programming4us
           
 
 
Windows Server

Windows Server 2008 : Working with NAP (part 7)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
11/29/2010 5:29:35 PM

IPsec Enforcement

IPsec enforcement breaks a network down to three different logical networks by using health certificates provided by the Health Certificate Server (HCS). Any computer can be a member of only one of the three networks at any given time—membership to the network is determined by the status of the computers health certificate. The logical networks are defined by which computers have valid health certificates and which computers require IPSec authentication for incoming access connections. Computers requiring IPSec authentication would normally be servers on the private network. Figure 14 shows a basic diagram of what an IPSec-based NAP infrastructure would look like. As you can see, there are three distinct networks:

  1. Secure network

  2. Boundary network

  3. Restricted network

Figure 14. IPSec-Based NAP Network


Secure Network

The secure network is where all computers have health certificates and require IPsec authentication to communicate with any other computer. If a computer tries to communicate with a computer in the secure network without a health certificate, the computer in the secure network will ignore the client’s request. In a NAP infrastructure, computers in the secure network would be members of the Active Directory domain.

Boundary Network

Boundary networks are where computers that are not NAP compliant can access a remediation server and become compliant. Once compliant, they can access an HCS Server and acquire a health certificate to participate in the secure network. Computers on the boundary network will accept communication requests from computers with a health certificate or without—this is how remediation occurs. Both the restricted network and the secure network have access to the boundary network.

Restricted Network

All the computers in the restricted network do not have a health certificate. The only network they can communicate with is the boundary network—for the purpose of remediation and acquiring the appropriate health certificate to access the secure network.

Flexible Host Isolation

Flexible Host Isolation refers to the ease of network isolation provided with the IPSec method of NAP enforcement. Isolation can be performed easily on the network with no infrastructure upgrade by using NAP and health certificates. This type of isolation cannot be easily circumvented by reconfiguring the client or using hardware like hubs. Basically, healthy systems can connect to anything, as long as the NAP policy allows it, whereas quarantined systems are isolated to the restricted network.

Warning

For this exam, it is very important to understand the communication between the three different types of networks in an IPSec NAP infrastructure. The secure network can communicate with any of the other networks via IPSec authentication and without it. The boundary network can communicate with the secure network via IPSec authentication and also allow nonsecured traffic with the restricted network. The restricted network can communicate with the boundary network only via an unsecured means.


Exercise 5: Install the NPS, HRA and CA Server Roles

In this exercise, we are going to install the NPS, HRA and CA server roles on NPS1 server.

1.
Click Start and then Server Manager. Under Roles Summary, click Add Roles and then click Next.

2.
On the Select Server Roles page, select the Active Directory Certificate Services and Network Policy and Access Services check boxes and then click Next twice.

3.
On the Select Role Services page, select the Health Registration Authority check box, click Add Required Role Services in the Add Roles Wizard window and then click Next.

4.
On the Choose the Certification Authority to use with the Health Registration Authority page, choose Install a local CA to issue health certificates for this HRA server and then click Next. See Figure 15.

Figure 15. Choose the Certification Authority to use with the Health Registration Authority


5.
On the Choose Authentication Requirements for the Health Registration Authority page, choose No, allow anonymous requests for health certificates and then click Next. This choice allows computers to be enrolled with health certificates in a workgroup environment.

6.
On the Choose a Server Authentication Certificate for SSL Encryption page, choose Create a self-signed certificate for SSL encryption and then click Next.

7.
On the Introduction to Active Directory Certificate Services page, click Next.

8.
On the Select Role Services page, verify that the Certification Authority check box is selected and then click Next.

9.
On the Specify Setup Type page, click Standalone and then click Next.

10.
On the Specify CA Type page, click Subordinate CA and then click Next.

11.
On the Set Up Private Key page, click Create a new private key and then click Next.

12.
On the Configure Cryptography for CA page, click Next.

13.
On the Configure CA Name page, under Common name for this CA, type contoso-NPS1-SubCA and then click Next.

14.
On the Request Certificate from a Parent CA page, choose Send a certificate request to a parent CA and then click Browse.

15.
In the Select Certification Authority window, click Contoso-DC1-CA and then click OK. See Figure 16.

Figure 16. Select Certification Authority


16.
Verify that DC1.Contoso.com\Contoso-DC1-CA is displayed next to Parent CA and then click Next.

17.
Click Next three times to accept the default database, Web server, and role services settings and then click Install.

18.
Verify that all installations were successful and then click Close.

19.
Exit the Server Manager.

Other -----------------
- Windows Server 2008 : Configuring Remote Access (part 6)
- Windows Server 2008 : Configuring Remote Access (part 5) - Virtual Private Networks
- Windows Server 2008 : Configuring Remote Access (part 4)
- Windows Server 2008 : Configuring Remote Access (part 3)
- Windows Server 2008 : Configuring Remote Access (part 2) - Network Policy Server and Network Access Protection
- Windows Server 2008 : Configuring Remote Access (part 1) - Routing and Remote Access Services
- Windows Server 2008 : Configuring Wireless Access
- Windows Server 2008: Configuring Routing
- Windows Firewall with Advanced Security in Windows Server 2008 (part 3)
- Windows Firewall with Advanced Security in Windows Server 2008 (part 2)
- Windows Firewall with Advanced Security in Windows Server 2008 (part 1)
- Windows Server 2008 : Configuring IP Security (IPsec)
- Windows Server 2008 : Configuring Network Authentication (part 2)
- Windows Server 2008 : Configuring Network Authentication (part 1)
- Windows Server 2008 : Configuring IPv4 and IPv6 Addressing
- Windows Server 2008 : Managing the Terminal Services - Displaying Data Prioritization
- Windows Server 2008 : Managing the Terminal Services - Viewing Processes & Monitoring Sessions
- Windows Server 2008 : Managing the Terminal Services - Limits
- Windows Server : Managing the Terminal Services - RDP Permissions
- Windows Server : Configuring TS Remote Desktop Web Connection
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us