DirectAccess is a new feature in the Windows 7 and Windows Server 2008 R2 operating systems that gives users the experience of being seamlessly connected to their intranet any time they have Internet access. With DirectAccess enabled, requests for intranet resources (such as e-mail servers, shared folders, or intranet Web sites) are securely directed to the intranet, without requiring users to connect to a VPN. DirectAccess provides increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside the office.
Forefront Unified Access Gateway (UAG) 2010 extends the value of the Windows DirectAccess solution by adding features that meet the requirements of many enterprise deployments:
· Support for arrays of up to 8 UAG DirectAccess servers where configuration is done once on an array master and is automatically deployed to all other members of the array
· Support for Network Load Balancing, which enables the UAG DirectAccess array to be highly available without requiring the use of an external hardware load balancer
· Support for IPv4-only networks, network segments, or server or application resources with the help of NAT64/DNS64 IPv6/IPv4 transition technologies.
Network Access Protection (NAP), built into Windows Server 2008 R2 and Windows 7, enforces health requirements by monitoring and assessing the health of client computers when they attempt to connect or communicate on a network. Client computers that are not in compliance with system health requirements can be provided with restricted network access until their configuration is updated and brought into compliance.
The combination of DirectAccess with NAP allows you to verify that DirectAccess client computers meet your system health requirements before allowing access to the intranet.
To learn more about UAG DirectAccess, see the following resources:
· Forefront UAG DirectAccess Design Guide
· Forefront UAG DirectAccess Deployment Guide
To learn more about NAP, see the Network Access Protection Product Information Web site.
The DirectAccess test lab, will use four server computers running Windows Server 2008 R2 and two client computers running Windows 7. The lab simulates an intranet, the Internet, and a home network and demonstrates DirectAccess in different Internet connection scenarios.
The DirectAccess test lab consists of:
· One computer running Windows Server 2008 R2 (DC1) that is configured as an intranet domain controller, Domain Name System (DNS) server, Dynamic Host Configuration Protocol (DHCP) server, and an enterprise root certification authority (CA).
· One intranet member server running Windows Server 2008 R2 (UAG1) that is configured as the UAG DirectAccess server.
· One intranet member server running Windows Server 2008 R2 (APP1) that is configured as a general application server and network location server, and it also hosts the CRL Distribution Point for the CA installed on DC1.
· One standalone server running Windows Server 2008 R2 (INET1) that is configured as an Internet DNS, Web server, and DHCP server.
· One standalone client computer running Windows 7 (NAT1) that is configured as a network address translator (NAT) device using Internet Connection Sharing.
· One roaming member client computer running Windows 7 Enterprise Edition or Ultimate Edition (CLIENT1) that is configured as a DirectAccess client.
The DirectAccess test lab consists of three subnets that simulate the following:
· A home network named Homenet (192.168.137.0/24) connected to the Internet by a NAT.
· The Internet (131.107.0.0/24).
· An intranet named Corpnet (10.0.0.0/24) separated from the Internet by the DirectAccess server.
Computers on each subnet connect using a hub or switch, or you can use virtual networks if you chose to deploy the Test Lab in a virtual environment. The following figure shows the UAG DirectAccess test lab configuration.
Figure 1
You use choose to deploy the Test Lab in an Hyper-V virtual environment, you can create three virtual networks to support the Test Lab:
· Corpnet – DC1, APP1 and the internal interface of UAG1 connect to this virtual network
· Internet – INET1, the external interface of UAG1 and the external interface of NAT1 connect to this virtual network
· Homenet – the internal interface of NAT1 connects to this network
CLIENT1 will be moved between these virtual networks to test connectivity in different scenarios.
In the UAG DirectAccess test lab, you connect CLIENT1 initially to the Corpnet subnet and join the intranet domain. After configuring DA1 as a DirectAccess server, you update CLIENT1 with the associated Group Policy settings. Then, you connect CLIENT1 to the Internet and Homenet subnets and test DirectAccess connectivity to intranet resources on the Corpnet subnet.
This guide uses a working UAG DirectAccess test lab as described in Step by Step guide for setting up Forefront UAG DirectAccess in a test lab. The instructions in this guide assume that you have completed the first 10 steps in the UAG Step by Step guide and have a working UAG DirectAccess setup with a single UAG DirectAccess server.
Important
This guide requires a functioning UAG DirectAccess test lab as described in Step by Step guide for setting up Forefront UAG DirectAccess in a test lab up to step 10. For information about how to troubleshoot a non-functioning DirectAccess test lab, see the DirectAccess Troubleshooting Guide.
This test lab guide demonstrates UAG DirectAccess with NAP in full enforcement mode where the UAG DirectAccess server requires health certificates for authentication to access resources through the intranet tunnel. Noncompliant UAG DirectAccess clients cannot access the intranet and cannot use their computer certificate for authentication.
