Export (0) Print
Expand All
1 out of 1 rated this helpful - Rate this topic

Checklist: Implementing a VPN Enforcement Design

Updated: February 29, 2012

Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

This parent checklist includes cross-reference links to important concepts about the Network Access Protection (NAP) with virtual private network (VPN) enforcement design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.

noteNote
Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or you complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.

Checklist Checklist: Implementing a VPN enforcement design

 

  Task Reference
Checkbox

Review important concepts and examples for the NAP with VPN enforcement design.

Conceptual topic VPN Enforcement Design

Conceptual topic VPN Enforcement Example

Checkbox

Review the hardware, software, network, and client requirements for deploying NAP.

Conceptual topic Appendix A: NAP Requirements

Checkbox

According to your design plan, install and configure one or more VPN servers.

Checklist topic Checklist: Deploy a NAP VPN Server

Checkbox

According to your design plan, install and configure one or more NAP health policy servers.

Checklist topic Checklist: Deploy a NAP Health Policy Server

Checklist topic Configure Policies for VPN Enforcement

Checkbox

Configure NAP client computers for the VPN enforcement method.

Checklist topic Checklist: Deploy NAP Client Settings

See Also

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.