CSBR - Configuring Steel-Belted Radius Carrier

  • Duration: 2 days
  • Test Level: 0
  • Certifications: No Certification
  • Price: $1400
  • Exams: No Exam
This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier.

This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.

After successfully completing this course, you should be able to:

  • Define the role of a RADIUS server.
  • Describe authentication, authorization, and accounting (AAA) .
  • Describe the flow of traffic in a RADIUS environment.
  • Identify the components in a typical RADIUS packet.
  • Identify RADIUS attributes and their functions.
  • Describe shared secrets and their role.
  • Identify the protocols used for authenticating end users.
  • Describe RADIUS accounting.
  • Identify the editions of Steel-Belted Radius (SBR).
  • List the supported operating systems for SBR Carrier.
  • Identify the installation requirements for SBR Carrier.
  • Describe SBR Carrier server roles.
  • Locate SBR Carrier system information.
  • Configure the SBR Carrier license.
  • Describe SBR clients.
  • Configure SBR clients.
  • Describe the different types of users SBR supports.
  • Describe SBR Carrier authentication policies.
  • Describe and configure proxy targets.
  • Identify and proxy realms.
  • Describe directed realms.
  • Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
  • Configure SQL authentication for SBR Carrier.
  • Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
  • Configure LDAP authentication for SBR Carrier.
  • Describe the purpose of attributes, check lists, and return lists.
  • Describe how to implement check lists and return lists.
  • Describe filters and their purpose.
  • Describe how to implement filters.
  • Describe Extensible Authentication Protocol (EAP).
  • Identify EAP traffic flow.
  • Describe the purpose of certificates.
  • Configure server certificates.
  • Describe EAP mechanisms.
  • Configure EAP.
  • Describe the benefits of a realm.
  • Identify the means by which SBR Carrier can recognize realms.
  • Describe how SBR Carrier can handle requests based on realm identifiers.
  • Identify other SBR routing methods.
  • Identify optional authentication methods.
  • Describe and configure SBR Carrier replication.
  • Describe high availability (HA) using Session State Register (SSR).
  • Locate statistical information.
  • Locate and search reports and log files.
  • Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.

Day 1

Chapter 1: Course Introduction

Chapter 2: RADIUS Overview

  • RADIUS Role
  • AAA
  • RADIUS Packets
  • Shared Secrets
  • Authentication Protocols
  • RADIUS Accounting


Chapter 3: Introduction to Steel-Belted RADIUS

  • SBR Editions
  • SBR Carrier Installation
  • SBR Carrier Management
  • Installing SBR Carrier Lab


Chapter 4: SBR Carrier Clients and Users

  • Adding Clients
  • Supported SBR Carrier Users
  • Clients and Users Lab


Chapter 5: Statistics, Reports, and Troubleshooting

  • Statistics
  • Reports and Log Files
  • Troubleshooting
  • Reports and Troubleshooting Lab


Chapter 6: Authentication Policies

  • Authentication Policies
  • Proxy RADIUS
  • Directed Realms
  • Authentication Options Lab


Day 2

Chapter 7: SQL and LDAP Authentication

  • SQL Authentication Overview
  • SQL Authentication Configuration
  • LDAP Authentication Overview
  • LDAP Authentication Configuration
  • SQL Authentication Lab


Chapter 8: Attributes

  • Check Lists
  • Return Lists
  • Filters
  • Attributes Lab


Chapter 9: Extensible Authentication Protocol

  • Overview of EAP
  • Certificates
  • Configuring EAP


Chapter 10: Advanced Deployment Options

  • Realms
  • Optional Modules 
  • Replication
  • SSR
  • Replication Lab 
The following are the prerequisites for this course:

Working knowledge of networking concepts
Knowledge of UDP and TCP/IP

The following are recommended, but not required:

Working knowledge of Unix Operating Systems
Basic knowledge of SQL and LDAP protocols