<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="35001" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/juniper-dmaiaa" lastchanged="2025-10-16T22:13:46+02:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Deploying and Managing Juniper Mist Access Assurance</title><productcode>DMAIAA</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-DMAIAA</fullproductcode><version>1.0</version><objective>&lt;p&gt;After successfully completing this course, the students should be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the purpose of and the need for network access control.&lt;/li&gt;&lt;li&gt;Explain the Juniper Mist Access Assurance cloud architecture.&lt;/li&gt;&lt;li&gt;Discuss third-party device support with Juniper Mist Edge authentication proxy.&lt;/li&gt;&lt;li&gt;Describe common use cases with Juniper Mist Access Assurance.&lt;/li&gt;&lt;li&gt;Discuss Juniper Mist Access Assurance best practices.&lt;/li&gt;&lt;li&gt;List AAA components.&lt;/li&gt;&lt;li&gt;Explain 802.1X operations.&lt;/li&gt;&lt;li&gt;Discuss how the RADIUS protocol works.&lt;/li&gt;&lt;li&gt;Describe RADIUS server attributes.&lt;/li&gt;&lt;li&gt;Explain the functionality of RadSec.&lt;/li&gt;&lt;li&gt;Discuss the Juniper Mist Access Assurance 802.1X certificate and password authentication methods.&lt;/li&gt;&lt;li&gt;Explain how Juniper Mist Access Assurance can authenticate devices that don&amp;rsquo;t support 802.1X.&lt;/li&gt;&lt;li&gt;Describe IdP integration with Juniper Mist Access Assurance.&lt;/li&gt;&lt;li&gt;Explain how to configure Juniper Mist Access Assurance authentication policies with match labels and action labels.&lt;/li&gt;&lt;li&gt;Discuss how to configure Juniper Mist Access Assurance authentication methods.&lt;/li&gt;&lt;li&gt;Explain how to configure Juniper Mist Edge for the Juniper Mist authentication proxy function.&lt;/li&gt;&lt;li&gt;Describe how to validate Juniper Mist Access Assurance access and authentication.&lt;/li&gt;&lt;li&gt;Implement Juniper Mist Access Assurance with wired and wireless devices.&lt;/li&gt;&lt;li&gt;Discuss Juniper Mist Access Assurance integration with MDM providers.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;General understanding of TCP/IP&lt;/li&gt;&lt;li&gt;General understanding of security concepts&lt;/li&gt;&lt;li&gt;Completion of the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/juniper-ijma&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Introduction to Juniper Mist AI &lt;span class=&quot;fl-prod-pcode&quot;&gt;(IJMA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; course recommended, but not required&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is for individuals who are responsible for implementing and monitoring Juniper Mist Access Assurance&lt;/p&gt;</audience><contents>&lt;h5&gt;Understanding Network Access Control&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the components of network access control&lt;/li&gt;&lt;li&gt;Explain the history of network access control&lt;/li&gt;&lt;li&gt;Explain Juniper Mist Access Assurance&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Juniper Mist Access Assurance Overview&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the cloud architecture&lt;/li&gt;&lt;li&gt;Explain Juniper Mist-managed devices and requirements&lt;/li&gt;&lt;li&gt;Describe third-party device support&lt;/li&gt;&lt;li&gt;Describe the client use cases of Juniper Mist Access Assurance&lt;/li&gt;&lt;li&gt;Describe the best practices of Juniper Mist Access Assurance&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;802.1X Authentication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the components of AAA&lt;/li&gt;&lt;li&gt;Describe 802.1X operations&lt;/li&gt;&lt;li&gt;Describe the EAP operations&lt;/li&gt;&lt;li&gt;Define the RADIUS protocol&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Authentication and Authorization&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain 802.1X certificates and passwords&lt;/li&gt;&lt;li&gt;Define IdP integration&lt;/li&gt;&lt;li&gt;Explain non-802.1X devices&lt;/li&gt;&lt;li&gt;Describe migration from legacy to IdP&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Configuring Juniper Mist Access Assurance&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe authentication policy configuration&lt;/li&gt;&lt;li&gt;Describe EAP-TLS configuration&lt;/li&gt;&lt;li&gt;Describe EAP-TTLS configuration&lt;/li&gt;&lt;li&gt;Describe MAB configuration&lt;/li&gt;&lt;li&gt;Describe Juniper Mist authentication proxy configuration&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 1: Implementing Mist Active Assurance&lt;/p&gt;
&lt;h5&gt;Posture Compliance&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain posture compliance&lt;/li&gt;&lt;li&gt;Describe Microsoft Intune integration&lt;/li&gt;&lt;li&gt;Describe Jamf Pro integration&lt;/li&gt;&lt;li&gt;Describe verifying compliance&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 1: Implementing Mist Active Assurance&lt;/p&gt;</contents><objective_plain>After successfully completing this course, the students should be able to:


