SlideShare uma empresa Scribd logo
1 de 28
Module 6
Installing, Configuring, and
Troubleshooting the
Network Policy Server
Role Service
Module Overview
• Installing and Configuring a Network Policy Server
• Configuring RADIUS Clients and Servers
• NPS Authentication Methods
• Monitoring and Troubleshooting a Network Policy Server
Lesson 1: Installing and Configuring a Network
Policy Server
• What Is a Network Policy Server?
• Demonstration: How to Install the Network Policy Server
• Tools Used for Managing a Network Policy Server
• Demonstration: How to Configure General NPS Settings
What Is a Network Policy Server?
Windows Server 2008 R2 Network Policy Server (NPS):
• RADIUS server
• RADIUS proxy
• NAP policy server
Demonstration: How to Install the Network
Policy Server
In this demonstration, you will see how to:
• Install the NPS role
• Register NPS in AD DS
Tools Used for Managing a Network Policy Server
Tools used to manage NPS include:
• Netsh command line to configure all aspects of NPS, such as:
• NPS Server Commands
• RADIUS Client Commands
• Connection Request Policy Commands
• Remote RADIUS Server Group Commands
• Network Policy Commands
• Network Access Protection Commands
• Accounting Commands
• NPS MMC Console
Demonstration: How to Configure General
NPS Settings
In this demonstration, you will see how to:
• Configure a RADIUS server for VPN connections
• Save the configuration
Lesson 2: Configuring RADIUS Clients and Servers
• What Is a RADIUS Client?
• What Is a RADIUS Proxy?
• Demonstration: How to Configure a RADIUS Client
• What Is a Connection Request Policy?
• Configuring Connection Request Processing
• Demonstration: How to Create a New Connection Request
Policy
What Is a RADIUS Client?
• RADIUS clients are network access servers, such as:
• Wireless access points
• 802.1x authenticating switches
• VPN servers
• Dial-up servers
• NPS is a RADIUS server
• RADIUS clients send connection requests and accounting
messages to RADIUS servers for authentication, authorization,
and accounting
What Is a RADIUS Proxy?
A RADIUS proxy is required for:
• Service providers offering outsourced dial-up, VPN,
or wireless network access services
• Providing authentication and authorization for user
accounts that are not Active Directory members
• Performing authentication and authorization using
a database that is not a Windows account database
• Load-balancing connection requests among
multiple RADIUS servers
A RADIUS proxy receives connection attempts from RADIUS
clients and forwards them to the appropriate RADIUS server or
another RADIUS proxy for further routing
• Providing RADIUS for outsourced service providers
and limiting traffic types through the firewall
Demonstration: How to Configure a RADIUS Client
In this demonstration, you will see how to:
• Configure a RADIUS client
What Is a Connection Request Policy?
Connection Request policies include:
• Conditions, such as:
• Framed Protocol
• Service Type
• Tunnel Type
• Day and Time restrictions
Connection Request policies are sets of conditions and
settings that designate which RADIUS servers perform
the authentication and authorization of connection
requests that NPS receives from RADIUS clients
• Settings, such as:
• Authentication
• Accounting
• Attribute Manipulation
• Advanced settings
Custom Connection Request policies are required to
forward the request to another proxy or RADIUS server or
server group for authorization and authentication, or to
specify a different server for accounting information
Configuring Connection Request Processing
Configuration Description
Local vs. RADIUS
authentication
• Local authentication takes place against the local
security account database or Active Directory.
Connection policies exist on that server.
• RADIUS authentication forwards the connection
request to a RADIUS server for authentication
against a security database. RADIUS maintains a
central store of all the connection policies.
RADIUS server
groups
Used where one or more RADIUS servers are capable
of handling connection requests. The connection
requests are load-balanced on criteria specified during
the creation of the RADIUS server group if there is
more than one RADIUS server in the group.
Default ports for
accounting and
authentication
using RADIUS
The ports required for accounting and authentication
requests being forwarded to a RADIUS server are
UDP 1812/1645 and UDP 1813/1646.
Demonstration: How to Create a New Connection
Request Policy
In this demonstration, you will see how to:
• Create a VPN connection request policy
Lesson 3: NPS Authentication Methods
• Password-Based Authentication Methods
• Using Certificates for Authentication
• Required Certificates for NPS Authentication Methods
• Deploying Certificates for PEAP and EAP
Password-Based Authentication Methods
Authentication methods for an NPS server include:
• MS-CHAPv2
• MS-CHAP
• CHAP
• PAP
• Unauthenticated access
Using Certificates for Authentication
With NPS, you use certificates for network access
authentication because:
• Provide for stronger security
• Eliminate need for less secure, password-based authentication
Required Certificates for NPS Authentication Methods
You require the following certificates to deploy certificate-based
authentication in NPS:
• CA certificate in the Trusted Root Certification
Authorities certificate store for the Local Computer
and Current User
• Client computer certificate in the certificate store of the client
• Server certificate in the certificate store of the NPS server
• User certificate on a smart card
Deploying Certificates for PEAP and EAP
• For Domain Computer and User accounts, use the auto-enrollment
feature in Group Policy
• Nondomain member enrollment requires an administrator
to request a user or computer certificate using the
CA Web Enrollment tool
• The administrator must save the computer or user certificate to a
floppy disk or other removable media, and manually install the
certificate on the nondomain member computer
• The administrator can distribute user certificates on a smart card
Lesson 4: Monitoring and Troubleshooting a
Network Policy Server
• Methods Used to Monitor NPS
• Logging NPS Accounting
• Configuring SQL Server Logging
• Configuring NPS Events to Record in the Event Viewer
Methods Used to Monitor NPS
NPS monitoring methods include:
• Event logging
• The process of logging NPS events in the System Event log
• Useful for auditing and troubleshooting connection attempts
• Logging user authentication and accounting requests
• Useful for connection analysis and billing purposes
• Can be in a text format
• Can be in a database format within a SQL instance
Logging NPS Accounting
Use the NPS console to configure logging:
Open NPS from the Administrative Tools menu
In the console tree, click Accounting
In the details pane, click Configure Local File Logging
On the Settings tab, select the information to be logged
On the Log File tab, select the log type and the frequency
or size attributes of the log files to be generated
1
2
3
4
5
Log files should be stored on a separate partition from the system
partition:
If RADIUS accounting fails due to a full hard disk, NPS stops
processing connection requests
Configuring SQL Server Logging
You can use SQL to log RADIUS accounting data:
• Requires SQL to have a stored procedure
named report_event
• NPS formats accounting data as an XML document
• Can be a local or remote SQL Server database
Configuring NPS Events to Record in the Event Viewer
How do I configure NPS events to be recorded in Event Viewer?
• NPS is configured by default to record failed connections and
successful connections in the event log
• You can change this behavior on the General tab of the
Properties sheet for the network policy
• Common request failure events
• What information does the failure event record?
• What information does the success event record?
What is Schannel logging, and how do I configure it?
• Schannel is a security support provider that supports a set of
Internet security protocols
• You can configure Schannel logging in the following Registry key:
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl
SecurityProvidersSCHANNELEventLogging
Lab: Configuring and Managing Network Policy Server
• Exercise 1: Installing and Configuring the Network Policy
Server Role Service
• Exercise 2: Configuring a RADIUS Client
• Exercise 3: Configuring Certificate Auto-Enrollment
• Exercise 4: Configuring and Testing the VPN
Estimated time: 75 minutes
Logon information
Virtual machines
6421B-NYC-DC1
6421B-NYC-EDGE1
6421B-NYC-CL1
User name ContosoAdministrator
Password Pa$$w0rd
Lab Scenario
Contoso Ltd. is expanding its remote-access solution to all
its branch office employees. This will require multiple
Routing and Remote Access servers located at different
points to provide connectivity for its employees. You must
use RADIUS to centralize authentication and accounting for
the remote-access solution. You have been tasked with
installing and configuring Network Policy Server into an
existing infrastructure to be used for NAP, Wireless and
Wired access, RADIUS, and RADIUS Proxy.
Lab Review
• What does a RADIUS proxy provide?
• What is a RADIUS client, and what are some examples of
RADIUS clients?
Module Review and Takeaways
• Review Questions
• Tools

Mais conteúdo relacionado

Mais procurados

Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Steven Wilder
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
Aakash Agarwal
 
Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6
gadi_fe
 

Mais procurados (20)

MCSA 70-412 Chapter 02
MCSA 70-412 Chapter 02MCSA 70-412 Chapter 02
MCSA 70-412 Chapter 02
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater Datasheet
 
Window server 2008
Window server 2008Window server 2008
Window server 2008
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
Understanding firewall-policies-their-effectiveness-in-defending-against-netw...
 
ACE - Comcore
ACE - ComcoreACE - Comcore
ACE - Comcore
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
 
Nexus 1000_ver 1.1
Nexus 1000_ver 1.1Nexus 1000_ver 1.1
Nexus 1000_ver 1.1
 
Season 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classificationSeason 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classification
 
Presentation basic administration for citrix xen app 6
Presentation   basic administration for citrix xen app 6Presentation   basic administration for citrix xen app 6
Presentation basic administration for citrix xen app 6
 
Season 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classificationSeason 4 [Free OpManager training] Part1- Discovery and classification
Season 4 [Free OpManager training] Part1- Discovery and classification
 
Cloud computing aws -key services
Cloud computing  aws -key servicesCloud computing  aws -key services
Cloud computing aws -key services
 
Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6Whats new in Citrix XenApp 6
Whats new in Citrix XenApp 6
 
OpenStack Summit Fall 2018: LBaaS
OpenStack Summit Fall 2018: LBaaSOpenStack Summit Fall 2018: LBaaS
OpenStack Summit Fall 2018: LBaaS
 
Transforming Legacy Applications Into Dynamically Scalable Web Services
Transforming Legacy Applications Into Dynamically Scalable Web ServicesTransforming Legacy Applications Into Dynamically Scalable Web Services
Transforming Legacy Applications Into Dynamically Scalable Web Services
 
[Season - 3 Free OpManager Training] Monitoring Server Performance
[Season - 3 Free OpManager Training] Monitoring Server Performance[Season - 3 Free OpManager Training] Monitoring Server Performance
[Season - 3 Free OpManager Training] Monitoring Server Performance
 
Communication between cloud services
Communication between cloud servicesCommunication between cloud services
Communication between cloud services
 

Semelhante a 6421 b Module-06

pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
TadeseBeyene
 
Database as a Service for Private Clouds
Database as a Service for Private CloudsDatabase as a Service for Private Clouds
Database as a Service for Private Clouds
merbey
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
Antonios Chatzipavlis
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
TadeseBeyene
 
Instalacion de windows server 2012
Instalacion de windows server 2012Instalacion de windows server 2012
Instalacion de windows server 2012
Salazar Jorge
 

Semelhante a 6421 b Module-06 (20)

Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1Administering and configuring System Center Configuration Manager 2012 R2 SP1
Administering and configuring System Center Configuration Manager 2012 R2 SP1
 
SCCM_Overview_Updated.pptx
SCCM_Overview_Updated.pptxSCCM_Overview_Updated.pptx
SCCM_Overview_Updated.pptx
 
MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06MCSA 70-412 Chapter 06
MCSA 70-412 Chapter 06
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
Applications Performance Monitoring with Applications Manager part 1
Applications Performance Monitoring with Applications Manager part 1Applications Performance Monitoring with Applications Manager part 1
Applications Performance Monitoring with Applications Manager part 1
 
Network Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .pptNetwork Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .ppt
 
pdf to ppt window configuration .pptx
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
 
Database as a Service for Private Clouds
Database as a Service for Private CloudsDatabase as a Service for Private Clouds
Database as a Service for Private Clouds
 
SCOM 2012 service SaaS
SCOM 2012 service SaaSSCOM 2012 service SaaS
SCOM 2012 service SaaS
 
Azure serverless
Azure serverlessAzure serverless
Azure serverless
 
Deep-Dive to Application Insights
Deep-Dive to Application Insights Deep-Dive to Application Insights
Deep-Dive to Application Insights
 
Isaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditingIsaca sql server 2008 r2 security & auditing
Isaca sql server 2008 r2 security & auditing
 
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in DelhiBest MCSA - SQL SERVER 2012 Training Institute in Delhi
Best MCSA - SQL SERVER 2012 Training Institute in Delhi
 
Server monitoring made easy with Applications Manager
Server monitoring made easy with Applications ManagerServer monitoring made easy with Applications Manager
Server monitoring made easy with Applications Manager
 
Accelerating YourBusiness with Security
Accelerating YourBusiness with SecurityAccelerating YourBusiness with Security
Accelerating YourBusiness with Security
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is?
 
Instalacion de windows server 2012
Instalacion de windows server 2012Instalacion de windows server 2012
Instalacion de windows server 2012
 
Servicedesk plus 8 Overview
Servicedesk plus 8 OverviewServicedesk plus 8 Overview
Servicedesk plus 8 Overview
 

Mais de Bibekananada Jena

Mais de Bibekananada Jena (7)

6421 b Module-13
6421 b Module-136421 b Module-13
6421 b Module-13
 
6421 b Module-12
6421 b Module-126421 b Module-12
6421 b Module-12
 
6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
6421 b Module-08
6421 b Module-086421 b Module-08
6421 b Module-08
 
6421 b Module-04
6421 b Module-046421 b Module-04
6421 b Module-04
 
6421 b Module-03
6421 b Module-036421 b Module-03
6421 b Module-03
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Último (20)

Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

6421 b Module-06

  • 1. Module 6 Installing, Configuring, and Troubleshooting the Network Policy Server Role Service
  • 2. Module Overview • Installing and Configuring a Network Policy Server • Configuring RADIUS Clients and Servers • NPS Authentication Methods • Monitoring and Troubleshooting a Network Policy Server
  • 3. Lesson 1: Installing and Configuring a Network Policy Server • What Is a Network Policy Server? • Demonstration: How to Install the Network Policy Server • Tools Used for Managing a Network Policy Server • Demonstration: How to Configure General NPS Settings
  • 4. What Is a Network Policy Server? Windows Server 2008 R2 Network Policy Server (NPS): • RADIUS server • RADIUS proxy • NAP policy server
  • 5. Demonstration: How to Install the Network Policy Server In this demonstration, you will see how to: • Install the NPS role • Register NPS in AD DS
  • 6. Tools Used for Managing a Network Policy Server Tools used to manage NPS include: • Netsh command line to configure all aspects of NPS, such as: • NPS Server Commands • RADIUS Client Commands • Connection Request Policy Commands • Remote RADIUS Server Group Commands • Network Policy Commands • Network Access Protection Commands • Accounting Commands • NPS MMC Console
  • 7. Demonstration: How to Configure General NPS Settings In this demonstration, you will see how to: • Configure a RADIUS server for VPN connections • Save the configuration
  • 8. Lesson 2: Configuring RADIUS Clients and Servers • What Is a RADIUS Client? • What Is a RADIUS Proxy? • Demonstration: How to Configure a RADIUS Client • What Is a Connection Request Policy? • Configuring Connection Request Processing • Demonstration: How to Create a New Connection Request Policy
  • 9. What Is a RADIUS Client? • RADIUS clients are network access servers, such as: • Wireless access points • 802.1x authenticating switches • VPN servers • Dial-up servers • NPS is a RADIUS server • RADIUS clients send connection requests and accounting messages to RADIUS servers for authentication, authorization, and accounting
  • 10. What Is a RADIUS Proxy? A RADIUS proxy is required for: • Service providers offering outsourced dial-up, VPN, or wireless network access services • Providing authentication and authorization for user accounts that are not Active Directory members • Performing authentication and authorization using a database that is not a Windows account database • Load-balancing connection requests among multiple RADIUS servers A RADIUS proxy receives connection attempts from RADIUS clients and forwards them to the appropriate RADIUS server or another RADIUS proxy for further routing • Providing RADIUS for outsourced service providers and limiting traffic types through the firewall
  • 11. Demonstration: How to Configure a RADIUS Client In this demonstration, you will see how to: • Configure a RADIUS client
  • 12. What Is a Connection Request Policy? Connection Request policies include: • Conditions, such as: • Framed Protocol • Service Type • Tunnel Type • Day and Time restrictions Connection Request policies are sets of conditions and settings that designate which RADIUS servers perform the authentication and authorization of connection requests that NPS receives from RADIUS clients • Settings, such as: • Authentication • Accounting • Attribute Manipulation • Advanced settings Custom Connection Request policies are required to forward the request to another proxy or RADIUS server or server group for authorization and authentication, or to specify a different server for accounting information
  • 13. Configuring Connection Request Processing Configuration Description Local vs. RADIUS authentication • Local authentication takes place against the local security account database or Active Directory. Connection policies exist on that server. • RADIUS authentication forwards the connection request to a RADIUS server for authentication against a security database. RADIUS maintains a central store of all the connection policies. RADIUS server groups Used where one or more RADIUS servers are capable of handling connection requests. The connection requests are load-balanced on criteria specified during the creation of the RADIUS server group if there is more than one RADIUS server in the group. Default ports for accounting and authentication using RADIUS The ports required for accounting and authentication requests being forwarded to a RADIUS server are UDP 1812/1645 and UDP 1813/1646.
