Lots of folks have bemoaned the fact that Hyper-V manglement through DirectAccess (DA) is (at best) inconsistent.
To understand why this is so, we have to understand a bit about how Hyper-V and DA work from a network perspective.
In order to support the bi-directional connectivity required by Hyper-V WMI usage, Installation of the Hyper-V manglement role adds three inbound firewall rules (yes; even on your Win7 laptop):
These rules allow inbound RPC and DCOM traffic necessary for remote manglement of Hyper-V services and usage of related guests.
The problem with these rules and DA is that:
The way to fix them so that you can manage your Hyper-V through DA is to behave like unto thusly on your remote manglement (DA) host:
1. Start | Administrative Tools | Windows Firewall with Advanced Security
2. Select Inbound Rules, and scroll down until you see the three Hyper-V rules:
3. Right-click Hyper-V Management Clients – WMI (Async-In) and select Properties
4. Click the Advanced tab (note that Edge Traversal is “blocked”)
5. Click the drop-down that indicates Block edge traversal, select Allow Edge traversal, then click OK
6. Repeat steps 3 through 5 for the remaining two Hyper-V rules.
Bear in mind that your remote Hyper-V parent still has to resolve your DA computer name to the IPv6 IP address that you’re using. This may require that you RDP to the Hyper-V host and edit the hosts file, but this doesn’t happen too often for me. If you can ping your DA client from the Hyper-V host, name resolution isn’t the connectivity problem. You can check your DNS server on the intranet and confirm that the IPv6 address of the remote DirectAccess client is registered. If not, perform an ipconfig /registerdns on the remote DirectAccess client to register the IPv6 address.
Also, note that I described how to do this using the Windows Firewall with Advanced Security console on the DA client. If you want to enable remote management for multiple DA clients in your organization, you can use the Windows Firewall with Advanced Security snap-in in Group Policy and assign these Firewall Rules within Group Policy. This is a more scalable solution should you wish to enable Hyper-V
Let me know if this doesn’t work for you, but it’s working jes’ fine, jes’ fine for me.
AUTHOR: Jim Harrison, Program Manager, Forefront TMG
REVIEWER: Tom Shinder, Knowledge Engineer, ISD iX UAG DirectAccess – Anywhere Access Group (AAG)
Awesome! Thanks... great article and helped me..