Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2008 R2 : Traditional VPN Scenario (part 2) - Setting Up the Network Policy Server & Configuring the Network Policy Server

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/20/2011 5:25:52 PM

Setting Up the Network Policy Server

The next major step is to install the Network Policy Server (NPS) on the NPS1 server, which will provide services to create and enforce NAP policies. To install the NPS, complete the following steps:

1.
Launch Server Manager.

2.
In the Roles Summary pane, select Add Roles to start the wizard.

3.
Click Next.

4.
Select the Network Policy and Access Services role, and click Next.

5.
Click Next.

6.
Select the Network Policy Server role service, and click Next.

7.
Click Install to install the role service.

8.
When the installation finishes, click Close to exit the wizard.

The NPS role could be installed on the VPN server, which will be installed next. However, the NPS system would likely be used by multiple entities, so a best practice is to host it on a separate server.

Configuring the Network Policy Server

The next step is to configure the NPS with the appropriate policies to validate and enforce security. This consists of the following elements:

  • Health validators

  • Health policy

  • Network policy

  • Connection request policies

  • RADIUS client

Because of the interdependencies, they should be configured in the order presented. To set up the health validators in the NPS, execute the following steps:

1.
On the NPS system, select Start, Administrative Tools, Network Policy Server to launch the MMC.

2.
Expand the Network Access Protection folder, and expand the System Health Validators folder.

3.
Expand the Windows Security Health Validation folder and click Settings.

4.
Right-click the default configuration and select Properties.

5.
Uncheck all options except for the Firewall option. The configuration should look like the example shown in Figure 4.

Figure 4. Validator configuration.


6.
Click OK.

The validator properties are now configured and a health policy needs to be created to use the validator. To configure the health policy, execute the following steps:

1.
In the Network Policy Server MMC, expand the Policies folder and select the Health Policies folder.

2.
Select Action, New to create a new health policy.

3.
Enter Pass for the policy name.

4.
Under Client SHV Checks, ensure that the Client Passes All SHV Checks is selected.

5.
Select the Windows Security Health Validator in the SHVs Used in This Health Policy window.

6.
Click OK to save the health policy.

7.
Select Action, New to create a new health policy.

8.
Enter Fail for the policy name.

9.
Under Client SHV Checks, ensure that the Client Fails One or More SHV Checks option is selected.

10.
Select Windows Security Health Validator in the SHVs Used in This Health Policy window.

11.
Click OK to save the health policy.

Now the conditions (that is, that the firewall is enabled) for the health of a connecting system are established. Now the network policies for systems that pass or fail the health validation need to be created. These policies are separate, so there will be one policy for passing and one policy for failing.

The first part is to configure a network policy that will allow clients that pass the health validation to connect to the network:

1.
In the Network Policy Server MMC, expand the Policies folder, and select the Network Policies folder.

2.
Disable the two default policies in the middle pane by selecting each one and then selecting Action, Disable. They should both show as grayed out when this is done.

3.
Select Action, New to create a new network policy.

4.
Enter Pass Allow Access for the policy name.

5.
Select Remote Access Server (VPN Dial-Up) for the type of network access server.

6.
Click Next.

7.
Click the Add button to specify conditions.

8.
Select Health Policies and click the Add button.

9.
Select the previously created Pass health policy from the drop-down list, and click OK.

10.
Click Next.

11.
Leave the default Access Granted option, and click Next.

12.
Leave the default authentication methods, and click Next.

13.
Leave the default constraints, and click Next.

14.
In the Configure Settings options, select NAP Enforcement.

15.
Leave the default Allow Full Network Access, which will allow the clients that pass the health validation to connect, and click Next.

16.
Click Finish to complete the network policy.

The next step is to configure a network policy for those clients that fail the health validation:

1.
With the Network Policies folder highlighted, select Action, New to create a new network policy.

2.
Enter Fail Limit Access for the policy name.

3.
Select Remote Access Server (VPN Dial-Up) for the type of network access server.

4.
Click Next.

5.
Click the Add button to specify conditions.

6.
Select Health Policies and click the Add button.

7.
Select the previously created Fail Health Policy from the drop-down list, and click OK.

8.
Click Next.

9.
Leave the default Access Granted option, and click Next. It might be counterintuitive to grant access, but we will be configuring the policy to remediate the condition rather than deny access outright.

