Configuring Steel-Belted Radius Carrier (CSBR)

Configuring Steel-Belted Radius Carrier (CSBR)
  • Configuring Steel-Belted Radius Carrier (CSBR)

    2 dager
    Routing & Switching
    1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)


    Course Details


    This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier.


    This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.


    Course Level:

    Configuring Steel-Belted Radius Carrier is an introductory-level course.


    After successfully completing this course, you should be able to:

    • Define the role of a RADIUS server.
    • Describe authentication, authorization, and accounting (AAA) .
    • Describe the flow of traffic in a RADIUS environment.
    • Identify the components in a typical RADIUS packet.
    • Identify RADIUS attributes and their functions.
    • Describe shared secrets and their role.
    • Identify the protocols used for authenticating end users.
    • Describe RADIUS accounting.
    • Identify the editions of Steel-Belted Radius (SBR).
    • List the supported operating systems for SBR Carrier.
    • Identify the installation requirements for SBR Carrier.
    • Describe SBR Carrier server roles.
    • Locate SBR Carrier system information.
    • Configure the SBR Carrier license.
    • Describe SBR clients.
    • Configure SBR clients.
    • Describe the different types of users SBR supports.
    • Describe SBR Carrier authentication policies.
    • Describe and configure proxy targets.
    • Identify and proxy realms.
    • Describe directed realms.
    • Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
    • Configure SQL authentication for SBR Carrier.
    • Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
    • Configure LDAP authentication for SBR Carrier.
    • Describe the purpose of attributes, check lists, and return lists.
    • Describe how to implement check lists and return lists.
    • Describe filters and their purpose.
    • Describe how to implement filters.
    • Describe Extensible Authentication Protocol (EAP).
    • Identify EAP traffic flow.
    • Describe the purpose of certificates.
    • Configure server certificates.
    • Describe EAP mechanisms.
    • Configure EAP.
    • Describe the benefits of a realm.
    • Identify the means by which SBR Carrier can recognize realms.
    • Describe how SBR Carrier can handle requests based on realm identifiers.
    • Identify other SBR routing methods.
    • Identify optional authentication methods.
    • Describe and configure SBR Carrier replication.
    • Describe high availability (HA) using Session State Register (SSR).
    • Locate statistical information.
    • Locate and search reports and log files.
    • Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.


    Day 1

    Chapter 1: Course Introduction

    Chapter 2: RADIUS Overview

    • RADIUS Role
    • AAA
    • RADIUS Packets
    • Shared Secrets
    • Authentication Protocols
    • RADIUS Accounting

    Chapter 3: Introduction to Steel-Belted RADIUS

    • SBR Editions
    • SBR Carrier Installation
    • SBR Carrier Management
    • Installing SBR Carrier Lab

    Chapter 4: SBR Carrier Clients and Users

    • Adding Clients
    • Supported SBR Carrier Users
    • Clients and Users Lab

    Chapter 5: Statistics, Reports, and Troubleshooting

    • Statistics
    • Reports and Log Files
    • Troubleshooting
    • Reports and Troubleshooting Lab

    Chapter 6: Authentication Policies

    • Authentication Policies
    • Proxy RADIUS
    • Directed Realms
    • Authentication Options Lab

    Day 2

    Chapter 7: SQL and LDAP Authentication

    • SQL Authentication Overview
    • SQL Authentication Configuration
    • LDAP Authentication Overview
    • LDAP Authentication Configuration
    • SQL Authentication Lab

    Chapter 8: Attributes

    • Check Lists
    • Return Lists
    • Filters
    • Attributes¬†Lab

    Chapter 9: Extensible Authentication Protocol

    • Overview of EAP
    • Certificates
    • Configuring EAP

    Chapter 10: Advanced Deployment Options

    • Realms
    • Optional Modules
    • Replication
    • SSR
    • Replication Lab


    • This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SBR Carrier servers.


    The following are the prerequisites for this course:

    • Working knowledge of networking concepts
    • Knowledge of UDP and TCP/IP


    The following are recommended, but not required:

    • Working knowledge of Unix Operating Systems
    • Basic knowledge of SQL and LDAP protocols

    Kurs kalender

      Dec 6 - Dec 7, 2018
      Feb 7 - Feb 8, 2019
      Apr 9 - Apr 10, 2019
      Jun 6 - Jun 7, 2019