Help us improve your experience.
Let us know what you think.
Do you have time for a two-minute survey?
Juniper Mist Government Cloud (GovCloud) operates within the AWS GovCloud (US) Regions. These regions are designed to host sensitive data and regulated workloads, ensuring compliance with stringent U.S. government security and compliance requirements. By leveraging AWS Government Cloud (US), Juniper Mist provides a secure and compliant environment tailored for U.S. government agencies, contractors, educational institutions, and other organizations handling sensitive workloads in the cloud. Currently, this environment is “Authorized” on FedRAMP and GovRAMP (previously known as StateRAMP) marketplace for Impact level “Moderate”.
This page lists the Juniper Mist updates released on US GovCloud in November 2025.
With a view to improving user experience and streamlining operations, we have introduced a few enhancements to the Network Admin roles in Mist. These enhancements optionally grant additional privileges that expand administrative capabilities without imposing any limitations on existing functionality.
What is changing?
We have introduced a new user role called Org Admin, which provides write access to all components within the Mist dashboard (both GUI and API), except for administrative functions such as:
Creating or managing other admin users
Modifying login and authentication settings

The Org Admin role provides read and write access to the following pages on the Organization menu:

Network Admins (Site, Site Group, or All Sites) will now have an option to enable additional privileges as listed below:
Write access to site configuration pages within their respective scope via the Mist dashboard.
Read-only access to organization-level templates.

Network Admins provide read and write permissions to site configuration, and read permissions to other pages on the Organization menu.

Changes to existing Network-Admin users
Network Admins (Site/Site Group): No changes to current functionality. However, super users will now have the option to grant additional privileges to these users if needed.
Network Admins (All Sites): These users will now be elevated to the “Org Admin” role within the Mist portal. This role grants the right to view and modify organization-level templates, as well as both organization and site level settings. If you do not prefer to grant elevated privileges to these users, you may revert their role back to “Network Admin (All Sites)”.
The above changes also applies to 'roles' mapped to Single Sign on users.
If the SSO user is mapped to the role Network Admin(all sites), their role will get elevated to Org Admin. If you do not prefer to grant elevated privileges to these SSO users, you may revert the role mapping of those users back to “Network Admin (All Sites)" from the Organization > Settings page.

Changes to newly created Network-Admin users
Network Admins (Site/Site Group/All Sites): Optional additional privileges will be enabled by default for newly created network admin users. Super Users may choose to disable these privileges as needed while creating users.
Network Admins (All Sites): These users will have their privileges restricted to the site level in both the Mist portal UI and API. The intent of this role is to limit users to site-level operations; therefore, organization-level privileges such as Inventory, Org Campus Fabric, and Pre-shared Keys will no longer be available. If these or other organization-level privileges are required, it is recommended to assign the user the Org Admin role instead.
API mappings for Network Admin and Org Admin users
Role | Mapping for newly created users (Default: read access to select org level configurations is allowed) | Mapping for existing users (or if read access to select org level configurations is unchecked) |
Network Admin (Site) | { "scope":"site", "role": "write" , "view": "org_network_admin"} { "scope":"org", "role": "read" , "view": "org_network_admin"} | { "scope":"site", "role": "write" } |
Network Admin (Site Group) | { "scope":"sitegroup", "role": "write" , "view": "org_network_admin"} { "scope":"org", "role": "read" , "view": "org_network_admin"} | { "scope":"sitegroup", "role": "write" } |
Network Admin (All Sites) | { "scope":"orgsites", "role": "write" , "view": "org_network_admin"} { "scope":"org", "role": "read" , "view": "org_network_admin"} | { "scope":"orgsites", "role": "write" } |
Org Admin | { "scope":"org", "role": "write" , "view": "org_admin"} | - |
MSP Org Admin | { "scope":"msp", "role": "write" , "view": "org_admin"} | - |
We have now made the following limited roles generally available to Mist users:
Reporting—This role has the same API access as an Observer Administrator Role. However, its access is limited to the following analytics tools on the Mist portal:
Engagement Analytics
Occupancy Analytics
Network Analytics
Premium Analytics (if an active subscription is available)
Location—This role has the same API access as an Observer Administrator Role. However, its access is limited to the following location-related tools on the Mist portal:
Live View: Users can edit the maps - for example, they can add or modify zones, or position access points (APs) and virtual beacons.
The location related analytics pages, such as Engagement Analytics and Occupancy Analytics.
Marketing—This role has the same API access as an Observer Administrator Role. However, it is limited to the marketing related tools on the Mist portal. This role grants the read-only access to Live View and the location related analytics pages, such as Engagement Analytics and Occupancy Analytics.
Mist Edge Admin—This role provides the ability to configure Mist Edges that are allowed by the Super Admin role. This role allows users to manage Mist Edges and Mist Tunnels on the Mist portal.
Limited roles are used to limit an administrator’s access in the Mist portal to the pages pertaining to the tasks they perform. See also: Portal User Roles. You can assign limited roles to users from the Organization > Administrators page.