- Describe the purpose of and the need for network access control.
- Explain the Juniper Mist Access Assurance cloud architecture.
- Discuss third-party device support with Juniper Mist Edge authentication proxy.
- Describe common use cases with Juniper Mist Access Assurance.
- Discuss Juniper Mist Access Assurance best practices.
- List AAA components.
- Explain 802.1X operations.
- Discuss how the RADIUS protocol works.
- Describe RADIUS server attributes.
- Explain the functionality of RadSec.
- Discuss the Juniper Mist Access Assurance 802.1X certificate and password authentication methods.
- Explain how Juniper Mist Access Assurance can authenticate devices that don’t support 802.1X.
- Describe IdP integration with Juniper Mist Access Assurance.
- Explain how to configure Juniper Mist Access Assurance authentication policies with match labels and action labels.
- Discuss how to configure Juniper Mist Access Assurance authentication methods.
- Explain how to configure Juniper Mist Edge for the Juniper Mist authentication proxy function.
- Describe how to validate Juniper Mist Access Assurance access and authentication.
- Implement Juniper Mist Access Assurance with wired and wireless devices.
- Discuss Juniper Mist Access Assurance integration with MDM providers.</objective_plain><essentials_plain>- General understanding of TCP/IP
- General understanding of security concepts
- Completion of the Introduction to Juniper Mist AI (IJMA) course recommended, but not required</essentials_plain><audience_plain>This course is for individuals who are responsible for implementing and monitoring Juniper Mist Access Assurance</audience_plain><contents_plain>Understanding Network Access Control


- Describe the components of network access control
- Explain the history of network access control
- Explain Juniper Mist Access Assurance
Juniper Mist Access Assurance Overview


- Explain the cloud architecture
- Explain Juniper Mist-managed devices and requirements
- Describe third-party device support
- Describe the client use cases of Juniper Mist Access Assurance
- Describe the best practices of Juniper Mist Access Assurance
802.1X Authentication


- Describe the components of AAA
- Describe 802.1X operations
- Describe the EAP operations
- Define the RADIUS protocol
Authentication and Authorization


- Explain 802.1X certificates and passwords
- Define IdP integration
- Explain non-802.1X devices
- Describe migration from legacy to IdP
Configuring Juniper Mist Access Assurance


- Describe authentication policy configuration
- Describe EAP-TLS configuration
- Describe EAP-TTLS configuration
- Describe MAB configuration
- Describe Juniper Mist authentication proxy configuration
Lab 1: Implementing Mist Active Assurance

Posture Compliance


- Explain posture compliance
- Describe Microsoft Intune integration
- Describe Jamf Pro integration
- Describe verifying compliance
Lab 1: Implementing Mist Active Assurance</contents_plain><duration unit="d" days="1">1 jour</duration><pricelist><price country="DE" currency="USD">1000.00</price><price country="CH" currency="USD">1000.00</price><price country="AT" currency="USD">1000.00</price><price country="SE" currency="USD">1000.00</price><price country="IL" currency="USD">1000.00</price><price country="AE" currency="USD">1000.00</price><price country="SI" currency="USD">1000.00</price><price country="SK" currency="USD">1000.00</price><price country="FR" currency="EUR">1000.00</price></pricelist><miles/></course>