Configuration

Administrator Roles for Switches

Super User Read/write access to entire organization. No restrictions. Network Admin (All Sites Access) Cannot claim switches Able to adopt switches Cannot release the switch Able to click on switch to see details Able to access utility tools (ping, trace route, cable test, bounce port) Can access switch shell Able to reboot the switch Can...

Advanced QoS Verification

Configuration on the switch "set groups mist-qos-default class-of-service classifiers dscp dscp-classifier-default forwarding-class bizapp-af2 loss-priority high code-points af22", "set groups mist-qos-default class-of-service classifiers dscp dscp-classifier-default forwarding-class bizapp-af2 loss-priority high code-points af23", "set groups mist-qos-default class-of-service classifiers dscp dscp-classifier-default forwarding-class bizapp-af2 loss-priority low code-points af21", "set groups mist-qos-default class-of-service classifiers dscp dscp-classifier-default forwarding-class bizapp-af3 loss-priority high code-points...

Best Practices for switch port configs

Here are some recommended configurations for your switch ports to work seamlessly with the Mist APs: On a trunk port, prune all the unwanted VLANs – only the required VLANs (based on WLANs) should be part of allowed VLANs. Since our APs do not save the configuration by default, APs should be able to get...

Configure DHCP Snooping for Switches with Mist Wired Assurance

DHCP Snooping: DHCP snooping enables a switching device to examine all the DHCP traffic initiated from the untrusted ports on the network. When DHCP snooping is enabled on a VLAN, the system examines DHCP messages sent from untrusted hosts associated with the VLAN and extracts their IP addresses and lease information. This information is used...

Deleting commands from Juniper switches

Once you have any of your Juniper EX switches managed by Mist cloud environment it is advised not to make any configuration changes from the switch CLI rather make use of Site/Template/Rule-based/Additional CLI Commands. To remove any config from the switch we need to append ‘delete’ for any command that needs to be deleted. EX:...

Deployment of Campus Fabric Core Distribution

  In this video, Our EVPN deployment utilizes EBGP as the underlay protocol for communication between our border gateways, while iBGP is used in the overlay for communication between our EVPN instances.

DHCP Server/Relay Configuration for Managed Switch.

How to Configure the switch as DHCP Server/Relay for a Network – Pre-Requisites for DHCP server or Relay configuration – Make sure the VLAN for which DHCP server will be configured on switch is assigned to the port/s connecting to the DHCP clients. Make sure switch has a Static IP Configuration or Additional IP configuration...

DHCP Snooping and Port Security Considerations

  EX switches offer an extensive port security suite, including ways to track IP to DHCP mapping, block spoofed ARP responses, and ensure that malicious actors can’t impersonate someone on the wired network. This configuration is greatly simplified on the Mist portal. Enable these checkboxes with caution. Please read below for more details: TRUSTED VS....

Dynamic Port Configuration

Why use Dynamic Port Configuration? Traditionally, ports are configured on a switch based on the device that is connected with a few parameters like VLAN, Trunk/Access etc on every single port basis. Port profiles provide one layer of abstraction to create those profiles with the above parameters once and then re-uses them on ports as...

EVPN Multihoming Deployment via Mist Cloud

Select the Campus Fabric option, under the Wired Section of the Organization Tab:   Select EVPN Multihoming and complete the required fields below (default settings suffice): Topology Name: The configuration name should represent the Campus Fabric being deployed Overlay Settings: Define the BGP AS used to build the Overlay between the Collapsed Core switches Underlay...

OSPF Configuration

OSPF is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information to make routing decisions, making route calculations using the shortest-path-first (SPF) algorithm (also referred to as the Dijkstra algorithm). Each router running OSPF floods link-state advertisements throughout the AS or area that contain information about...

Persistent (Sticky) MAC Learning

Overview Persistent (Sticky) MAC is a Layer 2 port security feature that prevents unauthorized devices from connecting to your network. When this feature is enabled, the switch will observe the incoming source MAC addresses on a configured port and dynamically learn/save this address to memory. You can set the maximum number of MAC addresses learned....

Persistent (Sticky) MAC Learning

Overview Persistent (Sticky) MAC is a Layer 2 port security feature that prevents unauthorized devices from connecting to your network. When this feature is enabled, the switch will observe the incoming source MAC addresses on a configured port and dynamically learn and save this address to memory. The maximum of MAC address learned is specified...

Protect_RE

Protect RE is very similar to an L3 filter except that they are applied to LoopBack0 interface. Protection of Routing Engine is required for two reasons: Ensure it accepts traffic only from trusted systems. Ensure the Routing Engine is not burning cycles responding to non interesting traffic. Protecting the Routing Engine involves filtering incoming traffic...

QoS for Switches

In a congested environment, Quality of Service(QoS) helps with ensuring that latency-sensitive traffic (such as voice) are prioritized over other traffic. QoS generally involves the following 4 aspects: Classification of Traffic Defining traffic to queue mapping (Forwarding Classes) Defining rules for each queue which help in priority, bandwidth control, providing congestion management etc. of the...

Set up dot1x Authentication for Switch Management Access

If you want to setup dot1x authentication for Switch Management access(switch CLI login purpose) then under additional CLI add the below commands: set system authentication-order radius set system radius-server <radius-server-IP> port 1812 set system radius-server <radius-server-IP> secret "<secret-code>" set system radius-server <radius-server-IP> source-address <radius-Source-IP>   You can also refer to the below Juniper support document...

Static Routes

Overview Static routes are routes that are manually configured and entered into the routing table. The switch uses static routes: When the switch does not have a route to a destination that has a better (lower) preference value. When the switch cannot determine the route to a destination. When the switch is forwarding unroutable packets....

Storm Control

What is storm-control & why enable it on Port Profile? A traffic storm is generated when messages are broadcast on a network and each message prompts a receiving node to respond by broadcasting its own messages on the network. This, in turn, prompts further responses, creating a snowball effect. The LAN is suddenly flooded with...

STP Edge Port / BPDU Guard

Switches support spanning-tree protocols that prevent loops in a network by creating a tree topology (spanning-tree) of the entire bridged network. All spanning-tree protocols use a special type of frame called bridge protocol data units (BPDUs) to communicate with each other. Other devices in the network, such as PCs, generate their own BPDUs that are...

Template-based Configuration with Device and Port Profile

A key feature of switch management through the Juniper Mist cloud is the ability to use configuration templates and a hierarchical model to group the switches and make bulk updates. Templates provide uniformity and convenience, while the hierarchy (Organization, Network, and Switch) provides both scale and granularity. What templates, and the hierarchical model, means in...