  • 14. Demonstration: How to Create a New Connection Request Policy In this demonstration, you will see how to: • Create a VPN connection request policy
  • 15. Lesson 3: NPS Authentication Methods • Password-Based Authentication Methods • Using Certificates for Authentication • Required Certificates for NPS Authentication Methods • Deploying Certificates for PEAP and EAP
  • 16. Password-Based Authentication Methods Authentication methods for an NPS server include: • MS-CHAPv2 • MS-CHAP • CHAP • PAP • Unauthenticated access
  • 17. Using Certificates for Authentication With NPS, you use certificates for network access authentication because: • Provide for stronger security • Eliminate need for less secure, password-based authentication
  • 18. Required Certificates for NPS Authentication Methods You require the following certificates to deploy certificate-based authentication in NPS: • CA certificate in the Trusted Root Certification Authorities certificate store for the Local Computer and Current User • Client computer certificate in the certificate store of the client • Server certificate in the certificate store of the NPS server • User certificate on a smart card
  • 19. Deploying Certificates for PEAP and EAP • For Domain Computer and User accounts, use the auto-enrollment feature in Group Policy • Nondomain member enrollment requires an administrator to request a user or computer certificate using the CA Web Enrollment tool • The administrator must save the computer or user certificate to a floppy disk or other removable media, and manually install the certificate on the nondomain member computer • The administrator can distribute user certificates on a smart card
  • 20. Lesson 4: Monitoring and Troubleshooting a Network Policy Server • Methods Used to Monitor NPS • Logging NPS Accounting • Configuring SQL Server Logging • Configuring NPS Events to Record in the Event Viewer
  • 21. Methods Used to Monitor NPS NPS monitoring methods include: • Event logging • The process of logging NPS events in the System Event log • Useful for auditing and troubleshooting connection attempts • Logging user authentication and accounting requests • Useful for connection analysis and billing purposes • Can be in a text format • Can be in a database format within a SQL instance
  • 22. Logging NPS Accounting Use the NPS console to configure logging: Open NPS from the Administrative Tools menu In the console tree, click Accounting In the details pane, click Configure Local File Logging On the Settings tab, select the information to be logged On the Log File tab, select the log type and the frequency or size attributes of the log files to be generated 1 2 3 4 5 Log files should be stored on a separate partition from the system partition: If RADIUS accounting fails due to a full hard disk, NPS stops processing connection requests
  • 23. Configuring SQL Server Logging You can use SQL to log RADIUS accounting data: • Requires SQL to have a stored procedure named report_event • NPS formats accounting data as an XML document • Can be a local or remote SQL Server database
  • 24. Configuring NPS Events to Record in the Event Viewer How do I configure NPS events to be recorded in Event Viewer? • NPS is configured by default to record failed connections and successful connections in the event log • You can change this behavior on the General tab of the Properties sheet for the network policy • Common request failure events • What information does the failure event record? • What information does the success event record? What is Schannel logging, and how do I configure it? • Schannel is a security support provider that supports a set of Internet security protocols • You can configure Schannel logging in the following Registry key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControl SecurityProvidersSCHANNELEventLogging
  • 25. Lab: Configuring and Managing Network Policy Server • Exercise 1: Installing and Configuring the Network Policy Server Role Service • Exercise 2: Configuring a RADIUS Client • Exercise 3: Configuring Certificate Auto-Enrollment • Exercise 4: Configuring and Testing the VPN Estimated time: 75 minutes Logon information Virtual machines 6421B-NYC-DC1 6421B-NYC-EDGE1 6421B-NYC-CL1 User name ContosoAdministrator Password Pa$$w0rd
  • 26. Lab Scenario Contoso Ltd. is expanding its remote-access solution to all its branch office employees. This will require multiple Routing and Remote Access servers located at different points to provide connectivity for its employees. You must use RADIUS to centralize authentication and accounting for the remote-access solution. You have been tasked with installing and configuring Network Policy Server into an existing infrastructure to be used for NAP, Wireless and Wired access, RADIUS, and RADIUS Proxy.
  • 27. Lab Review • What does a RADIUS proxy provide? • What is a RADIUS client, and what are some examples of RADIUS clients?
  • 28. Module Review and Takeaways • Review Questions • Tools