For more information about the different modes of NAP, see Stages of a NAP Deployment.
To deploy NAP in the UAG DirectAccess test lab, you need to do the following additional configuration:
· Configure the CA on DC1 with CRL Distribution Point locations.
· Configure a CRL Distribution Point on APP1 for the CA installed on DC1.
· Replace the domain controller certificate installed on DC1.
· Configure APP1 as a NAP CA to issue health certificates to compliat DirectAccess clients.
· Install and configure the Network Policy Server (NPS) and the Health Registration Authority (HRA) role services on DC1.
· Configure a set of health requirement policies on DC1 for IPsec enforcement.
· Reconfigure UAG1 DirectAccess settings to support NAP enforcement
· Configure NAP client settings for the UAG DirectAccess client Group Policy object (GPO).
The following instructions are for configuring a test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. It is important to remember that this configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.
Attempting to adapt this test lab configuration to a pilot or production deployment can result in configuration or functionality issues. To ensure proper configuration and operation of UAG DirectAccess with NAP for your pilot or production DirectAccess deployment, use the information in Planning Forefront UAG DirectAccess with Network Access Protection (NAP) for your planning and design decisions and Forefront UAG DirectAccess Deployment Guide for the steps to configure the DirectAccess server and supporting infrastructure servers.
The following sections describe how to configure UAG1, APP1 and DC1 for DirectAccess with NAP. After UAG1, APP1 and DC1 are configured, this guide provides steps for demonstrating NAP functionality for CLIENT1 when it is connected to the Corpnet and Internet subnets.
Note
You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group. For all tasks described in this document you can use the CONTOSO\User1 account created when you went through the steps in the UAG DirectAccess Step by Step guide for setting up Forefront UAG DirectAccess in a test lab. Remember, you must complete the first ten steps of the Step by Step guide and have a working DirectAccess configuration before you begin the steps in this guide on configuring UAG DirectAccess with NAP.
The following procedures are performed to enable and allow you to test each of them:
A. Delete the Domain Controller Computer Certificate on DC1. The current domain controller certificate does not contain CRL distribution point settings which are required when configuring DC1 as a HRA server in the NAP solution. In this step you will delete the current domain controller certificate.
B. Configure the CRL Distribution Settings on DC1. In this step you will configure the Certification Authority on DC1 with HTTP and file share paths for the location of the CRL.
C. Create a DNS Entry for CRL.CORP.CONTOSO.COM. The HTTP location for CRL Distribution Point maps to crl.corp.contoso.com. You will create a DNS Host (A) record so that clients will be able to resolve this name.
D. Request a New Domain Controller Certificate on DC1. DC1 requires a computer certificate so that it can authenticate with the subordinate CA that will be installed on APP1 and so that NAP clients will be able to establish an SSL connection with the HRA that will be installed on DC1. In this step you will request and install a new domain controller certificate on DC1.
E. Create a Web-based CRL Distribution Point on APP1. In this step you will create a web-based CRL Distribution Point on APP1 so that clients can access the CRL over an HTTP connection.
F. Configure Permissions on the CRL Distribution Point File Share on APP1. In this step you will configure file share permissions on the CRL Distribution Point folder you created in step E.
G. Publish the CRL to APP1 from DC1. In this step you will configure the Certificate Authority on DC1 to publish the CRL to the CRL Distribution Point file share on APP1.
H. Install the CA Server Role on APP1. In this step you will install a subordinate Certification Authority on APP1 so that it will be able to create health certificates for DirectAccess NAP clients.
I. Configure the Subordinate CA and CA Permissions on APP1. In this step you will configure the subordinate CA on APP1 so that it will automatically grant certificates when requested by the DC1. You will also configure permissions on the CA to enable DC1 to issue and manage certificate, manage the CA and request certificates.
J. Install the NPS and HRA Server Roles on DC1. In this step you will install the Network Policy Server and Health Registration Authority Server roles on DC1.
K. Configure the NAP Health Policy Server on DC1. In this step you will configure the IPsec with HRA enforcement and enable Autoremediation for DirectAccess NAP clients. You will also configure the Windows Security Health Validator to require a firewall to be enabled for all network connections.
L. Reconfigure the DirectAccess Settings on UAG1. In this step you will reconfigure the DirectAccess settings on UAG1 to support NAP policy enforcement for DirectAccess clients.
M. Configure NAP Client Settings in Group Policy. In this step you will configure a number of Group Policy settings in the DirectAccess clients GPO that are required Network Access Protection clients.
N. Verify NAP Health Evaluation for CLIENT1. In this step you will confirm that CLIENT1 was received the Group Policy settings required for NAP clients and confirm that CLIENT1 received a certificate of health from DC1.
O. Verify NAP Autoremediation Functionality for CLIENT1. In this step you will confirm that CLIENT1 is able to automatically re-enable the Windows Firewall after you manually disable it.
