnmobileipABmib
rfc1907.mib snmpModules
snmpModules Examples:
snmpMIB snmpFrameworkMIB
Table 20 on page 144 shows Class 4 MIB objects (standard and enterprise-specific MIBs)
supported by Junos OS. With Class 4 objects, data is not segregated by routing instance.
All instances are exposed.
Copyright © 2010, Juniper Networks, Inc. 143
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 20: Class 4 MIB Objects (Standard and Juniper MIBs)
Class MIB Objects
Class 4 system Example: sysORTable
rfc2011a.mib ip (ipDefaultTTL, ipInReceives)
icmp
rfc2012a.mib tcp
tcpConnTable
ipv6TcpConnTable
rfc2013a.mib udp
udpTable
ipv6UdpTable
rfc2790a.mib hrSystem
rfc2287a.mib sysApplOBJ
jnx-firewall.mib jnxFirewalls
jnx-ipv6.mib jnxIpv6
Related • Understanding SNMP Support for Routing Instances on page 127
Documentation
• Support Classes for MIB Objects on page 128
• Trap Support for Routing Instances on page 134
144 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 9
SRX100, SRX210, SRX220, SRX240, and
SRX650 Services Gateways Supported
Enterprise-Specific MIBs
This chapter contains the following topic:
• List of SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways Supported
Enterprise-Specific MIBs on page 145
List of SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways Supported
Enterprise-Specific MIBs
Junos OS supports the following enterprise-specific MIBs:
• Structure of Management Information MIB—Contains object identifiers (OIDs) for the
security branch of the MIBs used in Junos OS for J Series and SRX Series devices product,
services and traps. This MIB is currently supported only by Junos OS for J Series and
SRX Series devices. It also explains how the Juniper Networks enterprise-specific MIBs
are structured. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-smi.txt. For more information,
see “Structure of Management Information MIB” on page 153.
• Access Authentication Objects MIB—Provides support for monitoring firewall
authentication, including data about the users trying to access firewall-protected
resources and the firewall authentication service itself. This MIB is currently supported
only by Junos OS for J Series and SRX Series devices. For a downloadable version of
this MIB, see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-auth.txt .
For more information, see “Access Authentication Objects MIB” on page 161.
• Alarm MIB—Provides support for alarms from the router. For a downloadable version
of this MIB, see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-chassis-alarm.txt .
For more information, see “Alarm MIB” on page 165.
• BGP4 V2 MIB—Contains objects used to monitor BGP peer-received prefix counters.
It is based upon similar objects in the MIB documented in Internet draft
Copyright © 2010, Juniper Networks, Inc. 145
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
draft-ietf-idr-bgp4-mibv2-03.txt, Definitions of Managed Objects for the Fourth Version
of BGP (BGP-4), Second Version. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-bgpmib2.txt .
For more information, see “BGP4 V2 MIB” on page 169.
• BFD MIB—Provides support for monitoring Bidirectional Forwarding Detection (BFD)
sessions. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-bfd.txt .
For more information, see “Bidirectional Forwarding Detection (BFD) MIB” on page 171.
• Chassis MIB—Provides support for environmental monitoring (power supply state,
board voltages, fans, temperatures, and air flow) and inventory support for the chassis,
System Control Board (SCB), System and Switching Board (SSB), Switching and
Forwarding Model (SFM), Flexible PIC Concentrators (FPCs), and PICs. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-chassis.txt .
For more information, see “Chassis MIBs” on page 173.
• Configuration Management MIB—Provides notification for configuration changes as
SNMP traps. Each trap contains the time at which the configuration change was
committed, the name of the user who made the change, and the method by which the
change was made. A history of the last 32 configuration changes is kept in
jnxCmChgEventTable. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-cfgmgmt.txt .
For more information, see “Configuration Management MIB” on page 269.
• Ethernet MAC MIB—Monitors media access control (MAC) statistics on Gigabit Ethernet
intelligent queuing (IQ) interfaces. It collects MAC statistics; for example, inoctets,
inframes, outoctets, and outframes on each source MAC address and virtual LAN (VLAN)
ID for each Ethernet port. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-mac.txt .
For more information, see “Ethernet MAC MIB” on page 275.
• Event MIB—Defines a generic trap that can be generated using an op script or event
policy. This MIB provides the ability to specify a system log string and raise a trap if
that system log string is found. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-event.txt .
For more information, see “Event MIB” on page 277.
• Firewall MIB—Provides support for monitoring firewall filter counters. Routers must
have the Internet Processor II ASIC to perform firewall monitoring. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
146 Copyright © 2010, Juniper Networks, Inc.
Chapter 9: SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways Supported Enterprise-Specific MIBs
topic-collections/reference-mibs-and-traps/mib-jnx-firewall.txt .
For more information, see “Firewall MIB” on page 279.
• Host Resources MIB—Extends the hrStorageTable object, providing a measure of the
usage of each file system on the router in percentage. Previously, the objects in the
hrStorageTable measured the usage in allocation units—hrStorageUsed and
hrStorageAllocationUnits—only. Using the percentage measurement, you can more
easily monitor and apply thresholds on usage. For a downloadable version of this MIB,
see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-hostresources.txt .
For more information, see “Host Resources MIB” on page 283.
• Interface MIB—Extends the standard ifTable (RFC 2863) with additional statistics and
Juniper Networks enterprise-specific chassis information. For a downloadable version
of this MIB, see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-if-extensions.txt .
For more information, see “Interface MIB” on page 285.
• IP Forward MIB—Extends the standard IP Forwarding Table MIB (RFC 2096) to include
CIDR forwarding information. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-ipforward.txt .
For more information, see “IP Forward MIB” on page 291.
• IPsec Monitoring MIB—Provides operational and statistical information related to the
IPsec and IKE tunnels on Juniper Networks routers. For a downloadable version of this
MIB, see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-ipsec-monitor-asp.txt .
For more information, see “IPSec Monitoring MIB” on page 309.
• IPsec Generic Flow Monitoring Object MIB—Based on jnx-ipsec-monitor-mib, this MIB
provides support for monitoring IPsec and IPsec VPN management objects. This MIB
is currently supported only by Junos OS for J Series and SRX Series devices. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-ipsec-flow-mon.txt .
For more information, see “IPsec Generic Flow Monitoring Object MIB” on page 293.
• IPv4 MIB—Provides additional Internet Protocol version 4 (IPv4) address information,
supporting the assignment of identical IPv4 addresses to separate interfaces. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-ipv4.txt .
For more information, see “IPv4 MIB” on page 317.
• Network Address Translation (NAT) Objects MIB—Provides support for monitoring
network address translation (NAT). This MIB is currently supported only by Junos OS
for J Series and SRX Series devices. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
Copyright © 2010, Juniper Networks, Inc. 147
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
topic-collections/reference-mibs-and-traps/mib-jnx-js-nat.txt .
For more information, see “Network Address Translation Objects MIB” on page 327.
• Packet Forwarding Engine MIB—Provides notification statistics for Packet Forwarding
Engines. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-pfe.txt .
For more information, see “Packet Forwarding Engine MIB” on page 335.
• Ping MIB—Extends the standard Ping MIB control table (RFC 2925). Items in this MIB
are created when entries are created in pingCtlTable of the Ping MIB. Each item is
indexed exactly as it is in the Ping MIB. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-ping.txt .
For more information, see “PING MIB” on page 339.
• Policy Objects MIB—Provides support for monitoring the security policies that control
the flow of traffic from one zone to another. This MIB is currently supported only by
Junos OS for J Series and SRX Series devices. For a downloadable version of this MIB,
see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-policy.txt .
For more information, see “Policy Objects MIB” on page 355.
• Real-Time Media MIB—Defines a Real-Time Media configuration. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mibjnx-rtm.txt .
For more information, see “Real-Time Media MIB Overview” on page 361.
• Reverse-Path-Forwarding MIB—Monitors statistics for traffic that is rejected because
of reverse-path-forwarding (RPF) processing. For a downloadable version of this MIB,
see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-rpf.txt .
NOTE: The enterprise-specific RPF MIB is not supported on EX Series
Ethernet Switches.
For more information, see “Reverse Path Forwarding MIB” on page 371.
• RMON Events and Alarms MIB—Supports the Junos extensions to the standard Remote
Monitoring (RMON) Events and Alarms MIB (RFC 2819). The extension augments
alarmTable with additional information about each alarm. Two new traps are also
defined to indicate when problems are encountered with an alarm. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-rmon.txt .
For more information, see “RMON Events and Alarms MIB” on page 373.
148 Copyright © 2010, Juniper Networks, Inc.
Chapter 9: SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways Supported Enterprise-Specific MIBs
• Security Interface Extension Objects MIB—Provides support for the security
management of interfaces. This MIB is currently supported only by Junos OS for J Series
and SRX Series devices. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-if-ext.txt .
For more information, see “Security Interface Extension Objects MIB” on page 377.
• SIP Common MIB—Defines objects that are common to all SIP entities. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-sipcommon.txt.
For more information, see “SIP Common MIB Overview” on page 381.
• SNMP IDP Objects MIB—Provides support for monitoring SNMP IDP queries, requests,
responses, and failures. This MIB defines the key monitoring and threshold crossing
trap support, IDP database update status and trap support, attack-related monitoring
and trap support for SRX100, SRX210, SRX220, SRX240, and SRX650 Services
Gateways. This MIB models IDP attributes specific to the appropriate Juniper Networks
implementation. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/jnx-js-idp.mib.txt .
For more information, see “IDP MIB” on page 387.
• SPU Monitoring MIB—Provides support for monitoring SPUs on SRX5600 and SRX5800
devices. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-spu-monitoring.txt .
For more information, see SPU Monitoring MIB.
• System Log MIB—Enables notification of an SNMP trap-based application when an
important system log message occurs. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-syslog.txt .
For more information, see “System Log MIB” on page 389.
• Traceroute MIB—Supports the Junos extensions of traceroute and remote operations.
Items in this MIB are created when entries are created in the traceRouteCtlTable of
the Traceroute MIB. Each item is indexed exactly the same way as it is in the Traceroute
MIB. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-traceroute.txt .
For more information, see “Traceroute MIB” on page 393.
• Utility MIB—Provides SNMP support for exposing Junos data and has tables that contain
information on each type of data, such as integer and string. For a downloadable version
of this MIB, see http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-util.txt .
Copyright © 2010, Juniper Networks, Inc. 149
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
For more information, see “Utility MIB” on page 395.
• VPN Certificate Objects MIB—Provides support for monitoring the local and CA
certificates loaded on the router. This MIB is currently supported only by Junos OS for
J Series and SRX Series devices. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/
topic-collections/reference-mibs-and-traps/mib-jnx-js-cert.txt .
For more information, see “VPN Certificate Objects MIB” on page 399.
150 Copyright © 2010, Juniper Networks, Inc.
PART 3
SRX100, SRX210, SRX220, SRX240, and
SRX650 Services Gateways MIBs
• Interpreting the Structure of Management Information MIB on page 153
• Interpreting the Enterprise-Specific Access Authentication Objects MIB on page 161
• Interpreting the Enterprise-Specific Alarm MIB on page 165
• Interpreting the Enterprise-Specific BGP4 V2 MIB on page 169
• Interpreting the Enterprise-Specific Bidirectional Forwarding Detection
(BFD) MIB on page 171
• Interpreting the Enterprise-Specific Chassis MIBs on page 173
• Interpreting the Enterprise-Specific Configuration Management MIB on page 269
• Interpreting the Enterprise-Specific Ethernet MAC MIB on page 275
• Interpreting the Enterprise-Specific Event MIB on page 277
• Interpreting the Enterprise-Specific Firewall MIB on page 279
• Interpreting the Enterprise-Specific Host Resources MIB on page 283
• Interpreting the Enterprise-Specific Interface MIB on page 285
• Interpreting the Enterprise-Specific IP Forward MIB on page 291
• Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object
MIB on page 293
• Interpreting the Enterprise-Specific IPsec Monitoring MIB on page 309
• Interpreting the Enterprise-Specific IPv4 MIB on page 317
• Interpreting the Enterprise-Specific IPv6 MIB on page 319
• Interpreting the Enterprise-Specific Network Address Translation Objects
MIB on page 327
• Interpreting the Enterprise-Specific Packet Forwarding Engine MIB on page 335
• Interpreting the Enterprise-Specific Ping MIB on page 339
• Interpreting the Enterprise-Specific Policy Objects MIB on page 355
• Interpreting the Enterprise-Specific Real-Time Media MIB on page 361
• Interpreting the Enterprise-Specific Reverse-Path-Forwarding MIB on page 371
• Interpreting the Enterprise-Specific RMON Events and Alarms MIB on page 373
• Interpreting the Enterprise-Specific Security Interface Extension Objects MIB on page 377
Copyright © 2010, Juniper Networks, Inc. 151
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Interpreting the Enterprise-Specific SIP Common MIB on page 381
• Interpreting the Enterprise-Specific SNMP IDP MIB on page 387
• Interpreting the Enterprise-Specific System Log MIB on page 389
• Interpreting the Enterprise-Specific Traceroute MIB on page 393
• Interpreting the Enterprise-Specific Utility MIB on page 395
• Interpreting the Enterprise-Specific VPN Certificate Objects MIB on page 399
152 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 10
Interpreting the Structure of Management
Information MIB
This chapter contains the following topics:
• Structure of Management Information MIB on page 153
• jnxProducts on page 154
• jnxServices on page 154
• jnxMibs on page 155
• jnxTraps on page 157
• jnxExperiment on page 158
Structure of Management Information MIB
The Juniper Networks enterprise-specific Structure of Management Information MIB
defines the top-level structure of the Juniper Networks enterprise-specific MIB space.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-smi.txt
.
The Structure of Management Information MIB space has five root branches:
• jnxProducts on page 154
• jnxServices on page 154
• jnxMibs on page 155
• jnxTraps on page 157
• jnxExperiment on page 158
Related • Juniper Networks Enterprise-Specific SNMP Traps
Documentation
• Standard SNMP Traps Supported on Devices Running Junos OS
• Juniper Networks Enterprise-Specific MIBs on page 23
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 153
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxProducts
The object identifier for the jnxProducts root branch of the Structure of Management
Information MIB is {juniperMIB 1}. This branch of the MIB describes the Juniper Networks
routers and their components, such as product line, product name, model, number of
slots, and media space for holding PICs. It also provides information about the system’s
power supply state, board voltages, fans, temperatures, and air flow. In general, this
branch of the Structure of Management Information MIB is rarely polled for information
because it is descriptive. However, you can poll this branch of the Structure of
Management Information MIB to determine the sysObjectId of a router as defined by
MIB-II.
jnxProducts 1 is reserved for Junos OS-based products.
Related • Structure of Management Information MIB on page 153
Documentation
• jnxServices on page 154
• jnxMibs on page 155
• jnxTraps on page 157
• jnxExperiment on page 158
jnxServices
The object identifier for the jnxServices root branch is {juniperMIB 2}. This MIB file added
the nodes to create the Juniper Networks security tree structure under the object node
jnxJsObjects. In general, the prefix jnxJs is used to name the object identifiers and to
designate them. This branch of the network describes the Juniper Networks services
objects that provide enhanced network security. This MIB is currently supported by Junos
OS for J Series and SRX Series devices only.
The jnxJsSecurity node is designed to provide a branch for the security-related MIB
defintions specific to the Juniper Networks security products. The next level object
identifiers under jnxJsSecurity are:
• jnxJsIf—Whose object identifier is {jnxJsSecurity 1}.
• jnxJsAuth—Whose object identifier is {jnxJsSecurity 2}.
• jnxJsCertificates—Whose object identifier is {jnxJsSecurity 3}.
• jnxJsPolicies—Whose object identifier is {jnxJsSecurity 4}.
• jnxJsIPSecVpn—Whose object identifier is {jnxJsSecurity 5}.
• jnxJsResources—Whose object identifier is {jnxJsSecurity 6}.
• jnxJsNAT—Whose object identifier is {jnxJsSecurity 7}.
• jnxJsScreening—Whose object identifier is {jnxJsSecurity 8}.
154 Copyright © 2010, Juniper Networks, Inc.
Chapter 10: Interpreting the Structure of Management Information MIB
• jnxJsDhcp—Whose object identifier is {jnxJsSecurity 9}.
• jnxJsDnsRoot—Whose object identifier is {jnxJsSecurity 10}.
The Juniper Networks enterprise-specific security MIBs include:
• AAA Objects MIB—Whose object identifier is {jnxUserAAAMibRoot 1}.
• Access Authentication Objects MIB—Whose object identifier is {jnxJsAuth 1}.
• DNS Objects MIB—Whose object identifier is {jnxJsDns 1}.
• IPsec Generic Flow Monitoring Objects MIB—Whose object identifier is {jnxIpSecMibRoot
1}.
• IPsec VPN Objects MIB—Whose object identifier is {jnxJsIPSecVpn 1}.
• Network Address Translation Objects MIB—Whose object identifier is {jnxJsNAT 1}.
• Policy Objects MIB—Whose object identifier is {jnxJsPolicies 1}.
• Security Interface Extension Objects MIB—Whose object identifier is {jnxJsIf 1}.
• VPN Certificate Objects MIB—Whose object identifier is {jnxJsCertificates 1}.
• Security Screening Objects MIB—Whose object identifier is {jnxJsScreening 1}.
For more information about these MIBs, see “Juniper Networks Enterprise-Specific MIBs”
on page 23.
Related • Structure of Management Information MIB on page 153
Documentation
• jnxProducts on page 154
• jnxMibs on page 155
• jnxTraps on page 157
• jnxExperiment on page 158
jnxMibs
The object identifier for the jnxMibs root branch is {juniperMIB 3} and includes one main
subbranch, jnxBoxAnatomy, whose object identifier is {jnxMibs 1}. The other Juniper
Networks enterprise-specific MIBs are also branches of jnxMibs. These Juniper Networks
enterprise-specific MIBs include:
• MPLS MIB—Whose object identifier is {jnxMibs 2}.
• Juniper Networks enterprise-specific extensions to the Interface MIB—Whose object
identifier is {jnxMibs 3}.
• Alarm MIB—Whose object identifier is {jnxMibs 4}.
• Firewall MIB—Whose object identifier is {jnxMibs 5}.
• Destination Class Usage MIB—Whose object identifier is {jnxMibs 6}.
Copyright © 2010, Juniper Networks, Inc. 155
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Juniper Networks enterprise-specific extensions to the Ping MIB—Whose object identifier
is {jnxMibs 7}.
• Juniper Networks enterprise-specific extensions to the Traceroute MIB—Whose object
identifier is {jnxMibs 8}.
• ATM MIB—Whose object identifier is {jnxMibs 10}.
• IPv6 and ICMPv6 MIB—Whose object identifier is {jnxMibs 11}.
• IPv4 MIB—Whose object identifier is {jnxMibs 12}.
• Juniper Networks enterprise-specific extensions to the RMON Events and Alarms
MIB—Whose object identifier is {jnxMIBs 13}.
• Juniper Networks enterprise-specific extensions to the LDP traps MIB—Whose object
identifier is {jnxMibs 14}.
• Class-of-service MIB—Whose object identifier is {jnxMibs 15}.
• Source class usage MIB—Whose object identifier is {jnxMibs 16}.
• Reverse-path-forwarding MIB—Whose object identifier is {jnxMibs 17}.
• Configuration management MIB—Whose object identifier is {jnxMibs 18}.
• Passive monitoring MIB—Whose object identifier is {jnxMibs 19}.
• SONET/SDH Interface Management MIB—Whose object identifier is {jnxMibs 20}.
• ATM class-of-service MIB—Whose object identifier is {jnxMibs 21}.
• IPsec Monitoring MIB—Whose object identifier is {jnxMibs 22}.
• Ethernet MAC MIB—Whose object identifier is {jnxMibs 23}.
• SONET APS MIB—Whose object identifier is {jnxMibs 24}.
• Chassis Definitions for Router Model MIB—Whose object identifier is {jnxMibs 25}.
• VPN MIB—Whose object identifier is {jnxMibs 26}.
• Flow Collection Services MIB—Whose object identifier is {jnxMibs 28} .
• RSVP Traffic Engineering (TE) MIB—Whose object identifier is {jnxMibs 30}.
• Host Resources MIB—Whose object identifier is {jnxMibs 31}.
• Services PIC MIB—Whose object identifier is {jnxMibs 32}.
• Dynamic Flow Capture (DFC) MIB—Whose object identifier is {jnxMibs 33}.
• Chassis Forwarding MIB—Whose object identifier is {jnxMibs 34}.
• System Log MIB—Whose object identifier is {jnxMibs 35}.
• MPLS LDP MIB—Whose object identifier is {jnxMibs 36}.
• Event MIB—Whose object identifier is {jnxMibs 37}.
• IP Forward MIB—Whose object identifier is {jnxMibs 38}.
• jnxJSMibRoot—Whose object identifier is {jnxMibs 39}
156 Copyright © 2010, Juniper Networks, Inc.
Chapter 10: Interpreting the Structure of Management Information MIB
• jnxEXMibRoot—Whose object identifier is {jnxMibs 40}
• jnxWXMibRoot—Whose object identifier is {jnxMibs 41}
• Packet Forwarding Engine MIB—Whose object identifier is {jnxMibs 44}.
• BFD MIB—Whose object identifier is {jnxMibs 45}.
• Utility MIB—Whose object identifier is {jnxMibs 47}.
• L2ALD MIB—Whose object identifier is {jnxMibs 48}.
• L2TP MIB—Whose object identifier is {jnxMibs 49}.
• RPM MIB—Whose object identifier is {jnxMibs 50}.
• User AAA MIB—Whose object identifier is {jnxMibs 51}.
• Juniper generic IPsec MIB—Whose object identifier is {jnxMibs 52}.
• L2 control protocols MIB—Whose object identifier is {jnxMibs 53}.
• Pseudowire TDM MIB—Whose object identifier is {jnxMibs 54}.
• Pseudowire TC MIB—Whose object identifier is {jnxMibs 55}.
• OTN MIB—Whose object identifier is {jnxMibs 56}.
For more information about these MIBs, see “Juniper Networks Enterprise-Specific MIBs”
on page 23.
Related • Structure of Management Information MIB on page 153
Documentation
• jnxProducts on page 154
• jnxServices on page 154
• jnxTraps on page 157
• jnxExperiment on page 158
jnxTraps
The object identifier for the jnxTraps root branch of the Structure of Management
Information MIB is {juniperMIB 4}. The jnxTraps root branch contains the enterprise-specific
SNMP traps supported by Junos OS. These Juniper Networks enterprise-specific SNMP
traps include:
• jnxChassisTraps—Whose object identifier is {jnxTraps 1}.
• jnxChassisOKTraps—Whose object identifier is {jnxTraps 2}.
• jnxRmonTraps—Whose object identifier is {jnxTraps 3}.
• jnxLdpTraps—Whose object identifier is {jnxTraps 4}.
• jnxCmNotifications—Whose object identifier is {jnxTraps 5}.
• jnxSonetNotifications—Whose object identifier is {jnxTraps 6}.
Copyright © 2010, Juniper Networks, Inc. 157
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxPMonNotifications— Whose object identifier is {jnxTraps 7}
• jnxCollectorNotifications—Whose object identifier is {jnxTraps 8}.
• jnxPingNotification—Whose object identifier is {jnxTraps 9}.
• jnxSpNotification—Whose object identifier is {jnxTraps10}.
• jnxDfcNotifications—Whose object identifier is {jnxTraps11}.
• jnxSyslogNotifications—Whose object identifier is {jnxTraps12}.
• jnxEventNotifications—Whose object identifier is {jnxTraps13}.
• jnxVccpNotifications—Whose object identifier is {jnxTraps14}.
• jnxOtnNotifications—Whose object identifier is {jnxTraps15}.
Related • Structure of Management Information MIB on page 153
Documentation
• jnxProducts on page 154
• jnxServices on page 154
• jnxMibs on page 155
• jnxExperiment on page 158
jnxExperiment
The object identifier for the jnxExperiment root branch of the Structure of Management
Information MIB is {juniperMIB 5}. The jnxExperiment root branch contains experimental
Juniper Networks enterprise-specific MIBs. This is the top-level object identifier registry
used by Juniper Networks products for SNMP modules containing experimental MIB
definitions.
jnxExperiment MIBs are defined as the following MIBs:
• IETF work-in-process MIBs that have not been assigned a permanent object identifier
by the IANA.
• Juniper Networks work-in-process MIBs that have not achieved final production quality
or field experience.
The following draft supports the jnxExperiment MIB space: Internet draft
draft-ietf-idr-bgp4-mibv2-03.txt, Definitions of Managed Objects for the Fourth Version
of Border Gateway Protocol (BGP-4), Second Version (jnxBgpM2PrefixInPrefixes,
jnxBgpM2PrefixInPrefixesAccepted, and jnxBgpM2PrefixInPrefixesRejected objects only).
Related • Structure of Management Information MIB on page 153
Documentation
• jnxProducts on page 154
• jnxServices on page 154
• jnxMibs on page 155
158 Copyright © 2010, Juniper Networks, Inc.
Chapter 10: Interpreting the Structure of Management Information MIB
• jnxTraps on page 157
Copyright © 2010, Juniper Networks, Inc. 159
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
160 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 11
Interpreting the Enterprise-Specific Access
Authentication Objects MIB
This chapter contains the following topics:
• Access Authentication Objects MIB on page 161
• jnxJsFwAuthStats on page 161
• jnxJsAuthTrapVars on page 162
• jnxJsAuthNotifications on page 163
Access Authentication Objects MIB
The Juniper Networks enterprise-specific Access Authentication Objects MIB, whose
object ID is {jnxJsAuth 1}, defines the objects that pertain to access authentication. Firewall
and security features restrict the accessing of protected resources (ideally on different
zones) behind a firewall based on their source IP and other credentials.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-auth.txt
.
For information about the enterprise-specific Access Authentication Objects MIB, see
the following topics:
• jnxJsFwAuthStats on page 161
• jnxJsAuthTrapVars on page 162
• jnxJsAuthNotifications on page 163
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxJsFwAuthStats
jnxJsFwAuthStats, whose object ID is {jnxJsAuthObjects 1}, exposes the firewall
authentication statistics listed in Table 21 on page 162.
Copyright © 2010, Juniper Networks, Inc. 161
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 21: jnxJsFwAuthStats
Object Object ID Description
jnxJsFwAuthNumPendingUsers jnxJsFwAuthStats 1 Number of users currently waiting to be authenticated by the
firewall user authentication mechanism.
jnxJsFwAuthNumSuccUsers jnxJsFwAuthStats 2 Number of users currently allowed access by the firewall user
authentication mechanism.
jnxJsFwAuthNumFailedUsers jnxJsFwAuthStats 3 Number of users currently failed to be authenticated by the
firewall user authentication mechanism.
jnxJsFwAuthTotalUsers jnxJsFwAuthStats 4 Total number of users that are accessing or attempting to access
resources managed by the firewall user authentication
mechanism.
Related • Access Authentication Objects MIB on page 161
Documentation
• jnxJsAuthTrapVars on page 162
• jnxJsAuthNotifications on page 163
jnxJsAuthTrapVars
jnxJsAuthTrapVars identifies access authentication traps variables listed in Table 22 on
page 162.
Table 22: jnxJsAuthTrapVars
Object Object ID Description
jnxJsFwAuthUserName jnxJsAuthTrapVars 1 Name of the user who is attempting to be authenticated or
has been authenticated.
jnxJsFwAuthServiceDesc jnxJsAuthTrapVars 2 Service or application name that the authentication is
performed for: Telnet, FTP, HTTP.
jnxJsFwAuthReason jnxJsAuthTrapVars 3 Reason for the trap being generated: authentication failure
due to: timeout, invalid password, invalid username, and so
on.
jnxJsFwAuthClientIpAddr jnxJsAuthTrapVars 4 Authentication client's IP address.
Related • Access Authentication Objects MIB on page 161
Documentation
• jnxJsFwAuthStats on page 161
• jnxJsAuthNotifications on page 163
162 Copyright © 2010, Juniper Networks, Inc.
Chapter 11: Interpreting the Enterprise-Specific Access Authentication Objects MIB
jnxJsAuthNotifications
jnxJsAuthNotifications, whose object ID is {jnxJsAuthMIB 0 }, identifies the user access
authentication notifications listed in Table 23 on page 163 .
Table 23: jnxJsAuthNotifications
Object Object ID Description
jnxJsFwAuthFailure jnxJsAuthNotifications A firewall user authentication status trap to signify whether a user
1 using the pass-through firewall authentication mechanism has been
rejected due to reason specified in the trap.
• jnxJsFwAuthUserName is the user.
• jnxClientIPAddress is the IP address the user came from.
• jnxJsFwAuthServiceDesc specifies the application by which the
authentication was performed.
• jnxJsFwAuthReason indicates the reason for failure.
jnxJsFwAuthServiceUp jnxJsAuthNotifications Firewall user authentication service has started.
2
jnxJsFwAuthServiceDown jnxJsAuthNotifications Firewall user authentication service has stopped.
3
jnxJsFwAuthCapacityExceeded jnxJsAuthNotifications Firewall user authentication maximum capacity has been exceeded.
4
jnxJsFwAuthTotalUsers indicates the total number of users being
authenticated, and it has exceeds the maximum allowable users.
Related • Access Authentication Objects MIB on page 161
Documentation
• jnxJsFwAuthStats on page 161
• jnxJsAuthTrapVars on page 162
Copyright © 2010, Juniper Networks, Inc. 163
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
164 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 12
Interpreting the Enterprise-Specific Alarm
MIB
• Alarm MIB on page 165
• jnxAlarmRelayMode on page 165
• jnxYellowAlarms on page 166
• jnxRedAlarms on page 167
Alarm MIB
The Juniper Networks enterprise-specific Alarm MIB, whose object identifier is {jnxMibs
4}, contains information about alarms from the router chassis.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-chassis-alarm.txt
.
For information about the enterprise-specific Alarm MIB objects, see the following topics:
• jnxAlarmRelayMode on page 165
• jnxYellowAlarms on page 166
• jnxRedAlarms on page 167
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxAlarmRelayMode
The jnxAlarmRelayMode, whose object identifier is {jnxCraftAlarms 1}, denotes the alarm
relay mode of the craft interface panel for the yellow and red alarms. This object uses
the following integer values:
• 1–Other: Other or unknown state
• 2–passOn: Alarms are passed on. The alarm relay is activated to pass on the yellow
or red alarms to audible sirens or visual flashing devices.
Copyright © 2010, Juniper Networks, Inc. 165
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• 3–cutOff: Alarms are turned off. Both the yellow and red alarms are cut off from the
alarm relays and do not get passed on to audible sirens or visual flashing devices.
NOTE: Both the yellow and red alarms can be cut off from the alarm relay
using a Alarm Cutoff/Lamp Test button on the front panel of the router
chassis.
Related • Alarm MIB on page 165
Documentation
• jnxYellowAlarms on page 166
• jnxRedAlarms on page 167
jnxYellowAlarms
The jnxYellowAlarms, whose object identifier is {jnxCraftAlarms 2} contains the objects
listed in Table 24 on page 166.
Table 24: jnxYellowAlarms
Object Object ID Description
jnxYellowAlarmState jnxYellowAlarms 1 Denotes the yellow alarm state on the craft interface panel of the router
chassis. This object contains one of the following integer values:
• other–1: The alarm state is unknown.
• off–2: The yellow alarms are off. You can turn off the yellow alarms using
the Alarm Cutoff/Lamp Test button on the craft interface panel of the
router chassis.
• on–3: The yellow alarms are on.
jnxYellowAlarmCount jnxYellowAlarms 2 Shows the number of currently active and nonsilent yellow alarms.
NOTE: The value of this object is independent of the state of the Alarm
Cutoff/Lamp Test button.
jnxYellowAlarmLastChange jnxYellowAlarms 3 Shows the value of the sysUp time when the state of the yellow alarm last
changed from on to off or vice versa. This object returns 0 if the alarm state
has not changed since the sysUp time was reset last time, or if the value is
unknown.
Related • Alarm MIB on page 165
Documentation
• jnxAlarmRelayMode on page 165
• jnxRedAlarms on page 167
166 Copyright © 2010, Juniper Networks, Inc.
Chapter 12: Interpreting the Enterprise-Specific Alarm MIB
jnxRedAlarms
The jnxRedAlarms, whose object identifier is {jnxCraftAlarms 3}, contains the objects
listed in Table 25 on page 167.
Table 25: jnxRedAlarms
Object Object ID Description
jnxRedAlarmState jnxRedAlarms 1 Denotes the state of red alarms on the craft interface panel of the router
chassis. This object contains one of the following values:
• 1–other: The red alarm state is unknown.
• 2–off: The red alarm is turned off.
• 3–on: The red alarm is on. Typically, the red alarm is on when there is a
system failure, power failure, or hardware malfunction, or when a threshold
value is exceeded.
jnxRedAlarmCount jnxRedAlarms 2 Shows the number of currently active and nonsilent red alarms.
NOTE: The value of this object is independent of the state of the Alarm
Cutoff/Lamp Test button.
jnxRedAlarmLastChange jnxRedAlarms 3 Shows the value of the sysUp time when the red alarm last changed from on
to off or vice versa. This object contains 0 value, if the alarm state has not
changed since the sysUp time was reset last time, or if the value is unknown.
Related • Alarm MIB on page 165
Documentation
• jnxAlarmRelayMode on page 165
• jnxYellowAlarms on page 166
Copyright © 2010, Juniper Networks, Inc. 167
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
168 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 13
Interpreting the Enterprise-Specific BGP4
V2 MIB
• BGP4 V2 MIB on page 169
• jnxBgpM2PrefixCountersTable on page 170
BGP4 V2 MIB
The Juniper Networks enterprise-specific BGP version 4 (BGP4) V2 MIB, whose object
identifier is {jnxBgpM2Experiment 1}, contains objects used to monitor BGP peer-received
prefix counters. It is based upon similar objects in the MIB documented in Internet draft
draft-ietf-idr-bgp4-mibv2-03.txt, Definitions of Managed Objects for the Fourth Version
of Border Gateway Protocol (BGP-4), Second Version. For a downloadable version of this
MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-bgpmib2.txt
.
NOTE:
For the BGP4 V2 MIB, Junos OS supports only the following objects:
• jnxBgpM2PrefixInPrefixes
• jnxBgpM2PrefixInPrefixesAccepted
• jnxBgpM2PrefixInPrefixesRejected
For information about the enterprise-specific BGP4 V2 MIB objects, see the following
topic:
• jnxBgpM2PrefixCountersTable on page 170
• Juniper Networks Enterprise-Specific BGP Traps on page 87
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 169
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxBgpM2PrefixCountersTable
jnxBgpM2PrefixCountersTable contains counters associated with a BGP peer.
• JnxBgpM2PrefixCountersEntry on page 170
JnxBgpM2PrefixCountersEntry
jnxBgpM2PrefixCountersEntry contains information about the prefix counters of a BGP
peer, and the objects listed in Table 26 on page 170.
Table 26: jnxBgpM2PrefixCountersEntry
Object Object Identifier Description
jnxBgpM2PrefixInPrefixes jnxBgpM2PrefixCountersEntry The total number of
7 prefixes received from a
peer.
jnxBgpM2PrefixInPrefixesAccepted jnxBgpM2PrefixCountersEntry The total number of
8 prefixes received from a
peer that are eligible to be
active in the routing table.
jnxBgpM2PrefixInPrefixesRejected jnxBgpM2PrefixCountersEntry The total number of
9 prefixes received from a
peer that are not eligible to
be active in the routing
table.
Related • BGP4 V2 MIB on page 169
Documentation
• Juniper Networks Enterprise-Specific BGP Traps on page 87
170 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 14
Interpreting the Enterprise-Specific
Bidirectional Forwarding Detection
(BFD) MIB
• Bidirectional Forwarding Detection (BFD) MIB on page 171
• jnxBfdSessTable on page 171
• Notifications for the BFD MIB on page 172
Bidirectional Forwarding Detection (BFD) MIB
The Juniper Networks enterprise-specific Bidirectional Forwarding Detection (BFD) MIB,
whose object identifier is {jnxBfdMibRoot 1}, sends the current operational status for the
transmit interval and detection time of BFD sessions. For a downloadable version of this
MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-bfd.txt
.
For information about the enterprise-specific BFD MIB objects, see the following topics:
• jnxBfdSessTable on page 171
• Notifications for the BFD MIB on page 172
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxBfdSessTable
The jnxBfdSessTable, whose object identifier is {jnxBfdObjects 1}, is an extension to the
jnxSessTable. It provides information about threshold values for the transmit interval
and detection time on BFD sessions.
The jnxBfdSessEntry, whose object identifier is {jnxBfdSessTable 1}, has four objects,
which are listed in Table 27 on page 172.
Copyright © 2010, Juniper Networks, Inc. 171
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 27: jnxBfdSessTable
Object Object Identifier Description
jnxBfdSessThresTxInterval jnxBfdSessEntry 1 The threshold value (in microseconds) for the transmit interval. If
the current transmit interval value (jnxBfdSessCurrTxInterval) adapts
to a value greater than the threshold value, a trap is raised
(jnxBfdSessTxIntervalHigh).
jnxBfdSessCurrTxInterval jnxBfdSessEntry 2 The current transmit interval for the session (in microseconds).
jnxBfdSessThreshDectTime jnxBfdSessEntry 3 The threshold value (in microseconds) for the detection time. If the
current detection time value (jnxBfdSessCurrDectTime) adapts to
a value greater than the threshold value, a trap is raised
(jnxBfdSessDetectionTimeHigh).
jnxBfdSessCurrDectTime jnxBfdSessEntry 4 The current detection time for the session (in microseconds).
Related • Bidirectional Forwarding Detection (BFD) MIB on page 171
Documentation
• Notifications for the BFD MIB on page 172
Notifications for the BFD MIB
Table 28 on page 172 lists the supported notifications for the BFD MIB.
Table 28: Supported Notifications for the BFD MIB
Object Object Identifier Description
jnxBfdSessTxIntervalHigh jnxBfdNotification 1 A notification generated when the threshold value for the transmit
interval is configured (jnxBfdSessThresTxInterval) and the BFD
session transmit interval (jnxBfdSessCurrTxInterval) adapts to a
value greater than the threshold value. This trap is sent only once,
when the threshold is first exceeded. The transmit interval can
continue to adapt beyond the threshold value.
jnxBfdSessDetectionTimeHigh jnxBfdNotification 2 A notification generated when the threshold value for the detection
time is configured (jnxBfdSessThresDectTime) and the BFD session
detection time (jnxBfdSessCurrDectTime) adapts to a value greater
than the threshold value. This trap is sent only once, when the
threshold is first exceeded. The detection time can continue to
adapt beyond the threshold value.
Related • Bidirectional Forwarding Detection (BFD) MIB on page 171
Documentation
• jnxBfdSessTable on page 171
172 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 15
Interpreting the Enterprise-Specific
Chassis MIBs
• Chassis MIBs on page 173
• Textual Convention for Chassis MIB on page 174
• jnxBoxAnatomy on page 175
• Chassis Traps on page 260
• Chassis Definitions for Router Model MIB on page 265
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX220 Services Gateway on page 267
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
Chassis MIBs
The enterprise-specific Chassis MIB provides information on the router and its
components. MIB objects represent each component and the status of the components.
The enterprise-specific Chassis Definitions for Router Model MIB contains the object
identifiers (OIDs) that are used by the Chassis MIB to identify platform and chassis
components. The Chassis MIB provides information that changes often. The Chassis
Definitions for Router Model MIB provides information that changes less often.
You can retrieve information from the MIB using any network management system. For
a downloadable version of the Chassis Definitions for Router Model MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/topic-collections/reference-mibs-and-traps/mib-jnx-chas-defines.txt
.
For more information about the enterprise-specific Chassis MIBs, see the following topics:
• Textual Convention for Chassis MIB on page 174
• jnxBoxAnatomy on page 175
• Chassis Traps on page 260
• Chassis Definitions for Router Model MIB on page 265
Copyright © 2010, Juniper Networks, Inc. 173
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX220 Services Gateway on page 267
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
Related • Chassis Traps on page 260
Documentation
• jnxBoxAnatomy on page 175
Textual Convention for Chassis MIB
The enterprise-specific Chassis MIB uses the JnxChassisId object to denote the router
chassis type. JnxChassisId can be one of the following integer values:
• 1—Unknown
• 2—Single chassis
• 3—scc (TX Matrix router)
• 4—lcc0 (T640 router)
• 5—lcc1 (T640 router)
• 6—lcc2 (T640 router)
• 7—lcc3 (T640 router)
• 8—jcs1
• 9—jcs2
• 10—jcs3
• 11—jcs4
• 12—sfc0
• 13—sfc1
• 14—sfc2
• 15—sfc3
• 16—sfc4
• 17—lcc4
• 18—lcc5
• 19—lcc6
• 20—lcc7
• 21—lcc8
174 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
• 22—lcc9
• 23—lcc10
• 24—lcc11
• 25—lcc12
• 26—lcc13
• 27—lcc14
• 28—lcc15
Related • Chassis MIBs
Documentation
jnxBoxAnatomy
The object identifier for the jnxMIBs root branch is {juniperMIB 3} and includes one main
subbranch, jnxBoxAnatomy, whose object identifier is {jnxMibs 1}.
The jnxBoxAnatomy MIB is explained in the following sections:
• Top-Level Objects on page 175
• jnxContainersTable on page 176
• jnxContentsLastChange on page 183
• jnxContentsTable on page 183
• jnxLEDLastChange on page 195
• jnxLEDTable on page 195
• jnxFilledLastChange on page 198
• jnxFilledTable on page 198
• jnxOperatingTable on page 209
• jnxRedundancyTable on page 218
• jnxFruTable on page 223
• jnxBoxKernelMemoryUsedPercent on page 260
• jnxBoxSystemDomainType on page 260
Top-Level Objects
The following branches of the jnxBoxAnatomy MIB are top-level objects:
• jnxBoxClass—The object identifier for the jnxBoxClass object is {jnxBoxAnatomy 1}.
This object classifies the chassis product line.
• jnxBoxDescr—The object identifier for the jnxBoxDescr object is {jnxBoxAnatomy 2}.
This object describes the chassis name and model.
Copyright © 2010, Juniper Networks, Inc. 175
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxBoxSerialNo—The object identifier for the jnxBoxSerialNo object is {jnxBoxAnatomy
3}. This object indicates the serial number of the chassis. jnxBoxSerialNo remains blank
if the serial number is unknown or unavailable.
• jnxBoxRevision—The object identifier for the jnxBoxRevision object is {jnxBoxAnatomy
4}. This object indicates the last revision of the chassis.
• jnxBoxInstalled—The object identifier for the jnxBoxInstalled object is {jnxBoxAnatomy
5}. This object indicates the last time the box was installed and operational, represented
by the sysUpTime value.
jnxContainersTable
The object identifier for the jnxContainersTable object is {jnxBoxAnatomy 6}. This object
shows the structure of the chassis.
You can use the jnxContainersTable object to retrieve specific information about the
router, such as how many of each component the router can contain. For example, the
jnxContainersTable object of an M20 router indicates that the router can accommodate
four Flexible PIC Concentrators (FPCs); however, it does not describe how many FPCs
the router actually has.
For more information about how many FPCs are actually on a router, see
“jnxContentsTable” on page 183.
Entries within the jnxContainersTable object are represented by the jnxContainersEntry
object, whose object identifier is {jnxContainersTable 1}. The jnxContainersEntry object
contains the following objects that describe the contents of a particular router:
• jnxContainersIndex—The index value of an entry in the jnxContainersEntry object that
corresponds to jnxContainersType and jnxContainersDescr, and whose object identifier
is {jnxContainersEntry 1}.
• jnxContainersView—The orientation of a container from the front of the router and
whose object identifier is {jnxContainersEntry 2}. This object also indicates that the
container is embedded in the router and how it is accessible from corresponding views.
The value of this object is a bitmap represented as a sum. If multiple bits are set, you
can access the container from that set of views. The values represent the bit positions
and their corresponding views as follows:
• 1—Front
• 2—Rear
• 4—Top
• 8—Bottom
• 16—Left side
• 32—Right side
176 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
For each view plane, if specified counters are scattered in various views, the numbering
sequence starts from left to right and then from top to bottom, as follows:
• Left side
• Right side
• Top
• Bottom
• Front
• Rear
NOTE: References to left and right sides are based on the view from the
front of the chassis.
In accordance with network management conventions, all indexes in the
MIB begin with 1, not 0, although the slot number might be labeled 0.
• jnxContainersLevel—The abstraction level of the box or components for the
jnxContainersEntry object and whose object identifier is {jnxContainersEntry 3}. The
level is enumerated from the outside to the inside, and from the outer layer to the inner
layer.
For example, if the top level (level 0) of the box refers to the chassis frame, then the
next level (level 1) refers to the FPC slot within the chassis frame. Finally, the PIC space
within the FPC slot of the chassis corresponds to level 2.
• jnxContainersWithin—The container housing the entry at the next-higher level of the
jnxContainersEntry object and whose object identifier is {jnxContainersEntry 4}.
For example, the within value for jnxMediaCardSpacePIC.0 is 7. Because the
jnxM20SlotFPC.0 retains an index value of 7, the FPC houses the PIC.
• jnxContainersType—The component of the Chassis MIB at a specific index, view, level,
and within value for the jnxContainersEntry object and whose object identifier is
{jnxContainersEntry 5}.
• jnxContainersDescr—The description of the component in the jnxContainersEntry object
and whose object identifier is {jnxContainersEntry 6}.
• jnxContainersCount—The maximum number of a given component that the router can
accommodate within the jnxContainersEntry object and whose object identifier is
{jnxContainersEntry 7}.
For example, the M20 router can house a specific maximum number of FPCs within
the chassis frame. The maximum number is not necessarily the actual number of FPCs;
this can change dynamically.
Copyright © 2010, Juniper Networks, Inc. 177
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 29 on page 178 through Table 36 on page 182 provide examples of jnxContainersEntry
objects in the jnxContainersTable. The following column headings for each table are
abbreviated to correspond to the parts of the jnxContainersEntry objects:
• Index—jnxContainersIndex
• View—jnxContainersView
• Level—jnxContainersLevel
• Within—jnxContainersWithin
• Type—jnxContainersType
• Description—jnxContainersDescr
• Count—jnxContainersCount
Table 29 on page 178 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of an M40 router.
Table 29: jnxContainersEntry Objects in the jnxContainersTable of an
M40 Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM40.0 Chassis frame compartment 1
2 2 1 1 jnxSlotPowerSupply.0 Power supply compartment 2
3 3 1 1 jnxSlotCoolingImpeller.0 Impeller compartment 2
4 2 1 1 jnxSlotCoolingFan.0 Fan compartment 3
5 2 1 1 jnxSlotHostCtrl.0 Host controller compartment 1
6 1 1 1 jnxSlotSCB.0 SCB slot 1
7 1 1 1 jnxSlotFPC.0 FPC slot 8
8 1 2 7 jnxMediaSlotCardPIC.0 PIC space 4
9 2 1 1 jnxSlotRoutingEngine.0 Routing Engine compartment 1
Table 30 on page 178 describes objects in the jnxContainersTable of an M20 router.
Table 30: jnxContainersEntry Objects in the jnxContainersTable of an
M20 Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM20.0 Chassis frame 1
compartment
178 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 30: jnxContainersEntry Objects in the jnxContainersTable of an
M20 Router (continued)
Index View Level Within Type Description Count
2 2 1 1 jnxM20SlotPower.0 Power supply 2
compartment
4 3 1 1 jnxSlotFan.0 Fan compartment 4
6 2 1 1 jnxM20SlotSSB.0 SSB slot 2
7 1 1 1 jnxM20SlotFPC.0 FPC slot 4
8 1 2 7 jnxM20MediaCardSpacePIC.0 PIC space 4
9 2 1 1 jnxM20RE.0 Routing Engine 2
compartment
10 1 1 1 JNXM20FrontPanel.0 Front display slot 1
Table 31 on page 179 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of an M160 router.
Table 31: jnxContainersEntry Objects in the jnxContainersTable of an
M160 Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM160.0 Chassis frame 1
compartment
2 2 1 1 Jnx160SlotPower.0 Power supply 2
compartment
4 3 1 1 jnxM160SlotFan.0 Fan compartment 4
6 2 1 1 jnxM160SlotSFM.0 SFM slot 4
7 1 1 1 jnxM160SlotFPC.0 FPC slot 8
8 1 2 7 jnxM160MediaCardSlotPIC.0 PIC space 4
9 2 1 1 jnxM160SlotHM.0 Host slot 2
10 1 1 1 jnxM160SlotFPM.0 FPM slot 1
11 2 1 1 jnxM160SlotPCG.0 PCG slot 2
12 2 1 1 jnxM160SlotMCS.0 MCS slot 2
13 1 1 1 jnxM160SlotCIP.0 CIP slot 1
Copyright © 2010, Juniper Networks, Inc. 179
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 32 on page 180 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of an M10 router.
Table 32: jnxContainersEntry Objects in the jnxContainersTable of an M10
Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM10.0 Chassis frame 1
compartment
2 2 1 1 jnxM10SlotPower.0 Power supply 2
compartment
4 2 1 1 jnxM10SlotFan.0 Fan compartment 1
6 2 1 1 jnxM10SlotFEB.0 FEB slot 1
7 1 1 1 jnxM10SlotFPC.0 FPC slot 2
8 1 2 7 jnxM10MediaCardSpacePIC.0 PIC space 4
9 2 1 1 jnxM10SlotRE.0 Routing Engine 1
compartment
Table 33 on page 180 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of an M5 router.
Table 33: jnxContainersEntry Objects in the jnxContainersTable of an M5
Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM5.0 Chassis frame 1
compartment
2 2 1 1 jnxM5SlotPower.0 Power supply 2
compartment
4 3 1 1 jnxM5SlotFan.0 Fan compartment 4
6 2 1 1 jnxM5SlotFEB.0 FEB slot 1
7 1 1 1 jnxM5SlotFPC.0 FPC slot 1
8 1 2 7 jnxM5MediaCardSlotPIC.0 PIC space 4
9 2 1 1 jnxM5SlotRE.0 Routing Engine 1
compartment
Table 34 on page 181 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of a T640 router.
180 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 34: jnxContainersEntry Objects in the jnxContainersTable of a T640
Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisT640.0 Chassis frame 1
2 2 1 1 jnxT640SlotPower.0 PEM slot 2
4 3 1 1 jnxT640SlotFan.0 Fan slot 3
7 1 1 1 jnxT640SlotFPC.0 FPC slot 8
8 1 2 7 jnxT640MediaCardSpacePIC.0 PIC slot 4
9 2 1 1 jnxT640SlotHM.0 Host slot 2
10 1 1 1 jnxT640SlotFPB.0 FPM slot 1
11 2 1 1 jnxT640SlotSCG.0 SCG slot 2
12 2 1 1 jnxT640SlotCB.0 CG slot 2
13 1 1 1 jnxT640SlotCIP.0 CIP slot 1
14 2 1 1 jnxT640SlotSPMB.0 SPMB slot 2
15 2 1 1 jnxT640SlotSIB.0 SIB slot 5
Table 35 on page 181 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of a T320 router.
Table 35: jnxContainersEntry Objects in the jnxContainersTable of a T320
Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisT320.0 Chassis frame 1
2 2 1 1 jnxT320SlotPower.0 PEM slot 2
4 3 1 1 jnx320SlotFan.0 Fan slot 3
7 1 1 1 jnxT320SlotFPC.0 FPC slot 8
8 1 2 7 jnxT320MediaCardSpacePIC.0 PIC slot 2
9 2 1 1 jnxT320SlotHM.0 Host slot 2
10 1 1 1 jnxT320SlotFPB.0 FPM slot 1
Copyright © 2010, Juniper Networks, Inc. 181
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 35: jnxContainersEntry Objects in the jnxContainersTable of a T320
Router (continued)
Index View Level Within Type Description Count
11 2 1 1 jnxT320SlotSCG.0 SCG slot 2
12 2 1 1 jnxT320SlotCB.0 CB slot 2
13 1 1 1 jnxT320SlotCIP.0 CIP slot 1
14 2 1 1 jnxT320SlotSPMB.0 SPMB slot 2
15 2 1 1 jnxT320SlotSIB.0 SIB slot 3
Table 36 on page 182 describes objects contained in a jnxContainersEntry in the
jnxContainersTable of an M40e router.
Table 36: jnxContainersEntry Objects in the jnxContainersTable of an
M40e Router
Index View Level Within Type Description Count
1 1 0 0 jnxChassisM40e.0 Chassis frame 1
compartment
2 2 1 1 jnxM40eSlotPower.0 Power supply 2
compartment
4 3 1 1 jnxM40eSlotFan.0 Fan 4
compartment
6 2 1 1 jnxM40eSlotSFM.0 SFM slot 2
7 1 1 1 jnxM40eSlotFPC.0 FPC slot 8
8 1 2 7 jnxM40eMediaCardSpacePIC.0 PIC space 4
9 2 1 1 jnxM40eSlotHM.0 Host slot 2
10 1 1 1 jnxM40eSlotFPM.0 FPM slot 1
11 2 1 1 jnxM40eSlotPCG.0 PCG slot 2
12 2 1 1 jnxM40eSlotMCS.0 MCS slot 2
13 1 1 1 jnxM40eSlotCIP.0 CIP slot 1
182 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
jnxContentsLastChange
The object identifier for jnxContentsLastChange object is {jnxBoxAnatomy 7}. This object
indicates the time at which the box contents last changed, represented by the sysUpTime
value.
jnxContentsTable
The object identifier for jnxContentsTable object is {jnxBoxAnatomy 8}. This object
specifies the contents of the chassis.
The jnxContentsTable lists the contents of an entry, which are defined as follows:
• jnxContentsContainerIndex—Associates the jnxContainersIndex with the
jnxContainersTable. The object identifier is {jnxContentsEntry 1}.
• jnxContentsL1Index—Denotes the level-one index of the container housing the
component. The object identifier is {jnxContentsEntry 2}. It indicates the position of
the component within different levels of the containers. This value is 0 if the position
is unavailable or not applicable.
NOTE: MIBs start with a value of 1, whereas the physical count on the router
starts with a value of 0. To find the actual location of a component within
a router, you must subtract 1 from the L1, L2, or L3 index.
• jnxContentsL2Index—Denotes the level-two index of the container housing the
component. The object identifier is {jnxContentsEntry 3}. It indicates the position of
the component within different levels of the containers. This value is 0 if the position
is unavailable or not applicable.
• jnxContentsL3Index—Denotes the level-three index of the container housing the
component. The object identifier is {jnxContentsEntry 4}. It indicates the position of
the component within different levels of the containers. This value is 0 if the position
is unavailable or not applicable.
• jnxContentsType—Indicates the type of the component at a specific container index
or L1, L2, or L3 index. The object identifier is {jnxContentsEntry 5}.
• jnxContentsDescr—Specifies the type of the component in plain English. The object
identifier is {jnxContentsEntry 6}.
• jnxContentsSerialNo—Specfies the serial number of the component. The object identifier
is {jnxContentsEntry 7}.
• jnxContentsRevision—Contains the revision level of the component. The object identifier
is {jnxContentsEntry 8}.
• jnxContentsInstalled—Indicates the time at which the component was last installed
and operational, represented by the sysUpTime value. The object identifier is
{jnxContentsEntry 9}.
• jnxContentsPartNo—Contains the part number of the component (blank if unknown
or unavailable). The object identifier is {jnxContentsEntry 10}.
Copyright © 2010, Juniper Networks, Inc. 183
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxContentsChassisId —Contains the ID of the chassis that contains the components.
The object identifier is {jnxContentsEntry 11}.
• jnxContentsChassisDescr—Specifies the description of the chassis in plain English. The
object identifier is {jnxContentsEntry 12}.
• jnxContentsChassisCleiCode—Contains the CLEI code of the chassis that contains the
components listed in the row. A CLEI code is an intelligent code that consists of 10
alphanumeric characters with 4 data elements. The first data element is considered
the basic code, with the first two characters indicating the technology or equipment
type, and the third and fourth characters denoting the functional subcategory. The
second data element represents the features, and its three characters denote functional
capabilities or changes. The third data element has one character and denotes a
reference to a manufacturer, system ID, specification, or drawing. The fourth data
element consists of two characters and contains complementary data. These two
characters provide a means of differentiating or providing uniqueness between the
eight character CLEI codes by identifying the manufacturing vintage of the product.
For more information about CLEI code, see
http://www.commonlanguage.com/resources/commonlang/
productshowroom/showroom/equip_id/carriers/overview.html. The object identifier is
{jnxContentsEntry 13}.
Table 37 on page 184 through Table 39 on page 192 provide examples of jnxContentEntry
objects. The following column headings for each table are abbreviated to correspond to
the parts of the jnxContentsEntry objects:
• Container index— jnxContentsContainerIndex
• L1 Index—jnxContentsL1Index
• L2 Index—jnxContentsL2Index
• L3 Index—jnxContentsL3Index
• Type—jnxContentsType
• Description—jnxContentsDescr
• Serial Number—jnxContentsSerialNo
• Revision—jnxContentsRevision
• Installed—jnxContentsInstalled
• Part Number—jnxContentsPartNo
Table 37 on page 184 provides an example of jnxContentEntry objects in the
jnxContentTable of an M20 router.
Table 37: jnxContentsEntry Objects in the jnxContentsTable of an M20
Router
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
1 1 1 0 jnxBackplaneM20.0 Midplane AL3280 REV07 0:0:00:00.00 710-00157
184 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 37: jnxContentsEntry Objects in the jnxContentsTable of an M20
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
2 1 0 0 jnxM20PowerDC.0 DC power 001652 REV 05 0:0:00:00.00 740-00146
supply A
2 2 0 0 jnxM20PowerDC.0 DC power 001652 REV 05 0:0:00:00.00 740-00146
supply B
4 1 0 0 jnxM20Fan.0 Front top – – 0:0:00:00.00 –
fan
4 2 0 0 jnxM20Fan Middle fan – – 0:0:00:00.00 –
4 3 0 0 jnxM20Fan Bottom fan – – 0:0:00:00.00 –
4 4 4 0 jnxM20Fan Rear fan – – 0:0:00:00.00 –
6 1 0 0 jnxM20SSB.0 SSB 0 AG0809 REV 01 0:0:00:35.17 710-001951
Internet
Processor II
7 1 0 0 jnxM20FPC.0 FPC @ AN1335 REV 01 0:0:01:01.80 710-001292
0/*/*
7 2 0 0 jnxM20FPC.0 FPC @ 1/*/* AN1124 REV 01 0:0:01:07:96 710-001292
7 3 0 0 jnxM20FPC.0 FPC @ AN1726 REV 01 0:0:01:14:12 710-001292
2/*/*
7 4 0 0 jnxM20FPC.0 FPC @ AN1691 REV 01 0:0:01:20.28 710-001292
3/*/*
8 1 1 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4313 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 0/0/*
8 1 2 0 jnxM20QuadEther.0 PIC: 4x, F/E, AJ5844 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 0/1/*
8 1 3 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4518 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 0/2/*
8 1 4 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4515 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 0/3/*
Copyright © 2010, Juniper Networks, Inc. 185
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 37: jnxContentsEntry Objects in the jnxContentsTable of an M20
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
8 2 1 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4296 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 1/0/*
8 2 2 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4323 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 1/1/*
8 2 3 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4129 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 1/2/*
8 2 4 0 jnxM20QuadEther.0 PIC: 4x, F/E, HD4341 REV 04 0:0:00:00.00 750-002992
100BASE-TX
@ 1/3/*
8 3 1 0 jnxM20QuadEther.0 PIC: 4x, F/E, AH4147 REV 07 0:0:00:00.00 750-002303
100BASE-TX@
2/0/*
8 3 2 0 jnxM20QuadEther.0 PIC: 4x, F/E, AH4238 REV 07 0:0:00:00.00 750-002303
100BASE-TX
@ 2/1/*
8 3 3 0 jnxM20QuadEther.0 PIC: 4x, F/E, AH4116 REV 07 0:0:00:00.00 750-002303
100BASE-TX
@ 2/2/*
8 3 4 0 jnxM20QuadEther.0 PIC: 4x, F/E, AH4208 REV 07 0:0:00:00.00 750-002303
100BASE-TX
@ 2/3/*
8 4 1 0 jnxM20GigEther.0 PIC: 1x G/E, AS3697 REV 07 0:0:00:00.00 750-001072
1000BASE-SX
@ 3/0/*
8 4 2 0 jnxM20ChOc12toDS3.0 PIC: 1x AE1110 REV 08 0:0:00:00.00 750-001190
COC12SMIR
@ 3/1/*
8 4 4 0 jnxM20ChStml1.0 PIC: 1x AD9599 REV 04 0:0:00:00.00 750-003250
CSTM1SMIR
@ 3/3/*
9 1 0 0 jnxM20RE.0 Routing – – 3:16:16:53.21 –
Engine
10 1 0 0 jnxM20FrontPanel.0 Front panel – – 0:0:00:00.00 –
display
186 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from an M20 router is as follows:
user@host> show chassis hardware
Item Version Part number Serial Number Description
Chassis53711 M20
Backplane REV 07 710-001517 AL3280
Power Supply A REV 05 740-001466 001652 DC
Power Supply B REV 05 740-001466 001632 DC
Display REV 04 710-001519 AP9225
Host 0 c900000619e6ba01 teknor
SSB slot 0 REV 01 710-001951 AG0809 Internet Processor
II
FPC 0 REV 01 710-001292 AN1335
PIC 0 REV 04 750-002992 HD4313 4x F/E, 100 BASE-TX
PIC 1 REV 04 750-002992 AJ5844 4x F/E, 100 BASE-TX
PIC 2 REV 04 750-002992 HD4518 4x F/E, 100 BASE-TX
PIC 3 REV 04 750-002992 HD4515 4x F/E, 100 BASE-TX
FPC 1 REV 01 710-001292 AN1124
PIC 0 REV 04 750-002992 HD4296 4x F/E, 100 BASE-TX
PIC 1 REV 04 750-002992 HD4323 4x F/E, 100 BASE-TX
PIC 2 REV 04 750-002992 HD4129 4x F/E, 100 BASE-TX
PIC 3 REV 04 750-002992 HD4341 4x F/E, 100 BASE-TX
FPC 2 REV 01 710-001292 AN1726
PIC 0 REV 07 750-002303 AH4147 4x F/E, 100 BASE-TX
PIC 1 REV 07 750-002303 AH4238 4x F/E, 100 BASE-TX
PIC 2 REV 07 750-002303 AH4116 4x F/E, 100 BASE-TX
PIC 3 REV 07 750-002303 AH4208 4x F/E, 100 BASE-TX
FPC 3 REV 01 710-001292 AN1691
PIC 0 REV 08 750-001072 AS3697 1x G/E, 1000
BASE-SX
PIC 1 REV 03 750-001190 AE1110 1x COC12, SMIR
PIC 3 REV 04 750-003250 AD9599 1x CSTM1, SMIR
Table 38 on page 187 provides an example of jnxContentEntry objects in the
jnxContentTable of a T640 router.
Table 38: jnxContentsEntry Objects in the jnxContentsTable of a T640
Router
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
1 1 0 0 jnxMidplaneT640.0 Midplane AX5633 REV 04 0:0:00:00.00 710-002726
2 2 0 0 jnxT640Power.0 PEM 1 MD21815 RevX02 0:0:00:00.00 740-002595
4 1 1 0 jnxT640Fan.0 Top left front – – 0:0:00:00.00 –
fan
4 1 2 0 jnxT640Fan.0 Top left middle – – 0:0:00:00.00 –
fan
4 1 3 0 jnxT640Fan.0 Top left rear – – 0:0:00:00.00 –
fan
4 1 4 0 jnxT640Fan.0 Top right front – – 0:0:00:00.00 –
fan
Copyright © 2010, Juniper Networks, Inc. 187
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 38: jnxContentsEntry Objects in the jnxContentsTable of a T640
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
4 1 5 0 jnxT640Fan.0 Top right – – 0:0:00:00.00 –
middle fan
4 1 6 0 jnxT640Fan.0 Top right rear – – 0:0:00:00.00 –
fan
4 2 1 0 jnxT640Fan.0 Bottom left – – 0:0:00:00.00 –
front fan
4 2 2 0 jnxT640Fan.0 Bottom left – – 0:0:00:00.00 –
middle fan
4 2 3 0 jnxT640Fan.0 Bottom left rear – – 0:0:00:00.00 –
fan
4 2 4 0 jnxT640Fan.0 Bottom right – – 0:0:00:00.00 –
front fan
4 2 5 0 jnxT640Fan.0 Bottom right – – 0:0:00:00.00 –
middle fan
4 2 6 0 jnxT640Fan.0 Bottom right – – 0:0:00:00.00 –
rear fan
4 3 1 0 jnxT640Fan.0 Fourth blower – – 0:0:00:00.00 –
from top
4 3 2 0 jnxT640Fan.0 Bottom blower – – 0:0:00:00.00 –
4 3 3 0 jnxT640Fan.0 Middle blower – – 0:0:00:00.00 –
4 3 4 0 jnxT640Fan.0 Top blower – – 0:0:00:00.00 –
4 3 5 0 jnxT640Fan.0 Second blower – – 0:0:00:00.00 –
from top
7 2 0 0 jnxT640FPC.0 FPC @ 1/*/* HE3009 REV 01 0:18:56:48.81 710-002385
7 2 1 0 jnxT640FPC.0 FPC @ 1/0/* HE3009 REV 01 0:18:56:48.81 710-002385
top
temperature
sensor
7 2 2 0 jnxT640FPC.0 FPC @ 1/1/* HE3009 REV 01 0:18:56:48.81 710-002385
bottom
temperature
sensor
188 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 38: jnxContentsEntry Objects in the jnxContentsTable of a T640
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
7 6 0 0 jnxT640FPC.0 FPC @ 5/*/* HD5001 REV 03 0:18:57:02.71 710-001721
7 6 1 0 jnxT640FPC.0 FPC @ 5/0/* HD5001 REV 03 0:18:57:02.71 710-001721
top
temperature
sensor
7 6 2 0 jnxT640FPC.0 FPC @ 5/1/* HD5001 REV 03 0:18:57:02.71 710-001721
bottom
temperature
sensor
7 8 0 0 jnxT640FPC.0 FPC @ 7/*/* HE3179 REV 01 0:18:56:52.85 710-002385
7 8 1 0 jnxT640FPC.0 FPC @ 7/0/* HE3179 REV 01 0:18:56:52.85 710-002385
top
temperature
sensor
7 8 2 0 jnxT640FPC.0 FPC @ 7/1/* HE3179 REV 01 0:18:56:52.85 710-002385
bottom
temperature
sensor
8 2 1 0 jnxT640PIC3.0 PIC: 1x G/E, AP5542 REV 08 0:18:56:50.91 750-001072
1000BASE-SX
@ 1/0/*
8 2 2 0 jnxT640PIC3.0 PIC: 1x OC-12 AK6894 REV 02 0:18:56:55.24 750-002983
ATM, SMIR @
1/1/*
8 2 3 0 jnxT640PIC3.0 PIC: 1x G/E, HD4968 REV 04 0:18:56:55.64 750-001894
1000 BASE-SX
@ 1/2/*
8 6 1 0 jnxT640PIC3.0 PIC: 1x OC-192 HC0273 REV 01 0:18:57:04.47 750-004535
SM SR1 @
5/0/*
8 6 2 0 jnxT640PIC3.0 PIC: 1x OC-192 HC0271 REV 01 0:18:57:04.55 750-004535
SM SR1 @ 5/1/*
8 6 3 0 jnxT640PIC3.0 PIC: 1x OC-192 HC0254 REV 01 0:18:57:04.64 750-004535
SM SR1 @
5/2/*
Copyright © 2010, Juniper Networks, Inc. 189
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 38: jnxContentsEntry Objects in the jnxContentsTable of a T640
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
8 8 1 0 jnxT640PIC3.0 PIC: 2x G/E, AD3632 REV 01 0:18:56:55.16 710-002381
1000Base-SX
@ 7/0/*
8 8 2 0 jnxT640PIC3.0 PIC: 4x OC-12 AD3831 REV 05 0:18:56:55.18 750-001901
SONET, SMIR
@ 7/1/*
8 8 3 0 jnxT640PIC3.0 PIC: 1x OC-48 AA9603 REV 01 0:18:56:55.21 750-001900
SONET, SMIR
@ 7/2/*
8 8 4 0 jnxT640PIC3.0 PIC: 1x OC-48 AD5724 REV 05 0:18:56:55.24 750-001900
SONET, SMSR
@ 7/3/*
9 1 0 0 jnxT640HM.0 Host 0 – – 0:19:19:30.95 –
9 2 0 0 jnxT640HM.0 Host 1 2108 REV 01 2:19:45:51.00 740-005022
6570
0292
10 1 0 0 jnxT640FPB.0 FPM HE3245 REV 02 0:0:00:00.00 710-002901
11 1 0 0 jnxT640SCG.0 SCG 0 HF6023 REV 04 0:0:00:00.00 710-003423
11 2 0 0 jnxT640SCG.0 SCG 1 HF6061 REV 04 0:0:00:00.00 710-003423
12 2 0 0 jnxT640CB.0 CB 0 HE3614 REV 06 0:0:00:00.00 710-002728
12 2 0 0 jnxT640CB.0 CB 1 HE3627 REV 06 0:0:00:00.00 710-002728
13 1 0 0 jnxT640CIP.0 CIP HA4729 REV 05 0:0:00:00.00 710-002895
14 1 0 0 jnxT640SPMB.0 SPMB 0 HF6876 REV 02 0:18:56:06.72 710-003229
14 2 0 0 jnxT640SPMB.0 SPMB 1 HG6237 REV 02 0:18:56:08.01 710-003229
15 1 0 0 jnxT640SIB.0 SIB 0 HJ9669 REV 02 0:0:00:00.00 710-005157
15 2 0 0 jnxT640SIB.0 SIB 1 HJ9668 REV 02 0:0:00:00.00 710-005157
15 3 0 0 jnxT640SIB.0 SIB 2 HH3039 REV 02 0:0:00:00.00 710-005157
15 4 0 0 jnxT640SIB.0 SIB 3 HH3041 REV 02 0:0:00:00.00 710-005157
15 5 0 0 jnxT640SIB.0 SIB 4 HJ9657 REV 02 0:0:00:00.00 710-005157
190 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from a T640 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis T640
Midplane REV 04 710-002726 AX5633
FPM GBUS REV 02 710-002901 HE3245
FPM Display REV 02 710-002897 HA4873
CIP REV 05 710-002895 HA4729
PEM 1 RevX02 740-002595 MD21815 Power Entry Module
SCG 0 REV 04 710-003423 HF6023
SCG 1 REV 04 710-003423 HF6061
Host 0 unknown
Host 1 REV 01 740-005022 210865700292 RE-3.0
CB 0 REV 06 710-002728 HE3614
CB 1 REV 06 710-002728 HE3627
FPC 1 REV 01 710-002385 HE3009 FPC Type 1
CPU REV 06 710-001726 HC0010
PIC 0 REV 08 750-001072 AP5542 1x G/E, 1000Base-SX
PIC 1 REV 02 750-002983 AK6894 1x OC-12 ATM, SMIR
PIC 2 REV 04 750-001894 HD4968 1x G/E, 1000Base-SX
MMB 1 REV 03 710-001723 HE7264 MMB-144mbit
ICBM REV 01 710-003384 HE3042
PPB 0 REV 01 710-003758 HE7173 PPB Type 2
PPB 1 REV 01 710-003758 HE7170 PPB Type 2
FPC 5 REV 03 710-001721 HD5001 FPC Type 3
CPU REV 06 710-001726 HA5080
PIC 0 REV 01 750-004535 HC0273 1x OC-192 SM SR1
PIC 1 REV 01 750-004535 HC0271 1x OC-192 SM SR1
PIC 2 REV 01 750-004535 HC0254 1x OC-192 SM SR1
MMB 0 REV 03 710-001723 HE7263 MMB-144mbit
MMB 1 REV 03 710-001723 HE7266 MMB-144mbit
ICBM REV 01 710-003384 HE3044
PPB 0 REV 02 710-002845 HD6027 PPB Type 3
PPB 1 REV 02 710-002845 HD6039 PPB Type 3
FPC 7 REV 01 710-002385 HE3179 FPC Type 2
CPU REV 06 710-001726 HE7915
PIC 0 REV 01 710-002381 AD3632 2x G/E, 1000 BASE-SX
PIC 1 REV 05 750-001901 AD3831 4x OC-12 SONET, SMIR
PIC 2 REV 01 750-001900 AA9603 1x OC-48 SONET, SMIR
PIC 3 REV 05 750-001900 AD5724 1x OC-48 SONET, SMSR
MMB 1 REV 02 710-004047 HE3424 MMB-288mbit
ICBM REV 04 710-003384 HA4480
PPB 0 REV 02 710-003758 HE3169 PPB Type 2
PPB 1 REV 02 710-003758 HA4535 PPB Type 2
SPMB 0 REV 02 710-003229 HF6876
SPMB 1 REV 02 710-003229 HG6237
SIB 0 REV 02 710-005157 HJ9669 SIB-I8-F16
SIB 1 REV 02 710-005157 HJ9668 SIB-I8-F16
SIB 2 REV 02 710-005157 HH3039 SIB-I8-F16
SIB 3 REV 02 710-005157 HH3041 SIB-I8-F16
SIB 4 REV 02 710-005157 HJ9657 SIB-I8-F16
Table 39 on page 192 provides an example of jnxContentEntry objects in the
jnxContentTable of a T320 router.
Copyright © 2010, Juniper Networks, Inc. 191
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 39: jnxContentsEntry Objects in the jnxContentsTable of a T320
Router
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
1 1 0 0 jnxMidplaneT320.0 Midplane AY4527 Rev 01 (0) 710-004339
0:00:00.00
2 1 0 0 jnxT320Power.0 PEM 0 ML14099 Rev 01 (0) –
0:00:00.00
4 1 1 0 jnxT320Fan.0 Top left front – – (0) –
fan 0:00:00.00
4 1 2 0 jnxT320Fan.0 Top left middle – – (0) –
fan 0:00:00.00
4 1 3 0 jnxT320Fan.0 Top left rear fan – – (0) –
0:00:00.00
4 1 4 0 jnxT320Fan.0 Top right front – – (0) –
fan 0:00:00.00
4 1 5 0 jnxT320Fan.0 Top right middle – – (0) –
fan 0:00:00.00
4 1 6 0 jnxT320Fan.0 Top right rear – – (0) –
fan 0:00:00.00
4 2 1 0 jnxT320Fan.0 Bottom left – – (0) –
front fan 0:00:00.00
4 2 2 0 jnxT320Fan.0 Bottom left – – (0) –
middle fan 0:00:00.00
4 2 3 0 jnxT320Fan.0 Bottom left rear – – (0) –
fan 0:00:00.00
4 2 4 0 jnxT320Fan.0 Bottom right – – (0) –
front fan 0:00:00.00
4 2 5 0 jnxT320Fan.0 Bottom right – – (0) –
middle fan 0:00:00.00
4 2 6 0 jnxT320Fan.0 Bottom right – – (0) –
rear fan 0:00:00.00
4 3 1 0 jnxT320Fan.0 Rear tray top fan – – (0) –
0:00:00.00
4 3 2 0 jnxT320Fan.0 Rear tray second – – (0) –
fan 0:00:00.00
192 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 39: jnxContentsEntry Objects in the jnxContentsTable of a T320
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
4 3 3 0 jnxT320Fan.0 Rear tray middle – – (0) –
fan 0:00:00.00
4 3 4 0 jnxT320Fan.0 Rear tray fourth – – (0) –
fan 0:00:00.00
4 3 5 0 jnxT320Fan.0 Rear tray – – (0) –
bottom fan 0:00:00.00
7 4 0 0 jnxT320FPC.0 FPC @ 3/*/* AY4706 REV 01 (26190949) 710-004333
3 days,
0:45:09.49
7 4 1 0 jnxT320FPC.0 FPC @ 3/0/* AY4706 REV 01 (26190949) 710-004333
top temperature 3 days,
sensor 0:45:09.49
7 4 2 0 jnxT320FPC.0 FPC @ 3/1/* AY4706 REV 01 (26190949) 710-004333
bottom 3 days,
temperature 0:45:09.49
sensor
8 1 1 0 jnxT320PIC3 PIC: 1x OC-192 HJ9283 REV 06 (6378) 750-004535
SM SR2 @ 0:01:03.78
0/0/*
8 1 2 0 jnxT320PIC3 PIC: 1x OC-192 HJ9298 REV 06 (6434) 750-004535
SM SR2 @ 0/1/* 0:01:04.34
9 1 0 0 jnxT320HM.0 Host 0 2108 REV 01 (32762924) 740-005022
6570 3 days,
0286 19:00:29.24
9 2 0 0 jnxT320HM.0 Host 1 2109 REV 01 (110269900) 740-005022
2900 12 days,
0186 18:18:19.00
10 1 0 0 jnxT320FPB.0 FPM AY4514 REV 02 (0) 710-004461
0:00:00.00
11 1 0 0 jnxT320SCG.0 SCG 0 AY4520 REV 06 (0) 710-004455
0:00:00.00
11 2 0 0 jnxT320SCG.0 SCG 1 AY4526 REV 06 (0) 710-004455
0:00:00.00
12 1 0 0 jnxT320CB.0 CB 0 AY4765 REV 11 (0) 710-002728
0:00:00.00
Copyright © 2010, Juniper Networks, Inc. 193
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 39: jnxContentsEntry Objects in the jnxContentsTable of a T320
Router (continued)
Container L1 L2 L3 Serial Part
Index Index Index Index Type Description Number Revision Installed Number
12 2 0 0 jnxT320CB.0 CB 1 HG6051 REV 06 (0) 710-002728
0:00:00.00
13 1 0 0 jnxT320CIP.0 CIP HC0476 REV 05 (0) 710-002895
0:00:00.00
14 1 0 0 jnxT320SPMB.0 SPMB 0 HB1893 REV 02 (26186997) 710-003229
3 days,
0:44:29.97
14 2 0 0 jnxT320SPMB.0 SPMB 1 HD5520 REV 02 (26186913) 3 710-003229
days,
0:44:29.13
15 1 0 0 jnxT320SIB.0 SIB 0 BC1509 REV 02 (0) 710-005157
0:00:00.00
15 2 0 0 jnxT320SIB.0 SIB 1 BC1512 REV 02 (0) 710-005157
0:00:00.00
15 3 0 0 jnxT320SIB.0 SIB 2 BC1494 REV 02 (0) 710-005157
0:00:00.00
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from a T320 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis T320
Midplane REV 01 710-004339 AY4527
FPM GBUS REV 02 710-004461 AY4514
FPM Display REV 02 710-002897 HF6097
CIP REV 05 710-002895 HC0476
PEM 0 Rev 01 740-004359 ML14099 Power Entry
Module
SCG 0 REV 06 710-004455 AY4520
SCG 1 REV 06 710-004455 AY4526
RE 0 REV 01 740-005022 210865700286 RE-3.0
RE 1 REV 01 740-005022 210929000186 RE-3.0
CB 0 REV 11 710-002728 AY4765
CB 1 REV 06 710-002728 HG6051
FPC 1 REV 01 710-004333 AY4507 FPC Type 3
CPU REV 06 710-001726 HA4719
MMB 1 REV 03 710-004047 HD5738 MMB-288mbit
PPB 0 REV 02 710-002845 HC0988 PPB Type 3
FPC 3 REV 01 710-004333 AY4706 FPC Type 3
CPU REV 06 710-001726 HE7916
MMB 1 REV 03 710-004047 HG6326 MMB-288mbit
PPB 0 REV 02 710-002845 HC0958 PPB Type 3
SPMB 0 REV 02 710-003229 HB1893
194 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
SPMB 1 REV 02 710-003229 HD5520
SIB 0 REV 02 710-005157 BC1509 SIB-I8-F16
SIB 1 REV 02 710-005157 BC1512 SIB-I8-F16
SIB 2 REV 02 710-005157 BC1494 SIB-I8-F16
jnxLEDLastChange
The object identifier for the jnxLEDLastChange object is {jnxBoxAnatomy 9}. This object
indicates when the LED last changed state. Its value is 0 if the sysUpTime value is unknown
or if it already existed when the agent was active.
jnxLEDTable
The object identifier for the jnxLEDTable object is {jnxBoxAnatomy 10}. This object
indicates the LED status of the router and lists the contents of an entry. Entries in the
jnxLEDTable are represented by the jnxLEDEntry object, whose object identifier is
{jnxLEDTable 1}.
The jnxLEDTable describes the components of the LED Box Indicators, whose elements
are described as follows:
• jnxLEDAssociateTable—The associate table to which the entry is related, whose object
identifier is {jnxLEDEntry 1}.
• jnxLEDAssociateIndex—The index of the subject in the associated table to which the
entry is related, whose object identifier is {jnxLEDEntry 2}. The associate index is the
index of the subject in the associated table, which returns you to the jnxContainersTable.
• jnxLEDL1Index—The level-one index of the associate table to which an entry is related,
whose object identifier is {jnxLEDEntry 3}. It indicates the position of the component
within the different levels of the containers. This value is 0 if the position is unavailable
or not applicable.
NOTE: MIBs start with a value of 1, while the physical count on the router
starts with a value of 0. To find the actual location of a component within
a router, you must subtract 1 from the L1, L2, or L3 index.
• jnxLEDL2Index—The level-two index of the associate table to which an entry is related,
whose object identifier is {jnxLEDEntry 4}. It indicates the position of the component
within the different levels of the containers. This value is 0 if the position is unavailable
or not applicable.
• jnxLEDL3Index—The level-three index of the associate table to which an entry is related,
whose object identifier is {jnxLEDEntry 5}. It indicates the position of the component
within the different levels of the containers. This value is 0 if the position is unavailable
or not applicable.
• jnxLEDOriginator—The chassis component that originated the update, whose object
identifier is {jnxLEDEntry 6}.
• jnxLEDDescr—The name or detailed description of the entry, whose object identifier is
{jnxLEDEntry 7}.
Copyright © 2010, Juniper Networks, Inc. 195
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxLEDState—The state of the LED indicator, whose object identifier is {jnxLEDEntry 8}.
The state is represented by one of the following values:
• Amber—Alarm, offline, not working
• Blue—Online as the active primary
• Green—Working normally online as a standby backup if there is an active primary
• Other—Unknown or unavailable
• Red—Alert, component failed
• Yellow—Alarm, warning
• jnxLEDStateOrdered—The state of the LED indicator, whose object identifier is
{jnxLEDEntry 9}. jnxLEDStateOrdered provides the same information as jnxLEDState
but lists the states in a different order. The states are defined as follows:
• Blue—Online as the active primary
• Green—Working normally online as a standby backup if there is an active primary
• Amber—Alarm, offline, not working
• Yellow—Alarm, warning
• Red—Alert, component failed
• Other—Unknown or unavailable
Table 40 on page 197 through Table 42 on page 198 provide examples of jnxLEDEntry
objects. The following column headings for each table are abbreviated to correspond to
the parts of the jnxLEDEntry objects:
• Associate table—jnxLEDAssociateTable
• Associate index—jnxLEDAssociateIndex
• L1 Index—jnxLEDL1Index
• L2 Index—jnxLEDL2Index
• L3 Index—jnxLEDL3Index
• Originator—jnxLEDOriginator
• Description—jnxLEDDescr
• State—jnxLEDState
Table 40 on page 197 provides an example of jnxLEDEntry objects in the jnxLEDTable of
an M20 router.
196 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 40: jnxLEDEntry Objects in the jnxLEDTable of an M20 Router
Associate L2
Table Associate Index L1 Index Index L3 Index Originator Description State
jnxContentsTable 1 1 0 0 jnxChassisM20.0 Chassis alarm LED Other
jnxContentsTable 6 1 0 0 jnxM20SSB.0 SSB 1 LED Blue
jnxContentsTable 6 2 0 0 jnxM20SSB.0 SSB 2 LED Green
jnxContentsTable 7 1 0 0 jnxM20FPC.0 FPC 1 LED Amber
jnxContentsTable 7 2 0 0 jnxM20FPC.0 FPC 2 LED Blue
jnxContentsTable 7 3 0 0 jnxM20FPC.0 FPC 3 LED Blue
jnxContentsTable 7 4 0 0 jnxM20FPC.0 FPC 4 LED Amber
jnxContentsTable 9 1 0 0 jnxM20RE.0 Routing Engine 1 LED Blue
jnxContentsTable 9 2 0 0 jnxM20RE.0 Routing Engine 2 LED Other
Table 41 on page 197 provides an example of jnxLEDEntry objects in the jnxLEDTable of a
T640 router.
Table 41: jnxLEDEntry Objects in the jnxLEDTable of a T640 Router
Associate L3
Table Associate Index L1 Index L2 Index Index Originator Description State
jnxContentsTable 1 1 0 0 jnxChassisT640.0 Chassis alarm LED Other
jnxContentsTable 7 1 0 0 jnxT640FPC.0 FPC slot 0 LED Other
jnxContentsTable 7 2 0 0 jnxT640FPC.0 FPC slot 1 LED Green
jnxContentsTable 7 3 0 0 jnxT640FPC.0 FPC slot 2 LED Other
jnxContentsTable 7 4 0 0 jnxT640FPC.0 FPC slot 3 LED Other
jnxContentsTable 7 5 0 0 jnxT640FPC.0 FPC slot 4 LED Other
jnxContentsTable 7 6 0 0 jnxT640FPC.0 FPC slot 5 LED Green
jnxContentsTable 7 7 0 0 jnxT640FPC.0 FPC slot 6 LED Other
jnxContentsTable 7 8 0 0 jnxT640FPC.0 FPC slot 7 LED Green
jnxContentsTable 9 1 0 0 jnxT640HM.0 Host 0 LED Blue
Copyright © 2010, Juniper Networks, Inc. 197
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 41: jnxLEDEntry Objects in the jnxLEDTable of a T640
Router (continued)
Associate L3
Table Associate Index L1 Index L2 Index Index Originator Description State
jnxContentsTable 9 2 0 0 jnxT640HM.0 Host 1 LED Green
Table 42 on page 198 provides an example of jnxLEDEntry objects in the jnxLEDTable of
a T320 router.
Table 42: jnxLEDEntry Objects in the jnxLEDTable of a T320 Router
Associate Table Associate Index L1 Index L2 Index L3 Index Originator Description State
jnxContentsTable(3) 1 1 0 0 jnxChassisT320.0 Chassis alarm Other
LED
jnxContentsTable(3) 7 1 0 0 jnxT320FPC.0 FPC slot 0 LED Other
jnxContentsTable(3) 7 2 0 0 jnxT320FPC.0 FPC slot 1 LED Other
jnxContentsTable(3) 7 3 0 0 jnxT320FPC.0 FPC slot 2 LED Other
jnxContentsTable(3) 7 4 0 0 jnxT320FPC.0 FPC slot 3 LED Other
jnxContentsTable(3) 7 5 0 0 jnxT320FPC.0 FPC slot 4 LED Other
jnxContentsTable(3) 7 6 0 0 jnxT320FPC.0 FPC slot 5 LED Other
jnxContentsTable(3) 7 7 0 0 jnxT320FPC.0 FPC slot 6 LED Other
jnxContentsTable(3) 7 8 0 0 jnxT320FPC.0 FPC slot 7 LED Other
jnxContentsTable(3) 9 1 0 0 jnxT320HM.0 Host 0 LED Blue
jnxContentsTable(3) 9 2 0 0 jnxT320HM.0 Host 1 LED Green
jnxFilledLastChange
The object identifier for the jnxFilledLastChange object is {jnxBoxAnatomy 11}. This object
indicates when the box filled status last changed. This variable is 0 if the sysUpTime
value is unknown or it already existed when the agent was active.
jnxFilledTable
The object identifier for the jnxFilledTable object is {jnxBoxAnatomy 12}. This object
indicates whether a specific container in the router is used (filled) or empty. This table
is used for inventory and capacity planning.
Entries in the jnxFilledTable are represented by the jnxFilledEntry object, whose object
identifier is {jnxFilledTable 1}.
198 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
The jnxFilledTable describes the status of specific containers whose component objects
are described as follows:
• jnxFilledContainerIndex—The associated jnxContainersIndex in the jnxContainersTable,
whose object identifier is {jnxFilledEntry 1}.
• jnxFilledL1Index—The level-one index of the container housing the entry, whose object
identifier is {jnxFilledEntry 2}.
• jnxFilledL2Index—The level-two index of the container housing the entry, whose object
identifier is {jnxFilledEntry 3}.
• jnxFilledL3Index—The level-three index of the container housing the entry, whose object
identifier is {jnxFilledEntry 4}.
• jnxFilledDescr—The entry’s name or detailed description of the entry, whose object
identifier is {jnxFilledEntry 5}.
• jnxFilledState—The entry’s state (filled or empty), whose object identifier is
{jnxFilledEntry 6}.
Table 43 on page 199 through Table 45 on page 206 provide examples of jnxFilledEntry
objects in the jnxFilledTable. The following column headings for each table are abbreviated
to correspond to the parts of the jnxFilledEntry objects:
• Container index—jnxFilledContainerIndex
• L1—jnxFilledL1Index
• L2—jnxFilledL2Index
• L3—jnxFilledL3Index
• Description—jnxFilledDescr
• State—jnxFilledState
Table 43 on page 199 provides an example of jnxFilledEntry objects in the jnxFilledTable
of an M20 router.
Table 43: jnxFilledEntry Objects in the jnxFilledTable of an M20 Router
Container
Index L1 L2 L3 Description State
1 1 0 0 Chassis frame compartment Filled
1 1 1 0 Temperature sensor space 0 Filled
1 1 2 0 Temperature sensor space 1 Filled
2 1 0 0 Power supply compartment A Filled
2 2 0 0 Power supply compartment B Empty
3 1 0 0 Rear top impeller compartment Filled
Copyright © 2010, Juniper Networks, Inc. 199
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 43: jnxFilledEntry Objects in the jnxFilledTable of an M20
Router (continued)
Container
Index L1 L2 L3 Description State
3 2 0 0 Front bottom impeller compartment Filled
4 1 0 0 Rear left fan compartment Filled
4 2 0 0 Right center fan compartment Filled
4 3 0 0 Rear right fan compartment Filled
5 1 0 0 Host controller compartment Filled
6 1 0 0 SCB slot Filled
7 1 0 0 FPC slot 0 Empty
7 2 0 0 FPC slot 1 Empty
7 3 0 0 FPC slot 2 Filled
7 4 0 0 FPC slot 3 Filled
7 5 0 0 FPC slot 4 Empty
7 6 0 0 FPC slot 5 Filled
7 7 0 0 FPC slot 6 Empty
7 8 0 0 FPC slot 7 Empty
8 1 1 0 PIC space @ 0/0/* Empty
8 1 2 0 PIC space @ 0/1/* Empty
8 1 3 0 PIC space @ 0/2/* Empty
8 1 4 0 PIC space @ 0/3/* Empty
8 2 1 0 PIC space @ 1/0/* Empty
8 2 2 0 PIC space @ 1/1/* Empty
8 2 3 0 PIC space @ 1/2/* Empty
8 2 4 0 PIC space @ 1/3/* Empty
8 3 1 0 PIC space @ 2/0/* Filled
200 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 43: jnxFilledEntry Objects in the jnxFilledTable of an M20
Router (continued)
Container
Index L1 L2 L3 Description State
8 3 2 0 PIC space @ 2/1/* Filled
8 3 3 0 PIC space @ 2/2/* Filled
8 3 4 0 PIC space @ 2/3/* Filled
8 4 1 0 PIC space @ 3/0/* Filled
8 4 2 0 PIC space @ 3/1/* Filled
8 4 3 0 PIC space @ 3/2/* Filled
8 4 4 0 PIC space @ 3/3/* Filled
8 5 1 0 PIC space @ 4/0/* Empty
8 5 2 0 PIC space @ 4/1/* Empty
8 5 3 0 PIC space @ 4/2/* Empty
8 5 4 0 PIC space @ 4/3/* Empty
8 6 1 0 PIC space @ 5/0/* Filled
8 6 2 0 PIC space @ 5/1/* Filled
8 6 3 0 PIC space @ 5/2/* Filled
8 6 4 0 PIC space @ 5/3/* Filled
8 7 1 0 PIC space @ 6/0/* Empty
8 7 2 0 PIC space @ 6/1/* Empty
8 7 3 0 PIC space @ 6/2/* Empty
8 7 4 0 PIC space @ 6/3/* Empty
8 8 1 0 PIC space @ 7/0/* Empty
8 8 2 0 PIC space @ 7/1/* Empty
8 8 3 0 PIC space @ 7/2/* Empty
8 8 4 0 PIC space @ 7/3/* Empty
Copyright © 2010, Juniper Networks, Inc. 201
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 43: jnxFilledEntry Objects in the jnxFilledTable of an M20
Router (continued)
Container
Index L1 L2 L3 Description State
9 1 0 0 Routing Engine compartment Filled
Table 44 on page 202 provides an example of jnxFilledEntry objects in the jnxFilledTable
of a T640 router.
Table 44: jnxFilledEntry Objects in the jnxFilledTable of a T640 Router
Container
Index L1 L2 L3 Description State
1 1 0 0 Chassis frame Filled
2 1 0 0 PEM slot 0 Empty
2 2 0 0 PEM slot 1 Filled
4 1 1 0 Top left front fan slot Filled
4 1 2 0 Top left middle fan slot Filled
4 1 3 0 Top left rear fan slot Filled
4 1 4 0 Top right front fan slot Filled
4 1 5 0 Top right middle fan slot Filled
4 1 6 0 Top right rear fan slot Filled
4 2 1 0 Bottom left front fan slot Filled
4 2 2 0 Bottom left middle fan slot Filled
4 2 3 0 Bottom left rear fan slot Filled
4 2 4 0 Bottom right front fan slot Filled
4 2 5 0 Bottom right middle fan slot Filled
4 2 6 0 Bottom right rear fan slot Filled
4 3 1 0 Fourth blower from top slot Filled
4 3 2 0 Bottom blower slot Filled
4 3 3 0 Middle blower slot Filled
202 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 44: jnxFilledEntry Objects in the jnxFilledTable of a T640
Router (continued)
Container
Index L1 L2 L3 Description State
4 3 4 0 Top blower slot Filled
4 3 5 0 Second blower from top slot Filled
7 3 2 0 FPC slot 0 Empty
7 3 3 0 FPC slot 0 top temperature sensor Empty
7 3 4 0 FPC slot 0 bottom temperature Empty
sensor
7 3 5 0 FPC slot 1 Filled
7 3 6 0 FPC slot 1 top temperature sensor Filled
7 1 0 0 FPC slot 1 bottom temperature sensor Filled
7 1 1 0 FPC slot 2 Empty
7 1 2 0 FPC slot 2 top temperature sensor Empty
7 2 0 0 FPC slot 2 bottom temperature Empty
sensor
7 2 1 0 FPC slot 3 Empty
7 2 2 0 FPC slot 3 top temperature sensor Empty
7 3 0 0 FPC slot 3 bottom temperature Empty
sensor
7 3 1 0 FPC slot 4 Empty
7 3 2 0 FPC slot 4 top temperature sensor Empty
7 4 0 0 FPC slot 4 bottom temperature Empty
sensor
7 4 1 0 FPC slot 5 Filled
7 4 2 0 FPC slot 5 top temperature sensor Filled
7 5 0 0 FPC slot 5 bottom temperature Filled
sensor
7 5 1 0 FPC slot 6 Empty
Copyright © 2010, Juniper Networks, Inc. 203
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 44: jnxFilledEntry Objects in the jnxFilledTable of a T640
Router (continued)
Container
Index L1 L2 L3 Description State
7 5 2 0 FPC slot 6 top temperature sensor Empty
7 6 0 0 FPC slot 6 bottom temperature Empty
sensor
7 6 1 0 FPC slot 7 Filled
7 6 2 0 FPC slot 7 top temperature sensor Filled
7 7 0 0 FPC slot 7 bottom temperature Filled
sensor
8 1 1 0 PIC slot @ 0/0/* Empty
8 1 2 0 PIC slot @ 0/1/* Empty
8 1 3 0 PIC slot @ 0/2/* Empty
8 1 4 0 PIC slot @ 0/3/* Empty
8 2 1 0 PIC slot @ 1/0/* Filled
8 2 2 0 PIC slot @ 1/1/* Filled
8 2 3 0 PIC slot @ 1/2/* Filled
8 2 4 0 PIC slot @ 1/3/* Empty
8 3 1 0 PIC slot @ 2/0/* Empty
8 3 2 0 PIC slot @ 2/1/* Empty
8 3 3 0 PIC slot @ 2/2/* Empty
8 3 4 0 PIC slot @ 2/3/* Empty
8 4 1 0 PIC slot @ 3/0/* Empty
8 4 2 0 PIC slot @ 3/1/* Empty
8 4 3 0 PIC slot @ 3/2/* Empty
8 4 4 0 PIC slot @ 3/3/* Empty
8 5 1 0 PIC slot @ 4/0/* Empty
204 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 44: jnxFilledEntry Objects in the jnxFilledTable of a T640
Router (continued)
Container
Index L1 L2 L3 Description State
8 5 2 0 PIC slot @ 4/1/* Empty
8 5 3 0 PIC slot @ 4/2/* Empty
8 5 4 0 PIC slot @ 4/3/* Empty
8 6 1 0 PIC slot @ 5/0/* Filled
8 6 2 0 PIC slot @ 5/1/* Filled
8 6 3 0 PIC slot @ 5/2/* Filled
8 6 4 0 PIC slot @ 5/3/* Empty
8 7 1 0 PIC slot @ 6/0/* Empty
8 7 2 0 PIC slot @ 6/1/* Empty
8 7 3 0 PIC slot @ 6/2/* Empty
8 7 4 0 PIC slot @ 6/3/* Empty
8 8 1 0 PIC slot @ 7/0/* Filled
8 8 2 0 PIC slot @ 7/1/* Filled
8 8 3 0 PIC slot @ 7/2/* Filled
8 8 4 0 PIC slot @ 7/3/* Filled
9 1 0 0 Host 0 slot Filled
9 2 0 0 Host 1 slot Filled
10 1 0 0 FPM slot Filled
11 1 0 0 SCG slot 0 Filled
11 2 0 0 SCG slot 1 Filled
12 1 0 0 CB slot 0 Filled
12 2 0 0 CB slot 1 Filled
13 1 0 0 CIP slot Filled
Copyright © 2010, Juniper Networks, Inc. 205
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 44: jnxFilledEntry Objects in the jnxFilledTable of a T640
Router (continued)
Container
Index L1 L2 L3 Description State
14 1 0 0 SPMB slot 0 Filled
14 2 0 0 SPMB slot 1 Filled
15 1 0 0 SIB slot 0 Filled
15 2 0 0 SIB slot 1 Filled
15 3 0 0 SIB slot 2 Filled
15 4 0 0 SIB slot 3 Filled
15 5 0 0 SIB slot 4 Filled
Table 45 on page 206 provides an example of jnxFilledEntry objects in the jnxFilledTable
of a T320 router.
Table 45: jnxFilledEntry Objects in the jnxFilledTable of a T320 Router
Container
Index L1 L2 L3 Description State
1 1 0 0 Chassis frame Filled
2 1 0 0 PEM slot 0 Filled
2 2 0 0 PEM slot 1 Empty
4 1 1 0 Top left front fan slot Filled
4 1 2 0 Top left middle fan slot Filled
4 1 3 0 Top left rear fan slot Filled
4 1 4 0 Top right front fan slot Filled
4 1 5 0 Top right middle fan slot Filled
4 1 6 0 Top right rear fan slot Filled
4 2 1 0 Bottom left front fan slot Filled
4 2 2 0 Bottom left middle fan slot Filled
4 2 3 0 Bottom left rear fan slot Filled
206 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 45: jnxFilledEntry Objects in the jnxFilledTable of a T320
Router (continued)
Container
Index L1 L2 L3 Description State
4 2 4 0 Bottom right front fan slot Filled
4 2 5 0 Bottom right middle fan slot Filled
4 2 6 0 Bottom right rear fan slot Filled
4 3 1 0 Rear tray top fan slot Filled
4 3 2 0 Rear tray second fan slot Filled
4 3 3 0 Rear tray middle fan slot Filled
4 3 4 0 Rear tray fourth fan slot Filled
4 3 5 0 Rear tray bottom fan slot Filled
7 1 0 0 FPC slot 0 Empty
7 1 1 0 FPC slot top temperature sensor Empty
7 1 2 0 FPC slot 0 bottom temperature Empty
sensor
7 2 0 0 FPC slot 1 Empty
7 2 1 0 FPC slot 1 top temperature sensor Empty
7 2 2 0 FPC slot 1 bottom temperature sensor Empty
7 3 0 0 FPC slot 2 Empty
7 3 1 0 FPC slot 2 top temperature sensor Empty
7 3 2 0 FPC slot 2 bottom temperature Empty
sensor
7 4 0 0 FPC slot 3 Filled
7 4 1 0 FPC slot 3 top temperature sensor Filled
7 4 2 0 FPC slot 3 bottom temperature Filled
sensor
7 5 1 0 FPC slot 4 Empty
7 5 2 0 FPC slot 4 top temperature sensor Empty
Copyright © 2010, Juniper Networks, Inc. 207
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 45: jnxFilledEntry Objects in the jnxFilledTable of a T320
Router (continued)
Container
Index L1 L2 L3 Description State
7 5 0 0 FPC slot 4 bottom temperature Empty
sensor
7 6 1 0 FPC slot 5 Empty
7 6 2 0 FPC slot 5 top temperature sensor Empty
7 6 0 0 FPC slot 5 bottom temperature Empty
sensor
7 7 1 0 FPC slot 6 Empty
7 7 2 0 FPC slot 6 top temperature sensor Empty
7 7 0 0 FPC slot 6 bottom temperature Empty
sensor
7 8 1 0 FPC slot 7 Empty
7 8 2 0 FPC slot 7 top temperature sensor Empty
7 8 0 0 FPC slot 7 bottom temperature Empty
sensor
8 1 1 0 PIC slot @ 0/0/* Empty
8 1 2 0 PIC slot @ 0/1/* Empty
8 2 1 0 PIC slot @ 1/0/* Empty
8 2 2 0 PIC slot @ 1/1/* Empty
8 3 1 0 PIC slot @ 2/0/* Empty
8 3 2 0 PIC slot @ 2/1/* Empty
8 4 1 0 PIC slot @ 3/0/* Filled
8 4 2 0 PIC slot @ 3/1/* Filled
8 5 1 0 PIC slot @ 4/0/* Empty
8 5 2 0 PIC slot @ 4/1/* Empty
8 6 1 0 PIC slot @ 5/0/* Empty
208 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 45: jnxFilledEntry Objects in the jnxFilledTable of a T320
Router (continued)
Container
Index L1 L2 L3 Description State
8 6 2 0 PIC slot @ 5/1/* Empty
8 7 1 0 PIC slot @ 6/0/* Empty
8 7 2 0 PIC slot @ 6/1/* Empty
8 8 1 0 PIC slot @ 7/0/* Empty
8 8 2 0 PIC slot @ 7/1/* Empty
9 1 0 0 Host 0 slot Filled
9 2 0 0 Host 1 slot Filled
10 1 0 0 FPM slot Filled
11 1 0 0 SCG slot 0 Filled
11 2 0 0 SCG slot 1 Filled
12 1 0 0 CB slot 0 Filled
12 2 0 0 CB slot 1 Filled
13 1 0 0 CIP slot Filled
14 1 0 0 SPMB slot 0 Filled
14 2 0 0 SPMB slot 1 Filled
15 1 0 0 SIB slot 0 Filled
15 2 0 0 SIB slot 1 Filled
15 3 0 0 SIB slot 2 Filled
jnxOperatingTable
The object identifier for jnxOperatingTable object is {jnxBoxAnatomy 13}. This object
reports the operating status of various components such as CPU, buffers, and memory.
Juniper Networks routers implement packet forwarding and routing functions with two
separate components, the Packet Forwarding Engine and the Routing Engine, to ensure
stability. The clean separation of these two functions permits superior forwarding
performance and a highly reliable operating system. Therefore, it is not necessary to
Copyright © 2010, Juniper Networks, Inc. 209
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
monitor CPU, memory, and buffer utilization, as is the case with traditional, monolithic
code base routers. The Routing Engine has its own CPU, memory, and buffers—separate
from those of the Packet Forwarding Engine. The ASIC-based Packet Forwarding Engine
forwards packets on all interfaces at wire speed, eliminating the need to monitor packet
buffers being exhausted. As a result, CPU utilization under 2 percent is normal.
Entries in the jnxOperatingTable are represented by the jnxOperatingEntry object, whose
object identifier is {jnxOperatingTable 1}.
The jnxOperatingTable describes the status of specific objects, which are described as
follows:
• jnxOperatingContents—The associated jnxContentsIndex in the jnxContentsTable,
whose object identifier is {jnxOperatingEntry 1}.
• jnxOperatingL1Index—The level-one index of the container housing the entry, whose
object identifier is {jnxOperatingEntry 2}.
• jnxOperatingL2Index—The level-two index of the container housing the entry, whose
object identifier is {jnxOperatingEntry 3}.
• jnxOperatingL3Index—The level-three index of the container housing the entry, whose
object identifier is {jnxOperatingEntry 4}.
• jnxOperatingDescr—The name or detailed description of the entry, whose object
identifier is {jnxOperatingEntry 5}.
• jnxOperatingState—The operating state of the entry, whose object identifier is
{jnxOperatingEntry 6}. The state can be any of the following:
• Unknown(1)—State of the component is unknown or unavailable
• Running(2)—Up and running as an active primary
• Ready(3)—Ready to run; not running yet
• Reset(4)—Held in reset; not ready yet
• RunningAtFullSpeed(5)—Valid for fans only
• Down(6)—Power supply is down or off
• Standby(7)—Running as a standby backup
• jnxOperatingTemp—The entry’s temperature, in degrees Celsius (°C), whose object
identifier is {jnxOperatingEntry 7}.
• jnxOperatingCPU—The CPU utilization percentage of the entry, whose object identifier
is {jnxOperatingEntry 8}. It is valid for the Control Board, the FPC, and the Routing
Engine. It is a 5-second rolling-weighted average calculated every second for each of
the CPUs. The value is sent to the Routing Engine every 10 seconds. The value for the
Routing Engine is calculated as the average CPU usage over a 5-second period. The
chassis process (chassisd) computes this value for every 5-second period and returns
the latest value from the cache when probed for the value of jnxOperatingCPU.9.1.0.0,
which maps to the Routing Engine CPU. The Routing Engine is the only object of interest;
210 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
the rest are most likely zero because CPUs on those cards are only used for
management purposes.
• jnxOperatingISR—The CPU utilization percentage of the entry in relation to the interrupt
service routing (ISR), whose object identifier is {jnxOperatingEntry 9}.
• jnxOperatingDRAMSize—The DRAM size of the entry, in bytes, whose object identifier
is {jnxOperatingEntry 10}. It is valid for the FPC, Routing Engine, and Control Board.
• jnxOperatingBuffer—The buffer pool utilization of the entry (a percentage), whose
object identifier is {jnxOperatingEntry 11}. It is valid for the FPC and Control Board as a
percentage of utilization. Buffers are normally fixed-length memory preallocated for
read/write, input/output, or reception/transmission. A measurement against these
buffers gives some indication of how busy the system is. The larger the percentage
utilization, the busier the system. In terms of absolute numbers, the bigger the buffer
size, the better the system can handle bursty traffic patterns.
• jnxOperatingHeap—The heap utilization of the entry, whose object identifier is
{jnxOperatingEntry 12}.
• jnxOperatingUpTime—The time interval, in 10-millisecond periods, that the entry has
been up and running, whose object identifier is {jnxOperatingEntry 13}.
• jnxOperatingLastRestart—The value of sysUpTime when the entry was last restarted,
whose object identifier is {jnxOperatingEntry 14}.
• jnxOperatingMemory—The entry’s installed memory size, in megabytes (MB), whose
object identifier is {jnxOperatingEntry 15}.
• jnxOperatingStateOrdered—The operating state of the entry, whose object identifier
is {jnxOperatingEntry 16}. The state is represented by one of the following values:
• Running(1)—Up and running as an active primary
• Standby(2)—Running as a standby backup
• Ready(3)—Ready to run; not running yet
• RunningAtFullSpeed(4)—Valid for fans only
• Reset(5)—Held in reset; not ready yet
• Down(6)—Power supply is down or off
• Unknown(7)—State of the component is unknown or unavailable
Table 46 on page 212 through Table 48 on page 216 provide examples of jnxOperatingEntry
objects. The following column headings for each table are abbreviated to correspond to
the parts of the jnxOperatingEntry objects:
• Contents index—jnxOperatingContents
• L1—jnxOperatingL1Index
• L2—jnxOperatingL2Index
• L3—jnxOperatingL3Index
Copyright © 2010, Juniper Networks, Inc. 211
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Description—jnxOperatingDescr
• State—jnxOperatingState
• Temp—jnxOperatingTemp
• CPU—jnxOperatingCPU
• ISR—jnxOperatingISR
• DRAM—jnxOperatingDRAMSize
• Buffer—jnxOperatingBuffer
• Heap—jnxOperatingHeap
• UpTime—jnxOperatingUpTime
• Last Restart—jnxOperatingLastRestart
• Memory—jnxOperatingMemory
Table 46 on page 212 provides an example of jnxOperatingEntry objects in the
jnxOperatingTable of an M20 router.
Table 46: jnxOperatingEntry Objects in the jnxOperatingTable of an M20
Router
Index L1 L2 L3 Description State Temp CPU ISR DRAM Buffer Heap UpTime LastRestart Memory
1 1 0 0 Midplane Running 26 0 0 0 0 0 0 0:0:00:00.0 0
2 1 0 0 Power Running 28 0 0 0 0 0 0 0:0:00:00.0 0
supply A
2 2 0 0 Power Running 29 0 0 0 0 0 0 0:0:00:00.0 0
supply B
4 1 0 0 Front top Running 0 0 0 0 0 0 0 0:0:00:00.0 0
fan
4 2 0 0 Front Running 0 0 0 0 0 0 0 0:0:00:00.0 0
middle fan
4 3 0 0 Front Running 0 0 0 0 0 0 0 0:0:00:00.0 0
bottom fan
4 4 0 0 Rear fan Running 0 0 0 0 0 0 0 0:0:00:00.0 0
6 1 0 0 SSB 0 Running 30 0 0 671088 6 0 67038195 0:0:00:35.41 64
7 1 0 0 FPC @ Running 31 0 0 83886 3 0 67035034 0:0:01:06.91 8
0/*/*
7 2 0 0 FPC @ Running 33 0 0 83886 4 0 67034422 0:0:01:13.04 8
1/*/*
212 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 46: jnxOperatingEntry Objects in the jnxOperatingTable of an M20
Router (continued)
Index L1 L2 L3 Description State Temp CPU ISR DRAM Buffer Heap UpTime LastRestart Memory
7 3 0 0 FPC @ Running 31 0 0 83886 3 0 67033809 0:0:01:19.18 8
2/*/*
9 1 0 0 Routing Running 29 4 0 802738 0 0 67046146 0:0:00:00.00 765
Engine 0
To verify the size of the memory, use the show chassis fpc, show chassis routing-engine,
and show chassis ssb commands. For more information about the output of these
commands, see the Junos System Basics and Services Command Reference.
Table 47 on page 213 provides an example of jnxOperatingEntry objects in the
jnxOperatingTable of a T640 router.
Table 47: jnxOperatingEntry Objects in the jnxOperatingTable of a T640
Router
Index L1 L2 L
3 Description State Temp CPU S
IR DRAM Buffer Heap UpTime LastRestart Memory
1 1 0 0 Midplane Running 0 – – – – – – – –
2 2 0 0 PEM 1 Running 29 – – – – – – – –
4 1 1 0 Top left Running 0 – – – – – – – –
front fan
4 1 2 0 Top left Running 0 – – – – – – – –
middle fan
4 1 3 0 Top left Running 0 0 0 0 0 0 0 0:0:00:00.00 0
rear fan
4 1 4 0 Top right Running 0 0 0 0 0 0 0 0:0:00:00.00 0
front fan
4 1 5 0 Top right Running 0 0 0 0 0 0 0 0:0:00:00.00 0
middle fan
4 1 6 0 Top right Running 0 0 0 0 0 0 0 0:0:00:00.00 0
rear fan
4 2 1 0 Bottom left Running 0 0 0 0 0 0 0 0:0:00:00.00 0
front fan
4 2 2 0 Bottom left Running 0 0 0 0 0 0 0 0:0:00:00.00 0
middle fan
4 2 3 0 Bottom left Running 0 0 0 0 0 0 0 0:0:00:00.00 0
rear fan
Copyright © 2010, Juniper Networks, Inc. 213
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 47: jnxOperatingEntry Objects in the jnxOperatingTable of a T640
Router (continued)
Index L1 L2 L
3 Description State Temp CPU S
IR DRAM Buffer Heap UpTime LastRestart Memory
4 2 4 0 Bottom Running 0 0 0 0 0 0 0 0:0:00:00.00 0
right front
fan
4 2 5 0 Bottom Running 0 0 0 0 0 0 0 0:0:00:00.00 0
right middle
fan
4 3 1 0 Bottom Running 0 0 0 0 0 0 0 0:0:00:00.00 0
right rear
fan
4 3 1 0 Bottom Running 0 0 0 0 0 0 0 0:0:00:00.00 0
blower
4 3 2 0 Bottom Running 0 0 0 0 0 0 0 0:0:00:00.00 0
blower
4 3 3 0 Middle Running 0 0 0 0 0 0 0 0:0:00:00.00 0
blower
4 3 4 0 Top blower Running 0 0 0 0 0 0 0 0:0:00:00.00 0
4 3 5 0 Second Running 0 0 0 0 0 0 0 0:0:00:00.00 0
blower
from top
7 2 0 0 FPC @ Running 0 1 0 512 41 3 138367 0:18:56:48.81 512
1/*/*
7 2 1 0 FPC @ Running 35 0 0 0 0 0 0 0:18:56:48.81 0
1/0/* top
temperature
sensor
7 2 2 0 FPC @ 1/1/* Running 32 0 0 0 0 0 0 0:18:56:48.81 0
bottom
temperature
sensor
7 6 0 0 FPC @ Running 0 3 0 256 41 14 136976 0:18:57:02.71 256
5/*/*
7 6 1 0 FPC @ Running 44 0 0 0 0 0 0 0:18:57:02.71 0
5/0/* top
temperature
sensor
214 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 47: jnxOperatingEntry Objects in the jnxOperatingTable of a T640
Router (continued)
Index L1 L2 L
3 Description State Temp CPU S
IR DRAM Buffer Heap UpTime LastRestart Memory
7 6 2 0 FPC @ Running 33 0 0 0 0 0 0 0:18:57:02.71 0
5/1/*
bottom
temperature
sensor
7 8 0 0 FPC @ Running 0 2 0 256 41 7 137963 0:18:56:52.85 256
7/*/*
7 8 1 0 FPC @ Running 38 0 0 0 0 0 0 0:18:56:52.85 0
7/0/* top
temperature
sensor
7 8 2 0 FPC @ Running 33 0 0 0 0 0 0 0:18:56:52.85 0
7/1/*
bottom
temperature
sensor
9 1 0 0 Host 0 Running 35 0 0 2048 0 0 6963005 0:19:20:30.07 2048
9 2 0 0 Host 1 Standby 32 2 0 2048 0 0 24401100 2:19:46:51.00 2048
10 1 0 0 FPM Running 30 0 0 0 0 0 0 0:0:00:00.00 0
11 1 0 0 SCG 0 Running 36 0 0 0 0 0 0 0:0:00:00.00 0
11 2 0 0 SCG 1 Standby 35 0 0 0 0 0 0 0:0:00:00.00 0
12 1 0 0 CB 0 Running 36 0 0 0 0 0 0 0:0:00:00.00 0
12 2 0 0 CB 1 Standby 39 0 0 0 0 0 0 0:0:00:00.00 0
14 1 0 0 SPMB 0 Running 36 1 0 128 40 0 142576 0:18:56:06.72 128
14 2 0 0 SPMB 1 Standby 39 0 0 128 40 0 142447 0:18:56:08.01 128
15 1 0 0 SIB 0 Unknown 40 0 0 0 0 0 0 0:0:00:00.00 0
15 2 0 0 SIB 1 Unknown 39 0 0 0 0 0 0 0:0:00:00.00 0
15 3 0 0 SIB 2 Unknown 39 0 0 0 0 0 0 0:0:00:00.00 0
15 4 0 0 SIB 3 Unknown 40 0 0 0 0 0 0 0:0:00:00.00 0
15 5 0 0 SIB 4 Unknown 40 0 0 0 0 0 0 0:0:00:00.00 0
Copyright © 2010, Juniper Networks, Inc. 215
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 48 on page 216 provides an example of jnxOperatingEntry objects in the
jnxOperatingTable of a T320 router.
