EDGE1 configuration for the DirectAccess single server deployment test lab consists of the following procedures:
- Configure an IPv6 address on EDGE1.
- Provision EDGE1 with a certificate for IP-HTTPS.
- Install the Remote Access role on EDGE1.
- Configure DirectAccess on EDGE1.
- Confirm Group Policy settings.
- Confirm IPv6 settings.
The following sections explain these procedures in detail.
Configure an IPv6 address on EDGE1
The Windows Server 2012 Base Configuration test lab does not include IPv6 address configuration. In this step, add IPv6 address configuration to EDGE1 to support a DirectAccess deployment.
To configure an IPv6 address on EDGE1
- In Server Manager, click Local Server in the console tree. Scroll to the top of the details pane, and then click the link next to Corpnet.
- In Network Connections, right-click Corpnet, and then click Properties.
- Click Internet Protocol Version 6 (TCP/IPv6), and then click Properties.
- Click Use the following IPv6 address. In IPv6 address, type 2001:db8:1::2. In Subnet prefix length, type 64. Click Use the following DNS server addresses, and in Preferred DNS server, type 2001:db8:1::1. Click OK.
- Close the Corpnet Properties dialog box.
- Close the Network Connections window.
Demo: Configure an IPv6 Address on EDGE1Note The following Windows PowerShell cmdlet or cmdlets perform the same function as the previous procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints. Be aware that the "Ethernet" interface name may be different on your computer. Use
ipconfig /all to list out the interfaces.
New-NetIPAddress -InterfaceAlias Corpnet -IPv6Address 2001:db8:1::2 -PrefixLength 64
Set-DnsClientServerAddress -InterfaceAlias Corpnet -ServerAddresses 2001:db8:1::1
Provision EDGE1 with a certificate for IP-HTTPS
A certificate is required to authenticate the IP-HTTPS listener when clients connect over HTTPS.
Prepare a certificate template
- On App1, from the Start screen, type mmc, and then press Enter.
- Click File, and then click Add/Remove Snap-in.
- Click Certificate Templates, click Add, and then click OK.
- Click Certificate Templates in the left panel. In the detail panel, right click the Computer template and click Duplicate Template.
- Click the Subject Name tab, and then click Supply in the request option. Click OK.
- Click the General tab, and then type Template for DA under Template display name.
- Click OK.
- In the MMC window, click File, and then click Add/Remove Snap-in.
- Click Certification Authority, click Add, click Local computer: (the computer this console is running on), click Finish, and then click OK.
- Expand corp-APP1-CA, right click Certificate Template, select New, click Certificate Template to Issue.
- Select Template for DA, and click OK.
Demo: Prepare a certificate templateTo install an IP-HTTPS certificate on EDGE1
- On EDGE1, from the Start screen, type mmc, and then press Enter.
- Click File, and then click Add/Remove Snap-in.
- Click Certificates, click Add, click Computer account, click Next, select Local computer, click Finish, and then click OK.
- In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
- Right-click Certificates, point to All Tasks, and then click Request New Certificate.
- Click Next two times.
- On the Request Certificates page, click Template for DA, and then click More information is required to enroll for this certificate.
- On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common Name.
- In Value, type edge1.contoso.com, and then click Add.
- In the Alternative name area, under Type, select DNS.
- In Value, type edge1.contoso.com, and then click Add.
- On the General tab, under Friendly name, type IP-HTTPS Certificate.
- Click OK, click Enroll, and then click Finish.
- In the details pane of the Certificates snap-in, verify that a new certificate with the name edge1.contoso.com was enrolled with Intended Purposes of Server Authentication, Client Authentication.
- Close the console window. If you are prompted to save settings, click No.
Note If you cannot see the
Template for DA template, check the following items:
- Check whether the user account has permission to enroll the Template for DA template.
- Check whether the certificate template has successfully been added to CA.
Demo: Install an IP-HTTPS certificate on EDGE1Install the Remote Access server role on EDGE1
The Remote Access server role in Windows Server 2012 combines the DirectAccess feature and the RRAS role service into a new unified server role. This new Remote Access server role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Use the following procedure to install the Remote Access role on EDGE1.
To install the Remote Access server role on EDGE1
- In the Dashboard console of Server Manager, under Configure this local server, click Add roles and features.
- Click Next three times to reach the server role selection screen.
- In the Select Server Roles dialog box, select Remote Access, click Add Features when you are prompted, and then click Next.
- Click Next five times to accept the default settings for features, remote access role services, and web server role services.
- On the Confirmation screen, click Install.
- Wait for the feature installations to complete, and then click Close.
video
Note The following Windows PowerShell cmdlet or cmdlets perform the same function as the previous procedure. Enter each cmdlet on a single line, even though they may appear word-wrapped across several lines here because of formatting constraints.
