Checklist: Implementing a VPN Enforcement Design

Updated: February 29, 2012

Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

This parent checklist includes cross-reference links to important concepts about the Network Access Protection (NAP) with virtual private network (VPN) enforcement design. It also contains links to subordinate checklists that will help you complete the tasks that are required to implement this design.


Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or you complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.

Checklist: Implementing a VPN enforcement design

Task Reference

Review important concepts and examples for the NAP with VPN enforcement design.

VPN Enforcement Design

VPN Enforcement Example

Review the hardware, software, network, and client requirements for deploying NAP.

Appendix A: NAP Requirements

According to your design plan, install and configure one or more VPN servers.

Checklist: Deploy a NAP VPN Server

According to your design plan, install and configure one or more NAP health policy servers.

Checklist: Deploy a NAP Health Policy Server

Configure Policies for VPN Enforcement

Configure NAP client computers for the VPN enforcement method.

Checklist: Deploy NAP Client Settings

See Also


VPN Enforcement Configuration