Windows Server 2008: how to configure Network Policy Server or Radius Server –Step by Step Guide

Step1: Prepare AAA Environment
  • Windows Server 2008 SP2 or Windows Server 2008 R2
  • Active Directory Domain Services
  • Active Directory Certificate Services
  • DHCP
  • Radius i.e. NPS must be a member of domain
  • Computer certificate installed in Radius Server
  • Windows 7, Windows XP or Mac OSX 10.5.8 Client
  • Cisco Wireless Access Point
Step2: Installation

Start menu>Administrative Tools>Server manager>Roles>Add Roles

Step3: Setup Clients

Administrative Tools>Network Policy Server>Radius Client>Right Click>New Radius Client

Radius Secret mentioned here must be same in Cisco Wireless Access Point. You must verify connection by clicking verify.

Step4: Setup Policy

Network Policy Server>Policies>network Policies>Right Click>New

 

This is highly important part of entire config. Based on your need, you have to choose desire config type among all.

VPN Tunnel Type:L2TP

NASPort Type: VPN or Wireless

EAP Type: EAP-TLS, MSChap v2 or PEAP

AD Group: Wireless User Group or VPN User Group

Here, you can choose one or both depending on your infrastructure. I have shown both VPN and Wireless Client.

Here, I am showing both EAP type for this article. But you have to choose only one again depending on your infrastructure.

Smart card or Certificate is the best option. For Windows 7 and XP, only certificates will work smooth as silk. However, if you have Macintosh Client then you have choose Certificate and PEAP.

If you want VPN client to authenticate via Radius i.e. NPS then select Tunnel type.

Here, I explained  standard Radius config. I would recommend following for two different situations:

  • L2TP, Certificate and EAP for VPN Client
  • Certificate, PEAP and MSChap v2 for Wireless Client.

You can have more then one policy in NPS. A single server can be used to authenticate both VPN and Wireless Client. For some weird reason, my Macintosh client did not work with only user and machine certificate. Apple support advised me to use user cert and Radius shared secret instead. But for Windows 7 and XP client, certificates and EAP will work smooth as silk.

Further Help:

