JUNIPER Mist Edge Teleworker Solution User Guide

June 16, 2024
JUNIPer

JUNIPER - logo

Juniper Mist Edge Teleworker Solution Guide
RELEASE
Published
2024-01-11

About the Guide
Use this guide to learn about Juniper Mist™ Teleworker solution to extend the corporate network to remote office workers.

Juniper Mist Teleworker Overview

IN THIS SECTION

  • Benefits of the Mist Teleworker Solution | 2

The Juniper Mist™ Teleworker solution leverages the Juniper Mist Edge architecture to extend the corporate network to remote office workers. Juniper Mist extends the network using an IPsec-secured L2TPv3 tunnel from a remote access point (AP). In addition, Juniper Mist Edge provides an additional RadSec service to securely proxy authenticated requests from remote APs. This feature facilitates the same user experience for remote workers as others have inside the office.

Juniper® cloud services, driven by Mist AI provide:

  • A Service Level Expectations (SLE) framework, which provides unprecedented user experience visibility.
  • The AI-driven Marvis engine, with natural-language processing for troubleshooting and root cause analysis.
  • Marvis Actions, which IT can leverage for remote troubleshooting of user issues without spending any additional resources.

The following image illustrates the Juniper Mist Teleworker solution:

JUNIPER Mist Edge Teleworker Solution -

The components of the Juniper Mist Teleworker solution are:

  • Juniper Mist access point (AP)
  • Juniper Mist Edge appliance
  • Juniper Mist Wireless Assurance subscription (1x per AP). SUB-1S-Y, where X is one, three, or five years of service.
  • Juniper Mist Edge subscription (1x per AP). SUB-ME-1S-Y, where X is one, three, or five years of service.
  • Juniper Mist Marvis subscription (1x per AP). SUB-ME-1S-Y, where X is one, three, or five years of service.

Benefits of the Mist Teleworker Solution

The Juniper Mist Teleworker solution offers the following benefits:

  • Agility

  •  Zero-touch provisioning—Remove prior-staging requirement for APs.

  •  Network management with minimal effort—Leverage Marvis® Virtual Network Assistant and manage network performance with analytics about Juniper Mist service-level expectation (SLE) metrics.

  • Firmware independence—Remove firmware dependency between an AP and Juniper Mist Edge.
    You can independently update the Juniper Mist Edge services in less than 3 seconds.

  • Security

  • Traffic isolation—The level of traffic control is similar to the level in the original wireless LAN controller architecture. Enable transparent movement of user traffic to a single central location, isolating it from your access switches.

  • Automated security—Enable machine-driven site deployment without any credential exposure.

  • Secure WebSocket to talk to the cloud.

  • Endpoint Protection—Secure wireless and wired endpoints through PoE-out.

  •  Flexibility

  •  Reuse hardware.

  • Support flexible all-home coverage with secure mesh capabilities.

  • Enable employees to self-manage their home SSID.

Create a Site for Remote Office Workers

By using Juniper Mist to support remote workers, customers can extend their corporate WLAN to employees’ homes whenever the employees work remotely.
You can create Sites in the Juniper Mist portal from the Organization>Site Configuration menu.
NOTE:

  • For AP41 and AP43, the minimum AP firmware version required to support IPsec and split tunneling is 0.7.20289.
  • For AP32/33 and AP12, the minimum AP firmware version required to support IPsec with split tunneling is 0.8.21022.

