- play_arrow Get Started
- play_arrow Access Points
- Overview of Juniper APs
- Juniper AP Ports and Their Usage
- PoE Requirements for Juniper APs
- play_arrow AP Dashboard
- play_arrow Onboarding
- play_arrow Configuration
- Auto-Provision Device Names, Sites, and Device Profiles
- BLE Settings
- Configure Ethernet Settings in a Device Profile
- Configure IP Settings
- Wireless Mesh Network Configuration
- Enable RTLS Support
- Electronic Shelf Labels
- Enabling LEDs on the AP
- Configure an AP for Survey Mode
- Configure Your APs as IEEE 802.1X Supplicants
- Enable Local Status Page
- Revert AP Configuration Automatically
- play_arrow Device Profiles
- Monitor and Manage Access Points
- Access Point FAQ
- play_arrow Integrations
- play_arrow WLAN Guest Portal
- Compare WLAN Guest Portal Options
- Automatic Client VLAN Assignments
- play_arrow Custom Guest Portal
- Use an External Portal for Guest Access
- play_arrow Use an Identity Provider for Guest Access
- Authorize, Reauthorize, and Reconnect Guest Clients
- Troubleshoot a Guest Network That Doesn't Work
- FAQs: Guest Portal
- play_arrow Radio Management
- play_arrow Wireless SLEs
- play_arrow Troubleshooting
- Using SLEs for Troubleshooting
- Wi-Fi Reason Codes
- play_arrow Troubleshooting an Access Point
- Replace an AP
- Reset an AP to the Factory-Default Configuration
- Troubleshooting Wireless Issues
- Common Wi-Fi Issues
- Dynamic and Manual Packet Captures
- Steer Clients to the 5-GHz Band
- Bonjour and Bluetooth Devices
- LLDP-MED Power Negotiation
- Troubleshoot Your Integration with Aruba ClearPass
- Use Labels to Identify "Unknown" Applications
- play_arrow Technology Reference
Security
Use the information in this chapter to get started with security options such as 802.1X, MAC RADIUS authentication, integrations, and access policies.
What Do You Want to Do?
If you want to... | Use these resources: |
---|---|
Use a RADIUS server to authenticate users Juniper Mist supports IEEE 802.1X security for WPA2 and WPA3. You can also set up CoA/DM and RadSec. | |
Use MAC address authentication You can use this option with any security type. | |
Use preshared keys to authenticate users With preshared keys (PSK), clients must present a secure passphrase to connect to the wireless network. You can also leverage PSKs for onboarding users to the SSID. | Configure and Manage Pre-Shared Keys |
Integrate with third-party products Integrate with Aruba Clearpass, JumpCloud, Cisco ISE, or Hotspot 2.0. | |
Configure access policies Set up rules to allow or deny access to resources on the network. | |
Monitor and remove potential security threats Juniper Mist detects rogue, neighbor, and honeypot APs. These are unauthorized devices operating on or near your network, often with the goal of stealing data or monitoring communications. | |
Use Juniper Mist Access Assurance for secure network access control for your wired and wireless networks. | Juniper Mist Access Assurance Guide |