Microsoft Technet

Keywords: L2TP, Radius, NPS, Windows Server 2008, Certificates

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Introduction 3 the CAS role and the Hub Transport role, two updated roles to Exchange Server 2010 that are critical to the Exchange Server 2010 organizational environment. .Part VI: Exchange Server 2010 Administration and Management—In this part, five chapters focus on the administration and management of an Exchange Server 2010 environment. The administration and management of mailboxes, distri- bution lists, sites, and administration have been greatly enhanced in Exchange Server 2010. Although you can continue to perform many of the tasks the way you did in the past, because of significant changes in replication, background transac- tion processing, secured communications, integrated mobile communications, and changes in Windows Server 2003 Active Directory, there are better ways to work with Exchange Server 2010. These chapters drill down into specialty areas helpful to administrators of varying levels of responsibility. .Part VII: Unified Communications in an Exchange Server 2010 Environment—This section has been completely updated for Exchange Server 2010 with the revised Unified Messaging role, new mobility functionality, and tight inte- gration with SharePoint 2007/2010. As previously mentioned in this introduction, Exchange Server 2010 not only improves voice mail to Exchange Server, but also the addition of voice integration takes Exchange Server 2010 far beyond just an email and calendaring solution. This addition takes Exchange Server into an area where communication is conducted on personal computers, mobile handheld devices, and from remote kiosks and terminal systems. The chapters in this part of the book highlight all the enhanced technologies andintegration capabilities that make Exchange Server 2010 the core foundation to the future of an organization’s communications infrastructure. .Part VIII: Client Access to Exchange Server 2010—This part of the book focuses on the enhancements to the Outlook Web App client, various Outlook client capabilities, and Outlook for non-Windows systems. Outlook Web App is no longer just a simple browser client, but one that can effectively be a full primary user client to Exchange Server, including access to network file shares, an entry point to SharePoint shares, and a remote voice mail collection point. In addition, Outlook Web App now has full functionality for non-Windows users, such as users who access Exchange Outlook Web App from an Apple Mac computer. Being that Exchange Server 2010 nowincludes voice and mobile communications as a major component of the Exchange Server environment, client access as well as the distrib- ution, management, and support of the client becomes even more important. .Part IX: Data Protection and Disaster Recovery of Exchange Server 2010— As organizations implement Exchange Server 2010 and make it their central store for email, calendars, contacts, voice and fax communications, and mobile commu- nications, it is no longer an option to set up and support an environment where downtime is even a possibility. This part of the book covers the new continuous backup technologies built in to Exchange Server 2010 intended to keep Exchange Server 2010 operating in a nonstop environment. Additional chapters in this part address backing up and restoring Exchange Server data, along with the recovery of an Exchange Server 2010 environment in the event of a disaster. From the Library of Lee Bogdanoff Microsoft Exchange Server 2010 Unleashed 4 .Part X: Optimizing Exchange Server 2010 Environments—This last part of the book addresses optimization in terms of server and Exchange Server 2010 organiza- tional environment optimization, optimization of the new Database Availability Group (DAG) storage and replication system, and system optimization that goes far beyond the basics. Rather than simply tuning an Exchange server with the appropri- ate amount of RAM and disk space, Exchange Server 2010 takes on a whole new area of load balancing data storage across distributed storage subsystems in which information is managed and replicated as an integral part of Exchange Server 2010. The real-world experience we have had in working with Exchange Server 2010 and our commitment to writing this book based on years of field experience in early adopter Exchange Server 2010 environments enable us to relay to you information that we hope will be valuable in your successful planning, implementation, and migration to an Exchange Server 2010 environment. In the past 15 years, we have written a book on every version of Exchange Server since its inception built on at least two years of early adopter beta experience. This book, Microsoft Exchange Server 2010 Unleashed, is the latest of our efforts. However, because Exchange Server 2010 is effectively based on Exchange Server 2007 and could potentially be considered a major service pack update to the product, there are enough differences in the new release that it required complete rethinking of the way we wrote this book. Rather than being just an email and calendaring product, Microsoft added a handful of new server roles to Exchange Server 2007 to improve security and reliability that Microsoft further enhanced in Exchange Server 2010. In addition, Exchange Server 2010 greatly expands on Microsoft’s offering in the areas of unified messaging that it entered into the marketplace with Exchange Server 2007. Exchange Server 2010 has not enhanced the Unified Messaging server role, but Exchange Server is now clearly the backbone of an entire unified communications strategy that Microsoft has built over the past several years. Beyond just email and calendaring, ExchangeServer 2010 is now the foundation for voice and mobile communications. Just a decade and a half ago, email was just one of a number of different ways people communicated. Early implementations of Exchange Server (v4.0, v5.0) had organizations tolerant if a server was down for a day or two. Today, email has become an extremely important, if not primary, method of communication for organizations. Downtime on an Exchange server can bring an entire organization to its knees. With Exchange Server 