{"id":1409,"date":"2014-01-17T09:15:55","date_gmt":"2014-01-17T15:15:55","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1409"},"modified":"2015-04-24T16:44:50","modified_gmt":"2015-04-24T21:44:50","slug":"nap-enforcement-network-access-protection","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/nap-enforcement-network-access-protection\/","title":{"rendered":"NAP Enforcement (Network Access Protection)"},"content":{"rendered":"<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><em>NAP or Network Access Protection<\/em> is a Windows Server security mechanism which enables you to control how computers gain access to network resources. The main functionality of NAP is to verify and ensure that only healthy computers will be marked as compliant and will receive network access. In this article we will talk about some of the enforcement technologies available with NAP. These technologies are responsible for allowing or denying network access for NAP clients. There are four main enforcement types available with NAP as follows: <em>IPSec, DHCP, VPN and 801.2X<\/em>. Within a network you can configure one or multiple enforcement types and these technologies should be chosen according to the network\u2019s infrastructure and requirements.<\/span><\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color: rgb(0, 128, 0);\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong><em>DHCP Enforcement<\/em><\/strong> <\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">\u2013 Uses a Windows Server that has the <em>Dynamic Host Control Protocol (DHCP)<\/em> service running. Compliant computers will gain network access while non-compliant computers can be either redirected to remediation servers or denied network access. Once you\u2019ve <a href=\"http:\/\/www.ittrainingday.com\/2013\/11\/deploying-dhcp-server.html\" rel=\"nofollow\" target=\"_blank\">installed and configured DHCP<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> you\u2019ll need to add the <em>Network Policy and Access Services<\/em> role to your Windows Machine. If you need to configure additional DHCP options, check this article from <a href=\"http:\/\/www.ittrainingday.com\/2013\/11\/exploring-dhcp-server-properties.html\" rel=\"nofollow\" target=\"_blank\">IT training day<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. Note that for these demonstrations I will be using a Windows Server 2012 machine. After you add the <em>Network Policy and Access Services role<\/em>, open the NPS console and configure NAP using the wizard:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/01-Select-NAP-Network-Connection-Method.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Select NAP Network Connection Method\" class=\"alignnone size-full wp-image-1442\" height=\"458\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/01-Select-NAP-Network-Connection-Method.png\" style=\"\" title=\"Select NAP Network Connection Method\" width=\"410\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/01-Select-NAP-Network-Connection-Method.png 572w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/01-Select-NAP-Network-Connection-Method-268x300.png 268w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">If you don\u2019t know how to install and configure NAP using the wizard you should <a href=\"http:\/\/www.ittrainingday.com\/2014\/01\/how-to-install-and-configure-nap-server.html\" rel=\"nofollow\" target=\"_blank\">check this link<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> for further instructions. Once NAP has been configured for the DHCP server, you\u2019ll need to enable NAP for the desired DHCP scopes. To enable NAP <em>enforcement for all DHCP scopes<\/em>, open the <em>DHCP console <\/em>and navigate to the <em>IPv4 <\/em>section, <em>right click<\/em> and select <em>Properties<\/em>:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/02-DHCP-Console-Properties-All-DHCP-Scopes.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"DHCP Console Properties - All DHCP Scopes\" class=\"alignnone size-full wp-image-1437\" height=\"496\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/02-DHCP-Console-Properties-All-DHCP-Scopes.png\" style=\"border: 1px solid black;\" title=\"DHCP Console Properties - All DHCP Scopes\" width=\"673\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/02-DHCP-Console-Properties-All-DHCP-Scopes.png 673w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/02-DHCP-Console-Properties-All-DHCP-Scopes-300x221.png 300w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Navigate to the <em>Network Access Protection<\/em> tab and just under the <em>Network Access Protection Settings <\/em>section, click the button <em>enable on all scopes. <\/em>You can configure what behavior the DHCP server takes in case the <em>Network Policy Server (NPS)<\/em> is unreachable. There are three options available as follows:<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><em>Full Access<\/em> \u2013 all NAP clients will receive network access even if they are not compatible with NAP\u2019s policies.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><em>Restricted Access<\/em> \u2013 devices that are not compliant with the network\u2019s requirements will receive access to the remediation servers to fix any problems regarding their health state.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><em>Drop Client Packet<\/em> \u2013 the server will drop the connection with non-compatible NAP clients requesting access to the network.<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/03-IPv4-Properties-Network-Access-Protection.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"IPv4 Properties - Network Access Protection\" class=\"alignnone size-full wp-image-1438\" height=\"477\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/03-IPv4-Properties-Network-Access-Protection.png\" style=\"\" title=\"IPv4 Properties - Network Access Protection\" width=\"411\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/03-IPv4-Properties-Network-Access-Protection.png 411w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/03-IPv4-Properties-Network-Access-Protection-258x300.png 258w\" sizes=\"auto, (max-width: 411px) 100vw, 411px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">If you want to enable <em>NAP enforcement for a single scope<\/em>, navigate to the desired scope section and select <em>Properties<\/em>:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/04-NAP-Enforcement-for-a-Single-Scope.