· Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
· Support for Network Load Balancing, which enables the UAG DirectAccess array to be highly available without requiring the use of an external hardware load balancer
· Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.
· Forefront UAG DirectAccess Design Guide
· Forefront UAG DirectAccess Deployment Guide
· One computer running Windows Server 2008 R2 (DC1) that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
· One intranet member server running Windows Server 2008 R2 (UAG1) that is configured as the UAG DirectAccess server.
· One intranet member server running Windows Server 2008 R2 (APP1) that is configured as a general application server and network location server, and it also hosts the CRL Distribution Point for the CA installed on DC1.
· One standalone server running Windows Server 2008 R2 (INET1) that is configured as an Internet DNS, Web server, and DHCP server.
· One standalone client computer running Windows 7 (NAT1) that is configured as a network address translator (NAT) device using Internet Connection Sharing.
· One roaming member client computer running Windows 7 Enterprise Edition or Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.
Figure 1
· Corpnet – DC1, APP1 and the internal interface of UAG1 connect to this virtual network
· Internet – INET1, the external interface of UAG1 and the external interface of NAT1 connect to this virtual network
· Homenet – the internal interface of NAT1 connects to this network
Important
This guide requires a functioning UAG DirectAccess test lab as described in Step by Step guide for setting up Forefront UAG DirectAccess in a test lab up to step 10. For information about how to troubleshoot a non-functioning DirectAccess test lab, see the DirectAccess Troubleshooting Guide.
· Configure the CA on DC1 with CRL Distribution Point locations.
· Configure a CRL Distribution Point on APP1 for the CA installed on DC1.
· Replace the domain controller certificate installed on DC1.
· Configure APP1 as a NAP CA to issue health certificates to compliat DirectAccess clients.
· Install and configure the Network Policy Server (NPS) and the Health Registration Authority (HRA) role services on DC1.
· Configure a set of health requirement policies on DC1 for IPsec enforcement.
· Reconfigure UAG1 DirectAccess settings to support NAP enforcement
· Configure NAP client settings for the UAG DirectAccess client Group Policy object (GPO).
The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.
Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess with NAP for your pilot or production DirectAccess deployment, use the information in Planning Forefront UAG DirectAccess with Network Access Protection (NAP) for your planning and design decisions and Forefront UAG DirectAccess Deployment Guide for the steps to configure the DirectAccess server and supporting infrastructure servers.
Note
You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Step by Step guide for setting up Forefront UAG DirectAccess in a test lab. Remember, you must complete the first ten steps of the Step by Step guide and have a working DirectAccess configuration before you begin the steps in this guide on configuring UAG DirectAccess with NAP.
A. Delete the Domain Controller Computer Certificate on DC1. The current domain controller certificate does not contain CRL distribution point settings which are required when configuring DC1 as a HRA server in the NAP solution. In this step you will delete the current domain controller certificate.
B. Configure the CRL Distribution Settings on DC1. In this step you will configure the Certification Authority on DC1 with HTTP and file share paths for the location of the CRL.
C. Create a DNS Entry for CRL.CORP.CONTOSO.COM. The HTTP location for CRL Distribution Point maps to crl.corp.contoso.com. You will create a DNS Host (A) record so that clients will be able to resolve this name.
D. Request a New Domain Controller Certificate on DC1. DC1 requires a computer certificate so that it can authenticate with the subordinate CA that will be installed on APP1 and so that NAP clients will be able to establish an SSL connection with the HRA that will be installed on DC1. In this step you will request and install a new domain controller certificate on DC1.
E. Create a Web-based CRL Distribution Point on APP1. In this step you will create a web-based CRL Distribution Point on APP1 so that clients can access the CRL over an HTTP connection.
F. Configure Permissions on the CRL Distribution Point File Share on APP1. In this step you will configure file share permissions on the CRL Distribution Point folder you created in step E.
G. Publish the CRL to APP1 from DC1. In this step you will configure the Certificate Authority on DC1 to publish the CRL to the CRL Distribution Point file share on APP1.
H. Install the CA Server Role on APP1. In this step you will install a subordinate Certification Authority on APP1 so that it will be able to create health certificates for DirectAccess NAP clients.
I. Configure the Subordinate CA and CA Permissions on APP1. In this step you will configure the subordinate CA on APP1 so that it will automatically grant certificates when requested by the DC1. You will also configure permissions on the CA to enable DC1 to issue and manage certificate, manage the CA and request certificates.
J. Install the NPS and HRA Server Roles on DC1. In this step you will install the Network Policy Server and Health Registration Authority Server roles on DC1.
K. Configure the NAP Health Policy Server on DC1. In this step you will configure the IPsec with HRA enforcement and enable Autoremediation for DirectAccess NAP clients. You will also configure the Windows Security Health Validator to require a firewall to be enabled for all network connections.
L. Reconfigure the DirectAccess Settings on UAG1. In this step you will reconfigure the DirectAccess settings on UAG1 to support NAP policy enforcement for DirectAccess clients.
M. Configure NAP Client Settings in Group Policy. In this step you will configure a number of Group Policy settings in the DirectAccess clients GPO that are required Network Access Protection clients.
N. Verify NAP Health Evaluation for CLIENT1. In this step you will confirm that CLIENT1 was received the Group Policy settings required for NAP clients and confirm that CLIENT1 received a certificate of health from DC1.
O. Verify NAP Autoremediation Functionality for CLIENT1. In this step you will confirm that CLIENT1 is able to automatically re-enable the Windows Firewall after you manually disable it.
P. Demonstrate NAP Functionality for CLIENT1 When Connected to the HomeNet Network. In this step you will confirm that you received a new health certificate after connecting to the Internet.
Q. Verify CLIENT1 Cannot Connect to Intranet Resources when it is Non-Compliant. In this step you will confirm that when CLIENT1 does meet health requirements it will not be able to connect to resources through the DirectAccess intranet tunnel.
You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.
8. In the console tree of the Certification Authority snap-in, right-click corp-APP1-SubCA, and then click Properties.
9. Click the Security tab, and then click Add.
10. Click Object Types, select Computers, and then click OK.
11. Type DC1, and then click OK.
12. Click DC1, select the Issue and Manage Certificates, Manage CA, and Request Certificates check boxes under Allow, and then click OK.
13. Close the Certification Authority console
3. On CLIENT1, in the left pane of the Windows Firewall window, click Turn Windows Firewall on or off.
4. In Domain network location settings, click Turn off Windows Firewall, and then click OK.
5. Watch as the NAP client automatically turns on Windows Firewall for domain networks.