Deploy a Single DirectAccess Server with Advanced Settings
Applies To: Windows Server 2012 R2, Windows Server 2012
This topic provides an introduction to the DirectAccess scenario that uses a single DirectAccess server, and allows you to deploy DirectAccess with Advanced settings.
You can also deploy Basic DirectAccess and DirectAccess for Enterprise environments. For information about alternate deployment paths, see DirectAccess Deployment Paths in Windows Server.
If you want to configure a basic deployment with simple settings only, see Deploy a Single DirectAccess Server Using the Getting Started Wizard. In the simple scenario, DirectAccess is configured with default settings by using a wizard, without any need to configure infrastructure settings such as a certification authority (CA) or Active Directory security groups.
If you want to configure DirectAccess with Enterprise networking features such as a load-balanced cluster, multisite deployment, or two-factor client authentication, you can complete the scenario that is described in this topic to configure a single server, and then to implement the Enterprise scenario as described in Deploy Remote Access in an Enterprise.
Important
To deploy DirectAccess using this guide, you must use a DirectAccess server that is running Windows Server® 2012 R2 or Windows Server® 2012.
In this scenario
To set up a single DirectAccess server with advanced settings, you must complete several planning and deployment steps.
Prerequisites
Before you begin, you can review the following requirements.
Windows Firewall must be enabled on all profiles.
The DirectAccess server is the network location server.
You want all wireless computers in the domain where you install the DirectAccess server to be DirectAccess-enabled. When you deploy DirectAccess, it is automatically enabled on all mobile computers in the current domain.
Important
Some technologies and configurations are not supported when you deploy DirectAccess. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) in the corporate network is not supported. If you are using ISATAP, you must remove it and use native IPv6.
Planning steps
Planning is divided into two phases:
Planning for the DirectAccess infrastructure. This phase describes the planning required to set up the network infrastructure before beginning the DirectAccess deployment. It includes planning the network and server topology, certificate planning, DNS, Active Directory and Group Policy object (GPO) configuration, and the DirectAccess network location server.
Planning for the DirectAccess deployment. This phase describes the planning steps required to prepare for the DirectAccess deployment. It includes planning for DirectAccess client computers, server and client authentication requirements, VPN settings, infrastructure servers, and management and application servers.
For detailed planning steps, see Plan an Advanced DirectAccess Deployment.
Deployment steps
Deployment is divided into three phases:
Configuring the DirectAccess infrastructure. This phase includes configuring network and routing, configuring firewall settings if required, configuring certificates, DNS servers, Active Directory and GPO settings, and the DirectAccess network location server.
Configuring DirectAccess server settings. This phase includes steps for configuring DirectAccess client computers, the DirectAccess server, infrastructure servers, management and application servers.
Verifying the deployment. This phase includes steps to verify the DirectAccess deployment.
For detailed deployment steps, see Install and Configure Advanced DirectAccess.
Practical applications
Deploying a single DirectAccess server provides the following:
Ease of access. Managed client computers running Windows® 8.1, Windows® 8, and Windows® 7 can be configured as DirectAccess client computers. These clients can access internal network resources via DirectAccess any time they are located on the Internet without needing to log in to a VPN connection. Client computers not running one of these operating systems can connect to the internal network via VPN.
Ease of management. DirectAccess client computers located on the Internet can be remotely managed by Remote Access administrators over DirectAccess, even when the client computers are not located in the internal corporate network. Client computers that do not meet corporate requirements can be remediated automatically by management servers. Both DirectAccess and VPN are managed in the same console and with the same set of wizards. Additionally, one or more DirectAccess servers can be managed from a single Remote Access Management console
Roles and features required for this scenario
The following table lists the roles and features that are required for this scenario:
Role/feature |
How it supports this scenario |
---|---|
Remote Access role |
The role is installed and uninstalled using the Server Manager console or Windows PowerShell. This role encompasses both DirectAccess and Routing and Remote Access Services (RRAS). The Remote Access role consists of two components:
The Remote Access server role is dependent on the following server roles/features:
|
Remote Access Management Tools feature |
This feature is installed as follows:
The Remote Access Management Tools feature consists of the following:
Dependencies include:
|
Hardware requirements
Hardware requirements for this scenario include the following:
Server requirements:
A computer that meets the hardware requirements for Windows Server 2012.
