20411C 08-Edited
20411C 08-Edited
Module 8
• NAP can:
• Enforce health-requirement policies on client computers
• Ensure client computers are compliant with policies
• Offer remediation support for computers that do not
meet health requirements
• NAP cannot:
• Prevent authorized users with compliant computers from
performing malicious activities on the network
• Restrict network access for computers that are running
Windows versions older than Windows XP SP2, when
exception rules are configured for those computers
NAP Scenarios
802.1X enforcement for IEEE • Computer must be compliant to obtain unlimited access
802.1X-authenticated wired or through an 802.1X connection (authentication switch or
wireless connections access point)
VPN enforcement for remote • Computer must be compliant to obtain unlimited access
access connections through a Remote Access Service connection
VPN server
Active IEEE 802.1X
Directory devices
Health
Registration
Authority
Internet
DHCP server NAP Health
Perimeter Intranet Policy server
network
Restricted
network
Remediation NAP client with
servers limited access
Lesson 2: Overview of NAP Enforcement
Processes
IEEE 802.1X
Network Access Devices
IPsec Enforcement
What Is IPsec?
IPsec Authentication and Encryption Options
NAP with IPsec Enforcement Components
How IPsec Enforcement Works
Planning IPsec Logical Networks
Configuring the HRA Server
• Configuring the Certification Authority
What Is IPsec?
• Authentication:
• Kerberos v5
• Certificate authentication
• Preshared key
• Encryption:
• DES
• Triple DES
• AES
• Data integrity:
• Same encryption standards as IPsec encryption
• Data Encryption Standard (DES). DES uses a 56-bit
key, which is considered insecure today.
• Triple DES (3DES). 3DES (pronounced “triple des”)
uses three 56-bit keys by applying DES three times
for encryption.
• Advanced Encryption Standard (AES). Multiple key
lengths are supported: 128, 192, and 256 bits.
Security increases as the key length size increases. The
vast majority of new IPsec implementations use
AES today because it provides the strongest security and
does not require additional administrative
effort.
• NAP enforcement
• Network restriction
• Remediation
Event ID Meaning
Review Question(s)
• Tools