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"NAP Enforcement for a Single Scope\" class=\"alignnone size-full wp-image-1439\" height=\"361\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/04-NAP-Enforcement-for-a-Single-Scope.png\" style=\"border: 1px solid black;\" title=\"NAP Enforcement for a Single Scope\" width=\"739\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/04-NAP-Enforcement-for-a-Single-Scope.png 798w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/04-NAP-Enforcement-for-a-Single-Scope-300x146.png 300w\" sizes=\"auto, (max-width: 739px) 100vw, 739px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Now navigate to the <em>Network Access Protection tab<\/em> and <em>enable <\/em>this feature for the scope. You can use the default NAP profile or use a custom profile.<\/span><\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color: rgb(0, 128, 0);\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong><em>802.1X Enforcement <\/em><\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">\u2013 This NAP enforcement takes advantage of 802.1X compatible switches and APs (access points) to authenticate computers. The server running the NPS service will check each computer before it is authenticated and if the health state is not compatible with the network\u2019s requirements, the computer will be redirected to the remediation network. Switches and Access Points use special filters such as <em>ACLs (Access Control Lists)<\/em> and\/or <em>VLANs (Virtual Local Area Network)<\/em> to separate non-compliant computers from the rest of the network.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">You\u2019ll need to configure NAP for <em>IEEE 802.1X Wired or Wireless<\/em> networks using the <em>Wizard<\/em>:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/05-Configure-NAP.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Configure NAP\" class=\"alignnone size-full wp-image-1440\" height=\"550\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/05-Configure-NAP.png\" style=\"\" title=\"Configure NAP\" width=\"491\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/05-Configure-NAP.png 566w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/05-Configure-NAP-267x300.png 267w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">When enabling <em>PEAP Protected Extensible Authentication Protocol for 802.1X NAP enforcement<\/em>, you\u2019ll need to install a <em>server certificate<\/em> from a <em>Certification Authority (CA)<\/em> trusted by the NAP clients. The best thing to do is to <em>enable auto-enrollment<\/em> on your local CA. If you don\u2019t know how to enable this feature then check out one of our past articles about <a href=\"\/blog\/part-2-how-to-configure-a-public-key-infrastructure-on-a-windows-server\/\">implementing a PKI (Public Key Infrastructure) using Windows Servers.<\/a> The wizard will also require you to configure NAP exemptions which basically means group of devices that are not checked for compatibility by NAP\u2019s health validation. Once the wizard is complete, the NAP service will start and your clients will be able to access the network if the NAP validation is completed successfully.<\/span><\/span>\n<\/p>\n<h2>\n\t<span style=\"color:#008000;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong><em>VPN Enforcement <\/em><\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">\u2013 When NAP is configured for VPN enforcement, it will verify each remote client that is trying to authenticate within the network. There are several steps that you need to take to successfully deploy NAP for VPN. You\u2019ll need to install <em>Routing and Remote Access services<\/em> and configure it as a <em>VPN server<\/em>. You will then configure the server running the NPS service as the <em>RADIUS server<\/em> in Routing and Remote Access.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">The NPS server will be configured using the <em>Wizard<\/em> by specifying the <em>Virtual Private Network (VPN)<\/em> as the network connection method. Also note that In NPS, the VPN servers will be configured as RADIUS clients:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2014\/01\/06-NPS-Server-VPN-Network-Connection-Method.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"NPS Server - VPN Network Connection Method\" class=\"alignnone size-full wp-image-1441\" height=\"589\" src=\"\/blog\/wp-content\/uploads\/2014\/01\/06-NPS-Server-VPN-Network-Connection-Method.png\" style=\"\" title=\"NPS Server - VPN Network Connection Method\" width=\"526\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/06-NPS-Server-VPN-Network-Connection-Method.png 568w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/01\/06-NPS-Server-VPN-Network-Connection-Method-267x300.png 267w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Once the Certification Authority is deployed and the certificate has been installed on the server, the VPN enforcement can be installed.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:14px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">NAP also supports IPSec enforcement with Windows OS but, it\u2019s a long story and cannot be covered in this article. If you are interested in discovering IPSec enforcement installation and configuration, check out <a href=\"http:\/\/www.ittrainingday.com\/2014\/01\/configure-ipsec-for-nap-enforcement.html\" rel=\"nofollow\" target=\"_blank\">this article<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. Hope you\u2019ve understood the main principles behind NAP enforcement, share this article to others interested in this topic. Wish you all the best and stay tuned for the following articles.<\/span><\/span>\n<\/p>\n<p>\n\tFeatured Photo Credit: <a href=\"http:\/\/www.flickr.com\/photos\/88913244@N00\/2299387865\/\" rel=\"nofollow\" target=\"_blank\">Alain-Christian<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> via <a href=\"http:\/\/compfight.com\" rel=\"nofollow\" target=\"_blank\">Compfight<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\" rel=\"nofollow\" target=\"_blank\">cc<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NAP or Network Access Protection is a Windows Server security mechanism which enables you to control how computers gain access to network resources. The main functionality of NAP is to verify and ensure that only healthy computers will be marked as compliant and will receive network access. In this article we will talk about some [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,9,8],"tags":[],"class_list":["post-1409","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1409\/revisions"}],"predecessor-version":[{"id":3539,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1409\/revisions\/3539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1444"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}