0%

Book Description

The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questions to answer when designing a NAP architecture, such as determining the current capabilities of the network infrastructure and computers, ranking importance of cost versus robustness of the solution, and deciding how client computers connect to the network.

Table of Contents

  1. Copyright
  2. 1. The Planning and Design Series Approach
    1. Document Approach
    2. Who Should Use This Document
  3. 2. Introduction to the Selecting the Right NAP Architecture Guide
    1. Feedback
  4. 3. NAP in Microsoft Infrastructure Optimization
    1. Infrastructure Architecture and Business Architecture
  5. 4. NAP Enforcement Options
    1. IPsec Enforcement
    2. 802. 802.1X Enforcement
    3. VPN Enforcement
    4. DHCP Enforcement
  6. 5. NAP Design Process
    1. Decisions
    2. Decision Flow
    3. Applicable Scenarios
    4. Out of Scope
  7. 6. Step 1. Determine Client Connectivity
    1. Task 1: Select the Scope of NAP Clients
    2. Option 1: Microsoft VPN
    3. Option 2: Third-Party VPN
    4. Evaluating the Characteristics
    5. Additional Reading
  8. 7. Step 3. Determine the Enforcement Layer
    1. Option 1: Enforce Restrictions at the Hosts
    2. Option 2: Enforce Restrictions on the Network
    3. Evaluating the Characteristics
    4. Validating with the Business
    5. Decision Summary
    6. Additional Reading
  9. 8. Step 4. Select Between 802.1X and DHCP
    1. Option 1: 802. Option 1: 802.1X Enforcement
    2. Option 2: DHCP Enforcement
    3. Evaluating the Characteristics
    4. Validating with the Business
    5. Decision Summary
    6. Additional Reading
  10. 9. Additional Considerations
    1. Determining System Compliance Requirements
      1. Additional Reading
    2. Combining NAP Technologies
    3. Dependencies
  11. 10. Conclusion
    1. Additional Reading
    2. Feedback
  12. 11. Acknowledgments
18.220.1.239