• What’s New in NAP Client
  • Who Should Use NAP feature enhancements
  • Scenario 1 - HRA discovery
  • Step-by-step scenario description
  • Known Issues for scenarios
  • What’s New in IPv4-IPv6-Coexistence-Migration
  • Who should use IPv4-IPv6-Coexistence-Migration feature enhancements
  • Benefits of new features in IPv4-IPv6-Coexistence-Migration
  • Key scenarios for Port Preservation for Teredo
  • Scenario 2 – Port Preserving Symmetric NAT to Port Restricted NAT
  • Network Access Protection




    Download 0.7 Mb.
    bet11/14
    Sana26.12.2019
    Hajmi0.7 Mb.
    #5325
    1   ...   6   7   8   9   10   11   12   13   14

    Network Access Protection

    What Is NAP Client


    The NAP Client is the client side component of the NAP Platform that is responsible for collecting statement of health (SoH) data from system health agents (SHA’s) and sending an overall system statement of health (SSoH) via enforcement clients for processing by the NAP server. The NAP Client is also responsible for processing the state of health response (SoHr) returned by the NAP server, which includes instructing enforcement clients to apply the resultant network restriction level, and providing system health agents their respective statement of health responses from the NAP server.

    What’s New in NAP Client


     Health Registration Authority (HRA) automatic discovery

    Large enterprises have complex deployments involving many domains, multiple forests and a large number of sites within this hierarchy.

    NAP client requires the configuration of Health Registration Authorities which it should contact to acquire a health certificate. This could be configured on the client either locally or be pushed via Group Policy. This would require the administrators to create site-specific GPO to manage which HRAs a host should hit to acquire a health certificate, but this is perceived to be too costly, moreover, it would only work after the first domain login.

    An alternative solution is to use the HRA Auto Discovery feature built into the NAP Client which would enable the clients to dynamically discover the appropriate HRA based on the DNS SRV records.


    Who Should Use NAP feature enhancements?


     IT planners and analysts who are evaluating the product.

     Enterprise IT planners and designers.


    Benefits of new features in NAP Client


     HRA Auto Discovery

    HRA Auto Discovery gives network administrators the flexibility of managing NAP Client HRA configuration for specific sites via DNS SRV site records.


    Key Scenarios

    Scenario 1 - HRA discovery

    Goal of the scenario

    Become familiar with adapting a NAP IPSec deployment to use the HRA discovery feature.
    Specific hardware requirement

    None.
    Prerequisites for the scenario

    The HRA Auto Discovery feature is enabled on the NAP Client by the following regkey setting:

    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\napagent\LocalConfig\Enroll\HcsGroups\EnableDiscovery REG_DWORD = 1

    Even when the HRA Auto Discovery feature is enabled the functionality will only be invoked in the case where there is no local or Group Policy configuration for Trusted Server Groups (list of HRA’s).


    Specific configuration

    On DNS Sever:

    Add site SRV records (one for each HRA) - DNS\\Forward Lookup Zones\\_sites\Default-First-Site-Name\_tcp



    SRV record: name: “_hra” ; data: .

    Add Domain SRV records (one for each HRA) – DNS\\Forward Lookup Zones\\_tcp



    SRV record: name: “_hra” ; data: .

    On DHCP Sever:

    Add DNS domain name and DNS server in the Scope options of the DHCP server.



    On Client:

    Enable HRA Discovery on the client by enabling the regkey –



    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\napagent\LocalConfig\Enroll\HcsGroups\EnableDiscovery REG_DWORD = 1
    Step-by-step scenario description

    After configuration restart the NAP Client by either rebooting the machine or stopping and restarting the NAP Agent service.
    Expected results

    The NAP Client will automatically discover the HRA’s as per the DNS SRV records configuration

    The NAP Client will attempt to connect to the discovered HRA’s and perform the same health transaction and enforcement as would occur in the case of local or GP HRA configuration.


    Known Issues for scenarios

    None.

    IPv4-IPv6-Coexistence-Migration

    What is IPv4-IPv6-Coexistence-Migration?


    This feature leverages tunneling technologies that allow applications to use IPv6 on an IPv4 network. This is the first step to transition all applications to start using IPv6 (including ISATAP, 6to4, Teredo and direct tunnels).

    What’s New in IPv4-IPv6-Coexistence-Migration


     Port Preservation for Teredo

    Teredo is a UDP-based tunneling technology that can traverse NATs. There are restrictions on which types of NATs are able to communicate with other NATs. Previously, “symmetric” NATs were only able to communicate with “cone” and “address-restricted” NATs. This new Windows Vista SP1 feature will allow Teredo communication between “port preserving” symmetric NATs and other types of NATs. ( A NAT is port preserving if it chooses to use the same external port number as the internal port number.)


    Who should use IPv4-IPv6-Coexistence-Migration feature enhancements?


    This feature is targeted at the following audiences:

     IT planners and analysts who are evaluating the product.

     Early adopters.

     Security architects who are responsible for implementing trustworthy computing.

     Application Developers.

    Benefits of new features in IPv4-IPv6-Coexistence-Migration


     Port Preservation for Teredo

    This feature allows Teredo communication between port preserving symmetric NATs and other types of NATs. Applications will be able to use this NAT traversal technology simply by being IPv6 capable.


    Key scenarios for Port Preservation for Teredo

    Scenario 1 – Port Preserving Symmetric NAT to Port Preserving Symmetric NAT:

    Goal

    Observe connectivity between Windows Vista SP1 peers.
    Hardware requirements

    Two Windows Vista SP1 clients, each behind a port preserving symmetric NAT.
    Configuration

    Enable Remote Assistance on each client. Check that the Teredo service is qualified using the netsh interface teredo show state command. If the state is not qualified, then the Teredo server is not reachable.
    Steps:

    1. Use the ipconfig command to discover the Teredo interface’s IP address of client A and B.

    2. From client A, ping client B’s Teredo address.

    3. From client B, ping client A’s Teredo address.

    Expected results

    Four echo replies are received at steps 2 and 3 above.

    Scenario 2 – Port Preserving Symmetric NAT to Port Restricted NAT:


    Follow the instructions provided for scenario 1, except place client A behind a port restricted NAT, while keeping client B behind a port preserving symmetric NAT.
    Known issues for scenarios

    Determining the type of a NAT is not always easy, as the categories used are not standardized and varies per vendor.



    Download 0.7 Mb.
    1   ...   6   7   8   9   10   11   12   13   14




    Download 0.7 Mb.