Table 48: jnxOperatingEntry Objects in the jnxOperatingTable of a T320
Router
Index L1 L2 L3 Description State Temp CPU ISR DRAM Buffer Heap UpTime LastRestart Memory
1 1 0 0 Midplane Running 0 0 0 0 0 0 0 (0) 0
0:00:00.00
2 1 0 0 PEM 0 Running 0 0 0 0 0 0 0 (0) 0
0:00:00.00
4 1 1 0 Top left Running 0 0 0 0 0 0 0 (0) 0
front fan 0:00:00.00
4 1 2 0 Top left Running 0 0 0 0 0 0 0 (0) 0
middle fan 0:00:00.00
4 1 3 0 Top left Running 0 0 0 0 0 0 0 (0) 0
rear fan 0:00:00.00
4 1 4 0 Top right Running 0 0 0 0 0 0 0 (0) 0
front fan 0:00:00.00
4 1 5 0 Top right Running 0 0 0 0 0 0 0 (0) 0
middle fan 0:00:00.00
4 2 6 0 Top right Running 0 0 0 0 0 0 0 (0) 0
rear fan 0:00:00.00
4 2 1 0 Bottom left Running 0 0 0 0 0 0 0 (0) 0
front fan 0:00:00.00
4 2 2 0 Bottom left Running 0 0 0 0 0 0 0 (0) 0
middle fan 0:00:00.00
4 2 3 0 Bottom left Running 0 0 0 0 0 0 0 (0) 0
rear fan 0:00:00.00
4 2 4 0 Bottom Running 0 0 0 0 0 0 0 (0) 0
right front 0:00:00.00
fan
4 2 5 0 Bottom Running 0 0 0 0 0 0 0 (0) 0
right 0:00:00.00
middle fan
4 2 6 0 Bottom Running 0 0 0 0 0 0 0 (0) 0
right rear 0:00:00.00
fan
216 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 48: jnxOperatingEntry Objects in the jnxOperatingTable of a T320
Router (continued)
Index L1 L2 L3 Description State Temp CPU ISR DRAM Buffer Heap UpTime LastRestart Memory
4 3 1 0 Rear tray Running 0 0 0 0 0 0 0 (0) 0
top fan 0:00:00.00
4 3 2 0 Rear tray Running 0 0 0 0 0 0 0 (0) 0
second fan 0:00:00.00
4 3 3 0 Rear tray Running 0 0 0 0 0 0 0 (0) 0
middle fan 0:00:00.00
4 3 4 0 Rear tray Running 0 0 0 0 0 0 0 (0) 0
fourth fan 0:00:00.00
4 3 5 0 Rear tray Running 0 0 0 0 0 0 0 (0) 0
bottom fan 0:00:00.00
7 4 0 0 FPC @ Running 0 1 0 256 41 7 6568428 (26190949) 256
3/*/* 3 days,
0:45:09.49
7 4 1 0 FPC @ Running 41 0 0 0 0 0 0 (26190949) 0
3/0/* top 3 days,
temperature 0:45:09.49
sensor
7 4 2 0 FPC @ Running 37 0 0 0 0 0 0 (26190949) 0
3/1/* 3 days,
bottom 0:45:09.49
temperature
sensor
9 1 0 0 Host 0 Running 34 1 0 2048 0 0 32763001 (32763004) 2048
3 days,
19:00:30.04
9 2 0 0 Host 1 Standby 32 1 0 2048 0 0 110271900 (110271900) 2048
12 days,
18:18:39.00
10 1 0 0 FPM Running 30 0 0 0 0 0 0 (0) 0
0:00:00.00
11 1 0 0 SCG 0 Running 33 0 0 0 0 0 0 (0) 0
0:00:00.00
11 2 0 0 SCG 1 Standby 31 0 0 0 0 0 0 (0) 0
0:00:00.00
12 1 0 0 CB 0 Running 37 0 0 0 0 0 0 (0) 0
0:00:00.00
Copyright © 2010, Juniper Networks, Inc. 217
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 48: jnxOperatingEntry Objects in the jnxOperatingTable of a T320
Router (continued)
Index L1 L2 L3 Description State Temp CPU ISR DRAM Buffer Heap UpTime LastRestart Memory
12 2 0 0 CB 1 Standby 34 0 0 0 0 0 0 (0) 0
0:00:00.00
14 1 0 0 SPMB 0 Running 36 0 0 128 40 0 6572381 (26186997) 128
3 days,
0:44:29.97
14 2 0 0 SPMB 1 Standby 36 1 0 128 40 0 6572465 (26186913) 3 128
days,
0:44:29.13
15 1 0 0 SIB 0 Standby 36 0 0 0 0 0 0 (0) 0
0:00:00.00
15 2 0 0 SIB 1 Running 36 0 0 0 0 0 0 (0) 0
0:00:00.00
15 3 0 0 SIB 2 Running 38 0 0 0 0 0 0 (0) 0
0:00:00.00
jnxRedundancyTable
The object identifier for the jnxRedundancyTable is {jnxBoxAnatomy 14}. This object shows
the internal configuration settings for the redundant subsystems or components in the
chassis.
Entries within the jnxRedundancyTable are represented by the jnxRedundancyEntry object,
whose object identifier is {jnxRedundancyEntry 1}. This jnxRedundancyEntry contains the
following objects, which describe the internal configuration settings for the redundant
subsystems or components in the chassis:
• jnxRedundancyContentsIndex—The index value of an entry in jnxRedundancyEntry,
whose object identifier is {jnxContainersEntry 1}.
• jnxRedundancyL1Index—The level-one index associated with the redundant component,
whose object identifier is {jnxContainersEntry 2}.
• jnxRedundancyL2Index—The level-two index associated with the redundant component,
whose object identifier is {jnxContainersEntry 3}.
• jnxRedundancyL3Index—The level-three index associated with the redundant
component, whose object identifier is {jnxContainersEntry 4}.
• jnxRedundancyDescr—The description of the redundant component, whose object
identifier is {jnxContainersEntry 5}.
• jnxRedundancyConfig—The election priority of redundancy configuration, whose object
identifier is {jnxContainersEntry 6}.
218 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
• jnxRedundancyState—The current running state of the redundant component, whose
object identifier is {jnxContainersEntry 7}.
• jnxRedundancySwitchoverCount—The total number of switchovers, defined as a change
in the jnxRedundancyState from master to backup or vice versa, as perceived by the
redundant component since the Routing Engine is up and running, whose object
identifier is {jnxContainersEntry 8}.
• jnxRedundancySwitchoverTime—The value of sysUpTime when the jnxRedundancyState
was last switched over from master to backup or vice versa, whose object identifier is
{jnxContainersEntry 9}.
• jnxRedundancySwitchoverReason—The reason for the last switchover to the redundant
component, whose object identifier is {jnxContainersEntry 10}.
• jnxKeepaliveHeartbeat—The period of sending keepalive messages between the master
and the backup subsystem, which is a system-wide preset value in seconds used by
internal mastership resolution, whose object identifier is {jnxContainersEntry 11}.
• jnxRedundancyKeepaliveTimeout—The timeout period in seconds used by the watchdog
timer before it initiates a switchover to the backup subsystem, whose object identifier
is {jnxContainersEntry 12}.
• jnxRedundancyKeepaliveElapsed—The elapsed time since the redundant component
received the last keepalive message from the outer subsystems, whose object identifier
is {jnxContainersEntry 13}.
• jnxRedundancyKeepaliveLoss—The total number of keepalive messages lost between
the master and the backup subsystems as perceived by the redundant component
since the Routing Engine is up and running, whose object identifier is {jnxContainersEntry
14}.
Table 49 on page 220 through Table 51 on page 222 provide examples of jnxRedundancyEntry
objects. The following column headings for each table are abbreviated to correspond to
the parts of the jnxOperatingTable objects:
• Contents index—jnxRedundancyContentsIndex
• L1—jnxRedundancyL1Index
• L2—jnxRedundancyL2Index
• L3—jnxRedundancyL3Index
• Description—jnxRedundancyDescr
• Config—jnxRedundancyConfig
• State—jnxRedundancyState
• Count—jnxRedundancySwitchoverCount
• Time—jnxRedundancySwitchoverTime
• Reason—jnxRedundancySwitchoverReason
• Heartbeat—jnxKeepaliveHeartbeat
Copyright © 2010, Juniper Networks, Inc. 219
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Timeout—jnxRedundancyKeepaliveTimeout
• Elapsed—jnxRedundancyKeepaliveElapsed
• Loss—jnxRedundancyKeepaliveLoss
Table 49 on page 220 provides an example of jnxRedundancyEntry objects in the
jnxRedundancyTable of an M20 router.
Table 49: jnxRedundancyEntry Objects in the jnxRedundancyTable of an
M20 Router
Heart Time
Index L1 L2 L3 Description Config State Count Time Reason beat out Elapsed Loss
6 1 0 0 SSB 0 Master Master 0 3383 Never 0 0 0 0
Internet switched
Processor II
6 2 0 0 SSB 1 Disabled Disabled 0 0 Never 0 0 0 0
switched
9 1 0 0 Routing Master Master 1 421 User 3 300 1 0
Engine 0 switched
9 2 0 0 Routing Backup Backup 0 0 Other 0 0 0 0
Engine 1
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M20 router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
Temperature 26 degrees C / 78 degrees F
DRAM 768 Mbytes
CPU utilization:
User 2 percent
Background 0 percent
Kernel 0 percent
Interrupt 0 percent
Idle 98 percent
Model teknor
Serial ID 32000004f8ff1201
Start time 2002-01-29 12:30:42 PST
Uptime 21 hours, 17 minutes, 14 seconds
Load averages: 1 minute 5 minute 15 minute
0.03 0.02 0.00
Routing Engine status:
Slot 1:
Current state Backup
Election priority Backup (default)
DRAM 805306368 Mbytes
CPU utilization:
User 0 percent
Background 0 percent
220 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Kernel 1 percent
Interrupt 0 percent
Idle 99 percent
Model teknor
Serial ID 100000078c10df01
Start time 2002-01-24 16:47:39 PST
Uptime 5 days, 17 hours, 14 seconds
To verify SSB status, use the show chassis ssb command. Sample command output from
an M20 router is as follows:
user@host> show chassis ssb
SSB status:
Slot 0 information:
State Master
Temperature 24 degrees C / 75 degrees F
CPU utilization 2 percent
Interrupt utilization 0 percent
Heap utilization 16 percent
Buffer utilization 43 percent
Total CPU DRAM 64 Mbytes
Internet Processor II Version 1, Foundry IBM, Part number 9
Start time: 2002-01-29 12:32:24 PST
Uptime: 21 hours, 30 minutes, 53 seconds
Slot 1 information:
State Backup
Table 50 on page 221 provides an example of jnxRedundancyEntry objects in the
jnxRedundancyTable of a T640 router.
Table 50: jnxRedundancyEntry Objects in the jnxRedundancyTable of a
T640 Router
Heart Time
Index L1 L2 L3 Description Config State Count Time Reason beat out Elapsed Loss
9 1 0 0 Host 0 Master Master 3 0:18:55:49.42 User 20 300 1 0
switched
9 2 0 0 Host 1 Backup Backup 0 0:0:00:00.00 Other 0 0 0 0
15 1 0 0 SIB 0 Unknown Backup 1 0:0:00:00.00 0 0 0 0 0
15 2 0 0 SIB 1 Unknown Master 1 0:0:00:00.00 0 0 0 0 0
15 3 0 0 SIB 2 Unknown Master 1 0:0:00:00.00 0 0 0 0 0
15 4 0 0 SIB 3 Unknown Master 1 0:0:00:00.00 0 0 0 0 0
15 5 0 0 SIB 4 Unknown Master 1 0:0:00:00.00 0 0 0 0 0
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from a T640 router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Copyright © 2010, Juniper Networks, Inc. 221
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Current state Master
Election priority Master (default)
Temperature 35 degrees C / 95 degrees F
DRAM 2048 MB
CPU utilization:
User 1 percent
Background 0 percent
Kernel 5 percent
Interrupt 0 percent
Idle 94 percent
Model unknown
Start time 2002-03-31 14:26:49 PST
Uptime 19 hours, 22 minutes, 13 seconds
Load averages: 1 minute 5 minute 15 minute
0.00 0.00 0.00
Routing Engine status:
Slot 1:
Current state Backup
Election priority Backup (default)
Temperature 32 degrees C / 89 degrees F
DRAM 2048 MB
CPU utilization:
User 0 percent
Background 0 percent
Kernel 0 percent
Interrupt 0 percent
Idle 100 percent
Model RE-3.0
Start time 2002-03-29 14:00:18 PST
Uptime 2 days, 19 hours, 48 minutes, 32 seconds
Table 51 on page 222 provides an example of jnxRedundancyEntry objects in the
jnxRedundancyTable of a T320 router.
Table 51: jnxRedundancyEntry Objects in the jnxRedundancyTable of a T320 Router
Heart
Index L1 L2 L3 Description Config State Count Time Reason beat Timeout Elapsed Loss
9 1 0 0 Host 0 Master Master 6 (26185188)3 User 20 300 1 0
days, switched
0:44:11.88
9 2 0 0 Host 1 Backup Backup 0 (0) Other 0 0 0 0
0:00:00.00
15 1 0 0 SIB 0 Backup Backup 1 (0) 0 0 0 0 0
0:00:00.00
15 2 0 0 SIB 1 Master Master 1 (0) 0 0 0 0 0
0:00:00.00
15 3 0 0 SIB 2 Master Master 1 (0) 0 0 0 0 0
0:00:00.00
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from a T320 router is as follows:
222 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
Temperature 34 degrees C / 93 degrees F
DRAM 2048 MB
CPU utilization:
User 0 percent
Background 0 percent
Kernel 1 percent
Interrupt 0 percent
Idle 98 percent
Model RE-3.0
Start time 2002-04-05 14:43:16 PST
Uptime 17 days, 23 hours, 3 minutes, 47
seconds
Load averages: 1 minute 5 minute 15 minute
0.00 0.00 0.00
Routing Engine status:
Slot 1:
Current state Backup
Election priority Backup (default)
Temperature 32 degrees C / 89 degrees F
DRAM 2048 MB
CPU utilization:
User 0 percent
Background 0 percent
Kernel 0 percent
Interrupt 0 percent
Idle 100 percent
Model RE-3.0
Start time 2002-03-27 15:25:07 PST
Uptime 26 days, 22 hours, 21 minutes, 44 seconds
jnxFruTable
The object identifier for the jnxFruTable is {jnxBoxAnatomy 15}. This object shows the
status of field-replaceable units (FRUs) in the chassis.
Entries within the jnxFruTable are represented by the jnxFruEntry object, whose object
identifier is {jnxFruEntry 1}. This jnxFruEntry object contains the following objects, which
describe the FRUs in the chassis:
• jnxFruContentsIndex—The index value of an entry in jnxFruEntry, whose object identifier
is {jnxFruEntry 1}.
• jnxFruL1Index—The level-one index associated with the FRU, whose object identifier
is {jnxFruEntry 2}.
• jnxFruL2Index—The level-two index associated with the FRU, whose object identifier
is {jnxFruEntry 3}.
• jnxFruL3Index—The level-three index associated with the FRU, whose object identifier
is {jnxFruEntry 4}.
• jnxFruName—The name or detailed description of the FRU, whose object identifier is
{jnxFruEntry 5}.
Copyright © 2010, Juniper Networks, Inc. 223
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxFruType—The FRU type, whose object identifier is {jnxFruEntry 6}. The FRU type is
represented by one of the following values:
• other(1)
• clockGenerator(2)
• flexiblePicConcentrator(3)
• switchingAndForwardingModule(4)
• controlBoard(5)
• routingEngine(6)
• powerEntryModule(7)
• frontPanelModule(8)
• switchInterfaceBoard(9)
• processorMezzanineBoardForSIB(10)
• portInterfaceCard(11)
• craftInterfacePanel(12)
• fan(13)
• lineCardChassis(14)
• forwardingEngineBoard(13)
• protectedSystemDomain(13)
• jnxFruSlot—The slot number of the FRU, whose object identifier is {jnxFruEntry 7}. This
is equivalent to jnxFruL1Index. The slot number is zero if unavailable or inapplicable.
• jnxFruState—The current state of the FRU, whose object identifier is {jnxFruEntry 8}.
The FRU state can be any of the following:
• unknown(1)
• empty(2)
• present(3)
• ready(4)
• announceOnline(5)
• online(6)
• announceOffline(7)
• offline(8)
224 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
• diagnostic(9)
• standby(10)
• jnxFruTemp—The temperature of the FRU, in degrees Celsius, whose object identifier
is {jnxFruEntry 9}. The value is zero if unavailable or inapplicable.
• jnxFruOfflineReason—The reason the FRU is offline, whose object identifier is
{jnxFruEntry 10}. The reason is represented by the following values:
• unknown(1)—Unknown or other
• none(2)—None
• error(3)—Error
• noPower(4)—No power
• configPowerOff(5)—Configured to power off
• configHoldInReset(6)—Configured to hold in reset
• cliCommand(7)—Brought offline by a command-line interface (CLI) command
• buttonPress(8)—Brought offline by button press
• cliRestart(9)—Restarted by CLI command
• overtempShutdown(10)—Overtemperature shutdown
• masterClockDown(11)—Master clock down
• singleSfmModeChange(12)—Single SFM mode change
• packetSchedulingModeChange(13)—Packet scheduling mode change
• physicalRemoval(14)—Physical removal
• unresponsiveRestart(15)—Restarting unresponsive board
• sonetClockAbsent(16)—SONET out clock absent
• jnxFruLastPowerOff—The value of sysUpTime when this subject was last powered off,
whose object identifier is {jnxFruEntry 11}. The value is zero if unavailable or inapplicable.
• jnxFruLastPowerOn—The value of sysUpTime when this subject was last powered on,
whose object identifier is {jnxFruEntry 12}. The value is zero if unavailable or inapplicable.
• jnxFruPowerUpTime—The time interval in 10-millisecond periods that this subject has
been up and running since the last power-on time, whose object identifier is {jnxFruEntry
13}. The value is zero if unavailable or inapplicable.
• jnxFruChassisId—The chassis type of this subject. The object identifier for this object
is {jnxFruEntry 14}.
Copyright © 2010, Juniper Networks, Inc. 225
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxFruChassisDescr—The textual description for the chassis type of this subject. The
object identifier is {jnxFruEntry 15}.
• jnxFruPsdAssignment—The protected system domain (PSD) assignment for this subject.
The object identifier is {jnxFruEntry 16}
Table 52 on page 226 through Table 57 on page 250 provide examples of jnxFruEntry objects.
The following column headings for each table are abbreviated to correspond to the parts
of the jnxFruEntry objects:
• Contents Index—jnxFruContentsIndex
• L1—jnxFruL1Index
• L2—jnxFruL2Index
• L3—jnxFruL3Index
• Name—jnxFruName
• Type—jnxFruType
• Slot—jnxFruSlot
• State—jnxFruState
• Temp—jnxFruTemp
• Offline—jnxFruOffline
• PowerOff—jnxFruPowerOff
• PowerOn—jnxFruPowerOn
• Uptime—jnxFruPowerUpTime
Table 52 on page 226 provides an example of jnxFruContent objects in the jnxFruTable for
an M10 router.
Table 52: jnxFruContents Objects in the jnxFruTable of an M10 Router
Index L1 L2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 Power powerEntryModule 1 Online 0 None 0:0:00:00.00 0:0:11:08.73 264319
supply A
2 2 0 0 Power powerEntryModule 2 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
supply B
4 1 1 0 Left fan 1 fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
4 1 2 0 Left fan 2 fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
4 1 3 0 Left fan 3 fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
4 1 4 0 Left fan 4 fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
226 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 52: jnxFruContents Objects in the jnxFruTable of an M10
Router (continued)
Index L1 L2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
6 1 0 0 FEB controlBoard 1 Online 24 None 0:0:00:00.00 0:0:00:00.00 0
Internet
Processor
II
7 1 0 0 FPC @ flexiblePicConcentrator 1 Online 24 None 0:0:00:00.00 0:0:00:00.00 0
0/*/*
7 2 0 0 FPC @ flexiblePicConcentrator 2 Online 24 None 0:0:00:00.00 0:0:00:00.00 0
1/*/*
8 1 1 0 PIC: @ portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
0/0/*
8 1 2 0 PIC: 1x portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
Monitor
@ 0/1/*
8 1 3 0 PIC: 1x portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
OC-12
ATM, MM
@ 0/2/*
8 1 4 0 PIC: 4x portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
T3 @
0/3/*
8 2 1 0 PIC: 4x portInterfaceCard 2 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
SONET,
SMIR @
1/0/*
8 2 2 0 PIC: 4x portInterfaceCard 2 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
SONET,
MM @
1/1/*
8 2 3 0 PIC: 2x portInterfaceCard 2 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
ATM, MM
@ 1/2/*
8 2 4 0 PIC: 2x portInterfaceCard 2 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
ATM, MM
@ 1/3/*
9 1 0 0 Routing routingEngine 1 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
Engine
Copyright © 2010, Juniper Networks, Inc. 227
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from an M10 router is as follows:.
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis 58974 M10
Midplane REV 03 710-001950 HB1590
Power Supply A Rev 03 740-002498 LK33505 DC
Display REV 04 710-001995 HE8442
Routing Engine REV 01 740-003239 9001025728 RE-2.0
FEB REV 12 710-001948 HA4221 Internet Processor II
FPC 0
PIC 1 REV 01 750-004188 AR2912 1x Monitor
PIC 2 REV 04 750-001551 AN7869 1x OC-12 ATM, MM
PIC 3 REV 02 750-002485 AN2803 4x T3
FPC 1
PIC 0 REV 03 750-002970 HF2293 4x OC-3 SONET, SMIR
PIC 1 REV 03 750-002971 HA8094 4x OC-3 SONET, MM
PIC 2 REV 03 750-002977 HD9352 2x OC-3 ATM, MM
PIC 3 REV 03 750-002977 HD9393 2x OC-3 ATM, MM
To verify FPC status, use the show chassis fpc command. Sample command output from
an M10 router is as follows:
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Online 24 3 1 64 44 17
1 Online 24 3 1 64 44 17
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M10 router as follows:
user@host> show chassis routing-engine
Routing Engine status:
Temperature 26 degrees C / 78 degrees F
DRAM 768 MB
Memory utilization 9 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 0 percent
Interrupt 0 percent
Idle 100 percent
Model RE-2.0
Serial ID b7000007c81ce801
Start time 2002-06-21 09:33:45 PDT
Uptime 3 days, 1 hour, 23 minutes, 27 seconds
Load averages: 1 minute 5 minute 15 minute
0.07 0.03 0.01
To verify FEB status, use the show chassis feb command. Sample command output from
an M10 router as follows:
user@host> show chassis feb
FEB status:
Temperature 24 degrees C / 75 degrees F
CPU utilization 3 percent
Interrupt utilization 1 percent
Heap utilization 17 percent
228 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Buffer utilization 44 percent
Total CPU DRAM 64 MB
Internet Processor II Version 1, Foundry IBM, Part number 9
Start time: 2002-06-21 09:45:46 PDT
Uptime: 3 days, 1 hour, 11 minutes, 33 seconds
Table 53 on page 229 provides an example of jnxFruContent objects in the jnxFruTable for
an M20 router.
Table 53: JnxFruContents Objects in the jnxFruTable of an M20 Router
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 Power powerEntryModule 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
supply A
2 2 0 0 Power powerEntryModule 2 Online 25 None 0:0:00:00.00 0:0:00:43.45 24993357
supply B
4 1 0 0 Rear fan fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
4 2 0 0 Front upper fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
fan
4 3 0 0 Front fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
middle fan
4 4 0 0 Front fan 4 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
bottom fan
6 1 0 0 SSB 0 controlBoard 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
6 2 0 0 SSB 1 controlBoard 2 Online 29 None 0:0:00:00.00 0:0:00:00.00 0
Internet
Processor I
7 1 0 0 FPC @ flexible 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/*/* PicConcentrator
7 2 0 0 FPC @ flexible 2 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
1/*/* PicConcentrator-
7 3 0 0 FPC @ flexible 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/*/* PicConcentrator
7 4 0 0 FPC @ flexible 4 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
3/*/* PicConcentrator
8 1 1 0 PIC: @ portInterfaceCard 1 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
0/0/*
8 1 2 0 PIC: @ portInterfaceCard 1 Offline 28 None 0:0:00:00.00 0:0:00:00.00 0
0/1/*
Copyright © 2010, Juniper Networks, Inc. 229
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 53: JnxFruContents Objects in the jnxFruTable of an M20
Router (continued)
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 1 3 0 PIC: @ portInterfaceCard 1 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
0/2/*
8 1 4 0 PIC: @ portInterfaceCard 1 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
0/3/*
8 2 1 0 PIC: 1x portInterfaceCard 2 Ready 0 None 0:0:00:00.00 0:0:00:00.00 0
Tunnel @
1/0/*
8 2 2 0 PIC: 4x T3 portInterfaceCard 2 Ready 0 None 0:0:00:00.00 0:0:00:00.00 0
@ 1/1/*
8 2 3 0 PIC: 2x portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
OC-3 ATM,
MM @ 1/2/*
8 2 4 0 PIC: 1x G/E, portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
1000Base-SX
@ 1/3/*
8 3 1 0 PIC: @ portInterfaceCard 3 Offline 27 None 0:0:00:00.00 0:0:00:00.00 0
2/0/*
8 3 2 0 PIC: @ 2/1/* portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
8 3 3 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/2/*
8 3 4 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/3/*
8 4 1 0 PIC: @ portInterfaceCard 4 Ready 0 None 0:0:00:00.00 0:0:00:00.00 0
3/0/*
8 4 2 0 PIC: @ portInterfaceCard 4 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
3/1/*
8 4 3 0 PIC: 2x portInterfaceCard 4 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
SONET,
SMIR @
3/2/*
8 4 4 0 PIC: @ portInterfaceCard 4 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
3/3/*
9 1 0 0 Routing routingEngine 1 Online 25 None 0:0:00:00.00 0:0:00:00.00 0
Engine 0
230 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 53: JnxFruContents Objects in the jnxFruTable of an M20
Router (continued)
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
9 2 0 0 Routing routingEngine 2 Online 24 None 0:0:00:00.00 0:0:00:00.00 0
Engine 1
10 1 0 0 Front panel frontPanelModule 1 Online 0 None 0:0:00:00.00 0:0:00:00.00 0
display
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from an M20 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis 20200 M20
Backplane REV 07 710-001517 AB5911
Power Supply B Rev 02 7 000240 AC
Display REV 04 710-001519 AD1903
Routing Engine 0 REV01 740 umeshk RE-2.0
Routing Engine 1 270000078ba48501 RE-2.0
SSB slot 0 N/A N/A N/A backup
SSB slot 1 REV 04 710-001411 AD0281 Internet Processor I
FPC 1 REV 01 710-001292 AC9230
PIC 0 REV 01 750-001323 AA2812 1x Tunnel
PIC 1 REV 01 750-002963 AK8586 4x T3
PIC 2 REV 03 750-000612 AM8116 2x OC-3 ATM, MM
PIC 3 REV 08 750-001072 AB9884 1x G/E, 1000 BASE-SX
FPC 3 REV 01 710-001197 AA8661
PIC 2 REV 01 750-003748 HE9734 2x OC-3 SONET, SMIR
user@host> show chassis environment
Class Item Status Measurement
Power Power Supply A Absent
Power Supply B OK 25 degrees C / 77 degrees F
Temp FPC 1 OK 27 degrees C / 80 degrees F
FPC 3 OK 28 degrees C / 82 degrees F
SSB 1 OK 29 degrees C / 84 degrees F
Backplane OK 23 degrees C / 73 degrees F
Routing Engine 0 OK 25 degrees C / 77 degrees F
Routing Engine 1 OK 24 degrees C / 75 degrees F
Fans Rear Fan OK Spinning at normal speed
Front Upper Fan OK Spinning at normal speed
Front Middle Fan OK Spinning at normal speed
Front Bottom Fan OK Spinning at normal speed
Misc Craft Interface OK
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Empty 0 0 0 0 0 0
1 Online 27 8 7 8 9 14
2 Empty 0 0 0 0 0 0
3 Online 28 0 0 8 8 14
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M10 router is as follows:
Copyright © 2010, Juniper Networks, Inc. 231
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
Temperature 25 degrees C / 77 degrees F
DRAM 768 MB
Memory utilization 8 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 1 percent
Interrupt 0 percent
Idle 99 percent
Model RE-2.0
Serial ID ba0000061779d601
Start time 2002-06-21 15:37:36 PDT
Uptime 2 days, 21 hours, 27 minutes, 25 seconds
Load averages: 1 minute 5 minute 15 minute
0.00 0.00 0.00
Routing Engine status:
Slot 1:
Current state Backup
Election priority Backup (default)
Temperature 24 degrees C / 75 degrees F
DRAM 768 MB
Memory utilization 9 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 0 percent
Interrupt 0 percent
Idle 99 percent
Model RE-2.0
Serial ID 270000078ba48501
Start time 2002-06-17 14:30:21 PDT
Uptime 6 days, 22 hours, 34 minutes, 28 seconds
To verify SSB status, use the show chassis SSB command. Sample command output
from an M10 router is as follows:
user@host> show chassis ssb
SSB status:
Slot 0 information:
State Backup
Slot 1 information:
State Master
Temperature 29 degrees C / 84 degrees F
CPU utilization 1 percent
Interrupt utilization 0 percent
Heap utilization 8 percent
Buffer utilization 43 percent
Total CPU DRAM 64 MB
Internet Processor I Version 1, Foundry IBM, Part number 3
Start time: 2002-06-21 15:38:53 PDT
Uptime: 2 days, 21 hours, 26 minutes, 26 seconds
Table 54 on page 233 provides an example of jnxFruContent objects in the jnxFruTable for
an M160 router.
232 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 54: jnxFruContents Objects in the jnxFruTable of an M160 Router
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 PEM 0 powerEntryModule 1 Online 0 None 0:00:00.00 0:00:12.83 6906955
2 2 0 0 PEM 1 powerEntryModule 2 Online 0 None 0:00:00.00 0:00:12.83 6906955
4 1 0 0 Front top fan 1 Present 0 None 0:00:00.00 0:00:00.00 0
blower
4 2 1 0 Fan tray fan 2 Present 0 None 0:00:00.00 0:00:00.00 0
front left
4 2 2 0 Fan tray fan 2 Present 0 None 0:00:00.00 0:00:00.00 0
front
right
4 2 3 0 Fan tray fan 2 Present 0 None 0:00:00.00 0:00:00.00 0
rear left
4 2 4 0 Fan tray fan 2 Present 0 None 0:00:00.00 0:00:00.00 0
rear right
4 3 0 0 Rear top fan 3 Present 0 None 0:00:00.00 0:00:00.00 0
blower
4 4 0 0 Rear fan 4 Present 0 None 0:00:00.00 0:00:00.00 0
bottom
blower
6 1 1 0 SFM 0 switchingAnd- 1 Online 35 None 0:00:03.13 0:00:00.00 0
SPP ForwardingMode
6 1 2 0 SFM 0 switchingAnd 1 Online 35 None 0:00:03.13 0:00:00.00 0
SPR ForwardingMode
Internet
Processor
II
6 2 1 0 SFM 1 switchingAnd 2 Empty 0 None 0:00:00.00 0:00:00.00 0
SPP ForwardingMode
6 2 2 0 SFM 1 switchingAndFor 2 Empty 0 None 0:00:00.00 0:00:00.00 0
SPR wardingMode
6 3 1 0 SFM 2 switchingAnd 3 Online 44 None 0:00:03.20 0:00:00.00 0
SPP ForwardingMode
6 3 2 0 SFM 2 switchingAnd 3 Online 44 None 0:00:03.20 0:00:00.00 0
SPR ForwardingMode
Internet
Processor
II
Copyright © 2010, Juniper Networks, Inc. 233
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 54: jnxFruContents Objects in the jnxFruTable of an M160
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
6 4 1 0 SFM 3 switchingAnd 4 Offline 0 Confg
i -ured 0:00:03.22 0:00:00.00 0
SPP ForwardingMode to
power
off
6 4 2 0 SFM 3 switchingAnd 4 Offline 0 Confg
i -ured 0:00:03.22 0:00:00.00 0
SPR ForwardingMode to
power
off
7 1 0 0 FPC @ flexiblePic 1 Offline 0 Confg
i -ured 0:00:02.28 0:00:00.00 0
0/*/* Concentrator to
power
off
7 2 0 0 FPC @ flexiblePic 2 Offline 0 Error 0:13:08.12 0:00:00.00 0
1/*/* Concentrator
7 3 0 0 FPC @ flexiblePic 3 Online 30 None 0:00:02.32 0:00:00.00 0
2/*/* Concentrator
7 4 0 0 FPC: 1x flexiblePic 4 Online 41 None 0:00:02.34 0:00:00.00 0
OC-192 Concentrator
SM LR @
3/*/*
7 5 0 0 FPC @ flexiblePic 5 Empty 0 None 0:00:00.00 0:00:00.00 0
4/*/* Concentrator
7 6 0 0 FPC @ flexiblePic 6 Offline 0 Config 0:00:02.37 0:00:00.00 0
5/*/* Concentrator ured
to
power
off
7 7 0 0 FPC @ flexiblePic 7 Empty 0 None 0:00:00.00 0:00:00.00 0
6/*/* Concentrator
7 8 0 0 FPC @ flexiblePic 8 Online 41 None 0:00:03.11 0:00:00.00 0
7/*/* Concentrator
8 1 1 0 PIC: @ portInterfaceCard 1 Online 40 None 0:00:00.00 0:00:00.00 0
0/0/*
8 1 2 0 PIC: @ portInterface Card 1 Online 40 None 0:00:00.00 0:00:00.00 0
0/1/*
8 1 3 0 PIC: @ portInterfaceCard 1 Online 40 None 0:00:00.00 0:00:00.00 0
0/2/*
234 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 54: jnxFruContents Objects in the jnxFruTable of an M160
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 1 4 0 PIC: @ portInterfaceCard 1 Online 40 None 0:00:00.00 0:00:00.00 0
0/3/*
8 2 1 0 PIC: @ portInterfaceCard 2 Online 46 None 0:00:00.00 0:00:00.00 0
1/0/*
8 2 2 0 PIC: @ portInterfaceCard 2 Online 46 None 0:00:00.00 0:00:00.00 0
1/1/*
8 2 3 0 PIC: @ portInterfaceCard 2 Online 46 None 0:00:00.00 0:00:00.00 0
1/2/*
8 2 4 0 PIC: @ portInterfaceCard 2 Online 46 None 0:00:00.00 0:00:00.00 0
1/3/*
8 3 1 0 PIC: @ portInterfaceCard 3 Offline 0 Config- 0:00:02.28 0:00:00.00 0
2/0/* ured
to
power
off
8 3 2 0 PIC: @ portInterfaceCard 3 Offline 0 Config- 0:00:02.28 0:00:00.00 0
2/1/* ured
to
power
off
8 3 3 0 PIC: @ portInterfaceCard 3 Offline 0 Config 0:00:02.28 0:00:00.00 0
2/2/* ured
to
power
off
8 3 4 0 PIC: @ portInterfaceCard 3 Offline 0 Config- 0:00:02.28 0:00:00.00 0
2/3/* ured
to
power
off
8 4 1 0 PIC: 1x portInterfaceCard 4 Offline 0 Error 0:13:08.12 0:00:00.00 0
OC-192
SM LR @
3/0/*
8 4 2 0 PIC portInterfaceCard 4 Offline 0 Error 0:13:08.12 0:00:00.00 0
continued
8 4 3 0 PIC portInterfaceCard 4 Offline 0 Error 0:13:08.12 0:00:00.00 0
continued
Copyright © 2010, Juniper Networks, Inc. 235
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 54: jnxFruContents Objects in the jnxFruTable of an M160
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 4 4 0 PIC portInterfaceCard 4 Offline 0 Error 0:13:08.12 0:00:00.00 0
continued
8 5 1 0 PIC: @ portInterfaceCard 5 Online 30 None 0:00:02.32 0:00:00.00 0
4/0/*
8 5 2 0 PIC: @ portInterfaceCard 5 Online 30 None 0:00:02.32 0:00:00.00 0
4/1/*
8 5 3 0 PIC: @ portInterfaceCard 5 Online 30 None 0:00:02.32 0:00:00.00 0
4/2/*
8 5 4 0 PIC: @ portInterfaceCard 5 Online 30 None 0:00:02.32 0:00:00.00 0
4/3/*
8 6 1 0 PIC: @ portInterfaceCard 6 Online 41 None 0:00:02.34 0:00:00.00 0
5/0/*
8 6 2 0 PIC: @ portInterfaceCard 6 Online 41 None 0:00:02.34 0:00:00.00 0
5/1/*
8 6 3 0 PIC: @ portInterfaceCard 6 Online 41 None 0:00:02.34 0:00:00.00 0
5/2/*
8 6 4 0 PIC: @ portInterfaceCard 6 Online 41 None 0:00:02.34 0:00:00.00 0
5/3/*
8 7 1 0 PIC: @ portInterfaceCard 7 Empty 0 None 0:00:00.00 0:00:00.00 0
6/0/*
8 7 2 0 PIC: @ portInterfaceCard 7 Empty 0 None 0:00:00.00 0:00:00.00 0
6/1/*
8 7 3 0 PIC: @ portInterfaceCard 7 Empty 0 None 0:00:00.00 0:00:00.00 0
6/2/* (11)
8 7 4 0 PIC: @ portInterfaceCard 7 Empty 0 None 0:00:00.00 0:00:00.00 0
6/3/* (11)
8 8 1 0 PIC: 1x portInterfaceCard 8 Offline 0 Config- 0:00:02.37 0:00:00.00 0
OC-12 ured
SONET, to
SMIR @ power
7/0/* off
8 8 2 0 PIC: 4x portInterfaceCard 8 Offline 0 Config- 0:00:02.37 0:00:00.00 0
E3 @ ured
7/1/* to
power
off
236 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 54: jnxFruContents Objects in the jnxFruTable of an M160
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 8 3 0 PIC: 1x portInterfaceCard 8 Offline 0 Config- 0:00:02.37 0:00:00.00 0
OC-12 ured
SONET, to
MM @ power
7/2/* off
jnxFruName
8 8 4 0 PIC: @ portInterfaceCard 8 Offline 0 Config- 0:00:02.37 0:00:00.00 0
7/3/* ured
to
power
off
9 1 0 0 Routing routingEngine 1 Online 31 None 0:00:00.00 0:00:00.00 0
Engine 0
9 2 0 0 Routing routingEngine 2 Present 0 None 0:00:00.00 0:00:00.00 0
Engine 1
10 1 1 0 FPM frontPanelModule 1 Online 28 None 0:00:00.00 0:00:00.00 0
CMB
10 1 2 0 FPM frontPanelModule 1 Online 28 None 0:00:00.00 0:00:00.00 0
Display
11 1 0 0 PCG 0 clockGenerator 1 Online 40 None 0:00:00.00 0:00:00.00 0
11 2 0 0 PCG 1 clockGenerator 2 Online 46 None 0:00:00.00 0:00:00.00 0
12 1 0 0 MCS 0 controlBoard 1 Online 47 None 0:00:00.00 0:00:00.00 0
12 2 0 0 MCS 1 controlBoard 2 Empty 0 None 0:00:00.00 0:00:00.00 0
13 1 0 0 CIP craftInterfacePanel- 1 Present 0 None 0:00:00.00 0:00:00.00 0
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from an M160 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis 47 M160
Midplane REV 02 710-001245 AB4113
FPM CMB REV 01 710-001642 AA9721
FPM Display REV 01 710-001647 AA2995
CIP REV 02 710-001593 AA9886
PEM 0 Rev 01 740-001243 KJ35782 DC
PEM 1 Rev 01 740-001243 kj35756 DC
PCG 0 REV 01 710-001568 AA9796
Copyright © 2010, Juniper Networks, Inc. 237
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
PCG 1 REV 01 710-001568 AA9895
Routing Engine 0 REV01 740-003239 AARCHOO RE-2.0
Routing Engine 1
MCS 0 REV 03 710-001226 AA9779
SFM 0 SPP REV 07 710-001228 AE5504
SFM 0 SPR REV 03 710-002189 AE4707 Internet Processor II
SFM 2 SPP REV 06 710-001228 AB3133
SFM 2 SPR REV 01 710-002189 AB2941 Internet Processor II
SFM 3 SPP REV 07 710-001228 AV3167
SFM 3 SPR REV 04 710-002189 AV3439 Internet Processor II
FPC 0 REV 02 710-001611 AA9518 FPC Type 2
CPU REV 02 710-001217 AA9572
FPC 1 REV 03 710-001255 AA9812 FPC Type 1
CPU
FPC 2 REV 02 710-001611 AA9527 FPC Type 2
CPU REV 02 710-001217 AA9592
FPC 3 REV 01 710-003061 HB2029 FPC Type OC192
CPU REV 05 710-001217 AF5950
PIC 0 REV 01 750-003063 HB2029 1x OC-192 SM LR
FPC 5 REV 01 710-001255 AA2914 FPC Type 1
CPU REV 02 710-001217 AA2893
FPC 7 REV 03 710-001255 AA9809 FPC Type 1
CPU REV 02 710-001217 AA9573
PIC 0 REV 04 750-000613 AA0374 1x OC-12 SONET, SMIR
PIC 1 REV 02 750-E3-PIC AC1903 4x E3
PIC 2 REV 02 750-001020 AA8944 1x OC-12 SONET, MM
To verify FPC status, use the show chassis fpc command. Sample command output from
an M160 router is as follows:
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Announce offline 0 0 0 0 0 0
1 Present 0 0 0 0 0 0
2 Online 32 4 0 32 1 39
3 Online 44 1 0 32 1 40
4 Empty 0 0 0 0 0 0
5 Offline --- Chassis connection dropped ---
6 Empty 0 0 0 0 0 0
7 Online 42 4 0 32 1 40
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M160 router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
Temperature 35 degrees C / 95 degrees F
DRAM 768 MB
Memory utilization 10 percent
CPU utilization:
User 1 percent
Background 0 percent
Kernel 10 percent
Interrupt 3 percent
Idle 87 percent
Model RE-2.0
Serial ID 0c000004f8d26401
238 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Start time 2002-06-14 14:39:03 PDT
Uptime 11 minutes, 46 seconds
Load averages: 1 minute 5 minute 15 minute
0.18 0.19 0.14
Routing Engine status:
Slot 1:
Current state Present
To verify SFM status, use the show chassis sfm command. Sample command output
from an M160 router is as follows:
user@host> show chassis sfm
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Online 35 1 0 64 16 46
1 Empty 0 0 0 0 0 0
2 Online 47 1 0 64 16 45
3 Online 50 1 0 64 16 45
Packet scheduling mode : Disabled
Table 55 on page 239 provides an example of jnxFruContent objects in the jnxFruTable for
an M40 router.
Table 55: jnxFruContents Objects in the jnxFruTable of an M40 Router
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 Power powerEntryModule 1 Online 0 None 0:0:00:00.00 0:0:00:00.00 101974
supply A
2 2 0 0 Power powerEntryModule 2 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
supply B
3 1 0 0 Top fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
impeller
3 2 0 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
impeller
4 1 0 0 Rear left fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
fan
4 2 0 0 Rear fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
center
fan
4 3 0 0 Rear right fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
fan
5 1 0 0 Host routingEngine 1 Online 37 None 0:0:00:00.00 0:0:00:00.00 0
controller
6 1 0 0 SCB controlBoard 1 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
Internet
Processor
I
Copyright © 2010, Juniper Networks, Inc. 239
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 55: jnxFruContents Objects in the jnxFruTable of an M40
Router (continued)
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
7 1 0 0 FPC @ flexiblePic 1 Online 28 None 0:0:00:00.00 0:0:00:00.00 0
0/*/* Concentrator
7 2 0 0 FPC @ flexible 2 Online 29 None 0:0:00:00.00 0:0:00:00.00 0
1/*/* PicConcentrator
7 3 0 0 FPC @ flexible 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/*/* PicConcentrator
7 4 0 0 FPC @ flexiblePic 4 Online 24 None 0:0:00:00.00 0:0:00:00.00 0
3/*/* Concentrator
7 5 0 0 FPC @ flexiblePic 5 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
4/*/* Concentrator
7 6 0 0 FPC @ flexiblePic 6 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
5/*/* Concentrator
7 7 0 0 FPC: 1x flexiblePic 7 Online 28 None 0:0:00:00.00 0:0:00:00.00 0
OC-48 Concentrator
SONET,
SMIR @
6/*/*
7 8 0 0 FPC @ flexible 8 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
7/*/* PicConcentrator
8 1 1 0 PIC: 1x portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
G/E,
1000Base-SX
@ 0/0/*
8 1 2 0 PIC: 1x portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
Tunnel @
0/1/*
8 1 3 0 PIC: 4x T1, portInterfaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
RJ48 @
0/2/*
8 1 4 0 PIC: 1x portIntefaceCard 1 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
COC12,
SMIR @
0/3/*
8 2 1 0 PIC: 2x portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
ATM, MM
@ 1/0/*
240 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 55: jnxFruContents Objects in the jnxFruTable of an M40
Router (continued)
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 2 2 0 PIC: 4x portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
OC-3
SONET,
MM @
1/1/*
8 2 3 0 PIC: 2x T3 portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
@ 1/2/*
8 2 4 0 PIC: 1x portInterfaceCard 2 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
CSTM1,
SMIR @
1/3/*
8 3 1 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/0/*
8 3 2 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/1/*
8 3 3 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/2/*
8 3 4 0 PIC: @ portInterfaceCard 3 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
2/3/*
8 4 1 0 PIC: @ portInterfaceCard 4 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
3/0/*
8 4 2 0 PIC: 4x portInterfaceCard 4 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
F/E, 100
BASE-TX
@ 3/1/*
8 4 3 0 PIC: 1x portInterfaceCard 4 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
800M
Crypto @
3/2/*
8 4 4 0 PIC: 1x portInterfaceCard 4 Ready 24 None 0:0:00:00.00 0:0:00:00.00 0
CT3-NxDS0
@ 3/3/*
8 5 1 0 PIC: @ portInterfaceCard 5 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
4/0/*
8 5 2 0 PIC: @ portInterfaceCard 5 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
4/1/*
Copyright © 2010, Juniper Networks, Inc. 241
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 55: jnxFruContents Objects in the jnxFruTable of an M40
Router (continued)
Index L1 L
2 L3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 5 3 0 PIC: @ portInterfaceCard 5 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
4/2/*
8 5 4 0 PIC: @ flexible 5 Ready 27 None 0:0:00:00.00 0:0:00:00.00 0
4/3/* PicConcentrator
8 6 1 0 PIC: @ portInterfaceCard 6 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
5/0/*
8 6 2 0 PIC: @ portInterfaceCard 6 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
5/1/*
8 6 3 0 PIC: @ portInterfaceCard 6 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
5/2/*
8 6 4 0 PIC: @ portInterfaceCard 6 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
5/3/*
8 7 1 0 PIC: 1x portInterfaceCard 7 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
OC-48
SONET,
SMIR @
6/0/*
8 7 2 0 PIC portInterfaceCard 7 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
continued
8 7 3 0 PIC portInterfaceCard 7 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
continued
8 7 4 0 PIC portInterfaceCard 7 Ready 28 None 0:0:00:00.00 0:0:00:00.00 0
continued
8 8 1 0 PIC: @ portInterfaceCard 8 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
7/0/*
8 8 2 0 PIC: @ portInterfaceCard 8 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
7/1/*
8 8 3 0 PIC: @ portInterfaceCard 8 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
7/2/*
8 8 4 0 PIC: @ portInterfaceCard 8 Offline 0 None 0:0:00:00.00 0:0:00:00.00 0
7/3/*
9 1 0 0 Routing routingEngine 1 Online 0 None 0:0:00:00.00 0:0:00:00.00 0
Engine
242 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from an M40 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis
Backplane REV 03 710-000073 AA2005
Power Supply A Rev A 740-000235 000119 DC
Maxicab REV 04 710-000229 AA0691
Minicab REV 02 710-000482 AA0270
Display REV 06 710-000150 AA1042
Routing Engine RE-1.0
SCB REV 07 710-000075 AA1033 Internet Processor I
FPC 0 REV 01 710-001292 AB8159
PIC 0 REV 08 750-001072 AP5525 1x G/E, 1000 BASE-SX
PIC 1 REV 01 750-001323 AB1645 1x Tunnel
PIC 2 REV 01 750-002953 AD9083 4x T1, RJ48
PIC 3 REV 03 750-001190 AE2907 1x COC12, SMIR
FPC 1 REV 10 710-000175 AA7219
PIC 0 REV 03 750-002977 HD9331 2x OC-3 ATM, MM
PIC 1 REV 04 750-002971 HC8020 4x OC-3 SONET, MM
PIC 2 REV 02.1 710-000608 AA1592 2x T3
PIC 3 REV 05 750-003248 AD9648 1x CSTM1, SMIR
FPC 3 REV 10 710-000175 AA4782
PIC 1 REV 04 750-002992 HC3974 4x F/E, 100 BASE-TX
PIC 2 REV 03 750-003844 AY4806 1x 800M Crypto
PIC 3 REV 03 750-004743 BD9433 1x CT3-NxDS0
FPC 4 REV 01 710-001292 AC5265
FPC 6 REV 01 710-001292 AB7485
PIC 0 REV 03 750-000617 AA4566 1x OC-48 SONET, SMIR
user@host> show chassis environment
Class Item Status Measurement
Power Power Supply A OK
Power Supply B Absent
Temp FPC 0 OK 28 degrees C / 82 degrees F
FPC 1 OK 29 degrees C / 84 degrees F
FPC 3 OK 24 degrees C / 75 degrees F
FPC 4 OK 27 degrees C / 80 degrees F
FPC 6 OK 28 degrees C / 82 degrees F
SCB OK 27 degrees C / 80 degrees F
Backplane @ A1 OK 30 degrees C / 86 degrees F
Backplane @ A2 OK 26 degrees C / 78 degrees F
Routing Engine OK 37 degrees C / 98 degrees F
Fans Top Impeller OK Spinning at normal speed
Bottom impeller OK Spinning at normal speed
Rear Left Fan OK Spinning at normal speed
Rear Center Fan OK Spinning at normal speed
Rear Right Fan OK Spinning at normal speed
Misc Craft Interface OK
To verify FPC status, use the show chassis fpc command. Sample command output from
an M40 router is as follows:
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Online 28 2 0 8 11 14
1 Online 29 7 0 8 21 14
2 Empty 0 0 0 0 0 0
Copyright © 2010, Juniper Networks, Inc. 243
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
3 Online 24 17 0 8 22 15
4 Online 27 1 0 8 6 13
5 Empty 0 0 0 0 0 0
6 Online 28 1 0 8 7 15
7 Empty 0 0 0 0 0 0
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M40 router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Temperature 37 degrees C / 98 degrees F
DRAM 256 MB
Memory utilization 19 percent
CPU utilization:
User 1 percent
Background 0 percent
Kernel 3 percent
Interrupt 1 percent
Idle 96 percent
Model RE-1.0
Start time 2002-06-24 17:28:30 UTC
Uptime 20 minutes, 30 seconds
Load averages: 1 minute 5 minute 15 minute
0.00 0.04 0.11
To verify SCB status, use the show chassis scb command. Sample command output from
an M40 router is as follows:
user@host> show chassis scb
SCB status:
Temperature 27 degrees C / 80 degrees F
CPU utilization 3 percent
Interrupt utilization 0 percent
Heap utilization 9 percent
Buffer utilization 44 percent
Total CPU DRAM 64 MB
Internet Processor I Version 1, Foundry IBM, Part number 3
Start time: 2002-06-24 17:30:10 UTC
Uptime: 19 minutes, 8 seconds
Table 56 on page 244 provides an example of jnxFruContent objects in the jnxFruTable for
an M40e router.
