Network Access Protection Network Access Protection (NAP) is a platform and solution introduced in Windows Server 2008 R2 that helps to maintain the network's overall integrity by controlling access to network resources based on a client computer's compliance with system health policies. Examples of system health policies include making sure that clients have the latest antivirus definitions and security updates installed, a firewall installed and enabled, and so on. If a client is not compliant with the network health requirements, NAP can be configured to limit the client's network access. NAP also provides a mechanism to automatically bring the client back to compliance. The NAP server validates client health using the system health policies. The NAP server is supported on Windows Server 2008 R2. The NAP client is supported on the following operating systems: • Windows Server 2008 R2 • Windows 7 • How NAP Works, page 1 • Using Microsoft Windows NAP with Unified CCE, page 2 • More NAP References, page 3 How NAP Works When a NAP client attempts to connect to the network, the client's health state is validated against the health requirement policies defined in the Network Policy Server (NPS). If a client is not compliant with the defined health policies, the administrator can choose to limit the client's access to a restricted network. This restricted network ideally contains health update resources for the client to gain compliance. In this limited access environment, only clients that comply with the health requirement policies are allowed unlimited access to the network. However, the administrator can also define exceptions. The administrator can choose to configure a monitoring-only environment where the noncompliant client can still be granted full network access. In this environment, the compliant state for each client is logged. The administrator can also choose to automatically update noncompliant clients with missing software updates to help ensure compliance. In a limited access environment, noncompliant clients have restricted network Security Best Practices Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0 1 Network Access Protection Using Microsoft Windows NAP with Unified CCE access until the updates and configuration changes are completed. In a monitoring-only environment, noncompliant clients have full access to the network before they are updated with the required changes. With all these options available, administrators can configure a solution that is best tailored to the needs of their networks. Note The Microsoft literature contains important information about NAP. For the latest information, refer to the Network Access Protection (Microsoft TechNet) at http://technet.microsoft.com/en-us/network/ bb545879. Using Microsoft Windows NAP with Unified CCE Network Policy Server As a general rule, do not use a Unified CCE server for any other purpose than for Unified CCE approved software. Therefore, do not run the Network Policy Server on any Unified CCE machine such as ICM, CVP, and so on. Unified CCE Servers and NAP NAP can be used in a few different ways. The following are some deployment options a user can consider using with Unified CCE: • Unified CCE servers using a limited access environment—NOT SUPPORTED Warning In this model, the Unified CCE servers such as the ICM PG, ICM Router, ICM Logger, and ICM AW/HDS would become inaccessible if they fall out of compliance. This inaccessibility would cause the entire call center to go down until machines become compliant again. • Unified CCE server uses monitoring-only environment This mode could be useful to track the health status of the Unified CCE servers. • Unified CCE servers that are exempt from health validation In this mode, the Unified CCE servers work in a NAP environment but do not become inaccessible from the network. The Unified CCE server's state of health does not affect communications to and from the Unified CCE servers. Unified CCE Client Machines and NAP The following contains information about Unified CCE client machines and NAP. • Unified CCE client machines using limited access environment: Security Best Practices Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0 2 Network Access Protection More NAP References Systems in this environment must be compliant with all policies that the network administrator sets up. For example, if an agent desktop is in this environment then the agent would not be able to sign in or contact the Agent PG in any way until the client machine becomes compliant with the NAP policies that are active. • Unified CCE client machines using monitoring-only environment: Same as above for Unified CCE servers. • Unified CCE client machines that are exempt from health validation: Same as above for Unified CCE servers. More NAP References For more information about NAP, see the following references: • Network Access Protection Design Guide: http://technet.microsoft.com/en-us/library/ dd125338(WS.10).aspx • Windows Server 2008 R2 Networking and Network Access Protection (NAP) by Microsoft Press • Cisco NAC and Microsoft NAP Interoperability Architecture: http://www.cisco.com/en/US/netsol/ns812/ index.html Security Best Practices Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0 3 Network Access Protection More NAP References Security Best Practices Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0 4
© Copyright 2026 Paperzz