DirectAccess 2012

What is DirectAccess?

DirectAccess allows remote users to securely access internal network file shares, Web sites, and applications without connecting to a virtual private network (VPN). An internal network is also known as a private network or intranet. DirectAccess establishes bi-directional connectivity with an internal network every time a DirectAccess-enabled computer connects to the Internet, even before the user logs on. Users never have to think about connecting to the internal network and IT administrators can manage remote computers outside the office, even when the computers are not connected to the VPN.

How does it all work?

The underlying security principles of DirectAccess use certificates to verify authorization over a point-to-point IPSec tunnel. A supporting PKI will exist within the company, client machines will be added to an Active Directory group, and then DirectAccess is controlled through Group Policy, which will enroll a client into DirectAccess. Once a computer has the proper certificate—as long as that workstation is connected to the internet—the user will have access to internal network resources.

The main components are

  • DirectAccess servers running Windows Server 2012 with one or more network adapters.
  • At least one domain controller and Domain Name System (DNS).
  • At least one server acting as an application server to share resources.
  • DirectAccess clients running Windows 7 Ultimate or Enterprise, with IPv6 enabled.
  • A Public Key Infrastructure (PKI).

 

Now, let’s look at the lab layout and some screenshots from the demo.

 

Lab

Basic Network Information

  • Internal network: 10.0.0.1
  • Internal file share \\app1\files
  • Internal web site: http://app1.corp.contoso.com
  • External network (Internet): 131.107.0.x
  • Home network (Homenet): 192.168.137.x

 

Computer Setup

  • 1 domain controller (DC1)
  • 1 app server (APP1)
  • 2 clients (CLIENT1, CLIENT2)
  • 1 Internet simulator (INET1), otherwise you would need 2 public IP addresses
  • 1 DirectAccess server, 2 NICs (EDGE1)
  • 1 home network, 2 NICs (NAT1)

 

■ Figure 1 My Lab Network Diagram

 

■ Figure 2 Windows 10 – CLIENT2 – connected to network using DirectAccess and accessing internal file share and web page

 

■ Figure 3 Windows 7 – CLIENT1 – connected to network using DirectAccess and accessing internal file share and web page

 

■ Figure 4 Mapped drives are always connected

 

■ Figure 5 Internal Web Sites can be used to deliver content and files

 

■ Figure 6 Windows 7 – Homenet Ping – Computer at home still has the ability to access shared files from 10.0.0.x

 

■ Figure 7 Windows 10 – Homenet Ping – Computer at home still has the ability to access shared files from 10.0.0.x

 

■ Figure 8 DirectAccess Server Remote Management Console – EDGE1 – 2 client computers are remotely connected

 

■ Figure 9 From the DirectAccess Console, connection details for a specific client

 

■ Figure 10 From the DirectAccess Console, the Operational Status presents a fully functional DA Server

 

■ Figure 11 Certificates on the DirectAccess Server

 

■ Figure 12 DNS on the domain controller – DC1

 

■ Figure 13 DirectAccess Group Policy setup on the domain controller – DC1 – DirectAccessClients group has been added to DA policy

 

■ Figure 14 Shared files on app server with NLS (network location server) binding – APP1

 

■ Figure 15 Certificate Authority setup on DirectAccess Server – EDGE1 – Basic PKI

 

■ Figure 16 Main DirectAccess Setup Area

 

Now, on to the labs.

Introduction

DirectAccess provides users with the experience of being seamlessly connected to their intranet any time they have Internet access. When DirectAccess is enabled, requests for intranet resources (such as email servers, shared folders, or intranet websites) are securely directed to the intranet, without the need for users to connect to a VPN. DirectAccess enables increased productivity for a mobile workforce by offering the same connectivity experience both inside and outside of the office.

The Windows Routing and Remote Access Server (RRAS) provides traditional VPN connectivity for legacy clients and non-domain members. RRAS also provides site-to-site connections between servers. RRAS in Windows Server 2008 R2 cannot coexist on the same edge server with DirectAccess, and must be deployed and managed separately from DirectAccess.
Windows Server 2012 combines the DirectAccess feature and the RRAS role service into a new unified server role. This new Remote Access server role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Additionally, Windows Server 2012 DirectAccess provides multiple updates and improvements to address deployment blockers and provide simplified management.

Windows DirectAccess is an IPv6-only technology from a client perspective. This means that clients can only access intranet resources accessible via IPv6 while connected remotely, and only if the client application itself supports connecting to an IPv6 resource. Intranet applications or resources are accessible directly via IPv6 if they are listening on the internal server’s IPv6 interface. For remote management of DirectAccess clients initiated by intranet computers, internal application or management servers must also be fully IPv6 compliant and the server applications they run must be IPv6 compatible.

To allow access to internal IPv4-only resources, Windows Server 2012 DirectAccess includes native support for a protocol translation (NAT64) and name resolution (DNS64) gateway to convert the IPv6 communication from a DirectAccess client to IPv4 for the internal servers. IPv4-only intranet computers cannot initiate connections to DirectAccess clients for remote management because the translation done with NAT64 is unidirectional (for traffic initiated by the DirectAccess client)

 

In this guide

*** This guide contains the Base Lab and the Main Lab instructions ***

This guide provides step-by-step instructions for configuring DirectAccess in a single server deployment with mixed IPv4 and IPv6 resources in a test lab to demonstrate functionality of the deployment experience. You will set up and deploy DirectAccess based on the Windows Server 2012 Base Configuration using five server computers and two client computers. The resulting test lab simulates an intranet, the Internet, and a home network, and demonstrates DirectAccess in different Internet connection scenarios.

 

Important

The following instructions are for configuring a Remote Access test lab using the minimum number of computers. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. This configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network.
Attempting to adapt this Remote Access test lab configuration to a pilot or production deployment can result in configuration or functionality issues.

Build the Base Lab First

Introduction to the Base Lab

Test Lab Guides (TLGs) allow you to get hands-on experience with new products and technologies using a pre-defined and tested methodology that results in a working configuration. When you use a TLG to create a test lab, instructions tell you what servers to create, how to configure the operating systems and platform services, and how to install and configure any additional products or technologies. A TLG experience enables you to see all of the components and the configuration steps on both the front-end and back-end that go into a single- or multi-product or technology solution.

A challenge in creating useful TLGs is to enable their reusability and extensibility. Because creating a test lab can represent a significant investment of time and resources, your ability to reuse and extend the work required to create test labs is important. An ideal test lab environment would enable you to create a basic lab configuration, save that configuration, and then build out multiple test labs in the future by starting with that basic configuration.

The purpose of this TLG is to enable you to create the Windows Server 2012 Base Configuration test lab, upon which you can build a test lab based on other Windows Server 2012-based TLGs from Microsoft, TLG extensions in the TechNet Wiki, or a test lab of your own design that can include Microsoft or non-Microsoft products. See Windows Server 2012 Test Lab Guides for more information.

Depending on how you deploy your test lab environment, you can image the drives for the Windows Server 2012 Base Configuration test lab if you are using physical computers or you can create snapshots of the test lab virtual machines. This enables you to easily return to baseline configuration where most of the routine client, server, and networking services have already been configured so that you can focus on building out a test lab for the products or technologies of interest. For this reason, make sure that you perform a disk image on each computer if you’re using physical computers, or perform virtual machine snapshots if you are using virtual machines after completing all the steps in this TLG.

The Windows Server 2012 Base Configuration TLG is just the beginning of the test lab experience. Other Windows Server 2012-based TLGs or test lab extensions focus on Microsoft products or platform technologies, but all of them use this Windows Server 2012 Base Configuration TLG as a starting point. For a description of the different types of TLG content, see Test Lab Guides.

This document contains instructions for setting up the Windows Server 2012 Base Configuration test lab by deploying four server computers running Windows Server 2012 Standard and one client computer running Windows 8 Enterprise. The resulting configuration simulates a private intranet and the Internet.

Important

The following instructions are for configuring the Windows Server 2012 Base Configuration test lab. Individual computers are needed to separate the services provided on the network and to clearly show the desired functionality. This configuration is neither designed to reflect best practices nor does it reflect a desired or recommended configuration for a production network. The configuration, including IP addresses and all other configuration parameters, is designed only to work on a separate test lab network. For information about deploying Windows Server 2012 in a pilot or production environment, see Install and Deploy Windows Server 2012.

 

 

 

Note:

If you are able to work from a computer-based copy of this document during the lab exercises and you are running virtual machines in Hyper-V, use the following instructions to leverage the Hyper-V clipboard integration feature to paste commands. This will minimize potential errors with mistyped command strings.

1.         Highlight and right-click a command from this document listed in bold text.

2.         Click Copy.

3.         From the virtual machine menu bar, click Clipboard, and then click Type clipboard
text.

Base Lab Overview

The Windows Server 2012 Base Configuration test lab consists of the following:

One computer running Windows Server 2012 Standard named DC1 that is configured as an intranet domain controller, Domain Name System (DNS) server, and Dynamic Host Configuration Protocol (DHCP) server.

One intranet member server running Windows Server 2012 Standard named APP1 that is configured as a general application and web server.

One member client computer running Windows 8 Enterprise named CLIENT1 that will switch between Internet and intranet subnets.

One intranet member server running Windows Server 2012 Standard named EDGE1 that is configured as an Internet edge server.

One standalone server running Windows Server 2012 Standard named INET1 that is configured as an Internet DNS server, web server, and DHCP server.
The Windows Server 2012 Base Configuration test lab consists of two subnets that simulate the following:

·         A private intranet, referred to as the Corpnet subnet (10.0.0.0/24).

·         The Internet, referred to as the Internet subnet (131.107.0.0/24), separated from the Corpnet subnet by EDGE1.

Computers on each subnet connect using a physical hub, switch, or virtual switch. See Figure 1 for the configuration of the Windows Server 2012 Base Configuration test lab.

This document describes how to build out the Windows Server 2012 Base Configuration test lab in two sections:

·         Steps for configuring the Corpnet subnet (DC1, APP1, and CLIENT1)

·         Steps for configuring the Internet subnet (EDGE1 and INET1)

There are some TLGs that require only the Corpnet subnet. However, it is strongly recommended that you build out both subnets if you ever plan to test technologies, products, or solutions that include access to Corpnet servers and services from the Internet. The Windows Server 2012 Base Configuration test lab environment consisting of both subnets can be saved and reused for other TLGs. By building out both the Corpnet and Internet subnets, you will have a reusable snapshot of the entire Windows Server 2012 Base Configuration test lab that can be used for many TLGs, which have this starting test lab in a unified and consistent state.