The server must have at least one network adapter installed, enabled, and connected to the internal network. When two adapters are used, there should be one adapter connected to the internal corporate network, and one connected to the external network (Internet, or private network).
If Teredo is required as an IPv4 to IPv6 transition protocol, the external adapter of the server requires two consecutive public IPv4 addresses. If a single IP address is available, then only IP-HTTPS can be used as the transition protocol.
At least one domain controller. The DirectAccess server and DirectAccess clients must be domain members.
A certification authority (CA) is required if you do not want to use self-signed certificates for IP-HTTPS or the network location server, or if you want to use client certificates for client IPsec authentication. Alternatively, you can request certificates from a public CA.
If the network location server is not located on the DirectAccess server, a separate web server is required to run it.
Client requirements:
A client computer must be running Windows 8 or Windows 7.
Note
Only the following operating systems can be used as DirectAccess clients: Windows Server 2012, Windows Server 2008 R2, Windows 8 Enterprise, Windows 7 Enterprise, and Windows 7 Ultimate.
Infrastructure and management server requirements:
During remote management of DirectAccess client computers, clients initiate communications with management servers such as domain controllers, System Center Configuration Servers, and Health Registration Authority (HRA) servers for services that include Windows and antivirus updates and Network Access Protection (NAP) client compliance. The required servers should be deployed before beginning the Remote Access deployment.
If Remote Access requires client NAP compliance, NPS and HRS servers should be deployed before beginning remote access deployment
If VPN is enabled, a DHCP server is required to allocate IP addresses automatically to VPN clients, if a static address pool is not used.
Software requirements
There are a number of requirements for this scenario:
Server requirements:
The DirectAccess server must be a domain member. The server can be deployed at the edge of the internal network, or behind an edge firewall or other device.
If the DirectAccess server is located behind an edge firewall or NAT device, the device must be configured to allow traffic to and from the DirectAccess server.
The person deploying remote access on the server requires local administrator permissions on the server, and domain user permissions. In addition, the administrator requires permissions for the GPOs used in DirectAccess deployment. To take advantage of the features that restricts DirectAccess deployment to mobile computers only, permissions to create a WMI filter on the domain controller are required.
Remote Access client requirements:
DirectAccess clients must be domain members. Domains containing clients can belong to the same forest as the DirectAccess server, or have a two-way trust with the DirectAccess server forest or domain.
An Active Directory security group is required to contain the computers that will be configured as DirectAccess clients. If a security group is not specified when configuring DirectAccess client settings, by default the client GPO is applied on all laptop computers in the Domain Computers security group. Only the following operating systems can be used as DirectAccess clients: Windows Server 2012 R2, Windows 8.1 Enterprise, Windows Server 2012, Windows 8 Enterprise, Windows Server 2008 R2, Windows 7 Enterprise, and Windows 7 Ultimate.
Note
It is recommended that you create a security group for each domain that contains DirectAccess client computers.
Important
If you have enabled Teredo in your DirectAccess deployment, and you want to provide access to Windows 7 clients, ensure that the clients are upgraded to Windows 7 with SP1. Clients using Windows 7 RTM will not be able to connect over Teredo. However, these clients will still be able to connect to the corporate network over IP-HTTPS.
See also
The following table provides links to additional resources.
Content type |
References |
---|---|
Remote Access on TechNet |
|
Product evaluation |
Test Lab Guide: Demonstrate DirectAccess in a Cluster with Windows NLB Test Lab Guide: Demonstrate a DirectAccess Multisite Deployment Test Lab Guide: Demonstrate DirectAccess with OTP Authentication and RSA SecurID |
Deployment |
DirectAccess Deployment Paths in Windows Server Deploy a Single DirectAccess Server Using the Getting Started Wizard |
Tools and settings |
|
Community resources |
|
Related technologies |