Checklist: Deploy IPsec Policies for NAP

Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

This parent checklist includes cross-reference links to important concepts about deploying IPsec policies for NAP. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement the NAP with IPsec enforcement and no enforcement designs.

Note

Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or you complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.

Checklist: Deploy IPsec policies for NAP

  Task Reference

Review concepts and examples for the NAP with IPsec enforcement design.

IPsec Enforcement Design

IPsec Enforcement Example

IPsec Enforcement Configuration

Create organizational units (OUs) for boundary computers, computers running Windows 7, Windows Server 2008 R2, Windows Vista® or Windows Server® 2008, and computers running Windows XP with Service Pack 3.

Configure IPsec OUs

Create Group Policy objects (GPOs) for boundary computers, computers running Windows 7, Windows Server 2008 R2,Windows Vista® or Windows Server® 2008, and computers running Windows XP with Service Pack 3.

Configure IPsec GPOs

Configure registry settings for computers running Windows XP with Service Pack 3.

Configure IKEFlags Registry Settings

Enforce IPsec rules on client computers.

Apply IPsec Policy Settings to Client Computers

See Also

Concepts

NAP Configuration Overview