Hardware and software requirements

The following are the minimum required components of the test lab:

The product disc or files for Windows Server 2012 Standard. For a trial version, see Download Windows Server 2012.

The product disc or files for Windows 8 Enterprise. For a trial version, see Download Windows 8 Enterprise Evaluation.

Four computers that meet the minimum hardware requirements for Windows Server 2012 Standard. One of these computers (EDGE1) has two network adapters installed.

One computer that meets the minimum hardware requirements for Windows 8 Enterprise.

If you wish to deploy the Windows Server 2012 Base Configuration test lab in a virtualized environment, your virtualization solution must support Windows Server 2012 64-bit virtual machines. The server hardware must support the amount of RAM required to run the virtual operating systems included in the Windows Server 2012 Base Configuration test lab and any other virtual machines that may be required by additional TLGs.

If you are using Hyper-V in Windows Server 2012 as your virtualization solution, see Hosting the Windows Server 2012 Base Configuration test lab with Windows Server 2012 Hyper-V for additional guidance.


Important

Run Windows Update on all computers or virtual machines either during the installation or immediately after installing the operating systems. After running Windows Update, you can isolate your physical or virtual test lab from your production network.

 

Changes from the Windows Server 2008 R2 Base Configuration

The following are the changes from the previous Test Lab Guide: Base Configuration, which uses computers running Windows Server 2008 R2 and Windows 7:

The configuration of a simplified public key infrastructure (PKI) has been removed. You can add this with the Basic PKI for the Windows Server 2012 Base Configuration TLG mini-module.

·         Windows PowerShell command equivalents are now available in addition to the UI-based procedures.

Steps for Configuring the Corpnet Subnet

There are three steps to setting up the Corpnet subnet of the Windows Server 2012 Base Configuration test lab.

1.         Configure DC1.

2.         Configure APP1.

3.         Configure CLIENT1.

Note

You must be logged on as a member of the Domain Admins group or a member of the local Administrators group on each computer to complete the tasks described in this guide.

The following sections provide details about how to perform these steps.

Step 1: Configure DC1

DC1 provides the following services:

·           A domain controller for the corp.contoso.com Active Directory Domain Services (AD DS) domain

·           A DNS server for the corp.contoso.com DNS domain

·           A DHCP server for the Corpnet subnet

 

DC1 configuration consists of the following:

·           Install the operating system

·           Configure TCP/IP

·           Install Active Directory and DNS

·           Install DHCP

·           Create a user account in Active Directory

 

Install the operating system on DC1

First, install Windows Server 2012 Standard as a standalone server.

To install the operating system on DC1

1.         Start the installation of Windows Server 2012 Standard.
2.         Follow the instructions to complete the installation, specifying Windows Server 2012 Standard (full
installation) and a strong password for the local Administrator account. Log on using the local
Administrator account.
3.         Connect DC1 to a network that has Internet access and run Windows Update to install the latest
updates for Windows Server 2012.
4.         Connect DC1 to the Corpnet subnet.


Configure TCP/IP properties on DC1

Next, configure the TCP/IP protocol with a static IP address of 10.0.0.1 and the subnet mask of 255.255.255.0.

Do this step using Windows PowerShell

 

To configure TCP/IP on DC1

1.       In Server Manager, click Local Server in the console tree. Click the link next to Ethernet in the Properties
tile. Note that the “Ethernet” interface name may be different on your computer.Note
The link may not immediately appear. Wait for the network interfaces to be enumerated.
2.         In Network Connections, right-click Ethernet, and then click Properties.
3.         Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4.         Select Use the following IP address. In IP address, type 10.0.0.1. In Subnet mask, type 255.255.255.0.
Select Use the following DNS server addresses. In Preferred DNS server, type 127.0.0.1.
5.         Click OK and then close the Ethernet Properties dialog.
6.         Close the Network Connections window.
7.         In Server Manager, click Local Server in the console tree. Click the link next to Computer name in the
Properties tile.
8.         On the Computer Name tab of the System Properties dialog, click Change.
9.         In Computer name, type DC1, click OK twice, and then click Close. When you are prompted to restart
the computer, click Restart Now.
10.      After restarting, logon using the local Administrator account.

 

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability. Note that the “Ethernet” interface name may be different on your computer. Use the ipconfig /all command to list the interfaces.

New-NetIPAddress 10.0.0.1 -InterfaceAlias “Ethernet” -PrefixLength 24

Set-DnsClientServerAddress -InterfaceAlias “Ethernet” -ServerAddresses 127.0.0.1

Rename-Computer DC1

Restart-Computer

Configure DC1 as a domain controller and DNS server

Next, configure DC1 as a domain controller and DNS server for the corp.contoso.com domain.

Do this step using Windows PowerShell

To configure DC1 as a domain controller and DNS server

1.         Launch Server Manager.
2.         On the Dashboard screen, under Configure this local server, click Add roles and features.
3.         Click Next three times to get to the server role selection screen.
4.         In the Select Server Roles dialog, select Active Directory Domain Services. Click Add Features when
prompted, and then click Next.
5.         In the Select features dialog, click Next.
6.         In the Active Directory Domain Services dialog, click Next.
7.         In the Confirm installation selections dialog, click Install. Wait for the installation to complete.
8.         In the Installation Progress dialog, click the Promote this server to a Domain Controller link.Note: If you
close the “Installation Progress” dialog before it presents the promotion link, click the gray Tasks flag in
the upper right section of Server Manager. When the installation is complete you will see the Promote
this server to a Domain Controller link.
9.         In the Deployment Configuration dialog, select Add a new forest. In the Root domain name field, type
corp.contoso.com. Click Next.
10.       In the Domain Controller Options dialog, leave the default values, specify a strong DSRM password
twice, and then click Next four times to accept default settings for DNS, NetBIOS, and directory paths.
11.      In the Review Options dialog, review your selections and then click Next.Note: You can also click the
View script button to review and save the PowerShell commands that Server Manager will run during
DC Promotion.
12.    In the Prerequisites Check dialog, allow the validation to complete and verify that no errors are
reported.   Since this is the first DNS server deployment in the forest, you can safely ignore all warnings
regarding DNS delegation. Click Install to start the domain controller promotion. Allow the installation to
complete.
13.    Allow the domain controller to restart. After the server restarts, logon using the CORP\Administrator
credentials.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure.

Install-WindowsFeature AD-Domain-Services -IncludeManagementTools

Install-ADDSForest -DomainName corp.contoso.com

Note

Windows PowerShell in Windows Server 2012 implements dynamic module loading. Using the Import-Module cmdlet is no longer required; instead, simply invoking the cmdlet, alias, or function automatically loads the module. To see loaded modules, use the Get-Module cmdlet.
Install and configure DHCP on DC1

Next, configure DC1 as a DHCP server so that CLIENT1 can automatically configure itself when it connects to the Corpnet subnet.

Do this step using Windows PowerShell

 

To install and configure the DHCP server role on DC1

1.       In the Dashboard console of Server Manager, under Configure this local server, click Add roles and
features.
2.       Click Next three times to get to the server role selection screen.
3.       In the Select server roles dialog, select DHCP Server, click Add Features when prompted, and then click
Next.
4.       In the Select features dialog, click Next.
5.       Click Next on the DHCP Server screen, and then click Install.
6.       Allow the installation to complete, and then in the Results window, click the link for Complete DHCP
configuration.
7.       In the DHCP Post-Install configuration wizard, click Next, and then click Commit.
8.       On the Summary page, click Close.
9.       In the Add Roles and Features Wizard, click Close.
10.     From the Start screen, click DHCP.
11.     In the DHCP console tree, expand dc1.corp.contoso.com, and click IPv4. Right-click IPv4, and click New
Scope.
12.     Click Next in the New Scope Wizard.
13.     Type Corpnet for scope name, and then click Next.
14.     Next to Start IP Address, type 10.0.0.100, next to End IP Address, type 10.0.0.200, and next to Subnet
Mask, type 255.255.255.0.
15.     Click Next eight times to accept all scope option default settings, and then click Finish.
16.     Close the DHCP Manager console.

 

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability.

Install-WindowsFeature DHCP -IncludeManagementTools

Add-DhcpServerv4Scope -name “Corpnet” -StartRange 10.0.0.100 -EndRange 10.0.0.200 -SubnetMask 255.255.255.0

Set-DhcpServerv4OptionValue -DnsDomain corp.contoso.com -DnsServer 10.0.0.1

Add-DhcpServerInDC -DnsName dc1.corp.contoso.com

 

Create a user account in Active Directory on DC1

Next, create a user account in Active Directory that will be used when logging in to CORP domain member computers.

Do this step using Windows PowerShell

To create a user account in Active Directory

1.       From the Start screen, click Active Directory Administrative Center.
2.         In the console tree, click the arrow to expand corp (local), and then double-click Users. This adds Users
as a recent navigation link in the console tree.
3.         In the Tasks pane, click New, and then click User.
4.         In the Create User dialog, type User1 next to Full name and type User1 next to User SamAccountName
logon: corp\.
5.         In Password, type the password that you want to use for this account, and in Confirm password,
type the password again.
6.         Under Password options, select Other password options, and select Password never expires.
7.         Scroll down to access the Member of section of the Create User dialog, and click Add. Type Domain
Admins; Enterprise Admins, and then click OK.
8.         Click OK to close the Create User dialog.
9.         Exit the Active Directory Administrative Center.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability. Note that the first command results in a prompt to supply the User1 account password.

New-ADUser -SamAccountName User1 -AccountPassword (read-host “Set user password” -assecurestring) -name “User1” -enabled $true -PasswordNeverExpires $true -ChangePasswordAtLogon $false

Add-ADPrincipalGroupMembership -Identity “CN=User1,CN=Users,DC=corp,DC=contoso,DC=com” -MemberOf “CN=Enterprise Admins,CN=Users,DC=corp,DC=contoso,DC=com”,”CN=Domain Admins,CN=Users,DC=corp,DC=contoso,DC=com”

 

Step 2: Configure APP1

APP1 provides web and file sharing services. APP1 configuration consists of the following:

·           Install the operating system.

·           Configure TCP/IP.

·           Join the computer to the domain.

·           Install the Web Server (IIS) role.

