{"id":4029,"date":"2015-08-31T09:55:08","date_gmt":"2015-08-31T14:55:08","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=4029"},"modified":"2015-07-24T09:59:58","modified_gmt":"2015-07-24T14:59:58","slug":"installing-and-configuring-directaccess-in-windows-server-2012-part-2","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/installing-and-configuring-directaccess-in-windows-server-2012-part-2\/","title":{"rendered":"Installing and configuring DirectAccess in Windows Server 2012 &#8211; Part 2"},"content":{"rendered":"<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">By now we\u2019ve learned about the main principles behind <a href=\"\/blog\/how-to-install-configure-remote-access-servers\/\">DirectAccess<\/a>, its features, how to install it and we\u2019ve started configuring it on a Windows Server 2012 box. I\u2019ve previously pointed out that there are four main steps that needs consideration in order to successfully deploy DirectAccess, we\u2019ve completed the first one in the last article and today we\u2019ll continue with the rest. Please make sure to read the previous articles before proceeding further because by now you should have deployed and configured a portion of the DirectAccess infrastructure.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">We will now proceed with the remaining steps of our DirectAccess deployment. In the following phase of our configuration we\u2019ll need to setup the <i>Remote Access Server<\/i>. Once you click on the <i>Edit<\/i> button from Step 2 of the DirectAccess map, you will be presented to the following wizard:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4038 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-1.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-1\" width=\"857\" height=\"539\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-1.png 857w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-1-300x189.png 300w\" sizes=\"auto, (max-width: 857px) 100vw, 857px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Add the public DNS name or the IP address of your Remote Access Server. Note that my DirectAccess server is located behind an edge device (my router who\u2019s performing NAT) and it\u2019s deployed with a single network adapter so I\u2019ll chose the appropriate option.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In the following window we\u2019ll have to set the network interface that is exposed to our private network. Note that DirectAccess uses computer certificates to authenticate <i>IP-HTTPS<\/i> connections, you can either use a <a href=\"\/help\/sslhints\/\">self-signed certificate<\/a> or deploy one from your local <i>CA (Certification Authority).<\/i><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The last page of the Remote Access Server configuration wizard, deals with how DirectAccess clients authenticate with the server:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4039 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-2.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-2\" width=\"856\" height=\"542\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-2.png 856w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-2-300x190.png 300w\" sizes=\"auto, (max-width: 856px) 100vw, 856px\"><\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">By default, <b><i>User Authentication<\/i><\/b> is performed by supplying the Active Directory credentials (username and password). In this scenario, the Remote Access Server acts as a Kerberos proxy to forward requests to the closest Domain Controller (DC) available on behalf of the client.<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">You can also opt for <b><i>two-factor authentication<\/i><\/b> which adds an extra authentication mechanism in which users have to provide an <i>OTP (one-time password)<\/i> or insert a <i>smart card<\/i>. OTP can be provided from a RSA SecurID but those require extra deployments such as PKI and RADIUS servers.<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">If you opt for DirectAccess <b><i>authentication using computer certificates<\/i><\/b>, you\u2019ll need to select either the root or the intermediate CA certificate.<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">By default, Windows 7 clients will not be able to connect to a Windows Server 2012 machine so make sure to check that box if it\u2019s required.<\/span><\/li>\n<li><span style=\"font-family: verdana, geneva, sans-serif;\">As an extra security layer you can <b><i>enable NAP enforcement over DirectAccess<\/i><\/b>.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Once the Remote Access Server has been configured, it\u2019s time to proceed further with step 3 that deals with <i>Infrastructure server<\/i> setup:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4030 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-3.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-3\" width=\"857\" height=\"614\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-3.png 857w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-3-300x215.png 300w\" sizes=\"auto, (max-width: 857px) 100vw, 857px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">On the first page of the wizard you will have to specify the network location server. You can opt for a <i>remote web server<\/i> or use the <i>Remote Access server<\/i> (with a self-signed certificate for authentication). As we\u2019ve mentioned in a previous article, the network location server is used by DirectAccess clients to determine if they are located within the enterprise network or connected directly to the public Internet:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4031 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-4.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-4\" width=\"860\" height=\"542\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-4.png 860w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-4-300x189.png 300w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">You can add the name suffixes and the associated <a href=\"\/help\/sm_6_0\/monitor-dns.aspx\">DNS servers<\/a> that are authoritative for a particular domain in the DNS page of the wizard. This basically builds a table that informs DirectAccess servers what DNS server should be queried for a particular domain name. This table is also known as <i>NRPT (Name Resolution Policy Table)<\/i> which is written into the GPOs and applied to the DirectAcess clients. In this section you will also have to configure the local name resolution behavior that will be used by clients. It\u2019s recommended that you <i>use local name resolution if the name does not exist in DNS or the DNS servers are unreachable when the client computer is on a private network<\/i>. By selecting this option, you ensure that if DNS servers are not responsive for whatever reason, their names and IPs are not leaked through local name resolution:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4032 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-5.