Network Policy and Access Services Overview
Applies To: Windows Server 2012 R2, Windows Server 2012
This topic provides an overview of Network Policy and Access Services in Windows Server® 2012, including the specific role services of Network Policy Server (NPS), Health Registration Authority (HRA), and Host Credential Authorization Protocol (HCAP). Use the Network Policy and Access Services server role to deploy and configure Network Access Protection (NAP), secure wired and wireless access points, and RADIUS servers and proxies.
Did you mean…
Role description
Network Policy and Access Services provides the following network connectivity solutions:
Solution |
Description |
---|---|
Network Access Protection (NAP) |
NAP is a client health policy creation, enforcement, and remediation technology. With NAP, system administrators can establish and automatically enforce health policies, which can include software requirements, security update requirements, and other settings. Client computers that are not in compliance with health policy can be provided restricted network access until their configuration is updated and brought into compliance with policy. |
802.1X authenticated wired and wireless access |
When you deploy 802.1X-capable wireless access points and Ethernet switches, you can use Network Policy Server (NPS) to deploy certificate-based authentication methods that are more secure than password-based authentication. Deploying 802.1X-capable hardware with NPS allows you to ensure that intranet users are authenticated before they can connect to the network or obtain an IP address from a DHCP server. |
Central network policy management with RADIUS server and proxy |
Rather than configuring network access policy at each network access server, you can create policies in a single location that specify all aspects of network connection requests, including who is allowed to connect, when they can connect, and the level of security they must use to connect to your network. |
Note
Network Policy and Access Services can be run in Windows Azure VMs.
New and changed functionality
The following table lists the primary differences in the Network Policy and Access Services server role by operating system:
Feature/functionality |
Windows Server® 2008 R2 and Windows Server® 2008 |
Windows Server 2012 |
---|---|---|
Support for Windows PowerShell® |
None |
X |
Support for Windows PowerShell
You can now use Windows PowerShell to automate the installation of the Network Policy and Access Services server role. You can also deploy and configure some aspects of Network Policy Server by using Windows PowerShell. For more information, see Windows PowerShell for Network Policy and Access Services.
Removed functionality
In Windows Server® 2008 R2 and Windows Server® 2008, Network Policy and Access Services included the Routing and Remote Access Service (RRAS) role service. In Windows Server 2012, RRAS is now a role service in the Remote Access server role.
Deprecated functionality
With the release of Windows Server 2012 R2, NAP is deprecated. NAP is fully supported in Windows Server 2012 R2 and Windows 8.1. For more information about support lifecycles, see Microsoft Support Lifecycle.
Note
Central network policy management with RADIUS server and proxy, and 802.1X authenticated wired and wireless access are not deprecated
For the health policy creation, enforcement, and remediation features provided by NAP, as well as for monitoring, consider using System Center Configuration Manager to replace and enhance NAP’s monitoring functionality:
Windows Update status—System Center Configuration Manager integrates with Windows Server Update Services (WSUS) and has its own software updates feature. See Software Updates in Configuration Manager, in particular Monitor software updates.
Windows Firewall settings—System Center Endpoint Protection can be used to manage Windows Firewall, see Endpoint Protection in Configuration Manager, in particular How to Create and Deploy Windows Firewall Policies for Endpoint Protection in Configuration Manager.
Computer settings: registry settings, files, custom scripts—System Center Configuration Manager can help assess, track, and remediate the configuration compliance of client computers in the enterprise, see Compliance Settings in Configuration Manager.
Reporting—System Center Configuration Manager also provides a set of tools and resources that help you use the advanced reporting capabilities of Microsoft SQL Server Reporting Services in the Configuration Manager console. See Reporting in Configuration Manager.
Bitlocker—Microsoft BitLocker Administration and Monitoring (MBAM) lets you manage Bitlocker drive encryption throughout your enterprise, see Microsoft BitLocker Administration and Monitoring 2 Administrator's Guide.
Managing mobile devices. See How to Manage Mobile Devices by Using Configuration Manager and Windows Intune and How to Manage Mobile Devices by Using Configuration Manager and Exchange.
To provide an always managed and always compliant experience for remote devices, you can use Remote Access, see Manage DirectAccess Clients Remotely. This way you can ensure the clients are always healthy, not only when they try to access resources in the corporate network.
NAP enables you to provide full internal network access to your users. However, if you only require the ability to provide access to specific applications and services in your internal network, you can use Web Application Proxy. Web Application Proxy enables you to provide this type of specific access to end users with domain-joined laptops or using their own devices; home computers, tablets, or personal smartphones. See Web Application Proxy Walkthrough Guide.
Server Manager information
The following role services can be installed with this role.
Role service |
Description |
---|---|
Network Policy Server (NPS) |
You can use NPS to centrally manage network access through a variety of network access servers, including RADIUS-compliant 802.1X-capable wireless access points, VPN servers, dial-up servers, and 802.1X-capable Ethernet switches. In addition, you can use NPS to deploy secure password authentication with Protected Extensible Authentication Protocol (PEAP)-MS-CHAP v2 for wireless connections. NPS also contains key components for deploying NAP on your network. |
Health Registration Authority (HRA) |
HRA is a NAP component that issues health certificates to clients that pass the health policy verification that is performed by NPS using the client SoH. HRA is used only with the NAP IPsec enforcement method. |
Host Credential Authorization Protocol (HCAP) |
HCAP allows you to integrate your Microsoft NAP solution with Cisco Network Access Control Server. When you deploy HCAP with NPS and NAP, NPS can perform client health evaluation and the authorization of Cisco 802.1X access clients. |
Running Network Policy and Access Services
How do I deploy and configure Network Policy and Access Services using Windows PowerShell?
You can use to deploy and configure some aspects of Network Policy and Access Services. For more information about Windows PowerShell® cmdlets and scripts that you can use to deploy and manage Network Policy and Access Services, see Windows PowerShell for Network Policy and Access Services.
How do I deploy and configure this role in a multi-server environment?
You can deploy NPS servers for different functions. For example, you can deploy one NPS server as a RADIUS server for authentication, another as a RADIUS proxy, in order to distribute policy evaluation between servers with different roles, and another as a NAP policy server. For more information about multi-server management of Network Policy and Access Services, see Network Policy Server Overview.
Can I run this role on virtual machines?
Yes, you can run Network Policy and Access Services on Hyper-V virtual machines.
Can I run this role in a clustered environment?
No, Network Policy and Access Services cannot be run in a server cluster.
Special considerations for managing this role remotely
You can manage Network Policy and Access Services remotely. For more information about running Network Policy and Access Services from a remote computer, see Administer NPS by Using Tools.
Special considerations for managing the role on the Server Core installation option
You cannot install or run Network Policy and Access Services on the Server Core installation option of Windows Server 2012.
See also
The following table provides links to more content about Network Policy and Access Services.
Content type |
References |
---|---|
Product evaluation |
|
Planning |
|
Deployment |
Deploying NPS | Checklist for deploying an HRA server | NAP Deployment Guide |
Operations |
|
Troubleshooting |
Best Practices Analyzer for Network Policy and Access Services | Network Policy Server Infrastructure (Errors and Events) | NAP Infrastructure (Errors and Events) | Network Access Protection Troubleshooting Guide | Tools for Troubleshooting NAP | Troubleshooting HRA Guide |
Tools and settings |
Windows PowerShell for Network Policy and Access Services | Netsh Commands for Network Policy Server | Netsh Commands for Health Registration Authority | Netsh Commands for Network Access Protection (NAP) Client |
Community resources |