Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 : Enforcing Policy Settings with a Network Policy Server (part 2)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
4/21/2011 3:38:43 PM

Creating a Network Policy for Noncompliant Clients

After a network policy has been made for compliant clients, an equivalent policy needs to be created for noncompliant clients. The process is similar, with a few changes as follows:

1.
From the Network Policy MMC tool, navigate to Policies, Network Policies from the node pane.

2.
Right-click the Network Policies node, and choose New.

3.
On the Specify Network Policy Name and Connection Type page, shown in Figure 6, enter a descriptive policy name, such as NonCompliant-Network-Restricted-Access, and click Next (leave the type of server as Unspecified).

Figure 6. Creating a network policy for noncompliant clients.

4.
On the Specify Conditions page, click the Add button.

5.
Select Health Policies from the list, and click the Add button.

6.
From the list of health policies, choose the NonCompliant-Clients policy previously created, as shown in Figure 7, and click OK.

Figure 7. Adding the noncompliant client’s health policy to the network policy.


7.
Click Next to continue.

8.
On the Specify Access Permission page, shown in Figure 8, select the Access Granted option button, and click Next to continue.

Figure 8. Specifying access permission to the network policy.

Note

It might seem counterintuitive to select the Access Granted option button for a noncompliant network policy. It’s important to note, however, that this simply means that the access is granted to the policy itself, not to the network. If the Access Granted option is not selected, the policy will not work.

9.
On the Configure Authentication Methods page, select only the Perform Machine Health Check Only check box and deselect any other ones. Click Next to continue.

10.
On the Configure Constraints page, leave the defaults in place, and click Next.

11.
On the Configure Settings page, select NAP Enforcement and select the Allow Limited Access option button, as shown in Figure 9. If auto remediation will be enabled (allowing the server to access other servers such as WSUS or DNS), then check the Enable Auto-remediation of Client Computers check box. Click Next to continue.

Figure 9. Configuration Settings options for NAP Enforcement.

12.
Click Finish to complete the wizard.

After all five steps have been performed on the NPS system, the individual services can be integrated with the NPS system to restrict clients based on the health and network policies that were created. This includes the DHCP Server role and the services that control 802.1X and RRAS for VPN. In this example, we will configure the DHCP role to block clients based on the SHV that we created in the earlier steps.

Configuring a DHCP Server to Restrict Client Leases Based on the NPS Policy

After the NPS policies have been created, the DHCP server and DHCP scope used can be configured to use NAP settings to validate the client health before granting IP addresses. In the example we’ve been using so far, this would restrict only those clients with a valid and up-to-date antivirus application from getting a DHCP address.

To configure the DHCP scope for NPS, do the following:

1.
On the DHCP server, open the DHCP MMC tool (Start, All Programs, Administrative Tools, DHCP).

2.
Navigate to SERVERNAME, IPv4, Scope Name.

3.
Right-click Scope Name, and choose Properties.

4.
Select the Network Access Protection tab, and click the Enable for This Scope option button, as shown in Figure 10. Click OK to save the changes.

Figure 10. Enabling NAP on a DHCP scope.


After enabling NAP on a Scope, individual scope options can be configured for noncompliant clients. These scope options appear under the User Class named Default Network Access Protection Class, as shown in Figure 11. By not configuring any scope options, the clients effectively have no DHCP access to resources. Or, in a different example, you could configure the clients to use an alternate DNS server for remediation. Scope options can be configured by right-clicking on the Scope Options node under the Scope Name and choosing Configure Options. Click the Advanced tab to view the classes and options.

Figure 11. Configuring DHCP scope options for noncompliant NAP clients.


Note

The default User Class is used for compliant NAP clients—the Default Network Access Protection Class is used for noncompliant clients.

Other -----------------
- Administering an Exchange Server 2010 Environment : Server Administration
- Administering an Exchange Server 2010 Environment : Exchange Server Coexistence
- Administering an Exchange Server 2010 Environment : Using the Exchange Server 2010 Toolbox (part 2)
- Administering an Exchange Server 2010 Environment : Using the Exchange Server 2010 Toolbox (part 1)
- SharePoint 2010 : Document Library Settings Page Tools Reviewed (part 3)
- SharePoint 2010 : Document Library Settings Page Tools Reviewed (part 2)
- SharePoint 2010 : Document Library Settings Page Tools Reviewed (part 1) - Versioning Settings
- BizTalk 2010 Recipes : Adapters - Configuring SMTP Send Ports
- BizTalk 2010 Recipes : Adapters - Configuring File Receives
- BizTalk 2010 Recipes : Adapters - Configuring File Sends
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server