·           Create a shared folder.
Install the operating system on APP1

To install the operating system on APP1

1.         Start the installation of Windows Server 2012 Standard.
2.         Follow the instructions to complete the installation, specifying a strong password for the local
Administrator account. Log on using the local Administrator account.
3.         Connect APP1 to a network that has Internet access and run Windows Update to install the latest
updates for Windows Server 2012.
4.         Connect APP1 to the Corpnet subnet.

Configure TCP/IP properties on APP1

Do this step using Windows PowerShell

To configure TCP/IP properties on APP1

1.         In Server Manager, click Local Server in the console tree. Click the link next to Ethernet in the
Properties tile. Note that the “Ethernet” interface name may be different on your computer.
2.         In Network Connections, right-click Ethernet, and then click Properties.
3.         Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4.         Select Use the following IP address. In IP address, type 10.0.0.3. In Subnet mask, type 255.255.255.0.
5.         Select Use the following DNS server addresses. In Preferred DNS server, type 10.0.0.1.
6.         Click OK, and then click Close. Close the Network Connections window.
7.         From the Start screen, type cmd, and then press ENTER.
8.         To check name resolution and network communication between APP1 and DC1, type ping
dc1.corp.contoso.com in the command prompt window and press ENTER.
9.         Verify that there are four replies from 10.0.0.1.
10.       Close the Command Prompt window.

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability. Note that the “Ethernet” interface name may be different on your computer. Use ipconfig /all to list the interfaces.

New-NetIPAddress 10.0.0.3 -InterfaceAlias “Ethernet” -PrefixLength 24

Set-DnsClientServerAddress -InterfaceAlias “Ethernet” -ServerAddresses 10.0.0.1

Join APP1 to the CORP domain

Do this step using Windows PowerShell

To join APP1 to the CORP domain

1.       In Server Manager, click Local Server in the console tree. Click the link next to Computer name in the
Properties tile.
2.         In the System Properties dialog box, on the Computer Name tab, click Change.
3.         In Computer Name, type APP1. Under Member of, click Domain, and then type corp.contoso.com.4.
Click OK.
5.         When you are prompted for a username and password, type User1 and its password, and then click
OK.
6.         When you see a dialog box welcoming you to the corp.contoso.com domain, click OK.
7.         When you are prompted that you must restart the computer, click OK.
8.         On the System Properties dialog box, click Close.
9.         When you are prompted to restart the computer, click Restart Now.
10.     After the computer restarts, click the Switch User arrow icon, then click Other User and log on to the
CORP domain with the User1 account.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Note that you must supply the User1 account domain credentials after entering the Add-Computer command.

Add-Computer -NewName APP1 -DomainName corp.contoso.com

Restart-Computer

Install the Web Server (IIS) role on APP1

Next, install the Web Server (IIS) role to make APP1 a web server.

Do this step using Windows PowerShell

To install the Web Server (IIS) server role

1.       In the Dashboard console of Server Manager, click Add roles and features.
2.         Click Next three times to get to the server role selection screen.
3.         In the Select Server Roles dialog, select Web Server (IIS).
4.         When prompted, click Add Features, and then click Next.
5.         Click Next three times to accept the default Web Server role settings, and then click Install.
6.         Allow the installation to complete, and then click Close.

 

Windows PowerShell equivalent commands
The following Windows PowerShell command, run at an administrator-level Windows PowerShell command prompt, performs the same function as the preceding procedure.

Install-WindowsFeature Web-WebServer -IncludeManagementTools

Create a shared folder on APP1

Next, create a shared folder and a text file within the folder.

Do this step using Windows PowerShell

To create a shared folder

1.       From the Start screen, click Computer, and then double-click Local Disk (C:).
2.        Right-click in the details pane, point to New, and then click Folder.
3.         Type Files, and then press ENTER. Leave the Local Disk window open.
4.         From the Start screen, type Notepad. Right-click Notepad, and then click Run as administrator.
5.         If prompted by User Account Control, click Yes.
6.         In the Untitled – Notepad window, type This is a shared file.
7.        Click File, click Save, double-click Computer, double-click Local Disk (C:), and then double-click the Files
folder.
8.       In File name, type Example.txt, and then click Save. Close the Notepad window.
9.       In the Local Disk window, right-click the Files folder, point to Share with, and then click Specific people.
10.     Click Share, and then click Done.
11.       Close the Local Disk window.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure.

New-Item -path c:\files -type directory

Write-Output “This is a shared file.” | out-file c:\files\example.txt

New-SmbShare -name files -path c:\files -changeaccess CORP\User1

 

Step 3: Configure CLIENT1

CLIENT1 configuration consists of the following:

·           Install the operating system

·           Join CLIENT1 to the CORP domain

·           Test access to intranet resources on the Corpnet subnet

 

Install the operating system on CLIENT1

To install the operating system on CLIENT1

1.         Start the installation of Windows 8 Enterprise.
2.         When you are prompted for a PC name, type CLIENT1.
3.         When you are prompted by the Settings dialog, click Use express settings.
4.         At the Log on prompt, click Don’t want to sign in with a Microsoft account? Click Local account.
5.         When you are prompted for a user name, type User1. Type a strong password twice, type a
password hint, and then click Finish.
6.         Connect CLIENT1 to a network that has Internet access and run Windows Update to install the latest
updates for Windows 8.
7.         Connect CLIENT1 to the Corpnet subnet. Click Yes, turn on sharing and connect to devices when
prompted.

 

User account control

When you configure the Windows 8 operating system, you are required to click Continue or Yes in the User Account Control (UAC) dialog box for some tasks. Several of the configuration tasks require UAC approval. When you are prompted, always click Continue or Yes to authorize these changes. Alternatively, see the Appendix of this guide for instructions about how to set the UAC behavior of the elevation prompt for administrators.

 

Join CLIENT1 to the CORP domain

Do this step using Windows PowerShell

To join CLIENT1 to the CORP domain

1.       From the Start screen, right-click Computer, and then click Properties.
2.         On the System page, click Advanced system settings.
3.         In the System Properties dialog box, on the Computer Name tab, click Change.
4.         In the Computer Name/Domain Changes dialog box, click Domain, type corp.contoso.com, and then
click OK.
5.         When you are prompted for a username and password, type the username and password for the
User1 domain account, and then click OK.
6.         When you see a dialog box that welcomes you to the corp.contoso.com domain, click OK.
7.         When you see a dialog box that prompts you to restart the computer, click OK.
8.         In the System Properties dialog box, click Close. Click Restart Now when prompted.
9.         After the computer restarts, click the Switch User arrow icon, and then click Other User. Log on to
the CORP domain with the User1 account.
Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Note that you must supply the User1 account domain credentials after entering the Add-Computer command.

Add-Computer -DomainName corp.contoso.com

Restart-Computer

 

Test access to resources from the Corpnet subnet

Next, verify that intranet web and file share resources on APP1 can be accessed by CLIENT1.

To test access to resources from CLIENT1

1.       From the Start screen, click the Internet Explorer icon.
2.         In the Address bar, type http://app1.corp.contoso.com/, and then press ENTER. You should see the default IIS 8 web page for
APP1.
3.         From the Start screen or the desktop taskbar, click the File Explorer icon.
4.         In the address bar, type \\app1\Files, and then press ENTER.
5.         You should see a folder window with the contents of the Files shared folder.
6.         In the Files shared folder window, double-click the Example.txt file. You should see the contents of the Example.txt file.
7.         Close the example.txt – Notepad and the Files shared folder windows.

 

Steps for Configuring the Internet Subnet

There are two steps to setting up the Internet subnet of the Windows Server 2012 Base Configuration test lab.

1.         Configure EDGE1.

2.         Configure INET1.

 

Step 1: Configure EDGE1

EDGE1 configuration consists of the following:

·           Install the operating system.

·           Configure TCP/IP.

·           Join the computer to the domain.

EDGE1 must have two network adapters installed. Connect one adapter to the physical or virtual switch for the Corpnet subnet, and connect the second adapter to the physical or virtual switch for the Internet subnet.
Install the operating system on EDGE1

First, install Windows Server 2012 Standard as a standalone server.

To install the operating system on EDGE1

1.       Start the installation of Windows Server 2012 Standard.
2.         Follow the instructions to complete the installation, specifying Windows Server 2012 Standard (full installation) and a strong
password for the local Administrator account. Log on using the local Administrator account.
3.         Connect EDGE1 to a network that has Internet access and run Windows Update to install the latest updates for Windows Server
2012.
4.         Connect one network adapter to the Corpnet subnet and the other to the Internet subnet.

 

Configure TCP/IP properties on EDGE1

Configure the TCP/IP protocol with static IP addresses on both interfaces.

Do this step using Windows PowerShell

To configure TCP/IP properties on the Corpnet adapter

1.       In Server Manager, click Local Server in the console tree. Click the link next to Ethernet in the Properties tile.
2.       In Network Connections, right-click the network connection that is connected to the Corpnet subnet, and then click Rename.
3.         Type Corpnet, and then press ENTER.
4.         Right-click Corpnet, and then click Properties.
5.         Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.6.      Select Use the following IP address. In IP address, type 10.0.0.2. In Subnet mask, type 255.255.255.0.7.       Select Use the following DNS server addresses. In Preferred DNS server, type 10.0.0.1.
8.         Click Advanced, and then the DNS tab.
9.         In DNS suffix for this connection, type corp.contoso.com, and then click OK three times to close the network properties dialog.
10.     In the Network Connections window, right-click the network connection that is connected to the Internet subnet, and then click
Rename.
11.     Type Internet, and then press ENTER.
12.     Right-click Internet, and then click Properties.
13.     Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
14.     Select Use the following IP address. In IP address, type 131.107.0.2. In Subnet mask, type 255.255.255.0.
15.     Click Advanced. On the IP Settings tab, click Add under IP Addresses. In the TCP/IP Address section, type 131.107.0.3 in IP
address, type 255.255.255.0 in Subnet mask, and then click Add.
16.     Click the DNS tab.
17.     In DNS suffix for this connection, type isp.example.com, and then click OK three times to close the network properties dialog.
18.     Close the Network Connections window.
19.     From the Start screen, type cmd, and then press ENTER.
20.     To check name resolution and network communication between EDGE1 and DC1, type ping dc1.corp.contoso.com in the
command prompt window and press ENTER.
21.     Verify that there are four responses from 10.0.0.1.
22.     Close the Command Prompt window.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Prior to executing these commands, rename the network connections to Corpnet and Internet according to their associated subnets.

New-NetIPAddress 10.0.0.2 -InterfaceAlias “Corpnet” -PrefixLength 24

Set-DnsClientServerAddress -InterfaceAlias “Corpnet” -ServerAddresses 10.0.0.1

Set-DnsClient -InterfaceAlias “Corpnet” -ConnectionSpecificSuffix corp.contoso.com

New-NetIPAddress 131.107.0.2 -InterfaceAlias “Internet” -PrefixLength 24

New-NetIPAddress 131.107.0.3 -InterfaceAlias “Internet” -PrefixLength 24

Set-DnsClient -InterfaceAlias “Internet” -ConnectionSpecificSuffix isp.example.com

 

Join EDGE1 to the CORP domain

Do this step using Windows PowerShell

To join EDGE1 to the CORP domain

1.       In Server Manager, click Local Server in the console tree. Click the link next to Computer name in the Properties tile.
2.       In the System Properties dialog box, on the Computer Name tab, click Change.
3.       In Computer Name, type EDGE1. Under Member of, click Domain, and then type corp.contoso.com.
4.       Click OK.
5.       When you are prompted for a username and password, type User1 and its password, and then click OK.
6.       When you see a dialog box welcoming you to the corp.contoso.com domain, click OK.
7.       When you are prompted that you must restart the computer, click OK.
8.       On the System Properties dialog box, click Close.
9.       When you are prompted to restart the computer, click Restart Now.
10.     After computer restarts, click the Switch User arrow icon, then click Other User and log on to CORP domain with the User1 account.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Note that you must supply the User1 account domain credentials after entering the Add-Computer command.

Add-Computer -NewName EDGE1 -DomainName corp.contoso.com

Restart-Computer

 

Step 2: Configure INET1

INET1 configuration consists of the following:

·           Install the operating system

·           Configure TCP/IP

·           Rename the computer

·           Install the Web Server (IIS) and DNS server roles

·          Create DNS records

·           Install DHCP

·           Configure the NCSI website

·           Test CLIENT1 access to Internet resources from the Internet subnet

 

Install the operating system on INET1

To install the operating system on INET1

1.       Start the installation of Windows Server 2012 Standard.
2.       Follow the instructions to complete the installation, specifying a strong password for the local Administrator account. Log on using
the local Administrator account.
3.       Connect INET1 to a network that has Internet access and run Windows Update to install the latest updates for Windows Server
2012.
4.       Connect INET1 to the Internet subnet.

 

Configure TCP/IP properties on INET1

Do this step using Windows PowerShell

To configure TCP/IP properties on INET1

1.       In Server Manager, click Local Server in the console tree. Click the link next to Ethernet in the Properties tile.

2.       In the Network Connections window, right-click Ethernet, and then click Properties.
3.       Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
4.         Select Use the following IP address. In IP address, type 131.107.0.1. In Subnet mask, type 255.255.255.0. In Preferred DNS
server, type 127.0.0.1.
5.         Click Advanced, and then click the DNS tab.
6.         In DNS suffix for this connection, type isp.example.com, and then click OK.
7.         Click OK twice to close the Ethernet Properties dialog box.
8.        Close the Network Connections window.
9.         From the Start screen, type cmd, and then press ENTER.
10.     To verify network connectivity between INET1 and EDGE1, type ping 131.107.0.2 in the command prompt and press ENTER.
11.     Verify that there are four failures from 131.107.0.2 indicating that the request timed out. The reason is that Windows Firewall with
Advanced Security on EDGE1 blocks the incoming ping messages. At the command prompt, run the arp -g command and confirm
that a Physical Address is associated with the Internet Address of 131.107.0.2. This confirms reachability of 131.107.0.2.
12.     Close the Command Prompt window.
13.     Right-click the network icon in the desktop System Notification Area and select Open Network and Sharing Center.
14.     In the Network and Sharing Center window, click Change advanced sharing settings.
15.     In the Advanced sharing settings window, click Turn on file and printer sharing, and then click Save changes.
16.     Close the Network and Sharing Center window.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability. Note that the “Ethernet” interface name may be different on your computer. Use ipconfig /all to list the interfaces.

New-NetIPAddress 131.107.0.1 -InterfaceAlias Ethernet -PrefixLength 24

Set-DnsClientServerAddress -InterfaceAlias “Ethernet” -ServerAddresses 127.0.0.1

Set-DnsClient -InterfaceAlias “Ethernet” -ConnectionSpecificSuffix isp.example.com

netsh advfirewall firewall set rule group=”File and Printer Sharing” new enable=yes

Rename the computer to INET1

Do this step using Windows PowerShell

To rename the computer to INET1

1.       In Server Manager, click Local Server in the console tree. Click the link next to Computer name in the Properties tile.
2.       In the System Properties dialog box, on the Computer Name tab, click Change.
3.       In Computer Name, type INET1. Click OK.
4.       When you are prompted that you must restart the computer, click OK.
5.       On the System Properties dialog box, click Close.
6.       When you are prompted to restart the computer, click Restart Now.
7.       After the computer restarts, log on with the local administrator account.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure.

Rename-Computer -NewName INET1

Restart-Computer

 

Install the DNS Server and Web Server (IIS) server roles on INET1

Next, install role services for INET1, which will act as an Internet web and DNS server for computers that are connected to the Internet subnet.

Do this step using Windows PowerShell

To install the IIS and DNS server roles

1.       On the Server Manager Dashboard screen, under Configure this local server, click Add roles and features.

2.       Click Next three times to get to the server role selection screen.

3.       On the Select Server Roles page, select DNS Server and click Add Features when prompted.

4.       Select Web Server (IIS), click Add Features when prompted, and then click Next.

5.       Click Next four times to accept the default DNS server and web server settings, and then click Install.

6.       Verify that the installations were successful, and then click Close.

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure.

Install-WindowsFeature DNS -IncludeManagementTools

Install-WindowsFeature Web-WebServer -IncludeManagementTools

 

Create DNS records on INET1

Next, create DNS records for the INET1 and EDGE1 IPv4 addresses on the Internet subnet and for the Network Connectivity Status Indicator (NCSI).

Do this step using Windows PowerShell

To create A records

1.   From the Start screen, click DNS.
2.   In the console tree of DNS Manager, expand INET1, and click Forward Lookup Zones.
3.   Right-click Forward Lookup Zones, click New Zone, and then click Next.
4.   On the Zone Type page, click Next.
5.   On the Zone Name page, type isp.example.com, and then click Next.
6.   Click Next twice to accept defaults for zone file and dynamic update, and then click Finish.
7.   In the console tree, expand Forward Lookup Zones, right click isp.example.com, and then click New Host (A or AAAA).
8.   In Name, type INET1. In IP address, type 131.107.0.1. Click Add Host.
9.   Click OK, and then click Done.
10.   In the console tree, right-click Forward Lookup Zones, click New Zone, and then click Next.
11.   On the Zone Type page, click Next.
12.   On the Zone Name page, type contoso.com, and then click Next.
13.   Click Next twice to accept defaults for zone file and dynamic update, and then click Finish.
14.   In the console tree, right click contoso.com, and then click New Host (A or AAAA).
15.   In Name, type EDGE1. In IP address, type 131.107.0.2.
16.   Click Add Host. Click OK, and then click Done.
17.   In the console tree, right-click Forward Lookup Zones, click New Zone, and then click Next.
18.   On the Zone Type page, click Next.
19.   On the Zone Name page, type msftncsi.com, and then click Next.
20.   Click Next twice to accept defaults for zone file and dynamic update, and then click Finish.
21.   In the console tree, right click msftncsi.com, and then click New Host (A or AAAA).
22.   In Name, type www. In IP address, type 131.107.0.1.23.   Click Add Host. Click OK.
23.   In Name, type dns. In IP address, type 131.107.255.255. Click Add Host. Click OK. Click Done.
24.   Close the DNS Manager console.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability.

Add-DnsServerPrimaryZone -Name isp.example.com -ZoneFile isp.example.com.dns

Add-DnsServerResourceRecordA -ZoneName isp.example.com -Name inet1 -IPv4Address 131.107.0.1

Add-DnsServerPrimaryZone -Name contoso.com -ZoneFile contoso.com.dns

Add-DnsServerResourceRecordA -ZoneName contoso.com -Name edge1 -IPv4Address 131.107.0.2

Add-DnsServerPrimaryZone -Name msftncsi.com -ZoneFile msftncsi.com.dns

Add-DnsServerResourceRecordA -ZoneName msftncsi.com -Name www -IPv4Address 131.107.0.1

Add-DnsServerResourceRecordA -ZoneName msftncsi.com -Name dns -IPv4Address 131.107.255.255

 

Install and configure DHCP on INET1

Next, configure INET1 as a DHCP server so that CLIENT1 can automatically configure itself when connecting to the Internet subnet.

Do this step using Windows PowerShell

To install and configure the DHCP server role on INET1

1.     On the Server Manager Dashboard screen, under Configure this local server, click Add roles and features.
2.     Click Next three times to get to the server role selection screen.
3.     In the Select Server Roles dialog, select DHCP Server, click Add Features when prompted, and then click Next.
4.     In the Select features dialog, click Next.
5.     Click Next on the Introduction screen, and then click Install.
6.     Allow the installation to complete, and then in the Installation progress window, click the link for Complete DHCP configuration.
7.     In the DHCP Post-Install configuration wizard, click Commit, and then click Close.
8.   In the Installation progress window, click Close.
9.     From the Start screen, click DHCP.
10.   In the DHCP console tree, expand INET1. Right-click IPv4, and click New Scope.
11.   Click Next in the New Scope Wizard.
12.   Type Internet for scope name, and then click Next.
13.   Next to Start IP Address, type 131.107.0.100, next to End IP Address, type 131.107.0.150, and next to Subnet Mask, type
255.255.255.0.
14.   Click Next four times to accept default settings for exclusions, delay and lease duration.
15.   On the Router (Default Gateway) dialog, type or confirm the address 131.107.0.1. Click Add, and then click Next.
16.   On the Domain Name and DNS Servers page, next to Parent domain, type isp.example.com. Under IP address, type
131.107.0.1. Click Add, and then click Next.
17.   On the WINS Servers page, click Next.
18.   On the Activate Scope page, click Next, and then click Finish.
19.   Close the DHCP Manager console.

 

Windows PowerShell equivalent commands
The following Windows PowerShell commands, run at an administrator-level Windows PowerShell command prompt, perform the same function as the preceding procedure. Long command lines are indented for readability.

Install-WindowsFeature DHCP -IncludeManagementTools

Add-DhcpServerv4Scope -name “Internet” -StartRange 131.107.0.100 -EndRange 131.107.0.150 -SubnetMask 255.255.255.0

Set-DhcpServerv4OptionValue -DnsDomain isp.example.com -DnsServer 131.107.0.1 -Router 131.107.0.1

 

 

Configure the NCSI website on INET1

Windows clients attempt to connect to the URL http://www.msftncsi.com/ncsi.txt and resolve the name dns.msftncsi.com to determine if they have Internet connectivity. In the following procedure, you create the ncsi.txt file and place it in the WWWROOT directory on INET1.

Do this step using Windows PowerShell

To configure the NCSI web site on INET1

1.       On INET1, launch File Explorer, and then navigate to C:\inetpub\wwwroot.
2.       In the details pane, right click an empty area, point to New, and then click Text Document.
3.       Rename the document to ncsi.
4.       Double-click on ncsi.
5.       In the Notepad window, type Microsoft NCSI and do not press ENTER to add a new line.
6.       Click File, and then click Exit. In the Notepad dialog box, click Save.
7.       Close the File Explorer window.

 

Windows PowerShell equivalent commands
The following PowerShell commands perform the same steps to write the Ncsi.txt file without a new line after the “Microsoft NCSI” string:

$filename = “C:\inetpub\wwwroot\ncsi.txt”

$text = “Microsoft NCSI”

[System.IO.File]::WriteAllText($fileName, $text)

Test access to Internet resources from the Internet subnet

Next, connect CLIENT1 to the Internet subnet and test connectivity to resources on INET1.

To test access to Internet resources from CLIENT1 when connected to the Internet subnet

1.         Move CLIENT1 from Corpnet subnet to the Internet subnet. From the Desktop, note that after network detection is complete, the
warning symbol on the network icon in the system notification area no longer appears. Hover over the network icon in the system
notification area and notice that it indicates Internet access. When prompted, click Yes, turn on sharing and connect to
devices.
2.         From the Start screen, click the Internet Explorer icon.
3.         In the Address bar, type http://inet1.isp.example.com/, and then press ENTER. You should see the default Internet
Information Server 8 web page.
4.         Close the Internet Explorer window.
5.         From the Start screen, type cmd, and then press ENTER.
6.         Type ping inet1.isp.example.com and press ENTER. You should see four responses from 131.107.0.1. Type ping
edge1.contoso.com and press ENTER. You should see four failures for 131.107.0.2 indicating that the request timed out.
Recall that Windows Firewall with Advanced Security on EDGE1 blocks the ping messages. At the command prompt, run the
arp-g command and confirm that a Physical Address is associated with the Internet Address of 131.107.0.2.
7.         Move CLIENT1 from the Internet subnet to the Corpnet subnet.
8.         From the command prompt window, type ping inet1.isp.example.com, and then press ENTER. You should see a “could not
find host inet1” message and no responses. Type ping 131.107.0.1, and then press ENTER. You should see “transmit failed”
messages and no responses. This indicates that there is no connectivity between the Corpnet subnet and the Internet subnet.
Although EDGE1 is connected to both the Internet and Corpnet subnets, it is not providing any routing, address translation, or
proxying services to allow computers on the Corpnet subnet to access resources on the Internet subnet. An additional test lab
guide will configure Internet subnet access from the Corpnet subnet as needed.

Snapshot the Base Lab Configuration

This completes the Windows Server 2012 Base Configuration test lab. To save this configuration for additional test labs, do the following:

1.       On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.

2.       If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots Windows Server 2012 Base
Configuration. If your lab uses physical computers, create disk images to save the Windows Server 2012 Base Configuration.

Important

Unlike previous versions of Windows Server, it is permissible in Windows Server 2012 to restore snapshots on domain controllers without fear of USN Rollback blocking further replication. DC virtualization details are demonstrated in the Test Lab Guide: Demonstrate Windows Server “8” Virtualized Domain Controller (VDC).

Main Test Lab Overview

In this test lab, Remote Access is deployed with:

  • One computer running Windows Server 2012 named DC1 that is configured as an intranet domain controller, Domain Name System (DNS) server, andDynamic Host Configuration Protocol (DHCP) server
  • One intranet member server running Windows Server 2012 named EDGE1 that is configured as a DirectAccess server
  • One intranet member server running Windows Server 2012 named APP1 that is configured as a general application server and web server. APP1 isconfigured as an enterprise root Certificate Authority (CA), and as the Network Location Server (NLS) for DirectAccess
  • One intranet member server running Windows Server 2003 SP2 named APP2 that is configured as a general application server and web server. APP2 isan IPv4-only intranet resource used to demonstrate NAT64 and DNS64 capabilities
  • One standalone server running Windows Server 2012 named INET1 that is configured as an Internet DHCP server, DNS server, and web server
  • One roaming member client computer running Windows 8 named CLIENT1 that is configured as a DirectAccess client
  • One standalone client computer running Windows 8 named NAT1 that is configured as a network address translation (NAT) device using InternetConnection SharingThe RemoteAccess test lab consists of three subnets that simulate the following:The Internet (131.107.0.0/24).An intranet named Corpnet (10.0.0.0/24), (2001:db8:1::/64), separated from the Internet by EDGE1.A home network named Homenet (192.168.137.0/24) connected to the Internet subnet by a NAT

 

 

Hardware and software requirements

The following are required components of the test lab:

  • The product disc or files for Windows Server 2012
  • The product disc or files for Windows 8
  • SKIPPING THIS: The product disc or files for Windows Server 2003 SP2, APP2
  • Six computers or virtual machines that meet the minimum hardware requirements for Windows Server 2012
  • One computer or virtual machine that meets the hardware requirements for Windows Server 2003

Known Issues

The following are known issues when configuring a Single Server DirectAccess lab with Windows Server 2012:

  1. Migration of a DirectAccess configuration from one Windows Server 2012 server to another is not supported in this release, and causes the RemoteAccess Management console to stop responding and close unexpectedly. To work around this issue, do the following:
  • Launch Registry Editor (regedit.exe)
  • In Registry Editor, locate and then click the following registry subkey: HKLM\System\CurrentControlSet\Services\Ramgmtsvc\Config\Parameters· Delete the DaConfigured DWORD value
  • From a command prompt, run gpupdate /force on the new DirectAccess server
  1. Management from a non-domain-joined computer via RSAT is not possible unless the destination server account is added to the non-domain-joinedcomputer’s list of WinRM TrustedHosts
  • To add the target DirectAccess server to the non-domain-joined computer’s list of WinRM TrustedHosts, run the following command:

set-item wsman:\localhost\client\trustedhosts “<computerName>” -force

  1. In this release, the Remote Access wizard will always link DirectAccess Group Policy Objects (GPOs) to the domain root, even if the GPOs werepreviously linked to another container in Active Directory. If you wish to link the GPOs to an OU for deployment, remove the domain root link andrelink the GPO to the desired OU after the wizard completes. Alternately, you can remove linking permissions to the domain root for the DirectAccessadministrator prior to configuring DirectAccess.

Steps for Configuring the Remote Access Test Lab

There are six steps to follow when setting up a Remote Access express setup test lab based on the Windows Server 2012 Base Configuration test lab.

  1. Set up the Base Configuration test lab.

The DirectAccess Single Server test lab requires the Test Lab Guide: Windows Server 2012 Base Configuration with Optional mini-module: Homenet subnet and Optional mini-module: Basic PKI as its starting point.

  1. Configure DC1.

DC1 is already configured as a domain controller with Active Directory, and is the DNS and DHCP server for the intranet subnet. For the single server DirectAccess test lab, DC1 must be configured with a static IPv6 address. A security group will be added to Active Directory for DirectAccess client computers.

  1. Configure APP1.

APP1 is already a member server computer that is configured with IIS and also acts as a file server and enterprise root Certificate Authority (CA). For the Remote Access express setup test lab, APP1 must be configured with a static IPv6 address.

  1. Configure EDGE1.

EDGE1 is already a member server computer. For the single server DirectAccess test lab, EDGE1 must be configured as a Remote Access server with a static IPv6 address.

  1. Configure CLIENT1.

CLIENT1 is already a domain member client computer running Windows 8. For the Remote Access express setup test lab, CLIENT1 will be used to test and demonstrate remote access operation.

 

Note

You must be logged on as a member of the Domain Admins group or a member of the Administrators group on each computer to complete the tasks described in this guide. If you cannot complete a task while you are logged on with an account that is a member of the Administrators group, try performing the task while you are logged on with an account that is a member of the Domain Admins group.

This guide provides steps for configuring the computers of the Windows Server 2012 Base Configuration test lab, configuring Remote Access in Windows Server 2012, and demonstrating remote client connectivity. The following sections provide details about how to perform these tasks.

Step 1: Set up the Base Configuration Test Lab

Set up the Base Configuration test lab for both the Corpnet and Internet subnets using the procedures in the “Steps for Configuring the Corpnet Subnet” and “Steps for Configuring the Internet Subnet” sections of the Test Lab Guide: Windows Server 2012 Base Configuration.

Set up the Homenet subnet using the procedures in the Optional mini-module: Homenet subnet.

Deploy a basic certificate infrastructure using the procedure in the Optional mini-module: Basic PKI.

 

Step 2: Configure DC1

DC1 configuration for the DirectAccess single server deployment test lab consists of the following procedures:

  • Configure an IPv6 address on DC1
  • Create a security group for DirectAccess client computers
  • Create a network location server DNS record
  • Create ICMPv4 and ICMPv6 echo request firewall rules in domain group policy

The following sections explain these procedures in detail.

 

Configure an IPv6 address on DC1

The Windows Server 2012 Base Configuration test lab does not include IPv6 address configuration. In this step, add IPv6 address configuration to support a DirectAccess deployment.
To configure an IPv6 address on DC1

1.       In Server Manager, click Local Server in the console tree. Scroll to the top of the details pane, and click the link next to Wired Ethernet
Connection.
2.       In Network Connections, right-click Wired Ethernet Connection, and then click Properties.
3.       Click Internet Protocol Version 6 (TCP/IPv6), and then click Properties.
4.       Click Use the following IPv6 address. In IPv6 address, type 2001:db8:1::1. In Subnet prefix length, type 64. In Default gateway, type
2001:db8:1::2. Click Use the following DNS server addresses, and in Preferred DNS server, type 2001:db8:1::1. Click OK.
5.       Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
6.       In Default gateway, type 10.0.0.2, and then click OK.
7.       Close the Wired Ethernet Connection Properties dialog box.
8.       Close the Network Connections window.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. Note that the “Wired Ethernet Connection” interface name may be different on your computer. Use ipconfig /all to list out the interfaces.

New-NetIPAddress -InterfaceAlias “Wired Ethernet Connection” -IPv6Address 2001:db8:1::1 -PrefixLength 64

Set-DnsClientServerAddress -InterfaceAlias “Wired Ethernet Connection” -ServerAddresses 2001:db8:1::1

New-NetRoute -DestinationPrefix 2001:db8:1::/64 -InterfaceAlias “Wired Ethernet Connection” -NextHop 2001:db8:1::2 -AddressFamily IPv6

New-NetRoute -DestinationPrefix 10.0.0.0/24 -InterfaceAlias “Wired Ethernet Connection” -NextHop 10.0.0.2 -AddressFamily IPv4

 

Create a security group for DirectAccess client computers

When DirectAccess is configured, it automatically creates group policy objects containing DirectAccess settings, and these are applied to DirectAccess clients and servers. By default, the Getting Started Wizard applies the client GPO to mobile computers only, in the Domain Computers security group. The procedures in this lab do not use the default setting, but instead create an alternate security group for DirectAccess clients.

To create a DirectAccess client security group

1.       On DC1, from the Start screen, click Active Directory Administrative Center.
2.       In the console tree, click the arrow to expand corp (local), and then click Users.
3.         In the Tasks pane, click New, and then click Group.
4.       In the Create Group dialog, type DirectAccessClients for Group name.
5.       Scroll down to access the Members section of the Create Group dialog, and click Add.
6.       Click Object Types, select Computers, and click OK.
7.       Type CLIENT1, and then click OK.
8.       Click OK to close the Create Group dialog.
9.       Exit the Active Directory Administrative Center.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.

New-ADGroup -GroupScope global -Name DirectAccessClients

Add-ADGroupMember -Identity DirectAccessClients -Members CLIENT1$

 

Create a network location server DNS record

A DNS record is required to resolve the name of the network location server, which will be located on the APP1 server.
To create the network location server DNS record

1.       Click Start, and then click DNS.
2.       Expand DC1, Forward Lookup Zones, and select corp.contoso.com.
3.       Right-click corp.contoso.com, and then click New Host (A or AAAA)
4.       Under Name, type NLS, and under IP address, type 10.0.0.3.
5.       Click Add Host, click OK, and then click Done.
6.       Close the DNS Manager console.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.

Add-DnsServerResourceRecordA -Name NLS -ZoneName corp.contoso.com -IPv4Address 10.0.0.3

 

Create ICMPv4 and ICMPv6 echo request firewall rules in domain group policy

ICMPv4 and ICMPv6 echo requests inbound and outbound are required for Teredo support. DirectAccess clients use Teredo as their IPv6 transition technology to connect to the DirectAccess server over the IPv4 Internet when they are assigned a private (RFC 1918) IP address and are located behind a NAT device or firewall that allows outbound UDP port 3544. In addition, enabling ping facilitates connectivity testing between participants in the DirectAccess solution.
To create ICMPv4 and ICMPv6 firewall rules

1.       From the Start screen, click Group Policy Management.
2.       In the console tree, expand Forest: corp.contoso.com\Domains\corp.contoso.com.
3.       Select Group Policy Objects.
4.       In the details pane, right-click Default Domain Policy, and then click Edit.
5.       In the console tree of the Group Policy Management Editor, expand Computer Configuration\Policies\Windows Settings\Security
Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security-LDAP://CN=…
6.       In the console tree, select Inbound Rules, right-click Inbound Rules, and then click New Rule.
7.       In the New Inbound Rule Wizard, on the Rule Type page, click Custom, and then click Next.
8.       On the Program page, click Next.
9.       On the Protocols and Ports page, in Protocol type, click ICMPv4, and then click Customize.
10.   On the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, click OK, and then click Next.
11.   Click Next three times.
12.   On the Name page, in Name, type Inbound ICMPv4 Echo Requests, and then click Finish.
13.   In the console tree, right-click Inbound Rules, and then click New Rule.
14.   On the Rule Type page, click Custom, and then click Next.
15.   On the Program page, click Next.
16.   On the Protocols and Ports page, in Protocol type, click ICMPv6, and then click Customize.
17.   On the Customize ICMP Settings dialog box, click Specific ICMP types, select Echo Request, click OK, and then click Next.
18.   Click Next three times.
19.   On the Name page, in Name, type Inbound ICMPv6 Echo Requests, and then click Finish.
20.  Confirm that the rules you created appear in the Inbound Rules node. Close the Group Policy Management Editor, and close Group
Policy Management console.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. Note that these commands are required on each corpnet computer, and do not configure Group Policy settings:

Set-NetFirewallRule -DisplayName “File and Printer Sharing (Echo Request – ICMPv4-In)” -Enabled True -Direction Inbound -Action Allow

Set-NetFirewallRule -DisplayName “File and Printer Sharing (Echo Request – ICMPv6-In)” -Enabled True -Direction Inbound -Action Allow

 

Step 3: Configure APP1

APP1 configuration for the DirectAccess single server deployment test lab consists of the following procedures:

  • Configure an IPv6 address on APP1
  • Configure permissions of the Web Server certificate template
  • Obtain an additional certificate for APP1
  • Configure the HTTPS security binding

The following sections explain these procedures in detail.

 

Configure an IPv6 address on APP1

The Windows Server 2012 Base Configuration test lab does not include IPv6 address configuration. In this step, add IPv6 address configuration to support a DirectAccess deployment.
To configure an IPv6 address on APP1

1.       In Server Manager, click Local Server in the console tree. Scroll to the top of the details pane, and click the link next to Wired Ethernet Connection.
2.       In Network Connections, right-click Wired Ethernet Connection, and then click Properties.
3.         Click Internet Protocol Version 6 (TCP/IPv6), and then click Properties.
4.       Click Use the following IPv6 address. In IPv6 address, type 2001:db8:1::3. In Subnet prefix length, type 64. In Default gateway, type 2001:db8:1::2. Click Use the following DNS server addresses, and in Preferred DNS server, type 2001:db8:1::1. Click OK.
5.       Click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.
6.       In Default gateway, type 10.0.0.2, and then click OK.
7.       Close the Wired Ethernet Connection Properties dialog box.
8.       Close the Network Connections window.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. Note that the “Wired Ethernet Connection” interface name may be different on your computer. Use ipconfig /all to list out the interfaces.

New-NetIPAddress -InterfaceAlias “Wired Ethernet Connection” -IPv6Address 2001:db8:1::3 -PrefixLength 64

Set-DnsClientServerAddress -InterfaceAlias “Wired Ethernet Connection” -ServerAddresses 2001:db8:1::1

New-NetRoute -DestinationPrefix 2001:db8:1::/64 -InterfaceAlias “Wired Ethernet Connection” -NextHop 2001:db8:1::2 -AddressFamily IPv6

New-NetRoute -DestinationPrefix 10.0.0.0/24 -InterfaceAlias “Wired Ethernet Connection” -NextHop 10.0.0.2 -AddressFamily IPv4

Configure permissions of the Web Server certificate template

Next, configure permissions on the Web Server certificate template so that requesting computers can specify the subject name of a certificate.
To configure permissions of the Web Server certificate template

1.       On APP1, from the Start screen, click Certification Authority.
2.       In the details pane, expand corp-APP1-CA.
3.       Right-click Certificate Templates, and then click Manage.
4.         In the Certificate Templates console, right-click the Web Server template, and then click Properties.
5.       Click the Security tab, and then click Authenticated Users.
6.         In Permissions for Authenticated Users, click Enroll under Allow, and then click OK.NoteThe
Authenticated Users group is configured here for simplicity in the test lab. In a real deployment, you
would specify the name of a security group that contains the computer accounts of the computers in
your organization that can request custom certificates, which includes the DirectAccess server and
network location server.
7.         Close the Certificate Templates console.

 

Obtain an additional certificate on APP1

Obtain an additional certificate for APP1 with a customized subject and alternative name for network location.

To obtain an additional certificate for APP1

1.         From the Start screen, type mmc, and then press ENTER.
2.         Click File, and then click Add/Remove Snap-in.
3.         Click Certificates, click Add, select Computer account, click Next, select Local computer, click Finish, and
then click OK.
4.         In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
5.         Right-click Certificates, point to All Tasks, and then click Request New Certificate.
6.         Click Next twice.
7.         On the Request Certificates page, click Web Server, and then click More information is required to
enroll for this certificate.
8.         On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common
Name.
9.         In Value, type nls.corp.contoso.com, and then click Add.
10.     Click OK, click Enroll, and then click Finish.
11.     In the details pane of the Certificates snap-in, verify that a new certificate with the name
nls.corp.contoso.com was enrolled with Intended Purposes of Server Authentication.
12. Close the console window. If you are prompted to save settings, click No.

 

Configure the HTTPS security binding

Next, configure the HTTPS security binding so that APP1 can act as the network location server.

To configure the HTTPS security binding

1.       From the Start screen, click Internet Information Services (IIS) Manager.
2.         In the console tree of Internet Information Services (IIS) Manager, open APP1/Sites, and then click
Default Web site.
3.         In the Actions pane, click Bindings.
4.         In the Site Bindings dialog box, click Add.
5.         In the Add Site Binding dialog box, in the Type list, click https. In SSL Certificate, click the certificate with
the name nls.corp.contoso.com. Click OK, and then click Close.
6.        Close the Internet Information Services (IIS) Manager console.

 

Step 4: Configure EDGE1

EDGE1 configuration for the DirectAccess single server deployment test lab consists of the following procedures:

  • Configure an IPv6 address on EDGE1
  • Provision EDGE1 with a certificate for IP-HTTPS
  • Install the Remote Access role on EDGE1
  • Configure DirectAccess on EDGE1
  • Confirm Group Policy settings
  • Confirm IPv6 settings

The following sections explain these procedures in detail.

