Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation

Juniper Mist™ Access Assurance—Juniper Validated Design (JVD)

keyboard_arrow_up
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

About this Document

date_range 27-Feb-25
JVD-ENTWIRED-MAA-01-01

Overview

This document covers how to successfully implement Juniper Mist Access Assurance as a cloud-based NAC solution for the enterprise. You will learn how the solution works utilizing the RADIUS protocol and how authentication and authorization are performed in the network. The IEEE 802.1X Extensible Authentication Protocol (EAP) methods are used to perform a strong authentication of wired and wireless clients. Unlike traditional designs where the RADIUS server needs to be installed, managed and maintained by each customer on their own, the shift towards a cloud-based service offered by Juniper leads to a scalable design that grows on-demand for the customer. The shift towards cloud-based services is in line with the general trend of using public identity providers (IdP), hence the Juniper NAC design can leverage the information provided by those for authentication and mapping to an authorization profile to be used on a switch or access point (AP) for a client.

This JVD explains the testbed used and methods of various test cases performed by Juniper Networks.

The recommendations section lists the best practices and advice customers should follow for such integration.

The appendix of this JVD contains test cases and configuration examples to allow customers to repeat the integration of Juniper Mist Access Assurance into their own network based on the provided information.

footer-navigation