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-5\" width=\"857\" height=\"539\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-5.png 857w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-5-300x189.png 300w\" sizes=\"auto, (max-width: 857px) 100vw, 857px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In the following section is where the ordered search suffix list can be created. This option allows clients to query for single-label DNS names. The host will then append each suffix (in the order they were added here) to search for a particular DNS name:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4033 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-6.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-6\" width=\"859\" height=\"541\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-6.png 859w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-6-300x189.png 300w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In last page of the wizard we specify the management servers that cannot be detected by DirectAcess clients. I\u2019m saying only \u201cservers that cannot be detected\u201d because DNS can be used for example, to detect Domain Controllers or SCCM servers. Servers that can be added here may include third party update software or antivirus. You can add the FQDN, IPv4 or IPv6 address of these machines:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4034 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-7.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-7\" width=\"858\" height=\"541\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-7.png 858w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-7-300x189.png 300w\" sizes=\"auto, (max-width: 858px) 100vw, 858px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">We\u2019ll finish our DirectAcess configuration with Step 4 in which we can optionally specify application servers if end-to-end authentication and encryption is needed. By default, DirectAcess provides these two security mechanisms between the client and the server. If you want to extend authentication and encryption further, you can specify them within this section. Optionally, you can restrict access only to the servers specified here or use only authentication without encryption. Note that if you choose to extend authentication to other application servers, IPv6 addressing is required:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4035 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-8.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-8\" width=\"755\" height=\"555\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-8.png 755w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-8-300x221.png 300w\" sizes=\"auto, (max-width: 755px) 100vw, 755px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Now that the final step has been completed, we can <i>view the configuration summar<\/i>y by accessing the right section of the DirectAcess console. All these settings will be applied to the clients once you click the <i>apply<\/i> button:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4036 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-9.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-9\" width=\"742\" height=\"515\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-9.png 742w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-9-300x208.png 300w\" sizes=\"auto, (max-width: 742px) 100vw, 742px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Additionally, you can opt for enabling <i>multisite deployment<\/i> and\/or <i>load balancing<\/i>. We\u2019ve discussed about these two features in the first DirectAcess article so there\u2019s no need to explain them here. In the <i>operations status page<\/i> you can verify if your DirectAcess infrastructure is operating accordingly. If any issues occur, they will be thrown here:<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-4037 aligncenter\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-10.png\" alt=\"Installing and configuring DirectAccess in Windows Server 2012-Part 2-10\" width=\"829\" height=\"478\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-10.png 829w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2015\/07\/installing-and-configuring-directaccess-in-windows-server-2012-part-2-10-300x173.png 300w\" sizes=\"auto, (max-width: 829px) 100vw, 829px\"><\/a><\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">If you\u2019ve followed all these steps in this order, you should now have a working DirectAcess infrastructure. All that\u2019s left to do is to test the connection using a DirectAcess client that\u2019s connected through an external line. I\u2019ve tried to explain each step required so you have a better understanding of this technology. If you still have any misunderstandings please don\u2019t hesitate to post a comment in our dedicated section and I\u2019ll try to respond as soon as possible. Hope these articles were well written and you now have a clear overview of DirectAcess. Wish you all the best and stay tuned for the following articles.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 By now we\u2019ve learned about the main principles behind DirectAccess, its features, how to install it and we\u2019ve started configuring it on a Windows Server 2012 box. I\u2019ve previously pointed out that there are four main steps that needs consideration in order to successfully deploy DirectAccess, we\u2019ve completed the first one in the last [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4041,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,9,8],"tags":[],"class_list":["post-4029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4029"}],"version-history":[{"count":4,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4029\/revisions"}],"predecessor-version":[{"id":4043,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4029\/revisions\/4043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4041"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}