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e Router
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 PEM 0 powerEntryModule 1 Present 0 None 0:0:00:00.00 0:0:00:25.99 208927
2 2 0 PEM 1 powerEntryModule 2 Online 0 None 0:0:00:00.00 0:0:00:25.99 208928
4 1 0 0 Front top fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
4 2 1 0 Fan tray fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
front left
244 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e
Router (continued)
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
4 2 2 0 Fan tray fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
front right
4 2 3 0 Fan tray fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
rear left
4 2 4 0 Fan tray fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
rear right
4 3 0 0 Rear top fan 3 Present None 0:0:00:00.00 0:0:00:00.00 0
blower
4 4 0 0 Rear fan 4 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
bottom
blower
6 1 1 0 SFM 0 switchingAnd 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
SPP ForwardingModule
6 1 2 0 SFM 0 switchingAnd 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
SPR ForwardingModule
6 2 1 0 SFM 1 switchingAnd 2 Online 42 None 0:0:00:21.95 0:0:00:00.00 0
SPP ForwardingModule
6 2 2 0 SFM 1 switchingAnd 2 Online 42 None 0:0:00:21.95 0:0:00:00.00 0
SPR ForwardingModule
Internet
Processor
II
7 1 0 0 FPC @ flexiblePic 1 Online 41 None 0:0:00:21.85 0:0:00:00.00 0
0/*/* Concentrator
7 2 0 0 FPC @ flexible 2 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
1/*/* PicConcentrator
7 3 0 0 FPC @ flexible 3 Online 43 None 0:0:00:21.87 0:0:00:00.00 0
2/*/* PicConcentrator
7 4 0 0 FPC @ flexible 4 Online 38 None 0:0:00:21.89 0:0:00:00.00 0
3/*/* PicConcentrator
7 5 0 0 FPC @ flexiblePic 5 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
4/*/* Concentrator
7 6 0 0 FPC @ flexiblePic 6 Online 46 None 0:0:00:21.91 0:0:00:00.00 0
5/*/* Concentrator
Copyright © 2010, Juniper Networks, Inc. 245
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e
Router (continued)
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
7 7 0 0 FPC @ flexiblePic 7 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
6/*/* Concentrator
7 8 0 0 FPC @ flexiblePic 8 Online 44 None 0:0:00:21.93 0:0:00:00.00 0
7/*/* Concentrator
8 1 1 0 PIC: @ portInterfaceCard 1 Online 45 None 0:0:00:00.00 0:0:00:00.00 0
0/0/*
8 1 2 0 PIC: 1x portInterfaceCard 1 Online 45 None 0:0:00:00.00 0:0:00:00.00 0
OC-12
SONET,
MM @
0/1/*
8 1 3 0 PIC: 4x portInterfaceCard 1 Online 45 None 0:0:00:00.00 0:0:00:00.00 0
CT3 @
0/2/*
8 1 4 0 PIC: 1x portInterfaceCard 1 Online 45 None 0:0:00:00.00 0:0:00:00.00 0
Multi
Link(32)
@ 0/3/*
8 2 1 0 PIC: @ portInterface- Card 2 Online 50 None 0:0:00:00.00 0:0:00:00.00 0
1/0/*
8 2 2 0 PIC: @ portInterfaceCard 2 Online 50 None 0:0:00:00.00 0:0:00:00.00 0
1/1/*
8 2 3 0 PIC: @ portInterfaceCard 2 Online 50 None 0:0:00:00.00 0:0:00:00.00 0
1/2/*
8 2 4 0 PIC: @ portInterfaceCard 2 Online 50 None 0:0:00:00.00 0:0:00:00.00 0
1/3/*
8 3 1 0 PIC: 1x portInterfaceCard 3 Online 41 None 0:0:00:00.00 0:0:00:00.00 0
OC-12
SONET,
MM @
2/0/*
8 3 2 0 PIC: 1x portInterfaceCard 3 Online 41 None 0:0:00:21.85 0:0:00:00.00 0
OC-12
SONET,
MM @
2/1/*
246 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e
Router (continued)
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 3 3 0 PIC: 1x portInterfaceCard 3 Online 41 – 0:0:00:21.85 0:0:00:00.00 –
OC-12
SONET,
MM @
2/2/*
8 3 4 0 PIC: @ portInterfaceCard 3 Online 41 – 0:0:00:21.85 0:0:00:00.00 –
2/3/*
8 4 1 0 PIC: 1x portInterfaceCard 4 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
OC-48
SONET,
SMIR @
3/0/*
8 4 2 0 PIC: @ portInterfaceCard 4 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
3/1/*
8 4 3 0 PIC: @ portInterfaceCard 4 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
3/2/*
8 4 4 0 PIC: @ portInterfaceCard 4 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
3/3/*
8 5 1 0 PIC: @ portInterfaceCard 5 Online 43 – 0:0:00:21.87 0:0:00:00.00 0
4/0/*
8 5 2 0 PIC: @ portInterfaceCard 5 Online 43 – 0:0:00:21.87 0:0:00:00.00 0
4/1/*
8 5 3 0 PIC: @ portInterfaceCard 5 Online 43 – 0:0:00:21.87 0:0:00:00.00 0
4/2/*
8 5 4 0 PIC: @ portInterfaceCard 5 Online 43 – 0:0:00:21.87 0:0:00:00.00 0
4/3/*
8 6 1 0 PIC: @ portInterfaceCard 6 Online 38 – 0:0:00:21.89 0:0:00:00.00 0
5/0/*
8 6 2 0 PIC: @ portInterfaceCard 6 Online 38 – 0:0:00:21.89 0:0:00:00.00 0
5/1/*
8 6 3 0 PIC: 1x portInterfaceCard 6 Online 38 – 0:0:00:21.89 0:0:00:00.00 0
OC-12
SONET,
SMIR @
5/2/*
Copyright © 2010, Juniper Networks, Inc. 247
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e
Router (continued)
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 6 4 0 PIC: 1x portInterfaceCard 6 Online 38 – 0:0:00:21.89 0:0:00:00.00 0
OC-12
SONET,
MM @
5/3/*
8 7 1 0 PIC: @ portInterfaceCard 7 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
6/0/*
8 7 2 0 PIC: @ portInterfaceCard 7 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
6/1/*
8 7 3 0 PIC: @ portInterfaceCard 7 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
6/2/*
8 7 4 0 PIC: @ portInterfaceCard 7 Empty 0 – 0:0:00:00.00 0:0:00:00.00 0
6/3/*
8 8 1 0 PIC: 8x portInterfaceCard 8 Online 46 – 0:0:00:21.91 0:0:00:00.00 0
FE-FX,
100
BASE-FX
@ 7/0/*
8 8 2 0 PIC: @ portInterfaceCard 8 Online 46 – 0:0:00:21.91 0:0:00:00.00 0
7/1/*
8 8 3 0 PIC: 1x portInterfaceCard 8 Online 46 – 0:0:00:21.91 0:0:00:00.00 0
Link
Service(4)
@ 7/2/*
8 8 4 0 PIC: @ portInterfaceCard 1 Online 46 – 0:0:00:00.00 0:0:00:00.00 0
7/3/*
9 1 0 0 Routing routingEngine 2 Online 46 – 0:0:00:00.00 0:0:00:00.00 0
Engine 0
9 2 0 0 Routing routingEngine 1 Present 34 – 0:0:00:00.00 0:0:00:00.00 0
Engine 1
10 1 1 0 FPM CMB frontPanelModule 1 Online 28 – 0:0:00:00.00 0:0:00:00.00 0
10 1 2 0 FPM frontPanelModule 1 Online 28 – 0:0:00:00.00 0:0:00:00.00 0
Display
11 1 0 0 PCG 0 clockGenerator 1 Online 45 – 0:0:00:00.00 0:0:00:00.00 0
11 2 0 0 PCG 1 clockGenerator 2 Online 50 – 0:0:00:00.00 0:0:00:00.00 0
248 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 56: JnxFruContents Objects in the jnxFruTable of an M40e
Router (continued)
Index L1 L
2 3
L Name Type Slot State Temp Offline PowerOff PowerOn Uptime
12 1 0 0 MCS 0 controlBoard 1 Online 46 – 0:0:00:00.00 0:0:00:00.00 0
12 2 0 0 MCS 1 controlBoard 2 Online 0 – 0:0:00:00.00 0:0:00:00.00 0
13 1 0 0 CIP craftInterfacePanel 1 Present 0 – 0:0:00:00.00 0:0:00:00.00 0
To verify L1, L2, and L3 indexes, use the following commands (M40e example):
user@host> show chassis hardware
Item Version Part number Serial number Description
Chassis 19084 M40e
Midplane REV 01 710-005071 AX3654
FPM CMB REV 03 710-001642 AR9037
FPM Display REV 03 710-001647 AP1334
CIP REV 08 710-001593 AE8486
PEM 0 Rev 01 740-003787 ME13120 Power Entry Module
PEM 1 Rev 01 740-003787 MC25354 Power Entry Module
PCG 0 REV 07 710-001568 AG1377
PCG 1 REV 07 710-001568 AR3806
Routing Engine 0 REV 04 740-003239 9001026568 RE-2.0
Routing Engine 1
MCS 0 REV 11 710-001226 AN5810
MCS 1 REV 11 710-001226 AR0109
SFM 1 SPP REV 07 710-001228 BE0106
SFM 1 SPR REV 05 710-002189 BE0062 Internet Processor II
FPC 0 REV 01 710-005078 BE0642 M40e-FPC Type 1
CPU REV 01 710-004600 BD2496
PIC 1 REV 04 750-001895 HE0885 1x OC-12 SONET, MM
PIC 2 REV 06 750-003009 HE1422 4x CT3
PIC 3 REV 03 750-003837 AP7134 1x Multi Link(32)
FPC 2 REV 01 710-005078 BE0647 M40e-FPC Type 1
CPU REV 01 710-004600 AN4299
PIC 0 REV 04 750-001895 HD2623 1x OC-12 SONET, MM
PIC 1 REV 04 750-001895 HE0609 1x OC-12 SONET, MM
PIC 2 REV 04 750-001895 HE0871 1x OC-12 SONET, MM
FPC 3 REV 01 710-005197 BD9846 M40e-FPC Type 2
CPU REV 01 710-004600 BD2364
PIC 0 REV 01 750-001900 AA9649 1x OC-48 SONET, SMIR
FPC 5 REV 01 710-005078 BE0639 M40e-FPC Type 1
CPU REV 01 710-004600 BD2587
PIC 2 REV 04 750-001896 AV4480 1x OC-12 SONET, SMIR
PIC 3 REV 04 750-001895 HE1000 1x OC-12 SONET, MM
FPC 7 REV 01 710-005196 BD9456 M40e-FPC
CPU REV 01 710-004600 AN4323
PIC 0 REV 01 750-004944 AY4645 8x FE-FX, 100 BASE-FX
PIC 2 REV 01 750-007927 AP1919 1x Link Service(4)
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from an M40e router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Copyright © 2010, Juniper Networks, Inc. 249
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Election priority Master (default)
Temperature 34 degrees C / 93 degrees F
DRAM 768 MB
Memory utilization 9 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 2 percent
Interrupt 0 percent
Idle 97 percent
Model RE-2.0
Serial ID 9c000007c8644701
Start time 2002-06-24 10:33:41 PDT
Uptime 31 minutes, 7 seconds
Load averages: 1 minute 5 minute 15 minute
0.01 0.02 0.00
Routing Engine status:
Slot 1:
Current state Present
To verify FPC status, use the show chassis fpc command. Sample command output from
an M40e router is as follows:
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Online 41 4 0 32 3 40
1 Empty 0 0 0 0 0 0
2 Online 43 4 0 32 1 40
3 Online 38 1 0 32 1 40
4 Empty 0 0 0 0 0 0
5 Online 46 4 0 32 1 40
6 Empty 0 0 0 0 0 0
7 Online 44 4 0 32 2 39
Table 57 on page 250 provides an example of jnxFruContent objects in the jnxFruTable for
a T640 router.
Table 57: jnxFruContents Objects in the jnxFruTable of a T640 Router
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
2 1 0 0 PEM 0 power 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
EntryModule
2 2 0 0 PEM 1 power 2 Online 27 None 0:0:00:00.00 0:0:00:00.00 217044
EntryModule
4 1 1 0 Top left fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
front
fan
4 1 2 0 Top left fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
middle
fan
4 1 3 0 Top left fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
rear fan
250 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
4 1 4 0 Top fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
front
fan
4 1 5 0 Top fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
middle
fan
4 1 6 0 Top fan 1 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
rear fan
4 2 1 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
left
front
fan
4 2 2 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
left
middle
fan
4 2 3 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
left rear
fan
4 2 4 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
front
fan
4 2 5 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
middle
fan
4 2 6 0 Bottom fan 2 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
right
rear fan
4 3 1 0 Fourth fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
from
top
4 3 2 0 Bottom fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
Copyright © 2010, Juniper Networks, Inc. 251
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
4 3 3 0 Middle fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
4 3 4 0 Top fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
4 3 5 0 Second fan 3 Present 0 None 0:0:00:00.00 0:0:00:00.00 0
blower
from
top
7 1 0 0 FPC @ flexiblePic 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/*/* Concentrator
7 1 1 0 FPC @ flexiblePic 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/0/* Concentrator
top
temperature
sensor
7 1 2 0 FPC @ flexiblePic 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/1/* Concentrator
bottom
temperature
sensor
7 2 0 0 FPC @ flexiblePic 2 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
1/*/* Concentrator
7 2 1 0 FPC @ flexiblePic 2 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
1/0/* Concentrator
top
temperature
sensor
7 2 2 0 FPC @ flexiblePic 2 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
1/1/* Concentrator
bottom
temperature
sensor
7 3 0 0 FPC @ flexiblePic 3 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
2/*/* Concentrator
7 3 1 0 FPC @ flexiblePic 3 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
2/0/* Concentrator
top
temperaturesensor
252 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
7 3 2 0 FPC @ flexiblePic 3 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
2/1/* Concentrator
bottom
temperature
sensor
7 4 0 0 FPC @ flexiblePic 4 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
3/*/* Concentrator
7 4 1 0 FPC @ flexiblePic 4 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
3/0/* Concentrator
top
temperature
sensor
7 4 2 0 FPC @ flexiblePic 4 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
3/1/* Concentrator
bottom
temperature
sensor
7 5 9 0 FPC @ flexiblePic 5 Online 36 None 0:0:00:01.98 0:0:00:00.00 0
4/*/* Concentrator
7 5 1 0 FPC @ flexiblePic 5 Online 36 None 0:0:00:01.98 0:0:00:00.00 0
4/0/* Concentrator
top
temperature
sensor
7 5 2 0 FPC @ flexiblePic 5 Online 36 None 0:0:00:01.98 0:0:00:00.00 0
4/1/* Concentrator
bottom
temperature
sensor
7 6 0 0 FPC @ flexiblePic 6 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
5/*/* Concentrator
7 6 1 0 FPC @ flexiblePic 6 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
5/0/* Concentrator
top
temperature
sensor
7 6 2 0 FPC @ flexiblePic 6 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
5/1/* Concentrator
bottom
temperature
sensor
Copyright © 2010, Juniper Networks, Inc. 253
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
7 7 0 0 FPC @ flexiblePic 7 Online 30 None 0:0:00:02.05 0:0:00:00.00 0
6/*/* Concentrator
7 7 1 0 FPC @ flexiblePic 7 Online 30 None 0:0:00:02.05 0:0:00:00.00 0
6/0/* Concentrator
top
temperature
sensor
7 7 2 0 FPC @ flexiblePicConcentrator 7 Online 30 None 0:0:00:02.05 0:0:00:00.00 0
6/1/*
bottom
temperature
sensor
7 8 0 0 FPC @ flexiblePic 8 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
7/*/* Concentrator
7 8 1 0 FPC @ flexiblePic 8 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
7/0/* Concentrator
top
temperature
sensor
7 8 2 0 FPC @ flexiblePic 8 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
7/1/* Concentrator
bottom
temperature
sensor
8 1 1 0 PIC: @ portInterface- 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/0/* Card
8 1 2 0 PIC: @ portInterface- 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/1/* Card
8 1 3 0 PIC: @ portInterface- 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/2/* Card
8 1 4 0 PIC: @ portInterface- 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
0/3/* Card
8 2 1 0 PIC: 1x portInterface- 2 Online None 0:0:00:00.00 0:0:00:00.00 0
OC-48 Card
SONET,
SMIR @
1/0/*
254 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 2 2 0 PIC: 1x portInterface- 2 Online 36 None 0:0:00:00.00 0:0:00:00.00 0
OC-48 Card
SONET,
SMSR
@ 1/1/*
8 2 3 0 PIC: 1x portInterface- 2 Online 36 None 0:0:00:00.00 0:0:00:00.00 0
OC-48 Card
SONET,
SMIR @
1/2/*
8 2 4 0 PIC: 1x portInterface- 2 Online 36 None 0:0:00:00.00 0:0:00:00.00 0
OC-48 Card
SONET,
SMIR @
1/3/*
8 3 1 0 PIC: @ portInterface- 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/0/* Card
8 3 2 0 PIC: @ portInterface- 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/1/* Card
8 3 3 0 PIC: @ portInterface- 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/2/* Card
8 3 4 0 PIC: @ portInterface- 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
2/3/* Card
8 4 1 0 PIC: @ portInterface- 4 Online None 0:0:00:01.00 0:0:00:00.00 0
3/0/* Card
8 4 2 0 PIC: @ portInterface- 4 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
3/1/* Card
8 4 3 0 PIC: @ portInterface- 4 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
3/2/* Card
8 4 4 0 PIC: @ portInterface- 4 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
3/3/* Card
8 5 1 0 PIC: 1x portInterface- 5 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
Tunnel Card
@
4/0/*
Copyright © 2010, Juniper Networks, Inc. 255
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 5 2 0 PIC: 1x portInterface- 5 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
OC-192 Card
SM SR2
@ 4/1/*
8 5 3 0 PIC: 4x portInterface- 5 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
OC-48 Card
SONET,
SMSR
@ 4/2/*
8 5 4 0 PIC: 1x portInterface- 5 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
OC-192 Card
SM SR1
@ 4/3/*
8 6 1 0 PIC: @ portInterface- 6 Empty 0 None 0:0:00:01.00 0:0:00:00.00 0
5/0/* Card
8 6 2 0 PIC: @ portInterface- 6 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
5/1/* Card
8 6 3 0 PIC: @ portInterface- 6 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
5/2/* Card
8 6 4 0 PIC: @ portInterface- 6 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
5/3/* Card
8 7 1 0 PIC: @ portInterface- 7 Online 30 None 0:0:00:00.00 0:0:00:00.00 0
6/0/* Card
8 7 2 0 PIC: @ portInterface- 7 Online 30 None 0:0:00:01.98 0:0:00:00.00 0
6/1/* Card
8 7 3 0 PIC: @ portInterface- 7 Online 30 None 0:0:00:01.98 0:0:00:00.00 0
6/2/* Card
8 7 4 0 PIC: @ portInterface- 7 Online 30 None 0:0:00:01.98 0:0:00:00.00 0
6/3/* Card
8 8 1 0 PIC: @ portInterface- 8 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
7/0/* Card
8 8 2 0 PIC: @ portInterface- 8 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
7/1/* Card
8 8 3 0 PIC: @ portInterface- 8 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
7/2/* Card
256 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
8 8 4 0 PIC: @ portInterface- 8 Offline 0 Error 0:0:12:51.28 0:0:00:00.00 0
7/3/* Card
9 1 0 0 Routing routing- 1 Online 34 None 0:0:00:00.00 0:0:00:00.00 0
Engine Engine
0
9 2 0 0 Routing routing- 2 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
Engine 1 Engine
10 1 1 0 FPM frontPanel- 1 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
GBUS Module
10 1 2 0 FPM frontPanel- 1 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
Display Module
11 1 0 0 SCG 0 clockGener 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
ator
11 2 0 0 SCG 1 clockGener 2 Online 27 None 0:0:00:00.00 0:0:00:00.00 0
ator
12 1 0 0 CB 0 control- 1 Online 27 None 0:0:00:01.94 0:0:00:00.00 0
Board
12 2 0 0 CB 1 control- 2 Unknown 0 None 0:0:00:01.96 0:0:00:00.00 0
Board
13 1 0 0 CIP craftInter- 1 Present 36 None 0:0:00:00.00 0:0:00:00.00 0
facePanel
14 1 0 0 SPMB 0 processor 1 Online 34 None 0:0:00:00.00 0:0:00:00.00 0
Mezzanine
BoardForSIB
14 2 0 0 SPMB 1 processor 2 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
Mezzanine
BoardForSIB
15 1 0 0 SIB 0 switchInter- 1 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
faceBoard
15 2 0 0 SIB 1 switchInter- 2 Online 36 None 0:0:00:00.00 0:0:00:00.00 0
faceBoard
15 3 0 0 SIB 2 switchInter- 3 Empty 0 None 0:0:00:00.00 0:0:00:00.00 0
faceBoard
Copyright © 2010, Juniper Networks, Inc. 257
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 57: jnxFruContents Objects in the jnxFruTable of a T640
Router (continued)
Index L1 L
2 L
3 Name Type Slot State Temp Offline PowerOff PowerOn Uptime
15 4 0 0 SIB 3 switchInter- 4 Online 30 None 0:0:00:01.94 0:0:00:00.00 0
faceBoard
15 5 0 0 SIB 4 switchInter- 5 Online 30 None 0:0:00:01.96 0:0:00:00.00 0
faceBoard
To verify the L1, L2, and L3 indexes, use the show chassis hardware command. Sample
command output from a T640 router is as follows:
user@host> show chassis hardware
Hardware inventory:
Item Version Part number Serial number Description
Chassis 1234 T640
Midplane REV 04 710-002726 AX5603
FPM GBUS REV 02 710-002901 HE3062
FPM Display REV 01 710-002897 HD3033
CIP REV 05 710-002895 HA5022
PEM 1 RevX02 740-002595 MD21812 Power Entry Module
SCG 1 REV 01 710-003423 HD3025
Routing Engine 0 REV 01 740-005022 210865700336 RE-3.0
CB 0 REV 02 710-002728 HE3025
CB 1
FPC 1 REV 01 710-002385 HE3173 FPC Type 2
CPU REV 06 710-001726 HC0042
PIC 0 REV 03 750-001900 AD5737 1x OC-48 SONET, SMIR
PIC 1 REV 07 750-001900 AR3613 1x OC-48 SONET, SMSR
PIC 2 REV 01 750-001900 AA9604 1x OC-48 SONET, SMIR
PIC 3 REV 01 750-001900 AA9602 1x OC-48 SONET, SMIR
MMB 1 REV 03 710-001723 HC0111 MMB-144mbit
ICBM REV 04 710-003384 HA4497
PPB 0 REV 02 710-003758 HA4543 PPB Type 2
PPB 1 REV 02 710-003758 HA4540 PPB Type 2
FPC 2 REV 01 710-002385 HE3180 FPC Type 2
CPU REV 06 710-001726 HE7904
MMB 1 REV 03 710-001723 HC0120 MMB-144mbit
ICBM REV 01 710-003384 HE3046
PPB 0 REV 02 710-003758 HA4564 PPB Type 2
PPB 1 REV 02 710-003758 HA4554 PPB Type 2
FPC 4 REV 04 710-001721 HE3145 FPC Type 3
CPU REV 06 710-001726 HC0034
PIC 0 1x Tunnel
PIC 1 REV 01 750-003824 HE7803 1x OC-192 SM SR2
PIC 2 REV 01 750-003336 HE3420 4x OC-48 SONET, SMSR
PIC 3 REV 01 750-003824 HE7802 1x OC-192 SM SR1
MMB 0 REV 03 710-001723 HE7230 MMB-144mbit
MMB 1 REV 03 710-001723 HE7267 MMB-144mbit
ICBM REV 04 710-003384 HA4485
PPB 0 REV 02 710-002845 HA4550 PPB Type 3
PPB 1 REV 02 710-002845 HA4525 PPB Type 3
FPC 5 REV 04 710-001721 HE3175 FPC Type 3
CPU
FPC 6 REV 01 710-002385 HD5027 FPC Type 2
CPU REV 06 710-001726 HC0033
MMB 1 REV 03 710-001723 HC0080 MMB-144mbit
258 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
ICBM REV 04 710-003384 HA4486
PPB 0 REV 02 710-003758 HA4541 PPB Type 2
PPB 1 REV 02 710-003758 HA4539 PPB Type 2
SPMB 0 REV 01 710-003229 HA5999
SIB 0 REV 01 710-003980 HD5054 SIB-I8
SIB 2 REV 01 710-003980 HC0035 SIB-I8
SIB 3 REV 01 710-003980 HA5065 SIB-I8
SIB 4 REV 01 710-003980 HE3016 SIB-I8
To verify FPC status, use the show chassis fpc command. Sample command output from
a T640 router is as follows:
user@host> show chassis fpc
Temp CPU Utilization (%) Memory Utilization (%)
Slot State (C) Total Interrupt DRAM (MB) Heap Buffer
0 Empty 0 0 0 0 0 0
1 Online 30 2 0 512 3 41
2 Online 30 2 0 256 7 41
3 Empty 0 0 0 0 0 0
4 Online 30 4 0 512 6 41
5 Offline --- Unresponsive ---
6 Online 30 2 0 256 7 41
7 Empty 0 0 0 0 0 0
To verify Routing Engine status, use the show chassis routing-engine command. Sample
command output from a T640 router is as follows:
user@host> show chassis routing-engine
Routing Engine status:
Slot 0:
Current state Master
Election priority Master (default)
Temperature 35 degrees C / 95 degrees F
DRAM 2048 MB
Memory utilization 4 percent
CPU utilization:
User 0 percent
Background 0 percent
Kernel 2 percent
Interrupt 0 percent
Idle 97 percent
Model RE-3.0
Start time 2002-06-24 10:33:34 PDT
Uptime 33 minutes, 38 seconds
Load averages: 1 minute 5 minute 15 minute
0.08 0.03 0.01
To verify SPMB status, use the show chassis spmb command. Sample command output
from a T640 router is as follows:
user@host> show chassis spmb
Slot 0 information:
State Online
Total CPU Utilization 2%
Interrupt CPU Utilization 0%
Memory Heap Utilization 0%
Buffer Utilization 40%
Start time: 2002-06-24 10:34:22 PDT
Uptime: 33 minutes, 3 seconds
Copyright © 2010, Juniper Networks, Inc. 259
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxBoxKernelMemoryUsedPercent
The object identifier for jnxBoxKernelMemoryUsedPercent is jnxBoxAnatomy 16. This
object represents the amount of the kernel memory used, expressed as a percentage of
the total available memory. The object shows 0 if the kernel memory usage is unavailable
or inapplicable. When the kernel memory usage exceeds 80 percent, a system log
message is logged and an RMON rising threshold trap is generated if RMON health
monitoring is enabled for the device.
jnxBoxSystemDomainType
The object identifier for jnxBoxSystemDomainType is jnxBoxAnatomy 17. This object
indicates the domain type of the device, that is whether it is a root system domain (RSD;
represented by integer 2) or a protected system domain (PSD; represented by integer
3). This object returns an integer value of 1, denoting not applicable, if the system domain
type feature is not supported on the device.
Related • Chassis MIBs
Documentation
• Textual Convention for Chassis MIB on page 174
• Chassis Traps on page 260
Chassis Traps
The chassis-related traps are defined under the jnxTraps and jnxChassisOKtraps branches.
For the system logging severity levels for these traps, see .Juniper Networks
Enterprise-Specific SNMP Traps .
These traps are defined as follows:
• Power failure (jnxPowerSupplyFailure)—Sent when the power supply, router circuit
breaker, or power circuit fails, or when there is a power outage. When only one of the
power supplies has failed, the service impact is minimal. One power supply can provide
the necessary power for a fully loaded router. To determine the source of the failure,
you must physically inspect the router. This trap is repeated every hour until the power
supply is restored.
• Fan failure (jnxFanFailure)—Sent when the fan fuse blows or when the fan wiring shorts
out. When only one fan has failed, there is no service impact. The remaining fans
increase speed to compensate. However, you must resolve the problem before another
fan fails. This trap is repeated every hour until the fan failure is fixed. To determine the
source of the failure, you must physically inspect the router, taking care to check the
fuses. See the hardware installation guide for your router model for more information.
• Overtemperature (jnxOverTemperature)—Sent when several fans fail or the room
temperature increases significantly. The service impact of this trap depends on the
temperature of the router. In general, the router increases the speed of the fans when
any component exceeds a temperature of 55=° C. The fans remain at the higher speed
until the temperature decreases below the threshold. In this case, there is no service
impact. However, if the temperature exceeds 75° C, the router transmits a warning
260 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
and automatically shuts down. This scenario creates a significant service impact
because the shutdown affects additional routers and equipment. This trap is repeated
every minute until the temperature is brought down to normal. To determine the source
of the overtemperature problem, you must physically inspect the router to determine
whether any fans have failed in the router.
• Power Supply OK (jnxPowerSupplyOK)—Sent when a power supply recovers from
failure.
• Fan OK (jnxFanOK)—Sent when a fan recovers from failure.
• Temperature OK (jnxTemperatureOK)—Sent when a chassis component recovers from
an overtemperature condition.
• Redundancy Switchover (jnxRedundancySwitchover)—For certain platforms, such as
the M20 or M160, some subsystems, such as the Routing Engine, have a redundant
backup unit that can be brought online, manually or automatically, if the main unit
malfunctions. The redundancy switchover trap indicates such a change.
• Field Replaceable Unit Removal (jnxFruRemoval)—Sent when the specified FRU has
been removed from the chassis.
• Field Replaceable Unit Insertion (jnxFruInsertion)—Sent when the specified FRU has
been inserted into the chassis.
• Field Replaceable Unit Power Off (jnxFruPowerOff)—Sent when the specified FRU has
been powered off in the chassis.
The jnxFruPowerOff trap is also sent in the following scenarios:
• When an FRU that is controlled using inter-process communication (IPC) goes offline
or is removed from the chassis. For example, a switch interface board (SIB).
• When an FRU that does not have a backup unit goes offline or is removed from the
chassis. For example, a Flexible PIC Concentrator (FPC).
NOTE: When a SONET Clock Generator (SCG) is taken offline, the unit is
not powered down. Therefore, jnxFruPowerOff or jnxFruPowerOn traps are
not sent when the unit is taken online or offline.
• Field Replaceable Unit Power On (jnxFruPowerOn)—Sent when the specified FRU has
been powered on in the chassis.
• Field Replaceable Unit Failed (jnxFruFailed)—Sent when the specified FRU has failed
in the chassis. Typically, this is due to the FRU not powering up or being unable to load
software. FRU replacement may be required.
• Field Replaceable Unit Offline (jnxFruOffline)—Sent when the specified FRU goes
offline. However, when an FRU that does not have a backup unit goes offline, Junos
OS generates the jnxFruPowerOff trap instead of the jnxFruOffline trap. Typically, a
jnxFruOffline trap is generated to inform the backup FRU about the status of the primary
FRU so that the backup FRU can take over when the primary FRU goes offline.
Copyright © 2010, Juniper Networks, Inc. 261
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
The following are some scenarios when jnxFruOffline traps are generated:
• When a Packet Forwarding Engine Clock Generator (PCG) goes offline (M40e)
• When a Sonnet Clock Generator goes offline (T Series)
• When a Line Card Chassis goes offline (TX4 internet router)
• When a Routing Engine goes offline.
• Field Replaceable Unit Online (jnxFruOnline)—Sent when the specified FRU goes online.
• Field Replaceable Unit Check (jnxFruCheck)—Sent when the specified FRU has
encountered operational errors. On M120 and M320 routers, this trap is sent if the
revision number for the ATM2 PIC FPGA is less than 8B44(4).
• Forwarding Engine Board (FEB) Switch Over (jnxFEBSwitchover)—Sent when the
specified FEB undergoes a switch over.
• Hard disk Failure (jnxHardDiskFailed)—Sent when the hard disk in the specified Routing
Engine is not operational.
• Hard disk Missing (jnxHardDiskMissing)—Sent when the hard disk in the specified
Routing Engine is missing from the boot device list.
This section contains the following topics:
• SNMPv1 Trap Format on page 262
• SNMPv2 Trap Format on page 263
SNMPv1 Trap Format
The SNMPv1 trap format for the chassis-related traps is described in Table 58 on page 262.
To view the SNMPv1 chassis-related traps, see “Juniper Networks Enterprise-Specific
SNMP Version 1 Traps” on page 74 .
The column headings describe the SNMPv1 traps format:
• Trap Name—The name of the trap.
• Enterprise ID—The identification number of the enterprise-specific trap.
• Generic Trap Number—The generic trap number field of the SNMP trap PDU. This field
is enterpriseSpecific(6) for enterprise-specific traps, other predefined values for
standard traps.
• Specific Trap Number— The specific trap number field of the SNMP trap PDU. For
standard traps, this field is zero; for enterprise-specific traps, this field is nonzero as
defined in the enterprise-specific MIBs.
Table 58: SNMP Version 1 Trap Format
Generic Trap Specific Trap
Trap Name Enterprise ID Number Number
jnxFanFailure 1.3.6.1.4.1.2636.4.1 6 2
262 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 58: SNMP Version 1 Trap Format (continued)
Generic Trap Specific Trap
Trap Name Enterprise ID Number Number
jnxFanOK 1.3.6.1.4.1.2636.4.2 6 2
jnxFruCheck 1.3.6.1.4.1.2636.4.1 6 12
jnxFruFailed 1.3.6.1.4.1.2636.4.1 6 9
jnxFruInsertion 1.3.6.1.4.1.2636.4.1 6 6
jnxFruOffline 1.3.6.1.4.1.2636.4.1 6 10
jnxFruOnline 1.3.6.1.4.1.2636.4.1 6 11
jnxFruPowerOff 1.3.6.1.4.1.2636.4.1 6 7
jnxFruPowerOn 1.3.6.1.4.1.2636.4.1 6 8
jnxFruRemoval 1.3.6.1.4.1.2636.4.1 6 5
jnxOverTemperature 1.3.6.1.4.1.2636.4.1 6 3
jnxPowerSupplyFailure 1.3.6.1.4.1.2636.4.1 6 1
jnxPowerSupplyOK 1.3.6.1.4.1.2636.4.2 6 1
jnxRedundancySwitchover 1.3.6.1.4.1.2636.4.1 6 4
jnxTemperatureOK 1.3.6.1.4.1.2636.4.2 6 3
SNMPv2 Trap Format
The SNMPv2 trap format for the Chassis MIB traps is described in Table 59 on page 264.
The column headings describe the SNMPv2 traps format:
• Trap Name—The name of the trap.
• snmpTrapOID—The authoritative identification of the notification currently being sent.
This variable occurs as the second varbind in every SNMPv2 trap PDU and
InformRequest PDU.
• Description—The Junos OS enterprise-specific name of the trap.
Copyright © 2010, Juniper Networks, Inc. 263
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 59: SNMP Version 2 Trap Format
Trap Name snmpTrapOID Description
jnxFanFailure 1.3.6.1.4.1.2636.4.1.2 The fan fuse has blown or the fan wiring
has shorted out. This trap is generated
every hour until the fan failure is fixed.
jnxFanOK 1.3.6.1.4.1.2636.4.2.2 The fan has recovered from a failure
state.
jnxFruCheck 1.3.6.1.4.1.2636.4.1.12 The FRU has operational errors and has
gone into a self-check diagnostic state.
The revision number for the ATM2 PIC
FPGA on an M120 or M320 router is less
than 8B44(4).
jnxFruInsertion 1.3.6.1.4.1.2636.4.1.6 The FRU has been inserted into the
chassis.
jnxFruFailed 1.3.6.1.4.1.2636.4.1.9 The FRU has failed in the chassis.
jnxFruOffline 1.3.6.1.4.1.2636.4.1.10 The FRU has gone offline.
jnxFruOnline 1.3.6.1.4.1.2636.4.1.11 The FRU has gone back online.
jnxFruPowerOff 1.3.6.1.4.1.2636.4.1.7 The FRU has been powered off in the
chassis.
jnxFruPowerOn 1.3.6.1.4.1.2636.4.1.8 The FRU has been powered on in the
chassis.
jnxFruRemoval 1.3.6.1.4.1.2636.4.1.5 The FRU has been removed from the
chassis.
jnxOverTemperature 1.3.6.1.4.1.2636.4.1.3 Several fans have failed or the room
temperature has increased significantly.
This trap is repeated every minute until
the temperature is brought down to
normal.
jnxPowerSupplyFailure 1.3.6.1.4.1.2636.4.1.1 The power supply, router circuit breaker,
or power circuit failed, or there has been
a power outage. This trap is generated
every hour until the power supply is
restored.
jnxPowerSupplyOK 1.3.6.1.4.1.2636.4.2.1 The power supply has recovered from
a failure.
jnxRedundancySwitchover 1.3.6.1.4.1.2636.4.1.4 A redundant backup unit that can be
brought online, manually or
automatically, if the main unit
malfunctions.
264 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Table 59: SNMP Version 2 Trap Format (continued)
Trap Name snmpTrapOID Description
jnxTemperatureOK 1.3.6.1.4.1.2636.4.2.3 The component sensor has detected
an overtemperature condition.
Related • Chassis MIBs
Documentation
• Textual Convention for Chassis MIB on page 174
Chassis Definitions for Router Model MIB
The enterprise-specific Chassis Definitions for Router Model MIB contain the OIDs that
are used by the Chassis MIB to identify platform and chassis components. The Chassis
MIB provides information that changes often. The Chassis Definitions for the Router
Model MIB provide information that changes less often.
The last number in each sysObjectId, shown in Table 60 on page 265, corresponds to the
devices and therefore does not change.
Table 60: Router Model and Their sysObjectIds
Model SysObjectID jnxProductName
SRX100 1.3.6.1.4.1.2636.1.1.1.2.41 jnxProductNameSRX100
SRX210 1.3.6.1.4.1.2636.1.1.1.2.36 jnxProductNameSRX210
SRX220 1.3.6.1.4.1.2636.1.1.1.2.58 jnxProductNameSRX220
SRX240 1.3.6.1.4.1.2636.1.1.1.2.39 jnxProductNameSRX240
SRX650 1.3.6.1.4.1.2636.1.1.1.2.38 jnxProductNameSRX650
For a downloadable version of the Chassis Definitions for Router Model MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/information-products/topic-collections/reference-mibs-and-traps/mib-jnx-chas-defines.txt
.
Related • MIB Objects for the SRX100 Services Gateway on page 265
Documentation
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
MIB Objects for the SRX100 Services Gateway
The Chassis MIB objects for the SRX100 Services Gateway include:
Copyright © 2010, Juniper Networks, Inc. 265
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxProductLineSRX100 OBJECT IDENTIFIER ::= { jnxProductLine 41 }
jnxProductNameSRX100 OBJECT IDENTIFIER ::= { jnxProductName 41 }
jnxChassisSRX100 OBJECT IDENTIFIER ::= { jnxChassis 41 }
jnxSlotSRX100 OBJECT IDENTIFIER ::= { jnxSlot 41 }
jnxSRX100SlotFPC OBJECT IDENTIFIER ::= { jnxSlotSRX100 1 }
jnxSRX100SlotRE OBJECT IDENTIFIER ::= { jnxSlotSRX100 2 }
jnxSRX100SlotPower OBJECT IDENTIFIER ::= { jnxSlotSRX100 3 }
jnxSRX100SlotFan OBJECT IDENTIFIER ::= { jnxSlotSRX100 4 }
jnxMediaCardSpaceSRX100 OBJECT IDENTIFIER ::= { jnxMediaCardSpace 41
}
jnxSRX100MediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceSRX100 1
}
jnxMidplaneSRX100 OBJECT IDENTIFIER ::= { jnxBackplane 41 }
jnxModuleSRX100 OBJECT IDENTIFIER ::= { jnxModule 41 }
jnxSRX100FPC OBJECT IDENTIFIER ::= { jnxModuleSRX100 1 }
jnxSRX100RE OBJECT IDENTIFIER ::= { jnxModuleSRX100 2 }
jnxSRX100Power OBJECT IDENTIFIER ::= { jnxModuleSRX100 3 }
jnxSRX100Fan OBJECT IDENTIFIER ::= { jnxModuleSRX100 4 }
Related • Textual Convention for Chassis MIB on page 174
Documentation
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
MIB Objects for the SRX210 Services Gateway
The Chassis MIB objects for the SRX210 Services Gateway include:
jnxProductLineSRX210 OBJECT IDENTIFIER ::= { jnxProductLine 36 }
jnxProductNameSRX210 OBJECT IDENTIFIER ::= { jnxProductName 36 }
jnxChassisSRX210 OBJECT IDENTIFIER ::= { jnxChassis 36 }
jnxSlotSRX210 OBJECT IDENTIFIER ::= { jnxSlot 36 }
jnxSRX210SlotFPC OBJECT IDENTIFIER ::= { jnxSlotSRX210 1 }
jnxSRX210SlotRE OBJECT IDENTIFIER ::= { jnxSlotSRX210 2 }
jnxSRX210SlotPower OBJECT IDENTIFIER ::= { jnxSlotSRX210 3 }
jnxSRX210SlotFan OBJECT IDENTIFIER ::= { jnxSlotSRX210 4 }
jnxMediaCardSpaceSRX210 OBJECT IDENTIFIER ::= { jnxMediaCardSpace 36
}
jnxSRX210MediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceSRX210 1
}
jnxMidplaneSRX210 OBJECT IDENTIFIER ::= { jnxBackplane 36 }
jnxModuleSRX210 OBJECT IDENTIFIER ::= { jnxModule 36 }
jnxSRX210FPC OBJECT IDENTIFIER ::= { jnxModuleSRX210 1 }
jnxSRX210RE OBJECT IDENTIFIER ::= { jnxModuleSRX210 2 }
jnxSRX210Power OBJECT IDENTIFIER ::= { jnxModuleSRX210 3 }
jnxSRX210Fan OBJECT IDENTIFIER ::= { jnxModuleSRX210 4 }
266 Copyright © 2010, Juniper Networks, Inc.
Chapter 15: Interpreting the Enterprise-Specific Chassis MIBs
Related • Textual Convention for Chassis MIB on page 174
Documentation
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
MIB Objects for the SRX220 Services Gateway
The Chassis MIB objects for the SRX220 Services Gateway include:
jnxProductLineSRX220 OBJECT IDENTIFIER ::= { jnxProductLine 58 }
jnxProductNameSRX220 OBJECT IDENTIFIER ::= { jnxProductName 58 }
jnxChassisSRX220 OBJECT IDENTIFIER ::= { jnxChassis 58 }
jnxSlotSRX220 OBJECT IDENTIFIER ::= { jnxSlot 58 }
jnxSRX220SlotFPC OBJECT IDENTIFIER ::= { jnxSlotSRX220 1 }
jnxSRX220SlotRE OBJECT IDENTIFIER ::= { jnxSlotSRX220 2 }
jnxSRX220SlotPower OBJECT IDENTIFIER ::= { jnxSlotSRX220 3 }
jnxSRX220SlotFan OBJECT IDENTIFIER ::= { jnxSlotSRX220 4 }
jnxMediaCardSpaceSRX220 OBJECT IDENTIFIER ::= { jnxMediaCardSpace 58
}
jnxSRX220MediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceSRX220
1 }
jnxMidplaneSRX220 OBJECT IDENTIFIER ::= { jnxBackplane 58 }
jnxModuleSRX220 OBJECT IDENTIFIER ::= { jnxModule 58 }
jnxSRX220FPC OBJECT IDENTIFIER ::= { jnxModuleSRX220 1 }
jnxSRX220RE OBJECT IDENTIFIER ::= { jnxModuleSRX220 2 }
jnxSRX220SlotPower OBJECT IDENTIFIER ::= { jnxSlotSRX220 3 }
jnxSRX220SlotFan OBJECT IDENTIFIER ::= { jnxSlotSRX220 4 }
Related • Textual Convention for Chassis MIB on page 174
Documentation
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX240 Services Gateway on page 267
• MIB Objects for the SRX650 Services Gateway on page 268
MIB Objects for the SRX240 Services Gateway
The Chassis MIB objects for the SRX240 Services Gateway include:
jnxProductLineJSRX240 OBJECT IDENTIFIER ::= { jnxProductLine 37 }
jnxProductNameJSRX240 OBJECT IDENTIFIER ::= { jnxProductName 37 }
jnxChassisJSRX240 OBJECT IDENTIFIER ::= { jnxChassis 37 }
jnxSlotJSRX240 OBJECT IDENTIFIER ::= { jnxSlot 37 }
jnxJSRX240SlotFPC OBJECT IDENTIFIER ::= { jnxSlotJSRX240 1 }
jnxJSRX240SlotRE OBJECT IDENTIFIER ::= { jnxSlotJSRX240 2 }
jnxJSRX240SlotPower OBJECT IDENTIFIER ::= { jnxSlotJSRX240 3 }
jnxJSRX240SlotFan OBJECT IDENTIFIER ::= { jnxSlotJSRX240 4 }
jnxMediaCardSpaceJSRX240 OBJECT IDENTIFIER ::= { jnxMediaCardSpace 37 }
Copyright © 2010, Juniper Networks, Inc. 267
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxJSRX240MediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceJSRX240 1
}
jnxMidplaneJSRX240 OBJECT IDENTIFIER ::= { jnxBackplane 37 }
jnxModuleJSRX240 OBJECT IDENTIFIER ::= { jnxModule 37 }
jnxJSRX240FPC OBJECT IDENTIFIER ::= { jnxModuleJSRX240 1 }
jnxJSRX240RE OBJECT IDENTIFIER ::= { jnxModuleJSRX240 2 }
jnxJSRX240Power OBJECT IDENTIFIER ::= { jnxModuleJSRX240 3 }
jnxJSRX240Fan OBJECT IDENTIFIER ::= { jnxModuleJSRX240 4 }
Related • Textual Convention for Chassis MIB on page 174
Documentation
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX650 Services Gateway on page 268
MIB Objects for the SRX650 Services Gateway
The Chassis MIB objects for the SRX650 Services Gateway include:
jnxProductLineJSRX650 OBJECT IDENTIFIER ::= { jnxProductLine 38 }
jnxProductNameJSRX650 OBJECT IDENTIFIER ::= { jnxProductName 38 }
jnxChassisJSRX650 OBJECT IDENTIFIER ::= { jnxChassis 38 }
jnxSlotJSRX650 OBJECT IDENTIFIER ::= { jnxSlot 38 }
jnxJSRX650SlotFPC OBJECT IDENTIFIER ::= { jnxSlotJSRX650 1 }
jnxJSRX650SlotRE OBJECT IDENTIFIER ::= { jnxSlotJSRX650 2 }
jnxJSRX650SlotPower OBJECT IDENTIFIER ::= { jnxSlotJSRX650 3 }
jnxJSRX650SlotFan OBJECT IDENTIFIER ::= { jnxSlotJSRX650 4 }
jnxMediaCardSpaceJSRX650 OBJECT IDENTIFIER ::= { jnxMediaCardSpace 38}
jnxJSRX650MediaCardSpacePIC OBJECT IDENTIFIER ::= { jnxMediaCardSpaceJSRX650
1}
jnxMidplaneJSRX650 OBJECT IDENTIFIER ::= { jnxBackplane 38 }
jnxModuleJSRX650 OBJECT IDENTIFIER ::= { jnxModule 38 }
jnxJSRX650FPC OBJECT IDENTIFIER ::= { jnxModuleJSRX650 1 }
jnxJSRX650RE OBJECT IDENTIFIER ::= { jnxModuleJSRX650 2 }
jnxJSRX650Power OBJECT IDENTIFIER ::= { jnxModuleJSRX650 3 }
jnxJSRX650Fan OBJECT IDENTIFIER ::= { jnxModuleJSRX650 4 }
Related • Textual Convention for Chassis MIB on page 174
Documentation
• MIB Objects for the SRX100 Services Gateway on page 265
• MIB Objects for the SRX210 Services Gateway on page 266
• MIB Objects for the SRX240 Services Gateway on page 267
268 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 16
Interpreting the Enterprise-Specific
Configuration Management MIB
• Configuration Management MIB on page 269
• Text Conventions in Enterprise-Specific Configuration Management MIB on page 269
• Configuration Change Management Objects and jnxCmCfgChgEventTable on page 270
• Rescue Configuration Change Management Objects on page 272
• Configuration Management Notifications on page 273
Configuration Management MIB
The Juniper Networks enterprise-specific Configuration Management MIB, whose object
identifier is {jnxMIbs 18}, defines the objects that are used for managing the configuration
of Juniper Networks products.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-cfgmgmt.txt
.
For information about the enterprise-specific Configuration Management MIB objects,
see the following topics:
• Text Conventions in Enterprise-Specific Configuration Management MIB on page 269
• Configuration Change Management Objects and jnxCmCfgChgEventTable on page 270
• Rescue Configuration Change Management Objects on page 272
• Configuration Management Notifications on page 273
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Text Conventions in Enterprise-Specific Configuration Management MIB
Table 61 on page 270 contains information about the text conventions used in the
enterprise-specific configuration management MIB.
Copyright © 2010, Juniper Networks, Inc. 269
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 61: Text Conventions for the Enterprise-Specific Configuration Management MIB
Object Description Syntax
JnxCmCfChgSource Identifies the source of the This object uses the following integer values:
configuration event.
• 1–Other
• 2–CLI
• 3—Junos XML protocol
• 4—Synchronize
• 5—SNMP
• 6—Button
• 7—Autoinstall
• 8—Unknown
JnxCmRescueCfgState Represents the state of the rescue This object uses the following integer values:
configuration.
• 1—Nonexistent
• 2—Updated
Related • Configuration Management MIB on page 269
Documentation
• Configuration Change Management Objects and jnxCmCfgChgEventTable on page 270
• Rescue Configuration Change Management Objects on page 272
• Configuration Management Notifications on page 273
Configuration Change Management Objects and jnxCmCfgChgEventTable
The configuration change management objects listed in Table 62 on page 270 along with
the objects in the jnxCmCfgChgEventTable provide you the configuration change history.
Each jnxCmCfgChg, whose object identifier is {jnxCfgMgmt 1}, contains the objects listed
in Table 62 on page 270.
Table 62: Configuration Change Management Objects
Object Object ID Description
jnxCmCfgChgLatestIndex jnxCmCfgChg 1 Contains the index used in jnxCmCfgChgEventTable to represent the
latest configuration change event.
jnxCmCfgChgLatestTime jnxCmCfgChg 2 Shows the value of sysUpTime at the time of the last configuration
change. However, this object returns 0 if the management subsystem
was reset after the last configuration change.
jnxCmCfgChgLatestDate jnxCmCfgChg 3 Shows the date and time when the configuration was last modified.
jnxCmCfgChgLatestSource jnxCmCfgChg 4 Shows the source from which the configuration event was triggered.
This object uses JnxCmCfChgSource to represent the source of
configuration event. For more information about JnxCmCfChgSource,
see Table 61 on page 270.
270 Copyright © 2010, Juniper Networks, Inc.
Chapter 16: Interpreting the Enterprise-Specific Configuration Management MIB
Table 62: Configuration Change Management Objects (continued)
Object Object ID Description
jnxCmCfgChgLatestUser jnxCmCfgChg 5 Shows the login name of the current user. This object returns a
zero-length string if the user name is not available or not applicable.
jnxCmCfgChgMaxEventEntries jnxCmCfgChg 6 Shows the maximum number of entries that jnxCmCfgChgEventTable
can contain. Allowable range is 0 though 2147483647.
When the number of entries in jnxCmCfgChgEventTable exceeds the
maximum value set for jnxCmCfgChgMaxEventEntries, the latest entry
displaces the oldest entry in the table.
For information about the jnxCmCfgChgEventTable, see the following section:
• jnxCmCfgChgEventTable on page 271
jnxCmCfgChgEventTable
The jnxCmCfgChgEventTable, whose object identifier is {jnxCmCfgChg 7}, contains
jnxCmCfgChgEventEntry that maps to the most recent configuration change events on
the router. The jnxCmCfgChgMaxEventEntries object discussed in the preceding section
(Table 62 on page 270) controls the number of entries stored in jnxCmCfgChgEventTable.
Each jnxCmCfgChgEventEntry, whose object identifier is {jnxCmCfgChgEventTable 1},
contains the objects listed in Table 63 on page 271.
Table 63: jnxCmCfgChgEventTable
Object Object ID Description
jnxCmCfgChgEventIndex jnxCmCfgChgEventEntry 1 Uniquely identifies a configuration change event. The SNMP process
assigns monotonically increasing values to each event as it occurs.
However, when the SNMP process is reset, the index values too are
reset,
jnxCmCfgChgEventTime jnxCmCfgChgEventEntry 2 Contains the value of sysUpTime when the event occurred.
jnxCmCfgChgEventDate jnxCmCfgChgEventEntry 3 Contains the system date and time when the event occurred.
jnxCmCfgChgEventSource jnxCmCfgChgEventEntry 4 Shows the source from which the configuration event was triggered.
This object uses JnxCmCfChgSource to represent the source of
configuration event. For more information about JnxCmCfChgSource,
see Table 61 on page 270.
jnxCmCfgChgEventUser jnxCmCfgChgEventEntry 5 Contains the name of the user who was logged in at the time of the
event. Returns a zero-length string if the user name is not applicable
or not available.
jnxCmCfgChgEventLog jnxCmCfgChgEventEntry 6 Contains the log of the configuration event. Returns a zero-length
string if no log is available.
Copyright © 2010, Juniper Networks, Inc. 271
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • Configuration Management MIB on page 269
Documentation
• Text Conventions in Enterprise-Specific Configuration Management MIB on page 269
• Rescue Configuration Change Management Objects on page 272
• Configuration Management Notifications on page 273
Rescue Configuration Change Management Objects
The jnxCmRescueChg, whose object identifier is {jnxCfgMgmt 2}, contains information
about changes to rescue configuration.
Table 64 on page 272 lists the objects associated with jnxCmRescueChg.
Table 64: Rescue Configuration Change Management Objects
Object Object ID Description
jnxCmRescueChgTime jnxCmRescueChg 1 Contains the value of sysUpTime when the rescue configuration was last
changed. If the management subsystem has been reset since the last
configuration change, this object returns 0.
jnxCmRescueChgDate jnxCmRescueChg 2 Contains the date and time when the rescue configuration was last
changed.
jnxCmRescueChgSource jnxCmRescueChg 3 Shows the source from which the rescue configuration event was
triggered. This object uses JnxCmCfChgSource to represent the source of
configuration event. For more information about JnxCmCfChgSource, see
Table 61 on page 270.
jnxCmRescueChgUser jnxCmRescueChg 4 Contains the name of the user who was logged in at the time of the event.
Returns a zero-length string if the user name is not applicable or not
available.
jnxCmRescueChgState jnxCmRescueChg 5 Shows the current state of the rescue configuration. For more information
about the different states of rescue configuration, see Table 61 on page 270.
Related • Configuration Management MIB on page 269
Documentation
• Text Conventions in Enterprise-Specific Configuration Management MIB on page 269
• Configuration Change Management Objects and jnxCmCfgChgEventTable on page 270
• Configuration Management Notifications on page 273
272 Copyright © 2010, Juniper Networks, Inc.
Chapter 16: Interpreting the Enterprise-Specific Configuration Management MIB
Configuration Management Notifications
Junos OS generates the following traps when a configuration or a rescue configuration
event occurs:
• jnxCmCfgChange, whose object identifier is {jnxCmNotificationsPrefix 1}, contains
jnxCmCfgChgEventTime, jnxCmCfgChgEventDate, jnxCmCfgChgEventSource,
jnxCmCfgChgEventUser, and jnxCmCfgChgEventLog.
NOTE: Because configuration rollback is handled by the master
management process that uses the root user ID, the jnxCmCfgChgEventUser
object in the jnxCmCfgChange trap always returns root as the user name
for configuration rollback events.
• jnxCmRescueChange, whose object identifier is {jnxCmNotificationsPrefix 2}, contains
jnxCmRescueChgTime, jnxCmRescueChgDate, jnxCmRescueChgSource,
jnxCmRescueChgUser, and jnxCmRescueChgState.
Related • Configuration Management MIB on page 269
Documentation
• Text Conventions in Enterprise-Specific Configuration Management MIB on page 269
• Configuration Change Management Objects and jnxCmCfgChgEventTable on page 270
• Rescue Configuration Change Management Objects on page 272
Copyright © 2010, Juniper Networks, Inc. 273
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
274 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 17
Interpreting the Enterprise-Specific
Ethernet MAC MIB
• Ethernet MAC MIB on page 275
• jnxMacStatsTable on page 275
Ethernet MAC MIB
The Juniper Networks enterprise-specific Ethernet Media Access Control (MAC) MIB,
whose object identifier is {jnxMibs 23}, monitors media access control statistics on Gigabit
Ethernet intelligent queuing (IQ) interfaces. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-mac.txt
.
For information about enterprise-specific Ethernet MAC MIB objects, see the following
topic:
• jnxMacStatsTable on page 275
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxMacStatsTable
The jnxMacStatsTable contains a list of MAC statistics for Gigabit Ethernet interfaces.
jnxMacStatsEntry has six objects that are listed in Table 65 on page 275.
Table 65: jnxMacStatsTable
Object Object Identifier Description
jnxVlanIndex jnxMacStatsEntry 1 The virtual LAN (VLAN) ID of a VLAN.
jnxSourceMacAddress jnxMacStatsEntry 2 The source MAC address.
jnxMacHCInOctets jnxMacStatsEntry 3 The number of total octets received in this
VLAN/MAC address.
Copyright © 2010, Juniper Networks, Inc. 275
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 65: jnxMacStatsTable (continued)
Object Object Identifier Description
jnxMacHCInFrames jnxMacStatsEntry 4 The number of total frames received in this
VLAN/MAC address
jnxMacHCOutOctets jnxMacStatsEntry 5 The number of total octets transmitted in this
VLAN/MAC address.
jnxMacHCOutFrames jnxMacStatsEntry 6 The number of total frames transmitted in this
VLAN/MAC address.
Related • Ethernet MAC MIB on page 275
Documentation
276 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 18
Interpreting the Enterprise-Specific Event
MIB
• Event MIB on page 277
• jnxEventAvTable on page 277
• Notifications for the Event MIB on page 278
Event MIB
The Juniper Networks enterprise-specific Event MIB, whose object identifier is {jnxMibs 37},
defines a generic trap that can be generated using an op script or event policy. This MIB
provides the ability to specify a system log string and raise a trap if that system log string
is found.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-event.txt
.
For information about the enterprise-specific Event MIB objects, see the following topics:
• jnxEventAvTable on page 277
• Notifications for the Event MIB on page 278
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxEventAvTable
The jnxEventAvTable, whose object identifier is {jnxEventNotifyVars 2}, provides
information about traps generated by op scripts or event policies.
jnxEventAvEntry, whose object identifier is {jnxEventAvTable 1}, has three objects, which
are listed in Table 66 on page 278.
Copyright © 2010, Juniper Networks, Inc. 277
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 66: jnxEventAvTable
Object Object Identifier Description
jnxEventAvIndex jnxEventAvEntry 1 The sequence number of the attribute value pair in the trap
generated by a op script or event policy
jnxEventAvAttribute jnxEventAvEntry 2 The attribute name in the trap generated by an op script or event
policy
jnxEventAvValue jnxEventAvEntry 3 The value of the attribute identified by jnxEventAvAttribute
Related • Event MIB on page 277
Documentation
• Notifications for the Event MIB on page 278
Notifications for the Event MIB
Table 67 on page 278 lists the supported notifications for the Event MIB.
Table 67: Supported Notifications for the Event MIB
Object Object Identifier Description
jnxEventTrapDescr jnxEventNotificationPrefix 1 A notification generated by an op script or event policy. In addition
to the jnxEventTrap objects, this notification can include one or more
attribute value pairs (identified by jnxEventAvAttribute and
jnxEventAvValue).
Related • Event MIB on page 277
Documentation
• jnxEventAvTable on page 277
278 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 19
Interpreting the Enterprise-Specific
Firewall MIB
• Firewall MIB on page 279
• jnxFirewallsTable on page 280
• jnxFirewallCounterTable on page 280
Firewall MIB
The Juniper Networks enterprise-specific Firewall MIB, whose object identifier is {jnxMibs
5}, contains information about firewall filters and policies.
Firewall MIB contains two tables, jnxFirewallsTable and jnxFirewallCounterTable.
The jnxFirewallsTable does not support the following conditions:
• Counter and filter names that have more than 24 characters.
• Duplicate counter names, even if the counter types are different.
Because of the preceding limitations, the jnxFirewallsTable has been deprecated and
replaced with jnxFirewallCounterTable. However, for backward compatibility, the
jnxFirewallsTable is retained in the Firewall MIB.
For a downloadable version of the MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-firewall.txt
For information about the enterprise-specific Firewall MIB objects, see the following
topics:
• jnxFirewallsTable on page 280
• jnxFirewallCounterTable on page 280
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 279
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxFirewallsTable
The deprecated jnxFirewallsTable contains jnxFirewallsEntry, whose object ID is
{jnxFirewallsTable 1}. Each jnxFirewallsEntry contains the objects listed in Table 68 on
page 280.
Table 68: jnxFirewallsEntry
Object Object ID Description
jnxFWFilter jnxFirewallsEntry 1 The name of the firewall filter. This object does not support names that
have more than 24 characters.
jnxFWCounter jnxFirewallsEntry 2 The name of the counter or the policer. This name is specific within the
firewall filter.
jnxFWType jnxFirewallsEntry 3 The type of the jnxFWCounter object. The value of jnxFWType can be 1
(other), 2 (counter), or 3 (policer).
jnxFWPackets jnxFirewallsEntry 4 The number of packets that are associated with the specified counter
or policer.
jnxFWBytes jnxFirewallsEntry 5 The number of bytes that are associated with the counter. For policers,
the value of jnxFWBytes is always zero because the policers do not
count the number of bytes.
Related • Firewall MIB on page 279
Documentation
• jnxFirewallCounterTable on page 280
jnxFirewallCounterTable
The jnxFirewallCounterTable, whose object identifier is jnxFirewalls 2, replaces the
deprecated jnxFirewallsTable. Each JnxFirewallCounterEntry contains the objects listed
in Table 69 on page 280.
Table 69: JnxFirewallCounterEntry
Object Object ID Description
jnxFWCounterFilterName jnxFirewallCounterEntry 1 The name of the firewall filter. The name
can have up to 127 characters.
jnxFWCounterName jnxFirewallCounterEntry 2 The name of the counter or the policer.
The name can have up to 127 characters.
jnxFWCounterType jnxFirewallCounterEntry 3 The type of the jnxFWCounterName
object. The value of jnxFWType can be 1
(other), 2 (counter), or 3 (policer).
280 Copyright © 2010, Juniper Networks, Inc.
Chapter 19: Interpreting the Enterprise-Specific Firewall MIB
Table 69: JnxFirewallCounterEntry (continued)
Object Object ID Description
jnxFWCounterPacketCount jnxFirewallCounterEntry 4 The number of packets that are
associated with the specified counter or
policer.
jnxFWCounterByteCount jnxFirewallCounterEntry 5 The number of bytes that are associated
with the counter. For policers, the value
of jnxFWCounterByteCount is always zero
because the policers do not count the
number of bytes.
jnxFWCounterDisplayFilterName jnxFirewallCounterEntry 6 The name of the firewall filter. The name
can have up to 127 characters.
jnxFWCounterDisplayName jnxFirewallCounterEntry 7 The name of the counter or the policer.
jnxFWCounterDisplayType jnxFirewallCounterEntry 8 The type of the jnxFWCounterName
object. The value of jnxFWType can be
1 (other), 2 (counter), or 3 (policer).
