Step by Step Guide: Demonstrate VPN NAP Enforcement in A Test Lab
Step by Step Guide: Demonstrate VPN NAP Enforcement in A Test Lab
Abstract
Network Access Protection (NAP) is a new policy enforcement technology in Windows Vista, Windows Server 2008, and Windows XP with Service Pack 3 (SP3). NAP provides components and an application programming interface (API) set that help administrators enforce compliance with health requirements for network access and communication. This paper contains an introduction to NAP and instructions for setting up a test lab to deploy NAP with the VPN enforcement method.
Copyright Information
This document is provided for informational purposes only and Microsoft makes no warranties, either express or implied, in this document. Information in this document, including URL and other Internet Web site references, is subject to change without notice. The entire risk of the use or the results from the use of this document remains with the user. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. 2008 Microsoft Corporation. All rights reserved. Microsoft, MS-DOS, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.
Contents
Step By Step Guide: Demonstrate VPN NAP Enforcement in a Test Lab.......................................1 Abstract....................................................................................................................................1 Copyright Information......................................................................................................................2 Contents..........................................................................................................................................3 Step-by-Step Guide: Demonstrate NAP VPN Enforcement in a Test Lab.......................................5 In this guide.................................................................................................................................5 Scenario overview.......................................................................................................................6 NAP enforcement processes....................................................................................................6 Policy validation....................................................................................................................6 NAP enforcement and network restriction.............................................................................7 Remediation..........................................................................................................................7 Ongoing monitoring to ensure compliance............................................................................7 NAP VPN enforcement overview.................................................................................................8 Hardware and software requirements..........................................................................................8 Steps for configuring the test lab.................................................................................................9 Configure DC1...........................................................................................................................10 Install the operating system on DC1.......................................................................................10 Configure TCP/IP on DC1......................................................................................................10 Configure DC1 as a domain controller and DNS server.........................................................11 Install an enterprise root CA on DC1......................................................................................11 Create a user account in Active Directory..............................................................................13 Add user1 to the Domain Admins group.................................................................................13 Grant remote access permission to user1..............................................................................13 Create a security group for NAP client computers..................................................................14 Configure VPN1.........................................................................................................................14 Install Windows Server 2008..................................................................................................15 Configure TCP/IP properties on VPN1...................................................................................15 Join VPN1 to the Contoso.com domain..................................................................................16 User Account Control.............................................................................................................16 Install the Routing and Remote Access server role................................................................16 Configure Routing and Remote Access..................................................................................17 Configure authentication methods on VPN1..........................................................................21 Allow ping on VPN1................................................................................................................21 Configure NPS1.........................................................................................................................22 Install Windows Server 2008 or Windows Server 2008 R2....................................................22 Configure TCP/IP properties on NPS1...................................................................................23 Join NPS1 to the Contoso.com domain..................................................................................23
Install the NPS server role......................................................................................................24 Install the Group Policy Management feature.........................................................................24 Configure NAP client settings in Group Policy........................................................................25 Configure security filters for the NAP client settings GPO...................................................26 Obtain a computer certificate on NPS1..................................................................................26 Configure NPS as a NAP health policy server........................................................................27 Configure NAP with a wizard..............................................................................................28 Configure system health validators.....................................................................................30 Configure VPN1 as a NAP-capable RADIUS client............................................................31 Allow ping on NPS1................................................................................................................33 Configure CLIENT1...................................................................................................................33 Install Windows Vista or Windows 7 on CLIENT1..................................................................34 Configure TCP/IP for the intranet network segment...............................................................34 Enable Run on the Start menu...............................................................................................35 Verify network connectivity for CLIENT1................................................................................35 Join CLIENT1 to the Contoso.com domain............................................................................35 Add CLIENT1 to the NAP client computers security group.....................................................36 Verify Group Policy settings...................................................................................................36 Configure CLIENT1 for the Internet network segment............................................................37 Configure TCP/IP on CLIENT1...........................................................................................37 Verify network connectivity for CLIENT1.............................................................................37 Configure and test a VPN connection....................................................................................38 Configure a VPN connection...............................................................................................38 Test the new VPN connection.............................................................................................39 Verifying NAP functionality.........................................................................................................40 Verification of NAP auto-remediation......................................................................................40 Verification of NAP policy enforcement..................................................................................42 Configure WSHV to require an antivirus application...........................................................42 Connect to VPN1 from CLIENT1........................................................................................43 Remove the antivirus health requirement so that CLIENT1 can become compliant...........44 See Also....................................................................................................................................44 Appendix.......................................................................................................................................45 Set UAC behavior of the elevation prompt for administrators....................................................45 Review NAP client events..........................................................................................................45 Review NAP server events........................................................................................................46
The step-by-step instructions in this paper will show you how to deploy a NAP VPN enforcement test lab so that you can better understand how VPN enforcement works.