10.
Leave the default authentication methods, and click Next.

11.
Leave the default constraints, and click Next.

12.
In the Configure Settings options, select NAP Enforcement.

13.
Select Allow Limited Access, which will limit the clients that fail the health validation.

14.
Ensure that the default Auto-remediation option is set to Enable Auto-remediation of Client Computers.

15.
Click the IP Filters option in the Settings window.

16.
Click the Input Filters button in the IPv4 window.

17.
Click New to add a filter for the domain controller DC1, which is 172.16.1.100 in this example.

18.
Check the Destination Network check box, and enter the IP address for the domain controller (172.16.1.100) and a subnet mask of 255.255.255.255.

Note

The subnet mask of 255.255.255.255 restricts the access to a single IP address. If a range of IP addresses were needed—for example, a class C subnet (192.168.99.x) that the quarantined client could access—then an address such as 192.168.99.0 and a subnet mask of 255.255.255.0 could be used to permit the clients to access the entire IP address range.

19.
Click OK to close the window.

20.
Select Permit Only the Packets Listed Below, and click OK.

21.
Click the Outbound Filters button in the IPv4 window.

22.
Click New to add a filter for the domain controller DC1.

23.
Check the Source Network check box, and enter the IP address for the domain controller (172.16.1.100) and a subnet mask of 255.255.255.255.

24.
Click OK to close the window.

25.
Select Permit Only the Packets Listed Below, and click OK.

26.
Click Next.

27.
Click Finish to complete the network policy.

Now that the health and network policies have been configured, the next step is to configure the connection request policy. To configure the connection policy, execute the following steps:

1.
In the Network Policy Server MMC, expand the Policies folder, and select the Connection Request Policies folder.

2.
Highlight the Use Windows Authentication for All Users policy, and select Action, Disable.

3.
Select Action, New to create a new connection request policy.

4.
Enter RAS connections for the policy name.

5.
Select Remote Access Server (VPN Dial-Up) for the type of network access server, and click Next.

6.
In the Specify Conditions window, click the Add button to create a new condition.

7.
Select Client IPv4 Address and click the Add button.

8.
Enter the IP address of the RADIUS client, which is the VPN server VPN1 in this example (172.16.1.152), and click OK.

9.
Click Next.

10.
Leave the default Authenticate Requests on This Server, and click Next.

11.
In the Specify Authentication Methods window, check the Override Network Policy Authentication Settings check box.

12.
Click the Add button in the EAP Types window.

13.
Select Microsoft: Protected EAP (PEAP), and click OK.

14.
Click the Add button again in the EAP Types window.

15.
Select Microsoft: Secured Password (EAP-MS-CHAP v2), and click OK.

16.
Select Microsoft: Protected EAP (PEAP) in the EAP Types window, and click Edit.

17.
Verify that the certificate requested earlier in the section is selected based on the FQDN in the friendly name.

18.
Click OK to close the window.

19.
Click Next at the Configure Settings window.

20.
Verify settings to ensure that they look similar to Figure 5.

Figure 5. PEAP properties.

21.
Click Finish to create the connection request policy.

The next step is to configure the RRAS server as a RADIUS client on the NPS system. This requires using a shared secret password, which in this example is “Secret Password.” To configure the RADIUS client, execute the following steps:

1.
In the Network Policy Server MMC on NPS1, expand the RADIUS Clients and Servers folder.

2.
Select the RADIUS Clients folder and select Action, New RADIUS Client.

3.
Enter the friendly name for the client—in this example, VPN1.

4.
Enter the FQDN or IP address for the client—in this example, 172.16.1.152, as shown in Figure 6.

Figure 6. RADIUS client configuration.


5.
In the Shared Secret text box, enter the secret password Secret Password.

6.
In the Confirm Shared Secret text box, enter the secret password again.

7.
Select the Advanced tab and check the RADIUS Client Is NAP-Capable check box.

8.
Click OK to create the RADIUS client.

The Network Policy Server configuration is now complete on NPS1. The next step is to create the RRAS server.

Other -----------------
- Windows Server 2008 R2 : Traditional VPN Scenario (part 1) - Setting Up the Certificate Server & Certificate Autoenrollment
- Installing Exchange Server 2010 : Understanding the Active Directory Requirements for Exchange Server 2010
- Installing Exchange Server 2010 : Understanding the Prerequisites for Exchange Server 2010
- Installing Exchange Server 2010 : Understanding the Exchange Server 2010 Server Roles
- Active Directory Domain Services 2008 : View Schema Class and Attribute Definitions
- Active Directory Domain Services 2008 : Apply Active Directory Schema Administrative Permissions
- Active Directory Domain Services 2008 : Install the Active Directory Schema Snap-In
- Microsoft Content Management Server : Deleting Objects
- Microsoft Content Management Server : Managing Resources (part 2) - Replacing Resources
- Microsoft Content Management Server : Managing Resources (part 1) - Creating Resources
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server