Related • Firewall MIB on page 279
Documentation
• jnxFirewallsTable on page 280
Copyright © 2010, Juniper Networks, Inc. 281
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
282 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 20
Interpreting the Enterprise-Specific Host
Resources MIB
• Host Resources MIB on page 283
• jnxHrStorageTable on page 283
Host Resources MIB
The Juniper Networks enterprise-specific Host Resources MIB, whose object identifier is
{jnxMibs 31}, extends the hrStorageTable defined in RFC 2790, the standard Host
Resources MIB, to include the jnxHrStoragePercentUsed object.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-hostresources.txt
For information about the enterprise-specific Host Resources MIB objects, see the
following topic:
• jnxHrStorageTable on page 283
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxHrStorageTable
The jnxHrStorageTable, whose object identifier is {jnxHrStorage 1}, contains
jnxHrStorageEntry. Each jnxHrStorageEntry augments the hrStorageEntry to provide
additional file system data, and contains the following object:
• jnxHrStoragePercentUsed—object identifier is {jnxHrStorageEntry 1}—Shows what
percentage of the total storage space has been used.
Related • Host Resources MIB on page 283
Documentation
Copyright © 2010, Juniper Networks, Inc. 283
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
284 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 21
Interpreting the Enterprise-Specific
Interface MIB
• Interface MIB on page 285
• jnxIfTable on page 285
• ifChassisTable on page 288
Interface MIB
The Juniper Networks enterprise-specific Interface MIB extends the standard ifTable
(RFC 2863) with additional statistics and Juniper Networks enterprise-specific chassis
information. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-if-extensions.txt
.
For information about the enterprise-specific Interface MIB objects, see the following
topics:
• jnxIfTable on page 285
• ifChassisTable on page 288
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxIfTable
jnxIfTable lists traffic statistics, input errors, and output errors for an interface.
jnxIfEntry objects are listed in Table 70 on page 285.
Table 70: jnxIfTable
Object
Object Identifier Description
ifIn1SecRates ifJnxEntry 1 The number of bits per second (bps) delivered by
this sublayer to its next higher sublayer.
Copyright © 2010, Juniper Networks, Inc. 285
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 70: jnxIfTable (continued)
Object
Object Identifier Description
ifIn1SecOctets ifJnxEntry 2 The number of octets per second delivered by this
sublayer to its next higher sublayer.
ifIn1SecPkts ifJnxEntry 3 The number of packets per second (pps) delivered
by this sublayer to its next higher sublayer.
ifOut1SecRate ifJnxEntry 4 The number of bps delivered by this sublayer to its
next lower sublayer.
ifOut1SecOctets ifJnxEntry 5 The number of octets per second delivered by this
sublayer to its next lower sublayer.
ifOut1SecPkts ifJnxEntry 6 The number of pps delivered by this sublayer to its
next lower sublayer.
ifHCIn1SecRate ifJnxEntry 7 The number of bps delivered by this sublayer to its
next higher sublayer. This object is a 64-bit version
of ifIn1SecRate.
ifHCOut1SecRate ifJnxEntry 8 The number of bps delivered by this sublayer to its
next lower sublayers. This object is a 64-bit version
of ifOut1SecRate.
ifJnxInErrors ifJnxEntry 9 Errors: The sum of the incoming frame aborts and
FCS errors.
ifJnxInFrameErrors ifJnxEntry 10 Framing Errors: The number of input packets that
were misaligned.
ifJnxInQDrops ifJnxEntry 11 Drops: The number of packets dropped by the input
queue of the I/O Manager ASIC.
ifJnxInRunts ifJnxEntry 12 Runts: Frames received that are smaller than the runt
threshold.
ifJnxInGiants ifJnxEntry 13 Giants: Frames received that are larger than the giant
threshold.
ifJnxInDiscards ifJnxEntry 14 Policed discards: Frames that the incoming packet
match code discarded because they were not
recognized or of interest.
ifJnxInHslCrcErrors ifJnxEntry 15 HS link CRC errors: The number of CRC errors on the
high-speed links between the ASICs responsible for
handling the router interfaces while receiving packets.
ifJnxInHslFifoOverFlows ifJnxEntry 16 HS link FIFO overflows: The number of FIFO overflows
on the high-speed links between the ASICs
responsible for handling the router interfaces.
286 Copyright © 2010, Juniper Networks, Inc.
Chapter 21: Interpreting the Enterprise-Specific Interface MIB
Table 70: jnxIfTable (continued)
Object
Object Identifier Description
ifJnxInL3Incompletes ifJnxEntry 17 L3 incompletes: The number of incoming packets
that fail Layer 3 sanity checks of the header.
ifJnxInL2ChanErrors ifJnxEntry 18 L2 channel errors: The number of incoming packets
for which the software could not find a valid logical
interface.
ifJnxInL2MismatchTimeouts ifJnxEntry 19 L2 mismatch timeouts: The count of malformed or
short packets that cause the incoming packet handler
to discard the frame as unreadable.
ifJnxInInvalidVCs ifJnxEntry 20 Invalid virtual circuits (VCs): The number of cells that
arrived for a nonexistent VC.
ifJnxInFifoErrors ifJnxEntry 21 FIFO errors: The number of FIFO errors in the received
direction as reported by the ASIC on the PIC.
ifJnxBucketDrops ifJnxEntry 22 Bucket drops: Drops because traffic load exceeded
the interface transmit and receive leaky bucket
configuration.
ifJnxSramErrors ifJnxEntry 23 SRAM errors: This counter increments when a
hardware error has occurred in the SRAM on the PIC.
ifJnxOutErrors ifJnxEntry 24 Errors: The sum of the outgoing frame aborts and
FCS errors.
ifJnxCollisions ifJnxEntry 25 Collisions: The number of output collisions detected
on this interface.
ifJnxCarrierTrans ifJnxEntry 26 Carrier transitions: The number of times the interface
saw the carrier signal transition.
ifJnxOutQDrops ifJnxEntry 27 Drops: The number of packets dropped by the output
queue of the I/O Manager ASIC.
ifJnxOutAgedErrors ifJnxEntry 28 Aged packets: The number of packets that remained
in shared packet SDRAM for so long that the system
automatically purged them.
ifJnxOutFifoErrors ifJnxEntry 29 FIFO errors: The number of FIFO errors in the transmit
direction as reported by the ASIC on the PIC.
ifJnxOutHslFifoUnderFlows ifJnxEntry 30 HS link FIFO underflows: The number of FIFO
underflows on the high-speed links between the
ASICs responsible for handling the router interfaces.
Copyright © 2010, Juniper Networks, Inc. 287
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 70: jnxIfTable (continued)
Object
Object Identifier Description
ifJnxOutHslCrcErrors ifJnxEntry 31 HS link CRC errors: The number of CRC errors on the
high-speed links between the ASICs responsible for
handling the router interfaces while transmitting
packets.
Related • Interface MIB on page 285
Documentation
• ifChassisTable on page 288
ifChassisTable
ifChassisTable provides additional interface and chassis information.
ifChassisEntry objects are listed in Table 71 on page 288.
Table 71: ifChassisTable
Object
Object Identifier Description
ifChassisFpc ifChassisEntry 1 The number of the FPC card on which the interface is
located in the chassis. It is the chassis slot in which the
FPC card is installed for the specified interface.
Although the number is labeled from 0 and up in the
chassis, the return value for this object always starts
from 1 according to network management convention.
Therefore, a value of zero means there is no real or
physical FPC associated with the specified interface.
ifChassisPic ifChassisEntry 2 The number of the PIC card on which the interface is
located in the chassis. It is the PIC location on the FPC
card for the specified interface.
Although the number is labeled from 0 and up in the
chassis, the return value for this object always starts
from 1 according to network management convention.
Therefore, a value of zero means there is no real or
physical PIC associated with the specified interface.
ifChassisPort ifChassisEntry 3 The number of the port on the PIC card on which the
interface is located in the chassis. It is the port number
on the PIC card for the specified interface.
Although the number is labeled from 0 and up in the
chassis, the return value for this object always starts
from 1 according to network management convention.
Therefore, a value of zero means there is no real or
physical port associated with the specified interface.
288 Copyright © 2010, Juniper Networks, Inc.
Chapter 21: Interpreting the Enterprise-Specific Interface MIB
Table 71: ifChassisTable (continued)
Object
Object Identifier Description
ifChassisChannel ifChassisEntry 4 The channel identifier for the specified interface if it is
part of a channelized interface.
Although the channel is numbered from 0 and up in the
interface naming, the return value for this object always
starts from 1 according to network management
convention. For an interface that could not be
channelized, this object returns zero.
ifChassisLogicalUnit ifChassisEntry 5 The logical unit number of the specified interface. It is
the logical part of the interface that is configured on the
physical or channel part, if any.
Although the logical unit number is numbered from 0
and up in the interface naming, the return value for this
object always starts from 1 according to network
management convention. For an interface that is really
a physical device, this value returns zero.
ifChassisPicIndex ifChassisEntry 6 The indexes for the Chassis MIB tables. This is the
instance index that keys into jnxContentsTable in the
Chassis MIB.
For example, the octet string of 8.1.2.0 means a PIC (“
8&” first digit) at FPC slot 0 (“1–1” , second digit minus
one if nonzero) PIC number 1 (“2–1” , third digit) minus
one if nonzero port number, whatever (fourth digit
currently unused). In turn, this PIC index can be plugged
in by the NMS directly after any MIB objects in the
jnxContentsTable obtain that PIC object for the specified
interface. This object is valid only for interfaces having
real and physical PIC cards. Otherwise, it returns an octet
string “0.0.0.0.”
Related • Interface MIB on page 285
Documentation
• jnxIfTable on page 285
Copyright © 2010, Juniper Networks, Inc. 289
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
290 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 22
Interpreting the Enterprise-Specific IP
Forward MIB
• IP Forward MIB on page 291
• jnxIpCidrRouteTable on page 292
IP Forward MIB
The Juniper Networks enterprise-specific IP Forward MIB, whose object identifier is
{jnxMibs 38}, extends the ipCidrRouteTable in the IP Forwarding Table MIB (as defined
in RFC 2096) to include a tunnel name when the next hop is through an RSVP-signaled
LSP.
This MIB adds an jnxIpCidrRouteTunnelName attribute to the ipCidrRouteTable. The
attribute exists for each entry in the ipCidrRouteTable. (One entry in the ipCidrRouteTable
represents each route in inet.0). If the route's next hop is an RSVP-signaled MPLS LSP,
the new attribute contains the LSP name. If the route's next hop is not an RSVP-signaled
MPLS LSP, the new attribute is defined as null.
The attribute's name is jnxIpCidrRouteTunnelName. Its object identifier (OID) is
1.3.6.1.4.1.2636.3.38.1.1.1. As with any SNMP attribute, an index is appended to the OID to
form the instance identifier. Because this attribute augments the ipCidrRouteTable, the
index is identical to that used in the ipCidrRouteTable. The index is formed by
concatenating destination address, subnet mask, ToS byte, and next hop.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipforward.txt
.
For more information about the enterprise-specific IP Forward MIB, see
“jnxIpCidrRouteTable” on page 292.
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 291
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxIpCidrRouteTable
The jnxIpCidrRouteTable, whose object identifier is {jnxIpForwardMIB 1}, extends the the
ipCidrRouteTable with additional data.
jnxIpCidrRouteEntry, whose object identifier is {jnxIpCidrRouteTable 1}, has one object,
which is listed in Table 72 on page 292.
Table 72: jnxIpCidrRouteTable
Object Object Identifier Description
jnxIpCidrRouteTunnelName nxIpCidrRouteEntry 1 The canonical name assigned
to the tunnel. The router
forwards traffic bound for the
destination through this
tunnel.
Related • IP Forward MIB on page 291
Documentation
292 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 23
Interpreting the Enterprise-Specific IPsec
Generic Flow Monitoring Object MIB
• IPsec Generic Flow Monitoring Object MIB on page 293
• Branch Tree Objects on page 294
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
IPsec Generic Flow Monitoring Object MIB
The Juniper Networks enterprise-specific IPsec Generic Flow Monitoring Object MIB,
whose object ID is {jnxIpSecMibRoot 1}, defines the objects used to monitor the entries
pertaining to IPsec objects and the management of the IPsec VPN functionalities. This
generic MIB models the standard, dynamic aspects of IPsec, including the counters and
objects that are of management interest in a standard IPsec implementation.
This MIB module is based on the jnxIpSecMonitorMib. Building on the existing Internet
Key Exchange (IKE) infrastructure, the security IKE implementation integrates the
value-added features for the security products.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipsec-flow-mon.txt
.
For information about the enterprise-specific IPsec Flow Monitoring MIB objects, see the
following topics:
• Branch Tree Objects on page 294
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
Copyright © 2010, Juniper Networks, Inc. 293
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Branch Tree Objects
The following branch tree objects are associated with the IPsec Generic Flow Monitoring
Object MIB:
• jnxIpSecFlowMonNotifications {jnxIpSecFlowMonMIB 0}
• jnxIpSecFlowMonPhaseOne {jnxIpSecFlowMonMIB 1}
• jnxIpSecFlowMonPhaseTwo {jnxIpSecFlowMonMIB 2}
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
Text Conventions
• JnxIkePeerType—The type of IPsec Phase 1 IKE peer identity. This identity is the local
IKE identity to send in the exchange. The IKE peer may be identified by one of the ID
types defined in IPsec DOI (see Table 73 on page 294).
Table 73: IKE Identity Type Text Conventions
Syntax
Type Description Integer
Unknown Unknown type (0)
idIpv4Addr IPv4 address (1)
idFqdn Fully qualified domain name (2)
idDn Distinguished name (3)
idUfqdn User fully qualified domain name (4)
• JnxIkeNegoMode—The IPsec Phase 1 IKE negotiation mode (see Table 74 on page 295).
294 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 74: IKE Negotiation Mode Text Conventions
Syntax
Type Description Integer
Main mode A six-message Phase 1 exchange that provides identity (1)
protection
Aggressive mode A three-message Phase 1 exchange that does not (2)
provide identity protection
• JnxIkeHashAlgo—The hash algorithm used in IPsec Phase 1 IKE negotiations (see Table
75 on page 295).
Table 75: IKE Negotiations Hash Alogorithms
Hash
Alogorithm Syntax Integer
md5 (1)
sha (2)
• JnxIkeAuthMethod—The authentication method used in IPsec Phase 1 IKE negotiations
(see Table 76 on page 295).
Table 76: IKE Authentication Method
Method Syntax Integer
preSharedKey (1)
dssSignature (2)
rsaSignature (3)
rsaEncryption (4)
revRsaEncryption (5)
xauthPreSharedKey (6)
xauthDssSignature (7)
xauthRsaSignature (8)
xauthRsaEncryption (9)
xauthRevRsaEncryption (10)
Copyright © 2010, Juniper Networks, Inc. 295
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• JnxIkePeerRole—The role of the local endpoint in negotiating the IPsec Phase 1 IKE
security association (SA). It can be either initiator or responder (see Table 77 on
page 296).
Table 77: Role of Local Endpoint in Negotiations
Role Syntax Integer
Initiator (1)
Responder (2)
• JnxIkeTunStateType—State of the Phase 1 IKE negotiation (see Table 78 on page 296).
Table 78: State of Phase 1 IKE Negotiation
State Syntax Integer
Up (1)
Down (2)
• JnxDiffHellmanGrp—The Diffie-Hellman Group used in negotiations (see Table 79 on
page 296).
Table 79: Diffie-Hellman Group in Negotiations
Diffie Hellman Group Description Syntax Integer
Unknown Unknown (0)
modp768 768-bit MODP (1)
modp1024 1024-bit MODP (2)
modp1536 modp1536 (3)
• JnxKeyType—The type of key used by an IPsec Phase 2 Tunnel (see Table 80 on
page 296).
Table 80: Key Used by IPsec Phase 2 Tunnel
Key Syntax Integer
Unknown (0)
keyIke (1)
keyManual (2)
• JnxEncryptAlgo —The encryption algorithm used in negotiations (see Table 81 on
page 297).
296 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 81: Encryption Algorithm in Negotiations
Algorithm Syntax Integer
espDes (1)
esp3des (2)
espNull (3)
espAes128 (4)
espAes192 (5)
espAes256 (6)
• JnxAuthAlgo—The authentication algorithm used by an SA of an IPsec Phase 2 Tunnel
(see Table 82 on page 297).
Table 82: Role of Local Endpoint in Negotiations
Algorithm Syntax Integer
Unknown (0)
hmacMd5 (1)
hmacSha (2)
• JnxRemotePeerType—The type of the remote peer gateway (endpoint) (see Table 83
on page 297). .
Table 83: Type of Remote Peer Gateway
Gateway Type Syntax Integer and Description
Unknown (0)
static (1)
Static (remote peer whose IP address is known beforehand)
dynamic (2)
Dynamic (remote peer whose IP address is not known beforehand)
• JnxSpiType—The type of the SPI associated with IPsec Phase 2 SAs. An unsigned 32–bit
integer (256. . . 4294967295).
• JnxSAType—The SA type (see Table 84 on page 298).
Copyright © 2010, Juniper Networks, Inc. 297
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 84: Role of Local Endpoint in Negotiations
SA Type Syntax Integer
Unknown (0)
manual (1)
dynamic (2)
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Branch Tree Objects on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
Number of IKE Tunnels Currently Active
NOTE: The jnxIkeNumOfTunnels object is not supported in this release.
Table 85 on page 298 reports the number of IKE Tunnels currently active.
Table 85: Number of IKE Tunnels Currently Active
Object Object ID Description
jnxIkeNumOfTunnels jnxIpSecFlowMonPhaseOne Number of IKE Tunnels (Phase 1) actively negotiating between peers.
1 The SA can be in either the up or down state. This attribute details
the number of IKE tunnels in jnxIkeTunnelMonTable.
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Branch Tree Objects on page 294
• Text Conventions on page 294
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
IPsec Phase 1 IKE Tunnel Table
Table 86 on page 299 identifies objects listed in the IPsec Phase 1 IKE Tunnel Table.
298 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Phase 1 is used to negotiate the parameter and key material required to establish an
ISAKMP SA.
Phase 1 SA components include an encryption algorithm, authentication, Diffie-Hellman
group values, and anthentication methods, such as preshared keys or certificates.
Table 86: IPsec Phase 1 IKE Tunnel Table
Object Object ID Description
jnxIkeTunnelMonTable jnxIpSecFlowMonPhaseOne The IPsec Phase 1 IKE Tunnel Table. There is one entry in
2 this table for each active IPsec Phase 1 IKE tunnel.
jnxIkeTunnelMonEntry jnxIkeTunnelMonTable 1 Attributes associated with an active IPsec Phase 1 IKE
tunnel.
Sequence of attributes:
• jnxIkeTunMonRemoteGwAddrType
• jnxIkeTunMonRemoteGwAddr
• jnxIkeTunMonIndex
• jnxIkeTunMonLocalGwAddrType
• jnxIkeTunMonLocalGwAddr
• jnxIkeTunMonState
• jnxIkeTunMonInitiatorCookie
• jnxIkeTunMonResponderCookie
• jnxIkeTunMonLocalRole
• jnxIkeTunMonLocalIdType
• jnxIkeTunMonLocalIdValue
• jnxIkeTunMonLocalCertName
• jnxIkeTunMonRemoteIdType
• jnxIkeTunMonRemoteIdValue
• jnxIkeTunMonNegoMode
• jnxIkeTunMonDiffHellmanGrp (not supported in this
release)
• jnxIkeTunMonEncryptAlgo
• jnxIkeTunMonHashAlgo
• jnxIkeTunMonAuthMethod
• jnxIkeTunMonLifeTime
• jnxIkeTunMonActiveTime
• jnxIkeTunMonInOctets
• jnxIkeTunMonInPkts
• jnxIkeTunMonOutOctets
• jnxIkeTunMonOutPkts
• jnxIkeTunMonXAuthUserId
• jnxIkeTunMonDPDDownCount
jnxIkeTunMonRemoteGwAddrType jnxIkeTunnelMonEntry 1 IP address type of remote gateway (endpoint) for the IPsec
Phase 1 IKE tunnel.
Copyright © 2010, Juniper Networks, Inc. 299
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 86: IPsec Phase 1 IKE Tunnel Table (continued)
Object Object ID Description
jnxJsFwAuthClientIpAddr jnxJsAuthTrapVars 4 IP address of remote gateway (endpoint) for the IPsec
Phase 1 IKE tunnel.
jnxIkeTunMonIndex jnxIkeTunnelMonEntry 3 Index number of IPsec Phase 1 IKE Tunnel Table. The index
number begins at 1 and is incremented with each tunnel
that is created. The value of this object will wrap at
2,147,483,647.
jnxIkeTunMonLocalGwAddr jnxIkeTunnelMonEntry 4 IP address of local endpoint (gateway) for the IPsec Phase
1 IKE tunnel.
jnxIkeTunMonLocalGwAddrType jnxIkeTunnelMonEntry 5 IP address type of local endpoint (gateway) for the IPsec
Phase 1 IKE tunnel.
jnxIkeTunMonState jnxIkeTunnelMonEntry 6 State of IKE tunnel. It can be:
• 1—up, negotiation completed.
• 2—down, being negotiated.
jnxIkeTunMonInitiatorCookie jnxIkeTunnelMonEntry 7 Cookie as generated by peer that initiated the IKE Phase 1
negotiation. This cookie is carried in the ISAKMP header.
jnxIkeTunMonResponderCookie jnxIkeTunnelMonEntry 8 Cookie as generated by peer responding to the IKE Phase
1 negotiation initiated by the remote peer. This cookie is
carried in the ISAKMP header.
jnxIkeTunMonLocalRole jnxIkeTunnelMonEntry 9 Role of local peer identity. The role of the local peer can
be:
• Initiator
• Responder
jnxIkeTunMonLocalIdType jnxIkeTunnelMonEntry 10 Type of local peer identity. The local peer can be identified
by:
• IP address.
• Fully qualified domain name string.
• Distinguished name string.
jnxIkeTunMonLocalIdValue jnxIkeTunnelMonEntry 11 Value of local peer identity.
If the local peer type is an IP address, then this is the IP
address used to identify the local peer.
If the local peer type is a fully qualified domain name string,
then this is the fully qualified domain name string of the
local peer.
If the local peer type is a distinguished name string, then
this is the distinguished name string of the local peer.
300 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 86: IPsec Phase 1 IKE Tunnel Table (continued)
Object Object ID Description
jnxIkeTunMonLocalCertName jnxIkeTunnelMonEntry 12 Name of certificate used for authentication of the local
tunnel endpoint. This object has some valid value only if
the negotiated IKE authentication method is other than
preshared key. If the IKE negotiation does not use a
certificate-based authentication method, then the value
of this object is a NULL string.
jnxIkeTunMonRemoteIdType jnxIkeTunnelMonEntry 13 Type of remote peer identity. The remote peer can be
identified by:
• IP address.
• Fully qualified domain name string.
• Distinguished name string.
jnxIkeTunMonRemoteIdValue jnxIkeTunnelMonEntry 14 Value of remote peer identity.
If the remote peer type is an IP address, then this is the IP
address used to identify the remote peer.
If the remote peer type is a fully qualified domain name
string, then this is the fully qualified domain name string of
the remote peer.
If the remote peer type is a distinguished name string, then
this is the distinguished name string of the remote peer.
jnxIkeTunMonNegoMode jnxIkeTunnelMonEntry 15 Negotiation mode of IPsec Phase 1 IKE tunnel.
NOTE: The jnxIkeTunMonDiffHellmanGrp object is not supported in this release.
jnxIkeTunMonDiffHellmanGrp jnxIkeTunnelMonEntry 16 Diffie-Hellman Group used in IPsec Phase 1 IKE
negotiations.
jnxIkeTunMonEncryptAlgo jnxIkeTunnelMonEntry 17 Encryption algorithm used in IPsec Phase 1 IKE negotiations.
jnxIkeTunMonHashAlgo jnxIkeTunnelMonEntry 18 Hash algorithm used in IPsec Phase 1 IKE negotiations.
jnxIkeTunMonAuthMethod jnxIkeTunnelMonEntry 19 Authentication method used in IPsec Phase 1 IKE
negotiations.
jnxIkeTunMonLifeTime jnxIkeTunnelMonEntry 20 Negotiated lifetime of IPsec Phase 1 IKE tunnel in seconds.
jnxIkeTunMonActiveTime jnxIkeTunnelMonEntry 21 Length of time IPsec Phase 1 IKE tunnel has been active in
hundredths of seconds.
jnxIkeTunMonInOctets jnxIkeTunnelMonEntry 22 Total number of octets received by this IPsec Phase 1 IKE
SA.
jnxIkeTunMonInPkts jnxIkeTunnelMonEntry 23 Total number of packets received by this IPsec Phase 1 IKE
SA.
Copyright © 2010, Juniper Networks, Inc. 301
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 86: IPsec Phase 1 IKE Tunnel Table (continued)
Object Object ID Description
jnxIkeTunMonOutOctets jnxIkeTunnelMonEntry 24 Total number of octets sent by this IPsec Phase 1 IKE SA.
jnxIkeTunMonOutPkts jnxIkeTunnelMonEntry 25 Total number of packets sent by this IPsec Phase 1 IKE SA.
jnxIkeTunMonXAuthUserId jnxIkeTunnelMonEntry 26 Extended Authentication (XAuth) User Identifier. Identifies
the user associated with this IPsec Phase 1 negotiation.
jnxIkeTunMonDPDDownCount jnxIkeTunnelMonEntry 27 Number of times that the remote peer is detected in a dead
(or down) state.
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Branch Tree Objects on page 294
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
• IPsec Phase 2 Security Association Table on page 305
IPsec Phase 2 IKE Tunnel Table
Table 87 on page 302 identifies objects listed in the IPsec Phase 2 IKE Tunnel Table.
During this phase, IKE negotiates IPsec SA parameters and setup, matching IPsec SA in
the peers.
Phase 2 VPN includes tunnel peer connection, associated with a specific policy or a tunnel
interface. Phase 2 SA components include encryption and authentication algorithms,
proxy-IDs, and optional DH group values.
Table 87: IPsec Phase 2 IKE Tunnel Table
Object Object ID Description
NOTE: The jnxIpSecNumOfTunnels object is not supported in this release.
jnxIpSecNumOfTunnels jnxIpSecFlowMonPhaseTwo Number of IPsec VPN tunnels. This attribute should
1 report the number of IPsec VPN tunnels in
jnxIpSecTunnelTable.
jnxIpSecTunnelMonTable jnxIpSecFlowMonPhaseTwo The IPsec Phase 2 Tunnel Table. There is one entry in
2 this table for each active IPsec Phase 2 tunnel. If the
tunnel is terminated, then the entry is no longer available
after the table has been refreshed.
302 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 87: IPsec Phase 2 IKE Tunnel Table (continued)
Object Object ID Description
jnxIpSecTunnelMonEntry jnxIpSecTunnelMonTable 1 Each entry contains the attributes associated with an
active IPsec Phase 2 tunnel.
Sequence of attributes:
• jnxIpSecTunMonRemoteGwAddrType
• jnxIpSecTunMonRemoteGwAddr
• jnxIpSecTunMonIndex
• jnxIpSecTunMonLocalGwAddrType
• jnxIpSecTunMonLocalGwAddr
• jnxIpSecTunMonLocalProxyId
• jnxIpSecTunMonRemoteProxyId
• jnxIpSecTunMonKeyType
• jnxIpSecTunMonRemotePeerType
• jnxIpSecTunMonOutEncryptedBytes
• jnxIpSecTunMonOutEncryptedPkts
• jnxIpSecTunMonInDecryptedBytes
• jnxIpSecTunMonInDecryptedPkts
• jnxIpSecTunMonAHInBytes
• jnxIpSecTunMonAHInPkts
• jnxIpSecTunMonAHOutBytes
• jnxIpSecTunMonAHOutPkts
• jnxIpSecTunMonReplayDropPkts
• jnxIpSecTunMonAhAuthFails
• jnxIpSecTunMonDecryptFails
• jnxIpSecTunMonBadHeaders
• jnxIpSecTunMonBadTrailers
• jnxIkeTunMonOutOctets
• jnxIpSecTunMonDroppedPkts (not supported in this
release)
jnxIpSecTunMonRemoteGwAddrType jnxIpSecTunnelMonEntry 1 IP address type of remote gateway (endpoint) for the
IPsec Phase 2 tunnel.
jnxIpSecTunMonRemoteGwAddr jnxIpSecTunnelMonEntry 2 IP address of remote gateway (endpoint) for the IPsec
Phase 2 tunnel.
jnxIpSecTunMonIndex jnxIpSecTunnelMonEntry 3 Index number of IPsec Phase 2 Tunnel Table. The index
number begins at 1 and is incremented with each tunnel
that is created. The value of this object will wrap at
2,147,483,647.
jnxIpSecTunMonLocalGwAddrType jnxIpSecTunnelMonEntry 4 IP address type of local gateway (endpoint) for the IPsec
Phase 2 tunnel.
jnxIpSecTunMonLocalGwAddr jnxIpSecTunnelMonEntry 5 IP address of local gateway (endpoint) for the IPsec
Phase 2 tunnel.
Copyright © 2010, Juniper Networks, Inc. 303
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 87: IPsec Phase 2 IKE Tunnel Table (continued)
Object Object ID Description
jnxIpSecTunMonLocalProxyId jnxIpSecTunnelMonEntry 6 Identifier for local end.
jnxIpSecTunMonRemoteProxyId jnxIpSecTunnelMonEntry 7 Identifier for remote end.
jnxIpSecTunMonKeyType jnxIpSecTunnelMonEntry 8 Type of key used by IPsec Phase 2 tunnel. It can be one
of the following two types:
• IKE-negotiated
• Manually installed
jnxIpSecTunMonRemotePeerType jnxIpSecTunnelMonEntry 9 Type of the remote peer gateway (endpoint). It can be
one of the following two types:
• Static (remote peer whose IP address is known
beforehand)
• Dynamic (remote peer whose IP address is not known
beforehand)
jnxIpSecTunMonOutEncryptedBytes jnxIpSecTunnelMonEntry 10 Number of bytes encrypted by this Phase 2 tunnel.
jnxIpSecTunMonOutEncryptedPkts jnxIpSecTunnelMonEntry 11 Number of packets encrypted by this Phase 2 tunnel.
jnxIpSecTunMonInDecryptedBytes jnxIpSecTunnelMonEntry 12 Number of bytes decrypted by this Phase 2 tunnel.
jnxIpSecTunMonInDecryptedPkts jnxIpSecTunnelMonEntry 13 Number of packets decrypted by this Phase 2 tunnel.
jnxIpSecTunMonAHInBytes jnxIpSecTunnelMonEntry 14 Number of incoming bytes authenticated using AH by
this Phase 2 tunnel.
jnxIpSecTunMonAHInPkts jnxIpSecTunnelMonEntry 15 Number of incoming packets authenticated using AH
by this Phase 2 tunnel.
jnxIpSecTunMonAHOutBytes jnxIpSecTunnelMonEntry 16 Number of outgoing bytes applied AH by this Phase 2
tunnel.
jnxIpSecTunMonAHOutPkts jnxIpSecTunnelMonEntry 17 Number of outgoing packets applied AH by this Phase
2 tunnel.
jnxIpSecTunMonReplayDropPkts jnxIpSecTunnelMonEntry 18 Number of packets dropped by this Phase 2 tunnel due
to antireplay check failure.
jnxIpSecTunMonAhAuthFails jnxIpSecTunnelMonEntry 19 Number of packets received by this Phase 2 tunnel that
failed AH authentication.
jnxIpSecTunMonEspAuthFails jnxIpSecTunnelMonEntry 20 Number of packets received by this Phase 2 tunnel that
failed ESP authentication.
jnxIpSecTunMonDecryptFails jnxIpSecTunnelMonEntry 21 Number of packets received by this Phase 2 tunnel that
failed decryption.
304 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 87: IPsec Phase 2 IKE Tunnel Table (continued)
Object Object ID Description
jnxIpSecTunMonBadHeaders jnxIpSecTunnelMonEntry 22 Number of packets received by this Phase 2 tunnel that
failed due to bad headers.
jnxIpSecTunMonBadTrailers jnxIpSecTunnelMonEntry 23 Number of packets received by this Phase 2 tunnel that
failed due to bad ESP trailers.
NOTE: The jnxIpSecTunMonDroppedPkts object is not supported in this release.
jnxIpSecTunMonDroppedPkts jnxIpSecTunnelMonEntry 26 Total number of dropped packets for this Phase 2
tunnel.
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Branch Tree Objects on page 294
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 Security Association Table on page 305
IPsec Phase 2 Security Association Table
jnxIpSecSaMonTable, whose object ID is {jjnxIpSecFlowMonPhaseTwo 3}, identifies the
objects listed in Table 88 on page 306. The IPsec Phase 2 Security Association table
identifies the structure (in terms of component SAs) of each active Phase 2 IPsec tunnel.
This table contains an entry for each active and expiring SA and maps each entry in the
active Phase 2 tunnel table (ipSecTunTable) into a number of entries in this table.
The SA contains the information negotiated by IKE. The SA is like a contract laying out
the rules of the VPN connection for the duration of the SA. An SA is assigned a 32-bit
number that, when used in conjunction with the destination IP address, uniquely identifies
the SA. This number is called the Security Parameters Index (SPI).
IPsec SAs are unidirectional and are unique in each security protocol. A set of SAs is
needed for a protected data pipe, one per direction per protocol.
Copyright © 2010, Juniper Networks, Inc. 305
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 88: IPsec Phase 2 Security Association Table
Object Object ID Description
jnxIpSecSaMonEntry jnxIpSecSaMonTable 1 Each entry contains the attributes associated with active and
expiring IPsec Phase 2 SAs.
Sequence of parameters:
• jnxIpSecSaMonIndex
• jnxIpSecSaMonProtocol
• jnxIpSecSaMonInSpi
• jnxIpSecSaMonOutSpi
• jnxIpSecSaMonType
• jnxIpSecSaMonEncapMode
• jnxIpSecSaMonLifeSize
• jnxIpSecSaMonLifeTime
• jnxIpSecSaMonActiveTime
• jnxIpSecSaMonLifeSizeThreshold (not supported in this
release)
• jnxIpSecSaMonLifeTimeThreshold
• jnxIpSecSaMonEncryptAlgo
• jnxIpSecSaMonAuthAlgo
• jnxIpSecSaMonState
jnxIpSecSaMonIndex jnxIpSecSaMonEntry 1 Index number, in the context of the IPsec tunnel
ipSecTunIndex, of the SA represented by this table entry. The
index number begins at 1 and is incremented with each SPI
associated with an IPsec Phase 2 tunnel. The value of this
object will wrap at 65535.
jnxIpSecSaMonProtocol jnxIpSecSaMonEntry 2 Index number that represents the security protocol (AH, ESP
or IPComp) for which this SA was set up.
jnxIpSecSaMonInSpi jnxIpSecSaMonEntry 3 Value of the incoming SPI.
jnxIpSecSaMonOutSpi jnxIpSecSaMonEntry 4 Value of the outgoing SPI.
jnxIpSecSaMonType jnxIpSecSaMonEntry 5 Types of SAs that can be either manual or dynamic.
jnxIpSecSaMonEncapMode jnxIpSecSaMonEntry 6 Encapsulation mode used by an IPsec Phase 2 tunnel.
jnxIpSecSaMonLifeSize jnxIpSecSaMonEntry 7 Negotiated lifesize of the IPsec Phase 2 tunnel in kilobytes
jnxIpSecSaMonLifeTime jnxIpSecSaMonEntry 8 Negotiated lifetime of the IPsec Phase 2 tunnel in seconds.
jnxIpSecSaMonActiveTime jnxIpSecSaMonEntry 9 Length of time the IPsec Phase 2 tunnel has been active in
hundredths of seconds.
NOTE: The jnxIpSecSaMonLifeSizeThreshold object is not supported in this release.
jnxIpSecSaMonLifeSizeThreshold jnxIpSecSaMonEntry 10 SA lifesize refresh threshold in kilobytes.
306 Copyright © 2010, Juniper Networks, Inc.
Chapter 23: Interpreting the Enterprise-Specific IPsec Generic Flow Monitoring Object MIB
Table 88: IPsec Phase 2 Security Association Table (continued)
Object Object ID Description
jnxIpSecSaMonLifeTimeThreshold jnxIpSecSaMonEntry 11 SA lifetime refresh threshold in seconds.
jnxIpSecSaMonEncryptAlgo jnxIpSecSaMonEntry 12 Encryption algorithm used to encrypt the packets that can be
either es-cbc or 3des-cbc.
jnxIpSecSaMonAuthAlgo jnxIpSecSaMonEntry 13 Algorithm used for authentication of packets that can be
hmac-md5-96 or hmac-sha1-96.
jnxIpSecSaMonState jnxIpSecSaMonEntry 14 This column represents the status of the SA represented by
this table entry. If the status of the SA is active, the SA is ready
for active use. The status expiring represents any of the various
states that the SA transitions through before being purged.
Related • IPsec Generic Flow Monitoring Object MIB on page 293
Documentation
• Branch Tree Objects on page 294
• Text Conventions on page 294
• Number of IKE Tunnels Currently Active on page 298
• IPsec Phase 1 IKE Tunnel Table on page 298
• IPsec Phase 2 IKE Tunnel Table on page 302
Copyright © 2010, Juniper Networks, Inc. 307
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
308 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 24
Interpreting the Enterprise-Specific IPsec
Monitoring MIB
• IPSec Monitoring MIB on page 309
• jnxIkeTunnelTable on page 309
• jnxIPSecTunnelTable on page 312
• jnxIPSecSaTable on page 315
IPSec Monitoring MIB
The Juniper Networks enterprise-specific IPsec Monitoring MIB, whose object identifier
is {jnxMibs 22}, provides operational and statistical information related to the IPsec and
Internet Key Exchange (IKE) tunnels on Juniper Networks routers. For a downloadable
version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipsec-monitor-asp.txt
.
For information about IPsec Monitoring MIB objects, see the following topics:
• jnxIkeTunnelTable on page 309
• jnxIPSecTunnelTable on page 312
• jnxIPSecSaTable on page 315
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxIkeTunnelTable
The IKE tunnel table (jnxIkeTunnelTable), whose object identifier is {jnxIPSecPhaseOne
1}, is used to monitor the IKE security associations established with the remote peers.
The MIB variables in this table are used to display the IKE SA attributes and the SA
statistics. There is one entry for each IKE SA present.
The key for this table is the combination of a service set name, remote gateway address,
and the IKE tunnel index. The service set name is used from the jnxSpSvcSetTable which
Copyright © 2010, Juniper Networks, Inc. 309
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
is implemented as part of the Services PIC MIB. The SNMP manager uses the
jnxSpSvcSetTable to get the service set name and this information can then be used to
query the jnxIkeTunnelTable for the given service set.
To get only IKE tunnels specific to a particular remote gateway in a service set, the SNMP
manager can specify the corresponding service set name and the remote gateway address
in the query.
The jnxIkeTunnelEntry, whose object identifier is {jnxIkeTunnelTable 1}, has 25 objects,
which are listed in Table 89 on page 310. Each entry contains attributes associated with
an active IPsec phase 1 IKE tunnel.
Table 89: jnxIkeTunnelTable
Object Object Identifier Description
jnxIkeTunIndex jnxIkeTunnelEntry 1 Index for the table. The value of the index is a
number that begins at 1 and is incremented
with each tunnel that is created. When the
index number reaches 2,147,483,647 the value
wraps back to 1.
jnxIkeTunLocalRole jnxIkeTunnelEntry 2 The role of the local peer identity. The role can
be initiator or responder.
jnxIkeTunNegState jnxIkeTunnelEntry 3 The state of the current negotiation. The state
can be matured or non matured.
jnxIkeTunInitiatorCookie jnxIkeTunnelEntry Cookie generated by the peer that initiated
4 the IKE phase 1 negotiation. This cookie is
carried in the ISAKMP header.
jnxIkeTunResponderCookie jnxIkeTunnelEntry 5 Cookie generated by the peer responding to
the IKE phase 1 negotiation. This cookie is
carried in the ISAKMP header.
jnxIkeTunLocalIdType jnxIkeTunnelEntry The type of local peer identity. A local peer
6 can be identified by an IP address, a fully
qualified domain name (FQDN), or a
distinguished name.
jnxIkeTunLocalIdValue jnxIkeTunnelEntry 7 The value of the local peer identity.
• If the local peer type is an IP address, then
this is the IP address used to identify the
local peer.
• If the local peer type is an FQDN(if_fqdn),
then this is the FQDN of the remote peer.
• If the local peer type is a distinguished
name (id_dn), then this is the distinguished
name of the local peer.
jnxIkeTunLocalGwAddrType jnxIkeTunnelEntry The IP address type of the local endpoint
8 (gateway) for the IPsec phase 1 IKE tunnel.
310 Copyright © 2010, Juniper Networks, Inc.
Chapter 24: Interpreting the Enterprise-Specific IPsec Monitoring MIB
Table 89: jnxIkeTunnelTable (continued)
Object Object Identifier Description
jnxIkeTunLocalGwAddr jnxIkeTunnelEntry The IP address of the local endpoint
9 (gateway) for the IPsec phase 1 IKE tunnel.
jnxIkeTunLocalCertName jnxIkeTunnelEntry The name of the certificate used for
10 authentication of the local tunnel endpoint.
This object has a valid value only if the
negotiated IKE authentication method is
something other than a preshared key. If the
IKE negotiation does not use certificates for
authentication, the value is NULL.
jnxIkeTunRemoteIdType jnxIkeTunnelEntry The type of remote peer identity. A remote
11 peer can be identified by an IP address, an
FQDN, or a distinguished name.
jnxIkeTunRemoteIdValue jnxIkeTunnelEntry The value of the remote peer identity.
12
• If the remote peer type is an IP address,
then this is the IP address used to identify
the remote peer.
• If the remote peer type is an FQDN (if_fqdn),
then this is the FQDN of the remote peer.
• If the remote peer type is a distinguished
name (id_dn), then this is the distinguished
name of the remote peer.
jnxIkeTunRemoteGwAddrType jnxIkeTunnelEntry The IP address type of the remote gateway
13 (endpoint) for the IPsec phase 1 IKE tunnel.
jnxIkeTunRemoteGwAddr jnxIkeTunnelEntry The IP address of the remote gateway
14 (endpoint) for the IPsec phase 1 IKE tunnel.
jnxIkeTunNegoMode jnxIkeTunnelEntry The negotiation mode of the IPsec phase 1 IKE
15 tunnel.
jnxIkeTunDiffHellmanGrp jnxIkeTunnelEntry The Diffie Hellman Group used in IPsec phase 1
16 IKE negotiations.
jnxIkeTunEncryptAlgo jnxIkeTunnelEntry The encryption algorithm used in IPsec phase 1
17 IKE negotiations.
jnxIkeTunHashAlgo jnxIkeTunnelEntry The hash algorithm used in IPsec phase 1 IKE
18 negotiations.
jnxIkeTunAuthMethod jnxIkeTunnelEntry The authentication method used in IPsec
19 phase 1 IKE negotiations.
jnxIkeTunLifeTime jnxIkeTunnelEntry The negotiated lifetime (in seconds) of the
20 IPsec phase 1 IKE tunnel.
Copyright © 2010, Juniper Networks, Inc. 311
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 89: jnxIkeTunnelTable (continued)
Object Object Identifier Description
jnxIkeTunActiveTime jnxIkeTunnelEntry The length of time (in hundredths of seconds)
21 that the IPsec phase 1 IKE tunnel has been
active.
jnxIkeTunInOctets jnxIkeTunnelEntry The total number of octets received by this
22 IPsec phase 1 IKE security association.
jnxIkeTunInPkts jnxIkeTunnelEntry The total number of packets received by this
23 IPsec phase 1 IKE security association.
jnxIkeTunOutOcets jnxIkeTunnelEntry The total number of octets sent by this IPsec
24 phase 1 IKE security association.
jnxIkeTunOutPkts jnxIkeTunnelEntry The total number of octets sent by this IPsec
25 phase 1 IKE security association.
Related • IPSec Monitoring MIB on page 309
Documentation
• jnxIPSecTunnelTable on page 312
• jnxIPSecSaTable on page 315
jnxIPSecTunnelTable
The IPsec phase 2 tunnel table jnxIPSecTunnelTable), whose object identifier is
{jnxIPSecPhaseTwo 1}, is used to monitor the IPsec phase 2 tunnel attributes along with
the statistics for the tunnel. There is one entry for each tunnel to the peer security gateway.
This table does not contain information about IPsec security associations (SAs) because
multiple SAs can be present for each tunnel.
Similar to the IKE tunnel table (jnxIkeTunnelTable), the key of this table is a combination
of the service set name, remote gateway address, and the IPsec tunnel index. This table
can be queried just like the IKE tunnel table.
To get only IPsec tunnels specific to a particular remote gateway in a service set, the
SNMP manager can specify the corresponding service set name and the remote gateway
address in the query.
The jnxIPSecTunnelEntry, whose object identifier is {jnxIPSecTunnelTable 1}, has 27
objects, which are listed in Table 90 on page 313. Each entry contains attributes associated
with an active IPsec phase 2 tunnel.
312 Copyright © 2010, Juniper Networks, Inc.
Chapter 24: Interpreting the Enterprise-Specific IPsec Monitoring MIB
Table 90: jnxIPSecTunnelTable
Object Object Identifier Description
jnxIPSecTunIndex jnxIPSecTunnelEntry Index for the table. The value of the index
1 is a number that begins at 1 and is
incremented with each tunnel that is
created. When the index number reaches
2,147,483,647 the value wraps back to 1.
jnxIPSecRuleName jnxIPSecTunnelEntry The name of the rule defined in the IPsec
2 configuration.
jnxIPSecTermName jnxIPSecTunnelEntry The name of the term configured under
3 the IPsec rule.
jnxIPSecTunLocalGwAddrType jnxIPSecTunnelEntry The IP address type of the local gateway
4 (endpoint) for the IPsec phase 2 tunnel.
jnxIPSecTunLocalGwAddr jnxIPSecTunnelEntry The IP address of the local gateway
5 (endpoint) for the IPsec phase 2 tunnel.
jnxIPSecTunRemoteGwAddrType jnxIPSecTunnelEntry The IP address type of the remote
6 gateway (endpoint) for the IPsec phase 2
tunnel.
jnxIPSecTunRemoteGwAddr jnxIPSecTunnelEntry The IP address of the remote gateway
7 (endpoint) for the IPsec phase 2 tunnel.
jnxIPSecTunLocalProxyId jnxIPSecTunnelEntry The identifier for the local endpoint.
8
jnxIPSecTunRemoteProxyId jnxIPSecTunnelEntry The identifier for the remote endpoint.
9
jnxIPSecTunKeyType jnxIPSecTunnelEntry The type of key used by the IPsec phase 2
10 tunnel. The key type can be IKE negotiated
or Manually installed.
jnxIPSecRemotePeerType jnxIPSecTunnelEntry The type of the remote peer gateway
11 (endpoint). If the remote peer’s IP
address is known beforehand, the type is
static. If the IP address is not known
beforehand, the type is dynamic.
jnxIPSecTunMtu jnxIPSecTunnelEntry The maximum transmission unit (MTU)
12 value of the IPsec phase 2 tunnel.
jnxIPSecTunOutEncryptedBytes jnxIPSecTunnelEntry The number of bytes encrypted by the
13 IPsec phase 2 tunnel.
jnxIPSecTunOutEncryptedPkts jnxIPSecTunnelEntry The number of packets encrypted by the
14 IPsec phase 2 tunnel.
Copyright © 2010, Juniper Networks, Inc. 313
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 90: jnxIPSecTunnelTable (continued)
Object Object Identifier Description
jnxIPSecTunInDecryptedBytes jnxIPSecTunnelEntry The number of bytes decrypted by the
15 IPsec phase 2 tunnel.
jnxIPSecTunInDecryptedPkts jnxIPSecTunnelEntry The number of packets decrypted by the
16 IPsec phase 2 tunnel.
jnxIPSecTunAHInBytes jnxIPSecTunnelEntry The number of incoming bytes
17 authenticated using the authentication
header (AH) by the IPsec phase 2 tunnel.
jnxIPSecTunAHInPkts jnxIPSecTunnelEntry The number of incoming packets
18 authenticated using the authentication
header (AH) by the IPsec phase 2 tunnel.
jnxIPSecTunAHOutBytes jnxIPSecTunnelEntry The number of outgoing bytes on the
19 IPsec phase 2 tunnel where the AH is
applied.
jnxIPSecTunHAOutPkts jnxIPSecTunnelEntry The number of outgoing packets on the
20 IPsec phase 2 tunnel where the AH is
applied.
jnxIPSecTunReplayDropPkts jnxIPSecTunnelEntry The number of packets dropped by the
21 IPsec phase 2 tunnel because of an
anti-replay check failure.
jnxIPSecTunAhAuthFails jnxIPSecTunnelEntry The number of packets received by the
22 IPsec phase 2 tunnel that failed AH
authentication.
jnxIPSecTunEspAuthFails jnxIPSecTunnelEntry The number of packets received by this
23 IPsec phase 2 tunnel that failed ESP
authentication.
jnxIPSecTunDecryptFails jnxIPSecTunnelEntry The number of packets received by this
24 IPsec phase 2 tunnel that failed
decryption.
jnxIPSecTunBadHeaders jnxIPSecTunnelEntry The number of packets received by this
25 IPsec phase 2 tunnel that failed because
of bad headers.
jnxIPSecTunBadTrailers jnxIPSecTunnelEntry The number of packets received by this
26 IPsec phase 2 tunnel that failed because
of bad ESP trailers.
jnxIPSecTunDroppedPkts jnxIPSecTunnelEntry The total number of packets dropped
27 from this IPsec phase 2 tunnel.
314 Copyright © 2010, Juniper Networks, Inc.
Chapter 24: Interpreting the Enterprise-Specific IPsec Monitoring MIB
Related • IPSec Monitoring MIB on page 309
Documentation
• jnxIkeTunnelTable on page 309
• jnxIPSecSaTable on page 315
jnxIPSecSaTable
The IPsec phase 2 security association table (jnxIPSecSaTable), whose object identifier
is {jnxIPSecPhaseTwo 2}, is used to monitor the IPsec SAs present for each tunnel in the
IPsec tunnel table (jnxIPSecTunnelTable). More than one pair of SAs can be present for
each of the IPsec tunnels.
The key for this table is a combination of a service set name, remote gateway address,
IPsec tunnel index, and the SA index. While the IPsec tunnel table is queried using the
service set name, the SA table can be queried for the IPsec tunnel using the service set
name, remote gateway address, and the IPsec tunnel index.
The jnxIPSecSaEntry, whose object identifier is {jnxIPSecSaTable 1}, has 16 objects, which
are listed in Table 91 on page 315. Each entry contains SA components for an active IPsec
phase 2 tunnel.
Table 91: jnxIPSecSaTable
Object Object Identifier Description
jnxIpSecSaProtocol jnxIpSecSaEntry 1 The index represents the security protocol
(AH, ESP, or IPComp) for which the SA was
created.
jnxIpSecSaIndex jnxIpSecSaEntry 2 The index (in the context of the IPsec tunnel)
for the SA. The value of the index is a number
that begins at 1 and is incremented with each
security parameter index (SPI) associated
with an IPsec phase 2 tunnel. When the index
number reaches 2,147,483,647 the value
wraps back to 1.
jnxIpSecSaInSpi jnxIpSecSaEntry 3 The value of the incoming SPI.
jnxIpSecSaOutSpi jnxIpSecSaEntry 4 The value of the outgoing SPI.
jnxIpSecSaInAuxSpi jnxIpSecSaEntry 5 The value of the incoming auxiliary SPI. This
object is valid for AH and ESP bundles.
jnxIpSecSaOutAuxSpi jnxIpSecSaEntry 6 The value of the outgoing auxiliary SPI. This
object is valid for AH and ESP bundles.
jnxIpSecSaType jnxIpSecSaEntry 7 The type of SA (manual or dynamic).
jnxIpSecSaEncapMode jnxIpSecSaEntry 8 The encapsulation mode used by the IPsec
phase 2 tunnel.
Copyright © 2010, Juniper Networks, Inc. 315
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 91: jnxIPSecSaTable (continued)
Object Object Identifier Description
jnxIpSecSaLifeSize jnxIpSecSaEntry 9 The negotiated size (in kilobytes) of the IPsec
phase 2 tunnel.
jnxIpSecSaLifeTime jnxIpSecSaEntry 10 The negotiated lifetime (in seconds) of the
IPsec phase 2 tunnel.
jnxIpSecSaActiveTime jnxIpSecSaEntry 11 The number of seconds the IPsec phase 2
tunnel has been active.
jnxIpSecSaLifeSizeThreshold jnxIpSecSaEntry 12 The refresh threshold (in kilobytes) of the SA
size.
jnxIpSecSaLifeTimeThreshold jnxIpSecSaEntry 13 The refresh threshold (in seconds) of the SA
lifetime.
jnxIpSecSaEncryptAlgo jnxIpSecSaEntry 14 The algorithm used to encrypt the packets
(es-cbc or 3des-cbc).
jnxIpSecSaAuthAlgo jnxIpSecSaEntry 15 The algorithm used to authenticate the
packets (hmac-md5-96 or hmac-sha1-96).
jnxIpSecSaState jnxIpSecSaEntry 16 The status of the SA. Status can be active
(ready for active use) or expiring (any state
an SA goes through before being purged).
Related • IPSec Monitoring MIB on page 309
Documentation
• jnxIkeTunnelTable on page 309
• jnxIPSecTunnelTable on page 312
316 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 25
Interpreting the Enterprise-Specific IPv4
MIB
• IPv4 MIB on page 317
• jnxIpv4AddrTable on page 317
IPv4 MIB
The Juniper Networks enterprise-specific IPv4 MIB, whose object identifier is {jnxMibs12},
functions as an extension of the ifTable defined in RFC 1573, IF MIB, and defines the
branches for IPV4 configuration.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipv4.txt
For information about the enterprise-specific IPv4 MIB objects, see the following topics:
• jnxIpv4AddrTable on page 317
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxIpv4AddrTable
The jnxIpv4AddrTable defines the jnxIpv4AddrEntry and its attributes. Each
jnxIpv4AddrEntry contains the objects listed in Table 92 on page 317.
Table 92: jnxIpv4AddrTable
Object Object ID Description
jnxIpv4AdEntIfIndex jnxIpv4AddrEntry 1 A unique index value that identifies the interface with which a particular
entry is associated. An interface identified by a particular value of
jnxIpv4AdEntIfIndex is the same as the interface that is identified by the
same value of ifIndex as defined in RFC 1573.
jnxIpv4AdEntAddr jnxIpv4AddrEntry 2 The IP address of the interface with which the address information stored
in this entry is associated.
Copyright © 2010, Juniper Networks, Inc. 317
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 92: jnxIpv4AddrTable (continued)
Object Object ID Description
jnxIpv4AdEntNetMask jnxIpv4AddrEntry 3 The subnet mask associated with the IP address of this entry. The value
of the mask is an IP address with all the network bits set to 1 and all the
host bits set to 0.
jnxIpv4AdEntBcastAddr jnxIpv4AddrEntry 4 The least significant bit in the IP broadcast address used for sending
datagrams on the logical interface associated with the IP address of this
entry. For example, when the Internet standard all-ones broadcast
address is used, the value is 1. This value applies to both the subnet and
network broadcast addresses used by the entry on the logical interface.
jnxIpv4AdEntReasmMaxSize jnxIpv4AddrEntry 5 The size of the largest IP datagram that this entry can reassemble from
the incoming fragmented IP datagrams received on the interface.
Related • IPv4 MIB on page 317
Documentation
318 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 26
Interpreting the Enterprise-Specific IPv6
MIB
This chapter contains the following topics:
• IPv6 MIB Overview on page 319
• jnxIpv6GlobalStats on page 319
• jnxIcmpv6GlobalStats on page 322
IPv6 MIB Overview
The Juniper Networks enterprise-specific IPv6 MIB, whose object identifier is { jnxMibs 11
}, functions as an extension of the ifTable defined in RFC 2465, IF MIB, and defines the
branches of IPv6 configuration.
For a downloadable version of the IPv6 MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ipv6.txt
.
For more information about the enterprise-specific IPv6 MIBs, see the following topics:
• jnxIpv6GlobalStats on page 319
• jnxIcmpv6GlobalStats on page 322
Related • Standard SNMP MIBs Supported by Junos OS on page 12
Documentation
• Juniper Networks Enterprise-Specific MIBs on page 23
jnxIpv6GlobalStats
The jnxIpv6GlobalStats, whose object ID is { jnxIpv6Stats 1 }, represents the
jnxIpv6GlobalStats branch of IPv6 stats. Table 93 on page 319 identifies objects in the
jnxIpv6GlobalStats branch.
Table 93: jnxIpv6GlobalStats
Object Object ID Description
jnxIpv6StatsReceives { jnxIpv6GlobalStats 1 } The total number of IPv6 packets received.
Copyright © 2010, Juniper Networks, Inc. 319
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 93: jnxIpv6GlobalStats (continued)
Object Object ID Description
jnxIpv6StatsTooShorts { jnxIpv6GlobalStats 2 } The total number of IPv6 packets received with size smaller
than minimum.
jnxIpv6StatsTooSmalls { jnxIpv6GlobalStats 3 } The total number of IPv6 packets with data size less than data
length.
jnxIpv6StatsBadOptions { jnxIpv6GlobalStats 4} The total number of IPv6 packets encountering errors in option
processing.
jnxIpv6StatsBadVersions { jnxIpv6GlobalStats 5 } The total number of IPv6 packets with incorrect version
number.
jnxIpv6StatsFragments { jnxIpv6GlobalStats 6 } The total number of packet fragments received.
jnxIpv6StatsFragDrops { jnxIpv6GlobalStats 7 } The total number of fragments dropped (duplicates or out of
pace).
jnxIpv6StatsFragTimeOuts { jnxIpv6GlobalStats 8 } The total number of fragments dropped due to timeout.
jnxIpv6StatsFragOverFlows { jnxIpv6GlobalStats 9 } The total number of fragments that exceeded limit.
jnxIpv6StatsReasmOKs { jnxIpv6GlobalStats 10 } The total number of IPv6 packets reassembled successfully.
jnxIpv6StatsDelivers { jnxIpv6GlobalStats 11 } The total number of IPv6 packets delivered to the upper layers.
jnxIpv6StatsForwards { jnxIpv6GlobalStats 12 } The total number of IPv6 packets forwarded.
jnxIpv6StatsUnreachables { jnxIpv6GlobalStats 13 } The total number of IPv6 packets received for unreachable
destinations.
jnxIpv6StatsRedirects { jnxIpv6GlobalStats 14 } The total number of IPv6 packets forwarded on the same net
as received.
jnxIpv6StatsOutRequests { jnxIpv6GlobalStats 15 } The total number of IPv6 packets generated by the current
host.
jnxIpv6StatsRawOuts { jnxIpv6GlobalStats 16 } The total number of IPv6 packets sent with fabricated IPv6
headers.
jnxIpv6StatsOutDiscards { jnxIpv6GlobalStats 17 } The total number of output IPv6 packets dropped due to no
bufs and so on.
jnxIpv6StatsOutNoRoutes { jnxIpv6GlobalStats 18 } The total number of output IPv6 packets discarded because
no route was found.
jnxIpv6StatsOutFragOKs { jnxIpv6GlobalStats 19 } The total number of output IPv6 packets fragmented.
jnxIpv6StatsOutFragCreates { jnxIpv6GlobalStats 20 } The total number of output IPv6 packets that have been
generated as a result of fragmentation at the output interface.
320 Copyright © 2010, Juniper Networks, Inc.
Chapter 26: Interpreting the Enterprise-Specific IPv6 MIB
Table 93: jnxIpv6GlobalStats (continued)
Object Object ID Description
jnxIpv6StatsOutFragFails { jnxIpv6GlobalStats 21 } The total number of output IPv6 packets that cannot be
fragmented.
jnxIpv6StatsBadScopes { jnxIpv6GlobalStats 22 } The total number of IPv6 packets that violate scope rules.
jnxIpv6StatsNotMcastMembers { jnxIpv6GlobalStats 23 } The total number of IPv6 multicast packets which the users
do not join.
jnxIpv6StatsHdrNotContinuous { jnxIpv6GlobalStats 24 } The total number of IPv6 packets whose headers are not
continuous.
jnxIpv6StatsNoGifs { jnxIpv6GlobalStats 25 } The total number of tunneling IPv6 packets that canot find
gif.
jnxIpv6StatsTooManyHdrs { jnxIpv6GlobalStats 26 } The total number of IPv6 packets discarded due to numerous
headers.
jnxIpv6StatsForwCacheHits { jnxIpv6GlobalStats 27 } The total number of forward cache hits.
jnxIpv6StatsForwCacheMisses { jnxIpv6GlobalStats 28 } The total number of forward cache misses.
jnxIpv6StatsOutDeadNextHops { jnxIpv6GlobalStats 29 } The total number of output IPv6 packets destined to dead
next hops.
jnxIpv6StatsOptRateDrops { jnxIpv6GlobalStats 30 } The total number of IPv6 option packets dropped due to rate
limits.
jnxIpv6StatsMCNoDests { jnxIpv6GlobalStats 31 } The total number of IPv6 Multicast packets dropped due to
no destination.
Table 94 on page 321 identifies the count of all the other IPv6 next header types received.
Table 94: Count of all the other IPv6 next header types received
Object Object ID Description
jnxIpv6StatsInHopByHops { jnxIpv6GlobalStats 32 } The total number of IPv6 packets received with a Hop by Hop
next header.
jnxIpv6StatsInIcmps { jnxIpv6GlobalStats 33 } The total number of IPv6 packets received with an ICMP(v4)
next header.
jnxIpv6StatsInIgmps { jnxIpv6GlobalStats 34 } The total number of IPv6 packets received with an IGMP next
header.
jnxIpv6StatsInIps { jnxIpv6GlobalStats 35} The total number of IPv6 packets received with an IPv4 next
header.
jnxIpv6StatsInTcps { jnxIpv6GlobalStats 36 } The total number of IPv6 packets received with a TCP next
header.
Copyright © 2010, Juniper Networks, Inc. 321
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 94: Count of all the other IPv6 next header types received (continued)
Object Object ID Description
jnxIpv6StatsInUdps { jnxIpv6GlobalStats 37 } The total number of IPv6 packets received with a UDP next
header.
jnxIpv6StatsInIdps { jnxIpv6GlobalStats 38 } The total number of IPv6 packets received with an xns IDP
next header.
jnxIpv6StatsInTps { jnxIpv6GlobalStats 39 } The total number of IPv6 packets received with a TP4 next
header.
jnxIpv6StatsInIpv6s { jnxIpv6GlobalStats 40 } The total number of IPv6 packets with an IPv6 next header.
jnxIpv6StatsInRoutings { jnxIpv6GlobalStats 41 } The total number of IPv6 packets with an IPv6 Routing next
header.
jnxIpv6StatsInFrags { jnxIpv6GlobalStats 42 } The total number of IPv6 packets with an IPv6 Fragment next
header.
jnxIpv6StatsInEsps { jnxIpv6GlobalStats 43 } The total number of IPv6 packets with an IPv6 ESP next
header.
jnxIpv6StatsInAhs { jnxIpv6GlobalStats 44 } The total number of IPv6 packets with an IPv6 AH next header.
jnxIpv6StatsInIcmpv6s { jnxIpv6GlobalStats 45 } The total number of IPv6 packets with an ICMPv6 next header.
jnxIpv6StatsInNoNhs { jnxIpv6GlobalStats 46} The total number of IPv6 packets with no next header.
jnxIpv6StatsInDestOpts { jnxIpv6GlobalStats 47 } The total number of IPv6 packets with an IPv6 Destination
Option next header.
jnxIpv6StatsInIsoIps { jnxIpv6GlobalStats 48 } The total number of IPv6 packets with an ISO CLNP next
header.
jnxIpv6StatsInOspfs { jnxIpv6GlobalStats 49 } The total number of IPv6 packets with an OSPF next header.
jnxIpv6StatsInEths { jnxIpv6GlobalStats 50 } The total number of IPv6 packets with an Ethernet next header.
jnxIpv6StatsInPims { jnxIpv6GlobalStats 51 } The total number of IPv6 packets with a PIM next header.
Related • IPv6 MIB Overview on page 319
Documentation
• jnxIcmpv6GlobalStats on page 322
jnxIcmpv6GlobalStats
The jnxIcmpv6GlobalStats, whose object ID is { jnxIpv6Stats 2}, represents the
jnxIcmpv6GlobalStats branch of IPv6 stats. Table 95 on page 323 identifies objects in the
jnxIcmpv6GlobalStats branch.
322 Copyright © 2010, Juniper Networks, Inc.
Chapter 26: Interpreting the Enterprise-Specific IPv6 MIB
Table 95: jnxIcmpv6GlobalStats
Object Object ID Description
jnxIcmpv6StatsErrors { jnxIcmpv6GlobalStats 1 } The total number of calls to icmp_error.
jnxIcmpv6StatsCantErrors { jnxIcmpv6GlobalStats 2 } The total number of errors that are not generated if the old
message was an icmp error.
jnxIcmpv6StatsTooFreqs { jnxIcmpv6GlobalStats 3 } The total number of errors that are not generated due to rate
limitations.
jnxIcmpv6StatsBadCodes { jnxIcmpv6GlobalStats 4} The total number of messages with bad code fields.
jnxIcmpv6StatsTooShorts { jnxIcmpv6GlobalStats 5 } The total number of messages less than the minimum length.
jnxIcmpv6StatsBadChecksums { jnxIcmpv6GlobalStats 6 } The total number of messages with bad checksums.
jnxIcmpv6StatsBadLenths { jnxIcmpv6GlobalStats 7 } The total number of messages with bad length.
jnxIcmpv6StatsNoRoutes { jnxIcmpv6GlobalStats 8 } The total number of 'no route' messages generated.
jnxIcmpv6StatsAdminProhibits { jnxIcmpv6GlobalStats 9 } The total number of 'administratively prohibited' messages
generated.
jnxIcmpv6StatsBeyondScopes { jnxIcmpv6GlobalStats 10 } The total number of 'beyond scope' messages generated.
jnxIcmpv6StatsAddrUnreachs { jnxIcmpv6GlobalStats 11 } The total number of 'address unreachable' messages
generated.
jnxIcmpv6StatsPortUnreachs { jnxIcmpv6GlobalStats 12 } The total number of 'port unreachable' messages generated.
jnxIcmpv6StatsTooBigs { jnxIcmpv6GlobalStats 13 } The total number of 'packet too big' messages generated.
jnxIcmpv6StatsExceedTrans { jnxIcmpv6GlobalStats 14 } The total number of 'time exceed transit' messages generated.
jnxIcmpv6StatsExceedReasms { jnxIcmpv6GlobalStats 15 } The total number of 'time exceed reassembly' messages
generated.
jnxIcmpv6StatsBadHdrFields { jnxIcmpv6GlobalStats 16 } The total number of 'erroneous header field' messages
generated.
jnxIcmpv6StatsBadNextHdrs { jnxIcmpv6GlobalStats 17 } The total number of 'unrecognized next header' messages
generated.
jnxIcmpv6StatsBadOptions { jnxIcmpv6GlobalStats 18 } The total number of 'unrecognized option' messages
generated.
jnxIcmpv6StatsRedirects { jnxIcmpv6GlobalStats 19 } The total number of 'redirect' messages generated.
jnxIcmpv6StatsOthers { jnxIcmpv6GlobalStats 20 } The total number of generated messages types other than
the ones listed above.
Copyright © 2010, Juniper Networks, Inc. 323
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 95: jnxIcmpv6GlobalStats (continued)
Object Object ID Description
jnxIcmpv6StatsResponses { jnxIcmpv6GlobalStats 21 } The total number of message responses generated.
jnxIcmpv6StatsExcessNDOptions { jnxIcmpv6GlobalStats 22 } The total number of messages processed with too many ND
options.
Table 96 on page 324 identifies the count of all the other ICMPv6 message types received
and transmitted.
Table 96: Count of all the other ICMPv6 message types received and transmitted
Object Object ID Description
jnxIcmpv6StatsInUnreachables { jnxIcmpv6GlobalStats 23 } The total number of unreachable messages received.
jnxIcmpv6StatsInPktTooBigs { jnxIcmpv6GlobalStats 24 } The total number of 'packet too big' messages received.
jnxIcmpv6StatsInTimeExceeds { jnxIcmpv6GlobalStats 25 } The total number of ’time exceeded’ messages received.
jnxIcmpv6StatsInParamProbs { jnxIcmpv6GlobalStats 26} The total number of ’parameter problem’ messages received.
jnxIcmpv6StatsInEchoReqs { jnxIcmpv6GlobalStats 27 } The total number of ’echo request’ messages received.
jnxIcmpv6StatsInEchoReplies { jnxIcmpv6GlobalStats 28 } The total number of ’echo reply’ messages received.
jnxIcmpv6StatsInMLQueries { jnxIcmpv6GlobalStats 29 } The total number of ’multicast listener query’ messages
received.
jnxIcmpv6StatsInMLReports { jnxIcmpv6GlobalStats 30 } The total number of ’multicast listener report’ messages
received.
jnxIcmpv6StatsInMLDones { jnxIcmpv6GlobalStats 31 } The total number of ’multicast listener done’ messages
received.
jnxIcmpv6StatsInRtrSolicits { jnxIcmpv6GlobalStats 32 } The total number of ’router solicitation’ messages received.
jnxIcmpv6StatsInRtrAdvs { jnxIcmpv6GlobalStats 33 } The total number of ’router advertisement’ messages received.
jnxIcmpv6StatsInNbrSolicits { jnxIcmpv6GlobalStats 34 } The total number of ’neighbor solicitation’ messages received.
jnxIcmpv6StatsInNbrAdvs { jnxIcmpv6GlobalStats 35 } The total number of ’neighbor advertisement’ messages
received.
jnxIcmpv6StatsInRedirects { jnxIcmpv6GlobalStats 36 } The total number of ’redirect’ messages received.
jnxIcmpv6StatsInRtrRenumbers { jnxIcmpv6GlobalStats 37} The total number of ’router renumber’ messages received.
jnxIcmpv6StatsInNIReqs { jnxIcmpv6GlobalStats 38 } The total number of ’node information request’ messages
received.
324 Copyright © 2010, Juniper Networks, Inc.
Chapter 26: Interpreting the Enterprise-Specific IPv6 MIB
Table 96: Count of all the other ICMPv6 message types received and transmitted (continued)
Object Object ID Description
jnxIcmpv6StatsInNIReplies { jnxIcmpv6GlobalStats 39 } The total number of ’node information report’ messages
received.
jnxIcmpv6StatsOutUnreachables { jnxIcmpv6GlobalStats 40 } The total number of ’unreachable’ messages transmitted.
jnxIcmpv6StatsOutPktTooBigs { jnxIcmpv6GlobalStats 41 } The total number of 'packet too big' messages to be
transmitted. Some of the icmp messages are not sent out
(problems with rate limits, source addresses, and so on).
jnxIcmpv6StatsTooBigs represents the number of 'too big
packet' messages that actually goes out.
jnxIcmpv6StatsOutTimeExceeds { jnxIcmpv6GlobalStats 42 } The total number of ’time exceeded’ messages transmitted.
jnxIcmpv6StatsOutParamProbs { jnxIcmpv6GlobalStats 43 } The total number of ’parameter problem’ messages
transmitted.
jnxIcmpv6StatsOutEchoReqs { jnxIcmpv6GlobalStats 44 } The total number of ’echo request’ messages transmitted.
jnxIcmpv6StatsOutEchoReplies { jnxIcmpv6GlobalStats 45 } The total number of ’echo reply’ messages transmitted.
jnxIcmpv6StatsOutMLQueries { jnxIcmpv6GlobalStats 46 } The total number of ’multicast listener query’ messages
transmitted.
jnxIcmpv6StatsOutMLReports { jnxIcmpv6GlobalStats 47 } The total number of ’multicast listener report’ messages
transmitted.
jnxIcmpv6StatsOutMLDones { jnxIcmpv6GlobalStats 48 } The total number of ’multicast listener done’ messages
transmitted.
jnxIcmpv6StatsOutRtrSolicits { jnxIcmpv6GlobalStats 49 } The total number of ’router solicitation’ messages transmitted.
jnxIcmpv6StatsOutRtrAdvs { jnxIcmpv6GlobalStats 50 } The total number of ’router advertisement’ messages
transmitted.
jnxIcmpv6StatsOutNbrSolicits { jnxIcmpv6GlobalStats 51 } The total number of ’neighbor solicitation’ messages
transmitted.
jnxIcmpv6StatsOutNbrAdvs { jnxIcmpv6GlobalStats 52 } The total number of ’neighbor advertisement’ messages
transmitted.
jnxIcmpv6StatsOutRedirects { jnxIcmpv6GlobalStats 53 } The total number of ’redirect’ messages transmitted.
jnxIcmpv6StatsOutRtrRenumbers { jnxIcmpv6GlobalStats 54 } The total number of ’router renumber’ messages transmitted.
jnxIcmpv6StatsOutNIReqs { jnxIcmpv6GlobalStats 55 } The total number of ’node information request’ messages
transmitted.
jnxIcmpv6StatsOutNIReplies { jnxIcmpv6GlobalStats 56 } The total number of ’node information report’ messages
transmitted.
Copyright © 2010, Juniper Networks, Inc. 325
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • IPv6 MIB Overview on page 319
Documentation
• jnxIpv6GlobalStats on page 319
326 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 27
Interpreting the Enterprise-Specific
Network Address Translation Objects MIB
This chapter contains the following topics:
• Network Address Translation Objects MIB on page 327
• Source NAT Table on page 328
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
• NAT Trap Definitions on page 333
Network Address Translation Objects MIB
The Juniper Networks enterprise-specific Network Address Translation (NAT) Objects
MIB, jnxJsNatMIB, whose object ID is {jnxJsNAT 1}, defines the objects that are used to
monitor NAT attributes.
Related NAT Objects MIB include:
• jnxJsNatNotifications {jnxJsNatMIB 0}
• jnxJsNatObjects {jnxJsNatMIB 1}
• jnxJsNatTrapVars {jnxJsNatMIB 2}
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-nat.txt
.
For information about the enterprise-specific Network Address Translation MIB objects,
see the following topics:
• Source NAT Table on page 328
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
Copyright © 2010, Juniper Networks, Inc. 327
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
• NAT Trap Definitions on page 333
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Source NAT Table
Table 97 on page 328 identifies objects in the Source NAT Table.
Table 97: Source NAT Table
Object Object ID Description
jnxJsSrcNatNumOfEntries jnxJsNatObjects 1 Total number of dynamic addresses being translated.
jnxJsSrcNatTable jnxJsNatObjects 2 Table that exposes the source NAT attributes of the translated addresses.
When performing source IP address translation, the device translates the
original source IP address or port number to a different one. The resource,
address source pools, provide the security device with a supply of
addresses from which to draw when performing source NAT.
The security device has the following types of source pools:
• Source pool with Port Address Translation (PAT)
• Source pool without PAT
• Static source pool
This table contains information about source IP address translation only.
jnxJsSrcNatEntry jnxJsSrcNatTable 1 Source NAT address entries. This object is indexed by the address pool
table and the address allocated.
Sequence of parameters:
• jnxJsNatSrcIpPoolName
• jnxJsNatSrcGlobalAddr
• jnxJsNatSrcPortPoolType
• jnxJsNatSrcNumOfPortInuse
• jnxJsNatSrcNumOfSessions
• jnxJsNatSrcAssocatedIf
jnxJsNatSrcIpPoolName jnxJsSrcNatEntry 1 Address pool from which the translated address is allocated.
jnxJsNatSrcGlobalAddr jnxJsSrcNatEntry 2 Name of dynamic source IP address allocated from the address pool used
in the NAT translation.
328 Copyright © 2010, Juniper Networks, Inc.
Chapter 27: Interpreting the Enterprise-Specific Network Address Translation Objects MIB
Table 97: Source NAT Table (continued)
Object Object ID Description
jnxJsNatSrcPortPoolType jnxJsSrcNatEntry 3 Source NAT can do address translation with or without PAT. The source
port pool type indicates whether the address translation is done with PAT,
without PAT, or as a static translation:
• withPAT—The security device translates both source IP address and
port number of the packets.
• withoutPAT—The device performs source NAT for the IP address without
performing PAT for the source port number.
• static—One range of IP addresses is statically mapped one-to-one to
a shifted range of IP addresses.
jnxJsNatSrcNumOfPortInuse jnxJsSrcNatEntry 4 Number of ports in use for this NAT address entry.
This attribute is applicable to only NAT translation with PAT.
jnxJsNatSrcNumOfSessions jnxJsSrcNatEntry 5 Number of sessions in use for this NAT address entry.
This attribute is applicable to only NAT translation without PAT.
jnxJsNatSrcAssocatedIf jnxJsSrcNatEntry 6 Index of interfaces associated with this NAT address entry.
For each interface, the value is a unique value, greater than zero.
Related • Network Address Translation Objects MIB on page 327
Documentation
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
• NAT Trap Definitions on page 333
New Source NAT Table
The jnxJsSrcNatStatsTable, whose object ID is jnxJsNatObjects 4, represents the source
NAT attributes of the translated addresses. When performing source IP address
translation, the security device translates the original source IP address, the port number,
or both to a different address. The resource address source pool provides the security
device with a supply of addresses from which to draw when performing source NAT. The
new source NAT contains objects on source IP address translation only. Table 98 on
page 330 identifies objects in the new source NAT table.
Copyright © 2010, Juniper Networks, Inc. 329
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 98: New Source NAT table
Object Object ID Description
jnxJsSrcNatStatsEntry jnxJsSrcNatStatsTable 1 Source NAT address entries. This object is indexed by the
address pool table and the allocated address.
Sequence of parameters:
• jnxJsNatSrcPoolName
• jnxJsNatSrcXlatedAddrType
• jnxJsNatSrcXlatedAddr
• jnxJsNatSrcPoolType
• jnxJsNatSrcNumPortInuse
• jnxJsNatSrcNumSessions
jnxJsNatSrcPoolName jnxJsSrcNatStatsEntry 1 The name of the dynamic source IP address pool. This is the
address pool from which the translated address is allocated.
jnxJsNatSrcXlatedAddrType jnxJsSrcNatStatsEntry 2 The type of the dynamic source IP address allocated from the
address pool used in the NAT translation. The MIB supports
IPv4 and IPv6 addresses only.
jnxJsNatSrcXlatedAddr jnxJsSrcNatStatsEntry 3 The name of the dynamic source IP address allocated from
the address pool used in the NAT translation. The MIB supports
IPv4 and IPv6 addresses only.
jnxJsNatSrcPoolType jnxJsSrcNatStatsEntry 4 Source NAT can do address translation with or without Port
Address Translation (PAT). The following source port pool
type indicates whether the address translation is done with
PAT, without PAT, or as a static translation:
• Source pool with PAT—The security device translates both
the source IP address and the port number of the packets.
• Source pool without PAT—The device performs source NAT
translation for the IP address without performing PAT for
the source port number.
• Static—One range of IP addresses is statically mapped
one-to-one to a shifted range of IP addresses.
jnxJsNatSrcNumPortInuse jnxJsSrcNatStatsEntry 5 The number of ports in use for this NAT address entry. This
attribute is applicable only to NAT translation with PAT.
jnxJsNatSrcNumSessions jnxJsSrcNatStatsEntry 6 The number of sessions in use based on this NAT address
entry. This attribute is applicable only to NAT translation
without PAT.
Related • Network Address Translation Objects MIB on page 327
Documentation
• Source NAT Table on page 328
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
330 Copyright © 2010, Juniper Networks, Inc.
Chapter 27: Interpreting the Enterprise-Specific Network Address Translation Objects MIB
• NAT Trap Definitions on page 333
jnxJsNatIfSrcPoolPortTable
jnxJsNatIfSrcPoolPortTable, whose object ID is jnxJsNatObjects 3, monitors the port usage
of the NAT interface source IP address pool by displaying information about the objects
listed in Table 99 on page 331.
The interface source pool is predefined. This source pool is referenced in a policy in which
it is configured. The security device translates the source IP address to the address of
the egress interface for the traffic, matching a policy that references the interface source
pool. The security device always applies PAT for the interface source pool.
Table 99: jnxJsNatIfSrcPoolPortTable
Object Object ID Description
jnxJsNatIfSrcPoolPortEntry jnxJsNatIfSrcPoolPortTable 1 Source NAT address entries. This object is indexed by
the address pool table and the address.
Sequence of parameters:
• jnxJsNatIfSrcPoolIndex
• jnxJsNatIfSrcPoolTotalSinglePorts
• jnxJsNatIfSrcPoolAllocSinglePorts
• jnxJsNatIfSrcPoolTotalTwinPorts
• jnxJsNatIfSrcPoolAllocTwinPorts
jnxJsNatIfSrcPoolIndex jnxJsNatIfSrcPoolPortEntry 1 Index number of the port pool of this address pool.
jnxJsNatIfSrcPoolTotalSinglePorts jnxJsNatIfSrcPoolPortEntry 2 Total number of single ports in a port pool.
jnxJsNatIfSrcPoolAllocSinglePorts jnxJsNatIfSrcPoolPortEntry 3 Number of single ports in a port pool allocated or in use.
jnxJsNatIfSrcPoolTotalTwinPorts jnxJsNatIfSrcPoolPortEntry 4 Total number of twin ports in a port pool.
jnxJsNatIfSrcPoolAllocTwinPorts jnxJsNatIfSrcPoolPortEntry 5 Number of twin ports in a port pool allocated or in use.
Related • Network Address Translation Objects MIB on page 327
Documentation
• Source NAT Table on page 328
• New Source NAT Table on page 329
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
• NAT Trap Definitions on page 333
Copyright © 2010, Juniper Networks, Inc. 331
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NAT Rule Hit Table
The jnxJsNatRuleTable, whose object ID is jnxJsNatObjects 5, monitors the NAT rule hits.
Table 100 on page 332 identifies objects in the NAT rule hit table.
Table 100: NAT Rule Hit Table
Object Object ID Description
jnxJsNatRuleEntry jnxJsNatRuleTable 1 NAT rule hit entries. This object is indexed by the rule index.
Sequence of parameters:
• jnxJsNatRuleName
• jnxJsNatRuleType
• jnxJsNatRuleTransHits
jnxJsNatRuleName jnxJsNatRuleEntry 1 NAT rule name.
jnxJsNatRuleType jnxJsNatRuleEntry 2 NAT types such as source, destination, and static.
jnxJsNatRuleTransHits jnxJsNatRuleEntry 3 Number of hits on this NAT rule.
Related • Network Address Translation Objects MIB on page 327
Documentation
• Source NAT Table on page 328
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Pool Hit Table on page 332
• NAT Trap Definitions on page 333
NAT Pool Hit Table
The jnxJsNatPoolTable, whose object ID is jnxJsNatObjects 6, monitors the NAT pool hits.
Table 101 on page 332 identifies objects in the NAT pool hit table.
Table 101: NAT Pool Hit Table
Object Object ID Description
jnxJsNatPoolEntry jnxJsNatPoolTable 1 NAT pool hit entries. This object is indexed by the pool index.
Sequence of parameters:
• jnxJsNatPoolName
• jnxJsNatPoolType
• jnxJsNatPoolTransHits
jnxJsNatPoolName jnxJsNatPoolEntry 1 NAT pool name.
332 Copyright © 2010, Juniper Networks, Inc.
Chapter 27: Interpreting the Enterprise-Specific Network Address Translation Objects MIB
Table 101: NAT Pool Hit Table (continued)
Object Object ID Description
jnxJsNatPoolType jnxJsNatPoolEntry 2 NAT types such as source, destination, and static.
jnxJsNatPoolTransHits jnxJsNatPoolEntry 3 Number of hits on this NAT pool.
Related • Network Address Translation Objects MIB on page 327
Documentation
• Source NAT Table on page 328
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Rule Hit Table on page 332
• NAT Trap Definitions on page 333
NAT Trap Definitions
Table 102 on page 333 lists NAT trap definition objects.
Table 102: NAT Trap Definitions
Object Object ID Description
jnxJsNatAddrPoolThresholdStatus jnxJsNatNotifications NAT address pool untilization threshold status trap to signify that
1 the address pool utilization either exceeds a certain percentage
or is clear of that percentage.
jnxJsNatSrcIpPoolName is the name of the resource pool.
jnxJsNatAddrPoolUtil is the percentage of utilization of the address
pool.
jnxJsNatAddrPoolUtil jnxJsNatTrapVars 1 Dynamic address pool utilization expressed as a percentage.
Related • Network Address Translation Objects MIB on page 327
Documentation
• Source NAT Table on page 328
• New Source NAT Table on page 329
• jnxJsNatIfSrcPoolPortTable on page 331
• NAT Rule Hit Table on page 332
• NAT Pool Hit Table on page 332
Copyright © 2010, Juniper Networks, Inc. 333
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
334 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 28
Interpreting the Enterprise-Specific Packet
Forwarding Engine MIB
• Packet Forwarding Engine MIB on page 335
• jnxPfeNotifyGlTable on page 335
• jnxPfeNotifyTypeTable on page 337
Packet Forwarding Engine MIB
The Juniper Networks enterprise-specific Packet Forwarding Engine MIB, whose object
identifier is {jnxPfeMibRoot 1}, provides notification statistics for Packet Forwarding
Engines. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-pfe.txt
.
NOTE: Information provided by this MIB is modeled after information provided
by the show pfe statistics notification command-line interface (CLI) command.
For information about the enterprise-specific Packet Forwarding Engine MIB objects, see
the following topics:
• jnxPfeNotifyGlTable on page 335
• jnxPfeNotifyTypeTable on page 337
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxPfeNotifyGlTable
jnxPfeNotifyGlTable contains global Packet Forwarding Engine notification statistics.
JnxPfeNotifyGlEntry contains notification statistics for each Packet Forwarding Engine
slot. Each entry has objects listed in Table 103 on page 336.
Copyright © 2010, Juniper Networks, Inc. 335
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 103: jnxPfeNotifyGlEntry
Object Object Identifier Description
jnxPfeNotifyGISlot jnxPfeNotifyGIEntry 1 The slot number for a set of Packet Forwarding Engine notification
statistics.
jnxPfeNotifyGIParsed jnxPfeNotifyGIEntry 2 The number of notifications reported by the Packet Forwarding Engine
controller, which manages packet forwarding functions.
jnxPfeNotifyGIAged jnxPfeNotifyGIEntry 3 The number of notifications dropped because they have expired.
jnxPfeNotifyGICorrupt jnxPfeNotifyGIEntry 4 The number of notifications dropped because the notification result
format is invalid. This counter is valid for Internet Processor-I and Internet
Processor-II only.
jnxPfeNotifyGIIllegal jnxPfeNotifyGIEntry 5 The number of notifications dropped because the notification has an
illegal notification type.
jnxPfeNotifyGISample jnxPfeNotifyGIEntry 6 The number of sample notifications reported by the Packet Forwarding
Engine controller.
jnxPfeNotifyGIGiants jnxPfeNotifyGIEntry 7 The number of notifications dropped because the notification is larger
than the supported direct memory access (DMA) size.
jnxPfeNotifyGITtlExceeded jnxPfeNotifyGIEntry 8 The number of options/TTL-expired notifications sent to service
interfaces as transit packets. This counter is valid for Internet Processor-I
and Internet Processor-II only.
jnxPfeNotifyGITtlExcErrors jnxPfeNotifyGIEntry 9 The number of options/TTL-expired notifications that could not be sent
to service interfaces as transit packets because the output interface
could not be determined. This counter is valid for Internet Processor-I
and Internet Processor-II only.
jnxPfeNotifyGISvcOptAsp jnxPfeNotifyGIEntry 10 The number of IP options packets sent to a Services PIC.
jnxPfeNotifyGISvcOptRe jnxPfeNotifyGIEntry 11 The number of IP options packets sent to the Routing Engine.
jnxPfeNotifyGIPostSvcOptOut jnxPfeNotifyGIEntry 12 The number of notifications re-injected by a Services PIC after processing
the associated packets. The Packet Forwarding Engine will forward these
notifications to their actual destination. This counter is valid for Internet
Processor-I and Internet Processor-II only.
jnxPfeNotifyGIOptTtlExp jnxPfeNotifyGIEntry 13 The number of TTL-expired transit packets.
jnxPfeNotifyGIDiscSample jnxPfeNotifyGIEntry 14 The number of sample notifications dropped because the notifications
refer to discarded packets in the Packet Forwarding Engine.
jnxPfeNotifyGIRateLimited jnxPfeNotifyGIEntry 15 The number of notification ignored because of Packet Forwarding Engine
software throttling (delaying or refusing requests).
jnxPfeNotifyGIPktGetFails jnxPfeNotifyGIEntry 16 The number of notifications ignored because DMA memory could not be
allocated.
336 Copyright © 2010, Juniper Networks, Inc.
Chapter 28: Interpreting the Enterprise-Specific Packet Forwarding Engine MIB
Table 103: jnxPfeNotifyGlEntry (continued)
Object Object Identifier Description
jnxPfeNotifyGIDmaFails jnxPfeNotifyGIEntry 17 The number of notifications where the DMA of associated packets failed
for miscellaneous reasons. This counter is valid for T Series routers only.
jnxPfeNotifyGIDmaTotals jnxPfeNotifyGIEntry 18 The number of notifications for which the packet DMA completed. This
counter is valid for T Series routers only.
jnxPfeNotifyGIUnknowns jnxPfeNotifyGIEntry 19 The number of notifications that could not be resolved to a known, next
hop destination. This counter is valid for T Series routers only.
Related • Packet Forwarding Engine MIB on page 335
Documentation
• jnxPfeNotifyTypeTable on page 337
jnxPfeNotifyTypeTable
jnxPfeNotifyTypeTable contains information about type-specific Packet Forwarding
Engine notifications for each Packet Forwarding Engine slot. Packet Forwarding Engine
notification types are listed in Table 104 on page 337.
Table 104: Packet Forwarding Engine Notification Types
Index Item Description
1 Illegal Packets with an invalid notification type.
2 Unclassified Packets that did not have a key lookup performed on them.
3 Option Packets that include L3 options.
4 Next Hop Packets that are destined to the host.
5 Discard Discarded packets sent to the route processor.
6 Sample Unused.
7 Redirect Packets sent back to the interfaces from which they arrived.
8 Do Not Fragment Packets that need to be fragmented, but have a don’t fragment (DF)
value set.
9 CFDF Packets that have a DF value set and a maximum transmission unit
(MTU) exceeded indicator is triggered.
10 Poison Packets that have a poisoned next-hop index.
Copyright © 2010, Juniper Networks, Inc. 337
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
For information about jnxPfeNotifyTypeEntry, see the following section:
• jnxPfeNotifyTypeEntry on page 338
jnxPfeNotifyTypeEntry
jnxPfeNotifyTypeEntry contains information about type-specific Packet Forwarding
Engine notifications, and has the objects listed in Table 105 on page 338.
Table 105: jnxPfeNotifyTypeEntry
Object Object Identifier Description
jnxPfeNotifyTypeId jnxPfeNotifyTypeEntry 1 Identifies the Packet Forwarding Engine notification type. See Table
104 on page 337 for a list of notification types.
jnxPfeNotifyTypeDescr jnxPfeNotifyTypeEntry A description of the Packet Forwarding Engine notification type.
2
jnxPfeNotifyTypeParsed jnxPfeNotifyTypeEntry The number of notifications that are parsed successfully.
3
jnxPfeNotifyTypeInput jnxPfeNotifyTypeEntry The number of notifications whose associated packets are stored in
4 router processor memory using direct memory access.
jnxPfeNotifyTypeFailed jnxPfeNotifyTypeEntry The number of notifications that are not parsed successfully.
5
jnxPfeNotifyTypeIgnored jnxPfeNotifyTypeEntry The number of notifications where the notification type in the message
6 does not match any of the valid notification types.
Related • Packet Forwarding Engine MIB on page 335
Documentation
• jnxPfeNotifyGlTable on page 335
338 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 29
Interpreting the Enterprise-Specific
Ping MIB
• PING MIB on page 339
• jnxPingCtlTable on page 340
• jnxPingResultsTable on page 344
• jnxPingProbeHistoryTable on page 348
• jnxPingLastTestResultTable on page 350
PING MIB
The Juniper Networks enterprise-specific Ping MIB extends the standard Ping MIB control
table (RFC 2925). The Ping MIB, whose object identifier is {jnxMIbs 7}, allows you to
monitor network delay (latency), packet loss, network delay variation (jitter), one-way
latency, and other network statistics.
Items in this MIB are created when entries are created in the pingCtlTable of the Ping
MIB. Each item is indexed exactly as in the Ping MIB.
To view a complete copy of the enterprise-specific extensions to the Ping MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-ping.txt
.
For information about using the Ping MIB and enterprise-specific Ping MIB, see the Junos
OS Network Management Configuration Guide.
For information about the enterprise-specific PING MIB objects, see the following topics:
• jnxPingCtlTable on page 340
• jnxPingResultsTable on page 344
• jnxPingProbeHistoryTable on page 348
• jnxPingLastTestResultTable on page 350
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 339
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxPingCtlTable
The enterprise-specific Ping MIB structure includes one main object, jnxPingCtlTable,
whose object identifier is jnxPingObjects 2, and defines the jnxPing control table for
providing enterprise-specific options to the corresponding pingCtlEntry. jnxpingCtTable
monitors thresholds; for example, the maximum allowed jitter in the trip time during a
text.
For information about objects in jnxPingCtlEntry, see:
• jnxPingCtlEntry on page 340
jnxPingCtlEntry
Each jnxPingCtlEntry has two indexes identical to those of the corresponding pingCtlEntry.
Entries created in pingCtlTable are mirrored here. jnxPingCtlEntry objects are listed in the
Table 106 on page 340.
Table 106: jnxPingCtlEntry
Object Object Identifier Description
jnxCtlOwnerIndex jnxPingCtlEntry 1 The first index. It is identical to the
pingCtlOwnerIndex of the corresponding
pingCtlEntry in the pingCtlTable.
jnxPingCtlTestName jnxPingCtlEntry 2 The other index and is identical to the
pingCtlTestName of the corresponding
pingCtlEntry in the pingCtlTable.
jnxPingCtlIfName jnxPingCtlEntry 3 Specifies the name of the outgoing interface
for ping probes. This is the name-based
complement to pingCtlIfIndex. A zero-length
string value for this object means that this
option is not enabled. The following values
can be set simultaneously, but only one
value is used. The precedence order is as
follows:
• pingCtlIfIndex (see pingCtlTable in the
Ping MIB)
• jnxPingCtlIfName
• jnxPingCtlRoutingInstanceName
jnxPingCtlRoutingInstanceName jnxPingCtlEntry 6 Specifies the name of the routing instance
used when directing outgoing ping packets.
The instance name specified must be
configured at the [edit routing-instances]
hierarchy level of the Junos configuration.
The instance-type must be vrf.
jnxPingCtlRttThreshold jnxPingCtlEntry 7 The maximum round-trip time allowed. If
this threshold is crossed by any probe, a
jnxPingRttThresholdExceeded trap is sent.
340 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 106: jnxPingCtlEntry (continued)
Object Object Identifier Description
jnxPingCtlRttStdDevThreshold jnxPingCtlEntry 8 The maximum round-trip time standard
deviation allowed over the course of any
test. If the calculated standard deviation of
the round-trip time at the end of any test
exceeds this threshold, a
jnxPingRttStdDevThresholdExceeded trap is
sent.
jnxPingCtlRttJitterThreshold jnxPingCtlEntry 9 The maximum allowed jitter in the round-trip
time over the course of any test. Jitter is the
difference between the maximum and
minimum round-trip times measured over
the course of a single test
(jnxPingResultsMaxRttUs minus
jnxPingResultsMinRttUs). If the measured
jitter exceeds this threshold, a
jnxPingRttJitterThresholdExceeded trap is
sent.
jnxPingCtlEgressTimeThreshold jnxPingCtlEntry Maximum egress trip time allowed. If this
10 threshold is crossed by any probe, a
jnxPingEgressThresholdExceeded trap is sent.
This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. Currently
jnxPingIcmpTimeStamp is the only supported
probe type with this property.
jnxPingCtlEgressStdDevThreshold jnxPingCtlEntry 11 The maximum egress trip time standard
deviation allowed over the course of any
test. If the calculated standard deviation of
the egress trip time at the end of any test
exceeds this threshold, a
jnxPingEgressStdDevThresholdExceeded trap
is sent. This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. The jnxPingIcmpTimeStamp
is the only supported probe type with this
property.
jnxPingCtlEgressJitterThreshold jnxPingCtlEntry 12 The maximum allowed jitter in the egress
trip time over the course of any test. Jitter is
defined as the difference between the
maximum and minimum egress trip times
measured over the course of a single test
(jnxPingResultsMaxSrcDstt minus
jnxPingResultsMinSrcDstt). If the measured
jitter exceeds this threshold, a
jnxPingEgressJitterThresholdExceeded trap
is sent. This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. The jnxPingIcmpTimeStamp
is the only supported probe type with this
property.
Copyright © 2010, Juniper Networks, Inc. 341
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 106: jnxPingCtlEntry (continued)
Object Object Identifier Description
jnxPingCtlIngressTimeThreshold jnxPingCtlEntry 13 The maximum ingress trip-time allowed. If
this threshold is crossed by any probe, a
jnxPingIngressThresholdExceeded trap is
sent. This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. The jnxPingIcmpTimeStamp
is the only supported probe type with
this property.
jnxPingCtlIngressStddevThreshold jnxPingCtlEntry 14 The maximum ingress trip time standard
deviation allowed over the course of any
test. If the calculated standard deviation of
the ingress trip time at the end of any test
exceeds this threshold, a
jnxPingIngressStddevThresholdExceeded trap
is sent. This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. Currently,
jnxPingIcmpTimeStamp is the only supported
probe type with this property.
jnxPingCtlIngressJitterThreshold jnxPingCtlEntry 15 The maximum allowed jitter in the ingress
trip time over the course of any test. Jitter is
defined as the difference between the
maximum and minimum ingress trip times
measured over the course of a single test
(jnxPingResultsMaxDstSrct minus
jnxPingResultsMinDstSrct). If the measured
jitter exceeds this threshold, a
jnxPingIngressJitterThresholdExceeded trap
is sent. This applies only if the probe type
(pingCtlType) provides one-way delay
measurements. The jnxPingIcmpTimeStamp
is the only supported probe type with this
property.
342 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 106: jnxPingCtlEntry (continued)
Object Object Identifier Description
jnxPingCtlTrapGeneration jnxPingCtlEntry The value of this object determines when
16 and if to generate a notification for this entry.
rttThreshold(0)—Generate a
jnxPingRttThresholdExceeded notification
when the configured RTT threshold is
exceeded.
rttStdDevThreshold(1)—Generate a
jnxPingRttStdDevThresholdExceeded
notification when the configured RTT
standard deviation threshold is exceeded.
rttJitterThreshold(2)—Generate a
jnxPingRttJitterThresholdExceeded
notification when the configured RTT jitter
threshold is exceeded.
egressThreshold(3)—Generate a
jnxPingEgressThresholdExceeded notification
when the configured egress threshold is
exceeded. This applies only if the probe type
supports one-way measurements.
Copyright © 2010, Juniper Networks, Inc. 343
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 106: jnxPingCtlEntry (continued)
Object Object Identifier Description
egressStdDevThreshold(4)—Generate a
jnxPingEgressStdDevThresholdExceeded
notification when the configured egress
standard deviation threshold is exceeded.
This applies only if the probe type supports
one-way measurements.
egressJitterThreshold(5)—Generate a
jnxPingEgressJitterThresholdExceeded
notification when the configured egress jitter
threshold is exceeded. This applies only if
the probe type supports one-way
measurements.
ingressThreshold(6)—Generate a
jnxPingIngressThresholdExceeded
notification when the configured ingress
threshold is exceeded. This applies only if
the probe type supports one-way
measurements.
ingressStdDevThreshold(7)—Generate a
jnxPingIngressStdDevThresholdExceeded
notification when the configured ingress
standard deviation threshold is exceeded.
This applies only if the probe type supports
one way measurements.
ingressJitterThreshold(8)—Generate a
jnxPingIngressJitterThresholdExceeded
notification when the configured ingress jitter
threshold is exceeded. This applies only if
the probe type supports one-way
measurements. The value of this object
defaults to zero, indicating that none of the
above options have been selected.
Related • PING MIB on page 339
Documentation
• jnxPingResultsTable on page 344
• jnxPingProbeHistoryTable on page 348
• jnxPingLastTestResultTable on page 350
jnxPingResultsTable
jnxPingResultsTable, whose object identifier is jnxPingObjects 3, gathers ping test results
on traffic on round-trip, ingress, and egress trip delays. This is useful when you want to
measure the performance of your network and verify service-level agreements with your
vendors.
The jnxPingResultsEntry objects are listed in Table 107 on page 345.
344 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 107: jnxPingsResultsEntry
Object Object Identifier Description
jnxPingResultsRttUs jnxPingResultsEntry 1 The round-trip delays measured for the
most recent successful probe during this
test, in microseconds.
jnxPingResultsSumRttUs jnxPingResultsEntry 2 The sum of the round-trip delays
measured for all the probes during this
test, in microseconds.
jnxPingResultsMinRttUs jnxPingResultsEntry 3 The minimum of the round-trip delays
measured for all the probes during this
test, in microseconds.
jnxPingResultsMaxRttUs jnxPingResultsEntry 4 The maximum of the round-trip delays
measured for all the probes during this
test, in microseconds.
jnxPingResultsAvgRttUs jnxPingResultsEntry 5 The average of the round-trip delays
measured for all the probes during this
test, in microseconds.
jnxPingResultsStdDevRttUs jnxPingResultsEntry 6 The standard deviation of the round-trip
delays measured during this test, in
microseconds.
jnxPingResultsEgressUs jnxPingResultsEntry 7 The egress trip delays measured for the
most recent successful probe during this
test, in microseconds. This applies only
if the probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsMinEgressUs jnxPingResultsEntry 8 The minimum of the egress trip delays
measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsMaxEgressUs jnxPingResultsEntry 9 The maximum of the egress trip delays
measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
Copyright © 2010, Juniper Networks, Inc. 345
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 107: jnxPingsResultsEntry (continued)
Object Object Identifier Description
jnxPingResultsAvgEgressUs jnxPingResultsEntry The average of the egress trip delays
10 measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsStddevEgressUs jnxPingResultsEntry The standard deviation of the egress trip
11 delays measured over all probes during
this test, in microseconds. This applies
only if the probe type (pingCtlType)
provides one-way delay measurements.
For all other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsIngressUs jnxPingResultsEntry The ingress trip delays measured for the
12 most recent successful probe during this
test, in microseconds. This applies only
if the probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsMinIngressUs jnxPingResultsEntry The minimum of the ingress trip delays
13 measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsMaxIngressUs jnxPingResultsEntry The maximum of the ingress trip delays
14 measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsAvgIngressUs jnxPingResultsEntry The average of the ingress trip delays
15 measured over all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
346 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 107: jnxPingsResultsEntry (continued)
Object Object Identifier Description
jnxPingResultsStddevIngressUs jnxPingResultsEntry The standard deviation of the ingress trip
16 delays measured over all probes during
this test, in microseconds. This applies
only if the probe type (pingCtlType)
provides one-way delay measurements.
For all other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsJitterRttUs jnxPingResultsEntry The jitter of the round-trip delays
17 measured for all probes during this test,
in microseconds.
jnxPingResultsJitterEngressUs jnxPingResultsEntry The jitter of the engress trip delays
18 measured for all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsJitterIngressUs jnxPingResultsEntry The jitter of the ingress trip delays
19 measured for all probes during this test,
in microseconds. This applies only if the
probe type (pingCtlType) provides
one-way delay measurements. For all
other probe types, their values are
irrelevant and this object returns 0.
jnxPingResultsStatus jnxPingResultsEntry The result of the most recent probe.
20
jnxPingResultsTime jnxPingResultsEntry The date and time of the most recent
21 probe result.
jnxPingResultsOwnerIndex jnxPingResultsEntry The first index. It has the same value as
22 pingCtlOwnerIndex and is provided for
applications that are unable to obtain the
value of pingCtlOwnerIndex from the
instance portion of the object identifiers
belonging to this table.
jnxPingResultsTestName jnxPingResultsEntry The other index. It has the same value as
23 pingCtlTestName and is provided for
applications that are unable to obtain the
value of pingCtlTestName from the
instance portion of the object identifiers
belonging to this table.
Related • PING MIB on page 339
Documentation
• jnxPingCtlTable on page 340
• jnxPingProbeHistoryTable on page 348
Copyright © 2010, Juniper Networks, Inc. 347
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxPingLastTestResultTable on page 350
jnxPingProbeHistoryTable
jnxpingProbeHistoryTable, whose object identifier is jnxPingObjects 4, contains the history
of all ping tests.
The jnxPingProbeHistoryEntry objects are listed in Table 108 on page 348.
Table 108: jnxPingProbeHistoryEntry
Object Object Identifier Description
jnxPingProbeHistoryResponseUs jnxPingProbeHistoryEntry The amount of time, in
1 microseconds, from when
a probe was sent to when
its response was received
or when it timed out. The
value of this object is
reported as 0 when it is
not possible to transmit
a probe.
jnxPingProbeHistoryJitterUs jnxPingProbeHistoryEntry The time difference, in
2 microseconds, between
the maximum and
minimum round-trip
times. Each history entry
provides a running
calculation of the jitter
(calculated over the
current test) at the time a
probe was completed.
jnxPingProbeHistoryResponseEgressUs jnxPingProbeHistoryEntry The amount of time, in
3 microseconds, from when
a probe was sent to when
it was received by
destination. This applies
only if the probe type
(pingCtlType) provides
one-way delay
measurements. For all
other probe types, the
value is irrelevant and this
object returns 0.
348 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 108: jnxPingProbeHistoryEntry (continued)
Object Object Identifier Description
jnxPingProbeHistoryResponseIngressUs jnxPingProbeHistoryEntry The amount of time, in
4 microseconds, from when
a probe was sent from the
destination to when it was
received. This applies only
if the probe type
(pingCtlType) provides
one-way delay
measurements. For all
other probe types, the
value is irrelevant and this
object returns 0.
jnxPingProbeHistoryEgressJitterUs jnxPingProbeHistoryEntry The time difference, in
5 microseconds, between
the maximum and
minimum egress trip
times. Each history entry
provides a running
calculation of the jitter
(calculated over the
current test) at the time a
probe was completed.
This applies only if the
probe type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, the
value is irrelevant and this
object returns 0.
jnxPingProbeHistoryIngressJitterUs jnxPingProbeHistoryEntry The time difference, in
6 microseconds, between
the maximum and
minimum ingress trip
times. Each history entry
provides a running
calculation of the jitter
(calculated over the
current test) at the time a
probe was completed.
This applies only if the
probe type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, the
value is irrelevant and this
object returns 0.
Related • PING MIB on page 339
Documentation
• jnxPingCtlTable on page 340
• jnxPingResultsTable on page 344
Copyright © 2010, Juniper Networks, Inc. 349
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxPingLastTestResultTable on page 350
jnxPingLastTestResultTable
jnxPingLastTestResultTable, whose object identifier is jnxPingObjects 5, contains the
results of the last completed ping tests. Entries corresponding to a test are created only
after completion of the first test. This is useful when you want to ensure that a test has
been completed before collecting test results.
The jnxPingLastTestResultEntry objects are listed in Table 109 on page 350.
Table 109: jnxPingLastTestResultEntry
Object Object Identifier Description
jnxPingLastTestResultProbeResponses jnxPingLastTestResultEntry The number of responses
1 received in the most
recently completed test.
jnxPingLastTestResultSentProbes jnxPingLastTestResultEntry The number of probes
2 sent in the most recently
completed test.
jnxPingLastTestResultSumRttUs jnxPingLastTestResultEntry The sum of the round-trip
3 delays measured for all
the probes during the
most recently completed
test, in microseconds.
jnxPingLastTestResultMinRttUs jnxPingLastTestResultEntry The minimum of the
4 round-trip delays
measured for all the
probes during the most
recently completed test,
in microseconds.
jnxPingLastTestResultMaxRttUs jnxPingLastTestResultEntry The maximum of the
5 round-trip delays
measured for all the
probes during the most
recently completed test,
in microseconds.
jnxPingLastTestResultAvgRttUs jnxPingLastTestResultEntry The average of the
6 round-trip delays
measured for all the
probes during the most
recently completed test,
in microseconds.
350 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 109: jnxPingLastTestResultEntry (continued)
Object Object Identifier Description
jnxPingLastTestResultStdDevRttUs jnxPingLastTestResultEntry The standard deviation of
7 the round-trip delays
measured for all the
probes during the most
recently completed test,
in microseconds.
jnxPingLastTestResultMinEgressUs jnxPingLastTestResultEntry The minimum of the
8 egress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultMaxEgressUs jnxPingLastTestResultEntry The maximum of the
9 egress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultAvgEgressUs jnxPingLastTestResultEntry The average of the egress
10 trip delays measured over
all probes during the most
recently completed test,
in microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
Copyright © 2010, Juniper Networks, Inc. 351
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 109: jnxPingLastTestResultEntry (continued)
Object Object Identifier Description
jnxPingLastTestResultStddevEgressUs jnxPingLastTestResultEntry The standard deviation of
11 the egress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultMinIngressUs jnxPingLastTestResultEntry The minimum of the
12 ingress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultMaxIngressUs jnxPingLastTestResultEntry The maximum of the
13 ingress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultAvgIngressUs jnxPingLastTestResultEntry The average of the ingress
14 trip delays measured over
all probes during the most
recently completed test,
in microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
352 Copyright © 2010, Juniper Networks, Inc.
Chapter 29: Interpreting the Enterprise-Specific Ping MIB
Table 109: jnxPingLastTestResultEntry (continued)
Object Object Identifier Description
jnxPingLastTestResultStddevIngressUs jnxPingLastTestResultEntry The standard deviation of
15 the ingress trip delays
measured over all probes
during the most recently
completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultPeakToPeakJitterRttUs jnxPingLastTestResultEntry The difference between
16 the minimum and
maximum delays over the
course of the last
completed test, in
microseconds.
jnxPingLastTestResultPeakToPeakJitterEgressUs jnxPingLastTestResultEntry The difference between
17 the minimum and
maximum egress trip
delays over the course of
the last completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultPeakToPeakJitterIngressUs jnxPingLastTestResultEntry The difference between
18 the minimum and
maximum ingress trip
delays over the course of
the last completed test, in
microseconds. This
applies only if the probe
type (pingCtlType)
provides one-way delay
measurements. For all
other probe types, their
values are irrelevant and
this object returns 0.
jnxPingLastTestResultTime jnxPingLastTestResultEntry The time the last test was
19 completed.
Copyright © 2010, Juniper Networks, Inc. 353
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • PING MIB on page 339
Documentation
• jnxPingCtlTable on page 340
• jnxPingResultsTable on page 344
• jnxPingProbeHistoryTable on page 348
354 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 30
Interpreting the Enterprise-Specific Policy
Objects MIB
• Policy Objects MIB on page 355
• Security Policy Table on page 356
• jnxJsPolicyStatsTable on page 358
Policy Objects MIB
The Juniper Networks enterprise-specific Policy Objects MIB, jnxJsSecPolicyMIB, whose
object ID is {jnxJsPolicies 1}, defines the MIB for policy monitoring.
A security policy, which can be configured from the user interface, controls the traffic
flow from one zone to another zone by defining one or more kinds of traffic permitted
from specified IP sources to specified IP destinations at scheduled times.
The Juniper Networks security device enforces the security policies rules for the transit
traffic in terms of which traffic can pass through the firewall and the actions taken on
the traffic as it passes through the firewall.
Related MIB objects include the following:
• jnxJsPolicyNotifications—{jnxJsSecPolicyMIB 0}
• jnxJsPolicyObjects—{jnxJsSecPolicyMIB 1}
• jnxJsPolicyTrapVars—{jnxJsSecPolicyMIB 2}
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-policy.txt
.
For information about the enterprise-specific Policy Objects MIB objects, see the following
topics:
• Security Policy Table on page 356
• jnxJsPolicyStatsTable on page 358
Copyright © 2010, Juniper Networks, Inc. 355
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Security Policy Table
Table 110 on page 356 describes the objects in the Security Policy Table.
Table 110: Security Policy Table
Object Object ID Description
jnxJsPolicyNumber jnxJsPolicyObjects 1 Number of policies (regardless of their
current state) present on this system.
jnxJsPolicyTable jnxJsPolicyObjects 2 Exposes the security policy entries.
Security devices and routers provide a
network boundary with a single point of
entry and exit, which allows the screening
and directing of traffic through the
implementation of access policies. The
access policies can permit, deny, encrypt,
authenticate, prioirtize, schedule, and
monitor the traffic flow through the
firewall.
This table lists entries of policy. The
number of policies are given by
jnxJsPolicyNumber.
356 Copyright © 2010, Juniper Networks, Inc.
Chapter 30: Interpreting the Enterprise-Specific Policy Objects MIB
Table 110: Security Policy Table (continued)
Object Object ID Description
jnxJsPolicyEntry jnxJsPolicyTable 1 An entry contains a security policy.
Indexes:
• nxJsPolicyFromZone
• jnxJsPolicyToZone
• jnxJsPolicyName
Security policies are configured under
FromZone and ToZone directions. Under
a specific zone direction, each security
policy contains a name, match-criteria,
action, and other options.
Sequence of parameters:
• jnxJsPolicyFromZone
• jnxJsPolicyToZone
• jnxJsPolicyName
• jnxJsPolicySequenceNumber
• jnxJsPolicyAction
• jnxJsPolicyScheduler
• jnxJsPolicyState
• jnxJsPolicyStatsAvailability
• jnxJsPolicyPerSecBytesThreshold
• jnxJsPolicyPerMinKbytesThreshold
jnxJsPolicyFromZone jnxJsPolicyEntry 1 FromZone name.
jnxJsPolicyToZone jnxJsPolicyEntry 2 ToZone name.
jnxJsPolicyName jnxJsPolicyEntry 3 Name of the policy defined. The name
consists of up to 256 ASCII characters
and uniquely identifies the policy entry.
jnxJsPolicySequenceNumber jnxJsPolicyEntry 4 Indication of the policy sequence order
of the policy within a specific FromZone
and ToZone pair. Policies are matched
in a sequence in which the ordering is
specified by this number.
jnxJsPolicyAction jnxJsPolicyEntry 5 Indication of the actions performed when
the criteria are matched.
The actions permit, reject, and deny are
user-configured policies.
jnxJsPolicyScheduler jnxJsPolicyEntry 6 Name of the schedule attached to this
policy. Certain schedules have a specified
duration that may affect the status of
the policy.
Copyright © 2010, Juniper Networks, Inc. 357
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 110: Security Policy Table (continued)
Object Object ID Description
jnxJsPolicyState jnxJsPolicyEntry 7 State of this policy: active, inactive, or
unavailable.
The state can be affected by the
scheduler if the scheduler has a specified
duration.
jnxJsPolicyStatsAvailability jnxJsPolicyEntry 8 Indication of whether the statistics
counters are available and are actively
updated. If available, a matching
jnxJsPolicyStatsEntry exists for the policy.
jnxJsPolicyPerSecBytesThreshold jnxJsPolicyEntry 9 Indication of the threshold value of bytes
per second
jnxJsPolicyPerMinKbytesThreshold jnxJsPolicyEntry 10 Indication of the threshold value of kbyte
per minute
Related • Policy Objects MIB on page 355
Documentation
• jnxJsPolicyStatsTable on page 358
jnxJsPolicyStatsTable
jnxJsPolicyStatsTable, whose object ID is {jnxJsPolicyObjects 3}, exposes the security
policy statistics entries listed in Table 111 on page 359. These statistics can be enabled and
disabled by configuration on a per policy basis.
358 Copyright © 2010, Juniper Networks, Inc.
Chapter 30: Interpreting the Enterprise-Specific Policy Objects MIB
Table 111: jnxJsPolicyStatsTable
Object Object ID Description
jnxJsPolicyStatsEntry jnxJsPolicyStatsTable 1 Contains security policy statistics.
Indexes:
• jnxJsPolicyFromZone
• jnxJsPolicyToZone
• jnxJsPolicyName
Security policies are configured under
FromZone and ToZone direction. Under
a specific zone direction, each security
policy contains name, match-criteria,
action, and other options.