The Site Configuration page of the Mist portal now groups configuration widgets by Mist product line. Each group contains the configuration widgets that are specific to that particular product line. This makes the Site Configuration page more organized and clarifies exactly what configuration will be applied to a device or group of devices.
When you select Organization > Site Configuration from the Mist portal, you will see a group for each Mist domain as you scroll down the page.

This Marvis Action in the WAN Edge category detects instances of autonegotiation failures on WAN Edge ports. These issues are reported when a duplex mismatch occurs between devices due to the autonegotiation failing to set the correct duplex mode. To view the details about the affected port, click the WAN Edge Negotiation Incomplete action under the WAN Edge category. You can check the configuration on the port and the connected device to resolve the issue.

You can now enable a select set of Marvis Actions to operate in self-driving mode. When self driving is enabled for a Marvis Action, Marvis automatically remediates the issues identified under that action—no manual intervention is required. For more information, refer to Self-Driving Marvis Actions.
The following Marvis Actions currently support self driving:
AP actions:
Non-Compliant—Marvis automatically upgrades any AP running a firmware version that is older than the version running on majority of other APs of the same model at the site. The upgrade action is initiated during a low-usage period to mitigate any impacts on operations.
WAN Edge actions (SRX only):
Non-Compliant—Marvis auto initiates a snapshot creation to update the Junos OS version on the backup partition to the same version that is running on primary partition. This update snapshot is initiated during a low-usage period and does not impact operations as it does not involve a device reboot.
Switch actions:
Port Stuck—When Marvis detects a port stuck issue, it initiates an automatic port bounce to fix the issue. Marvis attempts auto port recovery up to three times. If the issue persists even after three attempts, the action is moved to open state, so that users can verify if it is a hardware issue on the device connected to the switch port.
You can enable the self-drive permission for an action from the Marvis Actions page. By default, the self-drive permission is enabled for Port Stuck, but disabled for AP and WAN Edge Non-Compliant actions. If the self-drive permission is disabled for a Marvis action, Marvis will not attempt to automatically resolve the issue; instead, it provides an option for you to manually initiate the corrective action.

Note that the Marvis Actions page lists issues that are currently open at the organization or site level irrespective of the time that you select. However, the Time Series graph and the Recommended Actions sections display issues for all possible statuses based on the timeline selected.
We have introduced several enhancements to the Marvis Actions page to improve usability and provide more insights:
Users can now view the number of open issues and recommended actions specifically for a selected site, allowing for quick site-level troubleshooting.
A time series graph has been added to display the number of Marvis Actions generated over a selected period, offering a visual representation of organizational or site-level patterns.
A filter has been added to the Recommended Actions section, enabling users to view actions at the organization or site level based on status for a specified time duration. This replaces the previous Latest Updates section that listed issues resolved over the past seven days.
Users now have the option to view actions for the last 60 days. The default is 30 days.
Users can now click any Marvis action with no open issues to view the previous list of AI Validated issues associated with the action.

