Top Banner
70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure
27

70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

Jan 12, 2016

Download

Documents

Brett Sutton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

70-411: AdministeringWindows Server 2012

Chapter 4Configure a Network Policy Server

Infrastructure

Page 2: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

Objective 4.1: Configuring a Network

Policy Server

Page 3: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 3

RADIUS TermsNetwork Policy Server (NPS): Microsoft’s

RADIUS server. Authorization: The process that determines

what a user is permitted to do on a computer system or network.

RADIUS client: A server or device that forwards RADIUS requests to a RADIUS server.

Access client: A computer or device that contacts or connects to a RADIUS client, which requires authentication and authorization to connect.

Page 4: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 4

A Network with RADIUS

RADIUS servers and clients

Page 5: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 5

Configuring RADIUS Server InfrastructuresMultiple RADIUS server configurations:• Primary RADIUS server and alternate

RADIUS servers• A RADIUS proxy located between the

RADIUS server and the RADIUS clients

Page 6: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 8

Configuring RADIUS Accounting

Page 7: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 10

Using Password-Based Authentication

• The network access server passes the username and password to the NPS server.

• The NPS server verifies the credentials against the user account database.o Processed from the most secure (Microsoft

Challenge-Handshake Authentication Protocol v2 or MS-CHAPv2) to the least secure (unauthenticated access) of those enabled options.

• For stronger security, use certificate authentication or multi-factor authentication.

Page 8: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 11

Using Certificates for Authentication

• Much stronger than password-based authentication methods

• Certificates are:o Customized using certificate templateso Issued using a Certificate Authority

• If smart cards are used, certificates must include:o Smart Card Logon purposeo Client Authentication purpose

Page 9: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

Objective 4.2: Configuring NPS Policies

Page 10: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 14

Network Policy Server (NPS) Policies

•Specifies which RADIUS servers perform authentication, authorization, and accounting

Connection Request

•Specifies who is authorized to connect to the network and circumstances under which they can or cannot connect

Network

•Establishes system health validators (SHVs) and other settings that define client computer configuration requirements for NAP-capable computers

Health

Page 11: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 15

Configuring Connection Request

PoliciesConnection request polices are based on a range of factors such as: • The time of day and day of the week• The realm name in the connection request• The type of connection requested• The IP address of the RADIUS client

Page 12: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 18

Configuring Network Policies

An NPS network policy evaluates remote connections based on these three components:• Conditions• Constraints• Settings

Page 13: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 20

Encryption Options• Basic Encryption (MPPE 40-Bit): For dial-up and PPTP-

based VPN connections, MPPE is used with a 40-bit key. For L2TP/IPsec VPN connections, 56-bit DES encryption is used.

• Strong Encryption (MPPE 56-Bit): For dial-up and PPTP VPN connections, MPPE is used with a 56-bit key. For L2TP/IPsec VPN connections, 56-bit DES encryption is used.

• Strongest Encryption (MPPE 128-Bit): For dial-up and PPTP VPN connections, MPPE is used with a 128-bit key. For L2TP/IPsec VPN connections, 168-bit Triple DES encryption is used.

• No Encryption: This option allows unencrypted connections that match the remote access policy conditions. Clear this option to require encryption.

Page 14: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 21

IP AddressingIP settings include these options:• Server Must Supply An IP Address• Client May Request An IP Address• Server Settings Determine IP Address

Assignment (the default setting)• Assign A Static IP Address

Page 15: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

Objective 4.3: Configuring Network Access Protection (NAP)

Page 16: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 24

Network Access Protection (NAP)

• NAP is Microsoft’s software for controlling network access for computers based on the health of the host.

• NAP can be used on any computer that runs Windows and supports NAP.

• Types of computers that connect to a network: o Desktop computerso Roaming laptopso Unmanaged home computerso Visiting laptops

Page 17: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 25

NAP Built-In Enforcement Methods

DHCP IPsec

VPN 802.1x

Remote Desktop Gateway (RD

Gateway)

Page 18: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 26

DHCP EnforcementTo control network access, DHCP enforcement sets the following:• DHCP Router option is set to 0.0.0.0 so

noncompliant computers do not have a configured default gateway.

• Subnet mask is set to 255.255.255.255 so that there are no routes to the attached subnet.

Page 19: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 27

NAP Architecture Components

NAP client-side components

NAP enforcement points

NAP health policy server

System Health Agents (SHAs)

Page 20: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 28

NAP Architecture Components (cont.)

Statement of Health (SoH)

NAP Agent

Health Registration Authority (HRA)

Health requirements server

Remediation servers

Page 21: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 30

System Health Validators

• System Health Validators (SHVs) settings define the requirements for client computers that connect to your network.

• You configure SHVs using the Network Policy Server console.

• Windows 8 includes a Windows Security Health Validator SHA that monitors the Windows Security Center settings.

• Windows Server 2012 includes a corresponding Windows Security Health Validator SHV.

Page 22: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 31

Configuring System Health Validators

SHV options:• Firewall Settings• Antivirus Settings• Spyware Protection Settings• Automatic Updates Settings• Security Updates Settings

Page 23: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 32

Configuring Health Policies

• Health policies consist of one or more system health validators and other settings that enable you to define client computer configuration requirements for the NAP-capable computers that attempt to connect to your network.

• Health policy pairs:o NAP-complianto NAP-noncompliant

Page 24: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 33

Configuring Health Policies

NAP enforcement settings:• NAP DHCP-compliant: Allow full network

access.• NAP DHCP-noncompliant: Allow limited

access.• NAP DHCP nonNAPcapable properties:

Allow full network access.

Page 25: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 34

Configuring Isolation and Remediation

• If a computer is noncompliant, it should be isolated from production network.

• When you configure NAP, you can configure either a monitor only policy or an isolation policy.

Page 26: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 35

Configuring Isolation and Remediation

Remediation servers typically consist of:• DHCP servers to provide IP configuration• Naming servers including DNS servers and

WINS servers• Active Directory domain controllers (read-

only domain controllers are recommended to minimize security risks)

• Internet proxy servers so that noncompliant NAP clients can access the Internet

Page 27: 70-411: Administering Windows Server 2012 Chapter 4 Configure a Network Policy Server Infrastructure.

© 2013 John Wiley & Sons, Inc. 37

Configuring NAP Client Settings

• You can use the Enable Security Center in the Group Policy procedure to enable Security Center on NAP-capable clients using Group Policy.

• Some NAP deployments that use Windows Security Health Validator require Security Center.

• Open the Services console to start and set the startup type to Automatic in the Network Access Protection Agent service.