Chapter 16. IPsec Enforcement

This chapter provides information about how to design, deploy, maintain, and troubleshoot the Network Access Protection (NAP) Internet Protocol security (IPsec) enforcement method. This chapter assumes the following:

  • That you understand the role of Active Directory, public key infrastructure (PKI), Group Policy, and Remote Authentication Dial-In User Service (RADIUS) elements of a Windows-based authentication infrastructure for network access. For more information, see Chapter 9.

  • That you understand the role and deployment methods for IPsec. For more information, see Chapter 4.

  • That you understand the components of NAP and how to prepare your network for NAP. For more information, see Chapter 14, and Chapter 15.

Understanding ...

Get Windows Server® 2008 Networking and Network Access Protection (NAP) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.