The Cloud Security Man

Cloud Security is Job One for the Cloud Security Man

The Cloud Security Man

  • UAG SP1 DirectAccess Contest Quiz Two-Round One

    (If you didn’t participate in Quiz 1 – you can read the rules of the game over at http://blogs.technet.com/b/tomshinder/archive/2010/12/02/uag-sp1-directaccess-contest-quiz-one-round-one.aspx)

    It’s time for Quiz 2-Round 1!

    I got started late on this one today and I was also reminded that there are plenty of UAG DirectAccess fans who aren’t in North America Smile

    For this reason, I’m going to change one of the rules for the contest which will allow more people to participate. From this point forward, you don’t have to send your answer until 9AM Central Standard Time (-0600 UTC) on Monday December 13th.

    All the other rules remain the same.

    Now for the questions!

    Question 1:
    You have installed UAG Service Pack 1 and find that you are unable to connect to resources on the intranet using fully qualified domain names. What is the most likely reason for this failure?

    A.  The ISATAP adapter on the DirectAccess failed to start
    B.  The Teredo interface on the UAG DirectAccess server failed to start
    C.  The DNS64 service failed to start
    D.  The IP-HTTPS certificate needs to be renewed

    Question 2:
    A Help Desk professional is trying to provide assistance to a DirectAccess user who is connected to the intranet from a hotel on another continent. The DirectAccess connection is working for the user and the user is able to connect to all required resources on the intranet. However, the user is having problems with some editing software and would like the Help Desk Professional to take a look at her system. When the Help Desk Professional tries to RDP into the user’s computer, the connection attempt fails. What is the most likely reason for the connection failure?

    A.  A Windows Firewall rule on the client exists for inbound RDP with Edge Traversal enabled
    B.  The Help Desk Professional is connecting from a Windows 2000 Workstation Computer
    C.  The hotel where the user is staying blocks outbound RDP connections
    D.  The user is connecting to the UAG DirectAccess server using IP-HTTPS

    Question 3:
    A UAG DirectAccess server benefits from being placed behind a front-end firewall in order to reduce the firewall filtering load on the TMG server that is also installed on the UAG server. Which of the following protocol(s) is/are not required through the front-end firewall to the UAG DirectAccess server when the server is connected to an IPv4 Internet? (Choose all that apply):

    A. IP Protocol 50
    B. UDP Port 3544
    C. TCP Port 443
    D. IP Protocol 41

     

    There you go! Now click the following link (which will populate the subject line on the email message) to email me your answers:

    tomsh@microsoft.com

    I must receive your entry by December 13, 2010 9:00 AM Central Time

    Have fun and good luck!

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Microsoft UAG DirectAccess: The Beautiful Truth

    imageWhen I’m between doing things that I sort of want to do, but not enough where I want to start on them right away, I’ll do a little ego surfing. If you haven’t heard the term “ego surfing”, it’s the act of going to your favorite search engine (or multiple search engines) and searching for the results returned on your name. I do this from time to time because, well, ahhh – for the same reason anybody else does it!

    Today I was doing some ego surfing for someone else. That “someone else” in this case was DirectAccess. I wanted to see what the top search engine results were for DirectAccess using a number of search engines. On more than one search engine, I found an article that left me a little perturbed. The title of the article is Microsoft DirectAccess: The ugly truth. Now, I know that headline writers write outrageous headlines because they get more attention, but I felt that I needed to write a response to show that the ugly really isn’t there and that there is beauty in its place.

    Microsoft UAG DirectAccess: The Beautiful Truth

    In fact, when it comes to UAG DirectAccess, much of the ugliness is swept away and what we see is a real thing of beauty. Hence the name of this article Microsoft UAG DirectAccess: The Beautiful Truth. To find this beautiful truth about UAG DirectAccess, let’s take a look as some quotes from the Network World article.

    “The following list of DirectAccess requirements comes directly from Microsoft TechNet:

    • One or more DirectAccess servers running Windows Server 2008 R2 with two network adapters: one connected directly to the Internet, and a second connected to the intranet.
    • On the DirectAccess server, at least two consecutive, public IPv4 addresses assigned to the network adapter that's connected to the Internet.
    • DirectAccess clients running Windows 7.
    • At least one domain controller and DNS server running Windows Server 2008 SP2 or Windows Server 2008 R2.
    • A public key infrastructure (PKI) to issue computer certificates, smart card certificates, and for NAP, health certificates.
    • IPsec policies to specify protection for traffic.
    • IPv6 transition technologies available for use on the DirectAccess server: ISATAP, Teredo, and 6to4.
    • Optionally, a third-party NAT-PT device to provide access to IPv4-only resources for DirectAccess clients”

    Let’s look at each one of these:

    • One of more DA servers running Windows Server 2008 R2 with two NICs: one connected directly to the Internet and one to the intranet. That’s still true – although the external interface does NOT need to be directly connected to the Internet – putting the UAG DirectAccess server behind a front-end firewall is fully supported.
    • On the DirectAccess server, at least two consecutive, public IPv4 address assigned to the NIC that’s connected to the Internet. Well, we know that the external interface does NOT need to be connected to the Internet. However, we still need two consecutive public IP addresses to support Teredo.
    • DirectAccess clients running Windows 7. That is true – the only systems that can act as DirectAccess clients are Windows 7 Enterprise and Ultimate, and Windows Server 2008 R2 (yes – the Windows Server 2008 R2 operating system can act as a DirectAccess client – which sets up for some interesting scenarios)
    • At least one domain controller and DNS server running Windows Server 2008 SP2 or Windows Server 2008 R2. If you have using UAG DirectAccess, you do not need a Windows Server 2008 SP2 or above domain controller or DNS server. So UAG debunks this “ugly” truth
    • A Public Key Infrastructure (PKI) to issue certificates, smart card certificates, and for NAT health certificates. Yep, a PKI is required. But come on folks, everyone has at least a simple PKI in place already – too many Microsoft and non-Microsoft products and services require a PKI these days not to already have one in place. And the PKI requirements for UAG DirectAccess are very simple: use autoenrollment to deploy the computer certificates, use a web site certificate to assign to the Network Location Servers, and use a commercial certificate to assign to the IP-HTTPS listener. When it comes to certificates and PKI, DirectAccess requirements are on the “no-brainer” of the certificates food chain.
    • IPsec policies to specify protection for traffic. Yes, you still need those, but when you run the UAG DirectAccess wizard, all of these policies are created for you. The amount of knowledge you need about IPsec to get a working UAG DirectAccess solution work is around, well – ZERO. The UAG DirectAccess wizard creates the IPsec policies and then if you want, will automatically deploy them to Group Policy (either a security group or OU linked GPO, it’s your choice) for you.
    • IPv6 transition technologies available for use on the DirectAccess server: ISATAP, Teredo and 6to4. This is mostly true, but he left out IP-HTTPS Smile.  Teredo, 6to4 and IP-HTTPS are used to tunnel IPv6 communications over an IPv4 Internet to connect to the UAG DirectAccess server. How much do you need to understand about these protocols? Of course, that’s up to you – but the only thing you really need to know is that if you have a firewall in front of the UAG DirectAccess Server, you should enable TCP port 443 inbound and outbound, UDP port 3544 inbound and outbound, and Protocol 41 inbound and outbound to and from the external interface of the UAG DirectAccess server. That’s it. The UAG DirectAccess wizards takes care of the rest, so don’t need to make it an avocation (or worse, a vocation) of trying to understand the intricacies of IPv6 transition technologies. The same is true of ISATAP (Intra-site Automatic Tunnel Addressing Protocol) – UAG configures itself automatically to be an ISATAP router. All you need to do is create a DNS entry and that’s pretty easy!
    • Optionally, a third-party NAT-PT device to provide access to IPv4-only resources for DirectAccess clients. We can debunk this one for UAG DirectAccess with one word NAT64/DNS64 (OK, maybe not one word). With the integrated NAT64/DNS64 feature built into UAG, there is no need to bring in any third-party solutions to provide transparent access to IPv4-only resource. Another example the Beautiful Truth of UAG DirectAccess.

    Now that we’ve debunked many of the issues regarding DirectAccess for UAG, let’s take a look at another quote from the article:

    “That is no small list of requirements. What it means is that to implement DirectAccess, I have to change, replace, or upgrade just about everything at my network edge. In addition to maintaining a public-facing firewall for Internet access, I have to add another direct-to-Internet server to act as the DirectAccess termination point. As servers are replaced and updated, I can see the enterprise eventually getting to the point where all of these things are already in place. But for most of us, this set of conditions can be a showstopper.”

    Everyone already has a firewall at the edge of their networks. So, there’s nothing to add there. And, firewalls and NAT are not the same thing. All you need to do is create a small block of public addresses for the UAG DirectAccess server and route the connections through the firewall (firewalls still provide firewall protection without NAT) – so there’s nothing to add there when it comes to hardware, and subnetting is pretty easy for the network guys. Yes, it is true that you need to add the DirectAccess server as an Internet facing device – but you already have a lot of those, so what’s one more? Again, this is something most network admins do frequently and it isn’t a odd “one off” situation. There really don’t appear to be any show stoppers here – and with UAG DirectAccess, I think we end up with the “star of the show” when both users and IT tip their hats to you for giving them what they’ve actually wanted since the first PPTP VPN was deployed.

    Let’s finish up with another quote that we can easily address:

    “Also, because other releases of Windows server operating systems don't support dual-layer IP, DirectAccess can't natively talk to them. If your enterprise has a bank of Windows Server 2003 or older machines that won't be upgraded anytime soon, that data is in a silo that DirectAccess can't directly access.”

    With UAG DirectAccess and its built-in NAT64/DNS64 service, the only Windows Server 2008 or above machine you need on your network is the UAG DirectAccess server. Your entire network can be full of Windows Server 2003, Windows 2000 Server, and Windows XP. DirectAccess clients will be able to connect to these network resources just fine. In addition, you can run your domain on Windows Server 2003 domain controllers and DNS servers. Like I said – only the UAG DA server needs to be running Windows Server 2008 R2. That means there is no silo – DirectAccess users can access whatever they need on legacy operating systems.

    There you go. Microsoft UAG DirectAccess – The Beautiful Truth. I hope that you’ve had a chance to read this article before you read the ugly truth article, but if you read the ugly truth article first, at least you know what the truth is regarding UAG DirectAccess. And with these truths in mind, I hope that you’ll consider researching a possible DirectAccess deployment for your company. If you have any questions on how to do this, send me a note at the address in the sig line below.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Microsoft ISD iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • DNS64 Service Fails to Start After Upgrading to UAG Service Pack 1

    imageI’ve seen a few people ask if there are problems with access to IPv4 only resources after installing UAG Service Pack 1 (UAG SP1).

    The cause of the problem is that after you install UAG SP1, the DNS64 service is set to Manual. You need to reconfigure the DNS64 service to start automatically. This issue is documented in the UAG SP1 Release Notes at http://technet.microsoft.com/en-us/library/gg315322.aspx

    After installing SP1 RTM on a Forefront UAG server running SP1 RC and acting as a DirectAccess server, the DNS64 service will be set to Manual. Following the installation, set the DNS64 service to Automatic and start the service.

    BTW – if you were trying to troubleshoot this issue, you would have been exposed to this scenario in the Test Lab Guide: Troubleshoot UAG DirectAccess which you can find http://www.microsoft.com/downloads/en/details.aspx?displaylang=en&FamilyID=d2e460c8-b4bf-4fda-9f86-ecc4b7add5d1 (just thought you’d like to know Smile - there’s a lot of other cool troubleshooting scenarios and information in that Test Lab Guide, so give it a try when you have a chance).

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Microsoft ISD iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Connecting the DirectAccess Client to SAP

    When a DirectAccess client computer is on the Internet, it connects to the corporate network using DirectAccess. All communications between the DirectAccess client and DirectAccess server are done over IPv6 (encapsulated by an IPv4 tunnel to carry the IPv6 traffic over the IPv4 Internet). In fact, the client application assumes that the connection is IPv6 from end-to-end, even when the destination server on the intranet is an IPv4-only capable resource. UAG DirectAccess can enable IPv4 connectivity to an intranet resource by using its NAT64/DNS64 IPv6/IPv4 protocol translation feature, which allows the UAG DirectAccess server to map an IPv6 address associated with the IPv4 address of the intranet resource. This mapped IPv6 address is used by the DirectAccess client to connect to the IPv4 resource on the intranet. The UAG DirectAccess server will translate this to an IPv4 address and forward the connection to the desired IPv4-only resource on the intranet.

    While NAT64/DNS64 solves the problem of IPv4-only capable systems on the intranet, the client side application on the DirectAccess client must be IPv6 capable. If the client-side application is not IPv6 capable, it must use a non-DirectAccess method to reach the application server, such as an Internet accessible application gateway.

    In the context of connectivity to SAP resources, you had to use an alternate method outside the DirectAccess tunnels before the release of SAP GUI version 7.1. With the introduction of SAP GUI 7.1, the DirectAccess client can connect to SAP resources on the intranet over the DirectAccess tunnels. However, to get this to work, you need to set a specific environment variable, which we will discuss later in this post. This solves the IPv6 problem on the client side.

    If the SAP server is not IPv6 capable (meaning that it isn’t using ISATAP or native IPv6 addressing), then the UAG DirectAccess server’s NAT64/DNS64 feature will be used for IPv6/IPv4 protocol translation. While this will allow access to a SAP server, it will break SAP load balancing. The end result is that if you don’t need SAP load balancing, then all you need is to do is set the environment variable on the SAP GUI client and connectivity will work over DirectAccess because NAT64/DNS64 will take care of the protocol translation for you.

    Solving the Load Balancing Problem

    However, if you need load balancing for your SAP servers, NAT64/DNS64 isn’t going to do all the work. In this case you’re going to need to bring in another component, called a SAPRouter.

    A SAProuter is a non-transparent gateway that can accept both IPv4 and IPv6 connections and do protocol translation between IPv4 and IPv6. NAT64/DNS64 are not used. Instead, the DirectAccess client connects to the SAPRouter using the SAPRouter’s IPv6 address, and then the SAPRouter can route  the connections to the IPv4-only SAP servers behind the SAPRouter. At this point the SAP servers are able to load balance the connections and also return the responses to the SAPRouter, which is then able to return the responses to the DirectAccess clients through the UAG DirectAccess server.

    Figure 1 illustrates the request/response path between the DirectAccess client and the SAP resource servers (note that the load balancing component of the SAP servers is called out to make the path easier to understand).

    image
    Figure 1

    1. The DirectAccess client sends a request to the IPv6 address of the SAPRouter to gain access to the SAP CRM resource on the intranet.
    2. The UAG DirectAccess server forwards the connection request to the IPv6 address of the SAPRouter.
    3. The SAPRouter forwards the connection to the IPv4 address of the SAP server load balancer.
    4. The SAP server load balancer forwards the request to the IPv4 address of the SAP CRM resource server.
    5. The SAP CRM returns a response to the IPv4 address of the SAP server load balancer.
    6. The SAP server returns the response to the IPv4 address on the SAPRouter.
    7. The SAPRouter returns the response to the IPv6 address of the UAG DirectAccess server.
    8. The UAG DirectAccess server returns the response to the IPv6 address of the DirectAccess client.

    Configuring the SAPGUI 7.1 Client

    The following are instructions should configure the SAP GUI 7.1 client to work with DirectAccess:

    1. Start SAP Logon.
    2. Click the button 'New Item'.
    3. Click the button 'Next'
    4. In the window "Create New System Entry" choose the connection type "Custom Application Server".
      Add the following into the dialog:
      Field "Description"                  > A description
      Field "Application Server"    > enter the hostname of the SAP Application Server
      Field "System Number"         > The number of the instance
      Field "System ID"                      > The System ID

    If you are using a saprouter you would have to add an entry in the field "SAProuter String", for example "/H/saprouterxy".

    Summary

    • If you don’t need load balancing for your SAP CRM resources, then all you need to do is configure the SAP GUI 7.1 client
    • If you need load balancing for your SAP CRM resources, then you will need to introduce a SAPRouter
    • The SAPRouter can translate IPv4 to IPv6 and back so that the DirectAccess client can be configured with the IPv6 address of the SAPRouter

    If you have further questions regarding this issue, please write to the address in the sig line below.

    Authors:

    Noam Ben-Yochanan, Senior Program Manager, DA

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide Virtualization Notes

    If you’re not aware of Test Lab Guides, they’re part of a new initiative we have at Microsoft that is intended to make life easier for you when it comes to adopting new products and technologies. We realize that when you consider bringing in a new product and technology, you have to consider how long its going to take to learn how it works. Sure, you might try a hands-on lab or a virtual lab to see what the product or technology can do, but after that, then what?

    You’re likely going to try to set it up in a test lab. But do you know all the front-end and back-end components that go into making the product or solution work? Maybe – but only after you dig through a pile of design and deployment guides and maybe a few KB articles and some obscure forum posts. That “paper chase” takes a lot of time and if you’re like me, you consider the risk/benefit ratio when it comes to your time before you try out something new.

    That’s where Test Lab Guides come in. Using a Test Lab Guide, you can test a new product or technology in a well-defined and pre-tested lab environment that covers all the front-end and back-end components. You configure everything in the test lab, you see all the moving parts, and you see how everything works together. Many people have told us already that the Test Lab Guides allowed them to quickly learn complex technologies because they could see how all the parts worked together – something that would have taken a long time using the traditional approach of sifting through hundreds of pages of documentation. Even better, after you go through the Test Lab Guide and get a working configuration, you can save a snapshot of the working setup and return to it later, either to check out how things look like when they’re working, or to extend it on your own with custom settings that mirror your current production environment.

    It’s All About the Virtualization

    As you can imagine, the key to test lab success is virtualization. Sure, you could scare up a bunch of PCs and create a lab network, but who has the time and resources for putting together a physical test network that contains 10, 15, 20 or even more clients and servers? While I know that can be done because that’s how we used to do things, the idea of saving disk images and exporting them and then importing them again to extend the configuration is just too time consuming for today’s busy admin. Nope – the reality is that with the advent of client and server virtualization on commodity hardware, test labs are almost exclusively done in a virtualized environment.

    Test Lab Guides were designed with virtualization in mind. But if that’s true, why isn’t there any virtualization related information contained in the Test Lab Guides outside of the last step in each guide that tells you that you should snapshot your configuration? The reason for this is that when I’ve written Test Lab Guides, I’ve assumed that the admin using the Test Lab Guide is already well versed in his or her virtualization platform of choice, and would easily be able to translate the TLG instructions into that virtualization platform. While we naturally would prefer that you use Hyper-V as your Test Lab Guide virtualization platform, we realize that there are a number of different virtualization platforms to choose from: VMware Workstation, ESX, Xen and other’s are all capable environments on which you can run your Test Lab Guide scenarios.

    Providing virtualization specific information would mean that we would include information that is specific for some platforms and not others. In addition, for the non-Hyper-V platform, if there are changes, we might not necessarily know about them, as it’s not in our charter to stay on top of each version of each virtualization offering.

    However, I think it is important to share some virtualization information that will help you with your Test Lab Guide experience. Some of this is Hyper-V specific, but hopefully most of it will be easily applied to to non-Hyper-V platforms. And if you’re not currently using Hyper-V, you might want to give it a look. I was a big VMware user prior to joining Microsoft. However, after joining Microsoft I felt it was important for me to have some basic understanding of Hyper-V. The result is that I’ve been using Hyper-V almost exclusively in my Test Lab Guide development process and am very impressed with it. So if you’re a “VMware guy or gal” and never looked at Hyper-V, I recommend that you give it a look. If for no other reason, you might want to use Hyper-V for Test Lab Guides.

    Another thing to consider when using virtualized environments for Test Lab Guides is memory. Some virtualization platforms enable something called "memory overcommit" what allows you to assign your virtual machines more memory than is available on the physical host machine. However, some virtualization do not - and Hyper-V is one of those solutions. While in some cases you can run a Test Lab Guide scenario with a machine that has 8 GB of memory, I have made the assumption that most organizations are using virtualization platforms that support at least 16 GB of memory, and ideally can support 24 GB or more. This allows you to run more complex, but more realistic scenarios in the Test Lab.

    Virtual Networking

    When working with virtualization, you need a  good working understanding of how its virtual networking feature operates. With Hyper-V, there is the concept of “virtual networks” – with each virtual network acting as a type of virtual switch. VMware has a similar concept, which are called “VMNet’s”. Each virtual machine you connect to the same virtual network or VMNet is on the same virtual network segment, or in other words, in the same Ethernet broadcast domain. If you want to create a multi-segmented network, you would create a virtual network for each segment.

    When working with Test Lab Guides, you can create virtual networks for each of the subnets called out the in the Test Lab Guide. For example, in the Base Configuration Test Lab Guide (http://www.microsoft.com/downloads/en/details.aspx?FamilyID=ab6c61af-9c34-4692-815c-4396b482d31b), you are asked to create a “Corpnet subnet” and an “Internet subnet”. When using Hyper-V, you would create a virtual network for the Corpnet subnet and another virtual network for the Internet subnet.

    If you need more network segments, you would create more virtual networks. For example, in the Test Lab Guide: Demonstrate UAG DirectAccess (http://www.microsoft.com/downloads/en/details.aspx?FamilyID=71be4b7b-e0e9-4204-b2b5-ac7f3c23b16d), you need to create a new subnet called the “Homenet” subnet. To support the Homenet subnet, you just create a new virtual network.

    If you are working with Hyper-V, you need to be aware that there are three types of virtual networks that you can choose from. These are:

    • Internal networks. These virtual networks allow hosts connected to the same virtual network to communicate with one another and with the host operating system.
    • Private networks. These virtual networks allow hosts connect to the same virtual network to communicate with one another. They are not able to communicate with the host operating system through the virtual network.
    • External networks. These virtual networks allow you to connect virtual machines to a live network. Each External network is associated with a particular NIC connected to your computer.

    When I create the Base Configuration, I create two Private virtual networks: one for the Corpnet subnet and one for the Internet subnet. You can name them whatever you want and it’s probably best to name them Corpnet subnet and Internet subnet. Do the same for any other virtual networks you need to create to support the Test Lab. The Test Lab Guide will provide you some guidance on the name of the network (such as calling the new network the “Fabrikam” network), in which case you create a new virtual network for the Fabrikam subnet.

    What about Internet Access?

    Now you might be wondered what to do if you need to provide Internet access to a machine on a Private virtual network. Remember that virtual machines connected to a Private virtual network are able to communicate with other VMs on the same Private virtual network, but aren’t able to communicate with any other physical or virtual machine. You’ll have to do something to else to provide a virtual machine actual Internet access.

    You might want to provide a VM actual Internet access if you want to download some applications or updates. The approach you use to provide this access will vary with the role the virtual machine is playing on the Test Lab network. For example, CLIENT1 (from the Base Configuration) is a Windows 7 client machine that’s designed to move between the Corpnet subnet, the Internet subnet and the Homenet subnet (and even the Fabrikam subnet if you choose to use the Fabrikam Base Configuration [http://www.microsoft.com/downloads/en/details.aspx?FamilyID=4521421f-bd0c-4eed-b280-a7aaf2fde321]). You can create an External virtual network and connect CLIENT1 to that network. It will then pick up IP addressing from the “live” network’s DHCP server and you can then download the information you need from the Internet. After you get the information you need, you can move CLIENT1 from the External virtual network back to the Corpnet subnet (which is a Private virtual network).

    While this approach works fine for virtual machines that are designed to be mobile, it gets a bit more tricky when you want to provide Internet access for more “sessile” machines. Examples of these types of machines would be domain controllers and Exchange Servers; both of which really aren’t designed to be moved from one network to the other and be DHCP clients. We’re going to have to think of a different approach for these servers.

    In addition, there might be scenarios when you need to demonstrate actual  Internet from specific client types access or you want to provide Internet access to all machines so that you can demonstrate things like Windows Update Services.

    To do this, you might consider what I did in the Test Lab Guide: Demonstrate UAG SP1 RC Force Tunneling (http://www.microsoft.com/downloads/en/details.aspx?FamilyID=756e35c6-d706-4b18-80c2-881e9bccda3c). In that Test Lab Guide, I configured INET1 with a second network interface and then configured that network interface to use an External virtual network so that it could connect to the Internet. I then configured the default gateway settings on the computers in the Test Lab so that Internet bound traffic would go through INET1. There were some network gateway and DNS configurations that were required to make it work, but it did allow all the computers in the Test Lab Internet access, including DirectAccess clients.

    Note:
    We plan to update the Base Configuration Test Lab Guide so that Internet access is made a default option. I hope to have that update to the Base Configuration Test Lab Guide to you before the end of January. If you need help before that, please let me know and I’d be happy to show you how to provide Internet access to your Test Lab.

    Make sure to always create the virtual networks you need before you create the virtual machines that you’ll to connect to them. It’s better to have the virtual network ready for the virtual machines instead of having the virtual machines wait for you to create the networks to connect to them.

    For more information about configuring virtual networks on a Hyper-V server, check out the following video: http://www.screencast.com/t/Ft4Dpm4tLZ (around 7 mins)

    Creating and Snapshotting the Virtual Machines

    This is one area where there are a number of options and everyone has their favorite. One popular option is to use parent/child disk configurations, where you essentially create a parent disk that subsequent virtual machines can take advantage of when you want to quickly create new virtual machines for your Test Lab. Kurt Hudson did a great job describing how you do this in his TechNet wiki article Hyper-V Virtual Machine (VM) Parent-Child Configuration Using Differencing Disks http://social.technet.microsoft.com/wiki/contents/articles/hyper-v-virtual-machine-vm-parent-child-configuration-using-differencing-disks.aspx

    While this is a valid and popular approach for quickly creating new virtual machines, and something that can be done with VMware and other virtualization platforms, I’ve have chosen not to use this approach when it comes to building out Test Labs. This and similar approaches that “key” into a parent disk introduce dependencies and potential points of failure that reduce the flexibility of the solution. It also makes it more complicated. However, it does have the advantages of allowing you to create virtual machines more quickly, and even more significant is the amount of disk space you can save by using this approach.

    If disk space isn’t an issue for you, and if you’re willing to put in a few more minutes per virtual machine to reduce the risks of a parent/child configuration to your entire virtual lab infrastructure, then you might want to consider my approach. My approach is easy and it’s simple (which pretty much describes me). The approach I use for virtual machines:

    • Each virtual machine has its own disk file with the default value of 127 GB (it doesn’t take this much space on the physical disk because the virtual disk grows in size as needed to fit the data placed on the disk)
    • Each virtual machine is placed in its own folder on the hard disk. This makes it easy to identify the location of the virtual machine and the files associated with it
    • For the base configuration, after the operating system is installed, connect the virtual machine to an External virtual network and run Windows Update. Do the same for any other virtual machines that you might add to the Base Configuration
    • Connect the virtual machines to the virtual networks on which they will participate in the specific Test Lab that you’re using. Some virtual machines (such as CLIENT1) will move between virtual networks in many Test Lab scenarios.
    • At the end of each Test Lab, save a snapshot of the all the machines that participated in the Test Lab and give all the snapshots the same name.

    Snapshot the Virtual Lab

    Creating virtual machines and snapshots are closely related topics. Each virtual machine you create and configure represents a good chunk of invested time. If you don’t snapshot that virtual machine at the end of your Test Lab, you’ve wasted your efforts (OK, not wasted completely because you probably learned something during the process). When you snapshot the virtual machines in your Test Labs, you can quickly restore the snapshots and start at the end of that Test Lab. At that point you can create a new Test Lab, you can play with the settings to see what happens, or you can use troubleshooting and diagnostic tools and see what they look like when the system is working correctly. Snapshots are unique to virtualization and are a powerful tool to speed your ability to create advanced, realistic and actionable Test Lab scenarios that enable you to learn about your products and communicate more effectively than ever.

    However, you need to be systematic about snapshotting. Over my years of using VMware Workstation I had created hundreds of virtual machines to support thousands of possible scenarios for ISA Server and TMG. I didn’t have a co-ordinated system for managing the snapshots and as you can imagine this lead to snapshot sprawl. Over time the sprawl got so bad that my carefully saved snapshots didn’t provide me value and I ended up often having to recreate Test Lab scenarios that I had already done.

    At the end of each Test Lab Guide there is a step that informs the reader to snapshot the lab. The step also includes instructions on what to name the Test Lab. The reader should be instructed to shut down each of the virtual machines gracefully at the end of the lab and then snapshot all the virtual machines at the same time after all machines have shut down. After the snapshot it complete, rename the snapshot from its default name to the name suggested in the Test Lab Guide.

    Something that we don’t include in the Test Lab Guides regarding virtualization, but something that most virtualization savvy admins are already aware, is that the order you start the VMs is important. In general, you want to start the domain controllers first. Then start servers that provide key infrastructure services to other servers and clients.

    This requires that the reader understand the overall solution – and this might not be a reasonable expectation, since the reason for going through the Test Lab Guides is to learn about the product. For example, in the Demonstrating UAG DirectAccess Test Lab Guide, you should start the DC1 virtual machine (a domain controller) first, and then start the UAG DirectAccess server. The reason for this is that the UAG DirectAccess server acts as an ISATAP router for the rest of the network, and it should be available when the ISATAP hosts on the network start up and configure their ISATAP adapters as they start up.

    I have not included this start up information in the Test Lab Guides, which is something we will fix in the next version of the Test Lab Guide specification.

    Three suggestions for you, and things I plan to implement in the next version of Test Lab Guides are:

    1. Tell the reader which virtual machines to start up as part of step 1. Typically, step 1 in all Test Lab Guides is to complete the steps in some other Test Lab Guide, and then restore the snapshots in that Test Lab Guide. I would recommend that you have the reader start all the virtual machines that were part of the prerequisite Test Lab Guide, even if they won’t be configuring all of them. This creates a more coherent set of virtual machine snapshots and enables you build on the entire environment without having to worry about Active Directory or services sync that might get problematic if you don’t start the entire lab.
    2. Provide the reader guidance on the order of restoration of the snapshots. Like in the example I gave above, tell the reader to start DC1 first, then start UAG1, and then you can start all the other virtual machines at the same time.
    3. Provide the reader information about the approximate amount of memory they should have available on the virtual server to run the entire Test Lab. This includes the memory required to restore the snapshots and the memory required by virtual machines. Also, I’ve made the assumption that Test Lab admins have almost unlimited disk space – you might want to consider providing some information on how much disk space will be used by the end of completing you Test Lab Guide.

    To get a better idea of how snapshots are created, restored and named, please see my video on this subject at http://www.screencast.com/t/pGpBxCoZO4QO (around 7 mins).

    Summary

    In this article I provided a handful of tips and tricks that I use with virtualization when creating Test Lab Guides. These are methods that have worked for me and many of them come from habits of working with virtualization for the last decade; some of the habits might be good and some might need improvement. But if you starting on your trek of writing Test Lab Guides and also beginning your work with virtualization, I hope that these notes help you creating your Test Lab Guides faster than might have otherwise.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Answers UAG DirectAccess Contest Quiz 1 Round 1

    Here are the answers to Quiz 1, Round 1:

    ====================================================

    Question 1: Which Operating System(s) can be configured as DirectAccess clients? (choose the best answer)

    A. Windows 7

    B. Windows Vista SP2

    C. Windows Server 2008 R2

    D. Windows 7 and Windows Vista SP2

    E. Windows Server 2008 R2 and Windows 7

    The answer to question 1 is E. Actually, a couple of people pointed out to me that I should have mentioned that you needed Enterprise or Ultimate Edition of Windows 7. While that is true, the editions are different SKUs, and not different operating systems. Therefore, the answer is Windows 7 and Windows Server 2008 R2 when asked which operating system.

    ====================================================

    Question 2: What happens when the DirectAccess client successfully connects to the Network Location Server (NLS)?

    A. The DirectAccess client turns on the Windows Firewall Domain Profile

    B. The DirectAccess client disables its ISATAP interface

    C. The DirectAccess client disables the Name Resolution Policy Table

    (note: there was a typo in answer C – I left out the word “client”, but the meaning of the answer remains unchanged)

    The answer to question 2 is C. When the DA client connects to the intranet and successfully connects to the Network Location Server and receives a 200 HTTP response that is acceptable to WinHTTP (that is to say, that WinHTTP is able to successfully parse the web page) it will disable the NRPT. You can see the result of this turning off of the NRPT by using the command netsh namespace show effectivepolicy.  You can see the result is Note: DirectAccess settings would be turned off when computer is inside corporate network in the figure below.

    image

    http://blogs.technet.com/b/tomshinder/archive/2010/07/19/what-defines-a-functional-connection-to-a-network-location-server.aspx

    ====================================================

    Question 3: When you do an ipconfig /all in a command prompt window and see both the Teredo and IP-HTTPS interfaces assigned an address, which interface is actually being used to transfer data?

    A. The Teredo interface

    B. The IP-HTTPS interface

    C. Both the Teredo and IP-HTTPS interfaces

    D. None of the interfaces – when both appear it indicates that the Windows Firewall Domain Profile is active

    The answer to question 3 is B. This condition occurs when the DirectAccess client takes more than the computed delay for the DirectAccess client to determine corporate connectivity over the Teredo interface. To test for this condition, run the ipconfig command at a command prompt. If you have global addresses on both the Teredo and IP-HTTPS tunnel interfaces, this condition has occurred.

    http://blogs.technet.com/b/tomshinder/archive/2010/08/24/why-are-both-the-teredo-and-ip-https-interfaces-active.aspx

    ====================================================

    Leaderboard

    image

    ====================================================

    I want to thank everyone who participated in Quiz 1, Round 1. This was a difficult quiz and I pulled some pretty tough questions first time around. Some of the quizzes will be easier, some will be more difficult. But I hope you will continue to play and that you find this a useful and fun learning experience. Quiz 2, Round 1 will be posted on December 9, 2010 – so make sure you put that on your calendar so you don’t miss the quiz because if you do, someone who’s ahead of you now might miss the next quiz and that will be your chance to take the lead! Smile  For the same reason, those of you who didn’t participate in Quiz 1 still have a chance – so make sure to take next week’s quiz and get yourself on the leaderboard!

    ====================================================

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • UAG SP1 DirectAccess Contest Quiz One-Round One

    With all the excitement coming from the upcoming release of UAG Service Pack 1, I thought we might do something fun (OK, DirectAccess is always fun, but maybe we can do something closer to what other people would consider fun). What’s more fun than a contest? I know, a contest where you’re the winner! OK, even more fun is a contest where you’re the winner and you actually win something.

    How about a Starbucks card? I have one in my hot little hands and its really wanting to go the the winner of the UAG DA Contest winner!

    image

    So here’s how the contest is going to work:

    • Anyone can participate except for Microsoft employees
    • One entry per email address
    • I must receive your entry within 24 hours of posting the questions for the quiz
    • Your email name (not the domain name) will be used on the leaderboard unless you want to specify an alternate name
    • There will be four quizzes per round (one quiz per week) and there will be two rounds (total of 8 quizzes)
    • Each quiz will have three questions – each correct answer is worth 1 point. Total score for the quiz (entry) is the number of correct answers
    • The first three finishers (defined by total correct answers/points for the round) will be awarded points for the round: 5 to the winner, 3 for second place and 1 for third place (if there is a tie, all members of the tie will be awarded the points for their position – for example, if there is a tie for second place, 3 points will be awarded to both second place finishers)
    • The points awarded to the top three finishers for each round will be added up and the person with the highest score wins the card. If there is a tie, there will be a tie-breaker event that I will schedule over LiveMeeting so that are participants can watch. The winner of the tie-breaker event will then be named the contest winner.

    Since the contest hasn’t started yet, the leaderboard looks like this (I put my name in there just as an example):

    image

     

    Ready to play? Here are the three questions for Quiz 1/Round 1:

    Question 1: Which Operating System(s) can be configured as DirectAccess clients? (choose the best answer)

    A. Windows 7

    B. Windows Vista SP2

    C. Windows Server 2008 R2

    D. Windows 7 and Windows Vista SP2

    E. Windows Server 2008 R2 and Windows 7

    Question 2: What happens when the DirectAccess client successfully connects to the Network Location Server (NLS)?

    A. The DirectAccess client turns on the Windows Firewall Domain Profile

    B. The DirectAccess client disables its ISATAP interface

    C. The DirectAccess disables the Name Resolution Policy Table

    Question 3: When you do an ipconfig /all in a command prompt window and see both the Teredo and IP-HTTPS interfaces assigned an address, which interface is actually being used to transfer data?

    A. The Teredo interface

    B. The IP-HTTPS interface

    C. Both the Teredo and IP-HTTPS interfaces

    D. None of the interfaces – when both appear it indicates that the Windows Firewall Domain Profile is active

    Great! Now click the following link (which includes the subject line I need to track the entries) and email me your answers:

    tomsh@microsoft.com

    I must receive your entry by December 3, 2010 3:00PM Central Time

    Have fun and good luck!

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • UAG DirectAccess and the Windows Firewall with Advanced Security – Things You Should Know

    Both the Windows DirectAccess and the UAG DirectAccess solutions are heavily dependent on the Windows Firewall with Advanced Security. DirectAccess clients take advantage of both firewall rules and Connection Security Rules. Connection Security Rules are IPsec rules that control the IPsec tunnel mode connections between the DirectAccess clients and the DirectAccess server. In addition to the IPsec tunnel mode connections, Connection Security Rules are used to enable IPsec transport mode connections for servers for which you want the DirectAccess clients to connect using end-to-end security.

    In order to get the most out of DirectAccess and how DirectAccess works, it helps to have a better understanding of the different components of the Windows Firewall with Advanced Security and how some of the important settings work and how they interact with DirectAccess

    Windows Firewall Profiles – Pubic Profile, Private Profile and Domain Profile

    Windows Firewall offers three firewall profiles: domain, private and public. The domain profile applies to networks where the host system can authenticate to a domain controller. The private profile is a user-assigned profile and is used to designate private or home networks. Lastly, the default profile is the public profile, which is used to designate public networks such as Wi-Fi hotspots at coffee shops, airports, and other locations.

    Different firewall and connection security rules can be configured for each profile. There are default settings that are applied to each profile, but the administrator can customize their default settings.

    What Does This Have to Do with DirectAccess?

    clip_image001The different profiles are important because a computer only works as a DirectAccess client when it is not on the corporate network. In order words, if the DirectAccess client detects that it can connect to its domain controller and is on the corporate network, it will use the domain profile. The DirectAccess client will only act as a DirectAccess client when the Private or Public Profiles are enabled. The reason for this is that the Connection Security Rules that enable the IPsec tunnel mode connections to the DirectAccess server are included only in the Public or Private Profiles. There are no Connection Security Rules that enable IPsec tunnel mode connections to the DirectAccess server in the Domain Profile.

    The UAG DirectAccess server (as well as the Windows DirectAccess server) will create the Connection Security Rules that allow for the creation of the DirectAccess IPsec tunnels (and the end-to-end IPsec transport mode connections for servers configured for end-to-end security). However, the UAG DirectAccess wizard does not import any firewall rules that you might have configured to work on the corporate network. Those rules that you created for the intranet hosts were created for the Domain Profile. If you want your Domain Profile firewall rules to apply to DirectAccess clients, you will need to enable those rules on the Public Profile and Private Profile too.

    How Do I Create Firewall Rules for DirectAccess Clients?

    In order for intranet computers to connect to DirectAccess clients, there need to be firewall rules in place on the DirectAccess clients that allow the incoming connections from the intranet servers. In addition, if you are blocking outbound connections, you may need to create rules that enable required protocols outbound. There are several things you need to know about these firewall rules:

    • Teredo clients need to have the Edge Traversal setting enabled on inbound firewall rules that allow the intranet clients to connect to DirectAccess clients that are using Teredo to connect to the DirectAccess server (http://technet.microsoft.com/en-us/library/ee809076.aspx)
    • Teredo clients must have also have rules that allow them ICMPv6 access to intranet clients, such as ICMPv6 neighbor discovery. This rule is enabled by default and you should not delete it. In addition, Teredo clients require ICMPv6 Echo Request access to your intranet if you are using ISATAP or native IPv6 on the intranet. If you are using NAT64/DNS64, then you need to enable ICMPv4 Echo Requests to your intranet (http://technet.microsoft.com/en-us/library/ee649189(WS.10).aspx).
    • With reference to the second bullet point, you should be aware of a scenario where domain policy doesn’t allow firewall rules to merge with local policy. While the required rule is enabled by default in local policy, if your organization disables merging local with domain policy, then only rules created for domain policy will be applied to the DirectAccess client, which will cause this rule to be disabled. If this is the case, you should manually create all of the required infrastructure rules, such as those required for IP-HTTPS, Teredo, 6to4, ESP, IKE and ICMPv6.
    • DirectAccess clients using 6to4 and IP-HTTPS to connect to the UAG DirectAccess server don’t require the Edge Traversal setting to allow for remote management. However, since you can’t predict which IPv6 transition protocol will be used by the DirectAccess client, you should always enable Edge Traversal on the firewall rules.
    • The firewall rules that enable intranet hosts to connect to the DirectAccess clients should be applied to the Public and Private profiles. You can apply them to the domain profile if you like, but in order for the computer that is acting as a DirectAccess client to apply these rules, they must be enabled on the Public and Private Profiles.
    • When creating these firewall rules, make sure that one of the endpoints (can be the remote endpoint, it doesn’t matter) includes the IPv6 prefix of the intranet. Failing to configure this type of access control in the rule may create a security issue that allows anyone on the Internet to connect to the DirectAccess client using these protocols. You can find the ISATAP IPv6 prefix in the details of the intranet tunnel rule as Endpoint 2.
    • If you have firewall rules that you enable for intranet clients using the Domain profile, be aware that these are not automatically applied to the DirectAccess clients, since they will be using either the Public or Private profile. Therefore, if you want your domain firewall rules applied to DirectAccess clients, make sure to replicate them for your DirectAccess clients’ Public and Private profiles.

    While it’s possible for you to create your firewall rules in the DirectAccess Clients GPO, that’s not a good idea because your rules will be overwritten the next time you use the UAG DirectAccess wizard and deploy updated GPO settings. Instead, create a new GPO with the firewall settings and apply it to your DirectAccess clients security group or OU.

    For a very good tutorial on configuring firewall rules for DirectAccess client, check out How to enable Remote Desktop Sharing (RDS/RDP) from corporate machines to DirectAccess connected machine at http://blogs.technet.com/b/edgeaccessblog/archive/2010/09/14/how-to-enable-remote-desktop-sharing-rds-rdp-from-corporate-machines-to-directaccess-connected-machines.aspx

    And if you want to try it out for yourself in your UAG DirectAccess Test Lab, check out Test Lab Guide: Demonstrate UAG DirectAccess Remote Management over at http://www.microsoft.com/downloads/en/details.aspx?displaylang=en&FamilyID=385a3144-8e84-4335-896b-a2927e4d46cd

    Anything Else I Need to Know About DirectAccess Client Firewall Rules?

    I’m glad you asked! Yes, there are a few more things you should think about when configuring firewall rules for DirectAccess clients. These are:

    • Don’t turn off the Windows Firewall on either the DirectAccess client or DirectAccess server. This will disable IPsec and Edge Traversal – so it essentially breaks all DirectAccess connectivity
    • Avoid allowing all inbound connections to the DirectAccess clients. Doing so will disable Edge Traversal. This breaks Teredo and manage-out.
    • Avoid blocking all outbound connections as well. If you block all outbound traffic, you will not only need to enable the infrastructure protocols, you will also need to allow any other protocol required by the DirectAccess client, such as HTTP, SMT, RDP, etc) on the Public and Private Profiles.
    • If your organization manages all of your firewall rules through a central GPO, you need to make sure that you enable the rules that are required for DirectAccess to work. These include rules to support IPv6 Transition Technologies, ICMPv6 (as mentioned previously) and ESP and AuthIP. However, you do not need to any rule to the UAG server, as the Firewall capability is disabled on the UAG and the TMG server is in control.

    Authors:

    Yaniv Naor, SDE
    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Long NetBIOS Names May Interfere with UAG DirectAccess User Interface

    Shannon Fritz, and up and comer in the world of UAG DirectAccess found a very interesting issue with the UAG Management Console and loading of the DirectAccess interface. It turns out that if the UAG server has a NetBIOS name that is longer than the allowed 15 characters, the DirectAccess configuration interface won’t open.

    Here’s a screenshot from the TechNet forums of what Shannon saw:

    image

    The Product Group is now aware of this issue, and we’ll make plans to update documentation to warn against using NetBIOS names longer than 15 characters.

    You should also check out Shannon’s blog over at:

    http://blog.concurrency.com/infrastructure/uag-cannot-load-the-directaccess-view-0

    for more information on what he found.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP) and Remote Desktop Gateway (RDG)–Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP) and Remote Desktop Gateway (RDG) check out:

    http://go.microsoft.com/fwlink/?LinkId=206505

    ==================================================

    Introduction

    DirectAccess is a new feature in the Windows 7 and Windows Server 2008 R2 operating systems that gives users the experience of being seamlessly connected to their intranet any time they have Internet access. With DirectAccess enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without requiring users to connect to a VPN. DirectAccess provides increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside the office.

    Forefront Unified Access Gateway (UAG) SP1 RC extends the value of the Windows DirectAccess solution by adding features that meet the requirements of many enterprise deployments:

    • Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
    • Support for Network Load Balancing, which enables the UAG DirectAccess SP1 RC array to be highly available without requiring the use of an external hardware load balancer
    • Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.

    To learn more about UAG DirectAccess, see the following resources:

    · Forefront UAG DirectAccess Design Guide

    · Forefront UAG DirectAccess Deployment Guide

    UAG SP1 RC supports hosting multiple roles on a single UAG server or UAG array. For example, you might want to host both the DirectAccess server and SSTP VPN server roles on the same server or array. Windows 7 clients that are configured DirectAccess clients will automatically use DirectAccess to connect to intranet resources. Windows 7 clients that are not domain members, or who are not configured as DirectAccess clients can use SSTP to connect to the intranet using a network level VPN connection. Windows 7, Windows Vista and Windows XP clients can connect to Remote Desktop and RemoteApps through a UAG server that is configured to host the Remote Desktop Gateway role. In this guide, we demonstrate how a UAG server can support the combined, DirectAccess, SSTP and Remote Desktop Gateway server roles.

    In this guide

    This guide provides step-by-step instructions for configuring UAG DirectAccess SP1 RC with SSTP and Remote Desktop Gateway in a test lab so that you can see how it works. You will set up and deploy UAG DirectAccess SP1 RC using five server computers, two client computers, Windows Server 2008 R2 Enterprise edition, and Windows 7 Ultimate Edition. The Test Lab simulates intranet, Internet, and a home networks, and demonstrates a co-located Forefront UAG DirectAccess and SSTP VPN server role deployment. The starting point for this paper is the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess .

    clip_image001Important:

    These instructions are designed for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network. For more information on planning and deploying DirectAccess with Forefront UAG, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the test lab scenario

    In this test lab scenario, Forefront UAG DirectAccess SP1 RC is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG SP1 RC DirectAccess, SSTP VPN and Remote Desktop Gateway server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and network location server.
    • One intranet member server running Windows Server 2003 SP2 (APP3) that is configured as an IPv4 only web and file server. This server is used to highlight the UAG’s NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1) that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming domain member client computer running Windows 7 Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by NAT1.
    • The Internet subnet (131.107.0.0/24).
    • The Corpnet subnet (10.0.0.0/24) separated from the Internet by the Forefront UAG DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image003

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Five computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; two of these computers has two network adapters installed (UAG1).
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed (NAT1).
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG) SP1 RC.

    This Test Lab Guide demonstrates a combined UAG SP1 RC DirectAccess and SSTP deployment.

    clip_image004Important

    The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.

    Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess and SSTP, please refer to the Forefront UAG DirectAccess Deployment Guide for the steps to configure the UAG DirectAccess server and supporting infrastructure servers.

    Steps for configuring the test lab

    The following sections describe how to configure UAG1 as a DirectAccess, SSTP VPN and Remote Desktop Gateway server. After UAG1 is configured, this guide provides steps for demonstrating the DirectAccess, SSTP VPN and Remote Desktop Server functionality for CLIENT1 when it is connected to the Homenet subnet.

    clip_image005Note

    You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    The following procedures are performed to enable and allow you to test the UAG SP1 RC DCA:

    · Step 1: Complete the Demonstrate UAG SP1 RC DirectAccess with SSTP Test Lab Guide – The first step is to complete all the steps in the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP).

    · Step 2: Install and Configure the RDS Session Host on APP1. In order to test UAG1 publishing of Remote Desktops and RemoteApps we need an RDS Session Host server on the corpnet subnet. In this step you will install the RDS Session Host Role on APP1.

    · Step 3: Generate the RemoteApp Configuration File on APP1. You will publish a RemoteApp on UAG1. In order to publish the RemoteApp, you need to generate a RemoteApp configuration file on APP1. In this step you will generate the RemoteApp configuration file and copy it to UAG1.

    · Step 4: Publish Remote Desktops on UAG1. To publish Remote Desktops you need to add the Remote Desktops Application to the portal. In this step you will add the Remote Desktop applications to the UAG1 portal page.

    · Step 5: Publish RemoteApps on UAG1. To publish RemoteApps you need to add the RemoteApps application to the portal. In this step you will add the RemoteApps application to the portal page.

    · Step 6: Test DirectAccess, SSTP and Remote Desktop Connectivity from CLIENT1. After the portal configuration is completed, you can test connectivity to resources through the UAG portal. In this step you will confirm DirectAccess and SSTP connectivity, and test Remote Desktop and RemoteApp connectivity through the portal.

    · Step 7: Snapshot the configuration. After completing the Test Lab, take a snapshot of the working UAG DirectAccess, SSTP and Remote Desktop Gateway Test Lab so that you can return to it later to test additional scenarios.

    clip_image005[1]Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.

    STEP 1: Complete the Demonstrate UAG SP1 RC DirectAccess with SSTP Test Lab Guide

    The first step is to complete all the steps in the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP). After completing the steps in that Test Lab Guide you will have the core infrastructure required to complete this Test Lab Guide on how to configure UAG DirectAccess with SSTP and RDG. If you have already completed the steps in that Test Lab Guide and saved a snapshot or disk image of the Test Lab, you can restore the snapshot or image and begin with the next step.

    STEP 2: Install and Configure the RDS Session Host on APP1

    In order to test UAG1 publishing of Remote Desktops and RemoteApps we need an RDS Session Host server on the corpnet subnet. In this step you will install and configure the RDS Session Host Role on APP1.

    Install the RDS Session Host on APP1:

    1. At the APP1 computer or virtual machine, log on as CORP\User1. Open the Server Manager. In the left pane of the Server Manager console, click the Roles node. In the right pane of the console, click Add Roles.
    2. On the Before You Begin page, click Next.
    3. On the Select Server Roles page, select Remote Desktop Services and click Next.
    4. On the Introduction to Remote Desktop Services page, click Next.
    5. On the Role Services page, select Remote Desktop Session Host and click Next.
    6. On the Application Compatibility page, click Next.
    7. On the Authentication Method page, select Require Network Level Authentication and click Next.
    8. On the Licensing Mode page, select Configure later and click Next.
    9. On the User Groups page, confirm Administrators is in the User or User Groups list and click Next.
    10. On the Client Experience page, put a checkmark in the Audio and video playback, Audio recording redirection, and Desktop composition (provides the user interface elements of Windows Aero) checkboxes and click Next.
    11. On the Confirmation page, click Install. When you see the message Restart Pending, click Close. In the Add Roles Wizard dialog box, click Yes. The machine will restart to complete installation. Log on as CORP\User1. After you log on the installation will continue. On the Results page, click Close.

    Configure the RDS Session Host on APP1:

    1. Click Start and point to Administrative Tools. Point to Remote Desktop Services and click Remote Desktop Session Host Configuration.
    2. In the Remote Desktop Session Host Configuration console, in the right pane of the console, right click RDP-Tcp and click Properties.
    3. In the RDP-Tcp Properties dialog box, on the General tab, click the Select button. In the Windows Security dialog box, click APP1.corp.contoso.com and click OK. In the RDP-Tcp Properties dialog box, click OK.
    4. Close the Remote Desktop Session Host Configuration console.

    STEP 3: Generate the RemoteApp Configuration File on APP1

    You will publish a RemoteApp on UAG1. In order to publish the RemoteApp, you need to generate a RemoteApp configuration file on APP1. In this step you will generate the RemoteApp configuration file and copy it to UAG1.

    1. Click Start and point to Administrative Tools. Point to Remote Desktop Services and click RemoteApp Manager.
    2. In the RemoteApp Manager console, in the Actions pane, click Add RemoteApp Program.
    3. On the Welcome to the RemoteApp Wizard page, click Next.
    4. On the Choose programs to add to the RemoteApp Programs list page, select WordPad and click Next.
    5. On the Review Settings page, click Finish.
    6. In the Actions pane, click Export RemoteApp Settings.
    7. In the Export RemoteApp Settings dialog box, select Export the RemoteApp Programs list and settings to a file and click OK.
    8. In the Save As dialog box, in the File name text box, enter WordPadRemoteApp and save the file to the C:\Files folder. In the RemoteApp Manager dialog box click OK. Close the RemoteApp Manager console.
    9. *Log on to the UAG1 computer or virtual machine as CORP\User1. Click Start and in the Search box enter \\APP1\Files and press ENTER. Copy the WordPadRemoteApp.tspub file to the desktop on UAG1. Close the Windows Explorer window.

    STEP 4: Publish Remote Desktops on UAG1

    To publish Remote Desktops you need to add the Remote Desktops Application to the portal. In this step you will add the Remote Desktop application to the UAG1 portal page.

    1. At the UAG1 computer or virtual machine, click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management. In the User Account Control dialog box, click Yes.
    2. In the left pane of the Microsoft forefront Unified Access Gateway Management console, expand HTTPS Connections and click on HTTPSTrunk. In the right pane of the console, in the Applications section, click Add.
    3. On the Welcome to the Add Application Wizard page, click Next.
    4. On the Step 1 – Select Application page, select the Terminal Services (TS)/Remote Desktop Services (RDS) option. From the drop down box, select Remote Desktop (Predefined). Click Next.
    5. On the Step 2 – Configuration Application page, in the Application name text box, enter Predefined Remote Desktop. Click Next.
    6. On the Step 3 – Select Endpoint Policies page, from the Access policy drop down list, select Always. We select Always in this lab because the default policy requires that the client system have antivirus software installed in order to launch the application. CLIENT1 does not have antivirus software installed, so we need to select the Always option for the Test lab. Click Next.
    7. On the Step 4 – Configure Server Settings page, in the UAG SP1 RC Session Host (IP address or FQDN) text box, enter app1.corp.contoso.com. Click Next.
    8. On the Step 5 – Configure Client Settings page, accept the default settings and click Next.
    9. On the Step 6 – Portal Link page, accept the default settings and click Next.
    10. On the Step 7 – Authorization page, accept the default settings and click Next.
    11. On the Completing the Add Application Wizard page, click Finish.

    STEP 5: Publish RemoteApps on UAG1

    To publish RemoteApps you need to add the RemoteApps application to the portal. In this step you will add the RemoteApps application to the portal page.

    1. In the right pane of the Microsoft Forefront Unified Access Gateway Management console, in the Applications section, click the Add button.
    2. On the Welcome to the Add Application Wizard page, click Next.
    3. On the Step 1 – Select Application page, select the Terminal Services (TS)/Remote Desktop Services (RDS) option. From the drop down box, select RemoteApp. Click Next.
    4. On the Step 2 – Configuration Application page, in the Application name text box, enter Remote WordPad. Click Next.
    5. On the Step 3 – Select Endpoint Policies page, from the Access policy drop down box, select Always. Click Next.
    6. On the Step 4 – Import RemoteApp Programs page, click the Browse button. Navigate to the Desktop and open the WordPadRemoteApp.tspub file. In the UAG SP1 RC Session Host (IP address or FQDN) text box, confirm that it says APP1.corp.contoso.com. Click Next.
    7. On the Step 5 – Select Publishing Type page, in the Available RemoteApps section, select
      WordPad
      and click the right-pointing double-arrow. This moves the WordPad application to the Published RemoteApps section. Click Next.
    8. On the Step – 6 Configure Client Settings page, accept the default settings and click Next.
    9. On the Step – 7 Portal Link page, accept the default settings and click Next.
    10. On the Step 8 – Authorization page, accept the default settings and click Next.
    11. On the Completing the Add Application Wizard page, click Finish.
    12. Click the File menu and click Activate.
    13. On the Activate Configuration page, click the Activate button.
    14. Click Finish on the Activation completed successfully page.

    STEP 6: Test DirectAccess, SSTP and Remote Desktop Connectivity from CLIENT1

    After the portal configuration is completed, you can test connectivity to resources through the UAG portal. In this step you will confirm DirectAccess and SSTP connectivity, and then test Remote Desktop and RemoteApp connectivity through the portal.

    Confirm DirectAccess Connectivity to the Corpnet subnet:

    1. *Move the CLIENT1 computer or virtual machine to the Homenet subnet. Log on to CLIENT1 as CORP\User1.
    2. Open an elevated command prompt. In the command prompt window, enter ping dc1 and press ENTER. You should see four responses from DC1. This indicates that the IPv6 transition technology that connects CLIENT1 to UAG1 is working correctly.
    3. In the command prompt window, enter net view \\dc1 and press ENTER. You should see a list of shares on DC1. This indicates that the infrastructure tunnel is working correctly.
    4. In the command prompt window, enter net view \\app1 and press ENTER. You should see a list of shares on APP1. This indicates that the intranet tunnel is working correctly.
    5. You have demonstrated that DirectAccess connectivity is successful over both the intranet and infrastructure tunnels. Close the command prompt window.

    Confirm SSTP Connectivity to the Corpnet subnet:

    1. On the CLIENT1 computer or virtual machine, open Internet Explorer. In Internet Explorer, in the address bar, enter https://uag1.contoso.com and press ENTER. Click the information bar that informs you that the Website wants to run the following add-on: Microsoft Remote Desktop Services Web Access Con…” from “Microsoft Corporation:… click Run Add-on. In the Internet Explorer – Security Warning dialog box that asks Do you want to run this ActiveX control? click Run.
    2. Enter the username and password for CORP\User1 in the Application and Network Access Portal page. If the page times out and you see a message that says The logon process cannot be completed. User credentials were not submitted within the time limit, click the Back link and log on as CORP\User1.
    3. In the right pane of the portal page, click SSTP VPN. After you see the balloon in the system notification area that says that network connectivity is started, open an elevated command prompt.
    4. In the command prompt window, enter ping APP3 and press ENTER. You should see four responses from the IPv4 address of APP3. This indicates that DirectAccess has been disabled and the IPv4 SSTP connection to the Corpnet subnet is active. Close the elevated command prompt window.
    5. Right click the Remote Network Access icon in the system notification area and click Disconnect remote Network Access command. You will see a balloon in the system notification area that says that the connection is ended.

    Confirm Remote Desktop Connectivity to the Corpnet subnet:

    1. In the right pane of the portal page, click the Predefined Remote Desktop link. If the Message from webpage dialog box appears, click OK. If the Information bar appears saying that the website wants to run Remote Desktop Services ActiveX Client, click the information bar and click Run Add-on. In the Internet Explorer – Security Warning dialog box, click Run.
    2. Click the Predefined Remote Desktop link in the right pane of the portal page. In the Remote Desktop Connection dialog box, click Connect. In the Windows Security dialog box, enter credentials for CORP\User1. .
    3. The Desktop now appears in the RDC client window. Close the RDC window. In the Remote Desktop Connection dialog box, click OK.

    Confirm RemoteApp Connectivity to the Corpnet subnet:

    1. In the right pane of the portal, click the WordPad link.
    2. In the RemoteApp dialog box, click Connect.
    3. In the Document – WordPad window, enter This is a RemoteApp document. Click the Save icon in the Title Bar, and save the document to the desktop with the name My RemoteApp Doc. Close the WordPad window.
    4. Click the Log Off button in the upper right corner of the portal page. Close Internet Explorer.

    STEP 7: Snapshot the Configuration

    This completes the UAG SP1 RC DirectAccess with SSTP and Remote Desktop Gateway test lab. To save this configuration so that you can quickly return to a working UAG SP1 RC DirectAccess with SSTP and Remote Desktop Gateway configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.
    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC SSTP+RDG. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For more information on UAG and SSTP, see Setting up Remote Network Access.

    For more information on UAG and Remote Desktop Gateway, see Remote Desktop Services publishing solution guide.

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For procedures to configure UAG SP1 RC DirectAccess on which this document is based, see the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess.

    For procedures to configure UAG SP1 RC DirectAccess on which this document is based, see Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP)

    For a comprehensive list of Test Lab Guides, please see Test Lab Guides.

    For a list of UAG DirectAccess related Test Lab Guides, please see UAG DirectAccess Test Lab Guide Portal Page

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information on troubleshooting UAG DirectAccess in a Test Lab, see Test Lab Guide: Troubleshooting UAG DirectAccess.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ==================================================

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide–Demonstrate UAG SP1 RC DirectAccess with SSTP and Remote Desktop Gateway (RDG) Released

    imageOK folks, this is the last TLG for a week or two. Yes, I still have a couple of important ones that need to be done (TLGs that demonstrate how UAG DirectAccess works with BranchCache [very cool!] and  a Pilot Deployment Test Lab Guide where the UAG DirectAccess server belongs to a different forest than the computers and users).

    So what is this Test Lab Guide? Nothing other than the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP) and Remote Desktop Gateway (RDG). For a while I wondered if it was worth the effort to do this one, because I don’t know of many people who are using the RDG feature included with the UAG server. But then I thought about it and realized that maybe no one is using the RDG feature because no one is writing about it Smile  For this reason (and also because I wanted to see if it actually worked), I decided to move forward on this Test Lab Guide.

    The good news is that it works! Indeed, the combined DirectAccess, SSTP and Remote Desktop Gateway deployment works a treat. I don’t know why I didn’t think of this earlier, not only for writing a Test Lab Guide, but for deploying myself in my home office (actually, my wife Deb Shinder did the live deployment after she tested the Test Lab Guide for me).

    The RDG setup also supports down-level clients such as XP and Vista, which helps in those occasional situations when I don’t have a worked laptop and have to borrow one (like when I’m on the road and my laptop dies and I get a “loaner” that is running XP SP2). Accessing the Remote Desktop works great, and also the RemoteApp feature is even more useful – since I can use that together with my DirectAccess client configuration when I need access to an app that’s not installed on my laptop.

    I hope you like this Test Lab Guide and find it useful. As always, if you have any questions or problems with this Test Lab Guide, let me know! Send me a note to the email address in my sig line and I’ll get back to you as soon as I can.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess with Secure Socket Tunneling Protocol (SSTP) - Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess with SSTP check out:

    http://go.microsoft.com/fwlink/?LinkId=206283

    ==================================================

    Introduction

    DirectAccess is a new feature in the Windows 7 and Windows Server 2008 R2 operating systems that gives users the experience of being seamlessly connected to their intranet any time they have Internet access. With DirectAccess enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without requiring users to connect to a VPN. DirectAccess provides increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside the office.

    Forefront Unified Access Gateway (UAG) SP1 RC extends the value of the Windows DirectAccess solution by adding features that meet the requirements of many enterprise deployments:

    • Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
    • Support for Network Load Balancing, which enables the UAG DirectAccess SP1 RC array to be highly available without requiring the use of an external hardware load balancer
    • Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.

    To learn more about UAG DirectAccess, see the following resources:

    · Forefront UAG DirectAccess Design Guide

    · Forefront UAG DirectAccess Deployment Guide

    UAG SP1 RC supports hosting multiple roles on a single UAG server or UAG array. For example, you might want to host both the DirectAccess server and SSTP VPN server roles on the same server or array. Windows 7 clients that are configured DirectAccess clients will automatically use DirectAccess to connect to intranet resources. Windows 7 clients that are not domain members, or who are not configured as DirectAccess clients can use SSTP to connect to the intranet using a network level VPN connection. In addition, DirectAccess clients hosting applications that are not compatible with DirectAccess can connect to the SSTP VPN when they need to use the non-compatible application.

    clip_image001Note

    Non-Windows 7 operating systems (such as Windows Vista, Windows XP) can use the UAG Network Connector to connect to the intranet using a network level SSL VPN connection. However, you cannot host the Network Connector application on the same server or array that is also hosting DirectAccess. To support network level VPN connectivity for non-Windows 7 clients, you will need to deploy a second UAG server or array.

    In this guide

    This guide provides step-by-step instructions for configuring UAG DirectAccess SP1 RC with SSTP in a test lab so that you can see how it works. You will set up and deploy UAG DirectAccess SP1 RC using five server computers, two client computers, Windows Server 2008 R2 Enterprise edition, and Windows 7 Ultimate Edition. The Test Lab simulates intranet, Internet, and a home networks, and demonstrates a co-located Forefront UAG DirectAccess and SSTP VPN server role deployment. The starting point for this paper is the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess .

    clip_image002Important:

    These instructions are designed for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network. For more information on planning and deploying DirectAccess with Forefront UAG, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the test lab scenario

    In this test lab scenario, Forefront UAG DirectAccess SP1 RC is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG SP1 RC DirectAccess and SSTP VPN server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and network location server.
    • One intranet member server running Windows Server 2003 SP2 (APP3) that is configured as an IPv4 only web and file server. This server is used to highlight the UAG’s NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1) that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming domain member client computer running Windows 7 Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by NAT1.
    • The Internet subnet (131.107.0.0/24).
    • The Corpnet subnet (10.0.0.0/24) separated from the Internet by the Forefront UAG DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image004

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Five computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; two of these computers has two network adapters installed.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed (NAT1).
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG) SP1 RC.

    This Test Lab Guide demonstrates a combined UAG SP1 RC DirectAccess and SSTP deployment.

    clip_image005Important

    The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.

    Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess and SSTP, please refer to the Forefront UAG DirectAccess Deployment Guide for the steps to configure the UAG DirectAccess server and supporting infrastructure servers.

    Steps for configuring the test lab

    The following sections describe how to configure UAG1 as both a DirectAccess and SSTP VPN server. After UAG1 is configured, this guide provides steps for demonstrating the DirectAccess and SSTP VPN functionality for CLIENT1 when it is connected to the Homenet subnet.

    clip_image001[1]Note

    You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    The following procedures are performed to enable and allow you to test the UAG SP1 RC DCA:

    · Step 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide – The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    · Step 2: Create the HTTPS Trunk. UAG uses the concept of “trunk” as the primary listener for incoming SSL connections to a UAG portal page. In this step you will create an SSL Trunk that can be used to create a portal page that includes the SSTP VPN application.

    · Step 3: Configure the Remote Network Access Settings. The SSTP application requires configuration of a number of settings before it can be deployed. In this step you will configure these settings.

    · Step 4: Add the SSTP Remote Network Access Application to the Trunk. In order for users to access the SSTP VPN application, that application must be added to a trunk. In this step you will add the SSTP application to the HTTPS trunk.

    · Step 5: Activate the Configuration and View Activation in the Activation Monitor. You need to activate the configuration after adding the SSTP VPN application to the trunk. In this step you will activate the configuration and view the activation process in the Activation Monitor.

    · Step 6: Test DirectAccess and SSTP Connectivity. After activation is complete, you are ready to test both DirectAccess and SSTP connectivity. In this step you will confirm DirectAccess connectivity and then start an SSTP VPN connection through the portal.

    · Step 7: Snapshot the configuration. After completing the Test Lab, take a snapshot of the working UAG DirectAccess with SSTP Test Lab so that you can return to it later to test additional scenarios.

    clip_image001[2]Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.

    STEP 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide

    The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. After completing the steps in that Test Lab Guide you will have the core infrastructure required to complete this Test Lab Guide on how to configure the UAG DirectAccess DCA. If you have already completed the steps in that Test Lab Guide and saved a snapshot or disk image of the Test Lab, you can restore the snapshot or image and begin with the next step.

    STEP 2: Create the HTTPS Trunk

    UAG uses the concept of “trunk” as the primary listener for incoming SSL connections to a UAG portal page. In this step you will create an SSL Trunk that can be used to create a portal page that includes the SSTP VPN application.

    1. At the UAG1 computer or virtual machine, log on as CORP\User1. Click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management.
    2. In the right pane of the console, click Allow remote access to the UAG server via an HTTPS trunk.
    3. On the Welcome to the Create Trunk Wizard page, click Next.
    4. On the Step 1 – Select Trunk Type page, select the Portal trunk option and click Next.
    5. On the Step 2 – Setting the Trunk page, in the Trunk name text box, enter HTTPSTrunk. In the Public host name text box, enter uag1.contoso.com. In the External Web Site section, confirm that the IP address is 131.107.0.2. Confirm that the HTTP port is 80 and confirm that the HTTPS port is 443. Click Next.
    6. On the Step 3 – Authentication page, click the Add button. In the Authentication and Authorization Servers dialog box, click the Add button.
    7. In the Add Authentication Server dialog box, in the Server type drop down list, confirm that Active Directory is selected. In the Server Name text box, enter dc1.corp.contoso.com. In the Connection Settings section, select Use local Active Directory forest authentication. In the Search Settings section, click the ellipses (…) button. In the Search Root (Base DN) dialog box, confirm that the Select Base DN entry is CN=Users,DC=corp,DC=contoso,DC=com. Click OK. In the Server access section, in the User (domain\user) text box, enter CORP\User1. In the Password text box, enter User1’s password. Click OK.
    8. In the Authentication and Authorization Servers dialog box, click Select. On the Step 3 – Authentication page, confirm that User selects from a server list is selected and that there is a checkmark in the Show server names checkbox. Click Next.
    9. On the Step 4 – Certificate page, confirm that uag1.contoso.com appears in the Server certificate drop down list. Click Next.
    10. On the Step – 5 Endpoint Security page, select the Use Forefront UAG access policies option and click Next.
    11. On the Step 6 – Endpoint Policies page, in the Nonprivileged access policy dropdown box, select Always. Note that we select Always in this Test Lab because the default access policy requires that clients have antivirus software installed. In this Test Lab CLIENT1 does not have antivirus software installed so we need to change from the default Nonprivileged access policy to one that will allow a system without antivirus software to access the portal. Click Next.
    12. On the Completing the Create Trunk Wizard page, click Finish.
    13. In the Trunk Configuration section, click the Configure button. On the Advanced Trunk Configuration [HTTPSTrunk] page, click the Session tab. In the Default Sessions Settings section, in the Inactive session timeout (seconds) text box, enter 1800. In the Trigger automatic logoff after text box, enter 1440. Click OK.
    14. Click the File menu and click Activate. On the Activate Configuration page, click the Activate button. Click Finish when the activation completes.

