NAP VPN ENFORCEMENT LAB
3 machines : [DC  + VPN SERVER Domain Member + Client [WG] 
LAB Steps :- 
1- Add ENT Root CA on DC . 
2- Cert templates --- r.click -- manage -- computer -- properties -- security -- read+Enroll --- ok .
3- On VPN -- MMC – Certificates [computer] --- request  certificate . 
4- On VPN ----- add Roles ----- Network policy and Access ------------- choose NPS + RRAS [R.A] --- ok 
5- start ----- programs ------ Administrative Tools -------- Open Network Policy Server  .
Windows Security  Health ----- default configuration --- allow only F.W + clear all other settings .
policies--- health policies -- create 2 policies 
Compliant --- pass all SHV + select ...
Non Compliant --- fail one or more SHV + select ....
Network policies --- disable defaults --- NEW
** compliant full access ---  condition " health policy"[compliant] ----access granted --- allow full access ---- finish 
** non compliant - limited access ----- condition " health policy"[non compliant] --- limited access + uncheck " enable auto   
remediation" .
remediation" .
IP filters ----- input + output  " allow for one PC " 
Input filters--- new DST Network --- add -- DC IP/32 mask --- permit only --- ok
Output filters--- new SRC Network --- add -- DC IP/32 mask --- permit only --ok  ---- then finish the policy
Connection request policy --- disable default --- create NEW 
name ---- type[VPN] ---- condition "tunnel type" select pptp+l2tp+sstp --- auth method [override] --- EAP types --- add --- MS protected EAP + MS Secured password ... -- ok
MS protected EAP --- Edit -- ensure --- Enforce network access protection is selected ----- finish 
NOW -- configure RRAS --- VPN --- finish  ---- then  go to NPS --- connection request policies  ------- disable MS RRAS + MOVE our policy into the  TOP *** 
Administrative tools --------- Firewall with advanced sec  ------ Create Inbound Rule ------- ICMP V4 [Echo request] ------ Finish 
Client :- 
** Export CA cert --- import into computer trusted Root CA [MMC] 
1- run --- napclcfg.msc --- Enforcement -- EAP --- Enable . 
2- gpedit.msc ---- administrative  templates --- windows  components  --- security center -- turn on 
3- Run --- services.msc --- network access protection --- Auto + start 
4- Create VPN connection --- finish ---- properties --- security ----- Authentication ---- use EAP 
Microsoft : Protected EAP [PEAP] (encryption Enabled) --- properties --- uncheck "connect to these ..." + check " Enforce network access protection"  


 
ليست هناك تعليقات:
إرسال تعليق