Juniper Mist Alert Types
Juniper Mist™ provides various alerts that you can enable to track ongoing issues.
Infrastructure Alerts
Infrastructure alerts are for events that potentially affect a large number of clients. For example, an unreachable Domain Name System (DNS) or a bad power supply on a switch can affect a large number of clients and a large amount of traffic.
Severity | Alert Name |
---|---|
Critical (red icon) | ARP Failure |
DHCP Failure | |
DNS Failure | |
Mist Edge Fan Unplugged | |
Mist Edge cpu usage high | |
Mist Edge disconnected from cloud | |
Mist Edge disk usage high | |
Mist Edge memory usage high | |
Mist Edge power input disconnected | |
Mist Edge service failed to start | |
Mist Edge unplugged from power | |
Switch Fan Alarm | |
Virtual Chassis - Backup Member Elected | |
Virtual Chassis - New device elected for Active Role | |
Virtual Chassis Member Deleted | |
Virtual Chassis Port Down | |
Informational (blue icon) | BGP Neighbor State Changed |
BGP Neighbor Up | |
Cellular Edge Connected to NCM | |
Cellular Edge Disconnected from NCM | |
Cellular Edge Firmware Upgraded | |
Cellular Edge Login Failure | |
Cellular Edge Login Success | |
Cellular Edge Rebooted | |
Cellular Edge SIM Door Closed | |
Cellular Edge SIM Door Opened | |
Cellular Edge WAN Cellular Connected | |
Cellular Edge WAN Cellular Service Type Changed | |
Cellular Edge WAN Ethernet Connected | |
Cellular Edge WAN Ethernet Plugged | |
Critical Switch Port Up Note:
If you enable this alert, you also need to update the switch configuration to identify the critical ports. To do this:
For more information about port configuration, see the Juniper Mist Wired Assurance Configuration Guide. |
|
Critical WAN Edge Port Up Note:
If you enable this alert, you also need to update the WAN or LAN configuration to identify the critical ports. To do this:
For more information about WAN Edges configuration, see the Juniper Mist WAN Assurance Configuration Guide. |
|
Device restarted | |
Mist Edge connected to cloud | |
Mist Edge cpu usage normal | |
Mist Edge disk usage normal | |
Mist Edge memory usage normal | |
Mist Edge plugged to power | |
Mist Edge power input connected | |
New tunnel(s) formed | |
Switch Radius Server Unresponsive | |
Switch restarted | |
Virtual Chassis Member Added | |
Virtual Chassis Port Up | |
Warning (orange icon) | Mist Edge Fan Plugged |
All data ports dropped from LACP | |
All tunnels are disconnected | |
BGP Neighbor Down | |
Cellular Edge WAN Cellular Disconnected | |
Cellular Edge WAN Ethernet Disconnected | |
Cellular Edge WAN Ethernet Unplugged | |
Critical Switch Port Down Note:
If you enable this alert, you also need to update the switch configuration to identify the critical ports. To do this:
For more information about switch configuration, see the Juniper Mist Wired Assurance Configuration Guide. |
|
Critical WAN Edge Port Down Note:
If you enable this alert, you also need to update the WAN or LAN configuration to identify the critical ports. To do this:
For more information about WAN Edges configuration, see the Juniper Mist WAN Assurance Configuration Guide. |
|
Device offline | |
EVPN detected a duplicate MAC address | |
Fpc Management Ethernet Link Down | |
HA Control Link Down | |
Last data port dropped from LACP | |
Loop detected (by AP) | |
Mist Edge service crashed | |
Switch BPDU Error | |
Switch Bad Optics | |
Switch DHCP Pool Exhausted | |
Switch High Temperature | |
Switch PEM Alarm | |
Switch PoE Alarm | |
Switch Power Supply Alarm | |
Switch Storage Partition Alarm | |
Switch offline | |
Tunnel down | |
VPN Peer Down | |
Virtual Chassis Member Restarted | |
WAN Edge BGP Neighbor Down | |
WAN Edge DHCP Pool Exhausted | |
WAN Edge Flow Count Threshold Exceeded | |
WAN Edge Forwarding Information Base Count Threshold Exceeded | |
WAN Edge Source NAT Pool Threshold Exceeded | |
WAN Edge Offline |
Marvis Alerts
Marvis alerts are tied into the Marvis Action Dashboard. These alerts are triggered whenever the corresponding Marvis Action is detected in your organization. For example, if an access point (AP) regularly fails health checks, Marvis notices and tracks this event.
Severity | Applies To | Alert Name |
---|---|---|
Critical | AP | AP health check failed |
AP insufficient capacity | ||
AP insufficient coverage | ||
Bad cable | ||
Non-compliant | ||
Offline (Marvis) | ||
AP Loop due to Switch Port Flap | ||
AP Loop due to duplicated WLAN paths | ||
Connectivity | ARP failure (Marvis) | |
Authentication failure (Marvis) | ||
DHCP failure (Marvis) | ||
DNS failure (Marvis) | ||
WAN Edge | Bad WAN Uplink | |
Bad cable | ||
Device Problem | ||
MTU mismatch | ||
Negotiation mismatch | ||
VPN Path Down | ||
Switch | Bad cable | |
Missing VLAN | ||
Negotiation mismatch | ||
Port Stuck | ||
Switch STP Loop | ||
Warning | Switch | Port flap |
Security Alerts
Security alerts warn you of activities or events on the network that can cost you in terms of lost data, unauthorized access to the network, or traffic that matches known security threats. Security alerts are raised by repeated events that could dramatically affect network security. For example, if a rogue AP is detected, that represents a potential security problem. If a client connects to a rogue AP, that could be even worse.
Juniper Mist lists all security alerts except those that relate to intrusion detection and prevention (IDP) or URL filtering on the Monitor > Alerts page. You can find IDP and URL filtering events and their severity on the Site > WAN Edge > Secure WAN Edge IDP/URL Events page.
Severity | Alert Name |
---|---|
Critical | Client Connection to rogue AP detected |
Rogue AP detected | |
Informational | Air Magnet Scan detected |
EAP Handshake Flood detected | |
Warning | Active Watched Station detected |
Adhoc Network detected | |
BSSID Spoofing detected | |
Disassociation Attack detected | |
EAP Dictionary Attack detected | |
EAP Failure Injection detected | |
EAP Spoofed Success detected | |
EAPOL-Logoff Attack detected | |
ESL Hung | |
ESL Recovered | |
ESSID Jack detected | |
Excessive Clients detected | |
Excessive EAPOL-Start detected | |
Fake AP Flooding detected | |
Honeypot SSID detected | |
IDP attack detected | |
Monkey Jack detected | |
Out of Sequence detected | |
Repeated Client Authentication Failures | |
Replay Injection detected - KRACK Attack | |
SSID Injection detected | |
Security Policy Violation | |
TKIP ICV Attack | |
URL blocked | |
Vendor IE Missing | |
Zero SSID Association Request detected |