    STEP 3: Configure the Remote Network Access Settings

    The SSTP application requires configuration of a number of settings before it can be deployed. In this step you will configure these settings.

    1. In the Microsoft Forefront Unified Access Gateway Management console, click the Admin menu and point to Remote Network Access. Click on SSL Network Tunneling (SSTP)… .
    2. In the SSL Network Tunneling Configuration dialog box, on the General tab, put a checkmark in the Enable remote client VPN access checkbox. In the Maximum VPN Client connections text box, enter 10. In the SSL Tunneling VPN Trunk section, from the Trunk drop down list, select HTTPSTrunk. Confirm that is says uag1.contoso.com in the Public host name box.
    3. Click the Protocols tab. Confirm that there is a checkmark in the Secure Socket Tunneling Protocol (SSTP). Note that while there are checkboxes for Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol (L2TP)/IPsec, they are not functional. UAG SP1 does not support PPTP or L2TP/IPsec network level VPN protocols.
    4. Click the IP Address Assignment tab. Select the Assign address using DHCP. Note that you can use this option only when you have a single server deployment. If you have a UAG array and want to enable SSTP support, you will need to assign a static address pool to each of the servers in the array and the addresses used in each pool must be different on each server.
    5. Click on the User Groups tab. On this tab you can limit SSTP access on a per group basis to selected assets on the intranet. In this test lab we will not enable this feature. Click OK.

    STEP 4: Add the SSTP Remote Network Access Application to the Trunk

    In order for users to access the SSTP VPN application, that application must be added to a trunk. In this step you will add the SSTP application to the HTTPS trunk.

    1. In the right pane of the console, in the Applications section, click the Add button.
    2. On the Welcome to the Add Application Wizard page, click Next.
    3. On the Step – 1 page, select the Client/server and legacy option. From the drop down list, select Remote Network Access. Click Next.
    4. On the Step 2 – Configure Application page, in the Application name text box, enter SSTP VPN. Click Next.
    5. On the Step 3 – Select Endpoint Policies page, in the Access policy drop down box, select Always. The reason we select this option in the Test Lab is that the default setting requires the client to have antivirus software installed, and in this Test Lab CLIENT1 does not have antivirus software installed. Click Next.
    6. On the Step 4 – Configure Server Settings page, make no changes and accept the default values. Click Next.
    7. On the Step 5 – Portal Link page, make no changes and click Next.
    8. On the Step 6 – Authorization page, confirm that there is a checkmark in the Authorize all users checkbox and click Next.
    9. On the Completing the Add Application Wizard page, click Finish.

    STEP 5: Activate the Configuration and View Activation in the Activation Monitor

    You need to activate the configuration after adding the SSTP VPN application to the trunk. In this step you will activate the configuration and view the activation process in the Activation Monitor.

    1. Click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Activation Monitor. In the Use Account Control dialog box, click Yes. It may take a minute or two for the Activation Monitor to open. Maximize the Activation Monitor after it opens, and then minimize the window.
    2. In the Microsoft Forefront Unified Access Gateway Management console, click the File menu and then click Activate. In the Activate Configuration dialog box, click the Activate button.
    3. Maximize the Forefront Unified Access Gateway Activation Monitor. Click the UAG1 node in the left pane of the console. Notice in the right pane that it tells you the time when the activation started. Click the Options button. In the Autorefresh Interval (sec) text box, enter 10 and then click OK.
    4. When the activation completes, scroll through the output in the right pane. This provides you information about what happened during the activation process. At the bottom of the output, you should see Activation completed successfully. Minimize the Forefront Unified Access Gateway Activation Monitor console.
    5. In the Activate Configuration dialog box, click Finish.

    STEP 6: Test DirectAccess and SSTP Connectivity

    After activation is complete, you are ready to test both DirectAccess and SSTP connectivity. In this step you will confirm DirectAccess connectivity and then start an SSTP VPN connection through the portal.

    1. *Move the CLIENT1 computer to Homenet subnet and then log on as CORP\User1.
    2. Open an elevated command prompt. In the command prompt window enter ipconfig and press ENTER. You should see an IPv6 address assigned to Tunnel adapter Teredo Tunneling Pseudo-Interface. In the command prompt window, enter ping dc1 and press ENTER. You should see four responses from the ISATAP address assigned to DC1. In the command prompt window, enter net view \\dc1 and press ENTER. You should see a list of shares on DC1. This indicates that the infrastructure tunnel is working properly over DirectAccess.
    3. In the command prompt window, enter ping app1 and press ENTER. You should see four responses from the ISATAP address assigned to APP1. This indicates that name resolution is working correctly. At the command prompt window, enter net view \\app1 and press ENTER. You should see a list of shares on APP1. This indicates that the intranet tunnel is working correctly over DirectAccess.
    4. In the command prompt window, enter netsh namespace show effectivepolicy and press ENTER. You should see that the Name Resolution Policy Table is active and it shows that there are two entries in the NRPT.
    5. Open Internet Explorer. In the address bar, enter https://uag1.contoso.com and press ENTER. Endpoint components will be downloaded to CLIENT1. In the information bar in Internet Explorer, click the This website want to install the following add-on…” and then click Install This Add-on for All Users on This Computer. Click Yes in the User Account Control dialog box. In the Forefront UAG endpoint components dialog box, put a checkmark in the do not show this message again checkbox and click Yes. You will see Downloading Endpoint Component Manager on the web page with a progress bar. In the Security Alert dialog box, put a checkmark in the Trust this site checkbox and then select the Always option. Click Trust. The web page will now say Checking for device compliance.
    6. The Application and Network Access Portal page should now appear. If you see a mobile log on page, close Internet Explorer and open it again and go to https://uag1.contoso.com. In the User name text box, enter CORP\User1 and in the Password text box, enter User1’s password. Click Log On.
    7. The Application and Network Access Portal now appears. You can see an entry for SSTP VPN in both the left and right panes of the console. Click the SSTP VPN link in the right pane of the console. A new web page window will open. That web page will disappear and you will see an icon with a balloon that says Forefront UAG Remote network Access Connection started. Right click on the icon and click Show Status. In the Portal Activity dialog box, in the Active Connections section, you will see the URL that CLIENT1 is connect to and the time that Remote Network Access started. In the Launched Applications section, you will see the application is SSTP VPN. Click Hide.
    8. Return to the elevated command prompt window. In the command prompt window, enter ipconfig and press ENTER. You will see an IPv4 address assigned to PPP adapter UAGSSTPVPN. You will also see an ISATAP address assigned based on the PPP adapter’s IPv4 address; this enables CLIENT1 to communicate with IPv6 only servers on the intranet through the SSTP VPN connection.
    9. In the command prompt window, enter ping dc1 and press ENTER. You will see four responses from the IPv6 ISATAP address of DC1. In the command prompt window, enter ping app1 and press ENTER. You will see four responses from the IPv6 ISATAP addresses assigned to APP1. In the command prompt window, enter ping app3 and press ENTER. In this case you see four responses from the IPv4 address assigned to APP3. Remember, APP3 is an IPv4 only resource. In the command prompt window, enter netsh namespace show effectivepolicy. You should see the output say Note: DirectAccess settings would be turned off when computer is inside corporate network. The reason for this is that when the SSTP connection was established, CLIENT1 was able to resolve the name of the Network Location Server (nls.corp.contoso.com), which causes the NRPT to disable itself.
    10. Click Start and then in the Search box enter wf.msc and press ENTER. In the Windows Firewall with Advanced Security console, navigate to the Monitoring\Security Associations\Main Mode node in the left pane of the console. Note that there are no security associations, indicating that DirectAccess has been disabled. Click the top node, Windows Firewall with Advanced Security on Local Computer. In the right pane you will see that Domain Profile is Active – this is the reason why DirectAccess is disabled, as the DirectAccess related Connection Security Rules that establish the DirectAccess IPsec tunnels are not available when the Domain Profile is active on the DirectAccess client computer.
    11. Right click the Remote Network Access icon in the System Notification Area. Click Disconnect Remote Network Access. In the Windows Firewall with Advanced Security console, click Refresh in the right pane. Notice that the Domain Profile is no longer active and the current profile is Public Profile is Active. Network Location Awareness determined that CLIENT1 was no longer connected to the intranet and changed the Firewall Profile settings. Navigate to the Monitoring\Security Associations\Main Mode node in the left pane of the console. You will see a Main Mode security association, indicating that the DirectAccess intranet tunnel has come up automatically.
    12. Return to the elevated command prompt. In the command prompt window, enter ping APP3 and press ENTER. Notice that this time there are four responses from an IPv6 address. This IPv6 address is generated by the NAT64 feature in UAG.
    13. Close the command prompt window. Close the Windows Firewall with Advanced Security console. Close Internet Explorer. Click Yes in the SSL Application Tunneling dialog box.

    STEP 7: Snapshot the Configuration

    This completes the UAG SP1 RC DirectAccess with SSTP test lab. To save this configuration so that you can quickly return to a working UAG SP1 RC DirectAccess Connectivity Assistant configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.
    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC SSTP. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For more information on UAG and SSTP, see Setting up Remote Network Access.

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For procedures to configure UAG SP1 RC DirectAccess on which this document is based, see the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess.

    For a comprehensive list of Test Lab Guides, please see Test Lab Guides.

    For a list of UAG DirectAccess related Test Lab Guides, please see UAG DirectAccess Test Lab Guide Portal Page

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information on troubleshooting UAG DirectAccess in a Test Lab, see Test Lab Guide: Troubleshooting UAG DirectAccess.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ==================================================

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • UAG SP1 RC DirectAccess with SSTP Test Lab Guide Released

    I am happy to tell you that today I’ve released the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess with Secure Socket Tunneling (SSTP) Test Lab Guide. This is one that I was looking forward to doing because this is such an important deployment model.

    image

    As you might know, a single UAG server or UAG array can support all of the roles that are supported by UAG (with the exception that a UAG server or array that acts in the DirectAccess role cannot also host the Network Connector). In general, I recommend that you use different UAG servers or array based on their functional roles:

    • One server or array should be dedicated to SSL VPN (portal or reverse web proxy) services
    • One server or array should be dedicated to DirectAccess and SSTP (and maybe Remote Desktop Gateway)

    This is not a hard and fast rule, and I certainly wouldn’t fault anyone for taking a different approach. But I’ve found that if you separate the services provided on the server or array in this manner, it’s easier to “size” your deployment, given the high processing requirements for the DirectAccess server deployment.

    Having SSTP on the DirectAccess server makes it easy to have a “fall back” solution for any applications that don’t work with DirectAccess. While we haven’t seen too many of them, there are still a few and SSTP makes it easy to access the corporate network for DirectAccess client when they need to use these applications. In addition, you may have Windows 7 clients that are not domain members, and thus can’t be DirectAccess clients. Or you might even have domain member Windows 7 computers, but these aren’t configured for DirectAccess. These non-DirectAccess clients can easily connect to the corporate network using the Secure Socket Tunneling Protocol (SSTP), which is firewall and NAT friendly, so that users can connect using SSTP from almost anywhere.

    In this Test Lab Guide you will build out a co-located DirectAccess and SSTP server and then test the deployment. You’ll configure the UAG server as both a DirectAccess and SSTP VPN server and then test DirectAccess and SSTP VPN connectivity, and look at several key areas to confirm connectivity and what normal connectivity looks like in these scenarios.

    I hope you like the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess with Secure Socket Tunneling (SSTP) Test Lab Guide. As always, if you have any questions on this Test Lab Guide, or have suggestions for improvements or if you find errors, then please let me know! Just write to the email address in my sig line and I’ll get back to you as soon as I can.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess Connectivity Assistant - Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess Connectivity Assistant check out:

    http://go.microsoft.com/fwlink/?LinkId=205738

    ==================================================

    Introduction

    DirectAccess is a new feature in the Windows 7 and Windows Server 2008 R2 operating systems that gives users the experience of being seamlessly connected to their intranet any time they have Internet access. With DirectAccess enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without requiring users to connect to a VPN. DirectAccess provides increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside the office.

    Forefront Unified Access Gateway (UAG) SP1 RC extends the value of the Windows DirectAccess solution by adding features that meet the requirements of many enterprise deployments:

    • Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
    • Support for Network Load Balancing, which enables the UAG DirectAccess SP1 RC array to be highly available without requiring the use of an external hardware load balancer
    • Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.

    To learn more about UAG DirectAccess, see the following resources:

    · Forefront UAG DirectAccess Design Guide

    · Forefront UAG DirectAccess Deployment Guide

    The Microsoft DirectAccess Connectivity Assistant (DCA) supports a DirectAccess client computer that is running Windows 7 by clearly indicating the state of DirectAccess connectivity to corporate network resources. It provides easy access to troubleshooting information and makes it simple to create and send log files to support personnel.

    Without the DCA, when a user’s Internet connection (for example, http://www.bing.com) appears to be available, but corporate network resources are not accessible, there is no way that the user can verify if the problem is caused by DirectAccess not working correctly. This can result in user frustration and increased Help Desk support calls. The DCA clearly indicates the operational status of DirectAccess by using an icon in the notification area and informational messages. This helps the user identify the problem area and helps direct troubleshooting efforts.

    If DirectAccess is not working correctly, the DCA clearly indicates the status by changing the icon in the notification area and by sending informational messages that provide more detail about the failure. The DCA provides the user with easy access to an extranet URL. For example, this URL might point to a Web site that hosts support information for the organization’s user community. The user can easily send diagnostic log files to the DirectAccess support staff. The log files can contain the default information. The UAG SP1 RC DCA includes comprehensive advanced diagnostics built-in. The administrator can also include a script in the DCA configuration that creates additional diagnostic information that is included in the log files sent to the support team.

    In this guide

    This guide provides step-by-step instructions for configuring UAG DirectAccess SP1 RC with the DirectAccess Connectivity Assistant in a test lab so that you can see how it works. You will set up and deploy UAG DirectAccess SP1 RC using five server computers, two client computers, Windows Server 2008 R2 Enterprise edition, and Windows 7 Ultimate Edition. The Test Lab simulates intranet, Internet, and a home networks, and demonstrates the Forefront UAG DirectAccess Connectivity Assistant. The starting point for this paper is the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess .

    clip_image001Important:

    These instructions are designed for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network. For more information on planning and deploying DirectAccess with Forefront UAG, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the test lab scenario

    In this test lab scenario, Forefront UAG DirectAccess SP1 RC is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG DirectAccess SP1 RC server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and network location server.
    • One intranet member server running Windows Server 2003 SP2 (APP3) that is configured as an IPv4 only web and file server. This server is used to highlight the UAG’s NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1) that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming domain member client computer running Windows 7 Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by NAT1.
    • The Internet subnet (131.107.0.0/24).
    • The Corpnet subnet (10.0.0.0/24) separated from the Internet by the Forefront UAG DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image003

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Five computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; two of these computers has two network adapters installed.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed (NAT1).
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG) SP1 RC.

    This Test Lab Guide demonstrates the UAG DirectAccess SP1 RC DirectAccess Connectivity Assistant.

    For more information about the different modes of NAP, see Stages of a NAP Deployment.

    clip_image004Important

    The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.

    Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess , please refer to the Forefront UAG DirectAccess Deployment Guide for the steps to configure the UAG DirectAccess server and supporting infrastructure servers.

    Steps for configuring the test lab

    The following sections describe how to configure UAG1, DC1 and CLIENT1 for UAG SP1 RC and the DCA. After UAG1, DC1 and CLIENT1 are configured, this guide provides steps for demonstrating the DCA functionality for CLIENT1 when it is connected to the Homenet subnet.

    clip_image005Note

    You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    The following procedures are performed to enable and allow you to test the UAG SP1 RC DCA:

    · Step 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide – The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    · Step 2: Configure INET1 with a Help.txt file. The DCA can provide DirectAccess users information about a web site they can go to in order to get help with DirectAccess related problems. In this step you will configure a web page that CLIENT1 can reach to get that help.

    · Step 3: Install and Configure the Web Server Role on DC1. The DCA uses a number of connectivity verifiers to determine intranet connectivity over the DirectAccess IPsec tunnels. In this step you will configure DC1 as a web server so that the DCA can use HTTPS to DC1 for a connectivity verifier.

    · Step 4: Run the UAG DirectAccess DCA Configuration Wizard on UAG1. UAG SP1 RC includes a new integrated DCA wizard that automatically configures and deploys GPO settings that enable the DCA. In this step you will run the UAG SP1 RC DCA wizard.

    · Step 5: Update Group Policy on CLIENT1 and Test DCA Functionality. The new DCA settings are deploy via the DirectAccess clients GPO. In this step you will update Group Policy on CLIENT1 and then test some of the DCA features.

    · Step 6: Snapshot the configuration. After completing the Test Lab, take a snapshot of the working UAG DirectAccess with NAP Test Lab so that you can return to it later to test additional scenarios.

    clip_image005[1]Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.

    STEP 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide

    The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. After completing the steps in that Test Lab Guide you will have the core infrastructure required to complete this Test Lab Guide on how to configure the UAG DirectAccess DCA. If you have already completed the steps in that Test Lab Guide and saved a snapshot or disk image of the Test Lab, you can restore the snapshot or image and begin with the next step.

    STEP 2: Configure INET1 with the Help.txt File

    The DCA can expose to DirectAccess users a link to a location where they can find help. This location is configured in the UAG DirectAccess DCA wizard. In this step you will configure a Help.txt file that CLIENT1 will connect to when acting as a DirectAccess client.

    1. *At the INET1 computer or virtual machine, log on as Administrator. Click the Start button, click the Windows Explorer icon in the Task Bar.
    2. In Windows Explorer, navigate to C:\inetpub\wwwroot. In the right pane of the Windows Explorer windows, right click in an empty area, point to New and click Text Document.
    3. Rename New Text Document to help and press ENTER to save the new name.
    4. Double click on the help text document. In the help – Notepad window enter This is the place to get help with your DirectAccess problems.
    5. Close the help – Notepad window. In the Notepad dialog box, click Save.
    6. Close the Windows Explorer window.

    STEP 3: Install and Configure the Web Server Role on DC1

    The UAG DCA uses connectivity verifiers to determine DirectAccess connectivity to the intranet over the DirectAccess tunnels. Connectivity verifiers can use HTTP, HTTPS and SMB to assess the current connectivity status to the intranet over the DirectAccess IPsec tunnels. In this step you install the web server role on DC1 and then bind a certificate to the web site so that the DCA can establish an SSL session with DC1 to determine intranet connectivity.

    1. *At the DC1 computer or virtual machine, log on as User1.
    2. Open the Server Manager console if it does not open automatically. In the left pane of the Server Manager console, click Roles. In the right pane of the console, click the Add Roles link.
    3. On the Before You Begin page, click Next. On the Select Server Roles page, select Web Server (IIS) and click Next. On the Introduction to Web Server (IIS) page, click Next.
    4. On the Select Role Services page, click Next. On the Confirm Installation Selections page, click Install. On the Installation Results page, click Close.
    5. Click Start and point to Administrative Tools. Click Internet Information Services (IIS) Manager.
    6. In the left pane of the Internet Information Services (IIS) Manager, navigate to DC1 (CORP\User1)\Sites\Default Web Site. In the Actions pane, click Bindings.
    7. In the Site Bindings dialog box, click Add. In the Add Site Binding dialog box, from the Type drop down box, select https. From the SSL certificate drop down box, select DC1.corp.contoso.com. Click OK. In the Site Bindings dialog box, click Close.
    8. Close the Internet Information Services (IIS) Manager console.

    STEP 4: Run the UAG DirectAccess DCA Configuration Wizard on UAG1

    UAG SP1 RC includes a new wizard that enables you to configure the DCA so that you don’t have to manually configure Group Policy to support the DCA. In this step you will run the DCA wizard so that it will automatically provision Group Policy to configure the DCA on DirectAccess clients.

    1. *At the UAG1 computer or virtual machine log on as User1. Click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management.In the User Account Control dialog box, click Yes.
    2. In the left pane of the console, click DirectAccess. In the right pane of the console, in the Step 1 Clients and GPOs section, click the Client Connectivity Assistant link.
    3. In the Client Connectivity Assistant Configuration wizard, on the Client Connectivity page, select the Yes, configure application settings option. Confirm that there is a checkmark in the Allow users to use local name resolution instead of sending requests through corporate DNS servers. Click Next.
    4. On the Connection Verification page, click Add. In the Connectivity Verifier Details dialog box, select File from the Connectivity method drop down box. In the Verification server name, IP address or URL text box, enter \\APP1\Files\example.txt. Click the Validate Connectivity button. You should see a Validation dialog box informing you that A connection to the connectivity verifier was established. Click OK and then click OK again.
    5. Click Add. In the Connectivity Verifier Details dialog box, select the HTTP option from the Connectivity method drop down list. In the Verification server name, IP address, or URL text box, enter http://app1.corp.contoso.com. Click the Validate Connectivity button. You should see a Validation dialog box informing you that A connection to the connectivity verifier was established. Click OK and then click OK again.
    6. Click Add. In the Connectivity Verifier Details dialog box, select the HTTPS option from the Connectivity method drop down list. In the Verification server name, IP address, or URL text box, enter http://dc1.corp.contoso.com. Click the Validate Connectivity button. You should see a Validation dialog box informing you that A connection to the connectivity verifier was established. Click OK and then click OK again.
    7. On the Connection Verification page, click Next.
    8. On the Troubleshooting Portal page, select the This site (URL): option. In the text box below that option, enter http://inet1.isp.example.com/help.txt. In the Friendly name for URL link: text box, enter DirectAccess Help Center. Click Next.
    9. On the Diagnostic Logging page, in the Send client log files to text box, enter user1@corp.contoso.com. Click Finish.
    10. In the right pane of the console, click the Apply Policy button. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now. In the DirectAccess Policy Configuration dialog box, click OK. Click Close on the Forefront UAG DirectAccess Configuration Review page.
    11. Open an elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. Close the command prompt window.
    12. In the right pane of the console, click the Activate button. In the Activate Configuration dialog box, click Activate. Click Finish when the activation is complete. Close the UAG management console.

    STEP 5: Update Group Policy, Install the DCA and Test DCA Functionality on CLIENT1

    In this step you will update Group Policy on CLIENT1 so that it receives the new DCA related settings. Then you will install the DCA client software and finally test DCA functionality when CLIENT1 is located on the Homenet subnet.

    Update Group Policy on CLIENT1:

    1. *Connect CLIENT1 to the Corpnet subnet. Wait until the network icon in the notification area of the desktop displays a yellow caution sign.
    2. Click Start, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator. Click Yes at the User Account Control prompt.
    3. In the command prompt window, enter gpupdate /force and press ENTER. Wait for the command to complete and then close the command prompt window.

    Install the DCA software on CLIENT1:

    1. On CLIENT1, insert the UAG SP1 RC DVD into the computer or mount the UAG SP1 RC .iso file on the virtual machine. In the AutoPlay dialog box, click Open folder to view files.
    2. Navigate to the UAG\Microsoft Forefront Unified Access Gateway\common\bin\da\dca folder. Double click on the Microsoft_DirectAccess_Connectivity_Assistant file.
    3. In the Microsoft DirectAccess Connectivity Assistant Setup wizard, on the MICROSOFT PRE-RELEASE SOFTWARE LICENSE TERMS page, put a checkmark in the I accept the terms in the License Agreement checkbox and click Install. In the user Account Control dialog box, click Yes. On the Completed the Microsoft DirectAccess Connectivity Assistant Setup Wizard page, click Finish.
    4. You should now see the DCA icon in the system notification area.

    Test DCA Functionality on CLIENT1:

    1. Move CLIENT1 to the Homenet subnet and wait for the network icon in the system notification area to stop spinning. Right click the Taskbar and click Properties. In the Taskbar and Start Menu Properties dialog box, in the Nofication Area section, click Customize. On the Nofication Area Icons page, put a checkmark in the Always show all icons and notifications on the taskbar and click OK. Click OK in the Taskbar and Start Menu Properties dialog box.
    2. At this point you might notice a red “x” on the DCA icon. Open an elevated command prompt on CLIENT1. In the command prompt window enter net view \\dc1 and press ENTER. You should see a list of shares on DC1. In the command prompt window, enter net view \\app1 and press ENTER. If you receive a network path was not found error, then in the command prompt window enter ipconfig /flushdns and press ENTER. After that command completes, enter in the command prompt windows net view \\app1 and press ENTER. You should see a list of share on APP1. You should also see the red “x” disappear from the DCA icon.
    3. *Move to the APP1 computer or virtual machine. Open Windows Explorer and navigate to the C:\Files folder. Right click the Example file and click Rename. Rename the file to Example1 and press ENTER to save the file with the new name. Notice that a new empty file is created with the same name.
    4. *Move to the DC1 computer or virtual machine. Click Start and point to Administrative Tools. Click Internet Information Services (IIS) Manager. In the Internet Information Services (IIS) Manager console, in the left pane, click DC1 (CORP\User1). In the Actions pane, click Stop.
    5. *Move to the CLIENT1 computer or virtual machine and wait a few moments. You will notice that the DCA icon now has a red “x” on it. Right click the DCA icon and click Advanced Diagnostics.
    6. Notice under Advanced Log File that is says generating logs while it creates the log files. When it says Open logs directory click the Open logs directory link. Double click DcaDefaultLog.
    7. On the DirectAccess Connectivity Assistant Logs web page, note in the Probes List section a line that reads FAIL – The server name resolved successfully, but failed to access HTTP: https://dc1.corp.contoso.com. Note that the other two connectivity verifiers that you configured show as PASS. Also note that there is a connectivity verifier that you didn’t configure – a ping test to the UAG DirectAccess server itself (PASS – PING: 2002:836b:3::836b:3). Scroll through the rest of the page to view the detailed information collected by the DCA client software. Close Internet Explorer. Close Windows Explorer.
    8. In the DCA dialog box, notice that the entry you make in the wizard DirectAccess Help Center appears, and under that is the URL you configured for the Help page. Click the http://inet1.isp.example.com link. You should see the help page that reads This is the place to get help with your DirectAccess problems. Close Internet Explorer. Note the Email Logs button. If there were an email client application installed on CLIENT1, you could click that button and it would automatically email the log files to user1@corp.contoso.com, as you configure in the DCA wizard. Click Close in the Microsoft DirectAccess Connectivity Assistant dialog box. Close all open windows on CLIENT1.
    9. *Move to the DC1 computer or virtual machine. In the Internet Information Services (IIS) Manager console, in the Actions pane, click Start. Close all open windows on DC1.

    It is important to note that the DCA icon may show a red “x” even when there is connectivity to the intranet. The red “x” appears when any of the connectivity verifiers is unavailable to the DirectAccess client. It is recommended that you specify a diverse set of resources for your connectivity verifiers. This diversity helps ensure that a failure to access a resource is an unambiguous indication of a problem with DirectAccess rather than a problem with another component.

    For example, if all of the specified resources are behind a network address translating application layer gateway (NAT64), the failure of DCA to access the test resources might indicate a failure of the NAT64 rather than a failure of DirectAccess. Instead, identify one resource behind the NAT64, another behind an ISATAP gateway, and so on. Also note that you must not use the Network Location Server as a connectivity verifier, since the name of the Network Location Server cannot be resolved by the DirectAccess client.

    STEP 6: Snapshot the Configuration

    This completes the UAG SP1 RC DirectAccess Connectivity Assistant test lab. To save this configuration so that you can quickly return to a working UAG SP1 RC DirectAccess Connectivity Assistant configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.

    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC DCA. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For procedures to configure UAG SP1 RC DirectAccess on which this document is based, see the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess.

    For a comprehensive list of UAG DirectAccess Test Lab Guides, please see Test Lab Guides.

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information on troubleshooting UAG DirectAccess in a Test Lab, see Test Lab Guide: Troubleshooting UAG DirectAccess.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ==================================================

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • UAG SP1 RC Demonstrate UAG DirectAccess Connectivity Assistant (DCA) Test Lab Guide Available

    Yay! Another Test Lab Guide hits the download center today.

    Today’s Test Lab Guide is the Test Lab Guide: Demonstrate UAG DirectAccess Connectivity Assistant. In this Test Lab Guide you’ll go over the installation and configuration of the DirectAccess Connectivity Assistant (known as the DCA). The DCA allows DirectAccess users to receive information about the status of their DirectAccess connections and also includes advanced diagnostic tools that make it simple for the user to create comprehensive troubleshooting logs that can be emailed to the UAG DirectAccess administrator with a single click.

    image

    I hope you like the Test Lab Guide: Demonstrate UAG DirectAccess Connectivity Assistant. Let me know what you think of it! If there are additional scenarios you’d like to see covered in this Test Lab Guide, or if there are areas that you think need clarification or enhancement, let me know. Just send me a note to the email address in my sig line and I’ll get right back to you.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/Forefront iX 
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • DirectAccess Application Compatibility by Jason Jones

    Jason Jones, one of our ace Forefront MVPs, has put together a great blog post on DirectAccess application compatibility.

    If you’re in the process of planning a UAG DirectAccess rollout, you might want to check out this list.

    Forefront UAG DirectAccess: Application Compatibility Table

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Heads Up on the New Test Lab Guides Blog

    imageJust wanted to give all you Edge Man Blog followers a heads-up on the new Test Lab Guides Blog.

    Test Lab Guides are definitely catching on internally at Microsoft and we are expecting a flood of them coming to you in the next few months. In addition, I’ve been hearing from a number of you that you want to create your own Test Lab Guide extensions for the TechNet wiki – rock on!

    My esteemed and accomplished colleague Joe Davies and I will maintain the Test Lab Guides blog and you can use it as a central place to hear news and views about Test Lab Guides.

    Remember, with Test Lab Guides, you Make Something of IT!

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess Force Tunneling - Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess Force Tunneling check out:

    http://go.microsoft.com/fwlink/?LinkId=205354

    ==================================================

    Introduction

    Forefront Unified Access Gateway (UAG) 2010 SP1 RC DirectAccess provides users with the experience of being seamlessly connected to their intranet any time they have Internet access. When DirectAccess is enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without the need for users to connect to a VPN. DirectAccess enables increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside of the office. Forefront UAG SP1 RC DirectAccess extends the benefits of Windows DirectAccess across your infrastructure by enhancing availability and scalability, as well as simplifying deployments and ongoing management. For more information, see Overview of Forefront UAG DirectAccess.

    IT professionals can benefit from UAG 2010 SP1 RC DirectAccess in many ways:

    · Improved Manageability of Remote Users. Without DirectAccess, IT professionals can only manage mobile computers when users connect to a VPN or physically enter the office. With DirectAccess, IT professionals can manage mobile computers by updating Group Policy settings and distributing software updates any time the mobile computer has Internet connectivity, even if the user is not logged on. This flexibility allows IT professionals to manage remote computers on a regular basis and ensures that mobile users stay up-to-date with security and system health policies.

    · Secure and Flexible Network Infrastructure. Taking advantage of technologies such as Internet Protocol version 6 (IPv6) and Internet Protocol security (IPsec), DirectAccess provides secure and flexible network infrastructure for enterprises. Below is a list of DirectAccess security and performance capabilities:

    Authentication. DirectAccess authenticates the computer, enabling the computer to connect to the intranet before the user logs on. DirectAccess can also authenticate the user and supports two-factor authentication using smart cards.

    Encryption. DirectAccess uses IPsec to provide encryption for communications across the Internet.

    Access to IPv4-only intranet resources. UAG SP1 RC DirectAccess extends the value of Windows DirectAccess with NAT64/DNS64, an IPv6/IPv4 protocol transition technology that enables DirectAccess client connectivity to IPv4-only resources on the intranet.

    · High availability and array configuration. UAG DirectAccess extends the value of Windows DirectAccess by adding integrated support for Network Load Balancing and array configuration, which work together to enable a highly available DirectAccess deployment.

    · IT Simplification and Cost Reduction. By default, DirectAccess separates intranet from Internet traffic, which reduces unnecessary traffic on the intranet by sending only traffic destined for the intranet through the DirectAccess server. Optionally, IT can configure DirectAccess clients to send all traffic through the DirectAccess server, which is referred to as Force Tunneling.

    The following figure shows a DirectAccess client on the Internet.

    clip_image002

    In this guide

    This paper contains instructions for configuring and demonstrating UAG SP1 RC DirectAccess using six server computers and two client computers. The starting point for this paper is a Test Lab based on the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. The resulting DirectAccess test lab simulates an intranet, the Internet, and a home network and demonstrates DirectAccess functionality in different Internet connection scenarios when DirectAccess Force Tunneling is enabled.

    Force tunneling is used when you want all traffic, both intranet and Internet, to go through the UAG DirectAccess server. The default setting for UAG DirectAccess is split tunneling. When Force Tunneling is enabled, all traffic must go through the DirectAccess tunnels. For a DirectAccess client to reach the Internet, the client must be configured to use a web proxy server, or to use the NAT64/DNS64 service on the UAG DirectAccess server to route connections to the Internet (sometimes referred to “bouncing” the connections off the UAG DirectAccess server to the Internet). This guide provides step by step instructions that allow you to demonstrate how to use both methods of Internet access for Force Tunneling enabled DirectAccess clients.

    clip_image003Important:

    These instructions are designed for configuring a Test Lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP address assignment and all other configuration parameters, is designed to work only on a separate Test Lab network. For more information on planning and deploying DirectAccess with Forefront UAG for your production network, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the Test Lab scenario

    In this test lab scenario, Forefront UAG DirectAccess is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG SP1 RC DirectAccess server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and Network Location Server.
    • One intranet member server running Windows Server 2003 SP2 Enterprise Edition (APP3), that is configured as a IPv4 only web and file server. This server is used to highlight the NAT64/DNS64 capabilities.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (TMG1), that is configured as a web proxy server for DirectAccess clients. Threat Management Gateway 2010 will be installed on TMG1 to provide web proxy services.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1), that is configured as an Internet DNS and DHCP server. INET1 will also be configured to provide Internet access to the live Internet.
    • One standalone client computer running Windows 7 (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing (ICS).
    • One roaming member client computer running Windows 7 Enterprise or Ultimate (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of four subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by NAT1.
    • The Internet subnet (131.107.0.0/24).
    • An intranet subnet named Corpnet (10.0.0.0/24) separated from the Internet subnet by the Forefront UAG DirectAccess server.
    • A “live” network connection that provides a path to your actual Internet gateway. INET1 will be connected to the Internet subnet and the “live” network connection so you can test actual Internet access when CLIENT1 is acting as a DirectAccess client.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image005

    This guide provides step by step instructions on how to build a test lab that will enable you to test the new UAG SP1 RC Force Tunneling configuration feature. Force Tunneling forces DirectAccess clients to always use the DirectAccess tunnels for any kind of communication, including both intranet and Internet communications. When you configure DirectAccess clients to use Force Tunneling, you can enable one of two methods of Internet access for the DirectAccess client.

