My Legacy Blogs
With the impending release of Windows Server 2012 we will have our third iteration of the Microsoft DirectAccess solution. Life began with the DirectAccess feature coming to Windows in the first release of Windows Server 2008 R2 a few years ago now; it was then supercharged using Forefront UAG to offer a truly more achievable solution which was much easier to implement for many organisations given the improvements offered by the Forefront UAG platform. Now with the release of Windows Server 2012, we have the third generation of the solution which is fully featured and delivered as part of the native operating system. Given the impending third generation release, I thought it might be useful to prepare a DirectAccess comparison table to compare the different technology versions available, as shown below:
Windows Server 2008 R2 DA
Forefront UAG 2010 SP1 DA
Windows Server 2012 DA
Simplified DirectAccess management for small and medium organisations
Automated DirectAccess server configuration
Mandatory PKI deployment as a DirectAccess prerequisite
Built-in NAT64 and DNS64 support for accessing IPv4-only resources
Support for a DirectAccess server with a single network card
Support for a DirectAccess server behind a NAT device
Requires at least one Windows Server 2008/R2 Domain Controller
Requires at least one Windows Server 2008/R2 DNS Server
Load balancing support
Server fault tolerance
Support for multiple AD domains
Support for OTP (token based authentication)
IP-HTTPS interoperability and performance improvements
Manage-out only support
Support for Server Core
Support for Windows 7 clients
Support for Windows 8 clients
Windows PowerShell support
User and server health monitoring
Accounting and reporting
Notes and small print:
Items in red represent significant improvement or changes.
1PKI is still mandatory for force tunnelling, Network Access Protection (NAP) integration or two-factor authentication deployment scenarios. A PKI-based solution is therefore still required for some enterprise-class deployments, dependent on the required features.
2Hyper-V failover cluster is required.
4IP-HTTPS is supported, but there is a performance overhead due to combined/double SSL and IPsec encryption. IP-HTTPS in Windows Server 2012 now support null SSL encryption and additional optimisations but requires Windows 8 clients.
5Complicated setup due to IPv6 requirements.
6Global Server Load Balancer (GSLB) is required.
7Automatic DirectAccess entry-point detection or user selected entry-point requires Windows 8 clients.
8Technically works, but the supportability status is currently unknown (full support provided in UAG SP3).
10Command line via PowerShell only.
As highlighted above, Windows Server 2012 offers the most feature-rich platform when compared to previous versions and can be considered as a superset of the functionality provided by the Forefront UAG SP1 offering. Many of the enhancements included in Windows Server 2012 DirectAccess are based upon direct feedback from customers and changes to facilitate easier adoption and deployment of the technology within both smaller organisations and enterprise environments alike. I am planning on creating two upcoming blog posts which will highlight the changes and benefits in Windows Server 2012 DirectAccess from the perspective of the smaller organisation and then also for the enterprise space. Given the improvements and changes, I think DirectAccess will be even more popular than ever…what do you think?
Thanks for the blog post. I'm sure Direct Access will become much more popular. We have several customers for whom we have already implemented it on W2012 or at least have it planned.
good stuff - the better VPN
Great comparison table, thanks! Is there anything like this for 2012 vs 2012 R2? Also for the null encryption support for IP-HTTPS, is this done out of the box, or is some configuration required?
@itismeap - 2012/R2 are functionally the same. Null encryption is only available for Win8/8.1 clients and is enabled by default. Win7 clients will continue to double encrypt :( Null encryption is a default part of 2012 and doesn't need to be explicitly enabled
I am configuring the direct access on windows server 2012 r2. I am using the PKI and generated the certificate but at the time of configuring it shows Remote Procedure Failed error and configuration is rolled back. Can you please help us.