Directaccess for Windows Server 2008 R2 Design, Deployment, And
Total Page:16
File Type:pdf, Size:1020Kb
DirectAccess for Windows Server 2008 R2 Design, Deployment, and Troubleshooting Guides Microsoft Corporation Published: December 2009 Updated: September 2010 Author: Joe Davies Editor: Scott Somahano Abstract This document contains the Design Guide, Deployment Guide, and Troubleshooting Guide for DirectAccess in Windows Server 2008 R2. These guides help you to design and deploy DirectAccess servers, DirectAccess clients, and infrastructure servers on your intranet and troubleshoot common DirectAccess problems. Use the Design Guide to answer the “What,” “Why,” and “When” questions a deployment design team might ask before deploying DirectAccess in a production environment. Use the Deployment Guide to answer the “How” questions a deployment team might ask when implementing a DirectAccess design. Use the Troubleshooting Guide for task-oriented information to help you identify and resolve problems quickly and perform root-cause analysis of incidents and problems with the elements of a DirectAccess infrastructure. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The DirectAccess Design, Deployment, and Troubleshooting Guides are for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Server, Windows Vista, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. This white paper reflects content that was published on Microsoft TechNet as of September 1, 2010. The corresponding content published on TechNet after this date might contain changes. For the latest information, see the following documents: • DirectAccess Design Guide (http://go.microsoft.com/fwlink/?LinkID=161985) • DirectAccess Deployment Guide (http://go.microsoft.com/fwlink/?LinkId=166398) • DirectAccess Troubleshooting Guide (http://go.microsoft.com/fwlink/?LinkId=165904) Contents DirectAccess for Windows Server 2008 R2 .............................................................................. 1 Design, Deployment, and Troubleshooting Guides .................................................................. 1 Abstract ................................................................................................................................. 1 Contents .......................................................................................................................................... 3 DirectAccess Design Guide .......................................................................................................... 13 About this guide ......................................................................................................................... 13 Understanding the DirectAccess Design Process ......................................................................... 14 Identifying Your DirectAccess Deployment Goals ......................................................................... 15 Transparent and Automatic Remote Access for DirectAccess Clients .......................................... 16 Ongoing Management of Remote DirectAccess Clients ............................................................... 16 Efficient Routing of Intranet and Internet Traffic ............................................................................ 17 Reduction of Remote Access-based Servers in your Edge Network ............................................. 17 End-to-end Traffic Protection ........................................................................................................ 18 Multi-factor Credentials for Intranet Access ................................................................................... 18 Mapping Your Deployment Goals to a DirectAccess Design ......................................................... 19 Evaluating DirectAccess Design Examples ................................................................................... 20 Full Intranet Access Example ........................................................................................................ 20 Full Intranet Access with Smart Cards Example ........................................................................... 21 Selected Server Access Example ................................................................................................. 22 Using authentication with null encapsulation for selected server access ................................... 23 End-to-end Access Example ......................................................................................................... 24 Planning a DirectAccess Deployment Strategy ............................................................................. 25 Resources Available to DirectAccess Clients ................................................................................ 26 IPv6 resources on your intranet ................................................................................................. 26 IPv4-only resources on the intranet ........................................................................................... 27 Using an IPv4-only intranet ........................................................................................................ 28 Limiting connectivity to selected resources ................................................................................ 28 IPv6 resources on the IPv6 Internet ........................................................................................... 29 Choose an Intranet IPv6 Connectivity Design ............................................................................... 30 No existing IPv6 infrastructure ................................................................................................... 30 Existing ISATAP infrastructure ................................................................................................... 31 Existing native IPv6 infrastructure .............................................................................................. 31 Choose Solutions for IPv4-only Intranet Resources ...................................................................... 32 Choose an Access Model .............................................................................................................. 34 Full Intranet Access ....................................................................................................................... 34 Selected Server Access ................................................................................................................ 35 End-to-End Access ....................................................................................................................... 36 Choose a Configuration Method ................................................................................................... 37 DirectAccess Management Console .......................................................................................... 37 Custom configuration using the Network Shell (Netsh) command-line tool and Group Policy ... 37 Design for Remote Management .................................................................................................. 38 Design for Intranet Server Availability Prior to User Logon ........................................................... 39 Design Packet Filtering for DirectAccess ...................................................................................... 41 Packet Filters for Your Internet Firewall ......................................................................................... 41 Packet Filters for Your Intranet Firewall ......................................................................................... 43 Confining ICMPv6 Traffic to the Intranet ....................................................................................... 43 Packet filters for Teredo Connectivity ...........................................................................................