programming4us
           
 
 
Windows Server

Windows Server 2008 : Working with NAP (part 8) - 802.1x Enforcement

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
11/29/2010 5:31:22 PM

IEEE 802.1x standards define an effective framework for controlling and authenticating clients to a wired or wireless protected network—in this case a NAP infrastructure. These standards define port-based authentication on supported devices. These devices could be switches or wireless access points that support the IEEE 802.1x standard. The IEEE standard is significant it has been accepted by hardware and software vendors—their products will be designed with the standards in mind. What does this mean for you and me? All hardware that is 802.1x based should work with RADIUS and NAP.

An 802.1x deployment consists of three major components that allow for the authentication process to work correctly (see Figure 17).

  • Supplicant a device that requests access to our network and is connected via a pass-through authenticator.

  • Pass-through authenticator a switch or access point that is 802.1x compliant.

  • Authentication server when the supplicant connects to the pass-through authenticator, the request is passed to the authentication server by the pass-through authenticator. The authentication server decides whether the client is granted access or denied.

Figure 17. Components of 802.1x


Authentication is handled using the Extensible Authentication Protocol (EAP). EAP messages used in the authentication process are transmitted between the supplicant and pass-through authenticator using EAP over LAN (EAPoL). The pass- through authenticator talks to the RADIUS using RADIUS messages and EAP.

When NAP uses IEEE 802.1x, the authenticating pass-through authenticator uses the RADIUS protocol. NPS instructs the pass-through authenticator (wireless access-point or switch) to place supplicants that are not in compliance with NPS into a restricted network. The restricted network could be a separate VLAN or a network with IP filters in place to isolate it from the secured network.

Tip

While studying for this exam, keep a list of new terms written down somewhere. This step will make for a great review tool on test day. Also, notice in the last section we used terminology like supplicant instead of computer or device. Always use the Microsoft terminology when studying—it will benefit you later!


Exercise 6: Configure NAP Client Authentication Methods

In this exercise, we are going to configure a Windows Vista client authentication method.

1.
Click Start, right-click Network and then Properties.

2.
Click Manage network connections.

3.
Right-click Local Area Connection and then click Properties. See Figure 18.



Figure 18. Windows Vista Network Properties


4.
Click the Authentication tab and verify that Enable IEEE 802.1x authentication is selected.

5.
Click Setting. See Figure 19.

Figure 19. Protected EAP Properties


6.
In the Protected EAP Properties dialog box, clear the Enable Fast Reconnect check box and verify that only the following check box is selected—Enable Quarantine checks.

7.
Close all property sheets.


Tip

When you get to the test center and check in, you will be taken to your workstation and given an erasable board or paper. Use this to your advantage. Before you begin the examination, write down any network designs or acronyms you are afraid that you may forget.

Other -----------------
- Windows Server 2008 : Configuring Remote Access (part 6)
- Windows Server 2008 : Configuring Remote Access (part 5) - Virtual Private Networks
- Windows Server 2008 : Configuring Remote Access (part 4)
- Windows Server 2008 : Configuring Remote Access (part 3)
- Windows Server 2008 : Configuring Remote Access (part 2) - Network Policy Server and Network Access Protection
- Windows Server 2008 : Configuring Remote Access (part 1) - Routing and Remote Access Services
- Windows Server 2008 : Configuring Wireless Access
- Windows Server 2008: Configuring Routing
- Windows Firewall with Advanced Security in Windows Server 2008 (part 3)
- Windows Firewall with Advanced Security in Windows Server 2008 (part 2)
- Windows Firewall with Advanced Security in Windows Server 2008 (part 1)
- Windows Server 2008 : Configuring IP Security (IPsec)
- Windows Server 2008 : Configuring Network Authentication (part 2)
- Windows Server 2008 : Configuring Network Authentication (part 1)
- Windows Server 2008 : Configuring IPv4 and IPv6 Addressing
- Windows Server 2008 : Managing the Terminal Services - Displaying Data Prioritization
- Windows Server 2008 : Managing the Terminal Services - Viewing Processes & Monitoring Sessions
- Windows Server 2008 : Managing the Terminal Services - Limits
- Windows Server : Managing the Terminal Services - RDP Permissions
- Windows Server : Configuring TS Remote Desktop Web Connection
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us