    These methods include:

    · Web proxy – You can configure the force tunneling DirectAccess clients on the Internet to use a web proxy on your intranet to gain Internet access. When using the web proxy option, the DirectAccess clients are limited to using web proxy supported protocols when connecting to Internet resources, which typically are HTTP and HTTPS.

    · UAG NAT64/DNS64 – If you need your force tunneling DirectAccess clients to access Internet using protocols other than those supported by a web proxy, and you configure them to use the UAG server’s NAT64/DNS64 service to route the connections through the UAG server to the Internet. You can put a web proxy or other web content filtering device in front of the UAG DirectAccess server if you want to control site access and perform malware filtering.

    Note that the default configuration for DirectAccess clients is split tunneling. When split tunneling is enabled, connections to the intranet are forwarded through the DirectAccess IPsec tunnels and connections to the Internet are made through the client’s existing Internet connection. Force Tunneling represents a departure from the default configuration.

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Six computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; three of these computers have two network adapters installed (UAG1, TMG1, INET1.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed (NAT1).
    • The product disc or a downloaded (.iso) version of Microsoft Forefront Unified Access Gateway (UAG) SP1 RC.
    • The product disc or downloaded (.iso) version of Microsoft Forefront Threat Management Gateway 2010 Standard Edition.

    Steps for configuring the test lab

    The following steps describe how to configure the server and client computers, and configure the Forefront UAG DirectAccess server, in a test lab. Following these configurations you can verify DirectAccess connectivity from the Internet and Homenet subnets, and show how Force Tunneling DirectAccess clients connect to the Internet using both Internet access models (web proxy and NAT64/DNS64).

    clip_image006Note:

    You must be logged on as a member of the Domain Admins group or as a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group.

    · Step 1: Complete the UAG SP1 RC DirectAccess Test Lab Guide. The UAG SP1 RC Test Lab Guide provides step by step instructions on how to create a working DirectAccess solution. The steps in this Test Lab Guide build on the steps in the UAG SP1 RC Test Lab Guide.

    · Step 2: Configure INET1 for Internet Access. INET1 is currently configured with a single network adapter that is connected to the Internet subnet. In this step you will add a second network adapter and connect that adapter to a “live” network that provides a path to the actual Internet. You will then install and configure RRAS on INET1 so that it can act as a NAT router for live Internet connections from UAG1 and TMG1.

    · Step 3: Install and Configure TMG1. When force tunneling is enabled for DirectAccess clients, you can provide DirectAccess clients access to the Internet through a web proxy server. In this step you will install the operating system on TMG1 and then install Forefront Threat Management Gateway 2010 on TMG1 so that TMG1 can provide web proxy services to CLIENT1.

    · Step 4: Configure the Default Gateway on UAG1 and DC1. UAG1 requires a path to the Internet. In this step you will configure UAG1 to use INET1 as its default gateway to provide that path. DC1 requires a path to the Internet to provide Internet name resolution. In this step you will configure DC1 to use TMG1 as its default gateway to provide that path.

    · Step 5: Configure UAG1 for Force Tunneling and Web Proxy Access to the Internet. In this step you will configure UAG1 to require DirectAccess client Force Tunneling and enable Internet access for DirectAccess clients through the TMG web proxy on TMG1.

    · Step 6: Update CLIENT1 and Test Proxy Access to the Internet. In this step you will update the Group Policy configuration on CLIENT1 and test its ability to reach the Internet through the web proxy on TMG1.

    · Step 7: Configure UAG1 for Force Tunneling and NAT64/DNS64 Internet Access. In this step you will configure UAG1 to require DirectAccess client Force Tunneling and enable Internet access for DirectAccess clients through UAG1 by taking advantage of the UAG NAT64/DNS64 feature.

    · Step 8: Update CLIENT1 and Test NAT64/DNS64 Access to the Internet. In this step you will update the Group Policy configuration on CLIENT1 and test its ability to reach the Internet through the NAT64/DNS64 service on UAG1.

    · Step 9: Snapshot the Configuration – At the completion of the lab, snapshot the configuration so that you can later return to a working UAG DirectAccess Test Lab.

    clip_image007Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step within the same section.

    STEP 1: Complete the UAG SP1 RC DirectAccess Test Lab Guide

    This Test Lab Guide uses the UAG SP1 RC DirectAccess Test Lab Guide as a starting place. Please complete the steps in Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess before proceeding with the remainder of the steps in this guide. If you have already completed the steps in the UAG SP1 RC DirectAccess Test Lab Guide and have saved a disk image or a virtual machine snapshot of the working DirectAccess configuration, then you can restore the configuration and proceed to the next step.

    STEP 2: Configure INET1 for Internet Access

    In order to demonstrate a Force Tunneling DirectAccess client’s ability to access the Internet, you need a gateway to the live Internet. The Corpnet subnet, the Internet subnet, and the Homenet subnets you created when you completed the Base Configuration are isolated from the live network. In order to provide actual Internet access for CLIENT1 when acting as a DirectAccess client, you need to provide an Internet gateway that UAG1 and TMG1 can use to reach the Internet. INET1 will be this Internet gateway.

    You will perform the following operations to configure INET1:

    A. Add and Configure a Second Network Adapter on INET1. INET1 is currently connected to the Internet subnet. The first step is to add a second network adapter to INET1 and connect that adapter to a “live” network that provides access to the Internet.

    B. Install the Routing and Remote Access Service. In this step you will install the Routing and Remote Access Service on INET1 so that it can provide NAT-based access to the Internet for UAG1 and TMG1.

    C. Configure INET1 as a NAT server. In this step you will configure the Routing and Remote Access service so that INET1 can act as a NAT server.

    A. Add and Configure a Second Network Adapter on INET1

    The first step is to install a second network adapter on INET1. This adapter must be connected to your live network and be assigned IP addressing information that enables it to reach the Internet through your existing Internet gateway. If your live network is configured to provide addressing information through DHCP, you can configure this second network adapter to use DHCP. If your network doesn’t provide IP addressing information that would enable Internet access automatically, then you will need to manually configure the IP addressing information on the second adapter to provide INET1 Internet access. In both cases, make sure that the IP addressing information provided includes a DNS server that can resolve Internet host names so that you can test Internet connectivity from INET1.

    After the second adapter is installed and configured, test Internet connectivity on INET1. To test Internet connectivity, open a command prompt on INET1 and enter ping www.arin.net and press ENTER. You should receive four responses to your ping request. You can then close the command prompt window.

    B. Install the Routing and Remote Access Services on INET1

    Now that you have installed the second network adapter on INET1, you are ready to install the Routing and Remote Access service. Perform the following steps to install the Routing and Remote Access Service on INET1:

    1. Log on to the INET1 computer or virtual machine as Administrator. Open Server Manager if it does not open automatically. In Server Manager, in the left pane of the console, click Roles. In the right pane of the console, click Add Roles.
    2. On the Before You Begin page, click Next.
    3. On the Select Server Roles page, select Network Policy and Access Services and then click Next.
    4. On the Network Policy and Access Services page, click Next.
    5. On the Role Services page, select Routing and Remote Access Services and then click Next.
    6. On the Confirmation page, click Install.
    7. On the Results page, click Close.
    C. Configure INET1 as a NAT Server

    You are now ready to configure INET1 as a NAT server. Perform the following steps to configure INET1 as a NAT server:

    1. At INET1, click Start, point to Administrative Tools and click Routing and Remote Access.
    2. In the left pane of the Routing and Remote Access console, right click on INET1 and click Configure and Enable Routing and Remote Access.
    3. On the Welcome to the Routing and Remote Access Server Setup Wizard page, click Next.
    4. On the Configuration page, select the Network address translation (NAT) option and click Next.
    5. On the NAT Internet Connection page, confirm that the Use this public interface to connect to the Internet is selected. From the Network Interfaces list, select the adapter that represents the interface connected to the live network. Click Next.
    6. On the Completing the Routing and Remote Access Server Setup Wizard, click Finish.
    7. Close the Routing and Remote Access console.

    STEP 3: Install and Configure TMG1

    When Force Tunneling is enabled for DirectAccess clients, they cannot access the Internet the Internet directly as split tunneling is disabled. There are two methods available that provide DirectAccess clients Internet access when Force Tunneling is enabled: Internet access through a web proxy device, or Internet access through the UAG DirectAccess server’s NAT64/DNS64 service. When Internet access is enabled through a web proxy, only HTTP and HTTPS Internet access is enabled.

    In this step you will perform the following procedures:

    A. Install the Operating System on TMG1. TMG1 is a new computer that is in first introduced in this Test Lab Guide. There you need to start by installing the operating system on the TMG1 computer or virtual machine. TMG1 must have two network adapters installed prior to installing the operating system.

    B. Configure TCP/IP Properties on TMG1. After installation of the operating system is complete, the next step is to configure the IP addressing settings on the internal and external interfaces of TMG1.

    C. Rename TMG1 and Join TMG1 to the CORP Domain. As a security best practice, the TMG firewall should be configured as a domain member. In this step you will rename the computer or virtual machine to TMG1 and join it to the CORP domain.

    D. Install Forefront Threat Management Gateway (TMG) 2010 Standard Edition. After the operating system is installed and IP addressing is assigned, and the machine renamed and joined to the domain, the next step is to install the Threat Management Gateway 2010 software.

    E. Configure the TMG Firewall for Internet Access. By default, the TMG firewall does not allow traffic to pass through it. In this step you will configure the TMG firewall to allow Internet traffic outbound.

    A. Install the Operating System on TMG1

    Perform the following steps to install the operating system on the TMG1 computer or virtual machine:

    1. Start the installation of Windows Server 2008 R2.
    2. Follow the instructions to complete the installation, specifying Windows Server 2008 R2 Enterprise Edition (full installation) and a strong password for the local Administrator account. Log on using the local Administrator account.
    3. Connect TMG1 to a network that has Internet access and run Windows Update to install the latest updates for Windows Server 2008 R2.
    4. After the updates installation is complete, connect one network adapter to the Corpnet subnet and the other to the Internet subnet.
    B. Configure TCP/IP Properties on TMG1

    Perform the following steps to configure the TCP/IP Properties on the adapters installed on TMG1:

    1. Log on to the TMG1 computer or virtual machine as Administrator. At the TMG1 computer or virtual machine, in Initial Configuration Tasks, click Configure networking.
    2. In Network Connections, right click the network connection that is connected to the Corpnet subnet, and then click Rename.
    3. Enter Corpnet and then press ENTER.
    4. Right click the Corpnet interface and click Properties.
    5. Click Internet Protocol Version 4 (TCP/IPv4) and then click Properties.
    6. Select Use the following IP address. In IP address, enter 10.0.0.10. In Subnet mask, enter 255.255.255.0.
    7. Select Use the following DNS server addresses. In the Preferred DNS server, enter 10.0.0.1.
    8. Click the Advanced button and then click the DNS tab.
    9. In DNS suffix for this connection, enter corp.contoso.com and click OK twice, and then click Close.
    10. In the Network Connections window, right click the network connection that is connected to the Internet subnet and click Rename.
    11. Enter Internet and press ENTER.
    12. Right click Internet and click Properties.
    13. Click Internet Protocol Version 4 (TCP/IPv4) and click Properties.
    14. Confirm that obtain an IP address automatically is selected. Then select the use the following DNS server addresses option. In the Preferred DNS server text box, enter 10.0.0.1. Click OK and then click Close.
    15. Close the Network Connections window.
    C. Rename TMG1 and Join TMG1 to the CORP Domain

    Perform the following steps to rename the TMG1 computer or virtual machine and join it to the CORP domain:

    1. At the TMG1 computer or virtual machine, in the Initial Configuration Tasks window, click Provide computer name and domain.
    2. In the System Properties dialog box, on the Computer Name tab, click the Change button.
    3. In the Computer Name/Domain Change dialog box, in the Computer name text box, enter TMG1. In the Member of frame, select the Domain option and enter corp.contoso.com in the text box. Click OK.
    4. In the Windows Security dialog box, enter User1 in the User name text box, and then enter User1’s password in the Password text box. Click OK.
    5. In the Computer Name/Domain Changes dialog box that welcomes you to the corp.contoso.com domain, click OK.
    6. In the Computer Name/Domain Changes dialog box that informs you that you must restart your computer, click OK.
    7. In the System Properties dialog box, click Close.
    8. In the Microsoft Windows dialog box, click Restart Now.
    9. Log on as CORP\User1.
    D. Install Forefront Threat Management Gateway (TMG) 2010 Standard Edition

    TMG1 will act as a web proxy server to support Internet access for Force Tunneling enabled DirectAccess clients. Perform the following steps to install Threat Management Gateway (TMG) 2010, which will provide web proxy services to CLIENT1:

    1. At the TMG1 computer or virtual machine, insert the Threat Management Gateway 2010 Standard Edition DVD into the DVD tray or mount the .iso file into the virtual machine’s virtual DVD drive.
    2. In the AutoPlay dialog box, click Run Splash.hta.
    3. On the Forefront Threat Management Gateway 2010 Standard splash page, click Run Preparation Tool. Click Yes in the User Account Control dialog box.
    4. On the Welcome to the Preparation Tool for Microsoft Forefront Threat Management Gateway (TMG) page, click Next.
    5. On the License Agreement page, put a checkmark in the I accept the terms of the License Agreements checkbox and click Next.
    6. On the Installation Type page, select the Forefront TMG services and Management option and click Next.
    7. On the Preparation Complete page, confirm that there is a checkmark in the Launch Forefront TMG Installation Wizard checkbox and click Finish. In the User Account Control dialog box, click Yes.
    8. On the Welcome to the Installation Wizard for Forefront TMG Standard page, click Next.
    9. On the License Agreement page, select I accept the terms in the license agreement option and click Next.
    10. On the Customer Information page, click Next.
    11. On the Installation Path page, click Next.
    12. On the Define Internal Network page, click Add. In the Addresses dialog box, click Add Adapter. In the Select Network Adapters dialog box, put a checkmark in the Corpnet checkbox and then click OK. In the Addresses dialog box, click OK.
    13. On the Define Internal Network page, confirm that in the Internal Network Address Ranges (from-to) section that says 10.0.0.0-10.0.0.255. Click Next.
    14. On the Services Warning page, click Next.
    15. On the Ready to Install the Program page, click Install.
    16. On the Installation Wizard Completed page, put a checkmark in the Launch Forefront TMG Management when the wizard closes checkbox and click Finish.
    17. Internet Explorer opens to display the Protect the Forefront TMG Computer page. On the Welcome to Internet Explorer 8 page, click Next. On the Turn on Suggested Sites page, select No, don’t turn on and click Next. On the Choose your settings page, select use express settings and click Finish. Close the Internet Explorer Window.
    E. Configure the TMG Firewall for Internet Access

    By default, the TMG firewall does not pass any traffic. In this step you will configure the TMG firewall with important initial configuration settings and then create a firewall rule that allows outbound traffic. Perform the following steps to configure the firewall and create the firewall rule:

    1. In the Getting Started Wizard dialog box, click Configure network settings.
    2. On the Welcome to the Network Setup Wizard page, click Next.
    3. On the Network Template Selection page, confirm that Edge firewall is selected and click Next.
    4. On the Local Area Network (LAN) Settings page, from the Network adapter connected to the LAN drop down list, select Corpnet. Click Next.
    5. On the Internet Settings page, confirm that Internet appears in the Network adapter connected to the Internet drop down list. Click Next.
    6. On the Completing the Network Setup Wizard page, click Finish.
    7. In the Getting Started Wizard dialog box, click Configure System Settings.
    8. On the Welcome to the System Configuration Wizard page, click Next.
    9. On the Host Identification page, click Next.
    10. On the Completing the System Configuration Wizard page, click Finish.
    11. In the Getting Started Wizard dialog box, click Define deployment options.
    12. On the Welcome to the Deployment Wizard page, click Next.
    13. On the Microsoft Update Setup page, select Use the Microsoft Update service to check for updates (recommended) option and click Next.
    14. On the Forefront TMG Protection Features Settings page, click Next.
    15. On the NIS Signature Update Settings page, click Next.
    16. On the Customer Feedback page, click Next.
    17. On the Microsoft Telemetry Reporting Service page, select Advanced and click Next.
    18. On the Completing the Deployment Wizard page, click Finish. Note: if the wizard appears to hang up and does not respond after several minutes, close the wizard. This will also close the TMG console. Restart the wizard by opening the TMG console again from the Start menu. You will see the Getting Started Wizard dialog box again. Click Define deployment options and run through the wizard again. When you complete the wizard, it will take you to the Getting Started Wizard dialog box again, and there will be a green checkmark to the left of each of the steps. Remove the checkmark from the Run the Web Access checkbox and click Close.
    19. In the left pane of the Forefront TMG console, expand Forefront TMG (TMG1) and then click Firewall Policy.
    20. In the right pane of the console, click the Tasks tab. On the Tasks tab, click Create Access Rule.
    21. On the Welcome to the New Access Rule Wizard page, in the Access rule name text box, enter All Open. Click Next.
    22. On the Rule Action page, select Allow and click Next.
    23. On the Protocols page, from the This rule applies to drop down list, select All outbound traffic. Click Next.
    24. On the Malware Inspection page, select Enable malware inspection for this rule and click Next.
    25. On the Access Rule Sources page, click Add. In the Add Network Entities dialog box, click Networks, then double click Internal. Click Close. Click Next.
    26. On the Access Rule Destinations page, click Add. In the Add Network Entities dialog box, click Networks, then double click External. Click Close. Click Next.
    27. On the User Sets page, click Next.
    28. On the Completing the New Access Rule Wizard page, click Finish.
    29. In the middle pane of the console, click the Apply button.
    30. In the Configuration Change Description dialog box, click Apply.
    31. In the Saving Configuration Changes dialog box, click OK.

    STEP 4: Configure the Default Gateway on UAG1 and DC1

    When DirectAccess clients are configured for Internet access using the UAG NAT64/DNS64 services, the UAG server must be able to forward the connections to the Internet. This requires that UAG1 be configured with a default gateway that provides a route to the Internet. The default gateway for UAG1 is the Internet subnet interface on INET1. DC1 needs a gateway to the Internet in order to resolve Internet host names for the UAG server’s DNS64 service and for the web proxy service on TMG1. DC1 will use TMG1 as its gateway to the Internet.

    The following operations are performed to configure UAG1 and DC1:

    A. Configure the Default Gateway on UAG1. In this step you will configure UAG1 to use the Internet subnet interface on INET1 as its default gateway.

    B. Configure the Default Gateway on DC1. In this step you will configure DC1 to use the Corpnet subnet interface on TMG1 as its default gateway.

    A. Configure the Default Gateway on UAG1

    Perform the following steps to configure the default gateway on UAG1:

    1. At the UAG1 computer or virtual machine, click Start and enter View network connections in the Search box and press ENTER.
    2. In the Network Connections window, right click on Internet and click Properties.
    3. In the Internet Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4) and click Properties.
    4. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, in the Default gateway text box, enter 131.107.0.1. Click OK, then click Close.
    5. Close the Network Connections window.
    B. Configure the Default Gateway on DC1

    Perform the following steps to configure the default gateway on DC1:

    1. Log on to the DC1 computer or virtual machine as User1. Click Start and enter View network connections in the Search box and press ENTER.
    2. In the Network Connections window, right click on Local Area Connection and click Properties.
    3. In the Internet Properties dialog box, click Internet Protocol Version 4 (TCP/IPv4) and click Properties.
    4. In the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, in the Default gateway text box, enter 10.0.0.10. Click OK, then click Close.
    5. Close the Network Connections window.
    6. Open a command prompt window. In the command prompt window, enter nslookup www.microsoft.com and press ENTER. You should see the IP addresses that resolve to this name, as well as several aliases. If the request times out, repeat the nslookup command. Close the command prompt window.
    7. *Move to the UAG1 computer or virtual machine. Open a command prompt and enter nslookup www.microsoft.com and press ENTER. You should see the IP address and name that resolves to this name, as well as several aliases. Note that the record is returned as non-authoritative, since it was retrieved from the DNS cache on DC1. Close the command prompt window.

    STEP 5: Configure UAG1 for Force Tunneling and Web Proxy Access to the Internet

    When DirectAccess clients are configured to use Force Tunneling, they are not able to reach the Internet except through the DirectAccess tunnel. There are two methods available for providing the Force Tunneling DirectAccess client access to the Internet: web proxy and NAT64/DNS64. In this step you will configure Force Tunneling on the UAG DirectAccess server so that Internet access is provided by the web proxy on TMG1. Perform the following steps to configure Force Tunneling and web proxy Internet access:

    1. At the UAG1 computer or virtual machine, click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management. Click OK in the User Account Control dialog box.
    2. In the left pane of the Microsoft Forefront Unified Access Gateway Management console, click DirectAccess.
    3. In the right pane of the console, In the Step 2 DirectAccess Server section, click the Force Tunneling link.
    4. In the Force Tunneling Configuration wizard, on the Connectivity Method page, select Use force tunneling. Send Internet requests from DirectAccess clients through the UAG DirectAccess server. Click Next.
    5. On the Force Tunneling page, select Route requests directly to a corporate Web Proxy server. In the Server name text box, enter TMG1.corp.contoso.com. In the Port text box, enter 8080. Click the Validate Connectivity button. You should see a green checkmark and Validation successful. Click Finish.
    6. Click the Apply Policy button at the bottom of the right pane.
    7. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now.
    8. In the DirectAccess Policy Configuration dialog box, click OK after you see Script run completed with no error or warnings.
    9. On the Forefront UAG DirectAccess Configuration Review page, click Close.
    10. Open an elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. Wait for the command to complete and then close the command prompt window.
    11. Click the Activate button at the bottom of the right pane.
    12. On the Activate Configuration page, click Activate.
    13. On the Activate Configuration page, click Finish.

    STEP 6: Update CLIENT1 and Test Proxy Access to the Internet

    In this step you will update the Group Policy settings on CLIENT1 so that it uses Force Tunneling when acting as a DirectAccess client. You will then move CLIENT1 to the Homenet subnet to test the force tunneling configuration. After CLIENT1 connects to the Internet, you will review the log file entries on TMG1 to prove that the Internet connection was make through the web proxy.

    The following operations configure CLIENT1:

    A. Update Group Policy on CLIENT1. CLIENT1 needs updated Group Policy to enable Force Tunneling. In this step you will update Group Policy on CLIENT1.

    B. Test Internet Access from CLIENT1 when Connected to Homenet. In this step you will move CLIENT1 to the Homenet subnet and test DirectAccess and Internet connectivity using Force Tunneling.

    C. View CLIENT1 Internet Activity in TMG1 Log Files. In this step you will review the log file on TMG1 to confirm that CLIENT1 accessed the Internet through the TMG1 web proxy.

    A. Update Group Policy on CLIENT1

    Perform the following steps to update Group Policy on CLIENT1:

    1. Connect CLIENT1 to the Corpnet subnet and log on to CLIENT1 as User1. At the CLIENT1 computer or virtual machine, open an elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. You will notice that User Policy will update correctly, but you will get an error that says machine policy cannot be updated. This is an expected error.
    2. In the command prompt window, enter netsh namespace show policy and press ENTER. You should see an entry Settings for . That section should have a line for DirectAccess (Proxy Settings): TMG1.corp.contoso.com:8080. This demonstrates that the new Group Policy settings were applied to CLIENT1. This entry tells CLIENT1 to connect to all sites over the DirectAccess tunnel using the proxy, with the exception of the other entries in the NRPT.
    3. Close the command prompt window.
    B. Test Internet Access from CLIENT1 when Connected to Homenet

    In this step, you will connect CLIENT1 to the Homenet subnet and test Internet access across the DirectAccess tunnel through the web proxy on TMG1. Perform the following steps to test Internet access from the CLIENT1 DirectAccess client:

    1. Move CLIENT1 from the Corpnet subnet to the Homenet subnet. Open an elevated command prompt. In the command prompt window enter ipconfig /all. You should see an entry for Tunnel adapter iphttpsinterface and an IPv6 address associated with that interface. CLIENT1 does not use Teredo because Force Tunneling requires the DirectAccess client to use IP-HTTPS.
    2. In the command prompt window, enter netsh interface httpstunnel show interfaces and press ENTER. You should see that the Interface Status is IPHTTPS interface active.
    3. In the command prompt window, enter ping app1 and press ENTER. You should see four responses from APP1.
    4. In the command prompt window, enter net view \\APP1 and press ENTER. You should see a list of shares. This indicates that User1 was able to authenticate with the UAG DirectAccess server and user Kerberos authentication.
    5. In the command prompt window, enter ping www.microsoft.com. You will receive an error that the host could not be found. The reason for this is that CLIENT1 only has access to the web proxy for names outside of the corp.contoso.com domain. The web proxy resolves names on behalf of the client, which enables the client to connect to web sites through the web proxy. Close the command prompt window.
    6. Open Internet Explorer. In the address bar, enter www.microsoft.com and press ENTER. You should see the home page on the www.microsoft.com web site. Click several links on the page. Try to visit other web sites you are interested in. You should be able to connect to all web sites. Close the Internet Explorer window.
    C. View CLIENT1 Internet Activity in TMG1 Log Files

    To demonstrate that the web connections were made over the web proxy on TMG1, we will look at the log file on the TMG1 computer or virtual machine. Perform the following steps to view the log file:

    1. *Move to the TMG1 computer or virtual machine. Click Start and click All Programs. Click Microsoft Forefront TMG and click Forefront TMG Management. In the User Account Control dialog box, click Yes.
    2. In the Forefront TMG console, in the left pane, click the Logs & Reports node. In the right pane of the console, click the Tasks tab. Click the Edit Filter link.
    3. In the Edit Filter dialog box, click the Log Time entry. In the Condition drop down list, select Last Hour. Click the Update button.
    4. From the Filter by drop down list, select Client IP. From the Condition drop down list, select Equals. In the Value text box, enter 10.0.0.2. When DirectAccess clients connect to an IPv4 proxy like TMG, NAT64/DNS64 on the UAG DirectAccess server is used, and all connections from the DirectAccess clients will appear to source from the internal IPv4 address on the UAG DirectAccess server. Click Add To List. Click Start Query.
    5. In the lower left side of the TMG console, wait until it says (Query is done). After the query is done, look in the Destination IP column and click on lines that include a public IP address. After clicking on one of those lines, look in the lower pane that contains details of the connection. On the Request line you will see the URL that CLIENT1 connected to over the TMG web proxy service. This demonstrates that CLIENT1 used the TMG web proxy to reach the Internet and did not connect directly to any Internet resources because when Force Tunneling is enabled, split tunnel is disabled. Click on several of these lines to see various URLs that have been visited.
    6. Close the Forefront TMG console.

    STEP 7: Configure UAG1 for Force Tunneling and NAT64/DNS64 Internet Access

    The second method DirectAccess clients configured for Force Tunneling can use to access the Internet is by using the NAT64/DNS64 service. When you use the UAG NAT64/DNS64 service, the connection is routed to the Internet by the UAG DirectAccess server. Perform the following steps to configure Force Tunneling to enable DirectAccess client access to the Internet through the NAT64/DNS64 services:

    1. *Go to the UAG1 computer or virtual machine. Confirm that the UAG console is open. If it is not open, open the UAG console from the Start menu. Click on the DirectAccess node in the left pane of the console.
    2. In the Step 2 DirectAccess Server section in the right pane, click Force Tunnel (On).
    3. In the Force Tunneling Configuration wizard, on the Connectivity Method page, confirm that the Use force tunneling. Send Internet requests from DirectAccess clients through the UAG DirectAccess server option is selected. Click Next.
    4. On the Force Tunneling page, select Resolve and route requests using UAG DirectAccess DNS64 and NAT64. Click Validate Connectivity. You should see a green checkmark with the text Validation successful next to it. Click Finish.
    5. At the bottom of the right pane of the console, click Apply Policy.
    6. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now.
    7. In the DirectAccess Policy Configuration dialog box, click OK after you see Script run completed with no errors or warnings.
    8. On the Forefront UAG DirectAccess Configuration Review page, click Close.
    9. Open and elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. Wait for the command to complete and then close the command prompt window.
    10. At the bottom of the right pane of the console, click Activate.
    11. In the Activate Configuration dialog box, click Next.
    12. Click Finish in the Activate Configuration dialog box.

    STEP 8: Update CLIENT1 and Test NAT64/DNS64 Access to the Internet

    In this step you will update the Group Policy settings on CLIENT1 so that it uses Force Tunneling when acting as a DirectAccess client. After CLIENT1 connects to the Internet, you will review the log file entries on TMG1 to prove that the Internet connection was make through the web proxy.

    The following operations configure CLIENT1:

    A. Update Group Policy on CLIENT1. CLIENT1 is currently connected to the Homenet subnet. You will update Group Policy over the DirectAccess connection.

    B. Test Internet Access from CLIENT1 when Connected to Homenet. In this step you will test Internet access from CLIENT1 through the UAG NAT64/DNS64 services.

    C. View CLIENT1 Internet Activity in UAG1 TMG Log Files. In this step you will view the TMG log files on UAG1 to demonstrate that Internet connectivity is provided through UAG1.

    D. Update Group Policy on CLIENT1

    Perform the following steps to update Group Policy on CLIENT1:

    1. While still located on the Homenet subnet, at the CLIENT1 computer or virtual machine, open an elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. You will notice that User Policy will update correctly, but you will get an error that says machine policy cannot be updated. This is an expected error.
    2. In the command prompt window, enter netsh namespace show policy and press ENTER. You should see an entry Settings for . That section should have a line for DirectAccess (Proxy Settings): Bypass Proxy. This demonstrates that the new Group Policy settings were applied to CLIENT1. This entry tells CLIENT1 to connect to all sites over the DirectAccess tunnel using the UAG DirectAccess server.
    3. Close the command prompt window.
    E. Test Internet Access from CLIENT1 when Connected to Homenet

    Perform the following steps to test Internet access from CLIENT1 to the Internet:

    1. Move CLIENT1 from the Corpnet subnet to the Homenet subnet. Open an elevated command prompt. In the command prompt window enter ipconfig /all. You should see an entry for Tunnel adapter iphttpsinterface and an IPv6 address associated with that interface. CLIENT1 does not use Teredo because Force Tunneling requires the DirectAccess client to use IP-HTTPS.
    2. In the command prompt window, enter netsh interface httpstunnel show interfaces and press ENTER. You should see that the Interface Status is IPHTTPS interface active.
    3. In the command prompt window, enter ping app1 and press ENTER. You should see four responses from APP1.
    4. In the command prompt window, enter net view \\APP1 and press ENTER. You should see a list of shares. This indicates that User1 was able to authenticate with the UAG DirectAccess server and user Kerberos authentication because connections to APP1 must be made through the intranet tunnel.
    5. In the command prompt window, enter ping www.microsoft.com and press ENTER. You will see that the UAG DirectAccess server resolves the name for the client by generating a false IPv6 address, but the ping attempts fail because www.microsoft.com servers do not allow ping requests. In the command prompt window, enter ping www.facebook.com and press ENTER. You should see four responses from an IPv6 address. Note that this is not the actual IPv6 address of the site; it is the IPv6 address generated by the NAT64 service on the UAG DirectAccess server. Close the command prompt window.
    6. Open Internet Explorer. In the address bar, enter www.microsoft.com and press ENTER. You should see the home page on the www.microsoft.com web site. Click several links on the page. Try to visit other web sites you are interested in. You should be able to connect to all web sites. Close Internet Explorer.
    F. View CLIENT1 Internet Activity in UAG TMG Log Files

    Perform the following steps to view the TMG log file on the UAG1 machine:

    1. *Move to the UAG1 computer or virtual machine. Click Start and click All Programs. Click Microsoft Forefront TMG and click Forefront TMG Management. In the User Account Control dialog box, click Yes.
    2. In the Forefront TMG console, in the left pane, click the Logs & Reports node. In the right pane of the console, click the Tasks tab. Click the Edit Filter link.
    3. In the Edit Filter dialog box, click the Log Time entry. In the Condition drop down list, select Last Hour. Click the Update button.
    4. From the Filter by drop down list, select Rule. From the Condition drop down list, select Equals. In the Value drop down list, select DirectAccess Allow NATPT. Click Add To List. Click Start Query.
    5. In the lower left side of the TMG console, wait until it says (Query is done). After the query is done, scroll through the list of entries. In the Protocol column you’ll see the protocols you used to access the Internet sites. In the Client IP column, you’ll see the IP-HTTPS IPv6 address assigned to the CLIENT1. You will some entries in the Protocol column for BranchCache – Retrieval Protocol. These entries actually represent the HTTP connections CLIENT1 made through the UAG1 NAT64/DNS64 services.
    1. Close the Forefront TMG console

    STEP 9: Snapshot the Configuration

    This completes the DirectAccess test lab. To save this configuration so that you can quickly return to a working DirectAccess configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.
    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC FT. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For procedures to configure the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess on which this document is based, see the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information about troubleshooting DirectAccess in a Test Lab, see the Test Lab Guide: Troubleshoot UAG DirectAccess.

    For a comprehensive list of UAG DirectAccess Test Lab Guides, see the TechNet wiki Test Lab Guide clearinghouse at Test Lab Guides.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ==================================================

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide - Demonstrate Forefront UAG SP1 RC DirectAccess Force Tunneling Now Available

    I’m happy to announce the release of the latest UAG DirectAccess Test Lab Guide – Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess Force Tunneling, which you can download now at http://go.microsoft.com/fwlink/?LinkId=205454

    image

    I found this Test Guide to be especially interesting to put together. If you haven’t heard of Force Tunneling – here’s a little background.

    By default, when you configure DirectAccess clients (both Windows DirectAccess and UAG DirectAccess), connections to the intranet are sent through the DirectAccess IPsec tunnels. Connections to Internet resources are sent directly to the Internet servers. This means there are two active paths: one path (the DirectAccess IPsec tunnels) carries traffic to and from the intranet, and a second path, for everything else (including Internet access). If this seems familiar to you, then you’re probably right – this configuration is sometimes referred to as “split tunneling”.

