Configure Sites and Variables Go to Organization -> Site Configuration. We will configure 5 sites with the names depicted below. Make sure that in each Site you configure the root password for Switch and WAN-Router Management! Be sure to populate the root password for WAN Edges and Switches in the Site. The moment you activate...
- Getting Started
- Wireless
- Wired Switching
- WAN Edge
- Mist Access Assurance
- Location Based Services
- Premium Analytics
- Security and Cloud Administration
- MSP
- Automation
- Product Updates
- Marvis
- Security Alerts
- FAQ
Configuration
For users to access applications, we will first define the Applications and then use Application Policies to permit or deny access. Let’s now have a look how we can define Applications. Go to Organization -> Applications. In Mist WAN Assurance, we can define Applications in 3 ways: Custom Apps, Apps or URL Categories, explained below:...
During our WAN Design, we will create Networks that can later be used in Interfaces, Templates and Application Policies. A Network is defined with: a unique Network Name Subnet IP/Prefix VLAN (optional) plus a list of options The Subnet IP/Prefix and VLAN can be defined with absolute values (e.g. 192.168.50.0/24, VLAN 50) or more typically...
Application Policies (aka Security Policies) define who can access the Applications. Once we have created the Networks, Applications and Traffic Steering Profiles, we can combine all this in the Application Policies to define who has access to the Applications (or who has not), the selected paths for the traffic in Overlay and Underlay and some...
Create Hub Profile for first Hub Go to Organization -> Hub Profiles Note You can avoid the work creating this Profile if you simply import the shared JSON. Click on “Create Profile” Example uses the name (although Site Location or standard naming conventions should be used) “hub1” then click on “Create”. This will open the...
Go to Organization -> WAN Edge Templates. Note You can avoid the work creating this Template if you simply import the shared JSON discussed in other reference documentation. Remember you must do the Site assignments after this. Create your entire Spoke Template via GUI. Click on “Create Template” We create the Template for our Spokes....
Assign Spoke Templates to Sites We go back to the Spoke Template and “Assign to Sites”. Then select only the three “spokeX-site” and “Apply”. The result should indicate 3 Sites (the wan edges change when devices get assigned the these) Onboard your Devices Now it’s time to use the Claim or Adopt Method to onboard...
The AI Driven SD-WAN Secure Edge Connector (SEC) can provide connectivity to many SASE providers. This provides a simple augmentation of on-box IDS and URL filtering services. The SEC provides simplified workflows for Juniper SASE, Zscaler as well as additional providers though the custom option. Juniper Secure Edge is an advanced Security Scanner located in...
On the 128T SSR this new feature, which is enabled when the Intent is added in Policies. There is nothing a User needs to do for this feature, only activation in an Application Policies on the Spoke is needed. Intrusion detection is the process of monitoring the events occurring in your network and analyzing them...
TBD