This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier. This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.
- Sorry, this product cannot be purchased.
75,000.00$
- Duration: 2 days
Objectives
After successfully completing this course, you should be able to:
• Define the role of a RADIUS server.
• Describe authentication, authorization, and accounting (AAA) .
• Describe the flow of traffic in a RADIUS environment.
• Identify the components in a typical RADIUS packet.
• Identify RADIUS attributes and their functions.
• Describe shared secrets and their role.
• Identify the protocols used for authenticating end users.
• Describe RADIUS accounting.
• Identify the editions of Steel-Belted Radius (SBR).
• List the supported operating systems for SBR Carrier.
• Identify the installation requirements for SBR Carrier.
• Describe SBR Carrier server roles.
• Locate SBR Carrier system information.
• Configure the SBR Carrier license.
• Describe SBR clients.
• Configure SBR clients.
• Describe the different types of users SBR supports.
• Describe SBR Carrier authentication policies.
• Describe and configure proxy targets.
• Identify and proxy realms.
• Describe directed realms.
• Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
• Configure SQL authentication for SBR Carrier.
• Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
• Configure LDAP authentication for SBR Carrier.
• Describe the purpose of attributes, check lists, and return lists.
• Describe how to implement check lists and return lists.
• Describe filters and their purpose.
• Describe how to implement filters.
• Describe Extensible Authentication Protocol (EAP).
• Identify EAP traffic flow.
• Describe the purpose of certificates.
• Configure server certificates.
• Describe EAP mechanisms.
• Configure EAP.
• Describe the benefits of a realm.
• Identify the means by which SBR Carrier can recognize realms.
• Describe how SBR Carrier can handle requests based on realm identifiers.
• Identify other SBR routing methods.
• Identify optional authentication methods.
• Describe and configure SBR Carrier replication.
• Describe high availability (HA) using Session State Register (SSR).
• Locate statistical information.
• Locate and search reports and log files.
• Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.
• Define the role of a RADIUS server.
• Describe authentication, authorization, and accounting (AAA) .
• Describe the flow of traffic in a RADIUS environment.
• Identify the components in a typical RADIUS packet.
• Identify RADIUS attributes and their functions.
• Describe shared secrets and their role.
• Identify the protocols used for authenticating end users.
• Describe RADIUS accounting.
• Identify the editions of Steel-Belted Radius (SBR).
• List the supported operating systems for SBR Carrier.
• Identify the installation requirements for SBR Carrier.
• Describe SBR Carrier server roles.
• Locate SBR Carrier system information.
• Configure the SBR Carrier license.
• Describe SBR clients.
• Configure SBR clients.
• Describe the different types of users SBR supports.
• Describe SBR Carrier authentication policies.
• Describe and configure proxy targets.
• Identify and proxy realms.
• Describe directed realms.
• Describe how SBR Carrier can use Structured Query Language (SQL) databases for authentication.
• Configure SQL authentication for SBR Carrier.
• Describe how SBR Carrier can use Lightweight Directory Access Protocol (LDAP) databases for authentication.
• Configure LDAP authentication for SBR Carrier.
• Describe the purpose of attributes, check lists, and return lists.
• Describe how to implement check lists and return lists.
• Describe filters and their purpose.
• Describe how to implement filters.
• Describe Extensible Authentication Protocol (EAP).
• Identify EAP traffic flow.
• Describe the purpose of certificates.
• Configure server certificates.
• Describe EAP mechanisms.
• Configure EAP.
• Describe the benefits of a realm.
• Identify the means by which SBR Carrier can recognize realms.
• Describe how SBR Carrier can handle requests based on realm identifiers.
• Identify other SBR routing methods.
• Identify optional authentication methods.
• Describe and configure SBR Carrier replication.
• Describe high availability (HA) using Session State Register (SSR).
• Locate statistical information.
• Locate and search reports and log files.
• Describe the troubleshooting tools that are available to troubleshoot SBR Carrier.
Course Content
Day 1
Chapter 1: Course Introduction
Chapter 2: RADIUS Overview
• RADIUS Role
• AAA
• RADIUS Packets
• Shared Secrets
• Authentication Protocols
• RADIUS Accounting
Chapter 3: Introduction to Steel-Belted RADIUS
• SBR Editions
• SBR Carrier Installation
• SBR Carrier Management
• Installing SBR Carrier Lab
Chapter 4: SBR Carrier Clients and Users
• Adding Clients
• Supported SBR Carrier Users
• Clients and Users Lab
Chapter 5: Statistics, Reports, and Troubleshooting
• Statistics
• Reports and Log Files
• Troubleshooting
• Reports and Troubleshooting Lab
Chapter 6: Authentication Policies
• Authentication Policies
• Proxy RADIUS
• Directed Realms
• Authentication Options Lab
Day 2
Chapter 7: SQL and LDAP Authentication
• SQL Authentication Overview
• SQL Authentication Configuration
• LDAP Authentication Overview
• LDAP Authentication Configuration
• SQL Authentication Lab
Chapter 8: Attributes
• Check Lists
• Return Lists
• Filters
• Attributes Lab
Chapter 9: Extensible Authentication Protocol
• Overview of EAP
• Certificates
• Configuring EAP
Chapter 10: Advanced Deployment Options
• Realms
• Optional Modules
• Replication
• SSR
• Replication Lab
Chapter 1: Course Introduction
Chapter 2: RADIUS Overview
• RADIUS Role
• AAA
• RADIUS Packets
• Shared Secrets
• Authentication Protocols
• RADIUS Accounting
Chapter 3: Introduction to Steel-Belted RADIUS
• SBR Editions
• SBR Carrier Installation
• SBR Carrier Management
• Installing SBR Carrier Lab
Chapter 4: SBR Carrier Clients and Users
• Adding Clients
• Supported SBR Carrier Users
• Clients and Users Lab
Chapter 5: Statistics, Reports, and Troubleshooting
• Statistics
• Reports and Log Files
• Troubleshooting
• Reports and Troubleshooting Lab
Chapter 6: Authentication Policies
• Authentication Policies
• Proxy RADIUS
• Directed Realms
• Authentication Options Lab
Day 2
Chapter 7: SQL and LDAP Authentication
• SQL Authentication Overview
• SQL Authentication Configuration
• LDAP Authentication Overview
• LDAP Authentication Configuration
• SQL Authentication Lab
Chapter 8: Attributes
• Check Lists
• Return Lists
• Filters
• Attributes Lab
Chapter 9: Extensible Authentication Protocol
• Overview of EAP
• Certificates
• Configuring EAP
Chapter 10: Advanced Deployment Options
• Realms
• Optional Modules
• Replication
• SSR
• Replication Lab
This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier. This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. This course is based on SBR Carrier Standalone software release 7.5.0.
Additional information
date | 26 Nov 2019 |
---|---|
locations | Sydney Juniper JNCIA |
There are no reviews yet.