Every PSK (Pre-shared Key) has a Key Name This name is reported in the Mist Management platform Allows user level accountability with PSK simplicity If a PSK is compromised there is no need to change every client. Multiple users allow any number to use the key Single user ties this key to a specific MAC...
- Getting Started
- Wireless
- Wired Switching
- WAN Edge
- Mist Access Assurance
- Location Based Services
- Premium Analytics
- Security and Cloud Administration
- MSP
- Automation
- Product Updates
- Marvis
- Security Alerts
- FAQ
WLAN Configuration
SSID Scheduling allows you to customize your WLAN by choosing the exact days and times to broadcast the SSID. This scheduling function allows users to add multiple time ranges for each day. To use SSID Scheduling, navigate to Network > WLANS and either create a new one or click into an existing one to edit. Find the SSID...
Add primary RADIUS server at the top of the list Add Accounting servers if required. Multiple RADIUS Authentication and Accounting servers are supported. NAS Identifier – this can be used by the RADIUS server to make decisions NAS IP address – again can be used by the RADIUS server. Note: The IP address of each...
WPA-2/PSK – standard pre shared key network. Reveal shows the key. WPA-2/EAP – Radius based authentication WPA-3/SE – passphrase with better security than WPA-2 Open Access – Un-encrypted network typically used for guest networks. WPA-2/PSK with Multiple Passphrases – hundreds of different keys can be used on the same WLAN MAC authentication – can be...
By default Mist drops unknown DHCP responses to wireless clients, essentially the client must be directly associated to the AP for DHCP to be forwarded. This will cause bridged virtual machines to fail DHCP. Mist has a knob called enable wireless bridging which will allow bridged VMs to be able to connect to a Mist...
Configuring a network with your CoA/DM server is an easy process with the Mist dashboard. Just follow the steps below – all you need is the IP address and shared secret of your server. Create a WLAN with EAP (802.1X) security by navigating to Network > WLANs and selecting Add WLAN. Enter in your RADIUS server IP and secret....
Geofencing feature allows the admin to configure the minimum client RSSI needed for a client to successfully connect to the network. This feature can be enabled to make sure a user is within your facility or coverage area before offering them service. To enable Geofencing, navigate to Organization > WLAN Templates, select the WLAN in...
Hotspot 2.0 (or Passpoint) allows automatic secured connections for mobile devices to enable seamless user experience for various use-cases, such as public guest networks, carrier WiFi offload, Eduroam services and many more. Passpoint enables automatic network connection regardless of the SSID name, rather relying on 802.11u information received in the beacon or via ANQP exchange...
Step #1 Login into your jump server <if not registered, register with your email> Active Directory and LDAP Reimagined Step #2 Create your Radius client: Click on Radius tab> click on “+” button to add radius server We need to make sure, we add the external IP as radius client IP and...
Can be enabled with any security RADIUS Server then used to authenticate using MAC address as username and password Change of Authorization(COA) – again an external server can instruct the re-authentication of a client VLAN can also be untagged, tagged or dynamic in the same way as 802.1x wireless can. Optionally, ‘Guest Access with Mac...