Set Up Juniper Mist Edge and Configure the WLAN Template

After the initial Juniper Mist™ configuration is complete, you do not need to pre-stage the access point (AP). You can ship the AP directly to the employee’s house and be ready to serve clients within 20 seconds.
Juniper Mist Edge typically resides in the DMZ where one arm connects to the Internet and another arm connects to trusted corporate network. Before you configure the WLAN templates to enable the corporate SSID, you must complete the following tasks:

Table 1:

Task Refer to
Configure port connections and set up Juniper Mist Edge Getting Started
Create the Juniper Mist Edge cluster No Link Title
Create Mist tunnel No Link Title
Enable RADIUS proxy service No Link Title

To configure the WLAN template:

  1. Configure WLAN template to enable a corporate service set identifier (SSID).

  2.  From the left menu of the Juniper Mist portal, select Organization > WLAN Templates.

  3.  In the WLAN Templates window, click Create Template.

  4. In the New Template window, enter Name and assign the template to Entire Org or Site and Site groups.
    Each remote home office site is placed into a Site Group called Remote Teleworker. If you prefer, you can place the entire organization in the site group and add physical office sites added as exceptions.
    For example, the following template is assigned to all Sites except Sites “BranchA,” and “BranchB.”
    JUNIPER Mist Edge Teleworker Solution - WLAN template

  5. Specify the security settings.
    SSID settings depend on your organization’s requirements. The following image illustrates the configuration of the 802.1X secure WLAN.
    JUNIPER Mist Edge Teleworker Solution - WLAN template1

  6. Specify the number of VLANs to be tunneled through the Edge appliance.
    JUNIPER Mist Edge Teleworker Solution - WLAN template2
    A Juniper Mist access point (AP) does not tunnel a WLAN configured with an untagged VLAN.

  7. For an organization-level deployment, specify Custom Forwarding to Mist and select a tunnel profile from the Tunnel drop-down menu. The Mist tunnel must specify the same VLANs that you want to tunnel.
    JUNIPER Mist Edge Teleworker Solution - Forwarding

  8. For site-level deployment, specify Custom Forwarding to Site Edge. The Site tunnel must specify the same VLANs that you want to tunnel.
    JUNIPER Mist Edge Teleworker Solution - Site Edge

Wired Client Connection Through ETH1 or the Module Port of the AP

IN THIS SECTION

  • Example: AP12 Wired Port Configuration for Tunneling | 8
  • Example: Second Port Configuration for AP41 | 11

Along with extending a corporate Juniper Mist network to remote office workers, you must also connect wired devices to the corporate network. For example, devices like a security camera and an IP phone require tight security policing on the firewall, after onboarding. Therefore, you must place these devices in a unique VLAN. You can configure the devices access point (AP) by AP or through AP overrides. If you prefer, you can create device profiles and assign these to the devices. In either case, the configuration is
exactly the same.

Example: AP12 Wired Port Configuration for Tunneling
When multiple remote user APs require same port configuration, you can create a device profile and map the device profile to the APs. You can also configure individual APs as well.

![JUNIPER Mist Edge Teleworker Solution - Port conC]†r-ঞon](https://manuals.plus/wp-content/uploads/2024/01/JUNIPER-Mist- Edge-Teleworker-Solution-Port-conC†r-ঞon.jpg)

Port configuration is as follows:
Port 0 —AP management traffic is sent untagged. All local WLANs and VLANs are autotagged on Eth0.
Therefore, you can configure Eth0 with List of VLAN ID(s) and set Port VLAN ID to 1.
Other ports— Map other ports to single VLAN or multiple VLAN as illustrated. If you map other port to single VLAN, the wired host receives IP address from that VLAN. If you configure other ports as a trunk with multiple allowed VLAN and one of them as native VLAN, it behaves as a trunk. Use the additional wired ports to extend a tunneled VLAN to a wired port.

JUNIPER Mist Edge Teleworker Solution - WLAN template3

NOTE: Note: A wired port does not support split tunneling. Therefore, omit VLAN 1726 from the configuration. You can include VLAN 110 on a wired port, because it tunnels for the wired device.
The following image illustrates the Eth0+PoE port and pass-through (Pass Thru) ports.
Figure 1: Eth0+PoE and Pass Thru Ports

JUNIPER Mist Edge Teleworker Solution - Ports

You can plug the Eth0+PoE port into the PoE switch or PoE brick to power on the AP12. The port uses a DHCP IP address for management. Pass-through ports marked Pass Thru act as a patch from the back to the side port. You can use a pass-through port in cases where you need to connect a device behind a wall mount, such as a TV in a hotel.
You can configure ports Eth1, Eth2, and Eth3 on the AP Details or Device Profile page in the Juniper Mist portal. You can map the ports to a management VLAN or a tunneled VLAN.