Sequence of parameters:
• jnxJsPolicyStatsCreationTime
• jnxJsPolicyStatsInputBytes
• jnxJsPolicyStatsInputByteRate
• jnxJsPolicyStatsOutputBytes
• jnxJsPolicyStatsOutputByteRate
• jnxJsPolicyStatsInputPackets
• jnxJsPolicyStatsInputPacketRate
• jnxJsPolicyStatsOutputPackets
• jnxJsPolicyStatsOutputPacketRate
• jnxJsPolicyStatsNumSessions
• jnxJsPolicyStatsSessionRate
• jnxJsPolicyStatsSessionDeleted
• jnxJsPolicyStatsLookups
• jnxJsPolicyStatsCountAlarm
jnxJsPolicyStatsCreationTime jnxJsPolicyStatsEntry 1 Creation timestamp of the policy
statistics entry. The timestamp is
modified during the creation and deletion
of the policy statistics entry. When the
timestamp changes, the policy entry
statistics entry is assumed to be a new
statistics entry and not associated with
a previous statistic entry of the same
indices.
jnxJsPolicyStatsInputBytes jnxJsPolicyStatsEntry 2 Number of input bytes that enter the
firewall through this policy.
jnxJsPolicyStatsInputByteRate jnxJsPolicyStatsEntry 3 Number of input bytes per second or the
rate that enters the firewall through this
policy.
jnxJsPolicyStatsOutputBytes jnxJsPolicyStatsEntry 4 Number of output bytes associated with
this policy.
Copyright © 2010, Juniper Networks, Inc. 359
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 111: jnxJsPolicyStatsTable (continued)
Object Object ID Description
jnxJsPolicyStatsOutputByteRate jnxJsPolicyStatsEntry 5 Number of output bytes per second or
the rate associated with this policy.
jnxJsPolicyStatsInputPackets jnxJsPolicyStatsEntry 6 Number of input packets that enter the
firewall through this policy.
jnxJsPolicyStatsInputPacketRate jnxJsPolicyStatsEntry 7 Number of input packets per second or
the input packet rate of the firewall
through this policy.
jnxJsPolicyStatsOutputPackets jnxJsPolicyStatsEntry 8 Number of output packets associated
with this policy.
jnxJsPolicyStatsOutputPacketRate jnxJsPolicyStatsEntry 9 Number of output packets per second or
the rate associated with this policy.
jnxJsPolicyStatsNumSessions jnxJsPolicyStatsEntry 10 Number of sessions associated with this
policy.
jnxJsPolicyStatsSessionRate jnxJsPolicyStatsEntry 11 Rate of the sessions associated with this
policy.
jnxJsPolicyStatsSessionDeleted jnxJsPolicyStatsEntry 12 Number of sessions associated with this
policy.
jnxJsPolicyStatsLookups jnxJsPolicyStatsEntry 13 Number of policy lookups performed.
jnxJsPolicyStatsCountAlarm jnxJsPolicyStatsEntry 14 Number of alarms counted when the
traffic exceeds a certain threshold
configuration.
Related • Policy Objects MIB on page 355
Documentation
• Security Policy Table on page 356
360 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 31
Interpreting the Enterprise-Specific
Real-Time Media MIB
• Real-Time Media MIB Overview on page 361
• SIP Template on page 362
• Analog Template on page 363
• Peer Call Server on page 363
• Survivable Call Service on page 364
• Trunk Configuration on page 365
• Digit Manipulation on page 366
• Attendant Features on page 366
• Station Configuration on page 367
• Dial Plan Configuration on page 367
• Class of Restriction on page 368
• Media Gateway Configuration on page 368
• Trunk Group Configuration on page 369
• Survivable Call Service Statistics on page 369
Real-Time Media MIB Overview
The Juniper Networks enterprise-specific Real-Time Media (RTM) MIB, whose object
identifier is { jnxVoip 1 }, defines an RTM configuration.
For a downloadable version of the RTM MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rtm.txt
.
For more information about the enterprise-specific RTM MIBs, see the following topics:
• SIP Template on page 362
• Analog Template on page 363
• Peer Call Server on page 363
• Survivable Call Service on page 364
Copyright © 2010, Juniper Networks, Inc. 361
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Trunk Configuration on page 365
• Digit Manipulation on page 366
• Attendant Features on page 366
• Station Configuration on page 367
• Dial Plan Configuration on page 367
• Class of Restriction on page 368
• Media Gateway Configuration on page 368
• Trunk Group Configuration on page 369
• Survivable Call Service Statistics on page 369
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
SIP Template
The jnxSipTemplateTable object, whose object ID is { jnxRtmMIBObjects 1 }, contains the
Session Initiation Protocol (SIP) station template.
Table 112 on page 362 identifies objects in the jnxSipTemplateTable branch.
Table 112: jnxSipTemplateTable
Object Object ID Description
jnxSipTemplateName { jnxSipTemplateEntry 1 } The SIP template name.
jnxDtmfMethod { jnxSipTemplateEntry 2 } The dual-tone multifrequency (DTMF) method.
jnxCallerIdTransmit { jnxSipTemplateEntry 3 } The caller ID transmit for the outgoing calls.
jnxInheritExtensionsFrom { jnxSipTemplateEntry 4 } The origination of the inherit extensions ranges.
jnxInheritExtensionsTo { jnxSipTemplateEntry 5 } The destination of the inherit extensions ranges.
jnxClassOfRestriction { jnxSipTemplateEntry 6 } The policies that belong to the class of restriction.
jnxCodecG711MU { jnxSipTemplateEntry 7 } Describes the 64-kpbs bit stream for the G711-MU-14 bit
PCM 8-kHz sample code.
jnxCodecG711A { jnxSipTemplateEntry 8 } Describes the 64-kbps bit stream for the G711-A-13 bit
PCM 8-kHz sample code.
jnxCodecG729AB { jnxSipTemplateEntry 9} Describes the 8-kbps bit stream for the G729AB -
CS-ACELP sample code.
362 Copyright © 2010, Juniper Networks, Inc.
Chapter 31: Interpreting the Enterprise-Specific Real-Time Media MIB
Related • Analog Template on page 363
Documentation
• Peer Call Server on page 363
Analog Template
The jnxAnalogTemplateTable object, whose object ID is { jnxRtmMIBObjects 2 }, contains
the analog template objects.
Table 113 on page 363 identifies objects in the jnxAnalogTemplateTable branch.
Table 113: jnxAnalogTemplateTable
Object Object ID Description
jnxAnalogTemplateName { jnxAnalogTemplateEntry 1 } The analog template name.
jnxAanalogCallerIdTransmit { jnxAnalogTemplateEntry 2 } The caller IDs that are transmitted for the outgoing calls.
jnxAnalogVoiceActivityDetection { jnxAnalogTemplateEntry 3 } The voice activities that are detected for the outgoing
calls.
jnxAnalogComfortNoiseGeneration { jnxAnalogTemplateEntry 4 } The comfort noise generated during silence.
jnxAnalogClassOfRestriction { jnxAnalogTemplateEntry 5 } The class of restriction policies for the analog template.
Related • Peer Call Server on page 363
Documentation
• Survivable Call Service on page 364
Peer Call Server
The jnxPeerCallServerTable object, whose object ID is { jnxRtmMIBObjects 7 }, contains
the peer call server configuration objects.
Table 114 on page 363 identifies objects in the jnxPeerCallServerTable branch.
Table 114: jnxPeerCallServerTable
Object Object ID Description
jnxPeerCallServerName { jnxPeerCallServerEntry 1 } The peer call server name.
jnxPeerCallServerDescription { jnxPeerCallServerEntry 2 } The peer call server description.
jnxPeerCallServerAddress { jnxPeerCallServerEntry 3 } The server (IPv4 or IPv6) address for the peer call sever.
jnxPeerCallServerSipProtocolPort { jnxPeerCallServerEntry 4 } The port number for signaling.
jnxPeerCallServerSipProtocolTransport { jnxPeerCallServerEntry 5 } The transport type for signaling.
Copyright © 2010, Juniper Networks, Inc. 363
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 114: jnxPeerCallServerTable (continued)
Object Object ID Description
jnxPeerCallServerCodecG711MU { jnxPeerCallServerEntry 6 } Describes the 64-kbps bit stream for the G711-MU-14 bit
PCM 8-kHz sample code.
jnxPeerCallServerCodecG711A { jnxPeerCallServerEntry 7 } Describes the 64-kbps bit stream for the G711-A-13 bit
pulse code modulation (PCM) 8-kHz sample code.
jnxPeerCallServerCodecG729AB { jnxPeerCallServerEntry 8 } Describes the 8-kbps bit stream for the G729AB -
CS-ACELP sample code.
jnxPeerCallServerDtmfMethod { jnxPeerCallServerEntry 9 } Describes the dual-tone multifrequency (DTMF)
signaling method.
jnxPeerCallServerPstnAccessNumber { jnxPeerCallServerEntry 10 } The public switched telephone network (PSTN) access
number for the survivable call service.
jnxPeerCallServerAuthId { jnxPeerCallServerEntry 11 } The peer call server authentication identifier.
Related • Survivable Call Service on page 364
Documentation
• Trunk Configuration on page 365
Survivable Call Service
The jnxSurvivableCallServiceTable object, whose object ID is { jnxRtmMIBObjects 4 },
contains the survivable call service (SCS) configuration objects. The SCS provides call
handling and routing services locally when the peer call server is unreachable. The SRX
Series SCS works in conjunction with station configurations and the dial plan.
Table 115 on page 364 identifies objects in the jnxSurvivableCallServiceTable branch.
Table 115: jnxSurvivableCallServiceTable
Object Object ID Description
jnxSurvivableCallServiceName { jnxSurvivableCallServiceEntry The survivable call service name.
1}
jnxSurvivableCallServicePeerCallServer { jnxSurvivableCallServiceEntry The peer call server for the survivable call service.
2}
jnxSurvivableCallServiceSipProtocolPort { jnxSurvivableCallServiceEntry The port number used for signaling.
3}
jnxSurvivableCallServiceSip { jnxSurvivableCallServiceEntry The transport type used for signaling.
ProtocolTransport 4}
jnxSurvivableCallService { jnxSurvivableCallServiceEntry Heartbeat interval in a normal state, in seconds.
HeartbeatNormalInterval 5}
364 Copyright © 2010, Juniper Networks, Inc.
Chapter 31: Interpreting the Enterprise-Specific Real-Time Media MIB
Table 115: jnxSurvivableCallServiceTable (continued)
Object Object ID Description
jnxSurvivableCallService { jnxSurvivableCallServiceEntry Registration expiry timeout for stations registered, in
RegistrationExpiryTimeout 6} seconds.
jnxSurvivableCallServiceSipTimeout { jnxSurvivableCallServiceEntry Timeout for declaring peer call server is not reachable,
7} in seconds.
jnxSurvivableCallServiceMonitorTimeout { jnxSurvivableCallServiceEntry Timeout for monitoring if peer call server is reachable,
8} in seconds.
jnxSurvivableCallService { jnxSurvivableCallServiceEntry Heartbeat interval in survivable state, in milliseconds.
HeartbeatSurvivableInterval 9}
jnxSurvivableCallService { jnxSurvivableCallServiceEntry Minimum response threshold value, in percentage.
ResponseThresholdMinimum 10 }
jnxSurvivableCallServiceServicePointZone { jnxSurvivableCallServiceEntry Zone for using survivable call service.
11 }
jnxSurvivableCallServiceDialPlan { jnxSurvivableCallServiceEntry The dial plan for survivable call service.
12 }
Related • Trunk Configuration on page 365
Documentation
• Digit Manipulation on page 366
Trunk Configuration
The jnxTrunkConfigTable object, whose object ID is { jnxRtmMIBObjects 5 }, contains the
trunk configuration objects. .
Table 116 on page 365 identifies objects in the jnxTrunkConfigTable branch.
Table 116: jnxTrunkConfigTable
Object Object ID Description
jnxTrunkConfigName { jnxTrunkConfigEntry 1 } The trunk configuration name.
jnxTrunkConfigType { jnxTrunkConfigEntry 2 } The trunk type.
jnxTrunkConfigTdmInterface { jnxTrunkConfigEntry 3 } The time-division multiplexing (TDM) interface.
jnxTrunkConfigT1CasGroupTimeSlots { jnxTrunkConfigEntry 4 } The channel associated for signaling the time slot
configuration.
jnxTrunkConfigT1CasGroupSignaling { jnxTrunkConfigEntry 5 } The channel associated with the signaling type.
Related • Digit Manipulation on page 366
Documentation
Copyright © 2010, Juniper Networks, Inc. 365
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Station Configuration on page 367
Digit Manipulation
The jnxDigitManipulationTable object, whose object ID is { jnxRtmMIBObjects 6 }, contains
the digit manipulation objects. With digit manipulation, when a dialed number is received
and matched to a plain old telephone service (POTS) dial peer, the matched digits are
stripped and the remaining digits are forwarded to a voice interface.
Table 117 on page 366 identifies objects in the jnxDigitManipulationTable branch.
Table 117: jnxDigitManipulationTable
Object Object ID Description
jnxDigitTransformName { jnxDigitManipulationEntry 1 } The rule name of the digit transform.
jnxDigitTransformRegularExpression { jnxDigitManipulationEntry 2 } The regular expression of the digit transform.
Related • Station Configuration on page 367
Documentation
• Dial Plan Configuration on page 367
Attendant Features
The jnxFeatures object, whose object ID is { jnxRtmMIBObjects 8 }, contains the objects
listed in Table 118 on page 366.
Table 118: jnxFeatures
Object Object ID Description
jnxFeaturesLiveAttendantExtension { jnxFeatures 1 } The current extension of the attendant.
jnxFeaturesLiveAttendantStartTime { jnxFeatures 2 } The start time for the availability of the attendant.
jnxFeaturesLiveAttendantEndTime { jnxFeatures 3 } The end time for the availability of the attendant.
jnxFeaturesAttendantRingCount { jnxFeatures 4 } The ring count wait, before using an auto-attendant.
jnxFeaturesVoicemailExtension { jnxFeatures 5 } The voicemail extension of the attendant.
jnxFeaturesVoicemailRemote { jnxFeatures 6 } The remote access number to reach the voice mail of
AccessNumber the attendant.
Related • Station Configuration on page 367
Documentation
• Dial Plan Configuration on page 367
366 Copyright © 2010, Juniper Networks, Inc.
Chapter 31: Interpreting the Enterprise-Specific Real-Time Media MIB
Station Configuration
The jnxStationTable object, whose object ID is { jnxRtmMIBObjects 3 }, contains the
station configuration objects. .
Table 119 on page 367 identifies objects in the jnxStationTable branch.
Table 119: jnxStationTable
Object Object ID Description
jnxStationName { jnxStationEntry 1 } The station name.
jnxStationExtension { jnxStationEntry 2 } The station extension.
jnxStationRestriction { jnxStationEntry 3 } The class of restriction for the station.
jnxStationCallerId { jnxStationEntry 5 } The caller ID of the station.
jnxStationDID { jnxStationEntry 6 } The direct inward dialing (DID) number for the station.
jnxStationDILTdmInterface { jnxStationEntry 7 } The direct inward line time-division multiplexing (TDM)
interface for the station.
jnxStationDILTimeSlotNumber { jnxStationEntry 8 } Direct inward line time slot number for the station.
jnxStationAuthId { jnxStationEntry 9 } Authentication identifier of the station.
jnxStationType { jnxStationEntry 10 } The station type.
jnxStationTemplate { jnxStationEntry 11 } The template name of the station.
jnxStationTdmInterface { jnxStationEntry 12 } The TDM interface of the station. If the station type is
Session Initiation Protocol (SIP), the object is not
applicable and contains a null string.
jnxStationTimeSlotNumber { jnxStationEntry 13 } The time slot number for the station. If the station type
is SIP, the object is not applicable.
Related • Dial Plan Configuration on page 367
Documentation
• Class of Restriction on page 368
Dial Plan Configuration
The jnxDialPlanTable object, whose object ID is { jnxRtmMIBObjects 9 }, contains the dial
plan for survivable call service configuration objects.
Table 120 on page 368 identifies objects in the jnxDialPlanTable branch.
Copyright © 2010, Juniper Networks, Inc. 367
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 120: jnxDialPlanTable
Object Object ID Description
jnxDialPlanName { jnxDialPlanEntry 1 } The dial plan name.
jnxDialPlanDigitPattern { jnxDialPlanEntry 2 } The dial plan digit pattern.
jnxDialPlanCallType { jnxDialPlanEntry 3 } The dial plan call type.
jnxDialPlanTrunkGroupList { jnxDialPlanEntry 4 } The list of associated trunk groups of the dial plan.
Related • Class of Restriction on page 368
Documentation
• Media Gateway Configuration on page 368
Class of Restriction
The jnxClassOfRestrictionTable object, whose object ID is { jnxRtmMIBObjects 11 }, contains
the class of restriction configuration objects.
Table 121 on page 368 identifies objects in the jnxClassOfRestrictionTable branch.
Table 121: jnxClassOfRestrictionTable
Object Object ID Description
jnxClassOfRestrictionName { jnxClassOfRestrictionEntry 1 } The name of the class of restriction object.
jnxRestrictionPolicyName { jnxClassOfRestrictionEntry 2 } The policy name of the class of restriction object.
jnxRestrictionCallType { jnxClassOfRestrictionEntry 3 } The call type of the class of restriction object.
jnxRestrictionCallPermission { jnxClassOfRestrictionEntry 4 } The call permission feature of the class of restriction
object.
Related • Media Gateway Configuration on page 368
Documentation
• Trunk Group Configuration on page 369
Media Gateway Configuration
The jnxMediaGatewayTable object, whose object ID is { jnxSipCommonMIBObjects 1 },
contains the common configuration objects applicable to all the Session Initiation Protocol
(SIP) entities.
Table 122 on page 368 identifies objects in the jnxMediaGatewayTable branch.
Table 122: jnxMediaGatewayTable
Object Object ID Description
jnxMediaGatewayName { jnxMediaGatewayEntry 1 } The media gateway name.
368 Copyright © 2010, Juniper Networks, Inc.
Chapter 31: Interpreting the Enterprise-Specific Real-Time Media MIB
Table 122: jnxMediaGatewayTable (continued)
Object Object ID Description
jnxMediaGatewayPeerCallServer { jnxMediaGatewayEntry 2 } The peer call server of the media gateway.
jnxMediaGatewaySipProtocolPort { jnxMediaGatewayEntry 3 } The port number for signaling the media gateway.
jnxMediaGatewaySipProtocolTransport { jnxMediaGatewayEntry 4 } The transport type for signaling the media gateway.
jnxMediaGatewayDialPlan { jnxMediaGatewayEntry 5 } The dial plan for the survivable call service of the media
gateway.
Related • Trunk Group Configuration on page 369
Documentation
• Survivable Call Service Statistics on page 369
Trunk Group Configuration
The jnxTrunkGroupTable object, whose object ID is { jnxRtmMIBObjects 13 }, contains the
trunk group configuration objects.
Table 123 on page 369 identifies objects in the jnxTrunkGroupTable branch.
Table 123: jnxTrunkGroupTable
Object Object ID Description
jnxTrunkGroupName { jnxTrunkGroupEntry 1 } The trunk group name.
jnxTrunkGroupDescription { jnxTrunkGroupEntry 2 } The trunk group description.
jnxTrunkGroupTrunkList { jnxTrunkGroupEntry 3 } The list of trunks associated with the trunk group.
Related • Survivable Call Service Statistics on page 369
Documentation
• Media Gateway Configuration on page 368
Survivable Call Service Statistics
The jnxSurvivableStatsTable object, whose object ID is { jnxRtmMIBObjects 14 }, contains
the survivable call service statistics objects.
Table 124 on page 369 identifies objects in the jnxSurvivableStatsTable branch.
Table 124: jnxSurvivableStatsTable
Object Object ID Description
jnxSurvivableStatsAddress { jnxSurvivableStatsEntry 1 } The IP address of the remote Session Initiation Protocol
(SIP) service.
jnxSurvivableStatsPort { jnxSurvivableStatsEntry 2 } The port number of the survivable call service.
Copyright © 2010, Juniper Networks, Inc. 369
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 124: jnxSurvivableStatsTable (continued)
Object Object ID Description
jnxSurvivableStatsTransport { jnxSurvivableStatsEntry 3 } The transport type of the survivable call service.
jnxSurvivableStatsSCSName { jnxSurvivableStatsEntry 4 } The survivable call service name.
jnxSurvivableStatsPeerCallServer { jnxSurvivableStatsEntry 5 } The peer call server of the survivable call service.
jnxSurvivableStatsCurrentState { jnxSurvivableStatsEntry 6 } Current state of the survivable call service.
jnxSurvivableStatsPriority { jnxSurvivableStatsEntry 7 } Priority in terms of responsiveness of the survivable call
service.
jnxSurvivableStatsLastDownTime { jnxSurvivableStatsEntry 8 } The last time that the survivable call service was down.
jnxSurvivableStatsLastDownLen { jnxSurvivableStatsEntry 9 } The duration of the last down time, in milliseconds.
jnxSurvivableStatsTotalDownTime { jnxSurvivableStatsEntry 10 } The duration of the total down time, in milliseconds.
jnxSurvivableStatsTimesDown { jnxSurvivableStatsEntry 11 } The number of times the survivable call service was
down.
jnxSurvivableStatsMinResponse { jnxSurvivableStatsEntry 12 } The minimum response time of the survivable call
service, in milliseconds.
jnxSurvivableStatsMaxResponse { jnxSurvivableStatsEntry 13 } The maximum response time of the survivable call
service, in milliseconds.
jnxSurvivableStatsAvgResponse { jnxSurvivableStatsEntry 14 } The average response time of the survivable call service,
in milliseconds.
Related • Media Gateway Configuration on page 368
Documentation
• Trunk Group Configuration on page 369
370 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 32
Interpreting the Enterprise-Specific
Reverse-Path-Forwarding MIB
• Reverse Path Forwarding MIB on page 371
• jnxRpfStatsTable on page 371
Reverse Path Forwarding MIB
The Juniper Networks enterprise-specific Reverse-Path-Forwarding MIB monitors statistics
for traffic that is rejected because of reverse-path-forwarding (RPF) processing. The
Reverse-Path-Forwarding MIB includes one main object, jnxRpfStats, with an object
identifier of {jnxRpf 1}. For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rpf.txt
.
For information about the enterprise-specific Reverse Path Forwarding MIB objects, see
the following topic:
• jnxRpfStatsTable on page 371
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxRpfStatsTable
The jnxRpfStatsTable, whose object identifier is {jnxRpfStats 1}, provides a list of RPF
entries in table format.
The jnxRpfStatsEntry, whose object identifier is {jnxRpfStatsTable 1}, has four objects,
which are listed in Table 125 on page 371.
Table 125: jnxRpfStatsEntry
Object Object Identifier Description
jnxRpfStatsIfIndex jnxRpfStatsEntry The ingress interface for traffic that is counted in an
1 RpfStats entry.
Copyright © 2010, Juniper Networks, Inc. 371
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 125: jnxRpfStatsEntry (continued)
Object Object Identifier Description
jnxRpfStatsAddrFamily jnxRpfStatsEntry The address family of an entry’s traffic, which can
2 be in IPv4 or IPv6 format.
jnxRpfStatsPackets jnxRpfStatsEntry The number of packets received on this interface,
3 belonging to this address family, that have been
rejected due to RPF processing.
jnxRpfStatsBytes jnxRpfStatsEntry The number of bytes received on this interface,
4 belonging to this address family, that have been
rejected due to RPF processing.
Related • Reverse Path Forwarding MIB on page 371
Documentation
372 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 33
Interpreting the Enterprise-Specific RMON
Events and Alarms MIB
• RMON Events and Alarms MIB on page 373
• jnxRmonAlarmTable on page 374
• RMON Event and Alarm Traps on page 375
RMON Events and Alarms MIB
The Juniper Networks enterprise-specific Remote Monitoring (RMON) Events and Alarms
MIB monitors objects on a device and warns the network system administrator if one of
those values exceeds the defined range. The alarm monitors objects in this MIB and
triggers an event when the condition (falling or rising threshold) is reached.
The Juniper Networks enterprise-specific extension to the standard RMON MIB augments
the alarmTable with additional information about each alarm. Two new traps,
jnxRmonAlarmGetFailure and jnxRmonGetOk, are also defined to indicate when problems
are encountered with an alarm.
To view a complete copy of the enterprise-specific extensions to the RMON MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-rmon.txt
.
For more information about RMON alarms and events, see the Junos OS Network
Management Configuration Guide.
For information about the enterprise-specific RMON Events and Alarms MIB objects, see
the following topics:
• jnxRmonAlarmTable on page 374
• RMON Event and Alarm Traps on page 375
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 373
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxRmonAlarmTable
The entries in the jnxRmonAlarmTable, whose object identifier is {jnxMibs 13}, are
represented by jnxRmonAlarmEntry, whose object identifier is {jnxRmonAlarmTable1}
and are listed in Table 126 on page 374.
Table 126: jnxRmonAlarmEntry
Object Object Identifier Description
jnxRmonAlarmGetFailCnt jnxRmonAlarmEntry Represents the number of times the internal
1 Get request for the variable monitored by
this entry has failed.
jnxRmonAlarmGetFailTime jnxRmonAlarmEntry Represents the value of sysUpTime when
2 an internal Get request for the variable
monitored by this entry last failed.
jnxRmonAlarmGetFailReason jnxRmonAlarmEntry Represents the reason an internal Get
3 request for the variable monitored by this
entry last failed. This object contains the
following values:
• other (1)—An error was encountered that
does not fit into one of the currently
defined categories.
• noError (2)—Get request processed
successfully.
• noSuchObject (3)—Requested object not
available.
• outOfView (4)—Requested object
instance out of MIB view.
• noSuchInstance (5)—Requested object
instance not available.
• badReqId (6)—Unexpected request ID
encountered while processing Get
request.
• oidMatchErr (7)—Unexpected object ID
encountered while processing Get
request.
• oidBindErr (8)—Unable to bind object ID
to Get request PDU.
• createPktErr (9)—Unable to create Get
request PDU.
• badObjType (10)—Unexpected object
type encountered while processing Get
request.
jnxRmonAlarmGetOkTime jnxRmonAlarmEntry Represents the value of sysUpTime when
4 an internal Get request for the variable
monitored by this entry succeeded and the
entry left the getFailure state.
374 Copyright © 2010, Juniper Networks, Inc.
Chapter 33: Interpreting the Enterprise-Specific RMON Events and Alarms MIB
Table 126: jnxRmonAlarmEntry (continued)
Object Object Identifier Description
jnxRmonAlarmState jnxRmonAlarmEntry Represents the current state of this RMON
5 alarm entry. This object contains the
following values:
• unknown (1)—Alarm entry unknown
• underCreation (2)—Alarm entry not
activated
• active (3)—Alarm entry active and within
thresholds
• startup (4)—Alarm entry still waiting for
first value
• risingThreshold (5)—Alarm entry has
crossed the rising threshold.
• fallingThreshold (6)—Alarm entry has
crossed the falling threshold
• getFailure (7)—Alarm entry internal Get
request failed.
Related • RMON Events and Alarms MIB on page 373
Documentation
• RMON Event and Alarm Traps on page 375
RMON Event and Alarm Traps
The following traps send notifications when there is a problem with RMON alarm
processing and are listed in Table 127 on page 375.
Table 127: RMON Event and Alarm Traps
Trap Object Identifier Description
jnxRmonAlarmGetFailure jnxRmonTrapPrefix 1 Generated when the Get request for an alarm
variable returns an error. The specific error is
identified by jnxRmonAlarmGetFailReason.
jnxRmonGetOk jnxRmonTrapPrefix 2 Generated when the Get request for an alarm
variable is successful. This trap is sent only if the
previous Get requests were unsuccessful.
Related • RMON Events and Alarms MIB on page 373
Documentation
• jnxRmonAlarmTable on page 374
Copyright © 2010, Juniper Networks, Inc. 375
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
376 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 34
Interpreting the Enterprise-Specific
Security Interface Extension Objects MIB
• Security Interface Extension Objects MIB on page 377
• jnxJsIfMonTable on page 377
Security Interface Extension Objects MIB
The Juniper Networks enterprise-specific Security Interface Extension Objects MIB,
jnxJsIfMIB, whose object ID is {jnxJsIf 1}, defines the object that are used to monitor the
entries in the interfaces that pertain to the security management of the interface.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-if-ext.txt
.
For information about the enterprise-specific Security Interface Extension Objects MIB
objects, see the following topic:
• jnxJsIfMonTable on page 377
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxJsIfMonTable
jnxJsIfMonTable, whose object ID is {jnxJsIfExtension 1}, extends the interface entries on
a particular interface to support the security related-objects listed in Table 128 on page 378.
The table is indexed by ifIndex.
Copyright © 2010, Juniper Networks, Inc. 377
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 128: jnxJsIfMonTable
Object Object ID Description
jnxJsIfMonEntry jnxJsIfMonTable 1 Object related to interface monitoring
Sequence of parameters:
• jnxJsIfMonInIcmp
• jnxJsIfMonInSelf
• jnxJsIfMonInVpn
• jnxJsIfMonInPolicyPermit
• jnxJsIfMonOutPolicyPermit
• jnxJsIfMonConn
• jnxJsIfMonInMcast
• jnxJsIfMonOutMcast
• jnxJsIfMonPolicyDeny
• jnxJsIfMonNoGateParent
• jnxJsIfMonTcpProxyDrop
• jnxJsIfMonNoDip
• jnxJsIfMonNoNspTunnel
• jnxJsIfMonNoNatCon
• jnxJsIfMonInvalidZone
• jnxJsIfMonIpClsFail
• jnxJsIfMonAuthDrop
• jnxJsIfMonMultiUserAuthDrop
• jnxJsIfMonLoopMultiDipDrop
• jnxJsIfMonAddrSpoof
• jnxJsIfMonLpDrop
• jnxJsIfMonNullZone
• jnxJsIfMonNoGate
• jnxJsIfMonNoMinorSess
• jnxJsIfMonNvecErr
• jnxJsIfMonTcpSeq
• jnxJsIfMonIllegalPak
• jnxJsIfMonNoRoute
• jnxJsIfMonAuthFail
• jnxJsIfMonSaInactive
• jnxJsIfMonNoSa
• jnxJsIfMonSelfPktDrop
jnxJsIfMonInIcmp jnxJsIfMonEntry 1 ICMP packets received.
jnxJsIfMonInSelf jnxJsIfMonEntry 2 Self packets received.
jnxJsIfMonInVpn jnxJsIfMonEntry 3 VPN packets received.
jnxJsIfMonInPolicyPermit jnxJsIfMonEntry 4 Incoming bytes permitted by policy.
378 Copyright © 2010, Juniper Networks, Inc.
Chapter 34: Interpreting the Enterprise-Specific Security Interface Extension Objects MIB
Table 128: jnxJsIfMonTable (continued)
Object Object ID Description
jnxJsIfMonOutPolicyPermit jnxJsIfMonEntry 5 Outgoing bytes permitted by policy.
jnxJsIfMonConn jnxJsIfMonEntry 6 Incoming connections established.
jnxJsIfMonInMcast jnxJsIfMonEntry 7 Multicast packets received.
jnxJsIfMonOutMcast jnxJsIfMonEntry 8 Multicast packets sent.
jnxJsIfMonPolicyDeny jnxJsIfMonEntry 9 Packets dropped due to policy denial.
jnxJsIfMonNoGateParent jnxJsIfMonEntry 10 Packets dropped due to no parent for a
gate.
jnxJsIfMonTcpProxyDrop jnxJsIfMonEntry 11 Packets dropped due to syn-attack
protection.
jnxJsIfMonNoDip jnxJsIfMonEntry 12 Packets dropped due to DIP errors.
jnxJsIfMonNoNspTunnel jnxJsIfMonEntry 13 Packets dropped because no NSP tunnel
found.
jnxJsIfMonNoNatCon jnxJsIfMonEntry 14 Packets dropped due to no more
sessions.
jnxJsIfMonInvalidZone jnxJsIfMonEntry 15 Packets dropped because an invalid zone
received the packet.
jnxJsIfMonIpClsFail jnxJsIfMonEntry 16 Packets dropped due to IP classification
failure.
jnxJsIfMonAuthDrop jnxJsIfMonEntry 17 Packets dropped due to user
authentication errors.
jnxJsIfMonMultiUserAuthDrop jnxJsIfMonEntry 18 Packets dropped due to multiple user
authentications in loopback sessions.
jnxJsIfMonLoopMultiDipDrop jnxJsIfMonEntry 19 Packets dropped due to multiple DIP in
loopback sessions.
jnxJsIfMonAddrSpoof jnxJsIfMonEntry 20 Packets dropped due to address
spoofing.
jnxJsIfMonLpDrop jnxJsIfMonEntry 21 Packets dropped due to no loopback.
jnxJsIfMonNullZone jnxJsIfMonEntry 22 Packets dropped due to no zone or NULL
zone binding.
jnxJsIfMonNoGate jnxJsIfMonEntry 23 Packets dropped due to no NAT
gateway.
Copyright © 2010, Juniper Networks, Inc. 379
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 128: jnxJsIfMonTable (continued)
Object Object ID Description
jnxJsIfMonNoMinorSess jnxJsIfMonEntry 24 Packets dropped due to no minor
session.
jnxJsIfMonNvecErr jnxJsIfMonEntry 25 Packets dropped due to no session for
gateway.
jnxJsIfMonTcpSeq jnxJsIfMonEntry 26 Packets dropped because TCP sequence
number out of window.
jnxJsIfMonIllegalPak jnxJsIfMonEntry 27 Packets dropped because they did not
make any sense.
jnxJsIfMonNoRoute jnxJsIfMonEntry 28 Packets dropped because no route was
present.
jnxJsIfMonAuthFail jnxJsIfMonEntry 29 Packets dropped because authentication
failed.
jnxJsIfMonSaInactive jnxJsIfMonEntry 30 Packets dropped because security
association (SA) is not active.
jnxJsIfMonNoSa jnxJsIfMonEntry 31 Packets dropped because no SA found
for incoming security parameter index
(SPI).
jnxJsIfMonSelfPktDrop jnxJsIfMonEntry 32 Packets dropped because there was no
interest in self packets.
Related • Security Interface Extension Objects MIB on page 377
Documentation
380 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 35
Interpreting the Enterprise-Specific SIP
Common MIB
• SIP Common MIB Overview on page 381
• Common Configuration Objects on page 382
• Support for Multiple Ports on page 382
• Support for SIP Option Tags on page 383
• Supported SIP Methods on page 383
• SIP Timer Configuration on page 384
SIP Common MIB Overview
The Juniper Networks enterprise-specific Session Initiation Protocol (SIP) common MIB,
whose object identifier is { jnxSip 1 }, defines objects that are common to all SIP entities.
For a downloadable version of the SIP common MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/
topics/reference/mibs/mib-jnx-sipcommon.txt .
For more information about the enterprise-specific SIP common MIBs, see the following
topics:
• Common Configuration Objects on page 382
• Support for Multiple Ports on page 382
• Support for SIP Option Tags on page 383
• Supported SIP Methods on page 383
• SIP Timer Configuration on page 384
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 381
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Common Configuration Objects
The jnxSipCommonCfgTable, whose object ID is { jnxSipCommonMIBObjects 1 }, contains
the common configuration objects applicable to all the Session Initiation Protocol (SIP)
entities. Table 129 on page 382 identifies objects in the jnxSipCommonCfgTable branch.
Table 129: jnxSipCommonCfgTable
Object Object ID Description
jnxSipCfgApplName { jnxSipCommonCfgEntry 1 } The name of the network application that uniquely
identifies the application to which this entry is applicable.
jnxSipCommonCfgProtocolVersion { jnxSipCommonCfgEntry 2 } The SIP version supported by this SIP entity.
jnxSipCommonCfgServiceOperStatus { jnxSipCommonCfgEntry 3 } The current operational state of the SIP application.
jnxSipCommonCfgServiceStartTime { jnxSipCommonCfgEntry 4 } The sysUpTime value at the time the SIP entity was last
started.
NOTE: The object contains a zero value, if started prior
to the last reinitialization of the local network
management subsystem.
jnxSipCommonCfgServiceLastChange { jnxSipCommonCfgEntry 5 } The sysUpTime value at the time the SIP entity entered
its current operational state.
NOTE: The object contains a zero value, if the current
state was entered prior to the last reinitialization of the
local network management subsystem.
jnxSipCommonCfgOrganization { jnxSipCommonCfgEntry 6 } The organization name that the SIP entity inserts to the
organization headers of the SIP messages.
jnxSipCommonCfgMaxTransactions { jnxSipCommonCfgEntry 7 } The maximum number of simultaneous transactions
per second that the SIP entity manages.
jnxSipCommonCfgEntityType { jnxSipCommonCfgEntry 8 } The list of SIP entities to which the current row is related.
The object is defined as a bit map.
Related • SIP Common MIB Overview on page 381
Documentation
• Support for Multiple Ports on page 382
Support for Multiple Ports
The jnxSipCommonPortTable , whose object ID is { jnxSipCommonMIBObjects 2 }, contains
the list of ports that each Session Initiation Protocol (SIP) entity is allowed to use. Table
130 on page 383 identifies objects in the jnxSipCommonPortTable branch.
382 Copyright © 2010, Juniper Networks, Inc.
Chapter 35: Interpreting the Enterprise-Specific SIP Common MIB
Table 130: jnxSipCommonPortTable
Object Object ID Description
jnxSipPortApplName { jnxSipCommonPortEntry 1 } The name of the network application which uniquely
identifies the application to which this entry is applicable.
jnxSipCommonPort { jnxSipCommonPortEntry 2 } The port of the SIP application.
jnxSipCommonPortTransportRcv { jnxSipCommonPortEntry 3 } The transport protocol that the SIP entity uses to receive
the SIP messages. This object is a bit map.
Related • SIP Common MIB Overview on page 381
Documentation
• Support for SIP Option Tags on page 383
Support for SIP Option Tags
The jnxSipCommonOptionTagTable, whose object ID is { jnxSipCommonMIBObjects 3 },
contains the list of the Session Initiation Protocol (SIP) option tags (SIP extensions) that
are required or supported or unsupported by the SIP entity. Table 131 on page 383 identifies
objects in the jnxSipCommonOptionTagTable branch.
Table 131: jnxSipCommonOptionTagTable
Object Object ID Description
jnxSipOptionTagApplName { jnxSipCommonOptionTagEntry The name of the network application which uniquely identifies
1} the application to which this entry is applicable.
jnxSipCommonOptionTagIndex { jnxSipCommonOptionTagEntry The object uniquely identifies a conceptual row in the table.
2}
jnxSipCommonOptionTag { jnxSipCommonOptionTagEntry The SIP option tag. The option tag names are registered with
3} IANA and are available at http://www.iana.org/ .
jnxSipCommonOptionTagHeaderField { jnxSipCommonOptionTagEntry The header option to which the SIP option tag belongs. For
4} example, headers can be supported (Supported header),
unsupported (Unsupported header), required (Require or
Proxy-Require header) by the SIP entity. A SIP option tag can
be Supported or Required.
Related • SIP Common MIB Overview on page 381
Documentation
• Supported SIP Methods on page 383
Supported SIP Methods
The jnxSipCommonMethodSupportedTable , whose object ID is { jnxSipCommonMIBObjects
4 }, contains the list of methods that each Session Initiation Protocol (SIP) entity supports.
Table 132 on page 384 identifies objects in the jnxSipCommonMethodSupportedTable
branch.
Copyright © 2010, Juniper Networks, Inc. 383
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 132: jnxSipCommonMethodSupportedTable
Object Object ID Description
jnxSipMethodSupportedApplName { jnxSipCommonMethodSupportedEntry The name of the network application which
1} uniquely identifies the application to which
this entry is applicable.
jnxSipCommonMethodSupportedIndex { jnxSipCommonMethodSupportedEntry The conceptual row in the table for a
2} specific SIP method.
jnxSipCommonMethodSupportedName { jnxSipCommonMethodSupportedEntry The supported method name. All of the
3} method name must be uppercase.
Related • SIP Common MIB Overview on page 381
Documentation
• SIP Timer Configuration on page 384
SIP Timer Configuration
The jnxSipCommonCfgTimerTable, whose object ID is { jnxSipCommonMIBObjects 5 },
contains timer configuration objects applicable to Session Initiation Protocol (SIP) user
agent and SIP stateful proxy server entities. Table 133 on page 384 identifies objects in
the jnxSipCommonCfgTimerTable branch.
Table 133: jnxSipCommonCfgTimerTable
Object Object ID Description
jnxSipCfgTimerApplName { jnxSipCommonCfgTimerEntry 1 The name of the network application which uniquely identifies
} the application to which this entry is applicable.
jnxSipCommonCfgTimerA { jnxSipCommonCfgTimerEntry The initial value for the retransmit timer. This object represents
2} the initial time that a SIP entity waits to receive a provisional
response to an INVITE before resending the INVITE request.
jnxSipCommonCfgTimerB { jnxSipCommonCfgTimerEntry The maximum time a SIP entity waits to receive a final
3} response to an INVITE. The timer is started after the
transmission of the initial INVITE request.
jnxSipCommonCfgTimerC { jnxSipCommonCfgTimerEntry The maximum time a SIP proxy server waits to receive a
4} provisional response to an INVITE. The Timer C must be set
for each client transaction for a proxy response to an INVITE
request.
jnxSipCommonCfgTimerD { jnxSipCommonCfgTimerEntry The amount of time that the server transaction can remain in
5} the Completed state for any unreliable transports.
jnxSipCommonCfgTimerE { jnxSipCommonCfgTimerEntry The initial value for the retransmit timer for a non-INVITE
6} method while in the Trying state. This object represents the
initial time that a SIP entity waits to receive a provisional
response to the request before resending the non-INVITE
request.
384 Copyright © 2010, Juniper Networks, Inc.
Chapter 35: Interpreting the Enterprise-Specific SIP Common MIB
Table 133: jnxSipCommonCfgTimerTable (continued)
Object Object ID Description
jnxSipCommonCfgTimerF { jnxSipCommonCfgTimerEntry The maximum time a SIP entity waits to receive a final
7} response to a non-INVITE request. The timer is started upon
transmission of the initial request.
jnxSipCommonCfgTimerG { jnxSipCommonCfgTimerEntry The initial value for the retransmit timer for the final responses
8} to INVITE requests.
jnxSipCommonCfgTimerH { jnxSipCommonCfgTimerEntry The maximum time a server waits to receive an
9} acknowledgment before it abandons retransmitting the
response. The timer is started after entering the Completed
state.
jnxSipCommonCfgTimerI { jnxSipCommonCfgTimerEntry The maximum time a SIP entity waits to receive an additional
10 } acknowledgment message retransmissions. The timer is
started after entering the Confirmed state.
jnxSipCommonCfgTimerJ { jnxSipCommonCfgTimerEntry The maximum time a SIP server waits to receive retransmission
11 } of non-INVITE requests. The timer is started after entering the
Completed state for non-INVITE transactions.
jnxSipCommonCfgTimerK { jnxSipCommonCfgTimerEntry The maximum time a SIP client waits to receive
12 } retransmissions of responses to non-INVITE requests. The
timer is started after entering the Completed state for
non-INVITE transactions.
jnxSipCommonCfgTimerT1 { jnxSipCommonCfgTimerEntry The T1 timer for a SIP entity. T1 is an estimate of the round-trip
13 } time (RTT) between the client and the server transactions.
jnxSipCommonCfgTimerT2 { jnxSipCommonCfgTimerEntry The T2 timer for a SIP entity. T2 is the maximum retransmit
14 } interval for non-INVITE requests and INVITE responses.
jnxSipCommonCfgTimerT4 { jnxSipCommonCfgTimerEntry The T4 timer for a SIP entity. T4 is the maximum duration a
15 } message remains in the network. It represents the amount of
time the network takes to clear messages between the client
and the server transactions.
Related • SIP Common MIB Overview on page 381
Documentation
• Supported SIP Methods on page 383
Copyright © 2010, Juniper Networks, Inc. 385
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
386 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 36
Interpreting the Enterprise-Specific SNMP
IDP MIB
• IDP MIB on page 387
• jnxJsIdpAttackTable on page 387
• IDP Signature Update and Attack Traps on page 388
IDP MIB
The Juniper Networks enterprise-specific IDP MIB, jnxJsIdpMIB, whose object ID is
{jnxJsIdpRoot 1}, extends SNMP support to the following features on Juniper Networks
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways:
• Key monitoring and threshold-crossing traps
• Attack-related monitoring and traps
• IDP database update status and traps
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-idp.txt
.
For information about the enterprise-specific IDP MIB objects, see the following topics:
• jnxJsIdpObjects
• jnxJsIdpAttackTable on page 387
• IDP Signature Update and Attack Traps on page 388
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxJsIdpAttackTable
The jnxJsIdpAttackTable, whose object ID is {jnxJsIdpObjects 7}, contains the details of
each attack and the number of hits involved. The objects are listed in Table 134 on page 388.
Copyright © 2010, Juniper Networks, Inc. 387
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 134: jnxJsIdpAttackTable
Object Object ID Description
jnxJsIdpAttackEntry jnxJsIdpAttackTable 1 The attributes of an attack
Sequence of parameters:
• jnxJsIdpAttackIndex
• jnxJsIdpAttackName
• jnxJsIdpAttackHits
jnxJsIdpAttackIndex jnxJsIdpAttackEntry 1 The index for the attack table.
jnxJsIdpAttackName jnxJsIdpAttackEntry 2 The name of an attack identified by IDP.
jnxJsIdpAttackHits jnxJsIdpAttackEntry 3 The number of times an attack has been
launched.
Related • IDP MIB on page 387
Documentation
• jnxJsIdpObjects
• IDP Signature Update and Attack Traps on page 388
IDP Signature Update and Attack Traps
The IDP MIB generates an SNMP trap whenever you install or update a signature, and
provides information about the last updated version and a timestamp. It also generates
SNMP traps to notify users about attacks that are detected on the device.
See Table 135 on page 388 for information about the signature update and attack traps.
Table 135: IDP Signature Update and Attack Traps
Object Object ID Description
jnxJsIdpSignatureUpdateNotification jnxJsIdpNotificationPrefix 1 Signifies that a signature update has
occurred.
jnxJsIdpAttackLogNotification jnxJsIdpNotificationPrefix 2 Signifies that attacks have been
detected. jnxJsIdpAttackName lists the
names of the attacks that have been
detected so far, and jnxJsIdpAttackHits
is the number of times each attack has
been detected.
Related • IDP MIB on page 387
Documentation
• jnxJsIdpObjects
• jnxJsIdpAttackTable on page 387
388 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 37
Interpreting the Enterprise-Specific
System Log MIB
• System Log MIB on page 389
• jnxSyslogTable on page 390
• jnxSyslogAvTable on page 392
System Log MIB
Event policies can include an action that raises traps for events based on system log
messages. This feature enables notification of an SNMP trap-based application when
an important system log message occurs. You can convert any system log message (for
which there are no corresponding traps) into a trap. This feature is valuable for customers
who use network management system traps rather than system log messages to monitor
their networks. For more information about converting system log messages into traps,
see the Junos Configuration and Operations Automation Guide.
The Juniper Networks enterprise-specific System Log MIB, whose object identifier is
{jnxMibs 35}, provides support for this feature.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-syslog.txt
.
For information about the enterprise-specific System Log MIB objects, see the following
topics:
• jnxSyslogTable on page 390
• jnxSyslogAvTable on page 392
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
Copyright © 2010, Juniper Networks, Inc. 389
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
jnxSyslogTable
The jnxSyslogTable, whose object identifier is {jnxSyslog 1}, provides information about
each system log message generated by the router.
The jnxSyslogEntry, whose object identifier is {jnxSyslogTable 1}, has nine objects, which
are listed in Table 136 on page 390. Each entry provides information about a single system
log message.
Table 136: jnxSyslogTable
Object Object Identifier Description
jnxSyslogID jnxSyslogEntry 1 System log message identifier. This identifier is a
numerical value and may not be consecutive. This
identifier is also used as the primary index in
jnxSyslogAttrValTable.
jnxSyslogEventName jnxSyslogEntry 2 An octet string that contains the system log event
name.
jnxSyslogTimestamp jnxSyslogEntry 3 Time the message was generated. This value is
expressed as DateAndTime.
jnxSyslogSeverity jnxSyslogEntry 4 Severity of the system log message. The severity
value is equal to the value that the system log
uses + 1. For example, an emergency message
(severity 0 in the system log) has a severity of 1.
Severity values include:
• emergency (1)
• alert (2)
• critical (3)
• error (4)
• warning (5)
• notice (6)
• info (7)
• debug (8)
jnxSyslogFacility jnxSyslogEntry 5 Identifies the facility used to generate the log
message. (Table 137 on page 391.)
jnxSyslogProcessID jnxSyslogEntry 6 Process ID of the process that generated the
system log message.
jnxSyslogProcessName jnxSyslogEntry 7 Process that generated the system log message.
jnxSyslogHostName jnxSyslogEntry 8 Hostname of the machine that generated the
system log.
jnxSyslogMessage jnxSyslogEntry 9 System log message that was generated.
390 Copyright © 2010, Juniper Networks, Inc.
Chapter 37: Interpreting the Enterprise-Specific System Log MIB
Table 137 on page 391 lists the facilities that generate system log messages.
Table 137: Facilities That Generate System Log Messages
Index Item Description
1 kernel Kernel messages
2 user User level messages
3 mail Mail system
4 daemon System processes
5 auth Authorization messages
6 syslog Messages generated by the system log process (syslogd)
7 lpr Line printer subsystem
8 news Network news subsystem
9 uucp UUCP subsystem
10 cron Clock process
11 authPriv Authorization messages
12 ftp FTP process
13 ntp NTP subsystem
14 security Security subsystems (for example, firewall)
15 console /dev/console output
16 reserved Reserved for system use
17 loca10 –
18 dfc Junos names
19 loca12 –
20 firewall Junos names
21 pfe Junos names
22 conflict Junos names
23 change Junos names
Copyright © 2010, Juniper Networks, Inc. 391
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 137: Facilities That Generate System Log Messages (continued)
Index Item Description
24 interact Junos names
Related • System Log MIB on page 389
Documentation
• jnxSyslogAvTable on page 392
jnxSyslogAvTable
The jnxSyslogAvTable, whose object identifier is {jnxSyslogNotifyVars 2}, provides
information about each system log message generated by the router.
The jnxSyslogAvEntry, whose object identifier is {jnxSyslogAvTable 1}, has three objects,
which are listed in Table 138 on page 392. Each entry provides information about attribute
value pairs of system log messages generated by a device.
Table 138: jnxSyslogAvTable
Object Object Identifier Description
jnxSyslogAvIndex jnxSyslogAvEntry 1 Index for the attribute value pair in the system log
message.
jnxSyslogAvAttribute jnxSyslogAvEntry 2 Attribute of the system log message (identified
by jnxSyslogID).
jnxSyslogAvValue jnxSyslogAvEntry 3 Value of the attribute (identified by
jnxSyslogAvAttribute).
Related • System Log MIB on page 389
Documentation
• jnxSyslogTable on page 390
392 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 38
Interpreting the Enterprise-Specific
Traceroute MIB
This chapter contains the following topics:
• Traceroute MIB on page 393
• jnxTraceRouteCtlTable on page 393
Traceroute MIB
The Juniper Networks enterprise-specific Traceroute MIB supports Junos OS extensions
of traceroutes and remote operations. Items in this MIB are created when entries are
created in the traceRouteCtlTable of the Traceroute MIB. Each item is indexed exactly
the same way as it is in the enterprise-specific Traceroute MIB. For a downloadable
version of the Traceroute MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-traceroute.txt
.
For more information about using the Traceroute MIB and enterprise-specific Traceroute
MIB, see the Junos OS Network Management Configuration Guide.
For information about the enterprise-specific Traceroute MIB objects, see the following
topic:
• jnxTraceRouteCtlTable on page 393
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxTraceRouteCtlTable
The jnxTraceRouteCtlTable, whose object identifier is {jnxTraceRouteObjects 2}, defines
the jnxTraceRoute control table for providing enterprise-specific options to the
corresponding traceRouteCtlEntry.
Copyright © 2010, Juniper Networks, Inc. 393
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Each jnxTraceRouteCtlEntry has two indexes that are identical to those of the
corresponding TraceRouteCtlEntry. Entries created in TraceRouteCtlTable are mirrored
here and are listed in Table 139 on page 394.
Table 139: jnxTraceRouteCtlTable
Object Object Identifier Description
jnxTRCtlOwnerIndex jnxTraceRouteCtlEntry 1 Specifies the first index. It is identical
to jnxTraceRouteCtlOwnerIndex of the
corresponding jnxTraceRouteCtlEntry
in the jnxTraceRouteCtlTable.
jnxTRCtlTestName jnxTraceRouteCtlEntry 2 Specifies the other index. It is identical
to jnxTraceRouteCtlTestName of the
corresponding jnxTraceRouteCtlEntry
in the jnxTraceRouteCtlTable.
jnxTRCtlIfName jnxTraceRouteCtlEntry 3 Specifies the name of the outgoing
interface for traceroute probes. This is
the name-based complement to
traceRouteCtlIfIndex. A zero-length
string value for this object means that
this option is not enabled. The
following values can be set
simultaneously, but only one value is
used.
The precedence order is as follows:
• traceRouteCtlIfIndex (see
traceRouteCtlTable in the
Traceroute MIB)
• jnxTRCtlIfName
• jnxTRCRoutingInstanceName
jnxTRCtlRoutingInstanceName jnxTraceRouteCtlEntry 4 Specifies the name of the routing
instance used when directing outgoing
traceroute packets. The instance name
specified must be configured at the
[edit routing-instances] hierarchy level
of the Junos configuration.
Related • Traceroute MIB on page 393
Documentation
394 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 39
Interpreting the Enterprise-Specific Utility
MIB
• Utility MIB on page 395
• jnxUtilCounter32Table on page 396
• jnxUtilCounter64Table on page 396
• jnxUtilIntegerTable on page 397
• jnxUtilUintTable on page 397
• jnxUtilStringTable on page 398
Utility MIB
The Juniper Networks enterprise-specific Utility MIB, whose object ID is {jnxUtilMibRoot 1}
defines objects for counters, intergers, and strings. The Utility MIB contains one table for
each of the following five data types:
• 32–bit counters
• 64–bit counters
• Signed integers
• Unsigned integers
• Octet strings
Each data has an arbitrary ASCII name, which is defined when the data is populated, and
a timestamp that shows the last time when the data instance was modified. For a
downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-util.txt
.
For information about the enterprise-specific Utility MIB objects, see the following topics:
• jnxUtilCounter32Table on page 396
• jnxUtilCounter64Table on page 396
• jnxUtilIntegerTable on page 397
Copyright © 2010, Juniper Networks, Inc. 395
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• jnxUtilUintTable on page 397
• jnxUtilStringTable on page 398
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxUtilCounter32Table
jnxUtilCounter32Table, whose object ID is {jnxUtilData 1},contains information about
32–bit counters.
Each jnxUtilCounter32Entry has the objects listed in Table 140 on page 396.
Table 140: jnxUtilCounter32Entry
Object Object ID Description
jnxUtilCounter32Name jnxUtilCounter32Entry 1 Name assigned to the instance.
jnxUtilCounter32Value jnxUtilCounter32Entry 2 Value of the instance.
jnxUtilCounter32Time jnxUtilCounter32Entry 3 Time when the instance was last populated.
Related • Utility MIB on page 395
Documentation
• jnxUtilCounter64Table on page 396
• jnxUtilIntegerTable on page 397
• jnxUtilUintTable on page 397
• jnxUtilStringTable on page 398
jnxUtilCounter64Table
jnxUtilCounter64Table, whose object ID is {jnxUtilData 2}, contains information about
64–bit counters.
Each jnxUtilCounter64Entry has the objects listed in Table 141 on page 396.
Table 141: jnxUtilCounter64Entry
Object Object ID Description
jnxUtilCounter64Name jnxUtilCounter64Entry 1 Name assigned to the instance.
jnxUtilCounter64Value jnxUtilCounter64Entry 2 Value of the instance.
jnxUtilCounter64Time jnxUtilCounter64Entry 3 Time when the instance was last populated.
396 Copyright © 2010, Juniper Networks, Inc.
Chapter 39: Interpreting the Enterprise-Specific Utility MIB
Related • Utility MIB on page 395
Documentation
• jnxUtilCounter32Table on page 396
• jnxUtilIntegerTable on page 397
• jnxUtilUintTable on page 397
• jnxUtilStringTable on page 398
jnxUtilIntegerTable
jnxUtilIntegerTable, whose object ID is {jnxUtilData 3}, contains information about signed
integer values.
Each jnxUtilIntegerEntry contains the objects listed in Table 142 on page 397.
Table 142: jnxUtilIntegerEntry
Object Object ID Description
jnxUtilIntegerName jnxUtilIntegerEntry 1 Name assigned to the instance.
jnxUtilIntegerValue jnxUtilIntegerEntry 2 Value of the instance.
jnxUtilIntegerTime jnxUtilIntegerEntry 3 Time when the instance was last populated.
Related • Utility MIB on page 395
Documentation
• jnxUtilCounter32Table on page 396
• jnxUtilCounter64Table on page 396
• jnxUtilUintTable on page 397
• jnxUtilStringTable on page 398
jnxUtilUintTable
jnxUtilUintTable, whose object ID is {jnxUtilData 4}, contains information about unsigned
integer values.
Each jnxUtilUintEntry has the objects listed in Table 143 on page 397.
Table 143: jnxUtilUintEntry
Object Object ID Description
jnxUtilUintName jnxUtilUintEntry 1 Name assigned to the instance.
jnxUtilUintValue jnxUtilUintEntry 2 Value of the instance.
jnxUtilUintTime jnxUtilUintEntry 3 Time when the instance was last populated.
Copyright © 2010, Juniper Networks, Inc. 397
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Related • Utility MIB on page 395
Documentation
• jnxUtilCounter32Table on page 396
• jnxUtilCounter64Table on page 396
• jnxUtilIntegerTable on page 397
• jnxUtilStringTable on page 398
jnxUtilStringTable
jnxUtilStringTable, whose object ID is {jnxUtilData 5}, contains information about octate
strings.
Each jnxUtilStringEntry contains the objects listed in Table 144 on page 398.
Table 144: jnxUtilStringEntry
Object Object ID Description
jnxUtilStringName jnxUtilStringEntry 1 Name assigned to the instance.
jnxUtilStringValue jnxUtilStringEntry 2 Value of the instance.
jnxUtilStringTime jnxUtilStringEntry 31 Time when the instance was last populated.