2010 adding voice mail and mobile communications into the messaging environment, an Exchange Server 2010 server and environment can no longer tolerate failures caused by viruses and spam, nor systemdowntime caused by server crashes or database corruption. You will find that the improvements Microsoft has made to Exchange Server 2010 are not only evolutionary improvements, but highly critical if not absolutely essential to Microsoft’s responsibility to help organizations maintain a safe, secure, and reliable communications infrastructure. This book covers all the aspects of Exchange Server 2010 from introducing the technologies, to properly planning and designing Exchange Server, to the implementation, management, and support of an Exchange Server 2010 environ- ment built on tips, tricks, and best practices from more than two years of early adopter implementations in the field. This book is organized into 10 parts, each part focusing on core Exchange Server 2010 areas, with several chapters making up each part: .Part I: Microsoft Exchange Server 2010 Overview—This part provides an intro- duction to Exchange Server 2010, not only from the perspective of a general tech- nology overview, but also to note what is truly new in Exchange Server 2010 that made it compelling enough for organizations to implement the technology in beta From the Library of Lee Bogdanoff 2 Microsoft Exchange Server 2010 Unleashed in a production environment. This part also covers best practices of planning, proto- type testing, and migration techniques. .Part II: Planning and Designing an Exchange Server 2010 Environment— This part covers the design of an underlying Windows Server 2003/2008 and Active Directory environment in addition to the Exchange Server 2010 unified communi- cations environment. Because organizations of varying sizes have different needs and requirements, as appropriate, this part addresses core Exchange Server 2010 design plans and concepts appropriate for most organizations, and specific attention is given to enterprise-level design and planning considerations for some of the largest Exchange Server implementations in the world. This part also covers the integration of Exchange 2010 in a non-Windows environment as well as tips, tricks, and best practices for getting a Windows Server2003/2008 Active Directory, DNS, and domain structure properly planned and architected. .Part III: Implementing Exchange Server 2010 Services—This part covers the core implementation of Exchange Server 2010 as well as the new Edge Services role that has been added to the Exchange Server organizational structure to provide protection against viruses and spam. In addition, this section has a chapter on the Exchange Management Script based on PowerShell, the Microsoft scripting solution that is the basis of the configuration, administration, and operations of Exchange Server 2010. .Part IV: Securing an Exchange Server 2010 Environment—Security is on everyone’s mind these days, and it was absolutely critical to have several chapters that covered security. The chapters in this part of the book include client-level, server-level, and transport-level security that is at the backbone of security for a network environment. A dedicated chapter on email encryption was necessary to cover the use of certificate-based encryption technologies to enable an organization the ability to provide person-to-person encrypted message communications. In addi- tion, chapters on Microsoft ISA Server 2006 enhancing security at the edge and a chapter on enterprise policy environment addressing regulatory compliance security enhancements added to ExchangeServer 2010 round out this extensive part on security. .Part V: Migrations and Coexistence with Exchange Server 2010—This part is dedicated to migrations, client access servers (CASs), and Hub Transport servers. This part provides a chapter specifically on migrating from Windows 2003 Server to Windows Server 2008 for organizations that want to migrate to a base Windows 2008 environment during their migration to Exchange Server 2010. And, of course, this part includes a chapter on migrating from Exchange Server 2003 and Exchange Server 2007 to the new Exchange Server 2010 unified communications environ- ment. Because Microsoft does not provide migrations from Exchange Server 5.5 or Exchange Server 2000 to Exchange Server 2010, nor does it provide in-place upgradesto Exchange Server 2010, there are fewer options to choose from, which means that the method you are left with needs to be planned, tested, and executed with the utmost care to minimize, if not eliminate, any interruption to users. This part of the book includes a chapter that covers the planning and implementation of From the Library of Lee Bogdanoff
重新上传免积分 http://www.amazon.com/Foundations-Python-Network-Programming-Brandon/dp/1430258543 这本书是2014年底出版的,基于最新的 python3.4 版本。 配书源码链接 https://github.com/brandon-rhodes/fopnp 目录 Chapter 1: Introduction to Client-Server Networking Chapter 2: UDP Chapter 3: TCP Chapter 4: Socket Names and DNS Chapter 5: Network Data and Network Errors Chapter 6: TLS/SSL Chapter 7: Server Architecture Chapter 8: Caches and Message Queues Chapter 9: HTTP Clients Chapter 10: HTTP Servers Chapter 11: The World Wide Web Chapter 12: Building and Parsing E-Mail Chapter 13: SMTP Chapter 14: POP Chapter 15: IMAP Chapter 16: Telnet and SSH Chapter 17: FTP Chapter 18: RPC Instead, this book focuses on network programming, using Python 3 for every example script and snippet of code at the Python prompt. These examples are intended to build a comprehensive picture of how network clients, network servers, and network tools can best be constructed from the tools provided by the language. Readers can study the transition from Python 2 to Python 3 by comparing the scripts used in each chapter of the second edition of this book with the listings here in the third edition—both of which are available at https://github.com/brandon-rhodes/fopnp/tree/m/ thanks to the excellent Apress policy of making source code available online. The goal in each of the following chapters is simply to show you how Python 3 can best be used to solve modern network programming problems.

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值