Enquire: Asia & Africa - +65-98008081 USA - +1-919-995-4114

Home Networking Network Switches License Juniper Mist Access Assurance / Cloud Network Access Control (NAC) Service

Juniper Mist Access Assurance / Cloud Network Access Control (NAC) Service


Brand:

Specifications

        Product details:
  • 100% brand new from factory and high quality
  • Economical Price
  • Sold and shipped from Singapore (hence faster delivery, Easy to Exchange)
  • 1 Year Warranty
  • Brand: Juniper 

    Product overview
  • Juniper Mist Access Assurance is a cloud-based service that ensures Zero-Trust, identity-based network access, and full-stack policy and segmentation assignments with end-to-end user experience visibility. The service delivers a suite of access control functionality with a flexible, yet simple, authorization policy framework for onboarding guest, IoT, BYOD, and corporate devices. Client connection is controlled based on user and device identities, regulating access for devices connecting to the network. Access Assurance also provides access control services for devices leveraging 802.1X authentication and MAC Address Bypass for non-802.1X allowlisted, wired IoT devices.

    Product Description
  • Juniper® Mist™ Access Assurance is a microservices-based, cloud network access control (NAC) service that enables enterprises to easily enforce a Zero-Trust security model. Access Assurance solves many complexity challenges associated with traditional NAC offerings by:

    Removing on-premises server hardware
  • Providing inherently highly available and resilient services
  • Enabling automatic at-run-time feature updates, security, and vulnerability fixes
  • Access Assurance extends beyond the capabilities of Juniper Mist IoT Assurance, which simplifies onboarding for headless IoT and BYOD devices. With Access Assurance, IT teams can onboard wired and wireless devices with 802.1X authentication or MAC Authentication Bypass (MAB) methods, even for non-802.1X devices.
  • Access Assurance uses hundreds of different vectors to match the identity of the user and device, such as X.509 certificate attributes, user group memberships, device compliance and posture metrics, and location context. These vectors help determine identity-based network admission criteria, such as the network segment or microsegment a device should connect to and the network policy that should be dynamically applied to a user.

    Features
    Built-in high availability and geo-affinity
  • With Access Assurance, organizations gain reliable and low-latency network access control of their networks in single and multisite deployments. Juniper has deployed cloud instances of its network access control cloud service in multiple regional locations. In multisite deployments, authentication traffic coming from the network infrastructure is automatically directed to the nearest Access Assurance instance. Latency is minimized and users enjoy an exceptional wireless experience. This automated process is fully transparent to users and requires no involvement from the IT team. Organizations are assured reliable, redundant network access for client devices, regardless of the state of the nearest regional instance.

    Automatic feature and security updates
  • The Juniper Mist microservices-based cloud architecture keeps Access Assurance optimized with the most advanced technologies. New features, security patches, and updates are automatically added to Access Assurance on a bi-weekly basis without interruptions or service downtime. This capability dramatically simplifies and improves service operations for network IT administrators, eliminating lengthy software upgrades and service downtime. Juniper can easily deploy new features and functions to its cloud-based services, bringing advancements to market more rapidly and continuously improving your client-to-cloud experience.

    Access Assurance extends Juniper Mist IoT Assurance
  • Access Assurance is paired with Juniper Mist IoT Assurance to build out controls for onboarding and management of corporate devices with 802.1X authentication and MAC-less onboarding of non-802.1X IoT and BYOD devices. IoT Assurance capabilities simplify IT operations and secure connections for headless IoT and BYOD devices via a Multiple Pre-Shared Key (MPSK) mechanism. It incorporates a full suite of access control functionality leveraging MPSK or Private Pre-Shared Key (PPSK) as a new type of identity and policy vector.
  • IoT Assurance also provides PSK Portal creation, enabling BYOD onboarding workflows by automating PSK generation based on user identity, leveraging Security Assertion Markup Language (SAML) for an SSO experience. It enables seamless client device onboarding via mobile QR code or by typing a personalized passphrase without installing any client software.
  • Access Assurance subscriptions include IOT Assurance functionality for simple access control for all clients and devices on your network, no matter how they connect.

    Granular user and device identity
  • Access Assurance is capable of granular identity fingerprinting based on X.509 certificate attributes. It also uses identity provider (IdP) information like group membership, user account state, MDM compliance state, client lists, and user location for fingerprinting. The resulting user and device fingerprint provides an identity vector for accurate policy assignment within the Zero Trust principles.

    Marvis Virtual Network Assistant
  • Marvis Virtual Network Assistant uses Mist AI to help IT teams interact and engage with their networks. The Marvis AI engine binds together Access Assurance with other Juniper Mist cloud-based services, such as Wired Assurance, Wi-Fi Assurance, and WAN Assurance, helping the operations team move closer to achieving The Self-Driving Network™ with simplified troubleshooting and performance analysis.
  • Using features powered by Mist AI, help desk staff and network administrators can simply ask a question in natural language and get actionable insights using the Marvis Conversational Interface that helps them identify and solve network issues. Marvis brings proactive anomaly detection into the SLE dashboard. With Marvis Actions, staff gain proactive, actionable insights to identify network access issues across the full stack, providing recommendations for user connectivity issues. This provides our customers with easy root cause analysis across the full network stack and authentication services.

    API-Driven architecture
  • Access Assurance service is 100% based on public Representational State Transfer (REST) APIs that allow easy integration with external security information and event management (SIEM) or IT service management systems or other platforms for both configuration and policy assignment. These APIs provide the capability to invoke actions based on user or external events, as well as for using the cloud-native Webhook framework. Overall, the Juniper Mist platform is 100% programmable, using open APIs, for full automation and seamless integration with complementary Juniper access, wired, wireless, WAN, security, user engagement, and asset visibility solutions. 

    Single pane of glass for management and operations
  • Access Assurance is tightly integrated with Juniper Mist cloud, providing full-stack management and day-to-day operations for Wi-Fi Assurance, Wired Assurance, SD-WAN Assurance, and Access Assurance in one dashboard for end-to-end visibility. The Marvis™ AI engine leverages data from multiple sources for anomaly detection to provide actionable metrics. Through the dashboard, users can:
  • Create and apply access policies that ensure only authorized devices and users are allowed network access
  • Assign users and devices to the correct network segment
  • Prevent users and devices from accessing restricted resources
  • Add and modify certificates and certificate authorities
  • Configure identity providers
  • Monitor client activity across the organization

    Specifications
  • X.509 certificate management: External PKI support
  • Automatic CRL/OSCP certificate revocation check

    External identity provider integration: 
  • The following protocols are supported to integrate into any identity provider to do user lookup and get device state information:
  • Secure Lightweight Directory Access Protocol (LDAP) eduroam secure network access
  • Integrations continually added for major unified endpoint management (UEM), enterprise mobility management (EMM) and mobile device management (MDM) tools

    802.1X Authentication Methods: 
    The following EAP methods are supported for secured 802.1X access:
  • Extensible Authentication Protocol-Transport Layer Security (EAP-TLS)
  • Protected Extensible Authentication Protocol PEAP TLS Tunnel
  • Extensible Authentication Protocol (TEAP) (TLS/TLS) Extensible Authentication Protocol-Tunneled TLS (EAP-TTLS (PAP)
  • Non-802.1X authentication methods: MAC Authentication Bypass (MAB)

    Multi Pre-Shared Key (MPSK)
  • Network policy and microsegmentation: Assign VLANs, role and group-based policy tags dynamically based on the user identity
  • Third-party network infrastructure support: Supported via Mist Edge Auth Proxy application, third-party vendor devices can communicate over standard RADIUS to the Mist Edge Auth Proxy

    Juniper Mist IoT Assurance (Included with all Access Assurance subscriptions): 
  • IoT and BYOD client-device onboarding
  • Create, rotate, auto-expire PSKs and MPSKs
  • Dynamic traffic engineering
  • Key-based WxLAN policy
  • Personal WLAN creation and management
  • Active device usage tracking per PSK
  • Automated key provisioning and rotation
    Juniper Access AssuranceAccess AssuranceMist Access Assurance

Features

Brand:
Juniper
Warranty:
1 Year