Related • Utility MIB on page 395
Documentation
• jnxUtilCounter32Table on page 396
• jnxUtilCounter64Table on page 396
• jnxUtilIntegerTable on page 397
• jnxUtilUintTable on page 397
398 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 40
Interpreting the Enterprise-Specific VPN
Certificate Objects MIB
• VPN Certificate Objects MIB on page 399
• jnxJsLoadedCaCertTable on page 399
• jnxJsLoadedLocalCertTable on page 400
VPN Certificate Objects MIB
The Juniper Networks enterprise-specific VPN Certificate Objects MIB, jnxJsCertificateMIB,
whose object ID is {jjnxJsCertificates 1}, defines the objects that are used to monitor
reference and attributes to the certificates.
A related VPN Certificate Object MIB is jnxJsCertificateObjects {jnxJsCertificateMIB 1}.
For a downloadable version of this MIB, see
http://www.juniper.net/techpubs/en_US/junos10.4/topics/reference/mibs/mib-jnx-js-cert.txt
.
For information about the enterprise-specific VPN Certificate Objects MIB, see the
following topics:
• jnxJsLoadedCaCertTable on page 399
• jnxJsLoadedLocalCertTable on page 400
Related • Juniper Networks Enterprise-Specific MIBs on page 23
Documentation
• Standard SNMP MIBs Supported by Junos OS on page 12
jnxJsLoadedCaCertTable
The jnxJsLoadedCaCertTable, whose object ID is {jnxJsCertificateObjects 1}, exposes the
loaded Certification Authority (CA)-issued certificate objects listed in Table 145 on
page 400. Certificates are used when establishing a secure connection in the device.
Copyright © 2010, Juniper Networks, Inc. 399
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Table 145: jnxJsLoadedCaCertTable
Object Object ID Description
jnxJsLoadedCaCertEntry jnxJsLoadedCaCertTable 1 Loaded CA certificate entry. The loaded CA certificate entry
is indexed by the CA certification name.
Sequence of parameters:
• jnxJsLoadedCaCertName
• jnxJsLoadedCaCertSubject
• jnxJsLoadedCaCertExpire
• jnxJsLoadedCaCertIssuer
jnxJsLoadedCaCertName jnxJsLoadedCaCertEntry 1 Loaded CA certificate name. This name is unique within
the loaded CA certifcates.
jnxJsLoadedCaCertSubject jnxJsLoadedCaCertEntry 2 CA certificate subject
jnxJsLoadedCaCertExpire jnxJsLoadedCaCertEntry 3 Expiration time and date of CA certificate
jnxJsLoadedCaCertIssuer jnxJsLoadedCaCertEntry 4 Issuer of CA certificate
Related • VPN Certificate Objects MIB on page 399
Documentation
• jnxJsLoadedLocalCertTable on page 400
jnxJsLoadedLocalCertTable
The jnxJsLoadedLocalCertTable, whose object ID is jnxJsCertificateObjects 2, exposes the
loaded local certificate objects listed in Table 146 on page 400. Certificates are used when
establishing a secure connection in the device.
Table 146: jnxJsLoadedLocalCertTable
Object Object ID Description
jnxJsLoadedLocalCertEntry jnxJsLoadedLocalCertTable 1 Default certificate entry. This entry is indexed by the
certification name.
Sequence of parameters:
• jnxJsLoadedLocalCertName
• jnxJsLoadedLocalCertSubject
• jnxJsLoadedLocalCertExpire
• jnxJsLoadedLocalCertIssuer
jnxJsLoadedLocalCertName jnxJsLoadedLocalCertEntry 1 Name of the local certificate. The certificate name is
unique within the loaded local certificates.
jnxJsLoadedLocalCertSubject jnxJsLoadedLocalCertEntry 2 Certificate subject.
jnxJsLoadedLocalCertExpire jnxJsLoadedLocalCertEntry 3 Expiration time and date of the local certificate.
400 Copyright © 2010, Juniper Networks, Inc.
Chapter 40: Interpreting the Enterprise-Specific VPN Certificate Objects MIB
Table 146: jnxJsLoadedLocalCertTable (continued)
Object Object ID Description
jnxJsLoadedLocalCertIssuer jnxJsLoadedLocalCertEntry 4 Issuer of the local certificate.
Related • VPN Certificate Objects MIB on page 399
Documentation
• jnxJsLoadedCaCertTable on page 399
Copyright © 2010, Juniper Networks, Inc. 401
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
402 Copyright © 2010, Juniper Networks, Inc.
PART 4
Accounting Options
• Accounting Options Overview on page 405
• Configuring Accounting Options on page 407
Copyright © 2010, Juniper Networks, Inc. 403
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
404 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 41
Accounting Options Overview
This chapter contains the following topic:
• Accounting Options Overview on page 405
Accounting Options Overview
An accounting profile represents common characteristics of collected accounting data,
including the following:
• Collection interval
• File to contain accounting data
• Specific fields and counter names on which to collect statistics
You can configure multiple accounting profiles, as described in Table 147 on page 405.
Table 147: Types of Accounting Profiles
Type of Profile Description
Interface profile Collects the specified error and statistic information.
Filter profile Collects the byte and packet counts for the counter names
specified in the filter profile.
MIB profile Collects selected MIB statistics and logs them to a specified
file.
Routing Engine profile Collects selected Routing Engine statistics and logs them to
a specified file.
Class usage profile Collects class usage statistics and logs them to a specified
file.
Related • Understanding Device Management Functions in Junos OS on page 3
Documentation
• Accounting Options Configuration on page 407
• Configuring Accounting-Data Log Files on page 410
Copyright © 2010, Juniper Networks, Inc. 405
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Configuring the Interface Profile on page 413
• Configuring the Filter Profile on page 416
• Configuration Statements at the [edit accounting-options] Hierarchy Level
406 Copyright © 2010, Juniper Networks, Inc.
CHAPTER 42
Configuring Accounting Options
This chapter contains the following topics:
• Accounting Options Configuration on page 407
• Configuring Accounting-Data Log Files on page 410
• Configuring the Interface Profile on page 413
• Configuring the Filter Profile on page 416
• Example: Configuring a Filter Profile on page 417
• Example: Configuring Interface-Specific Firewall Counters and Filter Profiles on page 418
• Understanding Source Class Usage and Destination Class Usage Options on page 420
• Configuring SCU or DCU on page 420
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring Class Usage Profiles on page 424
• Configuring the MIB Profile on page 426
• Configuring the Routing Engine Profile on page 428
Accounting Options Configuration
This topic contains the following sections:
• Accounting Options—Full Configuration on page 407
• Minimum Accounting Options Configuration on page 408
Accounting Options—Full Configuration
To configure accounting options, include the following statements at the [edit
accounting-options] hierarchy level:
accounting-options {
class-usage-profile profile-name {
file filename;
interval minutes;
destination-classes {
destination-class-name;
}
source-classes {
source-class-name;
Copyright © 2010, Juniper Networks, Inc. 407
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
}
file filename {
archive-sites {
site-name;
}
files number;
nonpersistent;
size bytes;
source-classes time
transfer-interval minutes;
}
filter-profile profile-name {
counters {
counter-name;
}
file filename;
interval minutes;
}
}
interface-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
mib-profile profile-name {
file filename;
interval seconds;
object-names {
mib-object-name;
}
operation operation-name;
}
routing-engine-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
}
By default, accounting options are disabled.
Minimum Accounting Options Configuration
To enable accounting options on the router, you must perform at least the following
tasks:
• Configure accounting options by including a file statement and one or more
source-class-usage, destination-class-profile, filter-profile, interface-profile, mib-profile,
or routing-engine-profile statements at the [edit accounting-options] hierarchy level:
[edit]
accounting-options {
408 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
class-usage-profile profile-name {
file filename;
interval minutes;
source-classes {
source-class-name;
destination-classes {
destination-class-name;
}
}
file filename {
archive-sites {
site-name;
}
files number;
size bytes;
transfer-interval minutes;
}
filter-profile profile-name {
counters {
counter-name;
}
file filename;
interval minutes;
}
interface-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
mib-profile profile-name {
file filename;
interval minutes;
object-names {
mib-object-name;
}
operation operation-name;
}
routing-engine-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
}
}
• Apply the profiles to the chosen interfaces or filters.
Apply an interface profile to a physical or logical interface by including the
accounting-profile statement at either the [edit interfaces interface-name] or the [edit
interfaces interface-name unit logical-unit-number] hierarchy level. For more information
about interface profiles, see the Junos OS Network Interfaces Configuration Guide.
[edit interfaces]
Copyright © 2010, Juniper Networks, Inc. 409
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
interface-name {
accounting-profile profile-name;
unit logical-unit-number {
accounting-profile profile-name;
}
}
NOTE: You do not apply destination class profiles to interfaces. Although
the interface needs to have the destination-class-usage statement
configured, the destination class profile automatically finds all interfaces
with the destination class configured.
Apply a filter profile to a firewall filter by including the accounting-profile statement at
the [edit firewall filter filter-name] hierarchy level:
[edit firewall]
filter filter-name {
accounting-profile profile-name;
}
You do not need to apply the Routing Engine profile to an interface because the
statistics are collected on the Routing Engine itself.
Related • Accounting Options Overview on page 405
Documentation
• Understanding Device Management Functions in Junos OS on page 3
• Configuring Accounting-Data Log Files on page 410
• Configuring the Interface Profile on page 413
• Configuring the Filter Profile on page 416
• Configuration Statements at the [edit accounting-options] Hierarchy Level
Configuring Accounting-Data Log Files
An accounting profile specifies what statistics should be collected and written to a log
file. To configure an accounting-data log file, include the file statement at the [edit
accounting-options] hierarchy level:
[edit accounting-options]
file filename {
archive-sites {
site-name;
}
files number;
nonpersistent;
size bytes;
start-time time;
transfer-interval minutes;
}
filename is the name of the file in which to write accounting data.
410 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
If the filename contains spaces, enclose it in quotation marks (" "). The filename cannot
contain a forward slash (;/;). The file is created in the /var/log directory and can contain
data from multiple profiles.
All accounting-data log files include header and trailer sections that start with a # in the
first column. The header contains the file creation time, the hostname, and the columns
that appear in the file. The trailer contains the time that the file was closed.
Whenever any configured value changes that affects the columns in a file, the file creates
a new profile layout record that contains a new list of columns.
You must configure the file size; all other properties are optional.
• Configuring the Storage Location of the File on page 411
• Configuring the Maximum Size of the File on page 411
• Configuring the Maximum Number of Files on page 412
• Configuring the Start Time for File Transfer on page 412
• Configuring the Transfer Interval of the File on page 412
• Configuring Archive Sites on page 413
Configuring the Storage Location of the File
On J Series Services Routers, the files are stored by default on the compact flash drive.
To configure the storage location of the files in the mfs/var/log directory (on DRAM)
instead of the cf/var/log directory (on the compact flash drive), include the nonpersistent
statement at the [edit accounting-options file filename] hierarchy level:
[edit accounting-options file filename]
nonpersistent;
This feature is useful for minimizing read/write traffic on the router’s compact flash drive.
NOTE: If log files for accounting data are stored on DRAM, these files are lost
when you reboot the router. Therefore, you should back up these files
periodically.
Configuring the Maximum Size of the File
To configure the maximum size of the files, include the size statement at the [edit
accounting-options file filename] hierarchy level:
[edit accounting-options file filename]
size bytes;
The size statement is the maximum size of the log file, in bytes, kilobytes (KB), megabytes
(MB), or gigabytes (GB). The minimum value for bytes is 256 KB. You must configure
bytes; the remaining attributes are optional.
Copyright © 2010, Juniper Networks, Inc. 411
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring the Maximum Number of Files
To configure the maximum number of files, include the files statement at the [edit
accounting-options file filename] hierarchy level:
[edit accounting-options file filename]
files number;
When a log file (for example, profilelog) reaches its maximum size, it is renamed
profilelog.0, then profilelog.1, and so on, until the maximum number of log files is reached.
Then the oldest log file is overwritten. The minimum value for number is 3 and the default
value is 10.
Configuring the Start Time for File Transfer
To configure the start time for transferring files, include the start-time statement at the
[edit accounting-options file filename] hierarchy level:
[edit accounting-options file filename]
start-time time;
The start-time statement specifies a start time for file transfer (YYYY-MM-DD.hh:mm).
For example, 10:00 a.m. on January 30, 2007 is represented as 2007-01-30.10:00.
Configuring the Transfer Interval of the File
To configure the transfer interval of the files, include the transfer-interval statement at
the [edit accounting-options file filename] hierarchy level:
[edit accounting-options file filename]
transfer-interval minutes;
The range for transfer-interval is 5 through 2880 minutes. The default is 30 minutes.
TIP:
Junos OS saves the existing log file and creates a new file at the configured
transfer-intervals irrespective of:
• Whether the file has reached the maximum size or not
• Whether an archive site is configured or not
When you have a relatively smaller transfer-interval configured and if no
archive site is configured, there is a possibility of losing data as Junos OS
overwrites the log files when the maximum number of log files is reached.
To ensure that the log information is saved for a reasonably long time:
• Configure an archive site to archive the log files every time a new log file is
created.
• Configure the maximum value (2880 minutes) for transfer-interval so that
new files are created less frequently; that is, only when the file exceeds the
maximum size limit or once in 2 days.
412 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
Configuring Archive Sites
After a file reaches its maximum size or the transfer-interval time is exceeded, the file is
closed, renamed, and, if you configured an archive site, transferred to a remote host. To
configure archive sites, include the archive-sites statement at the [edit accounting-options
file filename] hierarchy level:
[edit accounting-options file filename]
archive-sites {
site-name;
}
site-name is any valid FTP URL. For more information about specifying valid FTP URLs,
see the Junos OS System Basics Configuration Guide. You can specify more than one URL,
in any order. When a file is archived, the router or switch attempts to transfer the file to
the first URL in the list, trying the next site in the list only if the transfer does not succeed.
The log file is stored at the archive site with a filename of the format
router-name_log-filename_timestamp.
Related • Accounting Options Overview on page 405
Documentation
• Understanding Device Management Functions in Junos OS on page 3
• Accounting Options Configuration on page 407
• Configuring the Interface Profile on page 413
• Configuring the Filter Profile on page 416
• Configuration Statements at the [edit accounting-options] Hierarchy Level
Configuring the Interface Profile
An interface profile specifies the information collected and written to a log file. You can
configure a profile to collect error and statistic information for input and output packets
on a particular physical or logical interface.
To configure an interface profile, include the interface-profile statement at the
[edit accounting-options] hierarchy level:
[edit accounting-options]
interface-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
Each accounting profile must have a unique profile-name. To apply a profile to a physical
or logical interface, include the accounting-profile statement at either the [edit interfaces
interface-name] or the [edit interfaces interface-name unit logical-unit-number] hierarchy
level. You can also apply a accounting profile at the [edit firewall family family-type filter
filter-name] hierarchy level. For more information, see the Junos OS Policy Framework
Configuration Guide.
Copyright © 2010, Juniper Networks, Inc. 413
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
To configure an interface profile, you perform the tasks described in the following sections:
• Configuring Fields on page 414
• Configuring the File Information on page 414
• Configuring the Interval on page 414
• Example: Configuring the Interface Profile on page 414
Configuring Fields
An interface profile must specify what statistics are collected. To configure which statistics
should be collected for an interface, include the fields statement at the [edit
accounting-options interface-profile profile-name] hierarchy level:
[edit accounting-options interface-profile profile-name]
fields {
field-name;
}
Configuring the File Information
Each accounting profile logs its statistics to a file in the /var/log directory.
To configure which file to use, include the file statement at the [edit accounting-options
interface-profile profile-name] hierarchy level:
[edit accounting-options interface-profile profile-name]
file filename;
You must specify a file statement for the interface profile that has already been configured
at the [edit accounting-options] hierarchy level.
Configuring the Interval
Each interface with an accounting profile enabled has statistics collected once per interval
time specified for the accounting profile. Statistics collection time is scheduled evenly
over the configured interval. To configure the interval, include the interval statement at
the [edit accounting-options interface-profile profile-name] hierarchy level:
[edit accounting-options interface-profile profile-name]
interval minutes;
NOTE: The minimum interval allowed is 1 minute. Configuring a low interval
in an accounting profile for a large number of interfaces might cause serious
performance degradation.
The range for the interval statement is 1 through 2880 minutes. The default is 30 minutes.
Example: Configuring the Interface Profile
Configure the interface profile:
[edit]
accounting-options {
file if_stats {
414 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
size 40 files 5;
}
interface-profile if_profile1 {
file if_stats;
interval 30;
fields {
input-bytes;
output-bytes;
input-packets;
output-packets;
input-multicast;
output-multicast;
}
}
interface-profile if_profile2 {
file if_stats;
interval 30;
fields {
input-bytes;
output-bytes;
input-packets;
output-packets;
input-multicast;
output-multicast;
}
}
interfaces {
xe-1/0/0 {
accounting-profile if_profile1;
unit 0 {
accounting-profile if_profile2;
...
}
}
}
}
The two interface profiles, if-profile1 and if-profile2, write data to the same file, if-stats.
The if-stats file might look like the following:
#FILE CREATED 976823478 2000-12-14-19:51:18
#hostname host
#profile-layout
if_profile2,epoch-timestamp,interface-name,snmp-index,input-bytes,output-bytes,
input-packets,output-packets,input-multicast,output-multicast
#profile-layout
if_profile1,epoch-timestamp,interface-name,snmp-index,input-bytes,output-bytes,
input-packets
if_profile2,976823538,xe-1/0/0.0,8,134696815,3681534,501088,40723,0,0
if_profile1,976823538,xe-1/0/0,7,134696815,3681534,501088
...
#FILE CLOSED 976824378 2000-12-14-20:06:18
Related • Accounting Options Overview on page 405
Documentation
• Understanding Device Management Functions in Junos OS on page 3
Copyright © 2010, Juniper Networks, Inc. 415
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
• Accounting Options Configuration on page 407
• Configuring Accounting-Data Log Files on page 410
• Configuring the Filter Profile on page 416
• Configuration Statements at the [edit accounting-options] Hierarchy Level
Configuring the Filter Profile
A filter profile specifies error and statistics information collected and written to a file. A
filter profile must specify counter names for which statistics are collected.
To configure a filter profile, include the filter-profile statement at the [edit
accounting-options] hierarchy level:
[edit accounting-options]
filter-profile profile-name {
counters {
counter-name;
}
file filename;
interval minutes;
}
To apply the filter profile, include the accounting-profile statement at the [edit firewall
filter filter-name] hierarchy level. For more information about firewall filters, see the Junos
OS Network Interfaces Configuration Guide.
To configure a filter profile, perform the tasks described in the following sections:
• Configuring the Counters on page 416
• Configuring the File Information on page 416
• Configuring the Interval on page 417
Configuring the Counters
Statistics are collected for all counters specified in the filter profile. To configure the
counters, include the counters statement at the [edit accounting-options filter-profile
profile-name] hierarchy level:
[edit accounting-options filter-profile profile-name]
counters {
}
Configuring the File Information
Each accounting profile logs its statistics to a file in the /var/log directory.
To configure which file to use, include the file statement at the [edit accounting-options
filter-profile profile-name] hierarchy level:
[edit accounting-options filter-profile profile-name]
file filename;
416 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
You must specify a filename for the filter profile that has already been configured at the
[edit accounting-options] hierarchy level.
NOTE: If the configured file size or transfer interval is exceeded, Junos OS
closes the file and starts a new one. By default, the transfer interval value is
30 minutes. If the transfer interval is not configured, Junos OS closes the file
and starts a new one when the file size exceeds its configured value or the
default transfer interval value exceeds 30 minutes. To avoid transferring files
every 30 minutes, specify a different value for the transfer interval.
Configuring the Interval
Each filter with an accounting profile enabled has statistics collected once per interval
time specified for the accounting profile. Statistics collection time is scheduled evenly
over the configured interval. To configure the interval, include the interval statement at
the [edit accounting-options filter-profile profile-name] hierarchy level:
[edit accounting-options filter-profile profile-name]
interval;
NOTE: The minimum interval allowed is 1 minute. Configuring a low interval
in an accounting profile for a large number of filters might cause serious
performance degradation.
The range for the interval statement is 1 through 2880 minutes. The default is 30 minutes.
Related • Accounting Options Overview on page 405
Documentation
• Understanding Device Management Functions in Junos OS on page 3
• Accounting Options Configuration on page 407
• Configuring Accounting-Data Log Files on page 410
• Configuring the Interface Profile on page 413
• Configuration Statements at the [edit accounting-options] Hierarchy Level
• Example: Configuring a Filter Profile on page 417
• Example: Configuring Interface-Specific Firewall Counters and Filter Profiles on page 418
Example: Configuring a Filter Profile
Configure a filter profile:
[edit]
accounting-options {
file fw_accounting {
size 500k files 4;
}
filter-profile fw_profile1 {
Copyright © 2010, Juniper Networks, Inc. 417
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
file fw_accounting;
interval 60;
counters {
counter1;
counter2;
counter3;
}
}
}
firewall {
filter myfilter {
accounting-profile fw_profile1;
...
term accept-all {
then {
count counter1;
accept;
}
}
}
}
The filter profile, fw-profile1, writes data to the file fw_accounting. The file might look like
the following:
#FILE CREATED 976825278 2000-12-14-20:21:18
#hostname host
#profile-layout
fw_profile1,epoch-timestamp,filter-name,counter-name,packet-count,byte-count
fw_profile1,976826058,myfilter,counter1,163,10764
...
#FILE CLOSED 976826178 2000-12-14-20:36:18
Related • Configuring the Filter Profile on page 416
Documentation
• Example: Configuring Interface-Specific Firewall Counters and Filter Profiles on page 418
Example: Configuring Interface-Specific Firewall Counters and Filter Profiles
To collect and log count statistics collected by firewall filters on a per-interface basis,
you must configure a filter profile and include the interface-specific statement at the
[edit firewall filter filter-name] hierarchy level.
Configure the firewall filter accounting profile:
[edit accounting-options]
file cust1_accounting {
size 500k;
}
filter-profile cust1_profile {
file cust1_accounting;
interval 1;
counters {
r1;
}
418 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
Configure the interface-specific firewall counter:
[edit firewall]
filter f3 {
accounting-profile cust1_profile;
interface-specific;
term f3-term {
then {
count r1;
accept;
}
}
}
Apply the firewall filter to an interface:
[edit interfaces]
xe-1/0/0 {
unit 0 {
family inet {
filter {
input f3;
output f3;
}
address 20.20.20.30/24;
}
}
}
The following example shows the contents of the cust1_accounting file in the /var/log
folder that might result from the preceding configuration:
#FILE CREATED 995495212 2001-07-18-22:26:52
#hostname host
#profile-layout cust1_profile,epoch-timestamp,interfaces,filter-name,
counter-name,packet-count,byte-count
cust1_profile,995495572,xe-1/0/0.0,f3-xe-1/0/0.0-i,r1-xe-1/0/0.0-i,5953,1008257
cust1_profile,995495602,xe-1/0/0.0,f3-xe-1/0/0.0-o,r1-xe-1/0/0.0-o,5929,1006481
...
If the interface-specific statement is not included in the configuration, the following output
might result:
#FILE CREATED 995495212 2001-07-18-22:26:52
#hostname host
#profile-layout cust1_profile,epoch-timestamp,interfaces,filter-name,
counter-name,packet-count,byte-count
cust1_profile,995495572,xe-1/0/0.0,f3,r1,5953,1008257
cust1_profile,995495632,xe-1/0/0.0,f3,r1,5929,1006481
Related • Configuring the Filter Profile on page 416
Documentation
• Configuring the Interface Profile on page 413
Copyright © 2010, Juniper Networks, Inc. 419
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Understanding Source Class Usage and Destination Class Usage Options
You can maintain packet counts based on the entry and exit points for traffic passing
through your network. Entry and exit points are identified by source and destination
prefixes grouped into disjoint sets defined as source classes and destination classes. You
can define classes based on a variety of parameters, such as routing neighbors,
autonomous systems, and route filters.
Source class usage (SCU) counts packets sent to customers by performing lookup on
the IP source address and the IP destination address. SCU makes it possible to track
traffic originating from specific prefixes on the provider core and destined for specific
prefixes on the customer edge. You must enable SCU accounting on both the inbound
and outbound physical interfaces.
Destination class usage (DCU) counts packets from customers by performing lookup of
the IP destination address. DCU makes it possible to track traffic originating from the
customer edge and destined for specific prefixes on the provider core router.
On T Series and M320 routers, the source class and destination classes are not carried
across the platform fabric. The implications of this are as follows:
• On T Series and M320 routers, SCU and DCU accounting is performed before the packet
enters the fabric.
• On T Series and M320 routers, DCU is performed before output filters are evaluated.
On M Series platforms, DCU is performed after output filters are evaluated.
• If an output filter drops traffic on M Series platforms, the dropped packets are excluded
from DCU statistics. If an output filter drops traffic on T Series and M320 routers, the
dropped packets are included in DCU statistics.
Class-based filter match conditions are not supported on J Series Services Routers.
For more information about source class usage, see the Junos OS Policy Framework
Configuration Guide, the Junos OS Network Interfaces Configuration Guide, and the Junos
OS Feature Guide.
Related • Configuring SCU or DCU on page 420
Documentation
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring Class Usage Profiles on page 424
• Configuring the MIB Profile on page 426
• Configuring the Routing Engine Profile on page 428
Configuring SCU or DCU
To configure SCU or DCU, perform the following tasks described in this section:
420 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
NOTE: We recommend that you stop the network traffic on an interface
before you modify the DCU or SCU configuration for that interface. Modifying
the DCU or SCU configuration without stopping the traffic might corrupt the
DCU or SCU statistics. Before you restart the traffic after modifying the
configuration, enter the clear interfaces statistics command.
• Creating Prefix Route Filters in a Policy Statement on page 421
• Applying the Policy to the Forwarding Table on page 421
• Enabling Accounting on Inbound and Outbound Interfaces on page 421
Creating Prefix Route Filters in a Policy Statement
Define prefix router filters:
[edit policy-options]
policy-statement scu-1 {
term term1;
from {
route-filter 192.168.1.0/24 orlonger;
}
then source-class gold;
}
Applying the Policy to the Forwarding Table
Apply the policy to the forwarding table:
[edit]
routing-options {
forwarding-table {
export scu-1;
}
}
Enabling Accounting on Inbound and Outbound Interfaces
You can enable accounting on inbound and outbound interfaces:
[edit]
interfaces {
so-6/1/0 {
unit 0 {
family inet;
accounting {
destination-class-usage;
source-class-usage {
output;
}
}
}
}
}
[edit]
interfaces {
Copyright © 2010, Juniper Networks, Inc. 421
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
xe-0/1/0 {
unit 0 {
family inet6 {
accounting {
source-class-usage {
input;
}
}
}
}
}
}
Optionally, you can include the input and output statements on a single interface:
[edit]
interfaces {
xe-0/1/2 {
unit 0 {
family inet6 {
accounting {
source-class-usage {
input;
output;
}
}
}
}
}
}
For more information about configuring route filters and source classes in a routing policy,
see the Junos OS Policy Framework Configuration Guide and the Junos OS Network
Interfaces Configuration Guide.
Related • Understanding Source Class Usage and Destination Class Usage Options on page 420
Documentation
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring Class Usage Profiles on page 424
• Configuring the MIB Profile on page 426
• Configuring the Routing Engine Profile on page 428
422 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
Configuring SCU on a Virtual Loopback Tunnel Interface
To configure source class usage on the virtual loopback tunnel interface, perform the
tasks described in the following sections:
• Example: Configuring a Virtual Loopback Tunnel Interface on a Provider Edge Router
Equipped with a Tunnel PIC on page 423
• Example: Mapping the VRF Instance Type to the Virtual Loopback Tunnel
Interface on page 423
• Example: Sending Traffic Received from the Virtual Loopback Interface Out the Source
Class Output Interface on page 424
Example: Configuring a Virtual Loopback Tunnel Interface on a Provider Edge Router Equipped
with a Tunnel PIC
Define a virtual loop interface on a provider edge router with a Tunnel PIC:
[edit interfaces]
vt-0/3/0 {
unit 0 {
family inet {
accounting {
source-class-usage {
input;
}
}
}
}
}
Example: Mapping the VRF Instance Type to the Virtual Loopback Tunnel Interface
Map the VRF instance type to the virtual loopback tunnel interface:
[edit]
routing-instances {
VPN-A {
instance-type vrf;
interface at-2/1/1.0;
interface vt-0/3/0.0;
route-distinguisher 10.255.14.225:100;
vrf-import import-policy-name;
vrf-export export-policy-name;
protocols {
bgp {
group to-r4 {
local-address 10.27.253.1;
peer-as 400;
neighbor 10.27.253.2;
}
}
}
}
}
Copyright © 2010, Juniper Networks, Inc. 423
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
NOTE: For SCU and DCU to work, do not include the vrf-table-label statement
at the [edit routing-instances instance-name] hierarchy level.
Example: Sending Traffic Received from the Virtual Loopback Interface Out the Source Class
Output Interface
Send traffic received from the virtual loopback tunnel interface out of the source class
output interface:
[edit interfaces]
at-1/1/0 {
unit 0 {
family inet {
accounting {
source-class-usage {
output;
}
}
}
}
}
For more information about configuring source class usage on the virtual loopback tunnel
interface, see the Junos OS Network Interfaces Configuration Guide.
Related • Understanding Source Class Usage and Destination Class Usage Options on page 420
Documentation
• Configuring SCU or DCU on page 420
• Configuring Class Usage Profiles on page 424
• Configuring the MIB Profile on page 426
• Configuring the Routing Engine Profile on page 428
Configuring Class Usage Profiles
To collect class usage statistics, perform the tasks described in these sections:
• Configuring a Class Usage Profile on page 424
• Configuring the File Information on page 425
• Configuring the Interval on page 425
• Creating a Class Usage Profile to Collect Source Class Usage Statistics on page 425
• Creating a Class Usage Profile to Collect Destination Class Usage Statistics on page 426
Configuring a Class Usage Profile
You can configure the class usage profile to collect statistics for particular source and
destination classes.
424 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
To configure the class usage profile to filter by source classes, include the source-classes
statement at the [edit accounting-options class-usage-profile profile-name] hierarchy
level:
[edit accounting-options class-usage-profile profile-name]
source-classes {
source-class-name;
}
To configure the class usage profile to filter by destination classes, include the
destination-classes statement at the [edit accounting-options class-usage-profile
profile-name] hierarchy level:
[edit accounting-options class-usage-profile profile-name]
destination-classes {
destination-class-name;
}
Configuring the File Information
Each accounting profile logs its statistics to a file in the /var/log directory.
To specify which file to use, include the file statement at the [edit accounting-options
class-usage-profile profile-name] hierarchy level:
[edit accounting-options class-usage-profile profile-name]
file filename;
You must specify a filename for the source class usage profile that has already been
configured at the [edit accounting-options] hierarchy level. You can also specify a filename
for the destination class usage profile configured at the [edit accounting-options] hierarchy
level.
Configuring the Interval
Each interface with a class usage profile enabled has statistics collected once per interval
specified for the accounting profile. Statistics collection time is scheduled evenly over
the configured interval. To configure the interval, include the interval statement at the
[edit accounting-options class-usage-profile profile-name] hierarchy level:
[edit accounting-options class-usage-profile profile-name]
interval;
Creating a Class Usage Profile to Collect Source Class Usage Statistics
To create a class usage profile to collect source class usage statistics:
[edit]
accounting-options {
class-usage-profile scu-profile1;
file usage-stats;
interval 15;
source-classes {
gold;
silver;
bronze;
}
}
Copyright © 2010, Juniper Networks, Inc. 425
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
The class usage profile, scu-profile1, writes data to the file usage_stats. The file might
look like the following:
#FILE CREATED 976825278 2000-12-14-20:21:18
#profile-layout, scu_profile,epoch-timestamp,interface-name,source-class,
packet-count,byte-count
scu_profile,980313078,xe-1/0/0.0,gold,82,6888
scu_profile,980313078,xe-1/0/0.0,silver,164,13776
scu_profile,980313078,xe-1/0/0.0,bronze,0,0
scu_profile,980313678,xe-1/0/0.0,gold,82,6888
scu_profile,980313678,xe-1/0/0.0,silver,246,20664
scu_profile,980313678,xe-1/0/0.0,bronze,0,0
Creating a Class Usage Profile to Collect Destination Class Usage Statistics
To create a class usage profile to collect destination class usage statistics:
[edit]
accounting-options {
class-usage-profile dcu-profile1;
file usage-stats
interval 15;
destination-classes {
gold;
silver;
bronze;
}
}
The class usage profile, dcu-profile1, writes data to the file usage-stats. The file might
look like the following:
#FILE CREATED 976825278 2000-12-14-20:21:18
#profile-layout, dcu_profile,epoch-timestamp,interface-name,destination-class,
packet-count,byte-count
dcu_profile,980313078,xe-1/0/0.0,gold,82,6888
dcu_profile,980313078,xe-1/0/0.0,silver,164,13776
dcu_profile,980313078,xe-1/0/0.0,bronze,0,0
dcu_profile,980313678,xe-1/0/0.0,gold,82,6888
dcu_profile,980313678,xe-1/0/0.0,silver,246,20664
dcu_profile,980313678,xe-1/0/0.0,bronze,0,0
...
#FILE CLOSED 976826178 2000-12-14-20:36:18
Related • Understanding Source Class Usage and Destination Class Usage Options on page 420
Documentation
• Configuring SCU or DCU on page 420
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring the Routing Engine Profile on page 428
Configuring the MIB Profile
The MIB profile collects MIB statistics and logs them to a file. The MIB profile specifies
the SNMP operation and MIB object names for which statistics are collected.
426 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
To configure a MIB profile, include the mib-profile statement at the [edit
accounting-options] hierarchy level:
[edit accounting-options]
mib-profile profile-name {
file filename;
interval minutes;
object-names {
mib-object-name;
}
operation operation-name;
}
To configure a MIB profile, perform the tasks described in the following sections:
• Configuring the File Information on page 427
• Configuring the Interval on page 427
• Configuring the MIB Operation on page 427
• Configuring MIB Object Names on page 428
• Example: Configuring a MIB Profile on page 428
Configuring the File Information
Each accounting profile logs its statistics to a file in the /var/log directory.
To configure which file to use, include the file statement at the [edit accounting-options
mib-profile profile-name] hierarchy level:
[edit accounting-options mib-profile profile-name]
file filename;
You must specify a filename for the MIB profile that has already been configured at the
[edit accounting-options] hierarchy level.
Configuring the Interval
A MIB profile has statistics collected once per interval time specified for the profile.
Statistics collection time is scheduled evenly over the configured interval. To configure
the interval, include the interval statement at the [edit accounting-options mib-profile
profile-name] hierarchy level:
[edit accounting-options mib-profile profile-name]
interval;
The range for the interval statement is 1 through 2880 minutes. The default is 30 minutes.
Configuring the MIB Operation
A MIB profile must specify the operation that is used to collect MIB statistics. To configure
which operation is used to collect MIB statistics, include the operation statement at the
[edit accounting-options mib-profile profile-name] hierarchy level:
[edit accounting-options mib-profile profile-name]
operation operation-name;
You can configure a get, get-next, or walk operation. The default operation is walk.
Copyright © 2010, Juniper Networks, Inc. 427
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Configuring MIB Object Names
A MIB profile must specify the MIB objects for which statistics are to be collected. To
configure the MIB objects for which statistics are collected, include the objects-names
statement at the [edit accounting-options mib-profile profile-name] hierarchy level:
[edit accounting-options mib-profile profile-name]
object-names {
mib-object-name;
}
You can include multiple MIB object names in the configuration.
Example: Configuring a MIB Profile
Configure a MIB profile:
[edit accounting-options]
mib-profile mstatistics {
file stats;
interval 60;
operation walk;
objects-names {
ipCidrRouteStatus;
ifOutOctets;
}
}
Related • Understanding Source Class Usage and Destination Class Usage Options on page 420
Documentation
• Configuring SCU or DCU on page 420
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring Class Usage Profiles on page 424
• Configuring the Routing Engine Profile on page 428
Configuring the Routing Engine Profile
The Routing Engine profile collects Routing Engine statistics and logs them to a file. The
Routing Engine profile specifies the fields for which statistics are collected.
To configure a Routing Engine profile, include the routing-engine-profile statement at the
[edit accounting-options] hierarchy level:
[edit accounting-options]
routing-engine-profile profile-name {
fields {
field-name;
}
file filename;
interval minutes;
}
428 Copyright © 2010, Juniper Networks, Inc.
Chapter 42: Configuring Accounting Options
To configure a Routing Engine profile, perform the tasks described in the following
sections:
• Configuring Fields on page 429
• Configuring the File Information on page 429
• Configuring the Interval on page 429
• Example: Configuring a Routing Engine Profile on page 429
Configuring Fields
A Routing Engine profile must specify what statistics are collected. To configure which
statistics should be collected for the Routing Engine, include the fields statement at the
[edit accounting-options routing-engine-profile profile-name] hierarchy level:
[edit accounting-options routing-engine-profile profile-name]
fields {
field-name;
}
Configuring the File Information
Each accounting profile logs its statistics to a file in the /var/log directory.
To configure which file to use, include the file statement at the [edit accounting-options
routing-engine-profile profile-name] hierarchy level:
[edit accounting-options routing-engine-profile profile-name]
file filename;
You must specify a filename for the Routing Engine profile that has already been configured
at the [edit accounting-options] hierarchy level.
Configuring the Interval
A Routing Engine profile has statistics collected once per interval time specified for the
profile. Statistics collection time is scheduled evenly over the configured interval. To
configure the interval, include the interval statement at the [edit accounting-options
routing-engine-profile profile-name] hierarchy level:
[edit accounting-options routing-engine-profile profile-name]
interval;
The range for interval is 1 through 2880 minutes. The default is 30 minutes.
Example: Configuring a Routing Engine Profile
Configure a Routing Engine profile:
[edit accounting-options]
file my-file {
size 300k;
}
routing-engine-profile profile-1 {
file my-file;
fields {
host-name;
date;
Copyright © 2010, Juniper Networks, Inc. 429
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
time-of-day;
uptime;
cpu-load-1;
cpu-load-5;
cpu-load-15;
}
}
Related • Understanding Source Class Usage and Destination Class Usage Options on page 420
Documentation
• Configuring SCU or DCU on page 420
• Configuring SCU on a Virtual Loopback Tunnel Interface on page 423
• Configuring Class Usage Profiles on page 424
• Configuring the MIB Profile on page 426
430 Copyright © 2010, Juniper Networks, Inc.
PART 5
Index
• Index on page 433
Copyright © 2010, Juniper Networks, Inc. 431
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
432 Copyright © 2010, Juniper Networks, Inc.
Index
brackets
Symbols angle, in syntax descriptions.....................................xxi
#, comments in configuration statements..................xxii square, in configuration statements......................xxii
( ), in syntax descriptions...................................................xxii
/var/log/mib2d file.................................................................54 C
/var/log/snmpd file................................................................54 categories statement............................................................95
< >, in syntax descriptions...................................................xxi usage guidelines.............................................................49
[ ], in configuration statements.......................................xxii Chassis Definitions for Router Model MIB...........25, 265
{ }, in configuration statements.......................................xxii Chassis Forwarding MIB.......................................................25
| (pipe), in syntax descriptions.........................................xxii Chassis MIB......................................................................25, 146
jnxBoxAnatomy.............................................................175
A jnxBoxKernelMemoryUsedPercent......................260
AAA Objects MIB.....................................................................24 jnxBoxSystemDomainType ....................................260
Access Authentication Objects MIB................24, 145, 161 jnxMIBs..............................................................................175
access-list statement...........................................................93 jnxTraps..........................................................................260
accounting options overview............................................................................173
configuration.................................................................407 Class 1 MIB objects...............................................................138
overview.........................................................................405 Class 2 MIB objects...............................................................142
accounting profiles Class 3 MIB objects...............................................................143
filter...................................................................................416 Class 4 MIB objects..............................................................144
interface...........................................................................413 Class-of-Service MIB.............................................................25
MIB....................................................................................426 class-usage-profile statement
Routing Engine.............................................................428 usage guidelines..........................................................424
agent, SNMP..............................................................................12 client list
agent-address statement...................................................94 adding to SNMP community.....................................44
Alarm MIB................................................................24, 145, 165 client-list statement..............................................................95
Analyzer MIB.............................................................................24 usage guidelines.............................................................44
archive-sites statement client-list-name statement................................................96
accounting usage guidelines.............................................................44
usage guidelines..................................................413 clients statement...................................................................96
ATM CoS MIB............................................................................24 usage guidelines.............................................................43
ATM MIB.....................................................................................24 comments, in configuration statements......................xxii
authorization statement......................................................94 commit-delay statement.....................................................97
usage guidelines.............................................................43 usage guidelines.............................................................42
community statement
B SNMP.................................................................................98
BFD MIB......................................................................25, 146, 171 usage guidelines....................................................43
notification variables...................................................172 community string, SNMP.....................................................43
BGP4 V2 MIB..........................................................25, 145, 169 Configuration Management MIB..............................25, 146
braces, in configuration statements...............................xxii contact statement.................................................................99
usage guidelines............................................................40
Copyright © 2010, Juniper Networks, Inc. 433
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
conventions usage guidelines (MIB profile).......................427
text and syntax...............................................................xxi usage guidelines (Routing Engine
CoS profile)................................................................429
MIB.......................................................................................25 accounting (configuring log file)
curly braces, in configuration statements....................xxii usage guidelines..................................................410
customer support..................................................................xxii filter profile..............................................................................416
contacting JTAC.............................................................xxii filter-duplicates statement..............................................100
usage guidelines..............................................................41
D filter-interfaces statement.................................................101
description statement filter-profile statement
SNMP.................................................................................99 usage guidelines...........................................................416
usage guidelines.....................................................41 filtering get SNMP requests.................................................41
Destination Class Usage MIB.............................................26 Firewall MIB......................................................................27, 146
destination-classes statement Flow Collection Services MIB....................................27, 335
usage guidelines..........................................................424 font conventions.....................................................................xxi
destination-port statement
SNMP...............................................................................100 G
usage guidelines....................................................49 Get requests, SNMP.................................................................9
Digital Optical Monitoring MIB...........................................26
DNS Objects MIB....................................................................26 H
Dynamic Flow Capture MIB................................................26 Host Resources MIB.............................................27, 147, 283
notification variables..................................................278
I
E icons defined, notice...............................................................xx
engine-id statement IDP attack log notification................................................388
SNMPv3 IDP attack Table....................................................................387
usage guidelines....................................................57 IDP MIB...............................................................................27, 149
enterprise-specific MIBs, listed........................................145 ifChassisTable.......................................................................288
enterprise-specific traps, SNMP informs SNMP See SNMP informs
version 1..............................................................................74 Interface MIB...........................................................27, 147, 285
version 2..............................................................................81 interface profile......................................................................413
Ethernet MAC MIB................................................26, 146, 275 interface statement
Event MIB.................................................................26, 146, 277 SNMP................................................................................102
Experimental MIB....................................................................27 usage guidelines....................................................52
interface-profile statement
F usage guidelines...........................................................413
fields statement interfaces limiting SNMP access.......................................52
for interface profiles interval statement
usage guidelines..................................................414 accounting
for Routing Engine profiles usage guidelines (filter profile).......................417
usage guidelines.................................................429 usage guidelines (interface profile).............414
file statement usage guidelines (MIB profile).......................427
accounting (associating with profile) usage guidelines (Routing Engine
usage guidelines (filter profile)......................416 profile)................................................................429
usage guidelines (interface profile).............414 IP Forward MIB........................................................27, 147, 291
IPsec Generic Flow Monitoring Object
MIB.........................................................................28, 147, 293
Text Conventions.........................................................294
IPsec Monitoring MIB..........................................28, 147, 309
434 Copyright © 2010, Juniper Networks, Inc.
Index
IPsec Phase 1 IKE Tunnel Table......................................298 jnxJsNatIfSrcPoolPortTable..............................................331
IPsec Phase 2 IKE Tunnel Table......................................302 jnxJsPolicyStatsTable.........................................................358
IPsec Phase 2 Security Association Table..................305 jnxLEDTable.............................................................................195
IPsec VPN Objects MIB.........................................................28 M20 router.......................................................................197
IPv4 MIB.....................................................................28, 147, 317 T320 router....................................................................198
IPv6 and ICMPv6 MIB...........................................................28 T640 router.....................................................................197
IPv6 SNMP community string............................................43 jnxMacStatsTable.................................................................275
jnxMibs root branch..............................................................155
J jnxOperatingTable...............................................................209
jnxBfdSessTable......................................................................171 M20 router.......................................................................212
jnxBgpM2PrefixCountersTable........................................170 T320 router.....................................................................216
jnxBoxAnatomy MIB.............................................................175 T640 router.....................................................................213
jnxBoxKernelMemoryUsedPercent...............................260 jnxPfeNotifyGlTable............................................................335
jnxBoxSystemDomainType ............................................260 jnxPfeNotifyTypeTable.......................................................337
jnxContainersTable jnxPingCtlTable....................................................................340
M160 router.....................................................................179 jnxPingLastTestResultTable............................................350
M20 router.......................................................................178 jnxpingProbeHistoryTable................................................348
M40 router......................................................................178 jnxPingResultsTable............................................................344
M40e router....................................................................182 jnxProducts root branch.....................................................154
M5 router.........................................................................180 jnxRedundancyTable...........................................................218
T320 router......................................................................181 M20 router.....................................................................220
T640 router.....................................................................181 T320 router....................................................................222
jnxContentsTable T640 router.....................................................................221
M20 router......................................................................184 jnxRmonAlarmGetFailure..................................................375
T320 router.....................................................................192 jnxRmonAlarmTable............................................................374
T640 router....................................................................187 jnxRmonGetOk......................................................................375
jnxEventAvTable,...................................................................277 jnxRpfStatsTable...................................................................371
jnxExperiment root branch................................................158 jnxServices root branch......................................................154
jnxFilledTable.........................................................................198 jnxSyslogAvTable.................................................................392
M20 router......................................................................199 jnxSyslogTable......................................................................390
T320 router...................................................................206 jnxTraceRouteCtlTable.......................................................393
T640 router...................................................................202 jnxTraps root branch.............................................................157
jnxFruTable..............................................................................223 jnxUtilCounter32Table.......................................................396
M10 router......................................................................226 jnxUtilCounter64Table......................................................396
M160 router....................................................................233 jnxUtilIntegerTable...............................................................397
M20 router......................................................................229 jnxUtilStringTable................................................................398
M40 router.....................................................................239 jnxUtilUintTable....................................................................397
M40e router...................................................................244 Juniper Networks MIB objects..........................................134
T640 router...................................................................250
jnxIfTable.................................................................................285 L
jnxIkeTunnelTable................................................................309 L2ALD MIB.................................................................................28
jnxIPSecSaTable....................................................................315 L2CP features MIB..................................................................28
jnxIPSecTunnelTable............................................................312 L2TP MIB....................................................................................29
jnxJsAuthNotifications........................................................163 LDP
jnxJsAuthTrapVars................................................................162 traps....................................................................................88
jnxJsFwAuthStats..................................................................161 disabling...................................................................88
jnxJsIfMonTable.....................................................................377 LDP MIB......................................................................................29
jnxJsLoadedCaCertTable..................................................399
jnxJsLoadedLocalCertTable............................................400
Copyright © 2010, Juniper Networks, Inc. 435
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
location statement Interface...........................................................27, 147, 285
SNMP................................................................................102 IP Forward........................................................27, 147, 291
usage guidelines...................................................40 IPsec Generic Flow Monitoring Object
logical-system statement.................................................103 ........................................................................28, 147, 293
logical-system-trap-filter statement............................104 IPsec Monitoring..........................................28, 147, 309
IPsec VPN Objects.........................................................28
M IPv4.....................................................................28, 147, 317
Management Information Base See MIBs IPv6 and ICMPv6...........................................................28
Management Information MIB L2ALD.................................................................................28
jnxMibs..............................................................................155 L2CP Features.................................................................28
jnxProducts.....................................................................154 L2TP....................................................................................29
jnxServices......................................................................154 LDP......................................................................................29
jnxTraps............................................................................157 Management Information MIB
master agent, SNMP...............................................................12 jnxMibs.....................................................................155
MIB object classes................................................................128 jnxProducts............................................................154
MIB profile...............................................................................426 jnxServices.............................................................154
mib-profile statement jnxTraps....................................................................157
usage guidelines..........................................................426 MIMSTP.............................................................................29
MIBs MPLS...................................................................................29
AAA Objects.....................................................................24 Multicast................................................................17, 18, 23
Access Authentication Objects................24, 145, 161 NAT Objects...................................................30, 147, 327
Alarm................................................................24, 145, 165 OSPF....................................................................................14
ATM.....................................................................................24 OTN.....................................................................................30
ATM CoS............................................................................24 Packet Forwarding Engine.......................30, 148, 335
BFD......................................................................25, 146, 171 Passive Monitoring........................................................30
BGP4 V2..........................................................25, 145, 169 Ping............................................................................30, 148
Chassis...........................................25, 146, 173, 175, 260 interpretation of..................................................339
Chassis Definitions for Router Model...........25, 265 use in ping test.......................................................118
Chassis Forwarding.......................................................25 Policy Objects................................................31, 148, 355
Class-of-Service.............................................................25 Power Supply Unit..........................................................31
Configuration Management..............................25, 146 Real-Time Media....................................................31, 148
Destination Class Usage.............................................26 Reverse-Path-Forwarding..........................31, 148, 371
Digital Optical Monitoring...........................................26 RMON Events and Alarms .......................32, 148, 373
DNS Objects....................................................................26 RPM......................................................................................31
Dynamic Flow Capture................................................26 RSVP TE.............................................................................32
enterprise-specific, listed..........................................145 Security Interface Extension
Ethernet MAC................................................26, 146, 275 Objects.........................................................32, 149, 377
Event.................................................................26, 146, 277 Security Screening Objects........................................32
EX Series Services PIC......................................................................32
Analyzer....................................................................24 SIP Common...........................................................32, 149
PAE Extension........................................................30 SNMP IDP.................................................................27, 149
Structure of Management Information SONET APS......................................................................33
Base.......................................................................33 SONET/SDH Interface Management.....................33
Virtual Chassis........................................................34 Source Class Usage.......................................................33
VLAN..........................................................................34 SPU monitoring.....................................................33, 149
Experimental....................................................................27 standards documents...................................................13
Firewall......................................................................27, 146
Flow Collection Services....................................27, 335
Host Resources.............................................27, 147, 283
436 Copyright © 2010, Juniper Networks, Inc.
Index
Structure of Management OTN MIB See Optical Transport Network (OTN)
Information..........................................................33, 145 MIB
Junos OS for J Series and SRX Series
devices, for..................................................33, 145 P
System Log....................................................33, 149, 389 Packet Forwarding Engine MIB......................30, 148, 335
Traceroute................................................................34, 149 PAE Extension MIB.................................................................30
Utility...............................................................34, 149, 395 parentheses, in syntax descriptions...............................xxii
views Passive Monitoring MIB........................................................30
SNMP.........................................................................53 Ping MIB............................................................................30, 148
VPN.....................................................................................34 interpretation of...........................................................339
VPN Certificate Objects...........................34, 150, 399 use in ping test...............................................................118
MIMSTP pingProbeHistoryTable........................................................123
MIB.......................................................................................29 Policy Objects MIB................................................31, 148, 355
minimum accounting options configuration............408 Power Supply Unit MIB..........................................................31
MPLS prefix list
enterprise-specific traps.............................................89 adding to SNMP community.....................................44
MIB.......................................................................................29 profiles, accounting
standard traps................................................................66 filter...................................................................................416
Multicast MIB................................................................17, 18, 23 interface...........................................................................413
MIB....................................................................................426
N Routing Engine.............................................................428
name statement...................................................................104 PSU MIB.......................................................................................31
usage guidelines.............................................................42
NAT Objects MIB...................................................30, 147, 327 R
NAT trap definitions.............................................................333 Real-Time Media MIB....................................................31, 148
Network Address Translation Objects MIB See NAT remote operations MIBs.......................................................117
Objects MIB request snmp spoof-trap command...............................51
nonpersistent statement Reverse-Path-Forwarding MIB..........................31, 148, 371
accounting RMON Events and Alarms MIB........................32, 148, 373
usage guidelines...................................................411 Routing Engine profile........................................................428
nonvolatile statement.........................................................105 routing instances
notice icons defined...............................................................xx access lists
number of IKE Tunnels currently active .....................298 configuring..............................................................133
nxContainersTable SNMP
M10 router.......................................................................180 enabling access...................................................130
identifying...............................................................129
O specifying..........................................................................131
objects-names statement routing-engine-profile statement
for Routing Engine profiles usage guidelines..........................................................428
usage guidelines.................................................428 routing-instance statement
oid statement SNMP...............................................................................106
SNMP................................................................................105 routing-instance-access.....................................................107
usage guidelines....................................................53 RPM MIB......................................................................................31
operation statement RSVP TE MIB.............................................................................32
for MIB profiles
usage guidelines..................................................427 S
Optical Transport Network (OTN) MIB. ........................30 Security Interface Extension Objects
OSPF MIB....................................................................................14 MIB.........................................................................32, 149, 377
Security Policy Table...........................................................356
Copyright © 2010, Juniper Networks, Inc. 437
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
Security Screening Objects MIB........................................32 system logging severity levels.....................................11
Services PIC MIB......................................................................32 unsupported.....................................................................67
Set requests, SNMP.................................................................9 SNMPv2
SIP Common MIB...........................................................32, 149 MPLS traps.......................................................................66
size statement Passive Monitoring Traps MIB...................................49
accounting SNMPv3
usage guidelines...................................................411 informs, configuring......................................................90
SNMP local engine ID, configuring.........................................57
adding client lists and prefix lists............................44 SONET APS MIB......................................................................33
agent...............................................................................9, 12 SONET/SDH Interface Management MIB.....................33
architecture.........................................................................9 Source Class Usage MIB.......................................................33
commit delay timer.......................................................42 Source NAT Table.................................................................328
community string...........................................................43 source-address statement...............................................108
configuration usage guidelines............................................................46
versions 1 and 2......................................................38 source-classes statement
enterprise-specific traps See SNMP traps usage guidelines..........................................................424
filtering duplicate requests..........................................41 SPU monitoring MIB.....................................................33, 149
limiting interface access..............................................52 SRX100 Services Gateway
logging, enabling............................................................117 MIB objects....................................................................265
manager...............................................................................9 SRX210 Services Gateway
master agent.....................................................................12 MIB objects....................................................................266
MIB views..........................................................................53 SRX220 Services Gateway
remote operations.........................................................115 MIB objects.....................................................................267
spoofing traps..................................................................51 SRX240 Services Gateway
standard traps See SNMP traps MIB objects.....................................................................267
standards documents...................................................13 SRX650 Services Gateway
subagent.............................................................................12 MIB objects....................................................................268
system contact...............................................................40 standard traps, SNMP
system description.........................................................41 version 1.............................................................................59
system location.....................................................40, 102 version 2.............................................................................63
system name...................................................................42 standards documents
tracing operations..........................................................54 SNMP and MIBs...............................................................13
trap groups.......................................................................49 start-time statement
trap notification for remote operations................116 usage guidelines...........................................................412
trap options.....................................................................46 Structure of Management Information Base MIB
views, setting..................................................................116 for EX Series.....................................................................33
SNMP informs.........................................................................90 Structure of Management Information MIB........33, 145
snmp statement....................................................................107 Junos OS for J Series and SRX Series devices,
usage guidelines for............................................................................33, 145
SNMPv1 and SNMPv2.........................................38 subagent, SNMP.......................................................................12
SNMP traps................................................................................10 support, technical See technical support
enterprise-specific syntax conventions................................................................xxi
version 1.....................................................................74 sysContact object, MIB II.....................................................40
version 2.....................................................................81 sysDescription object, MIB II................................................41
source address configuration....................................46 sysLocation object, MIB II....................................................40
spoofing..............................................................................51 sysName object, MIB II..........................................................42
standard system contact, SNMP.........................................................40
version 1.....................................................................59 system description, SNMP...................................................41
version 2....................................................................63 system location, SNMP...............................................40, 102
438 Copyright © 2010, Juniper Networks, Inc.
Index
System Log MIB....................................................33, 149, 389 view statement
system logging severity levels, SNMP traps....................11 SNMP (associating with community)...................113
system name, SNMP.............................................................42 usage guidelines....................................................43
SNMP (configuring MIB view)..................................114
T usage guidelines....................................................53
targets statement.................................................................108 views, MIB
usage guidelines.............................................................49 SNMP..........................................................................53, 116
technical support Virtual Chassis MIB................................................................34
contacting JTAC.............................................................xxii VLAN MIB...................................................................................34
traceoptions statement.....................................................109 VPN Certificate Objects MIB...........................34, 150, 399
SNMP VPN MIB.....................................................................................34
usage guidelines....................................................54
Traceroute MIB.......................................................34, 125, 149
tracing operations
SNMP..................................................................................54
transfer-interval statement
accounting
usage guidelines..................................................412
trap groups, SNMP.................................................................49
trap notification for SNMP remote operations...........116
trap-group statement............................................................111
usage guidelines.............................................................49
trap-options statement.......................................................112
usage guidelines............................................................46
traps..............................................................................................81
definition............................................................................10
LDP......................................................................................88
MPLS, enterprise-specific..........................................89
SNMP version 1 traps
enterprise-specific................................................74
standard...................................................................59
SNMP version 2 traps
enterprise-specific.................................................81
standard...................................................................63
spoofing SNMP traps....................................................51
unsupported.....................................................................67
See also SNMP traps
U
unsupported standard SNMP traps.................................67
Utility MIB...............................................................34, 149, 395
V
var/log/mib2d file...................................................................54
var/log/snmpd file..................................................................54
variable-length string indexes............................................117
version statement
SNMP.................................................................................112
usage guidelines....................................................49
Copyright © 2010, Juniper Networks, Inc. 439
SRX100, SRX210, SRX220, SRX240, and SRX650 Services Gateways MIB Reference
440 Copyright © 2010, Juniper Networks, Inc.