Questions for the JN0-460 were updated on : Dec 01 ,2025
You receive a Marvis Action that reports “Port negotiation mismatch detected on EX3400-48P.”
In this scenario, which two steps should you take to resolve the issue? (Choose two.)
A, D
Explanation:
A port negotiation mismatch occurs when the local and remote interfaces fail to agree on common
speed or duplex settings.
Marvis Wired Assurance automatically detects this by analyzing telemetry from the switch’s physical
interfaces.
You can resolve this by ensuring auto-negotiation is enabled on both ends (A) and verifying the peer
device supports the 802.3 autonegotiation standard (D).
Manually forcing half-duplex or replacing hardware is unnecessary unless the hardware is faulty.
“Marvis Wired Actions correlate interface negotiation errors with LLDP neighbor data to pinpoint
mismatched configurations, helping administrators quickly verify speed/duplex compatibility and
802.3 autonegotiation support.”
Reference:
Juniper Mist Wired Assurance – Marvis Actions and Insights Guide
Juniper EX Series Switches – Interface Negotiation Troubleshooting
In a Juniper Mist campus fabric deployment using EVPN-VXLAN, which component performs the
VXLAN encapsulation and de-encapsulation functions?
B
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
In EVPN-VXLAN architectures, the VXLAN Tunnel Endpoint (VTEP) is the logical interface responsible
for encapsulating and de-encapsulating Layer 2 Ethernet frames into VXLAN packets.
Each participating switch — typically the access or distribution node — hosts a VTEP that maps local
VLANs to VXLAN Network Identifiers (VNIs).
When a packet leaves a local VLAN, the VTEP encapsulates it in a VXLAN header and routes it
through the underlay IP fabric.
When received at the destination VTEP, the frame is de-encapsulated and delivered to the
appropriate local VLAN.
“VTEPs in an EVPN-VXLAN campus fabric perform MAC-to-VNI mapping and
encapsulate/decapsulate traffic between virtualized network segments, allowing seamless Layer 2
and Layer 3 connectivity across an IP underlay.”
Reference:
Juniper Mist AI for Wired – Campus Fabric EVPN-VXLAN Overview
Juniper Validated Design (JVD): Mist AI Campus Fabric Deployment Guide
Junos OS EVPN and VXLAN Configuration Guide
Which API is used within the Juniper Mist solution?
A
Explanation:
Juniper Mist is built on a fully open and RESTful API architecture, allowing programmatic access to all
functions.
Administrators and developers can automate switch provisioning, monitoring, and troubleshooting
directly via the REST API.
This open design supports JSON data formatting and HTTPS authentication, ensuring secure
integration with external systems.
Reference: Juniper Mist API Developer Guide
You want to receive e-mail notifications when there are issues with your switches.
Where would you configure this capability in the Mist dashboard?
C
Explanation:
Notifications for switch health, link failures, and Marvis-detected wired issues are configured under
Alerts Configuration in the Mist dashboard.
Admins can define thresholds, alert types, and recipients for email, webhook, or third-party
integrations.
This centralizes proactive alerting for both Wired and Wireless Assurance.
Reference: Juniper Mist Alerts and Notifications Documentation
Which two steps must be performed when configuring Dynamic Port Configuration (DPC) in the
Juniper Mist dashboard? (Choose two.)
A, C
Explanation:
Dynamic Port Configuration (DPC) automates port role assignment based on connected device type
and identity.
To enable it in Mist:
Select the Configuration Profile that defines what configuration will apply to matched devices.
Assign specific switch ports for DPC activation.
This simplifies provisioning by applying templates dynamically as clients connect.
Reference: Juniper Mist Wired Assurance – Dynamic Port Configuration Guide
What is the primary benefit of using switch configuration templates?
D
Explanation:
Switch configuration templates in Juniper Mist provide a scalable method for applying a consistent
baseline configuration across all switches.
This ensures uniformity for management interfaces, VLAN assignments, authentication, and
NTP/DNS settings while reducing configuration drift.
Templates can be assigned at the organization or site level.
Reference: Juniper Mist Wired Assurance Configuration Templates Documentation
Which three steps should be part of the campus fabric deployment? (Choose three.)
A, B, D
Explanation:
When deploying a Juniper Mist campus fabric, the following steps are foundational:
Define Physical Connections – Specify switch interlinks between access, distribution, and core layers.
Define Networks of Interest – Identify the VLANs and subnets to be part of the EVPN-VXLAN overlay.