In this guide
This paper contains an introduction to NAP and instructions for setting up a test lab and deploying NAP with the VPN enforcement method using three server computers and one client computer. You create and enforce client health requirements using NAP and VPN. Important The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. This configuration is neither designed to reflect best practices nor does it reflect a desired or recommended
5
configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.
Scenario overview
In this test lab, NAP enforcement for VPN network access control is deployed with a server running Network Policy Server (NPS), a server running Routing and Remote Access, and a VPN enforcement client component. NAP-capable client computers with valid authentication credentials will be provided VPN access to an intranet based on their compliance with network health requirements.
Policy validation
NAP policy validation is performed by NPS in its role as a NAP health policy server and a Remote Authentication Dial-in User Service (RADIUS) server. System health validators (SHVs) are used by NPS to analyze the health status of client computers. SHVs are incorporated into network polices that determine actions to be taken based on client health status, such as the granting of full network access or the restricting of network access. Health status is monitored by client-side NAP components called system health agents (SHAs). NAP uses SHAs and SHVs to monitor, enforce, and remediate client computer configurations. Windows Security Health Agent (WSHA) and Windows Security Health Validator (WSHV) are included with the Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, and enforce the following settings for NAP-capable computers: The client computer has firewall software installed and enabled. The client computer has antivirus software installed and running. The client computer has current antivirus updates installed. The client computer has antispyware software installed and running. The client computer has current antispyware updates installed. Microsoft Update Services is enabled on the client computer.
In addition, if NAP-capable client computers are running Windows Update Agent, NAP can verify that the most recent software security updates are installed based on one of four possible values that match security severity ratings from the Microsoft Security Response Center (MSRC). This test lab will use the WSHA and WSHV to require that client computers have turned on Windows Firewall, and have an antivirus application installed.
Remediation
Noncompliant client computers that are placed on a restricted network might undergo remediation. Remediation is the process of updating a client computer so that it meets current health requirements. If additional resources are required for a noncompliant computer to update its health state, these resources must be provided on the restricted network. For example, a restricted network might contain a File Transfer Protocol (FTP) server that provides current virus signatures so that noncompliant client computers can update their outdated signatures. You can use NAP settings in NPS network policies to configure automatic remediation so that NAP client components automatically attempt to update the client computer when it is noncompliant. This test lab includes a demonstration of automatic remediation. The Enable auto-remediation of client computers setting will be enabled in the noncompliant network policy, causing Windows Firewall to be turned on without user intervention.
In the test lab, CLIENT1 will initiate a VPN tunnel connection from the Internet segment to the intranet network segment through VPN1. If valid authentication credentials are provided by CLIENT1, the VPN server will request a SoH from the CLIENT1. The SoH is forwarded to NPS1, which serves as a NAP health policy server by evaluating the health status of client computers attempting to connect to the intranet network segment. Based on client health status contained in the SoH, and the current configuration of NAP health policies, NPS1 will instruct VPN1 to either authorize full intranet network access, or restrict access to a limited network.
Note This lab demonstrates NAP support for the Active Directory directory service in Windows Server 2003. You can also make the domain controller in this lab run Windows Server 2008 or Windows Server 2008 R2. Two computers that meet the minimum hardware requirements for Windows Server 2008 or Windows Server 2008 R2. One computer that meets the minimum hardware requirements for Windows Vista or Windows 7. Two Ethernet hubs or layer 2 switches.
Configure DC1
DC1 is a computer running Windows Server 2003 Standard Edition with SP2, providing the following services: A domain controller for the Contoso.com Active Directory domain. A DNS server for the Contoso.com DNS domain. The enterprise root CA for the Contoso.com domain.
Note Auto-enrollment of user certificates for EAP-TLS authentication is available with Windows Server 2003 Enterprise Edition. For this test lab deployment, the Certificates Request Wizard will be used to obtain a computer certificate for NPS1. DC1 configuration consists of the following steps: Install the operating system. Configure TCP/IP. Install Active Directory and DNS. Install an enterprise root CA. Create a user account and group in Active Directory. Create a NAP client computer security group.
5. Verify that Preferred DNS server is blank. 6. Click OK, click Close, and then close the Network Connections window.
2. Click Add/Remove Windows Components. 3. In the Windows Components Wizard dialog box, select the Certificate Services check box. 4. If a Microsoft Certificate Services dialog box appears warning you that the domain name and computer name cannot be changed, click Yes. 5. In the Windows Components Wizard dialog box, click Next. 6. Select Enterprise root CA, and then click Next. 7. In Common name for this CA, type Root CA. The following figure shows an example.
8. Click Next, and then click Next again. 9. If a Microsoft Certificate Services dialog box appears warning you that Internet Information Services (IIS) is not installed, click OK. You do not need to install IIS on DC1 for certificate Web enrollment support. 10. Click Finish. 11. Close the Add or Remove Programs window.
12
13
To grant remote access permission to user1 1. In the Active Directory Users and Computers console tree, double-click Contoso.com, and then click Users. 2. In the details pane, double-click User1 User. 3. In the User1 User Properties dialog box, click the Dial-in tab. 4. Under Remote Access Permission (Dial-in or VPN), select Allow access, and then click OK. 5. Leave the Active Directory Users and Computers console open for the following procedure.
Configure VPN1
For the test lab, VPN1 will be running Windows Server 2008, and will host Routing and Remote Access, which provides a VPN access point for CLIENT1. VPN1 has two network adapters so that it can be connected to both the intranet and Internet network segments. VPN1 is configured in the following steps: Install the operating system. Configure TCP/IP. Join the computer to the domain. Install and configure Routing and Remote Access. Allow ping on VPN1.
The following sections provide details about how to perform these tasks.
14
VPN1 and DC1. 17. Click Start, click Run, type cmd, and then press ENTER. 18. In the command window, type ping DC1. 19. Verify that the response reads Reply from 192.168.0.1." 20. Close the command window.
16
To install the Routing and Remote Access server role 1. Click Close in the Initial Configuration Tasks window, and then use Server Manager, which is automatically displayed, to perform this procedure. 2. Under Roles Summary, click Add Roles, and then click Next. 3. Select the Network Policy and Access Services check box, and then click Next twice. 4. Select the Remote Access Service check box, click Next, and then click Install. 5. Verify the installation was successful, and then click Close. 6. Close Server Manager.
17
4. Select the VPN check box, and then click Next. 5. Click the network interface with an IP address of 131.107.0.1. Clear the check box next to Enable security on the selected interface by setting up static packet filters, and then click Next. This ensures that CLIENT1 will be able to ping VPN1 when attached to the Internet subnet without having to configure additional packet filters for ICMP traffic. See the following example.
18
6. On the IP Address Assignment page, select From a specified range of addresses, and then click Next. 7. On the Address Range Assignment page, click New. Type 192.168.0.100 next to Start IP address and 192.168.0.110 next to End IP address, and then click OK. Verify that 11 IP addresses were assigned for remote clients, and then click Next. See the following example.
19
8. On the Managing Multiple Remote Access Servers page, select Yes, set up this server to work with a RADIUS server, and then click Next. 9. On the RADIUS Server Selection page, type 192.168.0.2 next to Primary RADIUS server, and type secret next to Shared secret. See the following example.
20
10. Click Next, and then click Finish. 11. In the Routing and Remote Access notification box that appears, click OK and then wait for Routing and Remote Access to start.
To allow ping on VPN1 1. Click Start, click Run, type wf.msc, and then press ENTER. 2. In the Windows Firewall with Advanced Security console tree, right-click Inbound Rules, and then click New Rule. 3. Select Custom, and then click Next. 4. Select All programs, and then click Next. 5. Next to Protocol type, select ICMPv4, and then click Customize. 6. Select Specific ICMP types, select the Echo Request check box, click OK, and then click Next. 7. Click Next to accept the default scope. 8. In the Action window, verify that Allow the connection is selected, and then click Next. 9. Click Next to accept the default profile. 10. In the Name window, under Name, type ICMPv4 echo request, and then click Finish.
Configure NPS1
For the test lab, NPS1 will be running Windows Server 2008 or Windows Server 2008 R2, and will host the NPS service, which provides RADIUS authentication, authorization, and accounting for VPN1. NPS1 configuration consists of the following steps: Install the operating system. Configure TCP/IP. Join the computer to the domain. Install the NPS server role. Install the Group Policy Management feature. Configure NAP client settings in Group Policy. Obtain a computer certificate. Configure NPS as a NAP health policy server. Allow ping on NPS1.
3. Follow the instructions that appear on your screen to finish the installation.
5. Click More. Under Primary DNS suffix of this computer, type contoso.com, and then click OK twice. 6. When prompted for a user name and password, type User1 and the password for the user account that you added to the Domain Admins group, and then click OK. 7. When you see a dialog box that welcomes you to the Contoso.com domain, click OK. 8. When you are prompted to restart the computer, click OK. 9. On the System Properties dialog box, click Close. 10. When you are prompted to restart the computer, click Restart Now. 11. After the computer has been restarted, click Switch User, then click Other User and log on to the CONTOSO domain with the User1 account you created.
24
After these settings are configured in the GPO, security filters will be added to enforce the settings on computers you specify. The following section describes these steps in detail. To configure NAP client settings in Group Policy 1. On NPS1, click Start, click Run, type gpme.msc, and then press ENTER. 2. In the Browse for a Group Policy Object dialog box, next to Contoso.com, click the icon to create a new GPO, type NAP client settings for the name of the new GPO, and then click OK. 3. The Group Policy Management Editor window will open. Navigate to Computer Configuration/Policies/Windows Settings/Security Settings/System Services. 4. In the details pane, double-click Network Access Protection Agent. 5. In the Network Access Protection Agent Properties dialog box, select the Define this policy setting check box, choose Automatic, and then click OK. 6. In the console tree, open Network Access Protection\NAP Client Configuration\Enforcement Clients. 7. Do one of the following: a. If you are running Windows Vista on your CLIENT1 computer, in the details pane, right-click Remote Access Quarantine Enforcement Client, and then click Enable. b. If you are running Windows 7 on your CLIENT1 computer, in the details pane, right-click EAP Quarantine Enforcement Client, and then click Enable. 8. In the console tree, right-click NAP Client Configuration, and then click Apply. Note If you are running Windows Server 2008 R2, you can skip this step. 9. In the console tree, navigate to Computer Configuration\Policies\Administrative Templates\Windows Components\Security Center. 10. In the details pane, double-click Turn on Security Center (Domain PCs only), choose Enabled, and then click OK. 11. Close the Group Policy Management Editor window. 12. If you are prompted to apply settings, click Yes.
25
select Active Directory Enrollment Policy, click Next, select Computer, and then click Enroll.
8. Verify the status of certificate installation is Succeeded, and then click Finish. 9. Close the Console1 window. 10. Click No when prompted to save console settings.
27
two health policies in this test lab correspond to a compliant health state and a noncompliant health state. Network Policies. Network policies use conditions, settings, and constraints to determine who can connect to the network. There must be a network policy that will be applied to computers that are compliant with the health requirements, and a network policy that will be applied to computers that are noncompliant. For this test lab, compliant client computers will be allowed unrestricted network access. Clients determined to be noncompliant with health requirements will have their access restricted through the use of IP packet filters. Noncompliant clients will also be optionally updated to a compliant state and subsequently granted unrestricted network access. Connection Request Policies. Connection request policies are conditions and settings that validate requests for network access and govern where this validation is performed. In this test lab, a connection request policy is used that requires the client computer to perform protected EAP (PEAP) authentication before being granted access to the network. RADIUS Clients and Servers. RADIUS clients are network access servers. If you specify a RADIUS client, then a corresponding RADIUS server entry is required on the RADIUS client device. In this test lab, the VPN server is configured as a RADIUS client on NPS. You must also configure the VPN server to recognize NPS as a RADIUS server. Remediation Server Groups. Remediation server groups allow you to specify servers that are made available to noncompliant NAP clients so that they can remediate their health state and become compliant with health requirements. For this lab, you will configure a single remediation server so that noncompliant clients have access to domain services.
28
4. On the Select Network Connection Method for Use with NAP page, under Network connection method, select Virtual Private Network (VPN), and then click Next. 5. On the Specify NAP Enforcement Servers Running VPN Server page, under RADIUS clients, click Add. 6. In the New RADIUS Client dialog box, under Friendly name, type NAP VPN Server. Under Address (IP or DNS), type 192.168.0.3. 7. Under Shared secret, type secret. 8. Under Confirm shared secret, type secret, click OK, and then click Next. 9. On the Configure User Groups and Machine Groups page, click Next. You do not need to configure groups for this test lab. 10. On the Configure an Authentication Method page, confirm that a computer
29
certificate obtained in the previous procedure is displayed under NPS Server Certificate, and that Secure Password (PEAP-MSCHAP-v2) is selected under EAP types. Click Next. 11. On the Specify a NAP Remediation Server Group and URL page, click New Group. Important Noncompliant clients are automatically granted access to servers that you add to a remediation server group, provided this group is enabled in the network policy for noncompliant computers. You can also use IP Filters on the Settings tab of a network policy to grant or deny access to source and destination networks, using protocols you specify. At least one IP filter or remediation server group is required to enable restricted access for noncompliant computers. 12. In the New Remediation Server Group dialog box, under Group Name, type Domain Services, and then click Add. 13. In the Add New Server dialog box, under Friendly name, type DC1. 14. Under IP address or DNS name, type 192.168.0.1, and then click OK twice. 15. Under Remediation Server Group, verify that the newly created remediation server group is selected, and then click Next. 16. On the Define NAP Health Policy page, verify that Windows Security Health Validator and Enable auto-remediation of client computers check boxes are selected, and then click Next. 17. On the Completing NAP Enforcement Policy and RADIUS Client Configuration page, click Finish. 18. Leave the NPS console open for the following procedure.
5. Click OK to close the Windows Security Health Validator dialog box, and then click OK to close the Windows Security Health Validator Properties dialog box. 6. Leave the Network Policy Server console open for the following procedure. To configure system health validators in Windows Server 2008 R2 1. In the Network Policy Server console tree, open Network Access Protection/System Health Validators/Windows Security Health Validator/Settings. 2. In the details pane, under Name, double-click Default Configuration. 3. In the Windows Security Health Validator dialog box, in the left pane, select Windows 7/Windows Vista, and then under Choose policy settings for Windows Security Health Validator, clear all the check boxes except for A firewall is enabled for all network connections. 4. Click OK to close the Windows Security Health Validator dialog box, and then close the Network Policy Server console.
31
To configure VPN1 as a NAP-capable RADIUS client 1. In the NPS console tree, under RADIUS Clients and Servers, click RADIUS Clients. 2. In the details pane, double-click NAP VPN Server, and then do one of the following: If you are running Windows Server 2008, on the Settings tab, select the RADIUS client is NAP-capable check box. If you are running Windows Server 2008 R2, on the Advanced tab, select the RADIUS client is NAP-capable check box. See the following example for Windows Server 2008.
32
Configure CLIENT1
CLIENT1 is a computer running Windows Vista or Windows 7 that you will use to demonstrate how NAP can be used with VPN to help protect a network from noncompliant client computers. CLIENT1 must be configured as a domain member while connected to the intranet network segment, and then configured as a VPN client while connected to the Internet segment. CLIENT1 configuration is performed in the following steps: Install the operating system. Configure TCP/IP for the intranet and Internet network segments. Enable Run on the Start menu and verify network connectivity. Join CLIENT1 to the Contoso.com domain. Add CLIENT1 to the NAP client computers security group and restart the computer. Verify Group Policy settings. Configure CLIENT1 for the Internet network segment and verify network connectivity. Configure and test a VPN connection.
33
34
Note Before you restart the computer, you must add it to the NAP client computers security group so that CLIENT1 will receive NAP client settings from Group Policy.
status of the EAP Quarantine Enforcement Client is Enabled. 4. In the command window, type netsh nap client show state, and then press ENTER. 5. In the command output, under Enforcement client state, verify the following: a. If you are running Windows Vista on your CLIENT1 computer, verify that the Initialized status of the Remote Access Quarantine Enforcement Client is Yes. b. If you are running Windows 7 on your CLIENT1 computer, verify that the Initialized status of the EAP Quarantine Enforcement Client is Yes. 6. Close the command window.
37
To use the ping command to check network connectivity 1. Click Start, click All Programs, click Accessories, and then click Run. 2. Type cmd, and then press ENTER. 3. In the command window, type ping 131.107.0.1. 4. Verify that the response reads Reply from 131.107.0.1." 5. Close the command window.
Select Authentication Method. Clear the Enable Fast Reconnect check box, and then select the Enable Quarantine checks check box. See the following example.
domain, select the Save this user name and password for future use check box, and then click OK. 4. You are presented with a Validate Server Certificate window the first time this VPN connection is used. Click View Server Certificate, and verify Certificate Information shows that the certificate was issued to nps1.contoso.com by Root CA. Click OK to close the Certificate window, and then click OK again. 5. Wait for the VPN connection to be established. Because CLIENT1 is compliant, it should have unlimited access to the intranet subnet. 6. Click Start, click Run, type cmd, and then press ENTER. 7. In the command window, type ping 192.168.0.1. 8. Verify that the response reads Reply from 192.168.0.1." 9. In the command window, type ping 192.168.0.2. 10. Verify that the response reads Reply from 192.168.0.2." 11. In the command window, type ping 192.168.0.3. 12. Verify that the response reads Reply from 192.168.0.3." 13. Close the command window. 14. In the Network Connections window, right-click the Contoso connection, and then click Disconnect. 15. Leave the Network Connections window open for the procedures to follow.
then click OK. 4. In the Network Connections window that was left open from the previous procedure, right-click Contoso, and then click Connect. 5. Click Connect, and then click OK. 6. Wait for the VPN connection to be established. 7. You might see a message in the notification area that indicates the computer does not meet health requirements. This message is displayed because Windows Firewall has been turned off. Click this message for more detailed information about the health status of CLIENT1. See the following example.
8. The NAP client will automatically turn Windows Firewall on to become compliant with network health requirements. The following message will appear in the notification area: This computer meets the requirements of this network. See the following example.
41
9. In the Manage Network Connections window, right-click the Contoso connection, and then click Disconnect. 10. Leave the Network Connections window open for the following procedures.
Protection, and then click System Health Validators. 3. Double-click Windows Security Health Validator, and then click Configure. 4. In the Windows Security Health Validator dialog box, under Virus Protection, select the check box next to An antivirus application is on. 5. Click OK, and then click OK again to close the Windows Security Health Validator Properties window.
section, the Restriction state will be displayed as Restricted. 13. In the command output, under System health agent (SHA) state, verify next to Remediation results that Windows did not detect an antivirus program that is compatible with Windows Security Center is displayed. 14. Close the command window. 15. In the Network Connections window, right-click Contoso, and then click Disconnect. 16. Leave the Network Connections window open for the following procedure.
Remove the antivirus health requirement so that CLIENT1 can become compliant
To configure NAP policies on NPS1 to allow CLIENT1 to become compliant 1. Open the NPS management console on NPS1. 2. Open NPS (Local), then Network Access Protection, and then click System Health Validators. 3. Double-click Windows Security Health Validator, and then click Configure. 4. In the Windows Security Health Validator dialog box, under Virus Protection, clear the check box next to An antivirus application is on. 5. Click OK, and then click OK again to close the Windows Security Health Validator Properties window. 6. On CLIENT1, in the Network Connections window, right-click Contoso, and then click Connect. 7. Click Connect, and then click OK. 8. Wait for the VPN connection to be made. You should see a message in the notification area that indicates that the computer is compliant with health requirements. 9. Verify that CLIENT1 is compliant by using the command window to ping 192.168.0.2. 10. Verify that the response reads "Reply from 192.168.0.2." 11. Verify that CLIENT1 is compliant by using the command window to ping 192.168.0.3. 12. Verify that the response reads "Reply from 192.168.0.3."
See Also
http://go.microsoft.com/fwlink/?LinkId=56443
44
Appendix
This appendix will help you with troubleshooting techniques and the setting of optional features in Windows Server 2008 or Windows Server 2008 R2 and Windows Vista or Windows 7.
46