For organizations with Marvis subscription, Marvis Minis will now probe the availability of authentication servers once per switch per hour.
Marvis will automatically detect if the switches are configured to use authentication servers in the Services section for authenticating wired users. Minis will be triggered every hour on the switch using the following credentials:
User: "minis-radius-user"
Pass: "minis-radius-pass"
When probing the authentication server, the server is expected to return an ACCESS-REJECT response. This response indicates that the server is reachable and actively processing requests. Users also have an option to configure this user as a valid user. In that case, the server sends an ACCESS-ACCEPT response which also indicates the availability of the server.
Marvis will generate actions when authentication requests time out, helping monitor the health and responsiveness of RADIUS functions. Note that this data is currently not available in the Mist portal. It will be made accessible through the Minis dashboard and Marvis account in a future release.
We have enhanced the Access Point (AP) list and details pages to include LLDP and PoE statistics when both Ethernet ports (eth0 and eth1) on the AP47 are connected. With this update, the AP details page displays the Connected Switch Properties for LLDP neighbor information for each Ethernet port on the AP47. Previously, this data was shown only for the active port.
The Connected Switch Properties section on the AP details page shows information for both the active and standby ports. To make identification easier, the active port is visually marked with a green circle next to it.

The AP47 supports redundant PoE and Ethernet inputs, ensuring uninterrupted Wi-Fi coverage during switch or infrastructure outages and upgrades. It not only negotiates power from two independent PSE sources, but also supports multiple Ethernet links for cloud connectivity and user traffic. For more information, refer to AP47 Documentation.
We have enhanced the column selector across list pages for Wireless Assurance in the Mist portal to make it easier for you to manage the list views. The updated column selector now includes:
A filter that helps you quickly find and enable or disable a column.
Select All and Deselect All buttons for bulk actions.
In the following image, the keyword LLDP is used to filter the results on the column selector on the Access Point list page. When a keyword is entered in the search field, only the relevant fields are visible to select or deselect as desired; the non-filtered fields remain unaffected by the selection changes performed.

You can access the column selector by clicking the selector button on the right of the page.
These improvements are especially helpful when working with list pages that contain a large number of columns, making it faster and easier to customize your view.
Juniper Mist automatically upgrades a Virtual Chassis linecard member if it is running a Junos version different from that of the primary member. The linecard member will be upgraded to the same version as the primary member if the following conditions are met:
The switch must form a Virtual Chassis with three or more members—that is, a primary, a backup, and a linecard member.
The Junos version on the linecard member is different from that on the primary member.
The linecard member must be in Inactive state.
Note that a linecard member will be upgraded only if it is inactive and running a clearly different Junos version. Minor differences, such as different spin numbers, will not trigger an upgrade.
Only the Junos versions listed on the Mist portal are available for upgrade.
You can see the upgrade events in the Switch Events section on the switch Insights page.

Juniper Mist Wired Assurance now supports the QFX5130-48C and QFX5130-48CM switches that run Junos OS version 23.4R2-S5 or later. Wired Assurance simplifies all aspects of switch management that include device onboarding, configuration at scale, and monitoring and troubleshooting. With Wired Assurance, you get real-time visibility into the health and performance of your wired network. You can see how your switches are doing, check out service level expectations (SLE) metrics, and even get insights into the end user experiences, among other things.

For more information, refer to Juniper Mist Wired Assurance Overview.
To ensure more granular control over network access, you can now set up access control lists (ACLs) for your Juniper Mist-managed switches, based on filter IDs defined on the RADIUS server. The firewall filters are configured in the form of policy labels and applied to switch policy rules. These labels are used to categorize and classify users (as sources) and resources (as destinations). In the source labels, you can include the Juniper-Switching-Filter attribute, a vendor-specific attribute (VSA) defined in the Juniper dictionary on the RADIUS server. Once created, these labels can be referenced in the switch policies to specify which users are allowed to access specific resources within the network. You can define the labels at the organization, site, or switch level. For more information, refer to RADIUS-Based Firewall Filters (BETA).