Choose the Topology – Select the desired architecture (3-stage Clos, 5-stage Clos, CRB, or ERB).
These define the intent-based underlay before applying overlay and GBP configurations.
Reference: Juniper Mist Campus Fabric Deployment Guide
Which three administrator roles allow you to claim switches? (Choose three.)
A, B, C
Explanation:
Juniper Mist uses role-based access control (RBAC) for managing device permissions.
The ability to claim and adopt switches into an organization is reserved for higher-level
administrative roles:
Super User: Full control over the organization and all sites.
Network Admin: Can claim, configure, and manage network devices.
Installer: Limited-time permissions to install and claim switches or APs.
Observer and Helpdesk roles have read-only privileges.
Reference: Juniper Mist Role-Based Access and Installer Role Documentation
Under which hierarchy level would you create a new site configuration?
B
Explanation:
In Mist, sites represent the physical or logical grouping of devices within an organization.
You create and manage a site configuration under the Location hierarchy in the Mist UI.
Each site inherits organization-level settings but can override or customize specific configurations
such as VLANs, templates, or switch settings.
Reference: Juniper Mist Cloud Hierarchy and Site Configuration Guide
You are asked to forward event messages from Mist to an external log collector.
In this scenario, which feature would enable this capability?
A
Explanation:
In Juniper Mist, the syslog feature allows administrators to forward event messages and alerts from
the Mist cloud to an external syslog server.
This is often used for centralized event monitoring, compliance, and correlation with tools like
Splunk or SIEM systems.
Syslog operates over UDP or TCP and can capture switch events, system logs, and Marvis actions for
both Wired and Wireless networks.
Reference: Juniper Mist Documentation – Syslog Integration for Wired Assurance
Which action would site-level network administrators be able to perform?
C
Explanation:
In Juniper Mist role-based access control (RBAC), site-level administrators have limited privileges to
manage devices within their assigned sites.
They cannot modify organization-level templates or global settings but can perform operational
tasks, including rebooting APs or switches and monitoring their status.
This ensures proper delegation of duties while maintaining centralized configuration control.
Reference: Juniper Mist Role-Based Access Control and Administrator Roles Documentation
What are three ways that data is collected from the Mist backend? (Choose three.)
A, B, C
Explanation:
Juniper Mist uses open, cloud-native APIs to provide real-time telemetry and integration.
Data is collected and streamed from the backend using:
RESTful APIs – for configuration, automation, and reporting.
Webhooks – to push events, alerts, or SLE changes to third-party systems.
WebSockets – for real-time updates between Mist cloud and clients (dashboards or automation
tools).
These methods support seamless integration and programmability for both Wired and Wireless
Assurance.
Reference: Juniper Mist API and Webhook Integration Guide
Which two Marvis Wired Assurance actions require a Juniper switch? (Choose two.)
B, C
Explanation:
Marvis, the AI-driven virtual network assistant in Mist, provides real-time troubleshooting insights
for both wired and wireless devices.
When used with Wired Assurance, certain actions require Juniper EX or QFX switches for telemetry
collection.
Two of these wired-specific actions are:
Bad Cable Detection – triggered when electrical faults or poor cable quality are observed through
LLDP or physical diagnostics.
Negotiation Mismatch – triggered when duplex, speed, or link-mode settings are mismatched
between peers.
These insights help reduce manual troubleshooting by automating root-cause analysis.
Reference: Juniper Mist Marvis Wired Assurance Overview
Which statement is correct regarding the Mist UI?
A
Explanation:
The Mist UI (User Interface) is Juniper’s cloud-based management platform used to manage both
wired and wireless devices, including EX, QFX, and SRX platforms.
It provides centralized visibility, configuration, analytics, and AI-driven insights for the entire
enterprise network infrastructure.
Within Wired Assurance, the Mist UI enables device claiming, switch templates, configuration
management, and SLE monitoring.
Reference: Juniper Mist Cloud Overview – Wired and Wireless Management
Which statement about RadSec is correct?
A
Explanation:
RadSec (RADIUS over TLS) enhances traditional RADIUS authentication security by encapsulating
RADIUS messages within TCP and TLS instead of UDP.
This ensures encrypted, reliable, and authenticated transmission between network devices (such as
Juniper EX switches) and RADIUS servers.
It is often used in modern Mist-managed wired networks to securely integrate with Access Assurance
or external authentication systems.
Reference: Juniper Mist RadSec Overview and Configuration Documentation