Partager via


Planning the Placement of a NAP Enforcement Server

Applies To: Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Vista

NAP enforcement servers grant or deny network access to NAP clients. The type of network access provided depends on the NAP enforcement method you are using. Client computers that are granted access to the network can be allowed unlimited access or their access can be restricted to resources you specify. The level of access is determined after the NAP enforcement server contacts the NAP health policy server. It can be based on several factors, including the authentication method, computer and user identity, and computer health status. See the following figure.

NAP enforcement server

NAP enforcement servers do not typically deny access to authenticated or authorized NAP clients. Their function is to grant access to the network, but this access might be restricted if a client is determined to be noncompliant with health requirements.

When to install an enforcement server

All NAP designs, including the no enforcement design, require a device that provides a level of network access. Because the 802.1X enforcement method uses 802.1X-compliant hardware devices to grant or deny network access, these devices are referred to as NAP enforcement points rather than enforcement servers. The following table lists devices and services that are required for each NAP design:

Design NAP enforcement point Required services

IPsec enforcement

HRA server

HRA, IIS, NPS

802.1X enforcement

IEEE 802.1X-compliant switch or access point

802.1X authentication RFC 2868 support

VPN enforcement

VPN server

Routing and Remote Access service

DHCP enforcement

DHCP server

DHCP Server service, NPS

No enforcement

HRA server

HRA, IIS, NPS