Microsoft Course Lists
CSBR - Configuring Steel-Belted Radius Carrier
- Duration: 2 days
- Test Level: 0
- Certifications: No Certification
- Price: $1400
- Exams: No Exam
This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier.
This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.
This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SBR Carrier servers.
After successfully completing this course, you should be
able to:
- Define
the role of a RADIUS server.
- Describe
authentication, authorization, and accounting (AAA) .
- Describe
the flow of traffic in a RADIUS environment.
- Identify
the components in a typical RADIUS packet.
- Identify
RADIUS attributes and their functions.
- Describe
shared secrets and their role.
- Identify
the protocols used for authenticating end users.
- Describe
RADIUS accounting.
- Identify
the editions of Steel-Belted Radius (SBR).
- List
the supported operating systems for SBR Carrier.
- Identify
the installation requirements for SBR Carrier.
- Describe
SBR Carrier server roles.
- Locate
SBR Carrier system information.
- Configure
the SBR Carrier license.
- Describe
SBR clients.
- Configure
SBR clients.
- Describe
the different types of users SBR supports.
- Describe
SBR Carrier authentication policies.
- Describe
and configure proxy targets.
- Identify
and proxy realms.
- Describe
directed realms.
- Describe
how SBR Carrier can use Structured Query Language (SQL) databases for
authentication.
- Configure
SQL authentication for SBR Carrier.
- Describe
how SBR Carrier can use Lightweight Directory Access Protocol (LDAP)
databases for authentication.
- Configure
LDAP authentication for SBR Carrier.
- Describe
the purpose of attributes, check lists, and return lists.
- Describe
how to implement check lists and return lists.
- Describe
filters and their purpose.
- Describe
how to implement filters.
- Describe
Extensible Authentication Protocol (EAP).
- Identify
EAP traffic flow.
- Describe
the purpose of certificates.
- Configure
server certificates.
- Describe
EAP mechanisms.
- Configure
EAP.
- Describe
the benefits of a realm.
- Identify
the means by which SBR Carrier can recognize realms.
- Describe
how SBR Carrier can handle requests based on realm identifiers.
- Identify
other SBR routing methods.
- Identify
optional authentication methods.
- Describe
and configure SBR Carrier replication.
- Describe
high availability (HA) using Session State Register (SSR).
- Locate
statistical information.
- Locate
and search reports and log files.
- Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.
Day 1
Chapter 1: Course Introduction
Chapter 2: RADIUS Overview
- RADIUS
Role
- AAA
- RADIUS
Packets
- Shared
Secrets
- Authentication
Protocols
- RADIUS
Accounting
Chapter 3: Introduction to Steel-Belted RADIUS
- SBR
Editions
- SBR
Carrier Installation
- SBR
Carrier Management
- Installing
SBR Carrier Lab
Chapter 4: SBR Carrier Clients and Users
- Adding
Clients
- Supported
SBR Carrier Users
- Clients
and Users Lab
Chapter 5: Statistics, Reports, and Troubleshooting
- Statistics
- Reports
and Log Files
- Troubleshooting
- Reports
and Troubleshooting Lab
Chapter 6: Authentication Policies
- Authentication
Policies
- Proxy
RADIUS
- Directed
Realms
- Authentication
Options Lab
Day 2
Chapter 7: SQL and LDAP Authentication
- SQL
Authentication Overview
- SQL
Authentication Configuration
- LDAP
Authentication Overview
- LDAP
Authentication Configuration
- SQL
Authentication Lab
Chapter 8: Attributes
- Check
Lists
- Return
Lists
- Filters
- Attributes Lab
Chapter 9: Extensible Authentication Protocol
- Overview
of EAP
- Certificates
- Configuring
EAP
Chapter 10: Advanced Deployment Options
- Realms
- Optional
Modules
- Replication
- SSR
- Replication Lab
The following are the prerequisites for this course:
• Working knowledge of networking concepts• Knowledge of UDP and TCP/IP
The following are recommended, but not required:
• Working knowledge of Unix Operating Systems• Basic knowledge of SQL and LDAP protocols