Hello,
Thank you for posting in Q&A forum.
In the situation you described, the general order is as follows:
Firstly, the client computer will attempt to establish a connection with the local VPN server.
Once the client computer contacts the local VPN server, the VPN server will verify the client's identity. In the case you provide, the VPN server may verify the certificate used by the client to ensure it has a valid 1-hour certificate.
After verifying the client's identity, the VPN server will contact the NPS or radius server to further verify the client's identity and authorization. The VPN server passes the client's identity information to the NPS server and decides whether to allow the client to establish a connection based on the NPS configured policy.
After receiving a request from the VPN server, the NPS server will verify and authorize it. It may check the validity of client certificates and decide whether to allow connections based on configured policies. If the client certificate is valid and meets the conditions, NPS will send an authorization response to the VPN server, allowing the connection to be established.
Once the VPN server receives an authorization response from NPS, it will allow the client computer to establish a connection with the VPN server. In this way, client computers can communicate with the target network through VPN.
Hope this answer can help you well.
Best regards,
Jill Zhou