Deploying and Managing Juniper Mist Access Assurance (DMAIAA)

 

Course Overview

This one-day course provides students with the knowledge to configure and monitor Juniper Mist™ Access Assurance. Key topics include the purpose of network access control (NAC), the Juniper Mist Access Assurance cloud architecture, Juniper Mist™ Edge authentication proxy, authentication, authorization, and accounting (AAA) components, 802.1X and Extensible Authentication Protocol (EAP) operations, RADIUS concepts, RadSec, authorization of 802.1X and non-802.1X devices, identity provider (IdP) integration, Juniper Mist Access Assurance authentication policies and methods, and integration with mobile device management (MDM).

The lab is based on Juniper Mist Access Assurance and Juniper® AP45 High-Performance Access Point.

Who should attend

This course is for individuals who are responsible for implementing and monitoring Juniper Mist Access Assurance

Prerequisites

Course Objectives

After successfully completing this course, the students should be able to:

  • Describe the purpose of and the need for network access control.
  • Explain the Juniper Mist Access Assurance cloud architecture.
  • Discuss third-party device support with Juniper Mist Edge authentication proxy.
  • Describe common use cases with Juniper Mist Access Assurance.
  • Discuss Juniper Mist Access Assurance best practices.
  • List AAA components.
  • Explain 802.1X operations.
  • Discuss how the RADIUS protocol works.
  • Describe RADIUS server attributes.
  • Explain the functionality of RadSec.
  • Discuss the Juniper Mist Access Assurance 802.1X certificate and password authentication methods.
  • Explain how Juniper Mist Access Assurance can authenticate devices that don’t support 802.1X.
  • Describe IdP integration with Juniper Mist Access Assurance.
  • Explain how to configure Juniper Mist Access Assurance authentication policies with match labels and action labels.
  • Discuss how to configure Juniper Mist Access Assurance authentication methods.
  • Explain how to configure Juniper Mist Edge for the Juniper Mist authentication proxy function.
  • Describe how to validate Juniper Mist Access Assurance access and authentication.
  • Implement Juniper Mist Access Assurance with wired and wireless devices.
  • Discuss Juniper Mist Access Assurance integration with MDM providers.

Course Content

Understanding Network Access Control
  • Describe the components of network access control
  • Explain the history of network access control
  • Explain Juniper Mist Access Assurance
Juniper Mist Access Assurance Overview
  • Explain the cloud architecture
  • Explain Juniper Mist-managed devices and requirements
  • Describe third-party device support
  • Describe the client use cases of Juniper Mist Access Assurance
  • Describe the best practices of Juniper Mist Access Assurance
802.1X Authentication
  • Describe the components of AAA
  • Describe 802.1X operations
  • Describe the EAP operations
  • Define the RADIUS protocol
Authentication and Authorization
  • Explain 802.1X certificates and passwords
  • Define IdP integration
  • Explain non-802.1X devices
  • Describe migration from legacy to IdP
Configuring Juniper Mist Access Assurance
  • Describe authentication policy configuration
  • Describe EAP-TLS configuration
  • Describe EAP-TTLS configuration
  • Describe MAB configuration
  • Describe Juniper Mist authentication proxy configuration

Lab 1: Implementing Mist Active Assurance

Posture Compliance
  • Explain posture compliance
  • Describe Microsoft Intune integration
  • Describe Jamf Pro integration
  • Describe verifying compliance

Lab 1: Implementing Mist Active Assurance

Prices & Delivery methods

Online Training

Duration
1 day

Price
  • US $ 1,000.—
Classroom Training

Duration
1 day

Price
  • Israel: US $ 1,000.—
 

Schedule

English

1 hour difference

Online Training Time zone: Central European Time (CET)
Online Training Time zone: Central European Time (CET)
Online Training Time zone: Central European Summer Time (CEST)
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.