APPENDIX: Dynamic Client Authentication Using the Mist Authentication Cloud
In this section, we provide examples of how to authenticate wired clients using Juniper Mist Access Assurance and how you can repeat the testing performed in this JVD. First, ensure that your switch template uses “Mist Auth” in the authentication servers field as shown in Figure 1.
Then, you must create the RADIUS Authorization Policy Labels on the Organization > Auth Policy Labels page.

Create labels for at least three GBP tags you want to assign:
- First, create the new auth policy label:
- Label Name=
Cameras
- Label Type=
AAA Attribute
This is used to indicate it’s used as a RADIUS message.
- Port Network=
GBP Tag
- GBP Tag Values=
100
Figure 2: First New Auth Policy Label - Label Name=
- Second, create this new auth policy label:
- Label Name=
IT-Department
- Label Type=
AAA Attribute
- Port Network=
GBP Tag
- GBP Tag Values=
200
- Label Name=
- Third, create this new auth policy label:
- Label Name=
Printers
- Label Type=
AAA Attribute
- Port Network=
GBP Tag
- GBP Tag Values=
300
- Label Name=
The resulting configuration of all three labels should look like the list shown in Figure 3.

MAC Address-Based Client Authentication
When you intend to use MAC address-based client authentication, ensure that the switch ports where your clients are attached use the right port profile. In our case, we used the port profile=”vlan1099-mac-auth” and configured the switch ports as shown in Figure 4. Use port IDs appropriate for your environment.

Next, create auth labels to identify the MAC addresses of your wired clients as shown in the following example:
- Create a new auth label:
- Label Name=
MACclient1
- Label Type=
Client List
as this is used to validate MAC addresses. - Label Values=
<client1-MAC-Address>
- Label Name=
Create other auth labels based on the above example for at least 3 MAC address-based clients. An example of the result is shown in Figure 5.

Next, you must create various authentication policies on the Organization > Auth Policies page.

In the example below, we want every client to get GBP tag1 (our “Printers”) assigned. Hence, the configuration looks like the following:
- Auth Policy for the first client:
- Name=
Client1
- Match Criteria=
MACclient1
andMAB
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=
- Auth Policy for the second client:
- Name=
Client2
- Match Criteria=
MACclient2
andMAB
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=
- Auth Policy for the third client:
- Name=
Client3
- Match Criteria=
MACclient3
andMAB
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=

We have chosen to define one authentication policy per client because you can change the assigned policy for each client individually to assign and test with a different GBP tag.
When testing dynamic, MAC address-based authentication, there is a default time of 10 minutes
before a re-authentication happens. When you change labels to test other combinations, 10
minutes might be too long to wait. In a lab situation, you can use the additional Junos OS
CLI feature to shorten the reauthentication period. For example, to set a 60 second
reauthentication period, use the following additional Junos OS CLI: set protocols
dot1x authenticator interface vlan1099-mac-auth reauthentication 60
.
After your clients are authenticated by Juniper Mist Access Assurance, you can check the GBP tag assignment. To do so, navigate to Clients > Wired Clients in the Juniper Mist portal.

Identify the wired clients you have configured and click on Wired Client Insights.

Below is an example of the first client events report. You can see which interface the new client connected through:

The second event you would typically see is the NAC authentication itself. Below, you can see the authentication type, the Auth Rule that was found valid to be used and the final GBP tag that was applied as part of the dynamic authentication:

IEEE 802.1X-Based Client Authentication
When you intend to use IEEE 802.1X-based client authentication ensure that the switch ports where your clients are attached use the correct port profile. In our case, we used the port profile, ”vlan1099-eap-auth” and configured the switch ports as shown in the example below. Use port IDs appropriate for your environment.

When testing, we wanted to be able to identify a minimum of three clients individually to be able to assign them different GBP tags dynamically. The approach chosen was to use EAP-TLS and determine the individual client by attributes of their client certificates stored on each supplicant. Which values you choose depends on the enterprise PKI you intend to use. In our case, we knew that each client has a different name in the Common Name attribute of the supplicant certificate. Hence, we used this field to create three client labels as shown in the example below:
- Create a new authentication policy label by navigating to
Organization > Auth Label and configuring the
fields as shown in the following list:
- Label Name=
TLSclient1
- Label Type=
Certificate Attribute
- Label Values=
Common Name (CN)
- Common Names Values=
user01@example.net
- Label Name=

- Create other labels based on the example above for at least three TLS clients as shown in Figure 14.

Next, create various authentication policies on the Organization > Auth Policies page:
In the example below, we want every client to have the GBP tag1
(our Printers
) assigned. Hence, the configuration
looks like the following:
- Auth policy for the first client:
- Name=
Client1
- Match Criteria=
TLSclient1
andEAP-TLS
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=
- Auth policy for the second client:
- Name=
Client2
- Match Criteria=
TLSclient2
andEAP-TLS
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=
- Auth policy for the third client:
- Name=
Client3
- Match Criteria=
TLSclient3
andEAP-TLS
andWired
- Policy=
Pass
- Assigned Policies=
Network Access Allowed
andCameras
- Name=

At this point, if not already done, you must configure your enterprise PKI for the Juniper Mist authentication cloud:
- Navigate to Organization > Certificates

- Click on the Add Certificate Authority button as shown in Figure 17.

- Paste the base64-encoded part of your enterprise PKI root CA in the Signed Certificate window.

The result should look like this:
- Now, click on Import Custom RADIUS Server Certificate:
- Apply the following configuration:
- Paste the content of the base64-encoded part of your enterprise PKI RADIUS server certificate key into the Private Key field.
- Depending on your enterprise PKI, your RADIUS server certificate may need a password to open the encrypted key. If that is the case, provide this information here.
- Paste the content of the base64-encoded part of your enterprise PKI RADIUS server public certificate into the Signed Certificate field.
- Confirm the information in the populated property fields:
- The common name should be a DNS FQDN.
- Extended Key Usage=TLS Web server authentication

- Click Save.
Now, you can start to authenticate your EAP-TLS clients.
After your clients are authenticated by Juniper Mist Access Assurance, you can check the GBP tag assignment. To do this, navigate to Clients > Wired Clients.
Identify the wired client you have configured and click on Wired Client Insights:
First, check the certificate of the RADIUS server:
Next, you see the information about the client certificate from the supplicant that the RADIUS server checked for validation. Here, it is important to review the certificate attributes because we use them to identify a single client.
Then, you see the decision of the NAC system to allow network access for this client and which rule allowed it. The GBP tag assigned can also be reviewed: