UAG DirectAccess Step by Step Guide
Second Edition
Demonstrating the Forefront Unified Access Gateway’s Unique Value Propositions
Contents
Step-by-step guide for setting up Forefront UAG DirectAccess in a test lab. 5
About this guide. 5
Overview of the test lab scenario. 5
Configuration component requirements. 7
Steps for configuring the test lab. 8
1. STEP1: Configure DC1. 9
A. Install the Operating System on DC1. 11
B. Configure TCP/IP Properties on DC1. 11
C. Rename DC1. 12
D. Configure DC1 as a Domain Controller and DNS Server 12
E. Create Reverse Lookup Zone on DNS Server on DC1. 13
F. Enter PTR Record for DC1. 13
G. Enable ISATAP Name Resolution on DNS Server on DC1. 14
H. Create DNS Records for NLS and ISATAP on DC1. 14
I. Configure DC1 as DHCP and Certificate Server 15
J. Create a New Administrator Account in Active Directory on DC1. 17
K. Create a Security Group for DirectAccess Clients on DC1. 17
L. Create and Deploy a Security Template for the IP-HTTPS Listener Certificate and Network Location Server Certificate. 18
M. Create ICMPv4 and ICMPv6 Echo Request Firewall Rules in Domain Group Policy on DC1. 19
N. Enable Computer Certificate Autoenrollment in Group Policy for the CORP Domain on DC1. 21
O. Remove CRL Distribution Settings on the Certificate Authority on DC1. 22
P. Create a Shared Folder on the C:\ Drive on DC1. 22
2. STEP2: Configure APP1. 23
A. Install the OS on APP1. 24
B. Configure TCP/IP Properties on APP1. 24
C. Rename APP1 and Join it to the corp.contoso.com Domain. 25
D. Obtain NLS Certificate for SSL Connections to Network Location Server on APP1. 25
E. Install the Web Server Role on APP1. 26
F. Configure the HTTPS Security Binding on the NLS Web Site on APP1. 26
3. STEP3: Configure APP3. 27
A. Install the OS on APP3 and Disable the Firewall 28
B. Install Web Services. 29
C. Create a Shared Folder on C:\. 29
4. STEP4: Configure UAG1. 30
A. Install the OS on UAG1. 32
B. Configure TCP/IP Properties on UAG1. 33
C. Rename the Computer and Join UAG1 to the corp.contoso.com Domain. 34
D. Obtain the IP-HTTPS Listener Certificate on UAG1. 35
E. Install Forefront UAG on UAG1. 36
F. Run the UAG Getting Started Wizard. 36
G. Run the UAG DirectAccess Configuration Wizard. 37
H. Confirm Group Policy Settings on UAG1. 39
I. Confirm IPv6 Settings on UAG1. 40
J. Update IPv6 Settings on DC1. 40
K. Update IPv6 Settings on APP1. 41
L. Confirm IPv6 Address Registration in DNS. 41
M. Confirm IPv6 Connectivity between DC1/APP1/UAG1. 41
5. STEP5: Configure CLIENT1. 42
A. Install the Operating System on CLIENT1. 42
B. Join CLIENT1 to the CORP Domain. 43
C. Add CLIENT1 to the DA_Clients Security Group. 43
D. Test IPv6 Configuration, Confirm Group Policy Settings and Machine Certificate on CLIENT1. 44
E. Test Connectivity to a Network Share and the Network Location Server 45
6. STEP 6: Configure INET1. 45
A. Install the Operating System.. 46
B. Configure TCP/IP Properties on INET1. 46
C. Rename the Computer on INET1. 47
D. Install and Configure the DNS Server Role on INET1. 47
E. Install the DHCP Server Role on INET1. 48
7. STEP7: Configure NAT1. 49
A. Install the OS on NAT1. 50
B. Rename the Network Interfaces on NAT1. 50
C. Disable 6to4 on NAT1. 51
D. Configure ICS on the External Interface of NAT1. 51
8. STEP 8: Test DirectAccess Connectivity from the Internet 52
9. STEP 9: Test DirectAccess Connectivity from Behind a NAT Device. 54
A. Testing Teredo Connectivity. 55
B. Testing IP-HTTPS Connectivity. 56
10. STEP 10: Test Connectivity When Returning to the Corpnet 58
11. STEP 11: Configure UAG2. 59
A. Install the OS on UAG2. 59
B. Configure TCP/IP Properties on UAG2. 59
C. Rename the UAG2 Computer or Virtual Machine and Join the corp.contoso.com Domain. 61
D. Install the IP-HTTPS Certificate on UAG2 Computer 61
12. STEP 12: Create the Networked Load Balanced UAG DirectAccess Array. 62
A. Update ISATAP record in the DNS server to include future VIPs and DIPs. 63
B. Change the Single Server IP addressing configuration on UAG1. 63
C. Change the UAG1 Single Server Configuration to an Array Manager 64
D. Configure UAG2 as a new node in the UAG DirectAccess Array. 65
E. Configure NLB on the Array Manager (UAG1) 66
F. Reconfiguring and Applying new Configuration Settings for UAG DirectAccess. 67
G. Start NLB. 68
H. Test Client Connectivity through the NLB Array. 69
13. Configure and Test Manage Out (Remote Management) Capabilities. 70
A. Create the DirectAccess Client Organizational Unit and Place CLIENT1 in the New OU.. 71
B. Create the DirectAccess GPO and Link it to the DirectAccess Client Organizational Unit 72
C. Refresh the DirectAccess Client Configuration and Enable Remote Desktop Connections to CLIENT1. 74
D. “Manage-Out” the DirectAccess Client 74
1. Step 1: Configure DC1 - DC1 is the domain controller, Network Location Server (NLS), Certificate server, DNS server, File Server and DHCP server for the corp.contoso.com domain.
2. Step 2: Configure APP1- APP1 is a Windows Server 2008 R2 computer that acts in the role of the Network Location Server on the network.
3. Step 3: Configure APP3 - APP3 is a Windows Server 2003 Enterprise Edition computer that acts as an IPv4 only host and is used to demonstrate DirectAccess connectivity to IPv4 only resources using the UAG DNS64 and NAT64 features. APP3 hosts both HTTP and SMB resources that the DirectAccess client computer will be able to access from other the simulated Internet.
4. Step 4: Configure UAG1 – UAG1 acts as the first DirectAccess server and Array Master in a Forefront UAG DirectAccess array.
5. Step 5: Configure CLIENT1 – CLIENT1 is a DirectAccess client that is used to test DirectAccess connectivity in several Internet network access scenarios.
6. Step 6: Configure INET1 – INET1 provides DNS and DHCP servers for CLIENT1 when CLIENT1 is connected to the Internet. INET1 also provides DNS services to NAT1 in NAT1’s role as Internet Connection Server (ICS).
7. Step 7: Configure NAT1 – NAT1 acts as a simulated NAT router that enables CLIENT1 access to the UAG DirectAccess server over the simulated Internet.
8. Step 8: Test DirectAccess Connectivity from the Internet – CLIENT1 is connected to the simulated Internet subnet to demonstrate DirectAccess connectivity using the 6to4 IPv6 transition technology.
9. Step 9: Test DirectAccess Connectivity from Behind a NAT Device – CLIENT1 is connected to the simulated private address network to demonstrate DirectAccess connectivity using the Teredo and IP-HTTPS IPv6 transition technologies.
10. Step 10: Test Connectivity When Returning to the Corpnet – CLIENT1 is connected again to the Corpnet subnet to demonstrate how DirectAccess components are automatically disabled to connect to local resources.
11. Step 11: Configure UAG2 – UAG2 is acts as the second DirectAccess server in a Forefront UAG DirectAccess array.
12. Step 12: Create a Networked Load Balanced UAG DirectAccess Array – UAG1 is configured as a Array Master in a Forefront UAG DirectAccess array. UAG2 is joined to the array and Network Load Balancing is configured for the array.
13. Step 13: Configure and Test Remote Management Capabilities – CLIENT1 is connected to the Homenet and remote connectivity to the DirectAccess client is tested from DC1 on the Corpnet.
A. Install the operating system on DC1. The first step is to install the Windows Server 2008 R2 operating system on the corp.contoso.com domain’s domain controller, DC1.
B. Configure the TCP/IP Properties on DC1. After installing the operating system on DC1, configure the TCP/IP Properties to provide the server an IP address, subnet mask, DNS server address and connection specific DNS suffix.
C. Rename the Computer on DC1. Change the default name of the computer assigned during setup to DC1.
D. Configure DC1 as a Domain Controller and DNS Server. DC1 is the domain controller and the authoritative DNS server for the corp.contoso.com domain. The domain controller and DNS server is required as part of the DirectAccess solution.
E. Create a Reverse Lookup Zone on the DNS Server on DC1. A reverse lookup zone for network ID 10.0.0.0/24 is required to create a pointer record for DC1. The pointer record allows reverse name resolution for DC1, and prevents name resolution errors during DNS related configuration steps. The reverse lookup zone is not required for a functional DirectAccess solution.
F. Enter a Pointer Record for DC1. A pointer record for DC1 will allow services to perform reverse name resolution for DC1. This is when performing DNS related operations. It is not required for a functional DirectAccess solution.
G. Enable ISATAP Name Resolution in DNS on DC1. By default, the Windows Server 2008 R2 DNS server will not answer queries for the ISATAP and WPAD host names. The DNS server is configured so that it will answer queries for ISATAP.
H. Create DNS Records for NLS and ISATAP on DC1. The DirectAccess client uses a Network Location Server to determine if the computer is on or off the corporate network. If on the corporate network, the DirectAccess can connect to the Network Location Server using an HTTPS connection. A DNS record is required to resolve the name of the Network Location Server. In addition, a DNS record for ISATAP is required so that ISATAP capable hosts on the network can obtain IPv6 addressing and routing information.
I. Configure DC1 as a DHCP and Certificate Server. DC1 is configured as a DHCP server so that CLIENT1 can automatically obtain IP addressing information when connected to the corpnet. Certificate Services are installed on DC1 so that computer certificates can be automatically assigned to all members of the CORP domain. Certificates are used for IPsec communications, as well as Web site certificates, which are used by the Network Location Server and the UAG DirectAccess server’s IP-HTTPS listener. Certificates are required by the DirectAccess solution; however you can use either or both commercial or private certificates as part of the DirectAccess solution. DHCP is not required to support a DirectAccess solution.
J. Create a New Administrator Account on DC1. As a network management best practice, the default domain administrator account should not be used for routine network operations. For this reason a new domain administrator account is created and used when making configuration changes. Using an alternate domain admin account is not required for a functional DirectAccess solution.
K. Create a Security Group for DirectAccess Clients on DC1. When DirectAccess is configured on the UAG DirectAccess server, it automatically creates Group Policy Objects and GPO settings that are applied to DirectAccess clients and servers. The DirectAccess client GPO uses security group filtering to assign the GPO settings to a designated DirectAccess security group. The is populated with the computer accounts of DirectAccess client computers. This is a required component of a DirectAccess solution.
L. Create and Deploy a Security Template for the IP-HTTPS Listener Certificate and the Network Location Server Certificate. A Web site certificate is required for the Network Location Server so that computers can use HTTPS to connect to it when they are on the corporate network. The UAG DirectAccess server uses a Web site certificate on its IP-HTTPS listener so that it can accept incoming connections from DirectAccess clients that are behind network devices that limit outbound connections to only HTTP/HTTPS. A Web site certificate template is created and used for certificate requests to the Microsoft Certificate Server installed on DC1. A Web site certificate bound to the UAG DirectAccess server’s IP-HTTPS is a required component of a working DirectAccess solution.
M. Create ICMPv4 and ICMPv6 Echo Request Firewall Rules in Domain Group Policy on DC1. ICMP v4 and v6 echo requests inbound and outbound are required for Teredo support. Firewall Rules are configured using the Windows Firewall with Advanced Security GPO snap-in to distribute the configuration.
N. Enable Computer Certificate Autoenrollment in Group Policy for the corp.contoso.com Domain on DC1. DirectAccess clients use computer certificates to establish IPsec connections to the UAG DirectAccess server. In addition, in an end to end scenario, IPsec is also used to connect the DirectAccess client to the destination resource server. Computer certificates are required for a working DirectAccess solution.
O. Remove CRL Distribution Settings on the Certificate Authority on DC1. When IP-HTTPS clients connect to the UAG DirectAccess server, a certificate revocation check is performed by the client. If the CRL check fails or if the CRL is unavailable, the IP-HTTPS connection will fail. The Certificate Server is configured to remove CRL distribution settings so that the CRL check will not fail. In a production environment, DirectAccess requires access to the CRL from clients situated on the Internet.
P. Create a Shared Folder on the C:\ Drive on DC1. A shared folder is created on the C:\drive of DC1 to test SMB connectivity for DirectAccess clients to a resource on the CORP domain.
A. Install the operating system on APP1. Windows Server 2008 R2 is installed on APP1. Note that this is not required, as any machine that can host the SSL web site for the NLS server will work.
B. Configure TCP/IP Properties on APP1. After installing the operating system on APP1, configure static IP addressing information on its network interface card.
C. Rename APP1 and Join it to the CORP Domain. To simplify deployment of the Web site certificate, APP1 is joined to the corp.contoso.com domain.
D. Obtain an NLS Certificate for SSL Connections to the Network Location Server on APP1. APP1 acts as the Network Location Server. To enable this role, APP1 needs a web site certificate so that the DirectAccess clients are able to establish an SSL connection to a Web site on APP1. DirectAccess clients access this site by connecting to Network Location Server name, which is nls.corp.contoso.com in this scenario.
E. Install the Web Server Role on APP1. Install IIS Web services on APP1 so that it can host the Network Location Server web site.
F. Configure the HTTPS Security Binding on the NLS Web Site on APP1. The web site certificate need to be bound to a web site on APP1 so that it can respond to SSL connection requests from the DirectAccess clients on the corporate network.
A. Install the operating system on APP3 and Disable the Firewall The first step is to install Windows Server 2003 Enterprise Edition SP2 on APP3. This is not a requirement. You could use another IPv4 only operating system, such as Windows 2000 Server or even Windows XP. The goal is to provide an IPv4 resource for the DirectAccess clients to connect to from over the Internet.
B. Install Web services on APP3 Install IIS Web services on APP3 so that HTTP connectivity over the DirectAccess connection to an IPv4 only host is demonstrated.
C. Create a shared folder on APP3 Create a shared folder on APP3 to demonstrate SMB connectivity over the DirectAccess connection.
· ISATAP router An ISATAP router is an IPv6 router that advertises subnet prefixes to ISATAP hosts and forwards IPv6 traffic between ISATAP hosts and hosts on other IPv6 subnets. The ISATAP router provides ISATAP clients the information they need to properly configure their ISATAP adapters. For more information about ISATAP, please see http://technet.microsoft.com/en-us/magazine/2008.03.cableguy.aspx
· Teredo server A Teredo server is an IPv6/IPv4 node that is connected to both the IPv4 Internet and the IPv6 intranet, supports a Teredo tunneling interface over which packets are received. The general role of the Teredo server is to assist in the address configuration of Teredo client and to facilitate the initial communication between Teredo clients and other Teredo clients or between Teredo clients and IPv6 hosts. The Teredo server listens on UDP port 3544 for Teredo traffic. DirectAccess clients located behind NAT devices and firewalls use Teredo to connect to the UAG DirectAccess server. For more information on Teredo, please see http://technet.microsoft.com/en-us/library/bb457011.aspx
· IPsec gateway The Full Intranet access model (which is used in this lab document) allows DirectAccess clients to connect to all resources inside the intranet. It does this by using IPsec-based tunnel policies that require authentication and encryption and IPsec sessions terminate at the IPsec Gateway. The IPsec Gateway is a function that is hosted on the UAG DirectAccess server.
· IP-HTTPS server IP-HTTPS is a new protocol for Windows 7 and Windows Server 2008 R2 that allows hosts behind a Web proxy server or firewall to establish connectivity by tunneling IPv6 packets inside an IPv4-based HTTPS session. HTTPS is used instead of HTTP so that Web proxy servers will not attempt to examine the data stream and terminate the connection. The UAG DirectAccess server uses an IP-HTTPS listener to accept incoming IP-HTTPS connections. Note that IP-HTTPS does not work behind authenticating web proxies (when authentication is required) or from behind web proxies that perform outbound SSL inspection.
· NAT64/DNS64 IPv6/IPv4 protocol translator The UAG DirectAccess server includes NAT64 and DNS64, which enables DirectAccess clients on the Internet to connect to IPv4 resources on the intranet. DirectAccess clients always use IPv6 to communicate with intranet servers. When a DirectAccess client needs to connect to IPv4 resources on the intranet, it issues a DNS query for the FQDN of the resource. DNS64 intercepts the request, sends the query to the intranet DNS server, and obtains the IPv4 address of the resource. DNS64 then dynamically generates an IPv6 address for the client of the IPv6 address dynamically assigned to the IPv4 resource; in addition, DNS64 informs NAT64 of the IPv4/IPv6 mapping. The client issues a request for the dynamically generated IPv6 address, which is intercepted by NAT64, and then NAT64 forwards the request to the IPv4 address of the intranet resource. NAT64 also returns the response based on entries in its state table. For more information about DNS64 and NAT64, please see http://blogs.technet.com/edgeaccessblog/archive/2009/09/08/deep-dive-into-directaccess-nat64-and-dns64-in-action.aspx
· 6to4 relay router A 6to4 relay router can accept traffic from DirectAccess clients using the 6to4 IPv6 transition technology and forward the traffic over an IPv4 intranet. The UAG DirectAccess server acts as the 6to4 relay router and provides addressing information to the DirectAccess clients. DirectAccess clients uses this information to configure their 6to4 tunnel adapter to forward IPv6 messages over the IPv4 Internet to the UAG DirectAccess servers. For more information on 6to4 please see http://technet.microsoft.com/en-us/library/cc756770(WS.10).aspx
A. Install the operating system on UAG1. The first step is to install the Windows Server 2008 R2 operating system on UAG1. Forefront Unified Access Gateway 2010 requires Windows Server 2008 R2.
B. Configure TCP/IP Properties on UAG1. After installing the operating system on UAG1, configure the TCP/IP Properties to provide the server an IP address, subnet mask, DNS server address and connection specific suffix on both the internal and external interfaces. Settings are configured on both the Internet and the corpnet interfaces.
C. Rename UAG1 and Join it to the corp.contoso.com Domain Change the default computer name assigned during setup to UAG1 and join it to the CORP domain. Domain membership is a required for the DirectAccess solution.
D. Obtain a Certificate for the IP-HTTPS Listener on UAG1 The UAG DirectAccess server uses an IP-HTTPS listener to accept incoming IP-HTTPS connections from DirectAccess clients on the Internet. The IP-HTTPS Listener requires a web site certificate to support the SSL connection between itself and the DirectAccess client.
E. Install Forefront UAG on UAG1 Install the Forefront Unified Access Gateway software on UAG1.
F. Run the UAG Getting Started Wizard on UAG1 The UAG Getting Started Wizard walks you through the process of initial configuration of the UAG server.
G. Run the UAG DirectAccess Configuration Wizard on UAG1 DirectAccess is not enabled by default. The UAG DirectAccess wizard must be run to enable DirectAccess features and capabilities on UAG1.
H. Confirm Group Policy Settings on UAG1 The UAG DirectAccess wizard configures GPOs and settings that are automatically deployed to the Active Directory. One GPO is assigned to the UAG DirectAccess server, and one is deployed to machines that belong to the DirectAccess Clients security group. The step confirms that the Group Policy settings were deployed to the UAG DirectAccess server.
I. Confirm IPv6 Settings on UAG1 For the DirectAccess solution to function, the IPv6 settings on must be correct. This step confirms these setting on UAG1.
J. Update IPv6 Settings on DC1 DC1 is capable of being an ISATAP host. However, this functionality might not be immediately available. This step expedites DC1 setting itself up as an ISATAP host by updating its IPv6 configuration.
