Network Security
Call 1-800-868-4858
  Configuring Steal Belted Radius (CSBR)    
  Course Fees: $1500 (Training Credits Accepted)  
  Course Duration: 2 Days  
  Course Code: EDU-JUN-CSBR  
  Course Schedule: Please call (800) 868-4858 for Schedule  
  Juniper Certification: N/A  

Course Overview

This two-day course discusses the configuration for Juniper Networks Steel-Belted Radius Carrier. Key topics include installation, client configuration, users, authentication, and replication. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting basic aspects of SBR Carrier.

This course uses SBR Carrier software running on a Red Hat Enterprise Linux server for the hands-on component. 

Intended Audience

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SBR Carrier servers.

Course Level

Configuring Steel-Belted Radius Carrier is an introductory-level course.


The following are the prerequisites for this course:

  • Working knowledge of networking concepts
  • Knowledge of UDP and TCP/IP

The following are recommended, but not required:

  • Working knowledge of Unix Operating Systems
  • Basic knowledge of SQL and LDAP protocols


Course Agenda

Day 1

Chapter 1: Course Introduction

Chapter 2: RADIUS Overview

  • RADIUS Role
  • AAA
  • RADIUS Packets
  • Shared Secrets
  • Authentication Protocols
  • RADIUS Accounting

Chapter 3: Introduction to Steel-Belted RADIUS

  • SBR Editions
  • SBR Carrier Installation
  • SBR Carrier Management
  • Installing SBR Carrier Lab

Chapter 4: SBR Carrier Clients and Users

  • Adding Clients
  • Supported SBR Carrier Users
  • Clients and Users Lab

Chapter 5: Statistics, Reports, and Troubleshooting

  • Statistics
  • Reports and Log Files
  • Troubleshooting
  • Reports and Troubleshooting Lab

Chapter 6: Authentication Policies

  • Authentication Policies
  • Proxy RADIUS
  • Directed Realms
  • Authentication Options Lab

Day 2

Chapter 7: SQL and LDAP Authentication

  • SQL Authentication Overview
  • SQL Authentication Configuration
  • LDAP Authentication Overview
  • LDAP Authentication Configuration
  • SQL Authentication Lab

Chapter 8: Attributes

  • Check Lists
  • Return Lists
  • Filters
  • Attributes Lab

Chapter 9: Extensible Authentication Protocol

  • Overview of EAP
  • Certificates
  • Configuring EAP

Chapter 10: Advanced Deployment Options

  • Realms
  • Optional Modules 
  • Replication
  • SSR
  • Replication Lab  





Copy Right (c) 2018 Cosmos Security Center Inc.
The leading Juniper, CISSP, Check Point Training Center
Juniper Training :: CISSP Training :: CheckPoint Training
Juniper SRX Security Training, Juniper Routing & Switching Training,