Install-WindowsFeature RemoteAccess -IncludeManagementTools
Configure DirectAccess on EDGE1
Configure DirectAccess in a single server deployment by using the Remote Access Setup Wizard.
To configure DirectAccess on EDGE1
- From the Start screen, click Remote Access Management.
- In the Remote Access Management console, click Run the Remote Access Setup Wizard.
- In the Configure Remote Access wizard, click Deploy DirectAccess only.
- Under "Step 1 Remote Clients," click Configure.
- Select Deploy full DirectAccess for client access and remote management, and then click Next.
- On the Select Groups screen, click Add, type DirectAccessClients, click OK, and then click Next.
- On the Network Connectivity Assistant screen, next to DirectAccess connection name, type Contoso DirectAccess Connection. Click Finish.
- Under "Step 2 DirectAccess Server," click Configure.
- Verify that Edge is selected as the network topology. Type edge1.contoso.com as the public name to which remote access clients will connect. Click Next.
- On the Network Adapters screen, wait for the wizard to populate the Internet and Corpnet interfaces. Verify that CN=edge1.contoso.com is the certificate automatically selected to authenticate IP-HTTPS connections. Click Next.
- On the Prefix Configuration screen, click Next.
- On the Authentication screen, select Use computer certificates, and then click Browse.
- Select corp-APP1-CA, click OK, and then click Finish.
- Under "Step 3 Infrastructure Servers," click Configure.
- For the URL of the network location server, type https://nls.corp.contoso.com, and then click Validate.
- After connectivity to the NLS URL on APP1 is validated successfully, click Next.
- Click Next two times to accept default settings for DNS and Management, and then click Finish.
- At the bottom of the Remote Access Setup screen, click Finish.
- In the Remote Access Review dialog box, click Apply.
- After the Remote Access Setup Wizard is finished, click Close.
- In the console tree of the Remote Access Management console, select Operations Status. Wait until the status of all monitors displays "Working." In the Tasks pane under Monitoring, click Refresh periodically to update the display.
Demo: Configure Direct Access on EDGE1Note In this release of Windows Server 2012, the status of Network adapters may be yellow instead of green. To make sure that the status of Network adapters is displayed as "Working," open an elevated command prompt, type the following command, and then press Enter:
netsh interface ipv6 add route 2001:db8:1::/48 publish=yes interface = "Corpnet"
Confirm Group Policy settings
The DirectAccess wizard configures GPOs and settings that are automatically deployed by using Active Directory for the Remote Access server and the DirectAccess clients.
To examine Group Policy settings created by the DirectAccess wizard
- On EDGE1, from the Start screen, click Group Policy Management.
- Expand Forest: corp.contoso.com, expand Domains, expand corp.contoso.com, and then expand Group Policy Objects.
- The Remote Access Setup wizard creates two new GPOs. DirectAccess Client Settings is applied to members of the DirectAccessClients security group. DirectAccess Server Settings is applied to the EDGE1 DirectAccess server. Confirm that the correct security filtering is performed for each of these GPOs by clicking the GPO and then viewing the entries in the Security Filtering section on the Scope tab in the details pane of the console.
- From the Start screen, type wf.msc, and then press Enter.
- In the Windows Firewall with Advanced Security console, notice that the Domain Profile is Active and the Public Profile is Active. Make sure that the Windows Firewall is enabled and both the domain and public profiles are active. If the Windows Firewall is disabled, or if domain or public profiles are disabled, then DirectAccess will not function correctly.
- In the Windows Firewall with Advanced Security console tree, click the Connection Security Rules node. The details pane of the console will display two connection security rules: DirectAccess Policy-DaServerToCorp, and DirectAccess Policy-DaServerToInfra. The first rule is used to establish the intranet tunnel and the second rule is for the infrastructure tunnel. Both rules are delivered to EDGE1 by using Group Policy.
- Close the Windows Firewall with Advanced Security console.
Demo: Confirm Group Policy SettingsConfirm IPv6 settings
- On EDGE1, from the desktop taskbar, right-click Windows PowerShell, and then click Run as administrator.
- In the Windows PowerShell window, type Get-NetIPAddress and press Enter.
- The output displays information related to the EDGE1 networking configuration. There are several sections of interest:
- The 6TO4 Adapter section shows information that includes the Global IPv6 address that is used by EDGE1 on its external interface.
- The IPHTTPSInterface section shows information about the IP-HTTPS interface.
- To see information about the Teredo interface on EDGE1, type netsh interface Teredo show state and press Enter. The output should include an entry State: online.
Demo: Confirm IPv6 Settings