 

Configure an IPv6 address on EDGE1

The Windows Server 2012 Base Configuration test lab does not include IPv6 address configuration. In this step, add IPv6 address configuration to EDGE1 to support a DirectAccess deployment.
To configure an IPv6 address on EDGE1

1.         In Server Manager, click Local Server in the console tree. Scroll to the top of the details pane, and click
the link next to Corpnet.
2.         In Network Connections, right-click Corpnet, and then click Properties.
3.         Click Internet Protocol Version 6 (TCP/IPv6), and then click Properties.
4.         Click Use the following IPv6 address. In IPv6 address, type 2001:db8:1::2. In Subnet prefix length, type
64. Click Use the following DNS server addresses, and in Preferred DNS server, type 2001:db8:1::1.
Click OK.
5.         Close the Corpnet Properties dialog box.
6.         Close the Network Connections window.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.

New-NetIPAddress -InterfaceAlias Corpnet -IPv6Address 2001:db8:1::2 -PrefixLength 64

Set-DnsClientServerAddress -InterfaceAlias Corpnet -ServerAddresses 2001:db8:1::1

 

Provision EDGE1 with a certificate for IP-HTTPS

A certificate is required to authenticate the IP-HTTPS listener when clients connect over HTTPS.
To install an IP-HTTPS certificate on EDGE1

1.       On EDGE1, from the Start screen, type mmc, and then press ENTER.
2.         Click File, and then click Add/Remove Snap-in.
3.         Click Certificates, click Add, click Computer account, click Next, select Local computer, click Finish, and
then click OK.
4.         In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
5.         Right-click Certificates, point to All Tasks, and then click Request New Certificate.
6.         Click Next twice.
7.         On the Request Certificates page, click Web Server, and then click More information is required to
enroll for this certificate.
8.         On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common
Name.
9.         In Value, type edge1.contoso.com, and then click Add.
10.     In the Alternative name area, under Type, select DNS.
11.     In Value, type edge1.contoso.com, and then click Add.
12.     On the General tab, under Friendly name, type IP-HTTPS Certificate.
13.     Click OK, click Enroll, and then click Finish.
14.     In the details pane of the Certificates snap-in, verify that a new certificate with the name
edge1.contoso.com was enrolled with Intended Purposes of Server Authentication.
15.     Close the console window. If you are prompted to save settings, click No.

Install the Remote Access server role on EDGE1

The Remote Access server role in Windows Server 2012 combines the DirectAccess feature and the RRAS role service into a new unified server role. This new Remote Access server role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Use the following procedure to install the Remote Access role on EDGE1.

To install the Remote Access server role on EDGE1

1.       In the Dashboard console of Server Manager, under Configure this local server, click Add roles and
features.
2.         Click Next three times to get to the server role selection screen.
3.         In the Select Server Roles dialog, select Remote Access, click Add Features when prompted, and then
click Next. SELECT —- DirectAccess and VPN
4.         Click Next five times to accept the defaults for features, remote access role services, and web server
role services.
5.         On the Confirmation screen, click Install.
6.         Wait for the feature installations to complete, and then click Close.
Windows PowerShell equivalent commands
The following Windows PowerShell cmdlet or cmdlets perform the same function as the preceding procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.

Install-WindowsFeature RemoteAccess -IncludeManagementTools

 

Configure DirectAccess on EDGE1

Configure DirectAccess in a single server deployment using the Remote Access Setup Wizard.

To configure DirectAccess on EDGE1

1.       From the Start screen, click Remote Access Management.
2.         In the Remote Access Management console, click Run the Remote Access Setup Wizard.
3.         In the Configure Remote Access wizard, click Deploy DirectAccess only.4.         Under Step 1 Remote
Clients, click Configure.
5.         Select Deploy full DirectAccess for client access and remote management, and then click Next.6.
On the Select Groups screen, click Add, type DirectAccessClients, click OK, and then click Next.
7.         On the Network Connectivity Assistant screen, next to DirectAccess connection name, type Contoso
DirectAccess Connection. Click Finish.
8.         Under Step 2 DirectAccess Server, click Configure.
9.         Verify that Edge is selected as the network topology. Type edge1.contoso.com as the public name to
which remote access clients will connect. Click Next.
10.     On the Network Adapters screen, wait for the wizard to populate the Internet and Corpnet interfaces.
Verify that CN=edge1.contoso.com is the certificate automatically selected to authenticate IP-HTTPS
connections. Click Next.
11.     On the Prefix Configuration screen, click Next.
12.     On the Authentication screen, select Use computer certificates, and then click Browse.
13.     Select corp-APP1-CA, click OK, and then click Finish.
14.     Under Step 3 Infrastructure Servers, click Configure.
15.     For the URL of the network location server, type https://nls.corp.contoso.com, and then click Validate. If
this fails, on APP1, verify you have selected the https cert in IIS under bindings—it should be
nls.corp.contoso.com.
16.     Once connectivity to the NLS URL on APP1 is validated successfully, click Next.
17.     Click Next twice to accept defaults for DNS and Management, and then click Finish.
18.     At the bottom of the Remote Access Setup screen, click Finish.
19.     In the Remote Access Review dialog, click Apply.
20.     After the Remote Access Setup Wizard completes, click Close.
21.     In the console tree of the Remote Access Management console, select Operations Status. Wait until the
status of all monitors display as “Working”. In the Tasks pane under Monitoring, click Refresh
periodically to update the display. Note: In this release of Windows Server 2012, the status of Network
adapters may be yellow instead of green. To ensure that the status of Network adapters shows as
Working, open an elevated command prompt, type the following command and then press ENTER.
netsh interface ipv6 add route 2001:db8:1::/48 publish=yes interface = “Corpnet”


Reference:

DA Support http://directaccess.richardhicks.com/category/directaccess/

Enable Teredo: http://directaccess.richardhicks.com/2015/04/28/enable-teredo-support-after-directaccess-has-been-configured/

Teredo tunneling interface index and then enable forwarding on this interface by issuing the following command

netsh interface ipv6 show interface – run on EDGE1

netsh interface ipv6 set interface # forwarding=enabled – run on EDGE1

Check DA Status

Get-DAClientExperienceConfiguration – run on client

Get-DAConnectionStatus – run on client

Get-NCSIPolicyConfiguration – run on client

Get-DAEntryPointTableItem – run on client

You can enable or disable 6to4, Teredo, ISATAP with netsh commands:

netsh interface 6to4 set state disabled

netsh interface 6to4 set state enabled

netsh interface teredo set state disabled

netsh interface isatap set state enabled

netsh interface teredo set state enterpriseclient (this enables Teredo and sets it to EnterpriseClient status, which is recommended)

Verify GP Client

gpresult /r /scope /computer

netsh name show effectivepolicy

Reset/Update IPv6 Settings

net start iphlpsvc && net start iphlpsvc

 

Test ISATAP Connectivity

ping 2002:836b:2:1::5efe:10.0.0.1

ping 2002:836b:2:1::5efe:10.0.0.2

ping 2002:836b:2:1::5efe:10.0.0.3

Disable httpstunnel

Configuring DirectAccess for Windows 7

http://www.nomizo.fr/2013/07/directaccess-part-6-configuring.html

 

Confirm Group Policy settings

The DirectAccess wizard configures GPOs and settings that are automatically deployed via Active Directory for the Remote Access server and the DirectAccess clients.
To examine Group Policy settings created by the DirectAccess wizard

1.       On EDGE1, from the Start screen, click Group Policy Management.
2.         Expand Forest: corp.contoso.com, expand Domains, expand corp.contoso.com, and then expand Group Policy Objects.
3.         The Remote Access Setup wizard creates two new GPOs. DirectAccess Client Settings is applied to members of the DirectAccessClients
security group. DirectAccess Server Settings is applied to the EDGE1 DirectAccess server. Confirm that the correct security filtering is
done for each of these GPOs by clicking the GPO and then viewing the entries in the Security Filtering section on the Scope tab in the
details pane of the console.
4.         From the Start screen, type wf.msc, and then press ENTER.
5.         In the Windows Firewall with Advanced Security console, note that the Domain Profile is Active and the Public Profile is Active. It is
important that the Windows Firewall is enabled and both the domain and public profiles are active. If the Windows Firewall is disabled, or
if domain or public profiles are disabled, DirectAccess will not function correctly.
6.         In the Windows Firewall with Advanced Security console tree, click the Connection Security Rules node. The details pane of the console
will display two connection security rules: DirectAccess Policy-DaServerToCorp, and DirectAccess Policy-DaServerToInfra. The first rule is
used to establish the intranet tunnel and the second rule is for the infrastructure tunnel. Both of these rules are delivered to EDGE1 using
Group Policy.
7.         Close the Windows Firewall with Advanced Security console.

Confirm IPv6 settings

For the DirectAccess solution to function, the IPv6 settings on EDGE1 must be correct.
To confirm IPv6 settings

1.         On EDGE1, from the desktop taskbar, right-click Windows PowerShell, and then click Run as administrator.
2.         In the Windows PowerShell window, type Get-NetIPAddress and press ENTER.
3.         The output displays information related to the EDGE1 networking configuration. There are several sections of interest:·           The 6TO4 Adapter section shows information that includes the Global IPv6 address used by EDGE1 on its external interface.·           The IPHTTPSInterface section shows information regarding the IP-HTTPS interface.
4.         To see information regarding the Teredo interface on EDGE1, typenetsh interface Teredo show stateand press ENTER. The output should include an entry State: online

Step 5: Configure CLIENT1

Use the following procedures to demonstrate remote access connectivity with CLIENT1:

  • Connect CLIENT1 to the Corpnet subnet and update group policy
  • Connect CLIENT1 to the Internet subnet and test remote access
  • Connect CLIENT1 to the Homenet subnet and test remote access
  • Monitor the client connection on the EDGE1 DirectAccess server

The following sections explain these procedures in detail.

