CODE: JUN_JMAA
LENGTH: 16 Hours (2 days)
PRICE: £1,650.00
This two-day, intermediate-level course provides students with the knowledge to configure and monitor Juniper Mist™ Access Assurance. Key topics include the purpose of network access control (NAC); the Juniper Mist Access Assurance cloud architecture; Juniper Mist™ Edge authentication proxy; authentication, authorization, and accounting (AAA) components; 802.1X and Extensible Authentication Protocol (EAP) operations; RADIUS concepts; RADIUS over TLS (RadSec); authorization of 802.1X and non-802.1X devices; identity provider (IdP) integration; Juniper Mist Access Assurance authentication policies and methods; and integration with mobile device management (MDM).
The lab includes Juniper Mist Access Assurance, the Juniper Networks® EX4400 Switch, and the Juniper® AP45 High-Performance Access Point.
Deploying and Managing Juniper Mist Access Assurance is an intermediate-level course.
• Describe the purpose of and the need for NAC.
• Explain the Juniper Mist Access Assurance cloud architecture.
• Discuss third-party device support with Juniper Mist Edge authentication proxy.
• Describe common use cases with Juniper Mist Access Assurance.
• Discuss Juniper Mist Access Assurance best practices.
• List AAA components.
• Discuss how the RADIUS protocol works.
• Describe RADIUS server attributes.
• Explain the functionality of RadSec.
• Explain 802.1X operations.
• Discuss the Juniper Mist Access Assurance 802.1X certificate and password authentication methods.
• Explain how Juniper Mist Access Assurance can authenticate devices that don’t support 802.1X.
• Describe IdP integration with Juniper Mist Access Assurance.
• Explain how to configure Juniper Mist Access Assurance authentication policies with match labels and action labels.
• Discuss how to configure Juniper Mist Access Assurance authentication methods.
• Explain how to configure Juniper Mist Edge for the Juniper Mist authentication proxy function.
• Describe how to validate Juniper Mist Access Assurance access and authentication.
• Implement Juniper Mist Access Assurance with wired and wireless devices.
•Discuss Juniper Mist Access Assurance integration with MDM providers
Individuals responsible for implementing and monitoring Juniper Mist Access Assurance.
• General understanding of TCP/IP.
• General understanding of security concepts.
• Completion of the Introduction to Juniper Mist AI course, which is recommended but not required.
DAY 1
Module 01: Understanding Network Access Control
•Describe the components of network access control
•Explain the history of network access control
•Explain Juniper Mist Access Assurance
Module 02: Juniper Mist Access Assurance—Overview
•Explain the cloud architecture
•Explain Juniper Mist-managed devices and requirements
•Describe third-party device support
•Describe the client use cases of Juniper Mist Access Assurance
•Describe the best practices of Juniper Mist Access Assurance
Module 03: RADIUS
•Explain the components of AAA
•Describe how RADIUS works
•Describe RADIUS Change of Authorization
Module 04: X.509 Certificates and PKI
•Describe the purpose and structure of X.509 certificates and PKI
Module 05: 802.1X and EAP Authentication
•Describe EAP operations
Module 06: Identity Provider Tools and Their Uses
•Review API tools and their uses
•Compare API tools and their use cases with the Juniper Mist API
Lab 01: Initial Lab Configuration
DAY 2
Module 07: Configuring Juniper Mist Access Assurance
•Describe authentication policy configuration
•Describe EAP-TLS configuration
•Describe EAP-TTLS configuration
Lab 02: Implementing Juniper Mist Access Assurance with 802.1X
Module 08: Non-802.1X Authentication
•Describe non-802.1X clients
•Describe MSPK authentication and configuration
•Describe client onboarding using the PSK Portal
•Describe MAB authentication and configuration
•Describe Juniper Mist Access Assurance endpoint management
Lab 03: Implementing Juniper Mist Access Assurance with non-802.1X
Module 09: Posture Compliance
• Provide and overview of posture compliance
• Describe Microsoft Intune integration
• Describe Jamf Pro integration
• Describe how to verify compliance
Module 10: Explain Juniper Mist Edge Integration
• Define the features and benefits of Juniper Mist Edge
• Describe the installation of Juniper Mist Edge
• Explain Juniper Mist Edge as a RADIUS server proxy
• Explain Juniper Mist authentication proxy
• Describe Access Assurance Site Survivability
• Summarize the DHCP relay service
• Review the Juniper Mist Edge management functions
Deploying and Managing Juniper Wireless Networks with Mist AI