Checklist: Implementing a VPN Enforcement Design
Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2
This parent checklist includes cross-reference links to important concepts about the Network Access Protection (NAP) with virtual private network (VPN) enforcement design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.
Note
Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or you complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.
Checklist: Implementing a VPN enforcement design
Task | Reference | |
---|---|---|
Review important concepts and examples for the NAP with VPN enforcement design. |
||
Review the hardware, software, network, and client requirements for deploying NAP. |
||
According to your design plan, install and configure one or more VPN servers. |
||
According to your design plan, install and configure one or more NAP health policy servers. |
||
Configure NAP client computers for the VPN enforcement method. |