 

Connect CLIENT1 to the Corpnet subnet and update group policy

To receive the DirectAccess settings, CLIENT1 must update its group policy while connected to the Corpnet subnet.
To update group policy on CLIENT1 and apply DirectAccess settings

1.         Connect CLIENT1 to the Corpnet subnet.
2.         Restart the CLIENT1 computer to update group policy and security group membership while connected to the Corpnet subnet. After
restarting, log on as CORP\User1.
3.         From the Start screen, type PowerShell, then right-click Windows PowerShell, and click Run as administrator.
4.         Type Get-DnsClientNrptPolicy and hit ENTER. The Name Resolution Policy Table (NRPT) entries for DirectAccess are displayed. Note
that the NLS server exemption is displayed as NLS.corp.contoso.com. This is the alias used for the APP1 server. All other name
resolution for corp.contoso.com will use the internal IPv6 address of the EDGE1 server (2001:db8::1::2) when outside the corporate
network.
5.         Type Get-NCSIPolicyConfiguration and hit ENTER. The network connectivity status indicator settings deployed by the wizard are
displayed. Note that the value of DomainLocationDeterminationURL is https://nls.corp.contoso.com. Whenever this network location
server URL is accessible, the client will determine that it is inside the corporate network, and NRPT settings will not be applied.
6.         Type Get-DAConnectionStatus and hit ENTER. Since the client can reach the network location server URL, the status will display as
ConnectedLocally.

Connect CLIENT1 to the Internet subnet and test remote access

To test remote access connectivity from the Internet, move the CLIENT1 connection to the Internet subnet.
To test remote access from the Internet

1.       Connect CLIENT1 to the Internet subnet. Once the network determination process completes, the network icon should indicate Internet
access.
2.        In the PowerShell window, type Get-DAConnectionStatus and hit ENTER. The status should show as ConnectedRemotely.
3.         Click the network icon in the System Notification Area. Note that Contoso DirectAccess Connection is listed as Connected. This is the
connection name we provided in the DirectAccess wizard.
4.         Right-click Contoso DirectAccess Connection and then click Properties. Note that Status shows as Connected.
5.         From the PowerShell prompt, type ping inet1.isp.example.com and hit ENTER to verify Internet name resolution and connectivity. You
should receive four replies from 131.107.0.1.
6.         Type ping app1.corp.contoso.com and hit ENTER to verify corporate intranet name resolution and connectivity. Since APP1 is an IPv6
enabled intranet resource, the ICMP response is from the IPv6 address of APP1 (2001:db8:1::3).
7.         Type ping app2.corp.contoso.com and hit ENTER to verify name resolution and connectivity to the intranet Windows Server 2003 file
server. Note the format of the IPv6 address returned. Since APP2 is an IPv4-only intranet resource, the dynamically created NAT64
address of APP2 is returned. The dynamically created prefix assigned by DirectAccess for NAT64 will be in the form
fdxx:xxxx:xxxx:7777::/96.
8.         Click the Internet Explorer icon to launch IE. Verify that you can access the website on http://inet1.isp.example.com. This site is running
on the INET1 Internet server, and validates Internet connectivity outside of DirectAccess.
9.         Verify that you can access the website on http://app1.corp.contoso.com. This site is running on the APP1 server, and validates
DirectAccess connectivity to an internal IPv6 web server.
10.     Verify that you can access the website on http://app2.corp.contoso.com. You should see the default “Under Construction” IIS web page,
validating DirectAccess connectivity to an internal IPv4-only web server.
11.     From the desktop taskbar, click the Windows Explorer icon.
12.     In the address bar, type \\app1\Files, and then press ENTER.
13.     You should see a folder window with the contents of the Files shared folder.
14.     In the Files shared folder window, double-click the Example.txt file. You should see the contents of the Example.txt file.
15.     Close the Example – Notepad window.
16.     In the Windows Explorer address bar, type \\app2\Files, and then press ENTER.
17.     In the Files shared folder window, double-click the New Text Document.txt file. You should see the contents of the document shared on
the IPv4-only server.
18.     Close the New Text Document – Notepad and the Files shared folder windows.
19.     From the PowerShell window, type Get-NetIPAddress and then press ENTER to examine the client’s IPv6 configuration.
20.     Type Get-NetTeredoState and hit ENTER to examine the Teredo configuration. Note that the Teredo server name is edge1.contoso.com,
the externally resolvable DNS name of the EDGE1 server.
21.     Type Get-NetIPHTTPSConfiguration and hit ENTER. Examine the settings applied by group policy to direct the client to
https://edge1.contoso.com:443/IPHTTPS.
22.     Type wf.msc and then hit ENTER to launch the Windows Firewall with Advanced Security console. Expand Monitoring, and then Security
Associations to examine the IPsec SAs established. Note that the authentication methods used are Computer Kerberos and User
Kerberos, as well as Computer certificate and User Kerberos.
23.     Select Connection Security Rules in the console tree. Examine the rules used to provide DirectAccess connectivity.
24.     Close the Windows Firewall with Advanced Security console.

 

Connect CLIENT1 to the Homenet subnet and test remote access

To test remote access connectivity from a simulated home network behind a NAT, move the CLIENT1 connection to the Homenet subnet.

To test remote access from the home network

1.       Connect CLIENT1 to the Homenet subnet. Once the network determination process completes, the
network icon should indicate Internet access.
2.         In the PowerShell window, type Get-DAConnectionStatus and hit ENTER. The status should show as
ConnectedRemotely.
3.         Click the network icon in the System Notification Area. Note that Contoso DirectAccess Connection is
listed as Connected. Right-click Contoso DirectAccess Connection and then click Properties. Note that
Status shows as Connected.
4.         Type ping app1.corp.contoso.com and hit ENTER to verify corporate intranet name resolution and
connectivity to an internal IPv6 resource.
5.         Type ping app2.corp.contoso.com and hit ENTER to verify corporate intranet name resolution and
connectivity to an internal IPv4 resource.
6.         Click the Internet Explorer icon to launch IE. Verify that you can access the websites on
http://inet1.isp.example.com, http://app1.corp.contoso.com, and http://app2.corp.contoso.com.
7.         From the desktop taskbar, click the Windows Explorer icon.
8.         Verify that you can access the shared files in \\APP1\Files and \\APP2\Files.
9.         Close the Windows Explorer window.
10.     In the PowerShell window, type Get-NetIPAddress and then press ENTER to examine the client’s IPv6
configuration.
11.   Type Get-NetTeredoState and hit ENTER to examine the Teredo configuration. Note that the Teredo state
is listed as qualified.
12.     Type ipconfig and hit ENTER. Note that in this deployment behind a NAT, the DirectAccess client is
connecting via the Teredo tunnel adapter.

 

Monitor the client connection on the EDGE1 DirectAccess server

The Remote Access Management Console in Windows Server 2012 provides remote client status monitoring functionality for both DirectAccess and VPN connections.

To monitor the client connection on EGDE1

1.       On EDGE1, from the Start screen, click Remote Access Management.
2.         In the Remote Access Management console, select Dashboard.
3.         Examine the data collected under Remote Client Status.
4.         In the Remote Access Management console, select Remote Client Status.
5.         Double-click the CLIENT1 connection to display the detailed remote client statistics dialog.

Snapshot the Configuration

This completes the DirectAccess single server deployment test lab. To save this configuration so that you can quickly return to a working remote access configuration from which you can test other modular test lab guides (TLGs), TLG extensions, or for your own experimentation and learning, do the following:

  1. On all physical computers or virtual machines in the test lab, close all windows and then perform a graceful shutdown.
  2. If your lab is based on virtual machines, save a snapshot of each virtual machine and name the snapshots DirectAccess single server. If your lab uses physical computers, create disk images to save the DirectAccess single server test lab configuration.

 

Additional Resources

For more information about DirectAccess, see the DirectAccess TechNet portal page.

For a list of additional Microsoft TLGs, see Test Lab Guides in the TechNet Wiki.

 

Troubleshooting Notes

http://www.nomizo.fr/2013/07/directaccess-part-5-troubleshooting.html

Windows 7 Ultimate or Enterprise must be used as other Windows versions will not work.

Remember to log into the machines with User1; User1 should be a member of domain admins, enterprise admins.

On the CLIENT, check the GP with GPResult /r /scope computer — look for Applied DirectAccess. If not there, verify the CLIENT is part of the DirectAccessClients group, and then log into the CLIENT as administrator and run gpupdate /force /boot

EDGE1 should be a CA, and have certs for edge1.contoso.com and edge1.corp.contoso.com in the Computer Personal store. If not, Request certificates. edge1.contoso.com is setup with Type, DNS.

APP1 should have a ‘C:\Files’ share with the correct permissions and security ACLs.

APP1 IIS should have a binding to nls.corp.contoso.com

Verify corp-APP1-CA and corp-APP1-CA+ have been published from the CA to EDGE1 (c:\CRLDist) — CRLDist has been set up as a hidden share with proper permissions and ALCs.

Verify the NLS A record has been added to DNS: A record, NLS, 10.0.0.3.

Pay attention to which connection types are being used on the DirectAccess Server (how a client remotely connects). You want IP-Https, and not 6to4.

Verify clients are using the correct certificates, such as CLIENT1.corp.contoso.com and edge1.contoso.com in the Computer (not user) Personal Store.

Verify IPv6 and IPv4 settings on APP1, DC1, and EDGE1 servers

Make sure there are A and AAAA records in DNS for APP1, DC1, and EDGE1.

The NAT1 connection should have a Homenet and Internet NIC. The Internet is connected to the 131.107.x.x network, and is shared to Homenet.
Clients should be manually configured (I used a netsh script) to change the IP scheme to 192.168.137.x.

netsh interface ip set address “Local Area Connection” static 192.168.137.105 255.255.255.0 192.168.137.1 1
netsh interface ipv4 delete dns “Local Area Connection” all
netsh interface ipv4 add dns “Local Area Connection” address=192.168.137.1 index=1

When running in a Win 7 and Win 10 environment, the CA/PKI should be used…and certs should be setup on EDGE1 and APP1.

The NLS URL should be specified on EDGE1, in the Remote Access Console: https://nls.corp.contoso.com/

On EDGE1, in the Remote Access Console, there should be no errors under Operational Status.

If there is an IPSec error, you need to check the certs in the Computer — Personal store: edge1.contoso.com and edge1.corp.contoso.com should be there. Make sure edge1.contoso.com has been selected in the DA setup.

Make sure your external machines cannot ping nls.corp.contoso.com

Make sure your internal machines can ping nls.corp.contoso.com

Setting up DirectAccess for Windows 7 requires certificates, i.e. a working PKI.

■ Figure 17 On the DirectAccess Server in the console – Step 2

■ Figure 18 On the DirectAccess server, Computer Store

■ Figure 19 On the Certificate Authority – APP1, Computer Store

■ Figure 20 Don’t use the Getting Started Wizard. Use the Remote Access Setup Wizard