About the Author |
|
xix | |
About the Technical Reviewers |
|
xxi | |
Acknowledgments |
|
xxiii | |
Introduction |
|
xxv | |
|
Chapter 1 DirectAccess Overview |
|
|
1 | (8) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
IPv6 Transition Technologies |
|
|
2 | (1) |
|
|
2 | (1) |
|
Network Topology and IPv6 Transition Technologies |
|
|
3 | (1) |
|
IPv6 Translation Components |
|
|
3 | (1) |
|
Evolution of DirectAccess |
|
|
3 | (2) |
|
Forefront Unified Access Gateway |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
DirectAccess Supported Clients |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
DirectAccess Limitations and Drawbacks |
|
|
7 | (1) |
|
Choosing Between DirectAccess and VPN |
|
|
8 | (1) |
|
|
8 | (1) |
|
Chapter 2 Plan for DirectAccess |
|
|
9 | (12) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (4) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Edge Firewall Configuration |
|
|
12 | (1) |
|
Network Topology Considerations |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Forest and Domain Functional Levels |
|
|
15 | (1) |
|
Read-Only Domain Controllers (RODC) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Strong User Authentication |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (2) |
|
Chapter 3 Install DirectAccess |
|
|
21 | (24) |
|
|
21 | (22) |
|
Operating System Installation |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (7) |
|
Join Domain and Apply Updates |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (10) |
|
Installing the DirectAccess-VPN Role |
|
|
39 | (4) |
|
Configuring Additional Nodes |
|
|
43 | (1) |
|
|
43 | (2) |
|
Chapter 4 Configure DirectAccess with the Getting Started Wizard |
|
|
45 | (12) |
|
|
45 | (1) |
|
|
45 | (10) |
|
|
46 | (1) |
|
|
47 | (2) |
|
|
49 | (5) |
|
Confirm Policy Application |
|
|
54 | (1) |
|
Limitations and Drawbacks |
|
|
55 | (1) |
|
DirectAccess Client Targeting |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
Chapter 5 Configure DirectAccess with the Remote Access Setup Wizard |
|
|
57 | (26) |
|
Remote Access Setup Wizard |
|
|
57 | (2) |
|
|
58 | (1) |
|
|
59 | (23) |
|
|
60 | (4) |
|
Step 2 Remote Access Server |
|
|
64 | (5) |
|
Step 3 Infrastructure Servers |
|
|
69 | (11) |
|
Confirm Policy Application |
|
|
80 | (1) |
|
Step 4 Application Servers (Optional) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Chapter 6 Configure DirectAccess Load Balancing |
|
|
83 | (20) |
|
|
83 | (1) |
|
DirectAccess Load Balancing |
|
|
83 | (1) |
|
Windows Network Load Balancing |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
Preparing for Load Balancing |
|
|
85 | (4) |
|
|
85 | (3) |
|
|
88 | (1) |
|
Enable Network Load Balancing (NLB) |
|
|
89 | (10) |
|
|
94 | (2) |
|
|
96 | (3) |
|
Enable External Load Balancer (ELB) |
|
|
99 | (2) |
|
|
100 | (1) |
|
Load Balancer Configuration |
|
|
101 | (1) |
|
|
101 | (2) |
|
Chapter 7 Configure DirectAccess Geographic Redundancy |
|
|
103 | (30) |
|
|
103 | (1) |
|
Windows 8.x and Windows 10 |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (18) |
|
Create the First Entry Point |
|
|
105 | (8) |
|
Add Additional Entry Points |
|
|
113 | (10) |
|
Enable Load Balancing for an Entry Point |
|
|
123 | (1) |
|
|
123 | (8) |
|
GSLB Deployment Scenarios |
|
|
123 | (1) |
|
|
124 | (1) |
|
Enable GSLB Post-Deployment |
|
|
124 | (6) |
|
|
130 | (1) |
|
|
131 | (2) |
|
Chapter 8 Enable Two-Factor Authentication |
|
|
133 | (26) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
DirectAccess Configuration |
|
|
135 | (1) |
|
Enable Smart Card Authentication |
|
|
135 | (3) |
|
|
135 | (1) |
|
Smart Card End User Experience |
|
|
136 | (2) |
|
Enable OTP Authentication |
|
|
138 | (19) |
|
Configure Certificate Templates |
|
|
138 | (11) |
|
Configure Certification Authority (CA) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (5) |
|
|
155 | (2) |
|
Deployment Considerations |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
Incomplete OTP Functionality |
|
|
158 | (1) |
|
Reduced Scalability and Performance |
|
|
158 | (1) |
|
Diminished User Experience |
|
|
158 | (1) |
|
|
158 | (1) |
|
Chapter 9 Support Windows 7 Clients |
|
|
159 | (16) |
|
Deployment Considerations |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
DirectAccess Connectivity Assistant (DCA) v2.0 |
|
|
160 | (1) |
|
|
160 | (8) |
|
Deploy Group Policy Templates |
|
|
161 | (1) |
|
Create Group Policy Object |
|
|
161 | (5) |
|
|
166 | (1) |
|
Deploy Group Policy Object |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (4) |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (2) |
|
Chapter 10 Monitor and Report |
|
|
175 | (20) |
|
|
175 | (4) |
|
|
175 | (2) |
|
|
177 | (2) |
|
|
179 | (6) |
|
Remote Access Client Status |
|
|
179 | (6) |
|
|
185 | (2) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
187 | (6) |
|
|
193 | (2) |
|
|
195 | (36) |
|
DirectAccess Client Connection Process |
|
|
195 | (1) |
|
Server and Client Configuration |
|
|
196 | (1) |
|
|
196 | (9) |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
Unsupported Configurations |
|
|
205 | (1) |
|
|
205 | (9) |
|
|
205 | (2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
IPv6 Transition Technologies |
|
|
209 | (3) |
|
|
212 | (1) |
|
|
212 | (2) |
|
Connectivity Troubleshooting |
|
|
214 | (9) |
|
Connection Security Rules |
|
|
214 | (2) |
|
|
216 | (2) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (3) |
|
Helpful Tools and Commands |
|
|
223 | (6) |
|
DirectAccess Connection Status |
|
|
223 | (2) |
|
DirectAccess Connectivity Assistant |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
DirectAccess Client Troubleshooting Tool |
|
|
228 | (1) |
|
|
229 | (2) |
|
Chapter 12 Migrate to Windows Server 2016 DirectAccess |
|
|
231 | (6) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Unique Client Requirements |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
237 | (14) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (5) |
|
|
238 | (1) |
|
|
238 | (1) |
|
|
239 | (2) |
|
|
241 | (2) |
|
|
243 | (1) |
|
DirectAccess Management Computers |
|
|
243 | (1) |
|
|
244 | (5) |
|
|
244 | (4) |
|
|
248 | (1) |
|
|
249 | (2) |
|
Appendix A DirectAccess with Native IPv6 |
|
|
251 | (10) |
|
|
251 | (1) |
|
Remote Access Setup Wizard |
|
|
252 | (3) |
|
|
255 | (3) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
260 | (1) |
|
|
260 | (1) |
|
Appendix B DirectAccess and Force Tunneling |
|
|
261 | (6) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
Name Resolution Policy Table |
|
|
263 | (1) |
|
|
263 | (1) |
|
Limitations and Drawbacks |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (2) |
|
Appendix C DirectAccess Security Hardening |
|
|
267 | (6) |
|
|
267 | (1) |
|
IP-HTTPS Preauthentication |
|
|
267 | (1) |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
Index |
|
273 | |