Windows Network Policy Server Fundamentals Ranjana Jain MCSE, MCT, RHCE, CISSP, CIW Security Analyst IT Pro Evangelist Microsoft India
Network Policy Server Architecture and Functionality Deploying and configuring Network Access Protection (NAP) Monitoring NPS for High Availability What Will We Cover?
Level 300 Understanding of network access Familiarity with DHCP Familiarity with RADIUS Helpful Experience
Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda
The Core IO Model CROSS-MODEL ENABLERS IdentityIdentity Presence Presence Rights ManagementRights Management Network AccessNetwork Access Desktop, Device, and Server Management Security and Networking Identity and Access Management Data Protection and Recovery IT Management and Security Process
What is Network Policy Server?
NPS Authentication Process User requests access to port Network device asks user for credentials Forwards credentials and connection details Evaluates connection and forwards credentials for authentication If policy matches, and user is authentic, access allowed Device allows access
Demonstration Environment
Demo Reviewing Network Policies Tour the NPS Console Configure NAP Server Settings Configure NAP Policies and Elements demonstration
Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda
Network Access Requests Not Compliant Policy Compliant How NAP Works Corporate Network Restricted Network Windows Client Network Access Devices NPS Active Directory Remediation Servers Health Statements QA SHA EC QS SHV
Demo Configuring NAP for DHCP Enable and Configure Client Settings Configure DHCP Server Test Client Access demonstration
Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda
Deployment Best Practices Install NPS on the Domain Controller Use RADIUS to distribute requests Specify RADIUS client IP addresses Specify permission by RAP Log wisely
Debug Tracing Logs RADIUS Server and Proxy Authentication, Mapping, Validation Policy and Quarantine Evaluation File and Database Logging
Network Monitor Corporate Network
Demo Examining Connection Trace Logs Examine Event Logs Examine Connection Logs demonstration
Introducing Network Policy Server Deploying and Configuring NAP Best Practices and Troubleshooting Configuring Load Balancing Agenda
NPS as a RADIUS Proxy NPS RADIUS Proxy Server
NPS Load Balancing
Demo Configuring Load Balancing Export Settings and Create Clone Configuration Set Up NPS as a RADIUS Proxy demonstration
Faster Communications Fast enterprise class search on clients and servers Faster networking with new TCP/IP stack and native IPv6 Improved file-sharing performance over high-latency links Integrated remote access to internal applications and resources Windows Server Windows Vista Greater Availability Scalable print servers with client-side rendering Transparent offline experience with client-side caching Transactional File System for file and registry operations Policy-based Quality of Service to prioritize application bandwidth More Efficient Management Single worldwide servicing model Event forwarding between client and server Faster and more reliable remote operating system deployments Network Access Protection ensures health of connecting systems
Faster Communications Fast enterprise class search on clients and servers Faster networking with new TCP/IP stack and native IPv6 Improved file-sharing performance over high-latency links Integrated remote access to internal applications and resources Windows Server Windows Vista - Notes Greater Availability Scalable print servers with client-side rendering Transparent offline experience with client-side caching Transactional File System for file and registry operations Policy-based Quality of Service to prioritize application bandwidth More Efficient Management Single worldwide servicing model Event forwarding between client and server Faster and more reliable remote operating system deployments Network Access Protection ensures health of connecting systems
NPS and NAP can be used to protect networks Policy rules may be extremely fine-grained NPS is a very flexible server application Session Summary
Visit TechNet at: For More Information
Live Events and Online webcast Series My Blog: Chats, Newsgroups, Forums and Virtual Labs Local Locator for Professional User Groups Where Else Can I Get Help? groups.msn.com/itdelhiug
THANK YOU