Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
40Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
NAP VPN Step by Step

NAP VPN Step by Step

Ratings:

4.0

(2)
|Views: 4,077 |Likes:
Published by askmeagain

More info:

Published by: askmeagain on Oct 30, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

12/21/2012

pdf

text

original

 
Step By Step Guide: Demonstrate VPN NAPEnforcement in a Test Lab
Microsoft CorporationPublished: February 2008
Abstract
Network Access Protection (NAP) is a new policy enforcement technology in Windows Vista®,Windows Server® 2008, and Windows XP with Service Pack 3 (SP3). NAP provides componentsand an application programming interface (API) set that help administrators enforce compliancewith health requirements for network access and communication. This paper contains anintroduction to NAP and instructions for setting up a test lab to deploy NAP with the VPNenforcement method.
 
Copyright Information
This document supports a preliminary release of a software product that may be changedsubstantially prior to final commercial release, and is the confidential and proprietary informationof Microsoft Corporation. It is disclosed pursuant to a non-disclosure agreement between therecipient and Microsoft. This document is provided for informational purposes only and Microsoftmakes no warranties, either express or implied, in this document. Information in this document,including URL and other Internet Web site references, is subject to change without notice. Theentire risk of the use or the results from the use of this document remains with the user. Unlessotherwise noted, the example companies, organizations, products, domain names, e-mailaddresses, logos, people, places, and events depicted herein are fictitious, and no associationwith any real company, organization, product, domain name, e-mail address, logo, person, place,or event is intended or should be inferred. Complying with all applicable copyright laws is theresponsibility of the user. Without limiting the rights under copyright, no part of this document maybe reproduced, stored in or introduced into a retrieval system, or transmitted in any form or byany means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose,without the express written permission of Microsoft Corporation.Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectualproperty rights covering subject matter in this document. Except as expressly provided in anywritten license agreement from Microsoft, the furnishing of this document does not give you anylicense to these patents, trademarks, copyrights, or other intellectual property.© 2008 Microsoft Corporation. All rights reserved.Microsoft, MS-DOS, Windows, Windows NT, and Windows Server are either registeredtrademarks or trademarks of Microsoft Corporation in the United States and/or other countries.All other trademarks are property of their respective owners.
 
Contents
Step-by-Step Guide: Demonstrate NAP VPN Enforcement in a Test Lab .......................................5In this guide .................................................................................................................................5Scenario overview .......................................................................................................................6NAP enforcement processes ....................................................................................................6Policy validation ....................................................................................................................6NAP enforcement and network restriction .............................................................................7Remediation ..........................................................................................................................7Ongoing monitoring to ensure compliance ............................................................................7NAP VPN enforcement overview .................................................................................................8Hardware and software requirements ..........................................................................................8Steps for configuring the test lab .................................................................................................9Configure DC1 .............................................................................................................................9Install the operating system on DC1 .......................................................................................10Configure TCP/IP on DC1 ......................................................................................................10Configure DC1 as a domain controller and DNS server .........................................................10Install an enterprise root CA on DC1 ......................................................................................11Create a user account in Active Directory ..............................................................................12Add user1 to the Domain Admins group .................................................................................13Grant remote access permission to user1 ..............................................................................13Create a security group for NAP client computers ..................................................................14Configure VPN1 .........................................................................................................................14Install Windows Server 2008 ..................................................................................................14Configure TCP/IP properties on VPN1 ...................................................................................15Join VPN1 to the Contoso.com domain ..................................................................................16User Account Control.............................................................................................................16Install the Routing and Remote Access server role ................................................................16Configure Routing and Remote Access ..................................................................................17Configure authentication methods on VPN1 ..........................................................................20Allow ping on VPN1 ................................................................................................................20Configure NPS1 .........................................................................................................................21Install Windows Server 2008 ..................................................................................................21Configure TCP/IP properties on NPS1 ...................................................................................22Join NPS1 to the Contoso.com domain ..................................................................................22Install the NPS server role ......................................................................................................23Install the Group Policy Management feature ......................................................................... 23Configure NAP client settings in Group Policy ........................................................................24Configure security filters for the NAP client settings GPO ...................................................24Obtain a computer certificate on NPS1 ..................................................................................25Configure NPS as a NAP health policy server ........................................................................26

Activity (40)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
gamerdanang liked this
Alex Kleeorin liked this
Atila Baires liked this
cuibap_la liked this
rogercpu liked this
JSottomayor liked this
currin20 liked this
aldot11 liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->