Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Mist AI-Native Operations Guide
Table of Contents Expand all
list Table of Contents

Wired Successful Connect SLE

date_range 08-Apr-25

Use the Wired Successful Connect SLE to assess clients' experiences connecting to your wired network.

Successful Connect is one of the Service-Level Expectations (SLEs) that you can track on the Wired SLEs dashboard. Use this SLE to see if clients are able to get connected to your network, and to understand the root causes of any issues that are occuring.

Wired Connects SLE Example
Note:

To find the Wired SLEs dashboard, select Monitor > Service Levels from the left menu, and then click the Wired button.

What Does the Wired Successful Connect SLE Measure?

Juniper Mist monitors client connection attempts and identifies failures. The source of data is 802.1X events on the switch. This SLE helps you to assess the impact of these failures and to identify the root causes to address.

Note:

This SLE will show data only if you use 802.1X on the wired network to authenticate clients or if you have DHCP snooping configured.

Classifiers and Sub-Classifiers

When connection attempts are unsuccessful, Juniper Mist sorts the issues into classifiers. The classifiers appear on the right side of the SLE block.

Wired Connects SLE Example

By looking at classifiers, you see which factors are causing the most client issues. Most classifiers also have sub-classifiers, providing even more insight into the issues. (The sub-classifiers appear on the Root Cause Analysis page, which you can open by clicking a classifier.)

Let's get familiar with the Successful Connect classifiers and sub-classifiers:

  • DHCP—Dynamic Host Configuration Protocol (DHCP) snooping enables the switch to examine the DHCP packets and keep track of the IP-MAC address binding in the snooping table. This classifier adds a failure event every time a client connects to a network and fails to reach the bound state within a minute (DCHP timeouts).

    Note:
    • The SLE dashboard shows DHCP failures only for those switches that have DHCP snooping enabled in the port profile (within the switch template).

    • DHCP snooping might not always work well with endpoints that have static IPs.

  • Authentication—Each time a client authenticates, a client event is generated. This classifier helps you identify issues that caused authentication failures.

    Sub-Classifiers:

    • RADIUS Server Reject VLAN—Couldn't authenticate to the specified VLAN.

    • Wrong Credentials—The credentials weren't valid.

    • RADIUS Server Unreachable—The RADIUS server was down.

  • Access Port Security—This classifier helps you identify client connection failures caused by access port security issues. You can configure these security features in your port profiles, and then these classifiers will be triggered as security events occur.

    Sub-Classifiers:

    • BPDU-Guard—Detects connection failures because of the BPDU guard configuration on the switch port. This feature is important to prevent looping, as when a switch is connected to a switch. To enable this feature, go to the port profile, and enable STP Edge.
    • MAC Limit—Detects connection failures reported when a client exceeds the MAC limit configured on the switch port. For example, you might configure your port profile with a MAC limit of 2 if you have an outdoor security camera or public address system and want to prevent other devices from connecting to that port. If someone unplugs your camera and attempts to connect their own device, the MAC limit would be reached, and this event would be reflected by the MAC limit classifier.
    • Dynamic ARP Inspection—Identifies client connection failures when a port drops invalid Dynamic ARP Inspection packets. This security feature prevents people from snooping for someone else's ARP address to gain access. Requires enabling ARP Inspection in the DHCP Snooping section of the port profile.
    • Rogue DHCP Server—Identifies client connection failures caused by a rogue DHCP server event. This could be an event where an untrusted port drops traffic from DHCP servers to block unauthorized servers. Enabling this feature can prevent rogue devices from connecting. This classifier shows any such attempts that occur. Requires enabling DHCP snooping in the port profile.
      Note:

      As a best practice, be sure to configure the Trusted or Untrusted setting in the port profile—typically, you want trunk ports to be trusted and access ports to be untrusted to prevent unauthorized use of ports. This is especially important in public settings where you have a camera connected to a port; this setting can prevent someone from disconnecting the camera and connecting a rogue device.

Root Cause Analysis for the Wired Successful Connect SLE

After you click a classifier in the SLE block, you'll see to the Root Cause Analysis page. Click classifiers and sub-classifiers to view timeline and scope information in the lower half of the screen.

Note:

The information in the lower half of the screen depends on what you've selected at the top.

Useful tabs in the lower half of the screen are:

  • Timeline—See exactly when the issues occurred.

  • Distribution—See which VLANs were affected.

  • Affected Items—See which interfaces and clients were affected and how much each one contributed to the overall impact. Also see the individual failure rate for each interface or client.

Let's look at an example involving Authentication (classifier) and Wrong Credentials (sub-classifier).

Click the Interfaces tab to see which interfaces were affected.

Affected Items - Interfaces

Click the Clients tab to see which clients were affected.

Affected Items - Clients
Tip:
  • Overall Impact is the percentage that a client or interface contributed to all issues for the selected sub-classifier. For example, it can show if a client account for 20 percent or 90 percent of the issues.

  • Failure Rate is the impact of this issue on this interface or client. For example, it can show if an interface was unsuccessful on 20 percent or 90 percent of connection attempts.

  • To see more details, click the hyperlinks in the table to go to the Insights page, where you can see all client and switch events.

file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right
footer-navigation
keyboard_arrow_down
file_download
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
language