This chapter provides information about how to design, deploy, maintain, and troubleshoot the Network Access Protection (NAP) Internet Protocol security (IPsec) enforcement method. This chapter assumes the following:
That you understand the role of Active Directory, public key infrastructure (PKI), Group Policy, and Remote Authentication Dial-In User Service (RADIUS) elements of a Windows-based authentication infrastructure for network access. For more information, see Chapter 9.
That you understand the role and deployment methods for IPsec. For more information, see Chapter 4.