{"id":2785,"date":"2014-10-13T09:07:59","date_gmt":"2014-10-13T14:07:59","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2785"},"modified":"2015-04-24T15:09:03","modified_gmt":"2015-04-24T20:09:03","slug":"configure-network-address-protection-w-dhcp-enforcement","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/configure-network-address-protection-w-dhcp-enforcement\/","title":{"rendered":"Configure Network Address Protection w\/ DHCP Enforcement"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/network-adress-protection.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2801\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/network-adress-protection-300x300.jpg\" alt=\"Network Adress Protection\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/network-adress-protection-300x300.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/network-adress-protection-150x150.jpg 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/network-adress-protection.jpg 400w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\"><\/a>In this article I will <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">show you how to install and configure <i>NAP<\/i> with <i>Dynamic Host Control Protocol (DHCP)<\/i> enforcement. You may already be familiar with DHCP which is a service used to allocate network parameters automatically and offers a centralized way to manage your network devices. <i>NAP<\/i> is a security mechanism offered by the <i>Network Policy and Access Server Role<\/i> that helps you in managing the health and security of the network. With NAP you can define how computers receive network access based on their System health. <\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">By creating benchmarks that define how computers get network access, you protect your network from a potential virus or external security attack. With NAP you can ensure that before computers get network access they have the latest updates installed, the <a title=\"Monitoring remotely through firewalls\" href=\"https:\/\/www.poweradmin.com\/help\/remoteserverports.aspx\">Windows Firewall<\/a> is configured and activated, the antivirus is updated and running and so on.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">NAP uses <i>System Health Agents<\/i> and <i>Validators<\/i> to check the health of network devices against the criteria configured on the NAP Server. <i>SHV (System Health Validators)<\/i> are used to specify the conditions that a NAP client must meet before network access is granted. <i>SHA (System Health Agent)<\/i> is a component used to check if a certain NAP client meets the requirement configured on SHV. With Windows Server 2008 and newer editions you can configure four types of NAP enforcement: <i>IPSec<\/i>, <i>VPN<\/i>, <i>801.1X<\/i> and <i>DHCP<\/i> which we will discuss in this article.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">For this demonstration I will be using a Windows Server 2012 machine that is a<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">lready hosting the DHCP service. For testing purposes I recommend always using a Virtual Machine because you can easily rollback to a previous state if any problems<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\"> occur.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Login on the machine and open the <i>Server Manager<\/i> console. Now click on <i>Add roles and features <\/i>button and select <i>Network Policy and Access Services<\/i> from the available roles list:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2792 size-full\" title=\"Select Server Roles\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/select-server-roles.png\" alt=\"Select Server Roles\" width=\"796\" height=\"562\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/select-server-roles.png 796w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/select-server-roles-300x211.png 300w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">O<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">nce you\u2019ve selected the Role, proceed to the following section by clicking the <i>Next<\/i> button. Select <i>Network Policy Server<\/i> and click the <i>Install<\/i> button:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2788 size-full\" title=\"Install Network Policy Server\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/install-network-policy-server.png\" alt=\"Install Network Policy Server\" width=\"795\" height=\"563\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/install-network-policy-server.png 795w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/install-network-policy-server-300x212.png 300w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Wait until the installation is completed and then close the Wizard.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2796 size-full\" title=\"Add Roles and Features Wizard\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-roles-and-features-wizard.png\" alt=\"Add Roles and Features Wizard\" width=\"796\" height=\"563\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-roles-and-features-wizard.png 796w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-roles-and-features-wizard-300x212.png 300w\" sizes=\"auto, (max-width: 796px) 100vw, 796px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">From <i>Administrative tools<\/i> o<\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">pen the <i>DHCP console<\/i> and <i>expand<\/i> the <i>IPv4 section<\/i>. Now <i>right click<\/i> and select <i>New Scope<\/i><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2789 size-full\" title=\"IPv4 New Scope\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ipv4-new-scope.png\" alt=\"IPv4 New Scope\" width=\"751\" height=\"469\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ipv4-new-scope.png 751w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ipv4-new-scope-300x187.png 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Once the wizard has started, type in a <i>Name<\/i> and <i>Description<\/i> for the new policy and then set the IP Address Range for the scope. I\u2019ll configure the rage to 10.10.10.50 \u2013 10.10.10.100 and set the network mask to \/24 or 255.255.255.0<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2791 size-full\" title=\"New Policy IP Address Range\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/new-policy-ip-address-range.png\" alt=\"New Policy IP Address Range\" width=\"528\" height=\"429\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/new-policy-ip-address-range.png 528w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/new-policy-ip-address-range-300x243.png 300w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">We will not configure any exclusions, delays, lease duration or other options for now so please press <i>Next<\/i> three times and then select <i>No<\/i> at <i>I will Configure These Options Later<\/i> panel.