You can now view the following authentication information for a wired client:
Authentication status—The status could be one of the following: Authenticated, Denied, Authenticating, and Held.
Authentication method—Available methods are Dot1x, MAC Radius, CWA Authentication, Guest VLAN, Server-Fail, Server-Reject, Server-Fail Permit, Server-Fail Use Cache, and Fail.
To view this information for a client, navigate to the Front Panel section on the switch details page (Switches > Switch Name) and hover over the switch port to which the client is connected. You will find this information in the port list view as well.

You can also see this information on the list of wired clients (Clients > Wired Clients).

For clients that are denied access or are in a held state, a clickable button appears on the top left of the switch details page. You can click it to find more information about the status.

For more information, refer to 802.1X Features Overview and interface (802.1X).
When a Virtual Chassis device is represented in Mist by the MAC address of one of its member switches, managing it can become challenging. Especially, replacing or removing a member switch may cause inconsistencies in how the Virtual Chassis is represented, potentially disrupting connectivity.
To address this issue, we have introduced a new API capability that allows you to convert a cloud-connected Virtual Chassis from being identified by a member MAC address to being represented by a Virtual Device ID. This enhancement simplifies how Virtual Chassis devices are managed and modified, particularly when performing updates or making configuration changes.
To convert a Virtual Chassis, issue a POST request to the API endpoint below using your Site ID (associated with the site where Virtual Chassis is deployed) and device ID.
Endpoint:
https://api.<cloud_env>.mist.com/api/v1/sites/<site_id>/devices/<device_id>/vc/convert_to_virtualmac
Example:
In the Mist UI, this feature will be available in an upcoming release.
For more information, refer to Convert a Virtual Chassis to Use a Virtual Device ID (via API).
To ensure that all Virtual Chassis devices in Mist are properly preprovisioned, we have introduced enhancements that alert users when a device is not preprovisioned.
The switch list page now includes a new column titled Preprovisioned VC, which displays the preprovisioning status of each Virtual Chassis device. Additionally, the switch details page shows a warning message and provides a Preprovision button for devices that haven't been preprovisioned. Before modifying any Virtual Chassis, we recommend preprovisioning it. These enhancements make it easier for users to quickly identify and take action on non-preprovisioned Virtual Chassis devices.

Clicking the Preprovision takes you to the Modify Virtual Chassis window. From there, you need to click Preprovision Virtual Chassis. This action pushes the preprovisioned Virtual Chassis configuration to the device and overwrites the old autoprovision Virtual Chassis configuration pushed to the device during the ZTP process. This option assumes the current positioning of the members and preprovisions them as is.
For more information, refer to the Preprovision a Virtual Chassis section in Manage a Virtual Chassis Using Mist (Add, Delete, Replace, and Modify Members).
You can now include routing policies (import and export policies) in OSPF configurations at the switch level (Switches > Switch Name). The routing policy is composed of terms. Each term can include a set of conditions and a then statement, which defines the actions to take if an OSPF route matches the conditions specified in the term. You can see the option to create an import and export policy when you enable the OSPF configuration from the OSPF tile on the switch configuration page. You must first add an OSPF area and network to the switch to be able to enable OSPF configuration.

For more information on the routing policy configuration, refer to OSPF Configuration for Switches.
You can now configure various options under Mist Auth for authentication of wired clients. Mist Auth is Mist's cloud-based authentication service.
The configurable options include:
Timeout—Duration in seconds after which the authentication request times out.
Retries—Number of retries allowed.
Enhanced Timers—By default, EX Series switches have a range of 30-60 seconds for various communication timers between the switch and the client device. Enabling this option enhances these timers between 2 and 10 seconds. You can further modify them by changing the authentication server Timeout and Retries.
Interim Interval—Specify the frequency (in seconds) at which the Mist Auth server is updated with information about an active user session.
Source Address—Select a source network. This network should be part of a Layer 3 or IRB interface created with a static IP address.
Dynamic Request Port—Specify a change of Authorization (CoA) port.
You can configure these options from the Authentication Servers tile on the switch template (Organization > Wired > Switch Templates) or switch details page (Switches > Switch Name).

