Certificate prepare for Direct Access
Provision DA Server with a certificate for IP-HTTPS
- Log on DA Server.
- From the Start screen, type mmc, and then press ENTER.
- Click File, and then click Add/Remove Snap-in.
- Click Certificates, click Add, click Computer account, click Next, select Local computer, click Finish, and then click OK.
- In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
- Right-click Certificates, point to All Tasks, and then click Request New Certificate.
- Click Next twice.
- On the Request Certificates page, click Web Server, and then click More information is required to enroll for this certificate.
- On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common Name.
- In Value, type DA.domain.ca, and then click Add.
- In the Alternative name area, under Type, select DNS.
- In Value, type DA.domain.ca, and then click Add.
- On the General tab, under Friendly name, type IP-HTTPS Certificate.
- Click OK, click Enroll, and then click Finish.
- In the details pane of the Certificates snap-in, verify that a new certificate with the name DA.domain.ca was enrolled with Intended Purposes of Server Authentication.
- Close the console window. If you are prompted to save settings, click No.
Install and Configure Direct Access Server
External DNS Records
|External DNS Record||Usage||Record Type||Port||IP address|
|DA.domain.ca||External user access||A Record||443||Public_IP address|
|External IP Address||Internal IP Address||Usage|
|Public_IP address||Direct Access server Private IP address||Direct access server for External access|
External Firewall Rules
|Any||Public_IP address||TCP 443||Inbound|
Install the Remote Access Server Role
- Log on to DA Server.
- Open Server Manager.
- In the Dashboard console of Server Manager, under Configure this local server, click Add roles and features.
- Click Next three times to get to the server role selection screen.
- In the Select Server Roles dialog, select Remote Access, click Add Features when prompted, and then click Next.
- Click Next five times to accept the defaults for features, remote access role services, and web server role services.
- On the Confirmation screen, click Install.
- Wait for the feature installations to complete, and then click Close.
- In Server Manager Screen, Click Tools and then select Remote Access Management.
- In the Remote Access Management console, click Run the Remote Access Setup Wizard.
- Click Deploy DirectAccess only.
4. Under Step 1 Remote Clients, click Configure.
5. Select Deploy full DirectAccess for client access and remote management, and then click Next.
6. On the Select Groups screen, click Add, type DirectAccessClients, click OK.
7. Clear the Enable DirectAccess for mobile computers only checkbox, and then click Next.
8. Click Domain Computers (CORP\Domain Computers), and then click Remove.
9. In the DirectAccess Client setup window, double-click the white box next to the arrow with the asterisk.
10. In the Type drop-down list, click Ping, and then in the text box, type Your DC Server Name (FQDN).
11. Click Validate. A green check mark will appear indicating a successful ping.
12. Click Add.
13. Enter Helpdesk email address and DirectAccess connection name.
14. Check Allow DirectAccess clients to use local name resolution and click Finish.
15. Under Step 2 DirectAccess Server, click Configure.
16. On the Remote Access Server Setup page, select Behind an edge device (with one network adapters).
17. Type public FQDN of Remote access server, click Next.
18. On the Select the certificate used to authenticate IP-HTTPS connections, click Browse….
19. Select da.domain.ca certificate and click OK and then click Next.
20. Check Use computer certificates and check Use an intermediate certificate and then click Browse….
21. Select the certificate authority that will be issuing the client certificates and click OK.
22. Check Enable Windows 7 Client computers to connect via DirectAccess and then click Finish.
23. Under Step 3 Infrastructure Servers, click Configure.
24. On the Network Location Server screen, check The network location server is deployed on a remote web server (recommended).
25. Type in the website address to the Network Location Server, and click Next.
The Network Location Server is merely a server with a website running on it that the client can contact to ensure it has reached the internal network. The webpage can be the default IIS webpage; just ensure the website is NOT accessible externally.
26. On the DNS screen, enter specify additional DNS Servers for name resolution.
27. Check Use local name resolution if the name does not exist in DNS or DNS servers are unreachable when the client computer is on a private network (recommended) and click Next.
28. On the DNS Suffix Search List screen, Check Configure DirectAccess clients with DNS client suffix search list.
29. Ensure local domain’s suffix has been added, and click Next.
30. On the Management screen, enter SCCM servers click Finish.
Windows 10 Enterprise with DirectAccess
The following client operating systems support DirectAccess:
- Windows 10 Enterprise
- Windows 8 and 8.1 Enterprise
- Windows 7 Ultimate
- Windows 7 Enterprise
Here we will recommend Windows 10 Enterprise as DirectAccess Client. Because Windows 10 supports automatic entry point selection and transparent failover, better scalability and performance. Also, windows 10 built-in DirectAccess connectivity status indicator, the administrators don’t have to deploy, manage, and maintain additional software.
- Login Windows 10.
- Press Window Key + I
- Click Network & Internet and then click the DirectAccesstab.
- Review and configure the settings.
Please make sure the Network Connectivity Assistant service (NcaSvc) is starting if DirectAccess does not appear in the Network & Internet settings window in the user interface.
Hope you enjoy this post.
Cary Sun @SifuSun
Author: Cary Sun
Cary Sun is a Principal Consultant, He has a strong background specializing in datacenter and deployment solutions, and has spent over 20 years in the planning, design, and implementation of network technologies and Management and system integration.He hold CISCO CERTIFIED INTERNETWORK EXPERT (CCIE No.4531) from 1999.Cary is also a Microsoft Most Valuable Professional (MVP) and Cisco Champion, He is a published author with serveral titles, include blogs on Checkyourlogs.net, author for many books. Specialties: CCIE /CCNA / MCSE / MCITP / MCTS / MCSA / Solution Expert / CCA
http://www.carysun.com http://www.checkyourlogs.net http://gooddealmart.com