    Now, split tunneling has a bit of a history behind it and like all issues that have a history, there are many people who might carry the historical baggage with them. Split tunneling had been considered in the past to be a potential security issue for remote access VPN client connections, and that’s where the idea of split tunneling got it’s checkered reputation. Because of this, many firms will not allow split tunneling. However, this attitude is slowly changing, as we’ve found that about half of enterprises now allow split tunneling for their remote access VPN client connections.

    For more information on split tunneling issues, check out my articles:

    Why Split Tunneling is not a Security Issue with DirectAccess
    http://blogs.technet.com/b/tomshinder/archive/2010/03/02/why-split-tunneling-is-not-a-security-issue-with-directaccess.aspx

    More on DirectAccess Split Tunneling and Force Tunneling
    http://blogs.technet.com/b/tomshinder/archive/2010/03/30/more-on-directaccess-split-tunneling-and-force-tunneling.aspx

    Although we don’t consider split tunneling to introduce security issues when compared to non-split tunneling configurations, many organizations still do. For that reason, we’ve made it possible to disable split tunneling for DirectAccess clients, using a configuration that we refer to as “Force Tunneling”. When Force Tunneling is enabled, all traffic is sent over the DirectAccess IPsec tunnels, so that both intranet bound and Internet bound traffic is sent over the DirectAccess tunnels. While this will exact a performance toll on the DirectAccess server, it does enable you to force all traffic over the DirectAccess connections.

    So what happens to the Internet bound traffic after it goes over the DirectAccess tunnels? UAG SP1 provides you two options:

    • DirectAccess clients can be configured to use a web proxy (which limits them to HTTP and HTTPS when connecting to the Internet)
    • DirectAccess clients can be configured to “bounce” Internet connections off the UAG DirectAccess server by taking advantage of the UAG NAT64/DNS64 service. This option enables the DirectAccess clients to use any protocol to connect to the Internet

    In the Test Lab Guide I go over both of these configuration options. When testing access through a web proxy, you’ll be using TMG 2010 as the web proxy provider.

    I hope you like this Test Lab Guide! Let me know if there’s anything that you think I should add to it, or if there are some other configuration options you’d like to have included to make it more comprehensive. If you have problems with this Test Lab Guide, or any other Test Lab Guide, let me know! Just write to the email address in my sig line and I’ll get right back to you.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide–Demonstrate UAG SP1 RC DirectAccess with NAP - Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess with NAP check out:

    http://go.microsoft.com/fwlink/?LinkId=205354

    ==================================================

    Introduction

    DirectAccess is a new feature in the Windows 7 and Windows Server 2008 R2 operating systems that gives users the experience of being seamlessly connected to their intranet any time they have Internet access. With DirectAccess enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without requiring users to connect to a VPN. DirectAccess provides increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside the office.

    Forefront Unified Access Gateway (UAG) SP1 RC extends the value of the Windows DirectAccess solution by adding features that meet the requirements of many enterprise deployments:

    • Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
    • Support for Network Load Balancing, which enables the UAG DirectAccess SP1 RC array to be highly available without requiring the use of an external hardware load balancer
    • Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.

    Network Access Protection (NAP), built into Windows Server 2008 R2 and Windows 7, enforces health requirements by monitoring and assessing the health of client computers when they attempt to connect or communicate on a network. Client computers that are not in compliance with system health requirements can be provided with restricted network access until their configuration is updated and brought into compliance.

    Combining DirectAccess with NAP allows you to verify that DirectAccess client computers meet your system health requirements before allowing access to the intranet.

    To learn more about UAG DirectAccess, see the following resources:

    · Forefront UAG DirectAccess Design Guide

    · Forefront UAG DirectAccess Deployment Guide

    To learn more about NAP, see the Network Access Protection Product Information Web site.

    UAG DirectAccess SP1 RC enables you to deploy DirectAccess and NAP in two different ways. You can deploy a NAP infrastructure on your intranet that can be used by all systems on your network where the NAP infrastructure components are installed on one or more servers on your intranet. This option was available prior to UAG DirectAccess SP1 RC. A new option available with UAG DirectAccess SP1 RC is the ability to host the NAP server (Network Policy Server) and the Health Registration Authority on the UAG servers themselves. This option is useful if you don’t already have an established NAP deployment and want to focus your NAP design on DirectAccess clients only. We will enable the new NAP option in this Test Lab Guide.

    In this guide

    This guide provides step-by-step instructions for configuring UAG DirectAccess SP1 RC with NAP in a test lab so that you can see how it works. You will set up and deploy UAG DirectAccess SP1 RC using five server computers, two client computers, Windows Server 2008 R2 Enterprise edition, and Windows 7 Ultimate Edition. The Test Lab simulates intranet, Internet, and a home networks, and demonstrates Forefront UAG DirectAccess with NAP. The starting point for this paper is the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess .

    clip_image001Important:

    These instructions are designed for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network. For more information on planning and deploying DirectAccess with Forefront UAG, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the test lab scenario

    In this test lab scenario, Forefront UAG DirectAccess SP1 RC is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG DirectAccess SP1 RC server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and network location server.
    • One intranet member server running Windows Server 2003 SP2 (APP3) that is configured as an IPv4 only web and file server. This server is used to highlight the UAG’s NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1) that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming domain member client computer running Windows 7 Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by NAT1.
    • The Internet subnet (131.107.0.0/24).
    • The Corpnet subnet (10.0.0.0/24) separated from the Internet by the Forefront UAG DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image003

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Five computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; two of these computers has two network adapters installed.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed (NAT1).
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG) SP1 RC.
    • Access to a live network where CLIENT1 can be temporarily attached to download Microsoft Security Essentials and update the antimalware signatures.

    This Test Lab Guide demonstrates UAG DirectAccess SP1 RC with NAP in full enforcement mode where the UAG DirectAccess SP1 RC server requires health certificates for authentication to access resources through the intranet tunnel. Noncompliant UAG DirectAccess SP1 RC clients cannot access the intranet and cannot use their computer certificate for authentication of the intranet tunnel.

    For more information about the different modes of NAP, see Stages of a NAP Deployment.

    clip_image004Important

    The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.

    Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess with NAP for your pilot or production DirectAccess deployment, use the information in Planning Forefront UAG DirectAccess with Network Access Protection (NAP) for your planning and design decisions and Forefront UAG DirectAccess Deployment Guide for the steps to configure the UAG DirectAccess server and supporting infrastructure servers.

    Steps for configuring the test lab

    The following sections describe how to configure UAG1, APP1 and CLIENT1 for UAG DirectAccess SP1 RC with NAP. After UAG1, APP1 and CLIENT1 are configured, this guide provides steps for demonstrating NAP functionality for CLIENT1 when it is connected to the Homenet subnet.

    clip_image005Note

    You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    The following procedures are performed to enable and allow you to test each of them:

    · Step 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide – The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    · STEP 2: Install the CA Server Role on APP1. In this step you will install a subordinate Certification Authority on APP1 so that it will be able to create health certificates for DirectAccess NAP clients.

    · STEP 3: Configure the Subordinate CA and CA Permissions on APP1. In this step you will configure the subordinate CA on APP1 so that it will automatically grant certificates when requested by the UAG1, which is configured as a Health Registration Authority. You will also configure permissions on the CA to enable UAG1 to issue and manage certificates, manage the CA and request certificates.

    · STEP 4: Configure UAG1 as an NPS Server and NAP health Registration Authority (HRA). In this step you will reconfigure the DirectAccess settings on UAG1 to support NAP policy enforcement for DirectAccess clients. After you complete this step, UAG1 will be configured as a Network Policy Server that provides NAP server functionality, as well as a Health Registration Server (HRA).

    · STEP 5: Verify NAP Configuration on CLIENT1. In this step you will confirm that CLIENT1 received the Group Policy settings required for NAP clients and confirm that CLIENT1 received a health certificate from UAG1.

    · STEP 6: Install Microsoft Security Essentials on CLIENT1. In this step you will connect CLIENT1 to a live portion or your network so that it can download and install Microsoft Security Essentials.

    · STEP 7: Confirm that CLIENT1 Passes NAP Evaluation. In this step you will move CLIENT1 to the Homenet subnet and confirm that CLIENT1 can pass NAP evaluation and access resources on the intranet through the intranet tunnel.

    · STEP 8: Confirm that CLIENT1 cannot access the Intranet Tunnel when NAP Non-Compliant. In this step you will confirm that when CLIENT1 does not meet health requirements it will not be able to connect to resources through the DirectAccess intranet tunnel.

    · Step 9: Snapshot the configuration. After completing the Test Lab, take a snapshot of the working UAG DirectAccess with NAP Test Lab so that you can return to it later to test additional scenarios.

    clip_image005[1]Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.

    STEP 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide

    The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. After completing the steps in that Test Lab Guide you will have the core infrastructure required to complete this Test Lab Guide on how to configure UAG DirectAccess with NAP. If you have already completed the steps in that Test Lab Guide and saved a snapshot or disk image of the Test Lab, you can restore the snapshot or image and begin with the next step.

    STEP 2: Install the CA Server Role on APP1

    In this step you will install a subordinate Certification Authority on APP1 so that it will be able to create health certificates requested by the Health Registration Authority (HRA) on UAG1 for DirectAccess NAP clients.

    1. *At the APP1 computer or virtual machine, in Server Manager, under Roles Summary, click Add Roles, and then click Next.
    2. On the Select Server Roles page, select the Active Directory Certificate Services check box, and click Next.
    3. On the Introduction to Active Directory Certificate Services page, click Next.
    4. On the Select Role Services page, verify that the Certification Authority check box is selected, and then click Next.
    5. On the Specify Setup Type page, click Standalone, and then click Next.
    6. On the Specify CA Type page, click Subordinate CA, and then click Next.
    7. On the Set Up Private Key page, click Create a new private key, and then click Next.
    8. On the Configure Cryptography for CA page, click Next.
    9. On the Configure CA Name page, under Common name for this CA, enter corp-APP1-SubCA, and then click Next.
    10. On the Request Certificate from a Parent CA page, choose Send a certificate request to a parent CA, and then click Browse.
    11. In the Select Certification Authority dialog box, click corp-DC1-CA, and then click OK.
    12. Verify that DC1.corp.contoso.com\corp-DC1-CA is displayed next to Parent CA, and then click Next.
    13. Click Next to accept the default database settings, and then click Install.
    14. Verify that all installations were successful, and then click Close

    STEP 3: Configure the Subordinate CA and CA Permissions on APP1

    In this step you will configure the subordinate CA on APP1 so that it will automatically grant certificates when requested by UAG1. You will also configure permissions on the CA to enable UAG1 to issue and manage certificates, manage the CA and request certificates.

    1. On the APP1 computer or virtual machine, click Start, type certsrv.msc, and then press ENTER.
    2. In the Certification Authority console tree, right-click corp-APP1-SubCA, and then click Properties.
    3. Click the Policy Module tab, and then click Properties.
    4. Choose Follow the settings in the certificate template, if applicable. Otherwise, automatically issue the certificate, and then click OK.
    5. When you are prompted that AD CS must be restarted, click OK twice.
    6. In the console tree, right-click corp-APP1-SubCA, point to All Tasks, and then click Stop Service.
    7. Right-click corp-APP1-SubCA, point to All Tasks, and then click Start Service

    8. In the console tree of the Certification Authority snap-in, right-click corp-APP1-SubCA, and then click Properties.

    9. Click the Security tab, and then click Add.

    10. Click Object Types, select Computers, and then click OK.

    11. Type DC1, and then click OK.

    12. Click DC1, select the Issue and Manage Certificates, Manage CA, and Request Certificates check boxes under Allow, and then click OK.

    13. Close the Certification Authority console

    STEP 4: Configure UAG1 as a NPS Server and NAP Health Registration Authority (HRA)

    In this step you will reconfigure the DirectAccess settings on UAG1 to support NAP policy enforcement for DirectAccess clients. After you complete this step, UAG1 will be configured as a Network Policy Server that provides NAP server functionality, as well as a Health Registration Server (HRA). In addition the Connection Security Rule on the UAG DirectAccess server that controls access to the intranet tunnel will require DirectAccess clients to present a health certificate to successfully authenticate.

    1. *At the UAG1 computer or virtual machine, click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management.
    2. In the User Account Control dialog box, click Yes.
    3. In the Microsoft forefront Unified Access Gateway Management console, click the DirectAccess node in the left pane.
    4. In the right pane of the console, in the Step 2 DirectAccess Server section, click the Network Access Protection link.
    5. This starts the Network Access Protection Configuration wizard. On the NAP Enforcement page, put a checkmark in the Use NAP to verify DirectAccess client computers are compliant with network health policies checkbox, and then select the Enforcement mode. Only compliant DirectAccess client can connect option. Click Next.
    6. On the HRA and NPS page, select the The NPS and HRA roles are installed on this UAG server (UAG configures settings automatically) option. Put a checkmark in the Use Autoremediation to automatically update non-compliant computers checkbox. In the Clients can link to this URL for troubleshooting compliance issues (optional) text box, enter http://www.contoso.com/troubleshooting.txt. Click Next.
    7. On the NAP Certification Authority page, click the Add button. In the Add a CA Server dialog box, click the Browse button. In the Select a CA server dialog box, click APP1.corp.contoso.com\corp-APP1-SubCA, and then click OK. In the Add a CA Server dialog box, click OK. Click Finish.
    8. In the right pane of the console, click Apply Policy.
    9. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now.
    10. In the DirectAccess Policy Configuration dialog box, click OK after you see it say Script run completed with no errors or warnings.
    11. On the Forefront UAG DirectAccess Configuration Review page, click Close.
    12. Open an elevated command prompt. In the Command Prompt window, enter gpupdate /force and press ENTER. Close the Command Prompt window after the command completes.
    13. In the right pane of the console, click Activate.
    14. In the Activate Configuration dialog box, click Activate. Click Finish when Activation completed successfully.

    STEP 5: Verify NAP Configuration on CLIENT1

    In this step you will confirm that CLIENT1 received the Group Policy settings required for NAP clients and confirm that CLIENT1 received a health certificate from DC1.

    1. *Connect CLIENT1 to the Corpnet subnet. Wait until the network icon in the notification area of the desktop displays a yellow caution sign.
    2. Click Start, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator. Click Yes at the User Account Control prompt.
    3. In the command prompt window, run the gpupdate /target:computer command.
    4. In the command prompt window, run the netsh nap client show grouppolicy command.
    5. In Enforcement clients, IPsec Relying Party should be set to Enabled.
    6. In Trusted server group configuration, URL should be set to https://uag1.contoso.com/domainhra/hcsrvext.dll.

    STEP 6: Install Microsoft Security Essentials on CLIENT1

    The UAG SP1 RC DirectAccess wizard has configured the SHV on the NAP server to use the default settings. One of these settings is to require that that a healthy client have an anti-virus application installed and that it is up to date. In this step you will connect CLIENT1 to a live portion or your network so that it can download and install Microsoft Security Essentials.

    1. Move CLIENT1 to a live portion of your network and assign CLIENT1 a valid IP address that enables it to access the Internet to download Microsoft Security Essentials.
    2. Open Internet Explorer and browse to https://www.microsoft.com/security_essentials. On the Security Essentials web site, click Download Now.
    3. Close Internet Explorer after the download is complete.
    4. Double click on the mssefullinstall-amd64fre-en-us-vista-win7 file that you downloaded.
    5. In the User Account Control dialog box, click Yes.
    6. On the Welcome to the Microsoft Security Essentials 1.0 Installation Wizard page, click Next.
    7. On the Microsoft Security Essentials License Agreement page, click I accept.
    8. On the ready to install Microsoft Security Essentials page, click Install.
    9. On the Completing the Microsoft Security Essentials Installation Wizard page, click Finish.
    10. In the Microsoft Security Essentials window, click the Update button.
    11. After the update is complete, close the Microsoft Security Essentials window.

    STEP 7: Confirm that CLIENT1 Passes NAP Evaluation

    In this step you will move CLIENT1 to a Homenet subnet and confirm that CLIENT1 can pass NAP evaluation and access resources on the intranet through the intranet tunnel.

    1. Move CLIENT1 to the Homenet subnet.
    2. Open an elevated command prompt. In the Command Prompt window, enter napstat and press ENTER. You will see a balloon that says Network Access Protection You have full network access. Close the Command Prompt window.
    3. Click Start, enter mmc in the Search box and press ENTER. In the User Account Control dialog box, click Yes.
    4. In the Console window, click File and click Add/Remove Snap-in.
    5. In the Add or Remove Snap-ins dialog box, click Certificates and click Add.
    6. In the Certificates dialog box, select Computer account and click Next.
    7. In the Select Computer dialog box, select Local computer and click Finish.
    8. In the Add or Remove Snap-ins dialog box, click OK.
    9. In the left pane of the console window, navigate to Certificates (Local Computer)\Personal\Certificates. In the middle pane of the console, notice that there is a certificate issued by corp-APP1-SubCA. Double click on that certificate.
    10. In the Certificate dialog box, on the General tab, note that in the This certificate is intended for the following purposes(s): section that one of the intended purposes is System Health Authentication. This indicates that CLIENT1 has passed NAP inspection and should now have access to the intranet tunnel.
    11. In the Certificate dialog box, click OK. Minimize the Console1 window.
    12. Click Start and in the Search box, enter \\app3\files and press ENTER.
    13. Double click on the Example file. You can now read the contents of that file. This confirms that you have access to the Corpnet subnet over the intranet tunnel, since APP1 is not a member of the infrastructure servers group. Close the Windows Explorer window that shows the contents of the Files share. Close the Notepad window.
    14. Click Start and then enter wf.msc in the Search box and press ENTER.
    15. In the middle pane of the console, note that the Private Profile is Active. DirectAccess clients will only establish their DirectAccess tunnels to the DirectAccess server when either the Public or Private Profiles are active.
    16. In the right pane of the console, click Properties. In the Windows Firewall with Advanced Security dialog box, click the down arrow next to Firewall state and click Off. Click OK. You will see two balloons appear in the system notification area. One will ask that you turn on the Windows Firewall and the second will inform you that network access may be limited. Note in the middle pane that it says Windows Firewall is off. Click Refresh in the right pane. NAP auto-remediation automatically enabled the Windows Firewall after it was turned off.
    17. In the left pane of the console, navigate to Windows Firewall with Advanced Security\Monitoring\Security Associations\Main Mode. Notice the Main Mode entry that has User (Kerberos V5) as the second authentication method. This indicates that the user was able to access the intranet tunnel since the intranet tunnel requires user authentication. In addition, when NAP is enabled for DirectAccess clients, the computer certificate used to authenticate the intranet tunnel is the Health Certificate, indicating that the computer was able to pass NAP inspection.
    18. Minimize the Windows Firewall with Advanced Security window.

    STEP 8: Confirm that CLIENT1 cannot access the Intranet Tunnel when NAP Non-Compliant

    In this step you will confirm that when CLIENT1 does not meet health requirements it will not be able to connect to resources through the DirectAccess intranet tunnel. In the test lab, DC1 is accessible through the infrastructure tunnel and APP1 is accessible through the intranet tunnel. When the UAG DirectAccess NAP client fails validation, it can only access resources available through the infrastructure tunnel.

    1. On CLIENT1, click Start and then in the Search box, enter services.msc and press ENTER.
    2. In the right pane of the Services console, double click on Microsoft Antimalware Service.
    3. In the Microsoft Antimalware Service Properties (Local Computer) dialog box, click the Stop button. Click OK and then minimize the Services console.
    4. Notice that a Network Access Protection Network access might be limited balloon appears. This indicates that CLIENT1 no longer passes NAP inspection. In the Microsoft Security Essentials dialog box, click the Close control button (the “x” in the upper right) to close the dialog box.
    5. Restore the console window that has the Certificates snap in installed. Right click the middle pane and click Refresh. Notice that the health certificate no longer appears. When the client does not pass NAP inspection, the certificate is removed from the machine’s computer store.
    6. Restore the Windows Firewall with Advanced Security console and click Refresh in the right pane of the console. Notice that the Main Mode security association using Kerberos V5 as the 2nd Authentication Method is no longer there. This indicates that the client is no longer able to establish the intranet tunnel because it cannot provide a health certificate for computer authentication.
    7. Click Start and enter \\app1\files in the Search box and press ENTER. After a few moments you will see a Network Error dialog box indicating that Windows cannot access the share. This is consistent with the fact that CLIENT1 needs access to the intranet tunnel to access APP1 and the fact that the intranet tunnel is not available because CLIENT1 current does not pass NAP inspection. Click Cancel in the Network Error dialog box.
    8. Click Start and enter \\dc1\files in the Search box and press ENTER. In this case the Files share is available. The reason for this is that access to servers in the infrastructure servers list is accessible over the infrastructure tunnel.
    9. Restore the Services console and right click Microsoft Antimalware Service and click Start.
    10. Click Start and enter \\app1\files in the Search box and press ENTER. You can now access APP1 over the intranet tunnel because CLIENT1 is able to pass NAP inspection.
    11. Close all open windows on CLIENT1 and do not save the changes to any of the mmc consoles.

    STEP 9: Snapshot the Configuration

    This completes the UAG SP1 RC DirectAccess with NAP test lab. To save this configuration so that you can quickly return to a working UAG SP1 RC DirectAccess with NAP configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.

    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC NAP. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For procedures to configure UAG SP1 RC DirectAccess on which this document is based, see the Test Lab Guide: Demonstrate Forefront UAG SP1 RC DirectAccess.

    For a comprehensive list of UAG DirectAccess Test Lab Guides, please see Test Lab Guides.

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information on troubleshooting UAG DirectAccess in a Test Lab, see Test Lab Guide: Troubleshooting UAG DirectAccess.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ==================================================

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide–Demonstrate UAG SP1 RC DirectAccess with NAP Released

    The march of the Test Lab Guides continues!

    Today I’m offering up to you a Test Lab Guide I think you’re really going to like – the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess with NAP. In this Test Lab Guide, we change up the NAP settings by putting the Network Policy Server (NPS) and Health Registration Authority (HRA) on the UAG DirectAccess server itself. This is in contrast to how we did it in the previous Test Lab Guide for NAP (Test Lab Guide: Demonstrate UAG DirectAccess and NAP), where we set up the NPS server and the HRA server on DC1. The ability to put the NPS and HRA servers on the UAG server itself is new with UAG SP1.

    image

    Why would you want to put the NPS and HRA servers on the UAG server or the servers in the UAG DirectAccess array?

    Some reasons why you might want to do this include:

    • You don’t have a NAP infrastructure yet, and you want a quick and easy way to test NAP
    • You don’t have a NAP infrastructure yet, but you are planning on deploying NAP for DirectAccess clients, so putting the NPS and HRA servers on the UAG array members seems like a smart way of doing things.
    • You want to deploy NAP for your UAG DirectAccess clients, but you don’t have a lot of time to learn about NAP, so you need a quick and easy way to get NAP deployed
    • You want to deploy NAP for both DirectAccess clients and internal clients, but you haven’t put together the NAP solution yet, but you’d like to easily deploy NAP for your UAG DirectAccess pilot deployment

    Of course, there might be other reasons why you’d like to put the NPS and HRA servers on the UAG DirectAccess server or array members. And, you might find that you like NAP so much that after you’ve deployed it for your DirectAccess clients, you’ll want to create a larger deployment. That option is still available to you.

    I hope you like the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess with NAP!

    Let me know if there is anything I can do to improve it – or if there are other features or configuration options regarding DirectAccess and NAP that you’ll want to see in the RTM version of the document. Also, if you want any questions or need help with the TLG, just let me know! Write to me at the address in my sig line and I’ll get right back to you.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide–Demonstrate UAG SP1 RC DirectAccess Remote Management - Blog Version

    Hey folks – since the TLGs are typically put up only in the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess Remote Management check out:

    http://go.microsoft.com/fwlink/?LinkId=205210

    ==================================================

    Introduction

    Forefront Unified Access Gateway (UAG SP1 RC) provides users with the experience of being seamlessly connected to their intranet any time they have Internet access. When DirectAccess is enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without the need for users to connect to a VPN. DirectAccess enables increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside of the office. Forefront UAG SP1 RC DirectAccess extends the benefits of Windows DirectAccess across your infrastructure by enhancing availability and scalability, as well as simplifying deployments and ongoing management. For more information, see Overview of Forefront UAG DirectAccess.

    About this guide

    This Test Lab Guide provides step-by-step instructions for configuring Forefront UAG SP1 RC DirectAccess Remote Management in a test lab so that you can see how it works. You will set up and deploy Forefront UAG SP1 RC DirectAccess using 5 server computers, two client computers, Windows Server 2008 R2 Enterprise Edition, Windows Server 2003 Enterprise Edition SP2, and Windows 7 Ultimate Edition. The Test Lab simulates intranet, Internet, and a home networks, and demonstrates Forefront UAG SP1 RC DirectAccess in different Internet connection scenarios.

    clip_image001Important:

    These instructions are designed for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed to work only on a separate test lab network. For more information on planning and deploying DirectAccess with Forefront UAG SP1 RC, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    This Test Lab Guides builds on the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. You will need to complete all the steps in that guide before you can complete the steps in this Test Lab Guide.

    Overview of the test lab scenario

    In this test lab scenario, Forefront UAG SP1 RC DirectAccess is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG SP1 RC DirectAccess server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and network location server.
    • One intranet member server running Windows Server 2003 Enterprise Edition SP2 (APP3) that is configured as an IPv4 only web and file server. This server is used to highlight the NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 (INET1) that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming member client computer running Windows 7 Enterprise or Ultimate (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet by a NAT.
    • The Internet (131.107.0.0/24).
    • An intranet named Corpnet (10.0.0.0/24) separated from the Internet by the Forefront UAG SP1 RC DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image003

    Configuration component requirements

    The following components are required for configuring Forefront UAG SP1 RC DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Four computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; one of these computers has two network adapters installed.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed.
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG SP1 RC).

    Steps for configuring the test lab

    The following steps describe how to configure the server and client computers, in a test lab. Following these configurations you can verify DirectAccess connectivity from the Internet and Homenet subnets. In addition, you will see how you can manage DirectAccess clients from management computers on the intranet. This Test Lab Guide also highlights a new feature included in UAG SP1 RC, which allows you to limit DirectAccess client connectivity to the intranet tunnel only, which enables continuous management of DirectAccess clients without allowing users to access resources on the intranet.

    clip_image004Note:

    You must be logged on as a member of the Domain Admins group or as a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group.

    You will perform the following steps to demonstrate UAG SP1 RC DirectAccess remote management in this Test Lab Guide:

    · Step 1: Complete the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess – This Test Lab Guide builds on the configuration created after completing the steps in Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    · Step 2: Configure Remote Management – In this step you will create the DirectAccess client OU, create and configure a DirectAccess client GPO and refresh the remote access client configuration and enabling remote desktop connectivity to DirectAccess clients.

    · Step 3: Test Remote Management of DirectAccess Clients – After the new firewall settings are deployed to the DirectAccess client, management servers on the corporate network can initiate connections to the DirectAccess client. In this step you validate the settings and establish connections from DC1 to CLIENT1, when CLIENT1 is acting as a DirectAccess client behind NAT1.

    · Step 4: Limit DirectAccess Client to Only the Management Tunnel. In this step you will configure UAG1 to limit DirectAccess client connectivity to only the infrastructure tunnel.

    · Step 5: Snapshot the Configuration. After completing the Test Lab, take a snapshot of the working UAG SP1 RC DirectAccess NLB array so that you can return to it later to test additional scenarios.

    STEP 1: Complete the Demonstrate UAG SP1 RC DirectAccess Test Lab Guide

    The first step is to complete all the steps in the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess. After completing the steps in that Test Lab Guide you will have the core infrastructure required to complete this Test Lab Guide on how to configure UAG SP1 RC DirectAccess remote management. If you have already completed the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess Test Lab Guide and saved the configuration in either a virtual machine snapshot or disk image for a physical deployment, you can restore that configuration and begin with the next step.

    STEP 2: Configure Remote Management

    DirectAccess uses two IPsec tunnels between DirectAccess client and server to enable communications to the corporate network. The first IPsec tunnel is the “infrastructure” tunnel. This tunnel is established after the DirectAccess client computer starts, but before the user logs on. Authentication is required for this tunnel, and both a computer certificate and the computer account in Active Directory are used to authenticate the first IPsec tunnel connection. The second tunnel (the intranet tunnel) is established after the user logs on and allows the user to access network resources. Authentication for this tunnel uses computer certificate and user (Kerberos) authentication in Active Directory.

    The infrastructure tunnel provides bidirectional access to and from servers included in the management servers collection, as defined in the DirectAccess configuration wizard. These servers can connect to DirectAccess clients over the infrastructure tunnel, so that connectivity is enabled whenever the DirectAccess client computer is turned on, regardless of whether the user is logged on. The infrastructure tunnel enables remote management scenarios where administrators can apply patches, make configuration changes, and employ their full suite of configuration and management tools not only to computers on the corporate network, but to any DirectAccess client on the Internet.

    You will perform the following procedures to enable several remote management scenarios:

    A. Create the DirectAccess Client Organizational Unit and Place CLIENT1 in the New OU. New firewall rules are required to enable some aspects of remote management of DirectAccess clients. Firewall rules can be configured on each client individually, but it is more efficient to use Group Policy to distribute the new firewall rules to all DirectAccess clients. Changes could be made to the DirectAccess Client GPO created by the UAG SP1 RC DirectAccess wizard, but these settings are overwritten each time the wizard is run. Therefore, you will create new GPO to support these custom settings. The new GPO is then linked to an OU that is populated with the DirectAccess client computer accounts.

    B. Create and Configure the DirectAccess GPO and Link it to the DirectAccess Client OU. The DirectAccess GPO is linked to the DirectAccess client OU. In this step you create and populate the DirectAccess client OU.

    C. Refresh the DirectAccess Client Configuration and Enable Remote Desktop Connections to CLIENT1. The DirectAccess clients need to refresh this Group Policy configuration to receive the new GPO settings. In this step the DirectAccess client refreshes it Group Policy configuration to receive the new firewall settings.

    A. Create the DirectAccess Client Organizational Unit and Place CLIENT1 in the New OU

    Remote management scenarios for DirectAccess clients can happen in two ways. In the first scenario, the DirectAccess client contains one or more management agents that initiate connections to management servers on the corporate network over either the infrastructure or intranet tunnel. If the user is not logged on, the management agents can initiate connections to management servers over the infrastructure tunnel. If the user is logged on, either the infrastructure or intranet tunnel can be used by the DirectAccess client to connect to the intranet. No special firewall rules are required for the DirectAccess client to initiate connections to management servers.

    In the second scenario, management servers initiate connections to the DirectAccess client. Special Windows Firewall with Advanced Security firewall rules are required to enable management servers to initiate connections to Active Directory clients when the DirectAccess client is located behind a NAT device. These firewall rules must be configured for each desired protocol used to initiate the connection to the DirectAccess client, and then each of these rules must enable Edge Traversal.

    The special firewall rules can be configured on each DirectAccess client individually. However, this manual approach does not scale. A better solution is to use Active Directory Group Policy to configure and distribute the new firewall rules for the desired protocols with Edge Traversal enabled.

    While it is possible to configure these rules using the GPO created by the UAG SP1 RC DirectAccess wizard, these GPO settings are overwritten each time the wizard is run and the new GPO settings deployed. A viable alternative is to create a new GPO and a new Organizational Unit for the DirectAccess clients. The new DirectAccess client GPO can be linked to the new OU to apply the firewall rules required for management servers to initiate connections to the DirectAccess clients.

    Note:
    DirectAccess clients using the 6to4 IPv6 transition technology to connect to the DirectAccess server do not require special firewall rules with Edge Traversal. However, since you cannot predict when any specific DirectAccess client will use any specific IPv6 transition technology at any specific point in time, you should always enable Edge Traversal on your firewall rules.

    To apply the GPO settings to the DirectAccess clients, we create an Organizational Unit that will contain the DirectAccess clients. The DirectAccess GPO is linked to the new OU. The first step is to create the DirectAccess OU and place the CLIENT1 into this OU.

    The following steps are carried out on DC1.

    1. At the DC1 computer or virtual machine, open the Active Directory Users and Computers console.
    2. In the left pane of the Active Directory Users and Computers console, right click on corp.contoso.com, point to New and click on Organizational Unit.
    3. In the New Object – Organizational Unit dialog box, in the Name text box, enter DirectAccess Clients. Remove the checkmark from the Protect container from accidental deletion checkbox. (Note: disabling the OU from accidental deletion is not required for DirectAccess to work, it is done as a convenience for this lab). Click OK.
    4. In the left pane of the console, click the Computers node. In the right pane, right click CLIENT1 and click Move.
    5. In the Move dialog box, click on the DirectAccess Clients OU and click OK.
    B. Create the DirectAccess GPO and Link it to the DirectAccess Client Organizational Unit

    DirectAccess clients that connect to the DirectAccess server using Teredo or IP-HTTPS need special Firewall Rules to support “manage out” connections. These firewall rules are created for each protocol needed to connect from the intranet to the DirectAccess client. By default, there are no Firewall Rules that allow outbound management from management servers on the intranet, so you must create rules to allow the required protocols. The best way to deploy these Firewall Rules is by configuring them in Group Policy so that the settings are automatically deployed. In this example we will create rules that allow management computers on the corpnet to connect to DirectAccess clients on the Internet using Ping, File Services and Remote Desktop Protocol. Perform the following steps on DC1.

