Network Access Protection Platform Architecture Mark Gibson Senior Consultant Microsoft Corporation 1 Agenda Introduction Network Access Protection platform architecture Network Access Protection Client architecture Network Access Protection Server architecture How Network Access Protection works 2 Introduction What is Network Access Protection (NAP)? Network infrastructure for Network Access Protection Network Access Protection enforcement methods 3 What is Network Access Protection? Platform that enforces compliance with health requirements for network access or communication Operating system components Built into Microsoft® Windows Server® 2008 and Microsoft Windows Vista™ Separate client for Microsoft Windows® XP with Service Pack 2 Application programming interfaces (APIs) Allows for integration with third-party vendors 4 Network infrastructure for Network Access Protection Health policy validation Determines whether the computers are compliant with health policy requirements Network access limitation Limits access for noncompliant computers Automatic remediation Provides necessary updates to allow a noncompliant computer to become compliant Ongoing compliance Automatically updates compliant computers so that they adhere to ongoing changes in health policy requirements 5 Network Access Protection enforcement methods Internet Protocol security (IPsec)-protected communications IEEE 802.1X-authenticated network connections Remote access virtual private network (VPN) connections Dynamic Host Configuration Protocol (DHCP) configuration 6 Network Access Protection platform architecture Components of the Network Access Protection platform Interactions between Network Access Protection components 7 Components of the Network Access Protection platform VPN server Active Directory Policy servers Internet IEEE 802.1X devices Health certificate server (HCS) Network Policy Server (NPS) DHCP server Perimeter network Intranet Remediation servers Restricted network 8 NAP client with limited access Network Access Protection component interaction Remediation server System health updates HCS NPS NAP client DHCP server Remote Authentication Dial-in User Service (RADIUS) messages 9 Network Access Protection component interaction (2) Policy server System health requirement queries VPN server NPS NAP client IEEE 802.1X devices RADIUS messages 10 Network Access Protection client architecture components System Health Agent (SHA) NAP Agent NAP Enforcement Client (EC) IPsec NAP EC EAPHost NAP EC VPN NAP EC DHCP NAP EC 11 Network Access Protection client architecture Remediation server 1 Remediation server 2 SHA_1 SHA_3 ... NAP EC_C ... SHA_2 SHA API NAP Agent NAP client NAP EC API NAP EC_A NAP server A NAP EC_B NAP server B NAP server C 12 Network Access Protection server architecture components System Health Validator (SHV) NAP Administration Server NPS NAP Enforcement Server (ES) IPsec NAP ES VPN NAP ES DHCP NAP ES 13 Network Access Protection Server architecture Policy server 1 SHV_1 Policy server 2 SHV_2 SHV_3 ... SHV API NAP Administration Server NPS NPS RADIUS NAP ES_A NAP ES_B NAP ES_C ... NAP server NAP client 14 Matched components Provided by NAP platform Remediation Server 1 Policy Server 1 Remediation Server 2 Policy Server 2 Provided by third parties SHV2 SHA1 SHA2 SHA API SHV1 SHV3 SHV API NAP Administration Server NPS NAP Agent NAP client NPS NAP EC API NAP EC_A RADIUS NAP EC_B NAP ES_B NAP ES_A NAP server 15 Component communication: client to server SHV2 SHA1 SHA2 SHV1 SHV API NPS NAP Administration Server SHA API NPS NAP Agent NAP client NAP EC API NAP ES_A NAP EC_A NAP server Statement of Health (SoH) 16 List of SoHs Component communication: server to client SHV2 SHA1 SHA2 SHV1 SHV API NPS NAP Administration Server SHA API NPS NAP Agent NAP client NAP EC API NAP ES_A NAP EC_A NAP server SoH Response (SoHR) 17 List of SoHRs How Network Access Protection works DHCP enforcement Remote access VPN enforcement IEEE 802.1X enforcement IPsec enforcement 18 DHCP enforcement For noncompliant computers, prevents unlimited access to a network through a limited DHCP address configuration Network Access Protection-capable DHCP clients use their list of SoHs as proof of their health compliance 19 DHCP enforcement (2) 1. DHCP client sends its list of SoHs to its DHCP server using the DHCPDiscover message. 2. DHCP server passes the list of SoHs to the NPS in a RADIUS Access-Request message. 3. NAP Administration Server on the NPS passes the SoHs to their SHVs. 4. SHVs evaluate their SoHs and respond with SoHRs. 20 DHCP enforcement (3) 5. NPS evaluates the SoHRs against policy settings and makes a limited/unlimited network access decision. 6. NPS sends a RADIUS Access-Accept message containing the SSoHR and list of SoHRs to DHCP server. 7. Client and DHCP server complete the DHCP configuration. 21 Noncompliant DHCP NAP client 1. NAP Agent passes the SoHRs to their SHAs. 2. SHAs perform remediation and pass their updated SoHs to the NAP Agent. 3. Client sends a DHCPRequest message containing the updated list of SoHs to the DHCP server. 4. DHCP validates the health state with NPS and assigns the client an unlimited access address configuration. 22 VPN enforcement For noncompliant computers, prevents unlimited access to a network through a remote access VPN connection Network Access Protection-capable VPN clients use their list of SoHs as proof of their health compliance 23 VPN enforcement (2) 1. VPN client initiates a remote access VPN connection. 2. Client and the NPS create a secure channel with PEAP. 3. Client sends its list of SoHs to the NPS with a PEAP-TLV message. 4. Client performs authentication for VPN connection with a negotiated PEAP method. 5. NAP Administration Server on the NPS passes the SoHs to their SHVs. 24 VPN enforcement (3) 6. SHVs evaluate their SoHs and respond with SoHRs. 7. NPS evaluates the SoHRs against policy settings and makes a limited/unlimited network access decision. 8. NPS sends a PEAP-TLV message containing the SSoHR and the list of SoHRs to the client. 9. NPS sends RADIUS Access-Accept message to the VPN server indicating either limited or unlimited access. 10. Client and VPN server complete the VPN connection. 25 Noncompliant VPN NAP client 1. NAP Agent passes SoHRs to their SHAs. 2. SHAs perform remediation and pass an updated SoH to the NAP Agent. 3. Client sends the updated list of SoHs to the NPS by using a PEAP-TLV message to obtain an unlimited access connection. 26 802.1X enforcement For noncompliant computers, prevents unlimited access to a network through an 802.1X-authenticated connection Network Access Protection-capable 802.1X clients can use either their list of SoHs or a health certificate as proof of their health compliance 27 802.1X enforcement using a list of SoHs 1. Client or 802.1X access point starts 802.1X authentication using EAPOL. 2. Client and the NPS create secure channel with PEAP. 3. Client sends the list of SoHs to the NPS with a PEAP-Type-Length-Value (TLV) message. 4. Client performs 802.1X authentication with a negotiated PEAP method. 5. NAP Administration Server on the NPS passes the SoHs to their SHVs. 28 802.1X enforcement using a list of SoHs (2) 6. SHVs evaluate their SoHs and respond with SoHRs. 7. NPS evaluates the SoHRs against policy settings and makes a limited/unlimited network access decision. 8. NPS sends a PEAP-TLV message containing the SSoHR and the list of SoHRs to the client. 9. NPS sends a RADIUS Access-Accept message to the 802.1X access point indicating either limited or unlimited access. 10. Client and 802.1X access point complete the 802.1X connection. 29 Noncompliant 802.1X client using a list of SoHs 1. NAP Agent passes the SoHRs to their SHAs. 2. SHAs perform remediation and pass an updated SoH to the NAP Agent. 3. Client restarts 802.1X authentication to obtain an unlimited access connection. 30 802.1X enforcement using a health certificate 1. Client or 802.1X access point starts 802.1X authentication using EAPOL. 2. Client and the NPS create a secure channel with PEAP. 3. Client performs 802.1X authentication with a negotiated PEAP method. 4. Client sends the health certificate to the NPS using a PEAP-TLV message. 31 802.1X enforcement using a health certificate (2) 5. NPS validates the health certificate and makes a limited/unlimited network access decision. 6. NPS sends a PEAP-TLV message containing the SSoHR to the client. 7. NPS sends a RADIUS Access-Accept message to the 802.1X access point indicating either limited or unlimited access. 8. Client and 802.1X access point complete the 802.1X connection. 32 Noncompliant 802.1X client using a health certificate 1. Client creates an HTTPS channel with the HCS. 2. Client sends its credentials and its current list of SoHs to the HCS. 3. HCS validates the credentials and list of SoHs with the NPS and obtains a health certificate for the client. 4. Client restarts 802.1X authentication to obtain an unlimited access connection. 33 IPsec enforcement For noncompliant computers, prevents communication with compliant computers Compliant computers obtain a health certificate as proof of their health compliance Health certificate is used for peer authentication when negotiating IPsecprotected communications 34 IPsec enforcement logical networks Client Health certificate server Policy servers NPS servers Secure network Remediation servers Boundary network Restricted network 35 Allowed communication with IPsec enforcement Secure network Boundary network Unuathenticated initiated communication Restricted network IPsec-authenticated initiated communication 36 IPsec enforcement startup 1. Client starts up on the restricted network. 2. Client creates an HTTPS secure communication channel with the HCS. 3. Client sends its credentials and its list of SoHs to the HCS. 4. HCS forwards the client identity and health status information to the NPS for validation using RADIUS Access-Request message. 5. NAP Administration Server on the NPS passes the SoHs to their SHVs. 37 IPsec enforcement startup (2) 6. SHVs evaluate the SoHs and respond with SoHRs. 7. NPS evaluates the SoHRs against policy settings and makes a limited/unlimited network access decision. 8. NPS sends a RADIUS Access-Accept message that contains the System SoHR (SSoHR) and the list of SoHRs to the HCS. 9. HCS sends the SSoHR and list of SoHRs to the client. 10. If compliant, HCS obtains a health certificate for the client. Client is on the secure network. 38 Noncompliant IPsec NAP client 1. NAP Agent passes the SoHRs to their SHAs. 2. SHAs perform remediation and pass updated SoHs to the NAP Agent. 3. Client creates a new HTTPS channel with the HCS. 4. Client sends its credentials and its updated list of SoHs to the HCS. 5. HCS validates the credentials and the new list of SoHs with the NPS and obtains a health certificate for the client. 39 Network Access Protection resources Network Access Protection Web site http://www.microsoft.com/nap “Network Access Protection Platform Architecture” white paper http://www.microsoft.com/technet/itsolutions /network/nap/naparch.mspx 40