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Now that our scope is prepared, open the <i>Network Policy Server<\/i> console from <i>Administrative <\/i>Tools and select <i>Configure NAP<\/i> to start the wizard.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2797 \" title=\"Configure NAP\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-nap.png\" alt=\"Configure NAP\" width=\"783\" height=\"424\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-nap.png 981w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-nap-300x162.png 300w\" sizes=\"auto, (max-width: 783px) 100vw, 783px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">From the drop down list select <i>Dynamic Host Control Protocol (DHCP)<\/i> and set a name for the NAP policy.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2793 size-full\" title=\"Set Name Dynamic Host Control Protocol\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/set-name-dynamic-host-control-protocol.png\" alt=\"Set Name Dynamic Host Control Protocol\" width=\"568\" height=\"637\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/set-name-dynamic-host-control-protocol.png 568w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/set-name-dynamic-host-control-protocol-267x300.png 267w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">For our testing environment we will not be using a RADIUS server so skip this page and proceed with the next section.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">We\u2019ll need to add our newly created DHCP scope to the <i>NAP<\/i> policy. Click the <i>Add<\/i> button and enter the <i>DHCP<\/i> <i>scope<\/i> <i>name<\/i>.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2795 size-full\" title=\"Add DHCP Scope to NAP Policy\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-dhcp-scope-to-nap-policy.png\" alt=\"Add DHCP Scope to NAP Policy\" width=\"566\" height=\"636\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-dhcp-scope-to-nap-policy.png 566w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/add-dhcp-scope-to-nap-policy-266x300.png 266w\" sizes=\"auto, (max-width: 566px) 100vw, 566px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Skip the following two sections and on the <i>Define NAP Health Policy<\/i> page deselect <i>Enable auto-remediation of client computers. <\/i><a title=\"How to audit Windows logons\" href=\"https:\/\/www.poweradmin.com\/help\/sm_5_6\/howto_audit_logins.aspx\">Windows Security<\/a> Health Validator is selected by default because this is where we define the NAP criteria. All NAP ineligible clients will be denied network access:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2787 size-full\" title=\"Define NAP Health Policy\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/define-nap-health-policy.png\" alt=\"Define NAP Health Policy\" width=\"567\" height=\"636\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/define-nap-health-policy.png 567w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/define-nap-health-policy-267x300.png 267w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Our <i>Connection Request Policy<\/i> will be added on the NAP server. You can further configure its options if you <i>right click<\/i> it and select <i>Properties<\/i>.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2790 size-full\" title=\"NAP DHCP Properties\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/nap-dhcp-properties.png\" alt=\"NAP DHCP Properties\" width=\"738\" height=\"609\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/nap-dhcp-properties.png 738w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/nap-dhcp-properties-300x247.png 300w\" sizes=\"auto, (max-width: 738px) 100vw, 738px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The <i>Windows Security Health Validator<\/i> can be configured from the <i>Network Access Protection<\/i> section:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2794 size-full\" title=\"Windows Security Health Validator Configuration\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/windows-security-health-validator-configuration.png\" alt=\"Windows Security Health Validator Configuration\" width=\"700\" height=\"498\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/windows-security-health-validator-configuration.png 700w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/windows-security-health-validator-configuration-300x213.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\"><\/span><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">You should now have a DHCP NAP enabled server capable of granting or rejecting clients based on the settings specified in the SHV. As you can see, NAP can be installed and configured pretty easily and should provide you an extra security layer within the network. We can also configure <i>Remediation Server Groups <\/i>which can be capable of delivering the latest updates to rejected clients. If you think that there are other things that should be mentioned here, don\u2019t hesitate to use our comments section. Wish you a great day folks!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article I will show you how to install and configure NAP with Dynamic Host Control Protocol (DHCP) enforcement. You may already be familiar with DHCP which is a service used to allocate network parameters automatically and offers a centralized way to manage your network devices. NAP is a security mechanism offered by the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2801,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,9,8],"tags":[],"class_list":["post-2785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2785"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2785\/revisions"}],"predecessor-version":[{"id":3456,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2785\/revisions\/3456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2801"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}