K. Update IPv6 Settings on APP1 APP1 is capable of being an ISATAP host. However, this functionality might not be immediately available. This step expedites APP1 setting itself up as an ISATAP host by updating its IPv6 configuration.
L. Confirm IPv6 Address Registration in DNS IPv6 capable hosts can communicate with one another over IPv6 using their ISATAP adapters. However, they must be able to resolve the destination host to an IPv6 address to use this capability. This step confirms that the IPv6 ISATAP addressees are registered in DNS.
M. Confirm IPv6 Connectivity between DC1/APP1/UAG1 After activity the IPv6 settings on DC1, APP1 and UAG1, test IPv6 connectivity by using the ping utility.
A. Install the Windows 7 operating system on the CLIENT1 computer or virtual machine Windows 7 is required for DirectAccess client connectivity. The first step is to install Windows 7 on the DirectAccess computer or virtual machine.
B. Join CLIENT1 to the CORP domain DirectAccess supports only domain member client machines for authentication and Group Policy settings assignment. To meet this requirement, join CLIENT1 to the CORP domain.
C. Add CLIENT1 to the DA_Clients Active Directory Security Group The DirectAccess client settings are assigned only to members of the security group designated for DirectAccess clients. Place CLIENT1 in the DA_Clients security group so that the Group Policy settings are assigned to CLIENT1.
D. Test IPv6 Configuration, Confirm Group Policy Settings and Machine Certificate on CLIENT1 Before moving CLIENT1 out of the corpnet and onto the simulated Internet and behind a NAT device, check the IPv6 configuration on CLIENT1, confirm that DirectAccess client Group Policy Settings are enabled on CLIENT1, and that CLIENT1 has the computer certificate required to establish the IPsec connections to the UAG DirectAccess server.
E. Test Connectivity to a Network Share and Network Location Server The final check on CLIENT1 before moving it outside the corpnet is to confirm connectivity to a network share on the corpnet and to the Network Location Server. Connectivity to the Network Location Server is required so that the DirectAccess client can determine if it is on-network or off-network.
A. Install the Windows Server 2008 R2 operating system on INET1 The first step is to install the operating system on the INET1 computer or virtual machine. In the lab, we use Windows Server 2008 R2. This is not a requirement for the DirectAccess solution, since in a production environment any OS might be used to provide DNS and DHCP services to the Internet-based DirectAccess client.
B. Configure the TCP/IP Properties on INET1 Assign a public IP address to the INET1 computer or virtual machine’s interface.
C. Rename the computer on INET1 Rename the computer from the default name provided by the OS installer to INET1.
D. Install and Configure the DNS Server Role on INET1 The DNS server role is installed on INET1 so that the Internet connected DirectAccess client can resolve the name of the UAG DirectAccess server and establish a 6to4 connection to the resolved IP address.
E. Install the DHCP server role on INET1 The DHCP server role is installed on INET1 so that the DirectAccess client can obtain a public IP address automatically after being connected to the Internet subnet or virtual switch.
A. Install the operating system on NAT1 The first step is to install the Windows 7 operating system. Note that this is not a requirement; you can use any NAT device to simulate NAT device functionality.
B. Rename the interfaces on NAT1 Rename the network interfaces in the Network Connections window to make them easier to identify. Note that this is not required, but makes applying the correct settings on the appropriate interface easier.
C. Disable 6to4 functionality on NAT1 Disable 6to4 functionality on NAT 1. The reason for this is that if you don’t disable 6to4 on NAT1, it will act as a 6to4 router and issue a native IPv6 address to CLIENT1 when it is connect to the Homenet subnet. This will prevent CLIENT1 from acting as a Teredo or IP-HTTPS DirectAccess client.
D. Configure ICS on the External Interface of NAT1 Internet Connection Services enable NAT1 to act as a NAT device and DHCP server for clients located behind NAT1. This enables CLIENT1 to automatically obtain IP addressing information and connect to the simulated Internet when connected to the Homenet subnet behind NAT1.