    1. At the DC1 computer or virtual machine, open the Group Policy Management console.
    2. In the Group Policy Management console, expand Forest: corp.contoso.com and then expand Domains. Expand corp.contoso.com and click Group Policy Objects. Right click Group Policy Objects and click New.
    3. In the New GPO dialog box, in the Name text box, enter DirectAccess Clients GPO. Click OK.
    4. Expand the Group Policy Objects node and right click DirectAccess Clients GPO. Click Edit.
    5. In the Group Policy Management Editor console, navigate to Computer Configuration\Policies\Windows Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security – LDAP://CN=\Inbound Rules. Right click Inbound Rules in the left pane of the console and click New Rule.
    6. On the Rule Type page, select the Predefined option. From the drop down list, select Remote Desktop. Click Next.
    7. On the Predefined Rules page, click Next.
    8. On the Action page, click Finish.
    9. Double click the rule and click the Scope tab. On the Scope tab, in the Remote IP address section, select the These IP addresses option and click Add.
    10. In the IP Address dialog box, select the This IP address or subnet option and enter 2002:836b:2:8000::/49 and click OK. In the Remote Desktop TCP-In) Properties dialog box, click OK.
    11. Right click the Inbound Rules page and click New Rule.
    12. On the Rule Type page, select the Predefined option. Select the File and Printer Sharing option. Click Next.
    13. On the Predefined Rules page, click Next.
    14. On the Action page, click Finish.
    15. Right click the Remote Desktop (TCP-in) rule and click Properties. In the Remote Desktop (TCP-In) Properties dialog box, click the Advanced tab.
    16. In the Edge Traversal frame, select the Allow edge traversal from the drop down box. Click OK.
    17. Repeat steps 9, 10 and 16 for all the inbound Firewall Rules.
    18. Close the Group Policy Management Editor console.
    19. In the left pane of the Group Policy Management console, right click the DirectAccess Clients OU and click Link an Existing GPO.
    20. In the Select GPO dialog box, select the DirectAccess Clients GPO Group Policy Object and click OK.
    21. Expand the DirectAccess Clients OU, and click on the DirectAccess Clients GPO. In the Security Filtering section in the right pane, click on the Authenticated Users entry and click Remove. Click OK in the dialog box that asks if you want to remove the delegation privilege. In the Security Filtering section, click Add. In the Select User, Computer, or Group dialog box, enter Domain Computers in the Enter the object name to select text box and click Check Names. Click OK. (Note: the reason why we use Domain Computers for security filtering is that the infrastructure tunnel uses the computer account to perform NTLMv2 authentication. Authenticated Users will not work because users do not authenticate until after they log on, and we want DirectAccess client computers to be available for management even when the DirectAccess client computer has no logged on user).
    22. In the left pane of the console, right click the Default Domain Policy GPO and click Edit.
    23. In the Group Policy Management Editor console, navigate to Computer Configuration\Policies\Windows Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security – LDAP://CN=\Inbound Rules. In the right pane of the console, right click on the Inbound ICMPv6 Echo Request rule you created earlier and click Properties.
    24. In the Inbound IMVPv6 Echo Request Properties dialog box, click the Advanced tab. On the Advanced tab, in the Edge Traversal frame, select the Allow edge traversal option from the drop down box. We are enabling edge traversal for this existing rule, instead of creating a new rule for the DirectAccess Clients GPO to simplify configuration. Click OK.
    25. Close the Group Policy Management Editor. Close the Group Policy Management console. Close Active Directory Users and Computers.
    C. Refresh the DirectAccess Client Configuration and Enable Remote Desktop to CLIENT1

    CLIENT1 needs to receive the firewall rules configured in Group Policy. That can be done by initiating a Group Policy refresh while CLIENT1 is running as a DirectAccess client on the Internet. In addition, CLIENT1 needs to be configured to allow Remote Desktop connections before it can accept RDC connections from a management server on the corpnet. Perform the following steps on CLIENT1.

    1. Move CLIENT1 to the Homenet subnet and then start CLIENT1. If CLIENT1 is already running and is not on the Homenet subnet, shut down CLIENT1 and move it to the Homenet subnet and then start CLIENT1.
    2. Confirm that CLIENT1 can connect to resources on the Corpnet subnet. Open an elevated command prompt on CLIENT1 and enter net view \\app1. You should see a list of shares. This indicates that CLIENT1 can authenticate and establish the intranet tunnel.
    3. In the command prompt window, enter gpupdate /force and press ENTER. Wait for the command to complete and you receive a confirmation. This delivers the new Group Policy settings to CLIENT1 that enables remote management.
    4. Click Start and then right click Computer. Click Remote Settings.
    5. Click Advanced system settings in the left pane of the System window.
    6. On the Remote tab, select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) option. Click OK. Close the System window.
    7. Click Start and type network in the search box. Click Network and Sharing Center.
    8. In the left pane of the Network and Sharing Center window, click the Change advanced sharing settings.
    9. In the Advanced sharing settings window, select the following options: Turn on network discovery, Turn on file and printer sharing and Turn on sharing so anyone with network access can read and write files in the Public folders. Click Save Changes (Note: these options are turned on to demonstrate file share access over the management tunnel, these are not to be considered to be networking best practices).

    STEP 3: Test DirectAccess Client Remote Management

    The DirectAccess client is now ready for remote management using the protocols configured in the Firewall Rules that allow for Edge Traversal. Perform the following procedures on DC1. The procedures are performed on DC1 because DC1 is the only computer that is on the management servers list and therefore the only one that can connect to CLIENT1 over the infrastructure tunnel. In addition, CLIENT1 will be restarted, but you will not log on, so that DC1 will be forced to use the infrastructure tunnel to connect to CLIENT1. The intranet tunnel is only available after the user logs on to the DirectAccess client computer.

    1. At the CLIENT1 computer or virtual machine, restart the operating system and do not log on. Wait for the Press CTRL+ALT+DELETE to log on screen to appear.
    2. *Move to the DC1 computer or virtual machine. Click Start and in the Search box, enter mstsc and press ENTER.
    3. In the Remote Desktop Connection application, enter CLIENT1 in the Computer text box and click Connect.
    4. In the Windows Security dialog box, enter the credentials for CORP\User1 and click OK.
    5. The Terminal Services client session opens and you now see the desktop on CLIENT1. Click Start and enter wf.msc in the Search box and press ENTER.
    6. In the Windows Firewall with Advanced Security console, note that the Private Profile is Active.
    7. Expand the Monitoring node in the left pane of the console and expand Security Associations. Click on the Main Mode node. In the middle pane of the console, note that the 2nd Authentication Method is all User (NTLMv2). This indicates that only the infrastructure tunnel has been established to the DirectAccess server using the computer account of the DirectAccess client. This demonstrates that you were able to remotely manage CLIENT1 from DC1 over the infrastructure tunnel only.
    8. Minimize Terminal Services Client window.
    9. On DC1, open an elevated command prompt and in the command prompt window enter ping client1 and press ENTER. You should receive ping replies from the IPv6 address of CLIENT1.
    10. Click Start and enter \\CLIENT1 in the Search box and press ENTER. You will see a list of shared resources on CLIENT1. Double click on the Users Share and then double click on the Public folder, and then double click on Public Pictures and double click on Sample Pictures. Double click on Desert. You should see a picture of a desert.
    11. Close all open Windows on CLIENT1 and DC1, including the terminal services client window.
    12. *Move to the APP1 computer. Open an elevated command prompt. In the command prompt window, enter net view \\client1 and press ENTER. You will receive an error and will not be able to connect. The reason for this is that APP1 is not a member of the management servers group, and therefore is unable to connect to CLIENT1 over the infrastructure tunnel.

    STEP 4: Limit DirectAccess Clients to Only the Management Tunnel

    While seamless access to the intranet for DirectAccess clients is a compelling use case for DirectAccess users, many IT organizations find the remote management capabilities even more useful. There may be some organizations that prefer that only the infrastructure tunnel be available so that DirectAccess client are always managed, but that users cannot access resources on the intranet. UAG SP1 RC includes a new feature that allows you to configure DirectAccess clients so that they only have access to the intranet tunnel.

    In this step we will demonstrate how to configure DirectAccess clients so that they have access only to the intranet tunnel so that they can be always managed:

    1. *At UAG1, click Start and then click All Programs. Click Microsoft Forefront UAG and then click Forefront UAG Management. In the User Account Control dialog box, click Yes.

    2. In the Microsoft Forefront Unified Access Gateway Management console, click DirectAccess in the left pane of the console.

    3. In the right pane of the console, in the Step 1 Clients and GPOs section, click Edit.

    4. This starts the Clients and GPOs Configuration wizard. On the Deployment Model page, select the Enable remote management of DirectAccess client only option. Confirm that there is a checkmark in the Allow only services running under the client computer account to access infrastructure servers used for remote management checkbox. This option allows system services running in the context of the local computer account to connect to infrastructure servers through the infrastructure tunnel, but does not allow processes running in the context of the logged on user account to reach infrastructure servers. In addition, because the intranet tunnel cannot be established, the user cannot reach any other server on the intranet. Click Next.

    5. On the Client Domains page, click Next.

    6. On the Policy Management page, click Next.

    7. On the Client Groups page, click Finish.

    8. In the right pane of the Microsoft Forefront Unified Access Gateway Management console, click the Apply Policy button.

    9. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now. Click OK in the DirectAccess Policy Configuration dialog box after you see it report Script run completed with no errors or warning.

    10. On the Forefront UAG DirectAccess Configuration Review page, click Close.

    11. Open and elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. Close the command prompt window when the command completes.

    12. *Go to CLIENT1. Log on as CORP\User1. Open an elevated command prompt. In the command prompt window, enter gpupdate /force and press ENTER. Notice that the gpupdate fails, as this command is run under the user context.

    13. In the command prompt window, enter net view \\dc1 and press ENTER. You will see that you get a System Error 53 occurred. The network path was not found. Again, the connection attempt fails because the command is sent in the context of the current user.

    14. In the command prompt window, enter ping dc1 and press ENTER. You will see four responses from DC1’s ISATAP assigned IPv6 address. This indicates that DNS queries are working correctly over the infrastructure tunnel. DNS queries are sent by the DNS client service in the context of the local computer account, so CLIENT1 was able to resolve the name of DC1. The ping request was send in the context of the local user account. This request was successful because ICMPv6 communications are not sent over the IPsec tunnel, therefore there is no authentication failure.

    15. *Return to DC1. Open and elevated command prompt. In the command prompt window enter net view \\client1 and press ENTER. Notice that you can still access CLIENT1 because DC1 connects to CLIENT1 through the infrastructure tunnel.

    16. On DC1, open Event Viewer from the Administrative Tools menu. Review the entries related to CLIENT1 starting up and receiving Group Policy settings and machine authentication. This further demonstrates that CLIENT1 was able to communicate with DC1 during the startup process because of the access provided over the infrastructure tunnel.

    STEP 5: Snapshot the Configuration

    This completes the UAG SP1 UAG SP1 RC DirectAccess remote management test lab. To save this configuration so that you can quickly return to a working UAG SP1 RC DirectAccess remote management configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.

    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots UAG SP1RC DirectAccess Remote Management. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration

    Additional Resources

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For procedures required to build this Test Lab Guide, see Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess.

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG SP1 RC DirectAccess design guide and the Forefront UAG SP1 RC DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information on how to troubleshoot UAG DirectAccess in a Test Lab, see Test Lab Guide: Troubleshoot UAG DirectAccess.

    For a comprehensive list of UAG DirectAccess Test Lab Guides, see Test Lab Guides.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.

    ===================================

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • UAG SP1 RC Demonstrate DirectAccess Remote Management Test Lab Guide Released

    So you liked what you saw after going through the Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess Test Lab Guide. In that guide you saw how to set up a working DirectAccess configuration with UAG SP1 RC and were able to check out the new Web Monitor view of DirectAccess client connections.

    So what’s next? How about some UAG SP1 RC DirectAccess Remote Management?

    You got it!

    The new Test Lab Guide: Demonstrate UAG SP1 RC DirectAccess Remote Management shows you how to configure UAG DirectAccess clients so that you can manage them from management stations on your intranet. The “always connected” nature of DirectAccess makes it the ideal “always managed” solution – and you can extend that by configuring custom firewall rules to gain even greater control and increased visibility of all your managed assets, regardless if those assets are on the intranet or anywhere on the Internet.

    image

    This Test Lab Guide covers several remote management scenarios, including a scenario enabled by a new feature in UAG SP1 RC that allows you to configure DirectAccess clients for remote management only. This was something that our UAG DirectAccess customers asked for, so we made it happen!

    This new feature allows IT to always have access to DirectAccess clients – but doesn’t allow users to access the intranet through a DirectAccess connection. One example of why you might do this is when you want to have command and control over all your managed assets, but don’t want the users to have open network access to the intranet over the Internet – providing for a “manage only” DirectAccess deployment.

    As always, if you have questions, suggestions or comments about this or any other UAG DirectAccess related Test Lab Guide, let me know! Just write to the email address in my sig line and I’ll get back to you.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Knowledge Engineer, Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Fabrikam Test Lab Guide Now Available

    Test Lab Guides make it easy to test new products and technologies in a pre-tested, well defined Test Lab. Our new Test Lab Guide system is designed so that you don’t have to reinvent the wheel each time you put together a Test Lab each time you want to test out something new. Test Lab Guides are modular, which means you reuse your Test Labs over time to test new technologies and new scenarios. In the course of a year, TLGs should end up saving your potentially hundreds of hours in test time.

    In addition, Test Lab Guides “take the covers off” so that you understand what’s happening on the front-end and back-end – something you don’t get with “hands-on labs” where the front-end and back-end are preconfigured and “magically” work. Unfortunately, you can’t take that magic home with you when you actually want to put together a test lab of you own.

    image

    If you haven’t checked out how Test Lab Guides work and the philosophy behind them, then check out my blog post on the TLG concept over at http://blogs.technet.com/b/tomshinder/archive/2010/07/30/test-lab-guides-lead-the-way-to-solution-mastery.aspx

    So What is this Fabrikam Test Lab Guide of Which You Speak?

    I’m glad you asked! All Test Lab Guides start with the “Base Configuration” which you can find at http://www.microsoft.com/downloads/en/details.aspx?FamilyID=ab6c61af-9c34-4692-815c-4396b482d31b&displayLang=en

    The Base Configuration Test Lab Guide sets up the contoso.com forest. For all Test Lab Guide modules that test a product or technology, or a collection of products or technologies in a single forest environment, you’ll always start with the Base Configuration. But what if you want to test a product or technology or a collection of products or technologies that includes two forests over the Internet, such as scenarios where two different organizations want to collaborate?

    You could use the Base Configuration to build out the contoso.com forest, and the cobble together a test lab configuration for the partner network, but that wouldn’t be very reusable or very scalable. What would be better is if you had a standard and tested configuration for the partner network – where you can then build scenarios on top of that.

    Sounds good, right? I thought so! That’s where the Fabrikam Test Lab guide comes in. In the Fabrikam Test Lab Guide, we define the configuration of the partner network for you, and it plugs right into the Base Configuration Test Lab Guide that defines the contoso.com  test lab. After you finish the Fabrikam Test Lab Guide, you’ll have a second forest, the fabrikam.com forest, which is separated from the contoso.com forest by a simulated Internet.

    What Can I Do with the Fabrikam Test Lab Guide?

    I see the Fabrikam TLG being used primarily in the two following scenarios:

    • Microsoft writers who want to write test lab guides that demonstrate multi-organizational products and technologies will include the Fabrikam Test Lab Guide as Step 2 in their own Test Lab Guide Modules
    • Community contributors who write their own Test Lab Guide extensions who want to demonstrate multi-organizational products and technologies will want to include the Fabrikam Test Lab Guide as Step 2 in their Test Lab Guide extensions (Step 1 would be the Base Configuration Test Lab Guide)

    I Think TLGs are Cool! I Want to Create One Myself – Where Can I get Help Creating Them?

    As with all Test Lab Guides – I’m here to help. If you need help in creating your own Test Lab Guides, let me know. I think once you get into the groove with writing your own Test Lab Guide extensions and posting them to the wiki, you’ll find them a lot of fun! I know I do. If you have questions or run into issues with this TLG or with TLGs you want to write, let me know. Just write to the email address in my sig line.

    HTH,

    Tom

    Tom Shinder
    tomsh@microsoft.com
    Microsoft DAIP iX/SCD iX
    UAG Direct Access/Anywhere Access Group (AAG)
    The “Edge Man” blog (DA all the time):
    http://blogs.technet.com/tomshinder/default.aspx
    Follow me on Twitter:
    http://twitter.com/tshinder
    Facebook:
    http://www.facebook.com/tshinder

  • Test Lab Guide–Demonstrate UAG SP1 RC DirectAccess - Blog Version

    Hey folks – since the TLGs are typically put up only on the download center, it makes discoverability of some of the cool content inside of them hard when it comes to search engines. Therefore, I’m going to post the full text of the TLGs on the Edge Man blog. However, I recommend that you download the Word .doc version of the TLGs when you actually put together your Test Lab using the Test Lab Guides.

    For a downloadable version of the Test Lab Guide – Demonstrate UAG SP1 RC DirectAccess check out:

    http://go.microsoft.com/fwlink/?LinkId=204993

    ==================================================

    Introduction

    Forefront Unified Access Gateway (UAG) 2010 SP1 RC provides users with the experience of being seamlessly connected to their intranet any time they have Internet access. When DirectAccess is enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without the need for users to connect to a VPN. DirectAccess enables increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside of the office. Forefront UAG 2010 SP1 RC DirectAccess extends the benefits of Windows DirectAccess across your infrastructure by enhancing availability and scalability, as well as simplifying deployments and ongoing management. For more information, see Overview of Forefront UAG DirectAccess.

    IT professionals can benefit from UAG 2010 SP1 RC DirectAccess in many ways:

    · Improved Manageability of Remote Users. Without DirectAccess, IT professionals can only manage mobile computers when users connect to a VPN or physically enter the office. With DirectAccess, IT professionals can manage mobile computers by updating Group Policy settings and distributing software updates any time the mobile computer has Internet connectivity, even if the user is not logged on. This flexibility allows IT professionals to manage remote computers on a regular basis and ensures that mobile users stay up-to-date with security and system health policies.

    · Secure and Flexible Network Infrastructure. Taking advantage of technologies such as Internet Protocol version 6 (IPv6) and Internet Protocol security (IPsec), DirectAccess provides secure and flexible network infrastructure for enterprises. Below is a list of DirectAccess security and performance capabilities:

    o Authentication. DirectAccess authenticates the computer, enabling the computer to connect to the intranet before the user logs on. DirectAccess can also authenticate the user and supports two-factor authentication using smart cards and one-time passwords, such as RSA SecurID.

    o Encryption. DirectAccess uses IPsec to provide encryption for communications across the Internet.

    o Access to IPv4-only intranet resources. UAG DirectAccess extends the value of Windows DirectAccess with NAT64/DNS64, an IPv6/IPv4 protocol transition technology that enables DirectAccess client connectivity to IPv4-only resources on the intranet.

    · High availability and array configuration. UAG DirectAccess extends the value of Windows DirectAccess by adding integrated support for Network Load Balancing and array configuration, which work together to enable a highly available DirectAccess deployment.

    · IT Simplification and Cost Reduction. By default, DirectAccess separates intranet from Internet traffic, which reduces unnecessary traffic on the intranet by sending only traffic destined for the intranet through the DirectAccess server. Optionally, IT can configure DirectAccess clients to send all traffic through the DirectAccess server.

    The following figure shows a DirectAccess client on the Internet.

    clip_image002

    In this guide

    This paper contains instructions for configuring and demonstrating UAG2010 SP1 RC DirectAccess using five server computers and two client computers. The starting point for this guide is a Test Lab based on the “Steps for Configuring the Corpnet Subnet “ and “Steps for Configuring the Internet Subnet“ sections of the Test Lab Guide: Base Configuration. The resulting UAG 2010 SP1 RC DirectAccess test lab simulates an intranet, the Internet, and a home network and demonstrates DirectAccess functionality in different Internet connection scenarios.

    clip_image003Important:

    These instructions are designed for configuring a Test Lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network, and to show clearly the required functionality. This configuration is not designed to reflect best practices, nor does it reflect a required or recommended configuration for a production network. The configuration, including IP address assignment and all other configuration parameters, is designed to work only on a separate Test Lab network. For more information on planning and deploying DirectAccess with Forefront UAG for your production network, please see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide

    Overview of the Test Lab scenario

    In this test lab scenario, Forefront UAG DirectAccess is deployed with:

    • One computer running Windows Server 2008 R2 Enterprise Edition (DC1), that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (UAG1), that is configured as a Forefront UAG 2010 SP1 RC DirectAccess server.
    • One intranet member server running Windows Server 2008 R2 Enterprise Edition (APP1) that is configured as a general application server and Network Location Server.
    • One intranet member server running Windows Server 2003 SP2 Enterprise Edition (APP3), that is configured as a IPv4 only web and file server. This server is used to highlight the NAT64/DNS64 capabilities.
    • One standalone server running Windows Server 2008 R2 Enterprise Edition (INET1), that is configured as an Internet DNS and DHCP server.
    • One standalone client computer running Windows 7 Ultimate Edition (NAT1), that is configured as a network address translator (NAT) device using Internet Connection Sharing.
    • One roaming member client computer running Windows 7 Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.

    The test lab consists of three subnets that simulate the following:

    • A home network named Homenet (192.168.137.0/24) connected to the Internet by a NAT.
    • The Internet (131.107.0.0/24).
    • An intranet named Corpnet (10.0.0.0/24) separated from the Internet by the Forefront UAG DirectAccess server.

    Computers on each subnet connect using either a physical or virtual hub or switch, as shown in the following figure.

    clip_image005

    CLIENT1 initially connects to the Corpnet subnet and joins the intranet domain. After UAG1 is configured as a Forefront UAG DirectAccess server, and CLIENT1 is updated with the DirectAccess client Group Policy settings, CLIENT1 later connects to the Internet subnet and the Homenet subnet, and tests DirectAccess connectivity to intranet resources on the Corpnet subnet.

    Configuration component requirements

    The following components are required for configuring Forefront UAG DirectAccess in the test lab:

    • The product disc or files for Windows Server 2008 R2 Enterprise Edition.
    • The product disc or files for Windows Server 2003 Enterprise SP2
    • The product disc or files for of Windows 7 Ultimate.
    • Five computers or virtual machines that meet the minimum hardware requirements for Windows Server 2008 R2 Enterprise; two of these computers has two network adapters installed.
    • One computer or virtual machine that meets the minimum hardware requirements for Windows Server 2003 SP2
    • Two computers or virtual machines that meet the minimum hardware requirements for Windows 7 Ultimate; one of these computers has two network adapters installed.
    • The product disc or a downloaded version of Microsoft Forefront Unified Access Gateway (UAG) 2010 Service Pack 1 Release Candidate (http://www.microsoft.com/downloads/en/details.aspx?FamilyID=980ff09f-2d5e-4299-9218-8b3cab8ef77a).

    Steps for configuring the test lab

    The following steps describe how to configure the server and client computers, and configure the Forefront UAG DirectAccess server, in a test lab. Following these configurations you can verify DirectAccess connectivity from the Internet and Homenet subnets.

    clip_image006Note:

    You must be logged on as a member of the Domain Admins group or as a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group.

    · Step 1: Complete the Base Configuration. The Base Configuration is the core of all Test Lab Guide scenarios. The first step is to complete the Base Configuration.

    · Step 2: Configure DC1 - DC1 is a Windows Server 2008 R2 computer that is the domain controller, Certificate server, DNS server, File Server and DHCP server for the corp.contoso.com domain.

    · Step 3: Configure APP1- APP1 is a Windows Server 2008 R2 computer that acts in the role of the Network Location Server on the network.

    · Step 4: Install and Configure APP3 - APP3 is a Windows Server 2003 Enterprise Edition computer that acts as an IPv4 only host and is used to demonstrate DirectAccess connectivity to IPv4 only resources using the UAG DNS64 and NAT64 features. APP3 hosts both HTTP and SMB resources that the DirectAccess client computer will be able to access from other the simulated Internet.

    · Step 5: Configure UAG1 – UAG1 acts as UAG SP1 RC DirectAccess.

    · Step 6: Configure CLIENT1 – CLIENT1 is a DirectAccess client that is used to test DirectAccess connectivity in several Internet network access scenarios.

    · Step 7: Install and Configure NAT1 – NAT1 acts as a simulated NAT router that enables CLIENT1 access to the UAG DirectAccess server over the simulated Internet.

    · Step 8: Test DirectAccess Connectivity from the Internet – CLIENT1 is connected to the simulated Internet subnet to demonstrate DirectAccess connectivity using the 6to4 IPv6 transition technology.

    · Step 9: Test DirectAccess Connectivity from Behind a NAT Device – CLIENT1 is connected to the simulated private address network to demonstrate DirectAccess connectivity using the Teredo and IP-HTTPS IPv6 transition technologies.

    · Step 10: View DirectAccess Connections in the UAG SP1 RC DirectAccess Monitor. UAG SP1 RC includes a new DirectAccess Web Monitor. In this step you will view information about the UAG SP1 RC DirectAccess server and DirectAccess client connections in the new DirectAccess Monitor application.

    · Step 11: Test Connectivity When Returning to the Corpnet – CLIENT1 is connected again to the Corpnet subnet to demonstrate how DirectAccess components are automatically disabled to connect to local resources.

    · Step 12: Snapshot the Configuration – At the completion of the lab, snapshot the configuration so that you can later return to a working UAG DirectAccess Test Lab.

    clip_image007Note

    You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.

    STEP 1: Complete the Base Configuration

    This Test Lab Guide uses the Base Configuration network as a starting place. Please complete all the steps in Test Lab Guide: Base Configuration before proceeding with the remainder of the steps in this guide. If you have already completed all the steps in the Base Configuration Test Lab Guide and saved a disk image or a virtual machine snapshot of the Base Configuration, then you can restore the Base Configuration and proceed to the next step.

    STEP 2: Configure DC1

    DC1 acts as a domain controller, Certificate server, DNS server, File Server and DHCP server for the corp.contoso.com domain. The following steps build on the Base Configuration to prepare DC1 to carry out these roles to support a working DirectAccess solution:

    A. Create a Reverse Lookup Zone on the DNS Server on DC1.
    A reverse lookup zone for network ID 10.0.0.0/24 is required to create a pointer record for DC1. The pointer record allows reverse name resolution for DC1, and prevents name resolution errors during DNS related configuration steps. The reverse lookup zone is not required for a functional DirectAccess solution.

    B. Enter a Pointer Record for DC1.
    A pointer record for DC1 will allow services to perform reverse name resolution for DC1. This is when performing DNS related operations. It is not required for a functional DirectAccess solution.

    C. Enable ISATAP Name Resolution in DNS on DC1.
    By default, the Windows Server 2008 R2 DNS server will not answer queries for the ISATAP and WPAD host names. The DNS server is configured so that it will answer queries for ISATAP.

    D. Create DNS Records for NLS and ISATAP on DC1.
    The DirectAccess client uses a Network Location Server (NLS) to determine if the computer is on or off the corporate network. If on the corporate network, the DirectAccess client can connect to the Network Location Server using an HTTPS connection. A DNS record is required to resolve the name of the NLS. In addition, a DNS record for ISATAP is required so that ISATAP capable hosts on the network can obtain IPv6 addressing and routing information from the ISATAP router configured on UAG1.

    E. Create a Security Group for DirectAccess Clients on DC1.
    When DirectAccess is configured on the UAG DirectAccess server, it automatically creates Group Policy Objects and GPO settings that are applied to DirectAccess clients and servers. The DirectAccess client GPO uses security group filtering to assign the GPO settings to a designated DirectAccess security group. This group is populated with DirectAccess client computer accounts. This is a required component of a DirectAccess solution.

    F. Create and Deploy a Certificate Template for the IP-HTTPS Listener Certificate and the Network Location Server Certificate.
    A Web site certificate is required for the Network Location Server so that computers can use HTTPS to connect to it when they are on the corporate network. The UAG DirectAccess server uses a Web site certificate on its IP-HTTPS listener so that it can accept incoming connections from DirectAccess clients that are behind network devices that limit outbound connections to only HTTP/HTTPS. A Web site certificate template is created and used for certificate requests to the Microsoft Certificate Server installed on DC1. A Web site certificate bound to the UAG DirectAccess server’s IP-HTTPS is a required component of a working DirectAccess solution.

    G. Create ICMPv4 and ICMPv6 Echo Request Firewall Rules in Domain Group Policy on DC1.
    ICMP v4 and v6 echo requests inbound and outbound are required for Teredo support. Firewall Rules are configured using the Windows Firewall with Advanced Security GPO snap-in to distribute the configuration.

    H. Create a Shared Folder on the C:\ Drive on DC1.
    A shared folder is created on the C:\drive of DC1 to test SMB connectivity for DirectAccess clients to a resources on the CORP domain.

    A. Create Reverse Lookup Zone on DNS Server on DC1

    A reverse lookup zone on DC1 for network ID 10.0.0.0/24 is required to create a pointer record for DC1. The pointer record will allow reverse name resolution for DC1, which will prevent name resolution errors during several DNS related configuration steps. The reverse lookup zone is not required for a functional DirectAccess solution and is used as a convenience in this lab.

    1. On DC1, click Start, and point to Administrative Tools. Click DNS.
    2. In the DNS Manager console, in the left pane of the console, expand the server name, and click Reverse Lookup Zones. Right click Reverse Lookup Zones and click New Zone.
    3. On the Welcome to the New Zone Wizard page, click Next.
    4. On the Zone Type page, click Next.
    5. On the Active Directory Zone Replication Scope page, click Next.
    6. On the Reverse Lookup Zone Name page, click Next.
    7. On the Reverse Lookup Zone Name page, select the Network ID option, and then enter 10.0.0 in the text box. Click Next.
    8. On the Dynamic Update page, click Next.
    9. On the Completing the New Zone Wizard page, click Finish.
    10. Leave the DNS console open for the next operation.
    B. Enter PTR Record for DC1

    A pointer record for DC1 will allow services to perform reverse name resolution for the DC1 computer. This will be useful when performing several DNS related operations. It is not required for a functional DirectAccess solution and is configured as a convenience for this lab.

    1. On DC1, in the DNS Manager console, expand the Forward Lookup Zones node in the left pane of the console. Click on corp.contoso.com.
    2. Double click on dc1 in the right pane of the console.
    3. In the DC1 Properties dialog box, put a checkmark in the Update associated pointer (PTR) record checkbox and click OK. If the checkbox is already enabled, remove the checkmark and then enable it again. Click OK.
    4. Expand the Reverse Lookup Zones node in the left pane of the console and click 0.0.10.in-addr.arpa. Confirm that there is an entry for 10.0.0.1 in the middle pane of the console.
    5. Leave the DNS console open.
    C. Enable ISATAP Name Resolution on DNS Server on DC1

    By default, the Windows Server 2008 R2 DNS server will not answer queries for ISATAP and WPAD host names. These names are included in the DNS server’s Global Query Block List. The following procedures configure the DNS server so that it will answer queries for ISATAP by removing ISATAP from the Global Query Block List.

    1. On DC1, click Start, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator.
    2. In the command window, type dnscmd /config /globalqueryblocklist wpad, and then press ENTER.
    3. In the command prompt window, type dnscmd /info /globalqueryblocklist to confirm that ISATAP is not included in the list, and that the display says Query result: String: wpad
    4. Close the command prompt window.

    For more information on configuring the global query block list, please see http://download.microsoft.com/download/5/3/c/53cdc0bf-6609-4841-a7b9-cae98cc2e4a3/DNS_Server_Global_%20Query_Block%20List.doc

    D. Create DNS Records for NLS and ISATAP on DC1

    DirectAccess clients use a Network Location Server to determine if the computer is on or off the intranet. If the DirectAccess client can connect to the Network Location Server using HTTPS, it determines that it is on the corporate network and the Name Resolution Policy Table (NRPT) is disabled. If the DirectAccess client cannot connect to the Network Location Server when on the intranet, the Name Resolution Policy Table remains enabled which can cause name resolution and connectivity problems when the DirectAccess client is situated on the intranet. A DNS record is required for the DirectAccess client to resolve the name of the Network Location Server.

    In addition, all IPv6 capable hosts on the corpnet need to resolve the name ISATAP to the internal IP address of the UAG DirectAccess server, so a DNS record is required for ISATAP. The UAG DirectAccess server will act as an ISATAP router for the organization and provides prefix and routing information for ISATAP hosts on the corporate network.

    1. On DC1, click the corp.contoso.com forward lookup zone in the left pane of the console. Right click corp.contoso.com and click New Host (A or AAAA).
    2. In the New Host dialog box, enter ISATAP in the Name (uses parent domain name if blank) text box. Then enter 10.0.0.2 in the IP address text box. (IP address 10.0.0.2 will be the IP address of the internal interface of the UAG server, which will act as the ISATAP router in this lab).
    3. Click Add Host. Then click OK in the DNS dialog box.
    4. In the New Host dialog box, enter NLS in the Name (uses parent domain name if blank) text box (this is the name the DirectAccess clients use to connect to the Network Location Server). Enter 10.0.0.3 in the IP address text box, and then click Add Host. Click OK in the DNS text box. (Note that IP address 10.0.0.3 is the IP address of APP1, which acts as a network location server in this lab).
    5. Click Done.
    6. Confirm that there are entries for ISATAP and NLS in the middle pane of the console.
    7. Close the DNS Manager console.
    8. Open a command prompt window and enter nslookup isatap and press ENTER. Confirm that ISATAP resolves to 10.0.0.2. Close the command prompt window.
    E. Create a Security Group for DirectAccess Clients on DC1

    When you run the UAG DirectAccess wizard on the UAG1 computer, the wizard will create Group Policy Objects and deploy them in Active Directory. One GPO is created for the UAG DirectAccess server, and another is created for DirectAccess clients. Security Group filtering is used to apply the DirectAccess GPO settings to the DirectAccess Clients security Group. To obtain the settings required to be a DirectAccess client, the computer must be a member of this security group. Do not use any of the built-in security groups as your DirectAccess client security Group. Use the following procedure to create the DirectAccess security group. This group is required for a working DirectAccess solution.

    1. On DC1, open the Active Directory Users and Computers console. In the left pane, right-click Users, point to New, and then click Group.
    2. In the New Object - Group dialog box, under Group name, enter DA_Clients. (Note that the group name “DA_Clients” is not a mandatory name; you can use any name you like for the DirectAccess clients security group in your production environment).
    3. Under Group scope, choose Global, under Group type, choose Security, and then click OK.
    4. Close the Active Directory Users and Computers console.
    F. Create and Deploy a Certificate Template for the IP-HTTPS Listener Certificate and Network Location Server Certificate

    A Web site certificate is required for the Network Location Server so that computers can use HTTPS to connect to it when the DirectAccess client is on the intranet. In addition, the UAG DirectAccess server uses a web site certificate on its IP-HTTPS listener so that it can accept incoming connections from DirectAccess clients that are behind network devices that limit outbound connections to only HTTP/HTTPS. The following procedures describe how to create a web site certificate template to use for requests to the Microsoft Certificate Server installed on DC1. A web site certificate bound to the UAG DirectAccess server’s IP-HTTPS listener and a web site certificate bound to the Network Location Server Web site are both required for a working DirectAccess solution.