P. Demonstrate NAP Functionality for CLIENT1 When Connected to the HomeNet Network. In this step you will confirm that you received a new health certificate after connecting to the Internet.
Q. Verify CLIENT1 Cannot Connect to Intranet Resources when it is Non-Compliant. In this step you will confirm that when CLIENT1 does meet health requirements it will not be able to connect to resources through the DirectAccess intranet tunnel.
You will notice that there are several steps that begin with an asterisk (*). The * indicates that the step requires that you move to a computer or virtual machine that is different from the computer or virtual machine you were at when you completed the previous step.
The current domain controller certificate does not contain CRL distribution point settings which are required when configuring DC1 as a HRA server in the NAP solution. In this step you will delete the current domain controller certificate. The reason for this is in the UAG DirectAccess Step by Step Guide you configured the CA on DC1 to not include information about CRL Distribution Points and therefore the domain controller certificate does not contain this information. You will later request a new domain controller certificate that contains the required CRL Distribution Point information. Note that this step is required because of how the Step by Step guide configured CRL Distribution Point information and therefore is done to support this Test Lab Guide module.
In this step you will configure the Certification Authority on DC1 with HTTP and UNC paths for the location of the CRL for the CA installed on DC1. The CRL must be accessible for the NAP component of the solution to work correctly.
The HTTP location for CRL Distribution Point maps to crl.corp.contoso.com. You will create a DNS Host (A) record on DC1 so that clients will be able to resolve this name. The subordinate CA must be able to resolve the name of the CRL Distribution Point of the CA installed on DC1 for the NAP solution to work correctly.
DC1 requires a computer certificate so that it can authenticate with the subordinate CA that will be installed on APP1 and so that NAP clients will be able to establish an SSL connection with the HRA that will be installed later on DC1. In this step you will request and install a new domain controller certificate that includes the CRL Distribution Points on DC1. DC1 must have a computer certificate with a reachable CRL Distribution point included on it in order for the NAP component of the solution to work correctly.
In this step you will create a web-based CRL Distribution Point on APP1 so that clients can access the CRL over an HTTP connection. The CRL Distribution Point must be available in order for the NAP component of the solution to work correctly.
In this step you will configure file share permissions on the CRL Distribution Point folder you created in step E so that DC1 can publish CRL and delta CRL files to the file share.
In this step you will configure the Certificate Authority on DC1 to publish the CRL to the CRL Distribution Point file share on APP1.
In this step you will install a subordinate Certification Authority on APP1 so that it will be able to create health certificates requested by HRA on DC1 for DirectAccess NAP clients.
In this step you will configure the subordinate CA on APP1 so that it will automatically grant certificates when requested by DC1. You will also configure permissions on the CA to enable DC1 to issue and manage certificates, manage the CA and request certificates.
8. In the console tree of the Certification Authority snap-in, right-click corp-APP1-SubCA, and then click Properties.
9. Click the Security tab, and then click Add.
10. Click Object Types, select Computers, and then click OK.
11. Type DC1, and then click OK.
12. Click DC1, select the Issue and Manage Certificates, Manage CA, and Request Certificates check boxes under Allow, and then click OK.
13. Close the Certification Authority console
In this step you will install the Network Policy Server and Health Registration Authority Server roles on DC1.
In this step you will configure NAP IPsec with HRA enforcement and enable Autoremediation for DirectAccess NAP clients. You will also configure the Windows Security Health Validator to require a firewall to be enabled for all network connections.
In this step you will reconfigure the DirectAccess settings on UAG1 to support NAP policy enforcement for DirectAccess clients. After you complete this step, the Connection Security Rule on the UAG DirectAccess server that controls access to the intranet tunnel will require DirectAccess client to present a health certificate to successfully authenticate.
In this step you will configure a number of Group Policy settings in the UAG DirectAccess clients GPO that are required by Network Access Protection clients.
In this step you will confirm that CLIENT1 received the Group Policy settings required for NAP clients and confirm that CLIENT1 received a health certificate from DC1.
In this step you will confirm that CLIENT1 is able to automatically re-enable the Windows Firewall after you manually disable it.
In this step you will confirm that you received a new health certificate after connecting to the Homenet network.
3. On CLIENT1, in the left pane of the Windows Firewall window, click Turn Windows Firewall on or off.
4. In Domain network location settings, click Turn off Windows Firewall, and then click OK.
5. Watch as the NAP client automatically turns on Windows Firewall for domain networks.
In this step you will confirm that when CLIENT1 does meet health requirements it will not be able to connect to resources through the DirectAccess intranet tunnel. In the test lab, DC1 is accessible through the infrastructure tunnel and APP1 is accessible through the intranet tunnel. When the UAG DirectAccess NAP client fails validation, it can only access resources available through the infrastructure tunnel.