Mounting DirectAccess on Windows 2012

Road to the VMware Partner Exchange event & Forum, In my dear Termibus, I wanted to share with you my first tests with DirectAccess, which is already a technology that came out in 2008 R2, but in 2012 have simplified their assembly as well as their requirements. DirectAccess will allow the secure connection of our client computers to our organization without the need to use tedious VPN's, We will configure a server that will be the one that will connect us securely to any resource on the internal network.

windows-2012-directaccess-00-Bujarra

Well, This would be the network schema on which this document is based, we will deploy a DirectAccess server in the DMZ with a leg also on the LAN, Additional data:

DMZ Network: 192.168.2.x/24
Lan: 192.168.3.x/24
Internal Dominance: tundra-it.com
FQDN DirectAccess: da.tundra-it.es
BUJ-DC-01 (192.168.3.1): DC, Internal DNS, AC, Files, Printers…
BUJ-DA-01 (192.168.3.13, 192.168.2.13): DirectAccess, 2 NIC's (one in DMZ, one in LAN)
AD Computer Group with DirectAccess Access Permission: DirectAccess Computers (Windows members 8 of the organization we are interested in).
BUJ-DNS-01: It will be an external DNS server that I will use to create the Type A record for the DA site's public name.

 

windows-2012-directaccess-01-Bujarra

We open the wizard to add roles and features, We'll start by adding the server role “Remote Access”,

 

windows-2012-directaccess-02-Bujarra

In role services we will only dial “DirectAccess and VPN (EVENNESS)”, Click on “Following” to be installed

 

windows-2012-directaccess-03-Bujarra

Once installed, We open the “Getting Started Wizard” and we'll set up DirectAccess,

 

windows-2012-directaccess-04-Bujarra

The introduction wizard will appear, Click on “Deploy DirectAccess only”,

 

windows-2012-directaccess-05-Bujarra

In this scenario we have the DirectAccess server with two NICs, one on the DMZ and the other on the LAN, So we press “Behind an Edge Device (with two network adapters). “Following”,

 

windows-2012-directaccess-06-Bujarra

And click on the link “here” To edit the default settings.

 

windows-2012-directaccess-07-Bujarra

We can accept the default configuration or then configure each element of the infrastructure. Can: Rename the GPO's that will be created, Configure options for remote clients, those of the remote access server, those of infrastructure servers or application servers.

 

 

 

windows-2012-directaccess-08-Bujarra

This would be the overview of the configuration to be carried out,

 

windows-2012-directaccess-09-Bujarra

We edit the Step 1, DirectAccess client settings, Mark “Deploy full DirectAccess for client access and remote management”, “Following”,

 

windows-2012-directaccess-10-bujarra

Select the group of teams that we have previously created and uncheck “Enable DirectAccess for mobile computers only” and “Use forced tunneling”, “Following”,

 

windows-2012-directaccess-11-bujarra

We leave the host that creates us by default to distinguish later on the clients if we are connected to the LAN 0 to an external network. By default, it will create a record in the DNS with the entry: directaccess-webprobehost.domain.local and will test your connection with HTTP; we can add another network equipment with PING additionally. We will provide users with an email from technical support, as well as the name of the network that will be created on the client PCs; Optionally we can “Allow DirectAccess clients to use local name resolution”, “End”,

 

windows-2012-directaccess-12-bujarra

 

In El Paso 2, in “Remote Access Server”, we will indicate the public name or IPv4 of our site where the equipment will be connected, “Following”,

 

windows-2012-directaccess-13-bujarra

We indicate that the adapter connected to the external network is the one from the DMZ network and the adapter from the internal network is the adapter from the LAN network, in addition, we must have previously generated a certificate in our internal CA (or public) for the 'da.tundra-it.es' site, we select it & “Following”,

 

windows-2012-directaccess-14-bujarra

For now, to validate my Windows computers 8 It's enough for me to mark “Active Directory credentials (Username and password)”, in future documents we will see additional authentication methods with certificates and we will also give access to Windows computers 7. If we have NAP configured, We may require your compliance in order to allow the connection to the clients. “End”,

 

windows-2012-directaccess-15-bujarra

In El Paso 3, “Infrastructure Servers” We will indicate where we have the network location server (NLS), In this case “The Network Location Server is deployed to the Remote Access Server”, we must have previously generated a Computer certificate for the DirectAccess server, “Following”,

 

windows-2012-directaccess-16-bujarra

We indicate the DNS names and servers for the DNS suffixes of the internal network and leave them by default “Use local name resolution if the name doesn't exist in DNS or DNS servers aren't available”. “Following”,

 

windows-2012-directaccess-17-bujarra

We will be able to add additional DNS suffixes for other internal ones, “Following”,

 

windows-2012-directaccess-18-bujarra

If we have patch or update servers, we can add them for client management, “End”,

 

windows-2012-directaccess-19-bujarra

And finally, in El Paso 4, we will be able to extend authentication between DA clients and internal app servers.

We must save and Apply the configuration so that the GPO's are created and the DirectAccess clients are automatically configured.

 

windows-2012-directaccess-20-bujarra

 

In the Dashboard we will see the status summary, where we will see if we have any problems both with configuration and some type of connectivity, we will also see the connected clients or those that fail to connect, We will also be able to get some fairly complete reports as well as obtain a lot of registration information in case of need.

 

windows-2012-directaccess-21-bujarra

It will be enough to prove it, First verify that the policies have been applied to us in a client ('gpupdate /force’ & 'gpresult /R'), Remove the equipment from the corporate network, take it to an external network and see that it can't connect to WebProbe's HTTP machine to lift the DirectAccess connection by connecting to the public name over HTTPS, We confirm that the connection is correct, from a PowerShell we run 'Get-DAConnectionStatus’ and we'll see if everything is OK, in addition to seeing it in the Networks panel. We open a browser for example and confirm that we can access the organization's resources!!!

Recommended Posts

Author

nheobug@bujarra.com
Autor del blog Bujarra.com Cualquier necesidad que tengas, Do not hesitate to contact me, I will try to help you whenever I can, Sharing is living ;) . Enjoy documents!!!

VMware vExpert Honorees

3 June de 2013

Configuring NAP with DHCP

1 of July de 2013