    1. On DC1, click Start, enter mmc in the Search box, and then press ENTER.
    2. Click the File menu, and then click Add/Remove Snap-in.
    3. In the list of snap-ins, click Certificate Templates, click Add, and then click OK.
    4. In the console tree, expand Certificates Templates.
    5. In the right pane, right-click the Web Server template, and then click Duplicate Template.
    6. Click Windows Server 2008 Enterprise, and then click OK. (Note that you can use either the Windows Server 2003 or Windows Server 2008 templates). In Template display name, type Web Server 2008.
    7. Click the Server tab. On the Server tab, put a checkmark in the Do not include revocation information in issued certificates (Applicable only for Windows Server 2008 R2 and above). Click Apply. Note that we are configuring this option so that we do not need to publish the CRL for external DirectAccess clients. You would not use this option in your production environment.
    8. Click the Security tab.
    9. Click Authenticated Users, and then select Enroll in the Allow column.
    10. Click Add, enter Domain Computers in the Enter the object names to select text box, and then click OK.
    11. Click Domain Computers, and then select Enroll in the Allow column. Click Apply.
    12. Click the Request Handling tab.
    13. Select Allow private key to be exported (note that we do this as a convenience for this lab, making the private key exportable is not required by DirectAccess; however, in order to create a UAG DirectAccess array, the same certificate must be installed on all array members; enabling export of the private key greatly simplifies this requirement). Click Apply.
    14. Click OK.
    15. Close the MMC window without saving changes.
    16. Click Start, point to Administrative Tools, and then click Certification Authority.
    17. In the console tree, expand corp-DC1-CA, right-click Certificate Templates, point to New, and then click Certificate Template to Issue.
    18. In the list of certificate templates, click Web Server 2008, and then click OK.
    19. In the right pane of the console, you should see the Web Server 2008 certificate template with an Intended Purpose of Server Authentication.
    20. Close the Certification Authority console.
    G. Create ICMPv4 and ICMPv6 Echo Request Firewall Rules in Domain Group Policy on DC1

    Support for incoming and outgoing ICMPv4 and v6 is required for Teredo clients. DirectAccess clients will use Teredo as their IPv6 transition technology to connect to the UAG DirectAccess server over the IPv4 Internet when they are assigned a private (RFC 1918) IP address and are located behind a NAT device or firewall that allows outbound UDP port 3544. In addition, enabling ping facilitates connectivity testing between participants in the DirectAccess solution.

    1. On DC1, click Start, click Administrative Tools, and then click Group Policy Management.
    2. In the console tree, expand Forest: corp.contoso.com. Then expand Domains, and then expand corp.contoso.com.
    3. In the console tree, right-click Default Domain Policy, and then click Edit.
    4. In the console tree of the Group Policy Management Editor, expand Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security-LDAP://.
    5. In the console tree, click Inbound Rules, right-click Inbound Rules, and then click New Rule.
    6. On the Rule Type page, click Custom, and then click Next.
    7. On the Program page, click Next.
    8. On the Protocols and Ports page, for Protocol type, click ICMPv4, and then click Customize.
    9. In the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, and then click OK.
    10. Click Next.
    11. On the Scope page, click Next.
    12. On the Action page, click Next.
    13. On the Profile page, click Next.
    14. On the Name page, for Name, type Inbound ICMPv4 Echo Requests, and then click Finish.
    15. In the console tree, right-click Inbound Rules, and then click New Rule.
    16. On the Rule Type page, click Custom, and then click Next.
    17. On the Program page, click Next.
    18. On the Protocols and Ports page, for Protocol type, click ICMPv6, and then click Customize.
    19. In the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, and then click OK.
    20. Click Next.
    21. On the Scope page, click Next.
    22. On the Action page, click Next.
    23. On the Profile page, click Next.
    24. On the Name page, for Name, type Inbound ICMPv6 Echo Requests, and then click Finish.
    25. In the console tree, right-click Outbound Rules, and then click New Rule.
    26. On the Rule Type page, click Custom, and then click Next.
    27. On the Program page, click Next.
    28. On the Protocols and Ports page, for Protocol type, click ICMPv4, and then click Customize.
    29. In the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, and then click OK.
    30. Click Next.
    31. On the Scope page, click Next.
    32. On the Action page, click Allow the connection, and then click Next.
    33. On the Profile page, click Next.
    34. On the Name page, for Name, type Outbound ICMPv4 Echo Requests, and then click Finish.
    35. In the console tree, right-click Outbound Rules, and then click New Rule.
    36. On the Rule Type page, click Custom, and then click Next.
    37. On the Program page, click Next.
    38. On the Protocols and Ports page, for Protocol type, click ICMPv6, and then click Customize.
    39. In the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, and then click OK.
    40. Click Next.
    41. On the Scope page, click Next.
    42. On the Action page, click Allow the connection, and then click Next.
    43. On the Profile page, click Next.
    44. On the Name page, for Name, type Outbound ICMPv6 Echo Requests, and then click Finish.
    45. Confirm that the rules you created appear in the Inbound Rules and Outbound Rules nodes. Close the Group Policy Management Editor.
    H. Create a Shared Folder on the C:\ Drive on DC1

    DirectAccess clients should be able to connect to SMB resources on the intranet when the DirectAccess client is connected to the simulated Internet, or connecting from behind a NAT device over the Internet. A network share is created on DC1 to test DirectAccess client connectivity to SMB resources over the infrastructure tunnel.

    1. Click Start, and then click Computer.
    2. Double-click Local Disk (C:).
    3. Click New Folder, type Files, and then press ENTER. Leave the Local Disk window open.
    4. Click Start, click All Programs, click Accessories, right-click Notepad, and then click Run as administrator.
    5. In the Untitled – Notepad window, type This is a shared file on DC1.
    6. Click File, click Save, and navigate to the Files folder.
    7. In File name, type Example, and then click Save. Close the Notepad window.
    8. In the Local Disk (C:) window, right-click the Files folder, point to Share with, and then click Specific people.
    9. Click Share, and then click Done.
    10. Close the Local Disk (C:) window.

    STEP 3: Configure APP1

    APP1 is a Windows Server 2008 R2 Enterprise Edition computer that acts in the role of the Network Location Server for the intranet. We have chosen to not to install the Network Location Server on the domain controller, even though that would have reduced the number of machines required for the lab network. The reason for this is that NLS on the DC can be a problematic if the DC is IPv6 based and can cause potential problems with network location detection. For this reason we have chosen to install the NLS on APP1.

    You will perform the following operations to configure APP1:

    A. Obtain an NLS Certificate for SSL Connections to the Network Location Server on APP1.
    APP1 acts as the Network Location Server. To enable this role, APP1 needs a web site certificate so that the DirectAccess clients are able to establish an SSL connection to a Web site on APP1. DirectAccess clients access this site by connecting to Network Location Server name, which is nls.corp.contoso.com in this lab.

    B. Configure the HTTPS Security Binding on the NLS Web Site on APP1. The web site certificate needs to be bound to a web site on APP1 so that it can respond to SSL connection requests from the DirectAccess clients on the intranet.

    A. Obtain NLS Certificate for SSL Connections to Network Location Server on APP1

    The Network Location Server requires a Web site certificate to enable SSL session establishment with the DirectAccess client. The subject name on this certificate must match the name that the DirectAccess client uses to connect to the Network Location Server. On this Test Lab network, the DirectAccess client tries to connect to connect to the NLS at nls.corp.contoso.com. This name is used later in the DirectAccess configuration wizard on the UAG server.

    1. On APP1, click Start, enter mmc, and then press ENTER.
    2. Click the File menu, and then click Add/Remove Snap-in.
    3. Click Certificates, click Add, select Computer account, click Next, select Local computer, click Finish, and then click OK.
    4. In the left pane of the console, expand Certificates (Local Computer)\Personal\Certificates.
    5. Right-click Certificates, point to All Tasks, and then click Request New Certificate.
    6. On the Before You Begin page, click Next.
    7. On the Select Certificate Enrollment Policy page, select the Active Directory Enrollment Policy entry and click Next.
    8. On the Request Certificates page, put a checkmark in the Web Server 2008 checkbox, and then click More information is required to enroll for this certificate.
    9. On the Subject tab of the Certificate Properties dialog box, in Subject name section, for Type, select Common Name.
    10. In the Value section, enter nls.corp.contoso.com, and then click Add.
    11. In the Alternative name section, for Type, select DNS.
    12. In Value, type nls.corp.contoso.com, and then click Add.
    13. Click OK, click Enroll, and then click Finish.
    14. In the details pane of the Certificates snap-in, verify that a new certificate with the name nls.corp.contoso.com was enrolled with Intended Purposes of Server Authentication.
    15. Right click the nls.corp.contoso.com certificate and click Properties.
    16. In the nls.corp.contoso.com Properties dialog box, in the Friendly name text box, enter NLS Certificate. Click OK. (Note: this is not required for the DirectAccess solution to work, but this makes the certificate easy to identify when binding it to the NLS Web site’s SSL listener).
    17. Close the console window. If you are prompted to save settings, click No.
    B. Configure the HTTPS Security Binding on the NLS Web Site on APP1

    After the web server role is installed, the web site certificate must be bound to the Network Location Server web site. This is required for the web server to establish an SSL connection with the computer configured as a DirectAccess client, and is a required component of a DirectAccess solution.

    1. On APP1, click Start, point to Administrative Tools, and then click Internet Information Services (IIS) Manager.
    2. In the left pane of the console, open APP1\Sites, and then click Default Web site.
    3. In the Actions pane, click Bindings.
    4. In the Site Bindings dialog box, click the https entry and then click Edit.
    5. In the Add Site Binding dialog box, in SSL Certificate, click the NLS Certificate.
    6. Click the View button.
    7. In the Certificate dialog box, confirm that the certificate was Issued to: nls.corp.contoso.com. (this is the name the DirectAccess client computer must use to connect to the Network Location Server).
    8. In the Add Site Binding dialog box, click OK.
    9. In the Edit Site Binding dialog box, click OK.
    10. In the Site Bindings dialog box, click Close.
    11. Close the Internet Information Services (IIS) Manager console.

    STEP 4: Install and Configure APP3

    APP3 is a Windows Server 2003 SP2 Enterprise Edition computer that acts as an IPv4 only host and is used to demonstrate DirectAccess connectivity to IPv4 only resources using the UAG DNS64 and NAT64 features. APP3 hosts both HTTP and SMB resources that the DirectAccess client computer will be able to access from other the simulated Internet. The UAG NAT64/DNS64 feature set enables organizations to deploy DirectAccess without requiring them to upgrade network resources to native IPv6 or even IPv6 capable.

    For more information on NAT64/DNS64 please see Deep Dive Into DirectAccess – NAT64 and DNS64 in Action

    The following operations are performed to configure APP3:

    A. Install the operating system on APP3 and Disable the Firewall
    The first step is to install Windows Server 2003 Enterprise Edition SP2 on APP3. This is not a requirement. You could use another IPv4 only operating system, such as Windows 2000 Server or even Windows XP. The goal is to provide an IPv4 resource for the DirectAccess clients to connect to from over the Internet.

    B. Install Web services on APP3
    Install IIS Web services on APP3 so that HTTP connectivity over the DirectAccess connection to an IPv4 only host is demonstrated.

    C. Create a shared folder on APP3
    Create a shared folder on APP3 to demonstrate SMB connectivity over the DirectAccess connection.

    A. Install the OS on APP3 and Disable the Firewall

    The first step is to install Windows Server 2003 Enterprise Edition SP2 on APP3. This is not a requirement. You could use another IPv4 only operating system, such as Windows 2000 Server or even Windows XP. The goal is to provide an IPv4 resource for the DirectAccess clients to connect to from over the Internet.

    1. Start the installation of Windows Server 2003.
    2. On the Welcome to the Windows Setup Wizard page, click Next.
    3. On the Regional and Language Options page, click Next.
    4. On the Personalize Your Software page, enter your Name and Organization information, click Next.
    5. On the Licensing Modes page, select Per server. Number of concurrent connections option and enter 100. Click Next.
    6. On the Computer Name and Administrator Password page, in the Computer name text box, enter APP3. Enter a complex Administrator password and Confirm password. Click Next.
    7. On the Date and Time Settings page, set the correct date and time and click Next.
    8. On the Networking Settings page, select Custom Settings and click Next.
    9. On the Networking Components page, select Internet Protocol (TCP/IP) and click Properties.
    10. On the Internet Protocol (TCP/IP) Properties page, select the Use the following IP address option. In the IP address text box, enter 10.0.0.4. In the Subnet Mask text box, enter 255.255.255.0 Select the Use the following DNS server addresses option. In the Preferred DNS server text box, enter 10.0.0.1.
    11. In the Internet Protocol (TCP/IP) Properties dialog box, click the Advanced button.
    12. In the Advanced TCP/IP Settings dialog box, click the DNS tab.
    13. On the DNS tab, in the DNS Suffix for this connection text box, enter corp.contoso.com. Click OK. In the Internet Protocol (TCP/IP) Properties dialog box, click OK. On the Networking Components page, click Next.
    14. On the Workgroup or Computer Domain page, select the Yes make this computer a member of the following domain option. In the text box under that option, enter CORP.
    15. In the Join Computer to CORP Domain dialog box, in the User name text box, enter CORP\User1 and in the Password text box, enter User1’s password. Click OK.
    16. Log on as CORP\User1.
    17. Click Start, point to Control Panel and point to Network Connections. Right click on Local Area Connection and click Properties.
    18. In the Local Area Connection Properties dialog box, click the Advanced tab.
    19. On the Advanced tab, click the Settings button.
    20. In the Windows Firewall dialog box, on the General tab, select the Off option. (Note: we are turning off the Windows Firewall as a convenience for this lab so that we can ping APP3. In a production environment, you should enable ping selectively through the Windows Firewall. You must enable ping requests to support Teredo DirectAccess clients).

    Note: If you install Windows Server 2003 RTM, there is no Windows Firewall and you will not need to disable the firewall.

    B. Install Web Services

    Install IIS Web services on APP3 so that HTTP connectivity can be demonstrated over the DirectAccess connection.

    1. At APP3, click Start and point to Control Panel. Click Add or Remove Programs.
    2. In the Add or Remove Programs window, click Add/Remove Windows Components button.
    3. On Windows Components page, click Application Server and then click Details.
    4. In the Application Server dialog box, put a checkmark in the Internet Information Services (IIS) checkbox. Click OK.
    5. On the Windows Components page, click Next.
    6. On the Completing the Windows Components Wizard page, click Finish.
    7. Close the Add or Remove Programs window.
    8. Click the Internet Explorer icon in the Quick Start Bar.
    9. In the dialog box that informs you Internet Explorer Enhanced Security Configuration is enabled, put a checkmark in the In the future, do not show this message checkbox and then click OK.
    10. In the Internet Explorer address bar, enter http://localhost and press ENTER.
    11. You should see the IIS Under Construction page, indicating that the default IIS Web site is available and running. Close the Internet Explorer window.
    C. Create a Shared Folder on C:\

    Create a shared folder on APP3 to demonstrate the ability to connect to an SMB resource on a IPv4 only computer on the DirectAccess connection over the Internet.

    1. At APP3, click Start and click Windows Explorer.
    2. In the left pane of the Windows Explorer window, expand My Computer and click Local Disk (C:)
    3. Click the File menu, point to New and click Folder.
    4. Rename New Folder to Files.
    5. Right click the Files folder and click Sharing and Security.
    6. In the Files Properties dialog box, on the Sharing tab, select the Share this folder option. Accept the default share name, which is Files. Click OK.
    7. Double click the Files folder.
    8. Click the File menu, point to new, and click New Text Document.
    9. Double click the New Text Document.txt file.
    10. In the New Text Document.txt – Notepad window, enter This is a new text document on APP3, and IPv4 only server.
    11. Close the Notepad window. In the Notepad dialog box, click Yes to save the changes.
    12. Close Windows Explorer.

    STEP 5: Configure UAG1

    UAG1 acts as the UAG DirectAccess server for the network. UAG1 will be connected to both the simulated Internet and the intranet and will need one network interface connected to each of these networks. The UAG DirectAccess server provides the following network services:

    · ISATAP router
    An ISATAP router is an IPv6 router that advertises subnet prefixes to ISATAP hosts and forwards IPv6 traffic between ISATAP hosts and hosts on other IPv4 subnets. The ISATAP router provides ISATAP clients the information they need to properly configure their ISATAP adapters. For more information about ISATAP, please see http://technet.microsoft.com/en-us/magazine/2008.03.cableguy.aspx

    · Teredo server
    A Teredo server is an IPv6/IPv4 node that is connected to both the IPv4 Internet and the IPv6 intranet, supports a Teredo tunneling interface over which packets are received. The general role of the Teredo server is to assist in the address configuration of Teredo clients and to facilitate the initial communication between Teredo clients and other Teredo clients or between Teredo clients and IPv6 hosts. The Teredo server listens on UDP port 3544 for Teredo traffic. DirectAccess clients located behind NAT devices and firewalls use Teredo to connect to the UAG DirectAccess server. For more information on Teredo, please see http://technet.microsoft.com/en-us/library/bb457011.aspx

    · IPsec gateway
    The Full Intranet access model (which is used in this lab document) allows DirectAccess clients to connect to all resources inside the intranet. It does this by using IPsec-based tunnel policies that require authentication and encryption and IPsec sessions terminate at the IPsec Gateway. The IPsec Gateway is a function that is hosted on the UAG DirectAccess server.

    · IP-HTTPS server
    IP-HTTPS is a new protocol for Windows 7 and Windows Server 2008 R2 that allows DirectAccess clients behind a Web proxy server or firewall to establish connectivity by tunneling IPv6 packets inside an IPv4-based HTTPS session. HTTPS is used instead of HTTP so that Web proxy servers will not attempt to examine the data stream and terminate the connection. The UAG DirectAccess server uses an IP-HTTPS listener to accept incoming IP-HTTPS connections. Note that IP-HTTPS does not work behind authenticating web proxies (when authentication is required) or from behind web proxies that perform outbound SSL inspection (such as the TMG 2010 firewall when outbound SSL inspection is enabled).

    · NAT64/DNS64 IPv6/IPv4 protocol translator
    The UAG DirectAccess server includes NAT64 and DNS64, which enables DirectAccess clients on the Internet to connect to IPv4 resources on the intranet. DirectAccess clients always use IPv6 to communicate with intranet servers. When a DirectAccess client needs to connect to IPv4 resources on the intranet, it issues a DNS query for the FQDN of the resource. DNS64 intercepts the request, sends the query to the intranet DNS server, and obtains the IPv4 address of the resource. DNS64 then dynamically generates an IPv6 address for the client to connect to; in addition, DNS64 informs NAT64 of the IPv4/IPv6 mapping. The client issues a request for the dynamically generated IPv6 address, which is intercepted by NAT64, and then NAT64 forwards the request to the IPv4 address of the intranet resource. NAT64 also returns the response based on entries in its state table. For more information about DNS64 and NAT64, please see http://blogs.technet.com/edgeaccessblog/archive/2009/09/08/deep-dive-into-directaccess-nat64-and-dns64-in-action.aspx

    · 6to4 relay router
    A 6to4 relay router can accept traffic from DirectAccess clients using the 6to4 IPv6 transition technology and forward the traffic over an IPv4 intranet. The UAG DirectAccess server acts as the 6to4 relay router and provides addressing information to the DirectAccess clients. DirectAccess clients use this information to configure their 6to4 tunnel adapters to forward IPv6 messages over the IPv4 Internet to the UAG DirectAccess servers. For more information on 6to4 please see http://technet.microsoft.com/en-us/library/cc756770(WS.10).aspx

    The following procedures are performed on the UAG1 computer or virtual machine:

    A. Rename UAG1
    Change the computer name assigned during setup of the Base Configuration to UAG1.

    B. Obtain a Certificate for the IP-HTTPS Listener on UAG1
    The UAG DirectAccess server uses an IP-HTTPS listener to accept incoming IP-HTTPS connections from DirectAccess clients on the Internet. The IP-HTTPS Listener requires a web site certificate to support the SSL connection between itself and the DirectAccess client.

    C. Install Forefront UAG on UAG1
    Install the Forefront Unified Access Gateway software on UAG1.

    D. Run the UAG Getting Started Wizard on UAG1
    The UAG Getting Started Wizard walks you through the process of initial configuration of the UAG server.

    E. Run the UAG DirectAccess Configuration Wizard on UAG1
    DirectAccess is not enabled by default. You must run the UAG DirectAccess wizard to enable DirectAccess features and capabilities on UAG1.

    F. Confirm Group Policy Settings on UAG1
    The UAG DirectAccess wizard configures GPOs and settings that are automatically deployed to the Active Directory. One GPO is assigned to the UAG DirectAccess server, and one is deployed to machines that belong to the DirectAccess Clients security group. The step confirms that the Group Policy settings were deployed to the UAG DirectAccess server.

    G. Confirm IPv6 Settings on UAG1
    For the DirectAccess solution to function, the IPv6 settings on must be correct. This step confirms these setting on UAG1.

    H. Update IPv6 Settings on DC1
    DC1 is capable of being an ISATAP host. However, this functionality might not be immediately available. This step expedites DC1 setting itself up as an ISATAP host by updating its IPv6 configuration.

    I. Update IPv6 Settings on APP1
    APP1 is capable of being an ISATAP host. However, this functionality might not be immediately available. This step expedites APP1 setting itself up as an ISATAP host by updating its IPv6 configuration.

    J. Confirm IPv6 Address Registrations in DNS
    IPv6 capable hosts can communicate with one another over IPv6 using their ISATAP adapters. However, they must be able to resolve the destination host to an IPv6 address to use this capability. This step confirms that the IPv6 ISATAP addressees are registered in DNS.

    K. Confirm IPv6 Connectivity between DC1/APP1/UAG1
    After activity the IPv6 settings on DC1, APP1 and UAG1, test IPv6 connectivity by using the ping utility.

    A. Rename the EDGE1 to UAG1

    Change the computer name of EDGE1 to UAG1.

    1. At the EDGE1 computer or virtual machine, click Start and then right click Computer. Click Properties.
    2. On the System page, click the Advanced system settings link.
    3. In the System Properties dialog box, click the Computer Name tab.
    4. On the Computer Name tab, click the Change button.
    5. In the Computer Name/Domain Changes dialog box, in the Computer name text box, enter UAG1. Click OK.
    6. Click OK in the Computer Name/Domain Changes dialog box informing you that you must restart the computer.
    7. Click Close in the System Properties dialog box.
    8. Click Restart Now in the dialog box informing you that you must restart to apply the changes.
    9. Log on as CORP\User1
    B. Obtain the IP-HTTPS Listener Certificate on UAG1

    The UAG DirectAccess server uses an IP-HTTPS listener to accept incoming IP-HTTPS connections from DirectAccess clients on the Internet. The IP-HTTPS Listener requires a web site certificate to support the SSL connection between itself and the DirectAccess client. The common name on this certificate must be the name the external DirectAccess client uses to connect to the IP-HTTPS Listener, and must be resolvable using an Internet based DNS server to the first of the two consecutive IP addresses bound to the external interface of the UAG DirectAccess server. Perform the following steps to obtain the IP-HTTPS certificate. In addition, you will request a new computer certificate for UAG1 that supports the machine’s new computer name.

    1. At UAG1, click Start, type mmc, and then press ENTER. Click Yes at the User Account Control prompt.
    2. Click File, and then click Add/Remove Snap-ins.
    3. Click Certificates, click Add, click Computer account, click Next, select Local computer, click Finish, and then click OK.
    4. In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
    5. In the middle pane of the console, click on the EDGE1.corp.contoso.com certificate and press the DELETE key on the keyboard. Right click an empty area in the middle pane, point to All Tasks and click Request New Certificate.
    6. On the Before You Begin page, click Next.
    7. On the Select Certificate Enrollment Policy page, click Active Directory Enrollment Policy and click Next.
    8. On the Request Certificates page, put a checkmark in the Computer checkbox and click Enroll, then click Finish.
    9. You should now see a new certificate for UAG1.corp.contoso.com with the Intended Purposes of Client Authentication and Server Authentication.
    10. Right-click Certificates, point to All Tasks, and then click Request New Certificate.
    11. Click Next twice.
    12. On the Request Certificates page, click Web Server 2008, and then click More information is required to enroll for this certificate.
    13. On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common Name.
    14. In Value, type uag1.contoso.com, and then click Add.
    15. In Alternative name, for Type, select DNS.
    16. In Value, enter uag1.contoso.com, and then click Add.
    17. Click OK, click Enroll, and then click Finish.
    18. In the details pane of the Certificates snap-in, verify that a new certificate with the name uag1.contoso.com was enrolled with Intended Purposes of Server Authentication.
    19. Right-click the certificate and then click Properties.
    20. In the Friendly Name text box, enter IP-HTTPS Certificate, and then click OK.
    21. Close the console window. If you are prompted to save settings, click No.
    C. Configure a DNS Entry on INET1 with the Name on the IP-HTTPS Certificate

    In order to connect to the IP-HTTPS listener on UAG1, the DirectAccess client needs to be able to resolve the subject name listed on the IP-HTTPS certificate. In this step you will configure INET1 with a Host (A) DNS record with the name uag1.contoso.com that resolves to 131.107.0.1.

    1. *At INET1, log on as Administrator.
    2. Click Start, point to Administrative Tools and click DNS.
    3. In the DNS Manager console, in the left pane, expand the server name and then expand Forward Lookup Zones. Click the contoso.com zone.
    4. Right click the contoso.com zone and click New Host (A or AAAA).
    5. In the New Host dialog box, in the Name text box, enter uag1. In the IP address text box, enter 131.107.0.2.
    6. Click Add Host. In the DNS dialog box, click OK.
    7. Click Done in the New Host dialog box.
    D. Install Forefront UAG Service Pack 1 on UAG1

    Install the Forefront Unified Access Gateway software on UAG1.

    1. *At UAG1, insert the Forefront UAG DVD into the optical drive. (Note: Ensure you install Forefront UAG from the DVD. Network installations are not supported.)
    2. Click Start, click Computer, double-click the DVD drive Forefront UAG 2010, and then double-click Setup.
    3. In the Setup window, under Prepare and Install, click Install Forefront UAG. Click Yes in the User Account Control dialog box.
    4. On the Welcome to the Forefront UAG 2010 with Service Pack 1 Setup Wizard page, click Next.
    5. Read the License Terms, and if you choose to proceed, select I accept the License Terms for Microsoft Software, and then click Next.
    6. On the Select Installation Location page, click Next, and wait for the installation to complete successfully.
    7. On the You have successfully completed the Forefront UAG Setup page, click Restart now, and then click Next. Wait for the server to restart.
    8. Log on to UAG1 as CORP\User1.
    E. Run the UAG Getting Started Wizard

    The UAG Getting Started Wizard walks you through the process of initial configuration of the UAG server. This will set up the basic information required to configure the networking settings on the server, define the server topology (standalone or array) and whether or not to join Microsoft update for updating the server.

    1. At UAG1, click Start, click All Programs, click Microsoft Forefront UAG, and then click Forefront UAG Management. Click Yes in the User Account Control dialog box. UAG will start to configure itself for the first time. The Getting Started Wizard splash screen appears.
    2. In the Getting Started Wizard, click Configure Network Settings to start the Network Configuration Wizard.
    3. On the Welcome to the Network Configuration Wizard page, click Next.
    4. On the Define Network Adapters page, select Corpnet in the Internal column, and Internet in the External column. Click Next.
    5. On the Define Internal Network IP Address Range page, verify that the range that appears is 10.0.0.0 to 10.0.0.255, and then click Next.
    6. On the Completing the Network Configuration Wizard page, click Finish.
    7. On the Getting Started Wizard, click Define Server Topology.
    8. On the Welcome to the Server Management Wizard page, click Next.
    9. On the Select Configuration page, select Single server, and then click Next.
    10. On the Completing the Server Management Wizard page, click Finish.
    11. In the Getting Started Wizard, click Join Microsoft Update.
    12. On the Welcome to the Server Configuration Wizard page, click Next.
    13. On the Use Microsoft Update for Forefront UAG page, select I don’t want to use Microsoft Update, and then click Next. (NOTE: in a production environment it is highly recommended that you select the use Microsoft Update option).
    14. On the Customer Experience Improvement Program page, select No, I do not want to participate and click Next. (NOTE: in a production environment it is highly recommended that you select the Yes, I am willing to participate anonymously in the Customer Experience Improvement program.).
    15. On the Completing the Server Configuration Wizard page, click Finish.
    16. On the Getting Started Wizard page, click Close.
    17. In the Getting Started Wizard dialog box, when prompted Do you want to activate the configuration now, click Yes.
    18. On the Activate Configuration page, enter a password and confirm the password for the backup file that will save the current UAG configuration. Click Next.
    19. On the Activate Configuration page, confirm that there is a checkmark in the Back up configuration before performing this activation checkbox, then click Activate.
    20. Wait for the Activation completed successfully message, and then click Finish.
    21. To exit the Microsoft Forefront UAG Management console, click the File menu, click Exit, and then click Yes when prompted Do you want to close the Forefront UAG Management console.
    F. Run the UAG DirectAccess Configuration Wizard on UAG1

    DirectAccess is not enabled by default. To enable DirectAccess features and capabilities on UAG1, you need to run the DirectAccess Configuration wizard. After running the DirectAccess Configuration Wizard, two new Group Policy objects are created – one is linked to the computer account for the UAG DirectAccess server, and the second is linked to the DirectAccess clients security group (DA_Clients) you configured earlier. In addition, the IPv6 components, including support for IPv6 transition technologies and IPv6/IPv4 protocol transition technologies are enabled on the UAG DirectAccess server.

    1. Click Start, point to All Programs, click Microsoft Forefront UAG, and then click Forefront UAG Management. Click Yes in the User Account Control dialog box.
    2. In the left pane of the Forefront Unified Access Gateway console, click DirectAccess. In the Forefront UAG DirectAccess Configuration pane, in the Step 1 Clients and GPOs section, click the Configure link.
    3. This opens the Clients and GPOs Configuration wizard. On the Deployment Model page, select the Allow DirectAccess clients to connect to internal networks, and enable remote management of DirectAccess clients option. Click Next.
    4. On the Client Domains page, notice that corp.contoso.com is automatically listed in the Enable DirectAccess for client computers in these domains list. Click Next.
    5. On the Policy Management page, notice that the Automatically generate the following GPOs for DirectAccess policies option is selected and that names and locations for the Clients, Gateway and Application Servers GPOs are automatically listed. Click Next.
    6. On the Client Groups page, select the Security Groups option and click Add.
    7. In the Select Group dialog box, in the Enter the object name to select text box, enter DA_Clients. Click OK.
    8. Click Finish.
    9. In the Step 2 DirectAccess Server section, click the Configure link.
    10. This brings up the UAG DirectAccess Server Configuration wizard. On the Connectivity page, in the Internet-facing section, click the down arrow in the First Internet-facing IPv4 address drop down box and click 131.107.0.2. In the Internal section, click the down arrow in the Internal IPv4 address used when ISATAP is deployed on the UAG DirectAccess server and click 10.0.0.2. Click Next.
    11. On the IP-HTTPS page, click the Browse button. In the Windows Security dialog box, click the IP-HTTPS Certificate and click OK.
    12. On the IP-HTTPS Certificate page, note that in the Select the server certificate used to authenticate to DirectAccess clients section that it says CN=uag1.contoso.com. This is the name that the DirectAccess clients use to connect to the IP-HTTPS listener on the UAG DirectAccess server. Click Next.
    13. On the IPsec Certificate Authentication page, select the Use a certificate from a trusted root CA option, then click the Browse button next to that option. In the Windows Security dialog box, click corp-DC1-CA and then click OK.
    14. On the IPsec Certificate Authentication page, click Finish.
    15. In the Step 3 Infrastructure Servers section, click the Configure link.
    16. This brings up the Infrastructure Server Configuration wizard. In the Specify the URL used to access the network location server text box, enter nls.corp.contoso.com, then click Validate. Click Next.
    17. On the DNS Suffixes page, click Next.
    18. On the Authentication Domains page, confirm that corp.contoso.com is included in the Enable DirectAccess for user accounts in these domains and click Next.
    19. On the Management Servers page, click the Domain Controllers entry in the Built-In Server Groups tree. Notice in the right pane that DC1.corp.contoso.com is automatically discovered. Click Finish.
    20. In the UAG DirectAccess pane, click Apply Policy.
    21. On the Forefront UAG DirectAccess Configuration Review page, click Apply Now.
    22. In the DirectAccess Policy Configuration dialog box, click OK.
    23. On the Forefront UAG DirectAccess Configuration Review page, click Close.
    24. Open an elevated command prompt. In the command prompt window enter gpupdate /force and press ENTER. Wait for the command to complete and then close the command prompt window.
    25. In the UAG DirectAccess pane, click the Activate button on the bottom of the pane.
    26. On the Activate Configuration page, confirm that there is a checkbox in the Back up configuration before performing this activation checkbox and click Activate. Click Finish on the Activate Configuration page after the activation is completed.
    27. To exit the Microsoft Forefront UAG Management console, click the File menu, click Exit, and then click Yes when prompted Do you want to close the Forefront UAG Management console.
    G. Confirm Group Policy Settings on UAG1

    The UAG DirectAccess wizard configures GPOs and settings that are automatically deployed to the Active Directory. One GPO is assigned to the UAG DirectAccess server, and one is deployed to machines that belong to the DirectAccess Clients security group. The following steps confirm that the Group Policy settings were deployed to the UAG DirectAccess server.

    1. *Go to the DC1. At DC1, click Start, point to Administrative Tools and click Group Policy Management.
    2. Expand Forest: corp.contoso.com and then expand Domains and then expand corp.contoso.com. Then expand Group Policy Objects.
    3. You will find three new GPOs, two of which are currently linked to the default domain policy. UAG DirectAccess: Clients (UAG1.CORP.CONTOSO.COM) is applied to members of the DA_Clients security group. UAG DirectAccess: Gateways (UAG1.CORP.CONTOSO.COM) is applied to the UAG server. There is also a Group Policy Object named UAG DirectAccess: AppServers (UAG1.CORP.CONTOSO.COM) which is applied when you configure end-to-end security in the UAG DirectAccess wizard. Confirm that the correct security filtering is done for each of these Group Policy Objects by clicking on the GPO and then viewing the entries in the Security Filtering section on the Scope tab in the right pane of the console.
    4. *Go to the UAG1. Open an elevated command prompt. Change the focus to c:\Users\User1\Desktop (enter cd c:\Users\User1\Desktop and press ENTER).
    5. At the command prompt, enter gpresult /scope computer /f /h report.html and press ENTER
    6. On the desktop, double click the report file. In the Group Policy Objects section, notice in the Group Policy Objects\Applied GPOs section that UAG DirectAccess: Gateways (UAG1.CORP.CONTOSO.COM) appears, showing that the DirectAccess server GPO has been applied to UAG1. Close the Internet Explorer window.
    7. Click Start and enter wf.msc in the Search box and press ENTER.
    8. In the Windows Firewall with Advanced Security console, notice in the middle pane that it says that the Domain Profile is Active and Public Profile is Active. It is important that the Windows Firewall is enabled and both the Domain and Public Profiles are active. If the Windows Firewall with Advanced Security is disabled, or if Domain or Public profiles are disabled, then DirectAccess will not work correctly.
    9. In the left pane of the Windows Firewall with Advanced Security Console, click the Connection Security Rules node. Notice in the middle pane of the console that there are two connection security rules: UAG DirectAccess Gateway – Clients Access Enabling Tunnel – All and UAG DirectAccess Gateway – Clients Corp Tunnel. The first rule is used for the infrastructure tunnel and the second rule is used to establish the intranet tunnel. Both of these rules are delivered to UAG1 using Group Policy.
    10. Close the Windows Firewall with Advanced Security console.
    H. Confirm IPv6 Settings on UAG1

    For the DirectAccess solution to function, the IPv6 settings on must be correct. The following steps confirm these setting on UAG1.

