See how Insoft Services is responding to COVID-19

Configuring Steel-Belted Radius Carrier (CSBR)

X

Kontakt os

Vi vil gerne høre fra dig. Udfyld denne formular for at forudbestilling eller anmode om yderligere oplysninger om vores leveringsmuligheder.

Tilmeld

Jeg vil gerne modtage e-mails med de seneste oplysninger og kampagner fra Insoft.

Databeskyttelse og privatliv

Jeg tillader hermed Insoft Ltd. at kontakte mig om dette emne. Jeg tillader endvidere Insoft Ltd.-, at indsamle og lagre mine personlige data med henblik på disse aktiviteter. Alle dine data vil blive beskyttet og sikret som beskrevet i vores privatlivspolitik.


Kommende datoer


Nov 10 - Nov 11, 2020
09:00 - 17:00 (CEST)
Online

Feb 24 - Feb 25, 2021
09:00 - 17:00 (CEST)
Online

Jun 22 - Jun 23, 2021
09:00 - 17:00 (CEST)
Online

Aug 24 - Aug 25, 2021
09:00 - 17:00 (CEST)
Online

Nov 30 - Dec 1, 2021
09:00 - 17:00 (CEST)
Online

  • Configuring Steel-Belted Radius Carrier (CSBR)
    2 days  (Instructor Led Online)  |  Routing & Switching

    Course Details

    BESKRIVELSE

    This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier.

     

    This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.

     

    Course Level:

    Configuring Steel-Belted Radius Carrier is an introductory-level course.

    KURSETS FORMĂ…L

    After successfully completing this course, you should be able to:

    • Define the role of a RADIUS server.
    • Describe authentication, authorization, and accounting (AAA) .
    • Describe the flow of traffic in a RADIUS environment.
    • Identify the components in a typical RADIUS packet.
    • Identify RADIUS attributes and their functions.
    • Describe shared secrets and their role.
    • Identify the protocols used for authenticating end users.
    • Describe RADIUS accounting.
    • Identify the editions of Steel-Belted Radius (SBR).
    • List the supported operating systems for SBR Carrier.
    • Identify the installation requirements for SBR Carrier.
    • Describe SBR Carrier server roles.
    • Locate SBR Carrier system information.
    • Configure the SBR Carrier license.
    • Describe SBR clients.
    • Configure SBR clients.
    • Describe the different types of users SBR supports.
    • Describe SBR Carrier authentication policies.
    • Describe and configure proxy targets.
    • Identify and proxy realms.
    • Describe directed realms.
    • Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
    • Configure SQL authentication for SBR Carrier.
    • Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
    • Configure LDAP authentication for SBR Carrier.
    • Describe the purpose of attributes, check lists, and return lists.
    • Describe how to implement check lists and return lists.
    • Describe filters and their purpose.
    • Describe how to implement filters.
    • Describe Extensible Authentication Protocol (EAP).
    • Identify EAP traffic flow.
    • Describe the purpose of certificates.
    • Configure server certificates.
    • Describe EAP mechanisms.
    • Configure EAP.
    • Describe the benefits of a realm.
    • Identify the means by which SBR Carrier can recognize realms.
    • Describe how SBR Carrier can handle requests based on realm identifiers.
    • Identify other SBR routing methods.
    • Identify optional authentication methods.
    • Describe and configure SBR Carrier replication.
    • Describe high availability (HA) using Session State Register (SSR).
    • Locate statistical information.
    • Locate and search reports and log files.
    • Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.

    KURSUSINDHOLD

    Day 1

    Chapter 1: Course Introduction

    Chapter 2: RADIUS Overview

    • RADIUS Role
    • AAA
    • RADIUS Packets
    • Shared Secrets
    • Authentication Protocols
    • RADIUS Accounting

    Chapter 3: Introduction to Steel-Belted RADIUS

    • SBR Editions
    • SBR Carrier Installation
    • SBR Carrier Management
    • Installing SBR Carrier Lab

    Chapter 4: SBR Carrier Clients and Users

    • Adding Clients
    • Supported SBR Carrier Users
    • Clients and Users Lab

    Chapter 5: Statistics, Reports, and Troubleshooting

    • Statistics
    • Reports and Log Files
    • Troubleshooting
    • Reports and Troubleshooting Lab

    Chapter 6: Authentication Policies

    • Authentication Policies
    • Proxy RADIUS
    • Directed Realms
    • Authentication Options Lab

    Day 2

    Chapter 7: SQL and LDAP Authentication

    • SQL Authentication Overview
    • SQL Authentication Configuration
    • LDAP Authentication Overview
    • LDAP Authentication Configuration
    • SQL Authentication Lab

    Chapter 8: Attributes

    • Check Lists
    • Return Lists
    • Filters
    • Attributes Lab

    Chapter 9: Extensible Authentication Protocol

    • Overview of EAP
    • Certificates
    • Configuring EAP

    Chapter 10: Advanced Deployment Options

    • Realms
    • Optional Modules
    • Replication
    • SSR
    • Replication Lab

    MĂ…LGRUPPE

    This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SBR Carrier servers.

    FORUDSÆTNINGER

    The following are the prerequisites for this course:

    • Working knowledge of networking concepts
    • Knowledge of UDP and TCP/IP

    The following are recommended, but not required:

    • Working knowledge of Unix Operating Systems
    • Basic knowledge of SQL and LDAP protocols