Configuring Steel-Belted Radius Carrier (CSBR)

Juniper Training
  • Duration: 2 days

This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier. This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.

  • Objectives 0/0

    After successfully completing this course, you should be able to:
    • Define the role of a RADIUS server.
    • Describe authentication, authorization, and accounting (AAA) .
    • Describe the flow of traffic in a RADIUS environment.
    • Identify the components in a typical RADIUS packet.
    • Identify RADIUS attributes and their functions.
    • Describe shared secrets and their role.
    • Identify the protocols used for authenticating end users.
    • Describe RADIUS accounting.
    • Identify the editions of Steel-Belted Radius (SBR).
    • List the supported operating systems for SBR Carrier.
    • Identify the installation requirements for SBR Carrier.
    • Describe SBR Carrier server roles.
    • Locate SBR Carrier system information.
    • Configure the SBR Carrier license.
    • Describe SBR clients.
    • Configure SBR clients.
    • Describe the different types of users SBR supports.
    • Describe SBR Carrier authentication policies.
    • Describe and configure proxy targets.
    • Identify and proxy realms.
    • Describe directed realms.
    • Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
    • Configure SQL authentication for SBR Carrier.
    • Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
    • Configure LDAP authentication for SBR Carrier.
    • Describe the purpose of attributes, check lists, and return lists.
    • Describe how to implement check lists and return lists.
    • Describe filters and their purpose.
    • Describe how to implement filters.
    • Describe Extensible Authentication Protocol (EAP).
    • Identify EAP traffic flow.
    • Describe the purpose of certificates.
    • Configure server certificates.
    • Describe EAP mechanisms.
    • Configure EAP.
    • Describe the benefits of a realm.
    • Identify the means by which SBR Carrier can recognize realms.
    • Describe how SBR Carrier can handle requests based on realm identifiers.
    • Identify other SBR routing methods.
    • Identify optional authentication methods.
    • Describe and configure SBR Carrier replication.
    • Describe high availability (HA) using Session State Register (SSR).
    • Locate statistical information.
    • Locate and search reports and log files.
    • Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.

    No items in this section
  • Course Content 0/0

    Day 1
    Chapter 1: Course Introduction
    Chapter 2: RADIUS Overview
    • RADIUS Role
    • AAA
    • RADIUS Packets
    • Shared Secrets
    • Authentication Protocols
    • RADIUS Accounting
    Chapter 3: Introduction to Steel-Belted RADIUS
    • SBR Editions
    • SBR Carrier Installation
    • SBR Carrier Management
    • Installing SBR Carrier Lab
    Chapter 4: SBR Carrier Clients and Users
    • Adding Clients
    • Supported SBR Carrier Users
    • Clients and Users Lab
    Chapter 5: Statistics, Reports, and Troubleshooting
    • Statistics
    • Reports and Log Files
    • Troubleshooting
    • Reports and Troubleshooting Lab
    Chapter 6: Authentication Policies
    • Authentication Policies
    • Proxy RADIUS
    • Directed Realms
    • Authentication Options Lab
    Day 2
    Chapter 7: SQL and LDAP Authentication
    • SQL Authentication Overview
    • SQL Authentication Configuration
    • LDAP Authentication Overview
    • LDAP Authentication Configuration
    • SQL Authentication Lab
    Chapter 8: Attributes
    • Check Lists
    • Return Lists
    • Filters
    • Attributes Lab
    Chapter 9: Extensible Authentication Protocol
    • Overview of EAP
    • Certificates
    • Configuring EAP
    Chapter 10: Advanced Deployment Options
    • Realms
    • Optional Modules
    • Replication
    • SSR
    • Replication Lab

    No items in this section




Not enough ratings to display

Leave a Reply

Your email address will not be published. Required fields are marked *