- play_arrow Identity Provider Integration
- play_arrow Access Assurance Settings
- play_arrow Access Assurance Configuration
- Configure Certificate-Based (EAP-TLS ) Authentication
- Configure MAC-Based Authentication and MAC Authentication Bypass (MAB)
- Configure Certificate-Based (EAP-TLS ) Authentication with Azure IdP Integration
- Configure Credentials-Based (EAP-TTLS) Authentication
- Configure Client Device for EAP-TTLS Authentication
- TEAP Configuration for Windows Client
- Install Juniper Mist Edge VM for Juniper Mist Authentication Proxy
- Enable Client Onboarding with a BYOD PSK Portal
- play_arrow Monitoring
Juniper Mist Access Assurance Overview
Juniper Mist Access Assurance is an advanced, cloud-based network access control (NAC) service that secures your wireless and wired network by providing identity-based network access to devices and users. With this service, you can control who and what can access your network. You can set up simple rules to allow or deny access to different types of devices, such as guests, corporate devices, and devices generating IoT and BYOD traffic. The service checks the user and device identities before letting them connect to the network. The service uses 802.1X authentication for 802.1-enabled devices and MAC Authentication Bypass (MAB) verification for non-802.1X devices.
Watch the following video for a quick overview on how NAC has changed over time and what it looks like today:
Video 1: Evolution of Existing NAC Solutions
Watch the following video to understand how Juniper Mist Access Assurance delivers NAC based on modern cloud services built with Mist AI:
Video 2: Juniper Mist Access Assurance: Cloud-Based Network Ac...
Features
- Microservices architecture that ensures high availability and scalability to support large deployments at a global level.
- Geo-affinity for automatic connections to access points and switches to the nearest authentication service port
- X.509 certificate management that maintains network trustworthiness with efficient digital certificate handling
- 802.1X and non-802.1X authentication to ensure versatile network security
- Network policy and microsegmentation facilitate targeted traffic control and threat containment.
- Integration with external directory services such as Google Workspace, Microsoft Entra ID (previously known as Microsoft Azure Active Directory), and Okta Identity
- Third-party support for compatibility with non-Juniper network infrastructure
- Marvis Virtual Network Assistant for AI-powered network insights, diagnostics, and troubleshooting
Benefits
- User experience visibility—Visibility to user experience—Manage network operations—for example, monitor end-to-end user connections and troubleshoot network issues—from a single dashboard.
- Single pane of glass for management and operations—Efficiently perform your day-to-day access assurance tasks on the Juniper Mist portal, which provides full-stack management capability in one dashboard for end-to-end visibility to operations.
- Seemless onboarding—Easily onboard wired and wireless devices by using 802.1X or MAB validation methods.
- Simplified management—With our geographically distributed cloud authentication service, you can remove dependency on standalone authentication, authorization, and accounting (AAA) servers. This service automates updates to latest software patches without service downtime.
- Unified policy—Easily create authentication policies for both wired and wireless clients, replacing traditional complex AAA configurations.