Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Chapter 16. IPsec Enforcement

This chapter provides information about how to design, deploy, maintain, and troubleshoot the Network Access Protection (NAP) Internet Protocol security (IPsec) enforcement method. This chapter assumes the following:

  • That you understand the role of Active Directory, public key infrastructure (PKI), Group Policy, and Remote Authentication Dial-In User Service (RADIUS) elements of a Windows-based authentication infrastructure for network access. For more information, see Chapter 9, “Authentication Infrastructure.”

  • That you understand the role and deployment methods for IPsec. For more information, see Chapter 4, “Windows Firewall with Advanced Security.”

  • That you understand the components of NAP and how to prepare your network for NAP. For more information, see Chapter 14, “Network Access Protection Overview,” and Chapter 15, “Preparing for Network Access Protection.”


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint