Chapter 15. Preparing for Network Access Protection

This chapter describes how to prepare your network for Network Access Protection (NAP) from an evaluation of your current network infrastructure to the set of design decisions that you need to make to deploy the components of NAP that are independent of the NAP enforcement method. This chapter assumes the following:

  • That you understand the roles of Active Directory, public key infrastructure (PKI), Group Policy, and Remote Authentication Dial-In User Service (RADIUS) elements of a Microsoft Windows–based authentication infrastructure for network access. For more information, see Chapter 9.

  • That you understand the components of NAP and NAP enforcement methods. For more information, see Chapter 14 ...

Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.