About This Network Configuration Example
This Network Configuration Example (NCE) details the process of integrating Cisco ISE 2.X with Juniper EX switches. It covers the essential steps, from importing the Juniper wired device profile into Cisco ISE to configuring authentication and authorization policies for secure network access.
The guide is designed to help network administrators leverage the capabilities of both Juniper EX switches and Cisco ISE for robust network security.
Key Components and Topology
The example utilizes the following hardware and software:
- Juniper EX2300-C-12P Switch: Running Junos 18.2R1-S1, acting as the network authenticator.
- Cisco ISE 2.4.0.357 Patch2-18080100: Serving as the RADIUS server for authentication and policy enforcement.
- Supplicants: Including Polycom VVX 310 IP Phones and Windows 10 clients, demonstrating both MAC Radius and 802.1X authentication methods.
The network topology illustrates the connection between Cisco ISE, the Juniper EX switch, and various end devices, showcasing how authentication flows through the network.
Configuration Steps Overview
The procedure involves several key stages:
- Importing the Juniper Wired Device Profile into Cisco ISE.
- Configuring EX Switches and Cisco ISE for 802.1X authentication.
- Creating authorization profiles, identity groups, and policies within Cisco ISE.
- Configuring supplicants (e.g., Windows 10) for 802.1X.
- Testing and validating the authentication process.
For detailed instructions and command examples, please refer to the full documentation.
Resources and Support
Juniper Networks provides extensive resources for documentation and support. For the latest technical documentation, visit Juniper Networks Documentation. For technical assistance, contact the Juniper Networks Technical Assistance Center (JTAC) through their online portal or by phone.
Further information on product warranties and JTAC policies can be found on the Juniper Networks support website.