###BeginCaseStudy###
Topic 3, Litware, Inc
Overview
Litware, Inc., is a manufacturing company. The company has a main office and two branch offices. The main
office is located in Seattle. The branch offices are located in Los Angeles and Boston.
Existing Environment
Active Directory
The network contains an Active Directory forest named litwareinc.com. The forest contains a child domain
for each office. The child domains are named boston.litwareinc.com and la.litwareinc.com. An Active
Directory site exists for each office.
In each domain, all of the client computer accounts reside in an organizational unit (OU) named
AllComputers and all of the user accounts reside in an OU named AllUsers.
All domain controllers run Windows Server 2008 R2 and are configured as DNS servers.
The functional level of the domain and the forest is Windows Server 2008.
Network Infrastructure
The main office has the following servers:
Five physical Hyper-V hosts that run Windows Server 2012
Three virtual file servers that run Windows Server 2008 R2
One physical DHCP server that runs Windows Server 2008 R2
Ten physical application servers that run Windows Server 2012
One virtual IP Address Management (IPAM) server that runs Windows Server
2012
One virtual Windows Server Update Services (WSUS) server that runs
Windows Server 2008 R2
One physical domain controller and two virtual domain controllers that run
Windows Server 2008 R2
Each branch office has following servers:
One virtual file server that runs Windows Server 2008 R2
Two physical Hyper-V hosts that run Windows Server 2012
One physical DHCP server that runs Windows Server 2008 R2
One physical domain controller and two virtual domain controllers that run
Windows Server 2008 R2
All of the offices have a high-speed connection to the Internet. The offices connect to each other by using T1
leased lines.The IPAM server in the main office gathers data from the DNS servers and the DHCP servers in all of the
offices.
Requirements
Planned Changes
The company plans to implement the following changes:
Implement the Active Directory Recycle Bin.
Implement Network Access Protection (NAP).
Implement Folder Redirection in the Boston office only.
Deploy an application named Appl to all of the users in the Boston office
only.
Migrate to IPv6 addressing on all of the servers in the Los Angeles office.
Some application servers in the Los Angeles office will have only IPv6 addresses.
Technical Requirements
The company identifies the following technical requirements:
Minimize the amount of administrative effort whenever possible.
Ensure that NAP with IPSec enforcement can be configured.
Rename boston.litwareinc.com domain to bos.litwareinc.com.
Migrate the DHCP servers from the physical servers to a virtual server that
runs Windows Server 2012.
Ensure that the members of the Operators groups in all three domains can
manage the IPAM server from their client computer.
VPN Requirements
You plan to implement a third-party VPN server in each office. The VPN servers will be configured as RADIUS
clients. A server that runs Windows Server 2012 will perform RADIUS authentication for all of the VPN
connections.
Visualization Requirements
The company identifies the following visualization requirements:
Virtualize the application servers.
Ensure that the additional domain controllers for the branch offices can be
deployed by using domain controller cloning.
Automatically distribute the new virtual machines to Hyper-V hosts based on
the current resource usage of the Hyper-V hosts.
Server Deployment Requirements
The company identifies the following requirements for the deployment of new servers on the network:
Deploy the new servers over the network. Ensure that all of the server deployments are done by using multicast.
Security Requirements
A new branch office will open in Chicago. The new branch office will have a single read-only domain
controller (RODC). Confidential attributes must not be replicated to the Chicago office.
###EndCaseStudy###
You need to recommend a remote access solution that meets the VPN requirements.Which role service should you include in the recommendation?
A.
Routing
B.
Network Policy Server
C.
DirectAccess and VPN (RAS)
D.
Host Credential Authorization Protocol
Explanation:
Scenario:
A server that runs Windows Server 2012 will perform RADIUS authentication for all of the VPN connections.
Ensure that NAP with IPSec enforcement can be configured.
Network Policy Server
Network Policy Server (NPS) allows you to create and enforce organization-wide network access policies for
client health, connection request authentication, and connection request authorization. In addition, you can
use NPS as a Remote Authentication Dial-In User Service
(RADIUS) proxy to forward connection requests to a server running NPS or other RADIUS servers that you
configure in remote RADIUS server groups.
NPS allows you to centrally configure and manage network access authentication, authorization, are client
health policies with the following three features: RADIUS server. NPS performs centralized authorization,
authorization, and accounting for wireless, authenticating switch, remote access dial-up and virtual private
network (VNP) connections. When you use NPS as a RADIUS server, you configure network access servers,
such as wireless access points and VPN servers, as RADIUS clients in NPS. You also configure network policies
that NPS uses to authorize connection requests, and you can configure RADIUS accounting so that NPS logs
accounting information to log files on the local hard disk or in a Microsoft SQL Server database.
Network Policy Server
http://technet.microsoft.com/en-us/library/cc732912.aspx
Agree.
A) is NOT correct as client stated that they will be using a ‘third’ party VPN Server so no routing via MS Server should be done to achieve this.
b) is CORRECT as RADIUS is a feature of NPS. Thus to use RADIUS for auth on the third party VPN server then NPS must be installed.
c) is NOT correct as client stated that they will be using a ‘third’ party VPN server not MS.
D) is NOT correct as it allows the integration of AAA auth with current in place NAP infrastructure. NAP and NPS must already be installed and in place before enabling this protocol.
About Host Cred auth protocol: https://msdn.microsoft.com/en-us/library/cc732681(v=ws.11).aspx