When Mist Auth is enabled for authentication, existing RADIUS configuration, if there is any, is disabled.
In the Simple Network Management Protocol version 3 (SNMPv3) configuration for switches, you can now choose to use the device MAC address as the SNMPv3 engine IDs. This option is available on the General tab of the SNMP tile in the switch configuration template, as well as on the switch details page.

Using MAC address ensures the engine ID’s uniqueness and stability without much manual intervention. Engine ID is a unique identifier used in the SNMPv3 configuration to distinguish between different SNMP entities (like agents and managers) in a network. It plays a key role in SNMPv3's security features.
To mitigate disruptions caused by a traffic storm, you can now configure a switch to automatically shut down a port when traffic exceeds the user-defined storm control threshold. Previously, you could set a switch port to discard excess packets when traffic exceeded the storm control threshold. With this update, you get an additional option to shut down a port when the specified threshold is breached. You can enable this feature on a switch port through Port Profiles or Port Configurations. This feature is available at both the switch template level and the individual switch level.

You can now configure an IP address as the destination in your port mirroring setup.
This feature allows mirrored traffic to be sent directly to a specified IP address—typically that of a remote monitoring system that captures and inspects the duplicated packets for analysis.
You can configure this feature from the Port Mirroring tile in the All Switches Configuration section of switch configuration—either on the switch template or the switch details page.

Juniper Mist now supports the use of the EtherType values ARP and IPv6 as destination tags within a switch policy. EtherTypes indicate the protocol encapsulated in the payload of an Ethernet frame, and can be used as match conditions in RADIUS-based firewall filters on switches. Administrators can use them to define switch policies to permit or deny traffic based on the encapsulated protocol.
By default, no EtherType is selected.

We have added the Bandwidth Headroom classifier to the WAN Edge Bandwidth SLE for SSR devices (previously released for SRX Series Firewalls). This classifier is activated when bandwidth usage surpasses the SLE threshold. It indicates the percentage of time the gateway bandwidth SLE was not met due to exceeding the headroom threshold. The headroom is an estimated baseline of available WAN bandwidth, based on the highest usage over the past 14 days. The classifier triggers when current usage exceeds this baseline.

Juniper Mist now detects low MTU configurations on Cellular Edge WAN links. MTU (maximum transmission unit) refers to the largest data unit that can be forwarded through an interface without fragmentation. On a Cellular Edge WAN interface, an MTU of 1300 bytes or lower is considered low. When such a configuration is detected, Mist generates a Cellular Edge Event and displays it on the Cellular Edge Insights page. This feature helps you identify and prevent potential packet fragmentation along the WAN path.

We have introduced a new alert to help you monitor the thermal health of your SRX devices. The alert, named Gateway High Temperature, is triggered when a device’s temperature exceeds the upper threshold of 75°C.
You can configure this alert from the Monitor > Alerts > Alerts Configuration page.
On the Monitor > Alerts page, the Gateway High Temperature alert appears as shown below:

In addition, the WAN Edge Events section on the WAN Edge Insights page will display the following sequence of events:
WAN Edge Chassis Hot — Indicates the device has overheated.
WAN Edge Disconnected — Triggered as a result of the high temperature condition.
The WAN Edge topology builder now provides support for creating full-mesh overlay topologies. In this release, these topologies are supported on SSR devices. In a full mesh topology, sites provide a seamless interconnectivity across the overlay, as every device is directly connected to every other device. To configure it, navigate to Organization > WAN > WAN Topology. The topology configuration includes a name and one or more overlay endpoints.