    1. At UAG1, click Start and right click on the command prompt and click Run as administrator. Click Yes in the User Account Control dialog box.
    2. In the command prompt window, enter ipconfig /all and press ENTER.
    3. The ipconfig /all display shows information related to the UAG1 networking configuration. There are several sections of interest. The Tunnel adapter 6TO4 Adapter section shows information that includes the Global IPv6 address used by UAG1 on its external interface. The Tunnel adapter isatap.corp.contoso.com section shows information regarding UAG1’s ISATAP interface; here you find the ISATAP address for UAG1. In the Tunnel adapter IPHTTPSInterface section, you’ll see information regarding the IP-HTTPS interface. Using the IP addressing scheme used in this lab, you should see the following addresses:
      6TO4 Adapter: 2002:836b:2::836b:2 and 2002:836b:2::836b:3
      ISATAP: 2002:836b:2:8000:0:5efe:10.0.0.2
      IPHTTPS: 2002:836b:2:8100:
      c887:6a74:6ef0:bf (Note that the “debolded” values will vary due to how the IP-HTTPS address is generated)
    4. To see information regarding the Teredo interface on UAG1, enter netsh interface Teredo show state and press ENTER. The output should include an entry State: online
    I. Update IPv6 Settings on DC1

    DC1 is capable of being an ISATAP host. However, this functionality might not be immediately available. You can expedite DC1 setting itself up as an ISATAP host by updating its IPv6 configuration.

    1. *At DC1, click Start and then right click the command prompt icon. Click Run as administrator.
    2. In the command prompt window, enter sc control iphlpsvc paramchange and press ENTER.
    3. Close the command prompt window after the command completes.
    J. Update IPv6 Settings on APP1

    APP1 is capable of being an ISATAP host. However, this functionality might not be immediately available. You can expedite DC1 setting itself up as an ISATAP host by updating its IPv6 configuration.

    1. *At APP1, click Start and then right click the command prompt icon. Click Run as administrator.
    2. In the command prompt window, enter sc control iphlpsvc paramchange and press ENTER.
    3. Close the command prompt window after the command completes.
    K. Confirm IPv6 Address Registration in DNS

    IPv6 capable hosts can communicate with one another over an IPv4 network with IPv6 using their ISATAP adapters. However, they must be able to resolve the destination host to an IPv6 address to use this capability. The following steps confirm that the IPv6 ISATAP addressees are registered in DNS.

    1. *At DC1, click Start, point to Administrative Tools and click DNS.
    2. In the DNS Manager, expand the server name, then expand the Forward Lookup Zones node in the left pane of the console. Click corp.contoso.com.
    3. Click the Name column in the right pane of the console so that computer names are listed alphabetically. For APP1, DC1 and UAG1 there should be an IPv4 address and IPv6 address. If there is no IPv6 address, return to the machine that does not have an IPv6 address and open an elevated command prompt. At the elevated command prompt enter ipconfig /registerdns. Then return to the DNS console on DC1 and confirm that the IPv6 address is registered in DNS. If the IPv6 address does not appear in the console, refresh the console view.

    Note that the ISATAP addresses listed in the DNS resource records do not use the dotted decimal format for the last 32 bits of the IPv6 address that you see when using ipconfig to view IP addressing information on the hosts. However, these addresses represent the same information; the only difference is that the last 32 bits are represented in HEX instead of dotted decimal format.

    L. Confirm IPv6 Connectivity between DC1/APP1/UAG1

    After activating the IPv6 settings on DC1, APP1 and UAG1, test IPv6 connectivity by using the ping utility

    1. *At DC1, click Start and right click the command prompt icon and click Run as administrator.
    2. In the command prompt window, enter ipconfig /flushdns to remove IPv4 address entries that might already be in the DNS client cache.
    3. In the command prompt window, enter ping UAG1 and press ENTER. You should see the ISATAP address of UAG1 in the reply, which is 2002:836b:2:8000:0:5efe:10.0.0.2.
    4. In the command prompt window, enter ping APP1 and press ENTER. You should see the ISATAP address of APP1 in the reply, which is 2002:836b:2:8000:0:5efe:10.0.0.3. Close the command prompt window.
    5. *At UAG1, use an elevated command prompt window and ping DC1 and APP1 and confirm that the responses are from the ISATAP addresses of those servers. The close the command prompt window

    STEP 6: Configure CLIENT1

    CLIENT1 is a computer or virtual machine running Windows 7 Ultimate Edition that is used demonstrate how DirectAccess works in a number of scenarios. CLIENT1 is first connected to the corpnet subnet to receive the DirectAccess Group Policy settings. CLIENT1 is later moved to the simulated Internet to test DirectAccess connectivity over 6to4 and CLIENT1 is moved behind a NAT device to test both Teredo and IP-HTTPS DirectAccess connectivity.

    NOTE:
    CLIENT1 is a Windows 7 computer and after installation the default power plan is applied. CLIENT1 may go to sleep before you reach the end of the lab configuration. To prevent this from happening, select the High Performance power plan in the Control Panel.

    The following operations configure CLIENT1:

    A. Add CLIENT1 to the DA_Clients Active Directory Security Group
    The DirectAccess client settings are assigned only to members of the security group designated for DirectAccess clients. Place CLIENT1 in the DA_Clients security group so that the Group Policy settings are assigned to CLIENT1.

    B. Test IPv6 Configuration, Confirm Group Policy Settings and Machine Certificate on CLIENT1
    Before moving CLIENT1 out of the corpnet and onto the simulated Internet and behind a NAT device, check the IPv6 configuration on CLIENT1, confirm that DirectAccess client Group Policy Settings are enabled on CLIENT1, and that CLIENT1 has the computer certificate required to establish the IPsec connections to the UAG DirectAccess server.

    C. Test Connectivity to a Network Share and Network Location Server
    The final check on CLIENT1 before moving it outside the corpnet is to confirm connectivity to a network share on the corpnet and to the Network Location Server. Connectivity to the Network Location Server is required so that the DirectAccess client can determine if it is on-network or off-network.

    A. Add CLIENT1 to the DA_Clients Security Group

    The DirectAccess client settings are assigned only to members of the security group designated for DirectAccess clients. You will place CLIENT1 in the DA_Clients security group so that the Group Policy settings are assigned to CLIENT1.

    1. *On the DC1 computer or virtual machine, click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
    2. In the console tree, expand corp.contoso.com, and then click Users.
    3. In the details pane, double-click DA_Clients.
    4. In the DA_Clients Properties dialog box, click the Members tab, and then click Add.
    5. In the Select Users, Contacts, Computers, or Groups dialog box, click Object Types, click Computers, and then click OK.
    6. Under Enter the object names to select (examples), type CLIENT1, and then click OK.
    7. Verify that CLIENT1 is displayed below Members, and then click OK.
    8. Close the Active Directory Users and Computers console.
    9. *On CLIENT1, start the computer and log on as CORP\User1. If CLIENT1 is already started, restart the computer and log on as CORP\User1.
    B. Test IPv6 Configuration, Confirm Group Policy Settings and Machine Certificate on CLIENT1

    Before moving CLIENT1 out of the corpnet subnet and onto the simulated Internet and behind a NAT device on the Internet, check the IPv6 configuration on CLIENT1, confirm that DirectAccess client Group Policy Settings are enabled on CLIENT1, and that CLIENT1 has the computer certificate required to establish the IPsec connections to the UAG DirectAccess server.

    1. On the CLIENT1 computer or virtual machine, click Start and then click All Programs. Click Accessories and then right click command prompt. Click Run as administrator. Click Yes in the UAC dialog box.
    2. In the command prompt window, enter ping dc1 and press ENTER. Confirm that the reply comes from an IPv6 ISATAP address, 2002:836b:2:8000:0:5efe:10.0.0.1.
    3. Ping APP1 and UAG1 to confirm that both these machines reply with IPv6 ISATAP addresses, 2002:836b:2:8000:0:5efe:10.0.0.3 and 2002:836b:2:8000:0:5efe:10.0.0.2.
    4. In the command prompt window, enter netsh namespace show policy and press ENTER. This command shows the DNS Name Resolution Policy Table (NRPT) settings, which were provided to CLIENT1 via Group Policy. For more information about DirectAccess and the NRPT, please see http://technet.microsoft.com/en-us/library/dd637795(WS.10).aspx
    5. In the command prompt window, enter netsh namespace show effectivepolicy and press ENTER. This command shows the current DNS name resolution policy table settings and indicates that the client is in the corporate network and Name Resolution Policy Table (NRPT) settings are turned off.
    6. In the command prompt window, enter certutil –store my and press ENTER. The output will display information about the certificate installed on CLIENT1. The subject name on the certificate should be CN=CLIENT1.corp.contoso.com and the certificate template name (certificate type) should be Machine, Computer. This machine certificate was assigned using Group Policy autoenrollment and will be used to create the IPsec tunnels between CLIENT1 and UAG1 when CLIENT1 leaves the corporate network.
    C. Test Connectivity to a Network Share and the Network Location Server

    The final check on CLIENT1 before moving it outside the corpnet subnet is to confirm connectivity to a network share on the corpnet subnet and to the Network Location Server. Connectivity to the Network Location Server is required so that the DirectAccess client can determine if it is on or off the corporate network.

    1. On CLIENT1, from the taskbar, click the Internet Explorer icon.
    2. In the Welcome to Internet Explorer 8 window, click Next. In the Turn on Suggested Sites window, click No, don’t turn on, and then click Next. In the Choose your settings dialog box, click Use express settings, and then click Finish.
    3. In the Toolbar, click Tools, and then click Internet Options. For Home page, click Use blank, and then click OK.
    4. In the Address bar, enter https://nls.corp.contoso.com/, and then press ENTER. You should see the default IIS 7 Web page on DC1.
    5. Close the Internet Explorer window.
    6. Click Start, enter \\DC1\Files, and then press ENTER.
    7. You should see a folder window with the contents of the Files file share.
    8. In the Files folder window, double-click the Example.txt file. You should see the contents of the Example.txt file. Close the example.txt - Notepad and the Files folder windows.

    STEP 7: Configure NAT1

    NAT1 is a Windows 7 computer configured as a NAT device that separates a private network from the Internet. The built-in Internet Connection Service (ICS) is used to provide the NAT server functionality. ICS includes DHCP server-like functionality and automatically assigns IP addressing information to clients located behind the NAT1 ICS NAT device. NAT1 has two network interfaces – one connected to the simulated Internet and one connected to a Homenet subnet.

    NOTE:
    NAT1 is a Windows 7 computer and after installation the default power plan is applied. NAT1 may go to sleep before you reach the end of the lab configuration. You can prevent this from happening by selecting the High Performance power plan in the Control Panel.

    Perform the following operations to configure NAT1 as a NAT device:

    A. Install the operating system on NAT1
    The first step is to install the Windows 7 operating system.

    B. Rename the interfaces on NAT1
    Rename the network interfaces in the Network Connections window to make them easier to identify. Note that this is not required, but makes applying the correct settings on the appropriate interface easier.

    C. Disable 6to4 functionality on NAT1
    Disable 6to4 functionality on NAT 1. The reason for this is that if you don’t disable 6to4 on NAT1, it will act as a 6to4 router and issue a 6to4 address to CLIENT1 when it is connect to the Homenet subnet. This will prevent CLIENT1 from acting as a Teredo or IP-HTTPS DirectAccess client.

    D. Configure ICS on the External Interface of NAT1
    Internet Connection Services enable NAT1 to act as a NAT device and DHCP server for clients located behind NAT1. This enables CLIENT1 to automatically obtain IP addressing information and connect to the simulated Internet when connected to the Homenet subnet behind NAT1.

    A. Install the OS on NAT1

    The first step is to install the Windows 7 operating system.

    1. At NAT1, connect one network adapter to the Internet subnet or virtual switch, and the other to the Homenet subnet or virtual switch.
    2. Start the installation of Windows 7 Ultimate Edition.
    3. When prompted for a user name, enter User1. When prompted for a computer name, enter NAT1.
    4. When prompted for a password, enter a strong password twice.
    5. If prompted for a Password Hint, enter a password hint.
    6. When prompted for protection settings, click Use recommended settings.
    7. When prompted for your computer's current location, click Public network.
    B. Rename the Network Interfaces on NAT1

    In this step you rename the network interfaces in the Network Connections window to make them easier to identify. Note that this is not required, but makes applying the correct settings on the appropriate interface easier.

    1. Click Start, and then click Control Panel.
    2. Under Network and Internet, click View status and tasks, and then click Change adapter settings.
    3. In the Network Connections window, right-click the network connection that is connected to the Homenet subnet, and then click Rename.
    4. Enter Homenet, and then press ENTER.
    5. In the Network Connections window, right-click the network connection that is connected to the Internet subnet, and then click Rename.
    6. Enter Internet, and then press ENTER.
    7. Leave the Network Connections window open for the next procedure.
    8. Click Start, click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator.
    9. To check network communication between NAT1 and INET1, in the command window, type ping inet1.isp.example.com, and then press ENTER.
    10. Verify that there are four responses from 131.107.0.1.
    C. Disable 6to4 on NAT1

    In the lab environment we use a Windows 7 computer to simulate a NAT device located in a remote location. One issue with Windows 7 when configured as an Internet Connection Service server is that it can act as a 6to4 router. When this is the case, it might assign the CLIENT1 computer behind the NAT1 ICS computer a 6to4 address and prevent it from acting as a Teredo and IP-HTTPS client. In order to demonstrate both Teredo and IP-HTTPS functionality, 6to4 functionality on the NAT1 is disabled.

    1. In an elevated command prompt window, enter netsh interface 6to4 set state state=disabled, and then press ENTER. An Ok response is returned after the command completes.
    2. Close the command window.
    D. Configure ICS on the External Interface of NAT1

    Internet Connection Services enable NAT1 to act as a NAT device and DHCP server for clients located behind NAT1. This enables CLIENT1 to automatically obtain IP addressing information and connect to the simulated Internet when connected to the Homenet subnet behind NAT1.

    1. At NAT1, in the Network Connections window, right-click Internet, and then click Properties.
    2. Click the Sharing tab, select Allow other network users to connect through this computer’s Internet connection, and then click OK.
    3. Right click the Homenet interface on NAT1 and click Status.
    4. In the Local Area Connection Status dialog box, on the General tab, click the Details button.
    5. In the Network Connection Details dialog box, notice that the internal interface has been assigned an IP address and subnet mask by the Internet Connection Service, using a network ID of 192.168.137.0/24. DHCP clients placed behind NAT1 obtain an IP address on this network ID and DNS server settings from the Internet Connection Services.
    6. Click Close in the Network Connection Details dialog box, and click Close in the Local Area Connection Status dialog box.
    7. Close the Network Connections window.

    STEP 8: Test DirectAccess Connectivity from the Internet

    CLIENT1 is now ready for DirectAccess testing. In the first set of tests, you connect CLIENT1 to the simulated Internet. When connected to the simulated Internet, CLIENT1 is assigned a public IPv4 address. When a DirectAccess client is assigned a public IPv4 address, it will try to establish a connection to the DirectAccess server using an IPv6 6to4 connection over its 6to4 tunnel adapter. After connecting to the simulated Internet and establishing the DirectAccess connection, you perform a number of tests to confirm IPv6 connectivity and connectivity to corpnet assets from over the simulated Internet.

    1. Unplug CLIENT1 from the corpnet switch and connect it to the Internet switch. Wait for 30 seconds.
    2. Open an elevated command prompt. In the command prompt window, enter ipconfig /all and press ENTER.
    3. Examine the output from the ipconfig command. CLIENT1 is now connected to the Internet and has a public IPv4 address. When the DirectAccess client has a public IPv4 address, it will use the 6to4 IPv6 transition technology to tunnel the IPv6 messages over an IPv4 Internet between the DirectAccess client and UAG DirectAccess server. Look at the information in the Tunnel adapter 6TO4 adapter. You see a tunnel adapter address that begins with 2002:836b, which is a globally routable address. You will also see a default gateway, which is the first of the two consecutive IPv6 6to4 IP addresses assigned to the UAG DirectAccess server. This address should be 2002:836b:2::836b:2. Note the DNS server entry in this section. This is the DNS server that is used to access any resource other than what is accessible over the DirectAccess connection.
    4. In the command prompt window, enter ipconfig /flushdns and press ENTER. This flushes name resolution entries that may still exist in the client DNS cache from when CLIENT1 was connected to the corpnet.
    5. In the command prompt window, enter ping dc1 and press ENTER. You should see replies from the ISATAP address assigned to DC1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.1
    6. In the command prompt window, enter ping app1 and press ENTER. You should see replies from the ISATAP address assigned to DC2, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.3
    7. In the command prompt window, enter ping uag1 and press ENTER. You should see replies from the ISATAP address assigned to UAG1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.2
    8. In the command prompt window, enter ping app3 and press ENTER. You should see replies from the NAT64 address assigned by UAG1 to APP3, which in this case is 2002:836b:2:8001::a00:4 The ability to ping APP3 is important, because success indicates that you were able to establish a connection using NAT64/DNS64, as APP3 is an IPv4 only resource.
    9. In the command prompt window, enter netsh namespace show effectivepolicy and press ENTER. The output shows the current settings for the Name Resolution Policy Table (NRPT). These settings indicate that all connections to .corp.contoso.com should be resolved by the DirectAccess DNS Server, which is the UAG DirectAccess server, with the IPv6 address of 2002:836b:3::836b:3. Also, note the NRPT entry indicating that there is an exemption for the name nls.corp.contoso.com; names on the exemption list are not answered by the DirectAccess DNS server. You can ping the DirectAccess DNS server IP address to confirm connectivity to the DirectAccess server; for example, you can ping 2002:836b:3::836b:3.
    10. Open Internet Explorer and click the Tools menu and click Internet Options. In the Internet Options dialog box, on the General tab, click the Use Blank button to set the default Web page as blank. Close the Internet Explorer window.
    11. In the Internet Explorer address bar, enter http://app1.corp.contoso.com and press ENTER. You will see the default IIS site on APP1.
    12. In the Internet Explorer address bar, enter http://app3.corp.contoso.com and press ENTER. You will see the default web site on APP3.
    13. Click Start and in the Search box, enter \\App3\Files and press ENTER. Double click on the New Text Document file. This demonstrates that you were able to connect to an IPv4 only server using SMB to obtain a resource in the resource domain.
    14. Click Start and in the Search box, enter wf.msc and press ENTER.
    15. In the Windows Firewall with Advanced Security console, notice that only the Public Profile is active. The Windows Firewall must be enabled for DirectAccess to work correctly. If for some reason that the Windows Firewall were disabled, DirectAccess connectivity would fail.
    16. Expand the Monitoring node in the left pane of the console and click the Connection Security Rules node. You should see the active connection security rules: UAG DirectAccess Client – Client Access Enabling Tunnel – All, UAG DirectAccess Client – Clients Corp Tunnel and UAG DirectAccess Client – Exempt NLA. Scroll the middle pane to the right to expose the 1st Authentication Methods and 2nd Authentication Methods columns. Notice that the first rule uses NTLMv2 to establish the infrastructure tunnel and the second rule uses Kerberos V5 to establish the intranet tunnel. The second tunnel is required to connect to APP1 and APP3, since they are not on the management servers list.
    17. In the left pane of the console, expand the Security Associations node and click the Main Mode node. Notice the infrastructure tunnel security associations using NTLMv2 and the intranet tunnel security association using Kerberos V5. Right click the entry that shows User (Kerberos V5) as the 2nd Authentication Method and click Properties. On the General tab, notice the Second authentication Local ID is CORP\User1, indicating that User1 was able to successfully authenticate to the CORP domain using Kerberos.
    18. Click Start and right click on Computer and click Properties. Click the Remote Settings link in the left pane of the console. On the Remote tab, in the Remote Desktop section, select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) and click OK. This enables Remote Desktop Connections from Windows Vista and above and Windows 2008 and above computers for remote management. We will use this feature to test the ability to remotely manage DirectAccess clients from management servers on the corpnet.
    19. *Move to the DC1 computer or virtual machine. Click Start and enter mstsc and press ENTER. In the Remote Desktop Connection dialog box, in the Computer text box, enter client1.corp.contoso.com and click Connect. In the Windows Security dialog box, select Use another account. In the User name text box enter CORP\User1 and enter User1’s password and click OK. The Remote Desktop Session is successfully established. Note that when you connect from an infrastructure server, you can establish the connection even before the user logs in, increasing your ability to manage DirectAccess client machines on the Internet.
      NOTE: You are able to “manage out” CLIENT1 without creating special Firewall Rules because it is acting as a 6to4 IPv6 host. In order to remotely manage Teredo and IP-HTTPS DirectAccess clients, you will need to configure special Firewall Rules that enable inbound access for the protocol or service and enable “edge traversal” for that Firewall Rule.
    20. Close the Remote Desktop Connection window. Click OK in the Remote Desktop Connection dialog box that informs you that this will disconnect your session.
    21. *Return to CLIENT1. Log on as CORP\User1.
    22. Close the System Control Panel window and the Windows Firewall with Advanced Security console. Close all other open windows before moving to the next step.

    STEP 9: Test DirectAccess Connectivity from Behind a NAT Device

    When a DirectAccess client is connected to the Internet from behind a NAT device or a Web proxy server, the DirectAccess client uses either Teredo or IP-HTTPS to connect to the DirectAccess server. If the NAT device enables outbound UDP port 3544 to the DirectAccess server’s public IP address, then Teredo is used. If Teredo access is not available, the DirectAccess client falls back to IP-HTTPS over outbound TCP port 443, which enables access through firewalls or Web proxy servers over the traditional SSL port. Teredo is the preferred access method, because of its superior performance over IP-HTTPS. In addition, if the web proxy requires authentication, the IP-HTTPS connection will fail. IP-HTTPS connections also fail if the web proxy performs outbound SSL inspection, due to the fact that the HTTPS session is terminated at the web proxy instead of the UAG DirectAccess server. In this section you will perform the same tests performed when connecting using a 6to4 connection in the previous section.

    The following procedures are performed on CLIENT1:

    A. Test Teredo Connectivity. The first set of tests are performed when the DirectAccess client is configured to use Teredo. This is the automatic setting when the NAT device allows outbound access to UDP port 3544

    B. Test IP-HTTPS Connectivity. The second set of tests are performed when the DirectAccess client is configured to use IP-HTTPS. In order to demonstrate IP-HTTPS connectivity, Teredo is disabled on CLIENT1.

    A. Testing Teredo Connectivity

    The DirectAccess client can use either Teredo or IP-HTTPS when connecting to the DirectAccess server from behind a NAT device. You will first examine the settings and test connectivity using Teredo.

    1. Unplug CLIENT1 from the Internet switch and connect it to the Homenet switch. If asked what type of network you want to define the current network, select Home Network.
    2. Open an elevated command prompt. In the command prompt window, enter ipconfig /all and press ENTER.
    3. Examine the output of the ipconfig command. This computer is now connected to the Internet from behind a NAT device and is assigned a private IPv4 address. When the DirectAccess client is behind a NAT device and assigned a private IPv4 address, the preferred IPv6 transition technology is Teredo. If you look at the output of the ipconfig command, you should see a section for Tunnel adapter Local Area Connection and then a Description Teredo Tunneling Pseudo-Interface, with an IP address that starts with 2001: consistent with being a Teredo address. You will not see a default gateway listed for the Teredo tunnel adapter.
    4. In the command prompt window, enter ipconfig /flushdns and press ENTER. This will flush name resolution entries that may still exist in the client DNS cache from when CLIENT1 was connected to the Internet.
    5. In the command prompt window, enter ping dc1 and press ENTER. You should see replies from the ISATAP address assigned to DC1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.1
    6. In the command prompt window, enter ping app1 and press ENTER. You should see replies from the ISATAP address assigned to APP1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.3
    7. In the command prompt window, enter ping uag1 and press ENTER. You should see replies from the ISATAP address assigned to UAG1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.2
    8. In the command prompt window, enter ping app3 and press ENTER. You should see replies from the NAT64 address assigned by UAG1 to APP3, which in this case is 2002:836b:2:8001::a00:4
    9. In the command prompt window, enter netsh namespace show effectivepolicy and press ENTER. The output shows the current settings for the Name Resolution Policy Table (NRPT). These settings indicate that all connections to .corp.contoso.com should be resolved by the DirectAccess DNS Server, which is the UAG DirectAccess server, with the IPv6 address of 2002:836b:3::836b:3. Also, note the NRPT entry indicating that there is an exemption for the name nls.corp.contoso.com; names on the exemption list are not answered by the DirectAccess DNS server. You can ping the DirectAccess DNS server IP address to confirm connectivity to the DirectAccess server; for example, you can ping 2002:836b:3::836b:3 in this example.
    10. In the Internet Explorer address bar, enter http://app1.corp.contoso.com and press ENTER. You will see the default IIS site on DC2.
    11. In the Internet Explorer address bar, enter http://app3.corp.contoso.com and press ENTER. You will see the default web site on APP3.
    12. Click Start and in the Search box, enter \\App3\Files and press ENTER. Double click on the New Text Document file. This demonstrates that you were able to connect to an IPv4 only server using SMB to obtain a resource on an IPv4 only host.
    13. Click Start and in the Search box, enter Firewall and press ENTER.
    14. In the Windows Firewall with Advanced Security console, notice that only the Private profile is active. The Windows Firewall must be enabled for DirectAccess to work correctly. If for some reason the Windows Firewall were disabled, DirectAccess connectivity would fail.
    15. Expand the Monitoring node in the left pane of the console and click the Connection Security Rules node. You should see the active connection security rules: UAG DirectAccess Client – Client Access Enabling Tunnel – All, UAG DirectAccess Client – Clients Corp Tunnel and UAG DirectAccess Client – Exempt NLA. Scroll the middle pane to the right to expose the 1st Authentication Methods and 2nd Authentication Methods columns. Notice that the first rule uses NTLMv2 to establish the infrastructure tunnel and the second rule uses Kerberos V5 to establish the intranet tunnel.
    16. In the left pane of the console, expand the Security Associations node and click the Main Mode node. Notice the infrastructure tunnel security associations using NTLMv2 and the intranet tunnel security association using Kerberos V5. Right click the entry that shows User (Kerberos V5) as the 2nd Authentication Method and click Properties. On the General tab, notice the Second authentication Local ID is CORP\User1, indicating that User1 was able to successfully authenticate to the CORP domain using Kerberos to establish the second tunnel (intranet tunnel).
    17. Close the System Control Panel window and the Windows Firewall with Advanced Security console. Close all other open windows before moving to the next step.
    B. Testing IP-HTTPS Connectivity

    When the DirectAccess client is unable to establish a Teredo connection with the DirectAccess server (typically when a firewall or router has blocked outbound UDP port 3544), the DirectAccess client configures itself to use IP-HTTPS to tunnel IPv6 messages over the IPv4 Internet. In the following exercises you confirm that the host is configured as an IP-HTTPS host and check connectivity.

    1. Open an elevated command prompt. In the command prompt window, enter netsh interface teredo set state disabled and press ENTER. This disables Teredo on CLIENT1 and enables CLIENT1 to configure itself to use IP-HTTPS.

    2. Open an elevated command prompt. In the command prompt window, enter ipconfig /all and press ENTER. An Ok response appears when the command completes.

    3. Examine the output of the ipconfig command. This computer is now connected to the Internet from behind a NAT device and is assigned a private IPv4 address. Teredo is disabled and the DirectAccess client falls back to IP-HTTPS. When you look at the output of the ipconfig command, you see a section for Tunnel adapter iphttpsinterface with an IP address that starts with 2002:836b:2:8100 consistent with this being an IP-HTTPS address. You will not see a default gateway listed for the IP-HTTPS tunnel adapter.

    4. In the command prompt window, enter ipconfig /flushdns and press ENTER. This will flush name resolution entries that may still exist in the client DNS cache from when CLIENT1 was connected to the corpnet.

    5. In the command prompt window, enter ping dc1 and press ENTER. You should see replies from the ISATAP address assigned to DC1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.1

    6. In the command prompt window, enter ping app1 and press ENTER. You should see replies from the ISATAP address assigned to APP1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.3

    7. In the command prompt window, enter ping uag1 and press ENTER. You should see replies from the ISATAP address assigned to UAG1, which in this case is 2002:836b:2:8000:0:5efe:10.0.0.2

    8. In the command prompt window, enter ping app3 and press ENTER. You should see replies from the NAT64 address assigned by UAG1 to APP3, which in this case is 2002:836b:2:8001::a00:4

    9. In the command prompt window, enter netsh namespace show effectivepolicy and press ENTER. The output shows the current settings for the Name Resolution Policy Table (NRPT). These settings indicate that all connections to .corp.contoso.com should be resolved by the DirectAccess DNS Server, which is the UAG DirectAccess server, with the IPv6 address of 2002:836b:3::836b:3. Also, note the NRPT entry indicating that there is an exemption for the name nls.corp.contoso.com; names on the exemption list are not answered by the DirectAccess DNS server. You can ping the DirectAccess DNS server IP address to confirm connectivity to the DirectAccess server; for example, you can ping 2002:836b:3::836b:3 in this example.

    10. In the Internet Explorer address bar, enter http://app1.corp.contoso.com and press ENTER. You will see the default IIS site on APP1.

    11. In the Internet Explorer address bar, enter http://app3.corp.contoso.com and press ENTER. You will see the default web site on APP3.

    12. Click Start and in the Search box, enter \\App3\Files and press ENTER. Double click on the New Text Document file. This demonstrates that you were able to connect to an IPv4 only server using SMB to obtain a resource on an IPv4 only host.

    13. Click Start and in the Search box, enter Firewall and press ENTER.

    14. In the Windows Firewall with Advanced Security console, notice that only the Private profile is active. The Windows Firewall must be enabled for DirectAccess to work correctly. If for some reason the Windows Firewall were disabled, DirectAccess connectivity would fail.

    15. Expand the Monitoring node in the left pane of the console and click the Connection Security Rules node. You should see the active connection security rules: UAG DirectAccess Client – Client Access Enabling Tunnel – All, UAG DirectAccess Client – Clients Corp Tunnel and UAG DirectAccess Client – Exempt NLA. Scroll the middle pane to the right to expose the 1st Authentication Methods and 2nd Authentication Methods columns. Notice that the first rule uses NTLMv2 to establish the infrastructure tunnel and the second rule uses Kerberos V5 to establish the intranet tunnel.

    16. In the left pane of the console, expand the Security Associations node and click the Main Mode node. Notice the infrastructure tunnel security associations using NTLMv2 and the intranet tunnel security association using Kerberos V5. When you right click the Kerberos security association, you will see authentication for CORP\User1. This indicates that the client was able to authenticate with the CORP domain using Kerberos to establish the second (intranet) tunnel.

    17. Close the System Control Panel window and the Windows Firewall with Advanced Security console. Close all other open windows before moving to the next step.

    STEP 10: View DirectAccess Client Sessions in the UAG DirectAccess Monitor

    A new feature included in UAG 2010 Service Pack 1 DirectAccess is the new DirectAccess Monitor feature that is included in the UAG Web Monitor applications. You can use the DirectAccess Monitor to obtain information about current and historical connections to the UAG DirectAccess server.

    Perform the following steps to view the DirectAccess client connections in the UAG 2010 Service Pack 1 DirectAccess Monitor:

    1. *At UAG1, click Start and then click All Programs. Click Microsoft Forefront UAG, then click Forefront UAG Web Monitor. Click Yes in the User Account Control dialog box.
    2. Click OK in the Internet Explorer dialog box informing you that the web page uses Java.
    3. In the left pane on the Web Monitor web page, in the DirectAccess Monitor section, click the Current Status link. In the main part of the web page, notice that there is information regarding the health of a number of UAG DirectAccess related services.
    4. In the left pane on the Web Monitor web page, in the DirectAccess Monitor section, click the Active Sessions link. Here you can see information about current and recent connections. You also can find information regarding the computer account and user account that established the connection.
    5. Close Internet Explorer.
    6. *Move to CLIENT1. Open an elevated command prompt window. In the command prompt window, enter netsh interface teredo set state client and press ENTER. This will re-enable the Teredo adapter so that it will be available when you use this Test Lab in the future to test other UAG DirectAccess scenarios.

    STEP 11: Test Connectivity When Returning to the Corpnet

    Many of your users will move between remote locations and the corpnet, so it’s important that when they return to the corpnet that they are able to access resources without having to make any configuration changes. UAG DirectAccess makes this possible because when the DirectAccess client returns to the corpnet, it is able to make a connection to the Network Location Server. Once the HTTPS connection is successfully established to the Network Location Server, the DirectAccess client disables it DirectAccess client configuration and uses a direct connection to the corpnet.

    1. *Return to CLIENT1. Shut down CLIENT1 and then unplug CLIENT1 from the Home subnet or virtual switch and connect it to the Homenet subnet or virtual switch. Log on as CORP\User1. If asked what type of network you want to define the current network, select Work Network.
    2. Open an elevated command prompt. In the command prompt window, enter ipconfig /all. The output will indicate that CLIENT1 has a local IP address, and that there is no active 6to4, Teredo or IP-HTTPS tunnel. Note that CLIENT1 has an active ISATAP tunnel adapter.
    3. Test connectivity to the network share on APP3. Click Start and enter \\APP3\Files and press enter. You will be able to open the file in that folder.

    STEP 12: Snapshot the Configuration

    This completes the DirectAccess test lab. To save this configuration so that you can quickly return to a working DirectAccess configuration from which you can test other DirectAccess modular TLGs, TLG extensions, or for your own experimentation and learning, do the following:

    1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.
    2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots TLG UAG DirectAccess SP1RC. If your lab uses physical computers, create disk images to save the DirectAccess test lab configuration.

    Additional Resources

    For procedures to configure the Base Configuration test lab on which this document is based, see the Test Lab Guide: Base Configuration.

    For the design and configuration of your pilot or production deployment of DirectAccess, see the Forefront UAG DirectAccess design guide and the Forefront UAG DirectAccess deployment guide.

    For information about troubleshooting DirectAccess, see the DirectAccess Troubleshooting Guide.

    For information about troubleshooting DirectAccess in a Test Lab, see the Test Lab Guide: Troubleshoot UAG DirectAccess.

    For a comprehensive list of UAG DirectAccess Test Lab Guides, see the TechNet wiki Test Lab Guide clearinghouse at Test Lab Guides.

    For more information about DirectAccess, see the DirectAccess Getting Started Web page and the DirectAccess TechNet Web page.