A. Test Teredo Connectivity. The first set of tests are performed when the DirectAccess client is configured to use Teredo. This is the automatic setting when the NAT device allows outbound access to UDP port 3544
B. Test IP-HTTPS Connectivity. The second set of tests are performed when the DirectAccess client is configured to use IP-HTTPS. In order to demonstrate IP-HTTPS connectivity, Teredo is disabled on CLIENT1.
A. Install the operating system on UAG2. Install Windows Server 2008 R2 on UAG2 as this is a requirement for installing Forefront UAG 2010.
B. Configure TCP/IP Properties on UAG2. After installing the operating system on UAG2, configure static IP addressing information on its internal and external network interface cards.
C. Rename the UAG2 and Join it to the CORP Domain. UAG2 is renamed and joined to the CORP domain. Domain membership is required for a UAG DirectAccess array.
D. Import the IP-HTTPS Certificate into the UAG2 machine certificate store. To accept incoming IP-HTTPS requests, the UAG2 DirectAccess array member requires a copy of the web site certificate used by the IP-HTTPS on UAG1 installed in its machine certificate store.
A. Update ISATAP records in the DNS server to include future VIPs and DIPs ISATAP enabled hosts on the corporate network use the UAG server or array to receive configuration and routing information. Each member of the array can answer requests from ISATAP hosts from an internal Dedicated IP Address (DIP) or Virtual IP Address (VIP). In this step DNS is updated with the new IP addresses for the ISATAP servers in the array.
B. Change the Single Server IP addressing configuration on UAG1. The IP addressing on UAG1 is changed to support the new IP addressing used for the array. The IP addressing changes are done in a way that creates minimum disruption to the DirectAccess configuration and does not require the DirectAccess client to receive new Group Policy settings to connect to the array.
C. Change the UAG1 Single Server Configuration to an Array Manager. UAG1 was originally installed in single server mode. This step includes procedures that change UAG1 from single server mode to an Array Manager in a UAG DirectAccess array.
D. Configure UAG2 as a New Node in the UAG DirectAccess Array. UAG DirectAccess arrays contain from 2 to 8 nodes. UAG1 is configured as the first node, and UAG2 is the second node. In this step install and configure UAG2 as the second member of the UAG DirectAccess array.
E. Configure Network Load Balancing on the Array Manager (UAG1). After the UAG DirectAccess configuration is complete is it ready to support Network Load Balancing to provide load balancing and high availability for DirectAccess client connections.
F. Reconfigure and Apply New Configuration Settings for UAG DirectAccess. Setting enabled by Group Policy need to be updated after making the array and NLB configuration changes. This step reconfigures the DirectAccess settings and redeploys them.
G. Start Network Load Balancing. Start Network Load Balancing after the configuration changes are made in the DirectAccess configuration.
H. Test DirectAccess Client Connectivity through the UAG DirectAccess NLB Array. This step tests the UAG DirectAccess and validates the array and NLB configurations.
A. Create the DirectAccess Client Organizational Unit and Place CLIENT1 in the New OU. New firewall rules are required to enable some aspects of remote management of DirectAccess clients. Firewall rules can be configured on each client individually, but it is more efficient to use Group Policy to distribute the new firewall rules to all DirectAccess clients. Change could be made to the DirectAccess Client GPO created by the UAG DirectAccess wizard, but these settings are overwritten each time the wizard is run. Therefore, a new GPO is created to support these custom settings. The new GPO is then linked to an OU that is populated with the DirectAccess client computer accounts. In this step the OU is created.
B. Create the DirectAccess GPO and Link it to the DirectAccess Client OU. The DirectAccess GPO is linked to the DirectAccess client OU. In this step you create and populate the DirectAccess client OU.
C. Refresh the DirectAccess Client Configuration and Enable Remote Desktop Connections to CLIENT1. The DirectAccess clients need to refresh this Group Policy configuration to receive the new GPO settings. In this step the DirectAccess client refreshes it Group Policy configuration to receive the new firewall settings.
D. “Manage Out” the DirectAccess Client. After the new firewall settings are deployed to the DirectAccess client, management servers on the corporate network can initiate connections to the DirectAccess client. In this step you validate the settings and establish connections from DC1 to CLIENT1, when CLIENT1 is acting as a DirectAccess client behind NAT1.