Example: Second Port Configuration for AP41
The following image shows the second port configuration for AP41.

![JUNIPER Mist Edge Teleworker Solution - Second Port ComC]†r-ঞom](https://manuals.plus/wp-content/uploads/2024/01/JUNIPER-Mist- Edge-Teleworker-Solution-Second-Port-ComC†r-ঞom.jpg)

In the example, Port VLAN ID is the same as Native VLAN ID or Untagged VLAN. Note that only the Module port is capable of providing power over Ethernet (PoE)-out to power a low-powered device, such as an IP phone. POE Passthrough is supported only if a PoE injector—not a DC power supply— powers an AP.

NOTE: AP12, AP41, AP43 and AP45 can provide PoE-out. The following ports provide power over Ethernet (PoE)-out on different APs:

  • Module port on AP41
  • ETH1 on AP41 and AP43
  • Passthrough port on AP12

Split Tunneling for a Corporate SSID

Juniper Mist Edge provides split-tunnel capability. This capability enables corporate clients to connect to local home devices (such as printers and media systems) while connected to the corporate network. You can enable this feature under the Mist Tunnel settings.
NOTE: Split-tunnel capability is applicable for a single remote AP at a site.
After you enable split tunneling, IP addresses listed in the Destination Subnet field are tunneled back to the Juniper Mist Edge. The rest IP addresses are locally bridged. Additionally, DNS Servers field, when configured, provides a way to use corporate DNS servers to resolve URLs/FQDNs for both tunneled and locally bridged traffic.
When you enable split tunneling, the AP serves the 192.168.157.X/27 IP address from a private subnet that it runs for clients. Traffic destined for the corporate office, defined in Destination Subnet, is translated to the corporate IP. The corporate IP is the IP that the AP receives from the VLAN of the corporate WLAN. The rest of the wireless client traffic is translated to the AP’s management VLAN IP address.
Configure the Tunnel Gateway setting with the client subnet gateway. This is the gateway for the VLAN mapped to the WLAN. Note that you can configure multiple destination subnets. You can also add the IP addresses and separate them by commas.
Make corporate DNS servers part of the Destination Subnet, or add the servers as a /32 entry.

JUNIPER Mist Edge Teleworker Solution - AP

Claim and Ship an AP to an Employee Location

You can use the Juniper Mist™ AI app to claim an AP before shipping it to an employee’s remote home office location. See https://www.mist.com/documentation/mist-ai-mobile-app/.
In the Mist AI app, select the site and Claim an AP to that site using the QR code on the back of the AP.
Then, still from the app, ship the AP to the employee’s location. No need to connect it to the network before shipping!
For Remote Teleworker solution, ensure that the firewall is configured to allow the connection from remote AP. Consider the following guidelines:

  • Allow port 500/4500 for IPSec and port 2083 for RadSec from remote APs
  • Firewall must translate the destination IP of the packets from remote AP to the tunnel IP
  • Obtain the external IP for the Mist Edge tunnel IP where a remote AP connects (usually a firewall IP), Append that IP to the hostname/IPs under tunnel termination services.

No additional configuration is required on Mist Edge or AP, other than selecting the tunnel type as IPSec and Radius to proxy through Mist Edge
Upon receiving the AP, the employee can now connect it to any of the Ethernet ports on the local home router (using a PoE injector or DC power). The AP is ready to serve the new, remote office in less than 20 seconds.
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2024 Juniper Networks, Inc. All rights reserved.

References

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals