1 / 26

Windows Network Policy Server Fundamentals

Windows Network Policy Server Fundamentals. Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India http://ranjanajain.spaces.live.com. What Will We Cover?. Network Policy Server Architecture and Functionality

rob
Download Presentation

Windows Network Policy Server Fundamentals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Windows Network Policy Server Fundamentals Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India http://ranjanajain.spaces.live.com

  2. What Will We Cover? • Network Policy Server Architecture and Functionality • Deploying and configuring Network Access Protection (NAP) • Monitoring NPS for High Availability

  3. Helpful Experience • Understanding of network access • Familiarity with DHCP • Familiarity with RADIUS Level 300

  4. Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda

  5. The Core IO Model Identity and Access Management Desktop, Device, and Server Management Security and Networking Data Protection and Recovery IT Management and Security Process CROSS-MODEL ENABLERS • Identity • Presence • Rights Management • Network Access

  6. What is Network Policy Server?

  7. NPS Authentication Process User requests access to port Forwards credentials and connection details Evaluates connection and forwards credentials for authentication Network device asks user for credentials If policy matches, and user is authentic, access allowed Device allows access

  8. Demonstration Environment

  9. Demo demonstration • Reviewing Network Policies • Tour the NPS Console • Configure NAP Server Settings • Configure NAP Policies and Elements

  10. Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda

  11. How NAP Works Not Compliant Remediation Servers Policy Compliant Active Directory Network Access Requests Windows Client Health Statements NPS SHA Restricted Network SHV QA Network Access Devices QS EC Corporate Network

  12. Demo demonstration • Configuring NAP for DHCP • Enable and Configure Client Settings • Configure DHCP Server • Test Client Access

  13. Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda

  14. Deployment Best Practices • Install NPS on the Domain Controller • Use RADIUS to distribute requests • Specify RADIUS client IP addresses • Specify permission by RAP • Log wisely

  15. Debug Tracing Logs RADIUS Server and Proxy Authentication, Mapping, Validation Policy and Quarantine Evaluation File and Database Logging iasrad.log IASSAM.log IASNAP.log IASACCT.log

  16. Network Monitor Corporate Network

  17. Demo demonstration • Examining Connection Trace Logs • Examine Event Logs • Examine Connection Logs

  18. Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda

  19. NPS as a RADIUS Proxy NPS RADIUS Proxy Server

  20. NPS Load Balancing

  21. Demo demonstration • Configuring Load Balancing • Export Settings and Create Clone Configuration • Set Up NPS as a RADIUS Proxy

  22. Windows Server 2008 + Windows Vista More Efficient Management Single worldwide servicing model Event forwarding between client and server Faster and more reliable remote operating system deployments Network Access Protection ensures health of connecting systems Greater Availability Scalable print servers with client-side rendering Transparent offline experience with client-side caching Transactional File System for file and registry operations Policy-based Quality of Service to prioritize application bandwidth  Faster Communications Fast enterprise class search on clients and servers Faster networking with new TCP/IP stack and native IPv6 Improved file-sharing performance over high-latency links Integratedremote access to internal applications and resources

  23. Session Summary • NPS and NAP can be used to protect networks • Policy rules may be extremely fine-grained • NPS is a very flexible server application

  24. For More Information Visit TechNet at:www.microsoft.com/technet www.microsoft.com/nap

  25. Where Else Can I Get Help? • Live Events and Online webcast Series • My Blog: http://ranjanajain.spaces.live.com • Chats, Newsgroups, Forums and Virtual Labs • Local Locator for Professional User Groups groups.msn.com/itdelhiug

  26. THANK YOU

More Related