Was this page helpful?
Additional feedback?
1500 characters remaining
Export (0) Print
Expand All

Checklist: Implementing a VPN Enforcement Design

Updated: February 29, 2012

Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

This parent checklist includes cross-reference links to important concepts about the Network Access Protection (NAP) with virtual private network (VPN) enforcement design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.

Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or you complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.

Checklist Checklist: Implementing a VPN enforcement design


  Task Reference

Review important concepts and examples for the NAP with VPN enforcement design.

Conceptual topic VPN Enforcement Design

Conceptual topic VPN Enforcement Example


Review the hardware, software, network, and client requirements for deploying NAP.

Conceptual topic Appendix A: NAP Requirements


According to your design plan, install and configure one or more VPN servers.

Checklist topic Checklist: Deploy a NAP VPN Server


According to your design plan, install and configure one or more NAP health policy servers.

Checklist topic Checklist: Deploy a NAP Health Policy Server

Checklist topic Configure Policies for VPN Enforcement


Configure NAP client computers for the VPN enforcement method.

Checklist topic Checklist: Deploy NAP Client Settings

See Also

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

© 2015 Microsoft