Once the topology is created, include it, along with the relevant endpoints, in the WAN Interface section of the WAN Edge configuration, either at the template or device level. Additionally, reference the topology endpoints in the Traffic Steering section of the WAN Edge configuration to complete the setup.
Devices that are part of a hub and spoke overlay cannot be included in a mesh topology, and vice versa. A full-mesh topology can support up to 20 devices.
Mist provides an option to test the speed of WAN links on Conductor-managed Session Smart Routers (SSRs). This speed test feature supports specific use cases. For example, you can test the speed of circuits installed to a branch office with an SSR at the edge of the customer premises. You can carry out tasks such as the following:
New link qualification
On-demand speed tests when a low link speed is suspected to be causing link issues
You can run the speed test from the SSR WAN Edge details page (WAN Edges > WAN Edges > WAN Edge Name) and then select the WAN port from the port panel. Results for past on-demand or scheduled speed test runs will be available on the WAN Edge details page.
Before running the test, ensure that the WAN link has connectivity to the Internet, where the speed test infrastructure can be reached.
For this feature to work, the Conductor needs to have the WAN Assurance plugin version 3.13.
Routing policies on WAN Edge devices, including both import and export policies, now support conditional advertisement of BGP routes based on the presence or absence of specific route conditions. For example, you can configure a WAN Edge device to advertise a BGP route only when some other specific routes are present in the routing table.
In the configuration, you can specify a conditional prefix and a custom VR.

For more information on conditional route advertisement refer to Conditional Advertisement Enabling Conditional Installation of Prefixes Use Cases.
We have introduced the new Juniper Mist™ Managed Service Provider (MSP) portal, which simplifies your multitenant operations and provides visibility across all customer organizations and sites. The MSP portal provides a single-pane-of-glass for managing your entire customer estate. The portal streamlines your work and provides insight into network operations from Day 0 to Day 2+.
You can use the portal to quickly onboard new customers, check the status of customer subscriptions and devices, monitor performance in real-time, view Marvis Actions, jump from the MSP dashboard into your customer’s Mist portals to perform administrative tasks, and more.
For more information on how to use the Mist MSP portal, see Juniper Mist Managed Service Provider (MSP) guide.
We have introduced a new dashboard—Inactive Switchport Insights—that offers clear visibility into unused switch ports.
This dashboard will be available to users by mid of August, 2025.
Monitoring switch ports that were previously active but have remained unused for a long time is important for keeping the network secure and efficient. This dashboard helps network administrators identify such ports and take actions, such as disconnecting patch cords or disabling the ports, to reduce security risks.
The dashboard includes filters that help refine the information displayed. Key filters include:
Days Down—Use this filter to specify the number of days a port has remained in the Down state.
Site, Switch Name, and Interface Port Profile—Use these filters to narrow the list of inactive ports based on specific criteria.
Sample dashboard visuals are shown below.



The Wired Network Insights dashboard now provides enhanced visibility into Port Profile usage across the organization. The new visualization displays the number of configured port profiles compared to the number of ports that are actively in use.

The dashboard also shows trends that indicate port profile adoption over time.

We have updated the Mist API behavior for removing Mist Edge devices from an organization. Here are the updates:
The following API endpoint no longer deletes Mist Edge devices from an organization: PUT /api/v1/orgs/:org_id/inventory
Currently, this endpoint only removes other device types. If a device is assigned to a site, it will be unassigned from that site.
To delete a Mist Edge from an organization, use the following endpoint instead:
DELETE /api/v1/orgs/:org_id/mxedges/:mxedge_id
Currently, the following API requests return an unpaginated, full list of inventory devices.
GET /api/v1/orgs/:org_id/inventory
GET /api/v1/sites/:site_id/stats/devices
Starting in early 2026, these API requests will fetch paginated responses to limit the size of the response. By default, the API response will fetch the first 100 entries in the list. You can modify the number of entries in the response (range: 1 to 1000) by using the query parameter 'limit'.
Currently, if you query this API directly when you have more than 100 devices in your organization inventory, we recommend that you update the scripts to handle the paginated responses.
For more information, see Pagination.