SlideShare a Scribd company logo
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
DirectAccess Technical Drilldown Part 2Putting it all togetherJohn CraddockInfrastructure & Security ArchitectXTSeminars LtdSession Code: SVR402
Part1: Internet to Intranet 6to4Host/Router6to4RelayNAT DeviceTeredoserver & relayTeredoHostInternetCorporateintranetIPHTTPSserverIPHTTPSHostNAT Device
Part1: IPv6/IPv4 IntranetIPv6ISATAP RouterNative IPv6IPv6NAT-PTor NAT64IPv4IPv6\IPv4IPv4IPv6\IPv4
What’s Left?InternetCorporate  IntranetTunnelling technologies for the Internet and Intranet to support IPv6 over IPv4Internet tunnelling selection based on client location – Internet, NAT, firewallEncryption/authentication of Internet traffic (end-to-edge/end-to-end)PKI required Client location detection: Internet or corporate intranet
Don’t Give Up NowPart 1IPv6 IntroTransition TechnologiesEnd-to-end connectivityPart 2IPsecConfiguring Direct AccessNetwork location and name resolution policiesIt all works – just like that!
Demo EnvironmentEX1DC1DNSDC, DNS,CANAT1DA1HomeCorporate intranetInternetIIS for CRLdistributionAPP1WIN7WIN7WIN7All servers Windows 2008 R2
Securing the TunnelInternetCorporate  IntranetDirectAccess uses IPsec to secure network trafficTraffic over the Internet is encrypted and authenticatedAccess via IPHTTPs is double encryptedEncrypted IPv6 within HTTPS
IPsec to the RescueIPsec is managed through Windows Firewall with Advanced SecurityBest deployed through group policyConnection rules create:IPsec tunnels (authenticated and encrypted)Authenticated connects (computer and user authenticationInbound / outbound rules set requirements for encryption
Traffic ProfileTraffic profile: <Protocol><source IP> <destination IP><source port> <destination port>Rules are based on a traffic profileConnection Security RuleAuthenticate all TCP traffic between A & B on ports W & XInbound/Outbound RuleEncrypt authenticated TCP traffic  between A & B on ports W & X
IPsec PrimerMain modesecurity associationKey life configurableDefault: 8 hoursCreate shared secret between hostsAuthIPAuthIPUses Diffie-HellmanAuthenticate over secure channelAuthIPAuthIPKerberos / certificatesComputer and/or user authentication AuthIPEstablish IPSec session KeysQuick mode:IPsec SAKey life configurableDefault 1 hour/100 MBDrops after 3 Minsof inactivityAuthIPAuthIPCreate Security Association for sessionIPsec SAIPsec SAIntegrityorIntegrity + encryptionExchange data
Main Mode Association
Quick Mode Association
Data ExchangeProtocol ID 51Authentication Header (AH) contains:Protocol ID of payload (TCP/UDP/ICMP…)Sequence number – prevents replaySecurity Parameters Index – Identifies IPsec SAIntegrity Check value (ICV) calculated with SHA1 or MD5Signed - ignoring ICV field andfields that change in transportProtocol ID 50EncryptedsignedIP HeaderIP payloadAHEncrypted Security ProtocolESP headers contain:Protocol ID of payload (TCP/UDP/ICMP…)Sequence number – prevents replaySecurity Parameters Index – Identifies IPsec SAIntegrity Check value (ICV)IP HeaderESPIP payloadESPICVWhen you just want integrity through NAT use ESP-Null
Negotiated Security OptionsDo not authenticateRequest inbound and outboundA host responds to both IPsec and unauthenticated (non-IPsec) requestsIt initiates communications with IPsec, and if that fails, falls back to unauthenticated communicationsRequire inbound and request outboundA host responds to inbound traffic secured by IPsec, and ignores unauthenticated requestsIt initiates communications with IPsec, and if that fails, falls back to unauthenticated communicationsRequire inbound and require outboundA host requires IPsec-secured communications for both inbound and outgoing requestsRequire inbound and clear outbound
IntranetIntegrity  / encryption / authentication IPsec TunnelEnd points can be single host or act as a gatewayThe gateway acts as the end-point for integrity encryption and authenticationTraffic on the Intranet is not protected by IPsec IPsec Gateway includes IPsec DoS PreventionReduces DoS attacks from key management protocols IKE & AuthIP
IPsec Access OptionsIntranetIntegrity  / encryption / authentication Tunnel 1: Machine AuthTunnel 2: Machine & User AuthESP NULL (transport mode) machine and user auth to intranet serverSelective authentication onto endpoint serversESP (transport mode) encryption and authentication to intranet server
Client Locationcorp.example.com zoneDNS 2DNS 1IP configuredDNS addressCorporate  IntranetInternetTo resolve names on the InternetDirectAccess host queries DNS 1To resolve names on the IntranetDirectAccess host queries DNS 2
How Does It Do that?Name Resolution Policy Table (NRPT) to the rescueNRPT allows the definitions of which DNS servers to query based on the namespace to be resolvedThe NRPT can point DNS queries for corp.example.com to the intranet DNS serverAll other DNS queries are sent to the DNS server address configured in the client IP settings
NRPTcorp.example.com zoneDNS 2nls.corp.example.comDNS 1IP configuredDNS addressInternetCorporate  IntranetNo NRPTNRPT:corp.example.com: query DNS 2All other name spaces query DNS server configured in client IP settings  	There is a special entry in the table to direct DNS queries for an internal	HTTPS website to the DNS servers configured in the client IP settings	For example: queries for nls.corp.example.com always go to IP configured DNS address and this is not resolvable on the internet
Viewing the NRPT
NRPT Inside/OutsideNRPT enabled by defaultIf the client can access an internal HTTPS website (https://nls.corp.example.com)Considered to be on the intranet NRPT disabledNo access to secure website Considered to be on the Internet NRPT remains enabled
Putting it All Together6to4Host/Router6to4RelayISATAP RouterNAT DeviceTeredoserver & relayTeredoHostCorporateintranetInternetHTTPSserverIPHTTPSHostNAT DeviceDirectAccess Server
DirectAccess Management Console
Before Running SetupDNS server requires isatap block to be removedComputer certificates must be issued to computersServer certificates must be issued to DA server with external DNS name in certificateNLS web server with nlsurl address in certificateCRL distribution should be configured in certificateCRL distribution location must be available on both the Internet and intranet
Authentication to Servers IPsec ESP NULL can be used for authentication to end-point servers Provides another layer of protectionCan control which servers are available from DA hostRequires 2008 end-point serversIPSEC does not work over IPv6 for Windows 2003Two factor authentication can be enabled for end-to-end authenticationRequires 2008 domain functional level
DirectAccess SetupConfigures on DA server6to4 relayTeredo server and relayIPHTTPS serverISATAPCreates group policy for IPSec rules forDA server IPsec TunnelDA client IPsec TunnelDA clients and servers requiring end point authentication
DirectAccess Setup (continued) Creates group policy for client configurationEnable and supply addresses for6to4 relayTeredo server and relay IPHTTPS serverEnable and configure NRPTEnable inside/outside probeDA server and DA clients must be members of the domain
Windows DirectAccessThe DA server represents a single point of failureFunctionality can be split across multiple servers for performanceFor HA, run DA server as VM in a Hyper-v clusterDoes not guarantee DA service availabilityLive Migration available in Windows 2008 R2Load balancing option available with UAG
All DoneInternetCorporate  IntranetTunnelling technologies for the Internet and Intranet to support IPv6 over IPv4Internet tunnelling selection based on client location – Internet, NAT, firewallEncryption/authentication of Internet traffic (end-to-edge/end-to-end)PKI required Client location detection: Internet or corporate intranet
Required SlideSpeakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/techedSessions On-Demand & Communitywww.microsoft.com/learningMicrosoft Certification & Training Resourceshttp://microsoft.com/technetResources for IT Professionalshttp://microsoft.com/msdnResources for DevelopersResources
Related ContentRequired SlideSpeakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session.Breakout Sessions:SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and BeyondSVR315 IPv6 for the Reluctant: What to Know Before You Turn It OffInteractive Theater Sessions:SVR08-IS End-to-End Remote Connectivity with DirectAccess
My Sessions at TechEdRequired SlideSpeakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session.Breakout Sessions:SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle BinSVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition TechnologiesSVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All TogetherInteractive Theater Sessions:SVR08-IS End-to-End Remote Connectivity with DirectAccess
Required SlideComplete an evaluation on CommNet and enter to win an Xbox 360 Elite!
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.
Required Slide© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related Content

PPTX
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
PPTX
Da for dummies techdays 2012
PPTX
16.) layer 3 (basic tcp ip routing)
PDF
NAT Scneario
PDF
Dpdk Validation - Liu, Yong
PPT
802.1x
PPTX
Campus networking
PPTX
Netsft2017 day in_life_of_nfv
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...
Da for dummies techdays 2012
16.) layer 3 (basic tcp ip routing)
NAT Scneario
Dpdk Validation - Liu, Yong
802.1x
Campus networking
Netsft2017 day in_life_of_nfv

What's hot (20)

PDF
Dhcp with cisco
PDF
Ipo spaces calling document-v1
PDF
Fedv6tf-fhs
PPTX
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
PPT
Vpn(4)
PDF
NAT_Final
DOCX
DHCP Server Guaidlines using CISCO PACKET TRACER
PDF
Fedv6tf-IPv6-new-friends
PDF
Ccna interview questions
PDF
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
PPT
Cisco Router As A Vpn Server
PDF
Introduction to nfv movilforum
PPT
PDF
DPDK Summit 2015 - Intro - Tim O'Driscoll
PDF
IPv6 address-planning
PDF
NAT (network address translation) & PAT (port address translation)
DOCX
Mcse notes
PPT
NAT Traversal
PDF
Accelerate the SDN with Intel ONP
Dhcp with cisco
Ipo spaces calling document-v1
Fedv6tf-fhs
Windows Server 2012 Seminar 4 - De mogelijkheden van Direct Access
Vpn(4)
NAT_Final
DHCP Server Guaidlines using CISCO PACKET TRACER
Fedv6tf-IPv6-new-friends
Ccna interview questions
[Advantech] ADAM-3600 open vpn setting Tutorial step by step
Cisco Router As A Vpn Server
Introduction to nfv movilforum
DPDK Summit 2015 - Intro - Tim O'Driscoll
IPv6 address-planning
NAT (network address translation) & PAT (port address translation)
Mcse notes
NAT Traversal
Accelerate the SDN with Intel ONP
Ad

Similar to SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together. (20)

PDF
Microsoft Direct Access (Part II)_John Delizo
PPTX
PPTX
98 366 mva slides lesson 6
PPTX
Windows 7 For Itpro
PPTX
Connect Remotely Using Windows® 7 Direct Access
PPT
Windows 7 by microsoft
PPTX
Configuring and Implementing DirectAccess with Windows Server 2012
PPTX
Microsoft Direct Access (part 1)_John Delizo
PPTX
Sem cis ise
PPTX
DirectAccess, do’s and don’ts
PPTX
ISE_2.1_BDM_v3a.pptx
PPTX
Palo Alto Networks PAN-OS 4.0 New Features
PDF
Philly Tech Fest Upgrade To Windows Server 2008 R2
PPT
4966709.ppt
PPTX
Monetizing The Enterprise: Borderless Networks
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
DOCX
White Paper Security and High Availability Concerns with Wide Area Networks
PPTX
Cisco Security DNA
PPT
Phifer 3 30_04
PPTX
What is direct access?
Microsoft Direct Access (Part II)_John Delizo
98 366 mva slides lesson 6
Windows 7 For Itpro
Connect Remotely Using Windows® 7 Direct Access
Windows 7 by microsoft
Configuring and Implementing DirectAccess with Windows Server 2012
Microsoft Direct Access (part 1)_John Delizo
Sem cis ise
DirectAccess, do’s and don’ts
ISE_2.1_BDM_v3a.pptx
Palo Alto Networks PAN-OS 4.0 New Features
Philly Tech Fest Upgrade To Windows Server 2008 R2
4966709.ppt
Monetizing The Enterprise: Borderless Networks
White Paper Security and High Availability Concerns with Wide Area Networks
White Paper Security and High Availability Concerns with Wide Area Networks
Cisco Security DNA
Phifer 3 30_04
What is direct access?
Ad

More from Louis Göhl (19)

PPTX
Citrix vision and product highlights november 2011
PPTX
Citrix vision & strategy overview november 2011
PPTX
VMware vSphere 4.1 deep dive - part 2
PPTX
VMware vSphere 4.1 deep dive - part 1
PPTX
Storage and hyper v - the choices you can make and the things you need to kno...
PPTX
Security best practices for hyper v and server virtualisation [svr307]
PPTX
Hyper v and live migration on cisco unified computing system - virtualized on...
PPT
HP Bladesystem Overview September 2009
PPTX
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
PPTX
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
PPTX
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
PPTX
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
PPTX
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
PPTX
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
PPTX
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
PPTX
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
PPTX
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
PPTX
Windows Virtual Enterprise Centralized Desktop
PPTX
Optimized Desktop, Mdop And Windows 7
Citrix vision and product highlights november 2011
Citrix vision & strategy overview november 2011
VMware vSphere 4.1 deep dive - part 2
VMware vSphere 4.1 deep dive - part 1
Storage and hyper v - the choices you can make and the things you need to kno...
Security best practices for hyper v and server virtualisation [svr307]
Hyper v and live migration on cisco unified computing system - virtualized on...
HP Bladesystem Overview September 2009
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...
MGT300 Using Microsoft System Center to Manage beyond the Trusted Domain
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...
Windows Virtual Enterprise Centralized Desktop
Optimized Desktop, Mdop And Windows 7

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”

SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.

  • 2. DirectAccess Technical Drilldown Part 2Putting it all togetherJohn CraddockInfrastructure & Security ArchitectXTSeminars LtdSession Code: SVR402
  • 3. Part1: Internet to Intranet 6to4Host/Router6to4RelayNAT DeviceTeredoserver & relayTeredoHostInternetCorporateintranetIPHTTPSserverIPHTTPSHostNAT Device
  • 4. Part1: IPv6/IPv4 IntranetIPv6ISATAP RouterNative IPv6IPv6NAT-PTor NAT64IPv4IPv6\IPv4IPv4IPv6\IPv4
  • 5. What’s Left?InternetCorporate IntranetTunnelling technologies for the Internet and Intranet to support IPv6 over IPv4Internet tunnelling selection based on client location – Internet, NAT, firewallEncryption/authentication of Internet traffic (end-to-edge/end-to-end)PKI required Client location detection: Internet or corporate intranet
  • 6. Don’t Give Up NowPart 1IPv6 IntroTransition TechnologiesEnd-to-end connectivityPart 2IPsecConfiguring Direct AccessNetwork location and name resolution policiesIt all works – just like that!
  • 7. Demo EnvironmentEX1DC1DNSDC, DNS,CANAT1DA1HomeCorporate intranetInternetIIS for CRLdistributionAPP1WIN7WIN7WIN7All servers Windows 2008 R2
  • 8. Securing the TunnelInternetCorporate IntranetDirectAccess uses IPsec to secure network trafficTraffic over the Internet is encrypted and authenticatedAccess via IPHTTPs is double encryptedEncrypted IPv6 within HTTPS
  • 9. IPsec to the RescueIPsec is managed through Windows Firewall with Advanced SecurityBest deployed through group policyConnection rules create:IPsec tunnels (authenticated and encrypted)Authenticated connects (computer and user authenticationInbound / outbound rules set requirements for encryption
  • 10. Traffic ProfileTraffic profile: <Protocol><source IP> <destination IP><source port> <destination port>Rules are based on a traffic profileConnection Security RuleAuthenticate all TCP traffic between A & B on ports W & XInbound/Outbound RuleEncrypt authenticated TCP traffic between A & B on ports W & X
  • 11. IPsec PrimerMain modesecurity associationKey life configurableDefault: 8 hoursCreate shared secret between hostsAuthIPAuthIPUses Diffie-HellmanAuthenticate over secure channelAuthIPAuthIPKerberos / certificatesComputer and/or user authentication AuthIPEstablish IPSec session KeysQuick mode:IPsec SAKey life configurableDefault 1 hour/100 MBDrops after 3 Minsof inactivityAuthIPAuthIPCreate Security Association for sessionIPsec SAIPsec SAIntegrityorIntegrity + encryptionExchange data
  • 14. Data ExchangeProtocol ID 51Authentication Header (AH) contains:Protocol ID of payload (TCP/UDP/ICMP…)Sequence number – prevents replaySecurity Parameters Index – Identifies IPsec SAIntegrity Check value (ICV) calculated with SHA1 or MD5Signed - ignoring ICV field andfields that change in transportProtocol ID 50EncryptedsignedIP HeaderIP payloadAHEncrypted Security ProtocolESP headers contain:Protocol ID of payload (TCP/UDP/ICMP…)Sequence number – prevents replaySecurity Parameters Index – Identifies IPsec SAIntegrity Check value (ICV)IP HeaderESPIP payloadESPICVWhen you just want integrity through NAT use ESP-Null
  • 15. Negotiated Security OptionsDo not authenticateRequest inbound and outboundA host responds to both IPsec and unauthenticated (non-IPsec) requestsIt initiates communications with IPsec, and if that fails, falls back to unauthenticated communicationsRequire inbound and request outboundA host responds to inbound traffic secured by IPsec, and ignores unauthenticated requestsIt initiates communications with IPsec, and if that fails, falls back to unauthenticated communicationsRequire inbound and require outboundA host requires IPsec-secured communications for both inbound and outgoing requestsRequire inbound and clear outbound
  • 16. IntranetIntegrity / encryption / authentication IPsec TunnelEnd points can be single host or act as a gatewayThe gateway acts as the end-point for integrity encryption and authenticationTraffic on the Intranet is not protected by IPsec IPsec Gateway includes IPsec DoS PreventionReduces DoS attacks from key management protocols IKE & AuthIP
  • 17. IPsec Access OptionsIntranetIntegrity / encryption / authentication Tunnel 1: Machine AuthTunnel 2: Machine & User AuthESP NULL (transport mode) machine and user auth to intranet serverSelective authentication onto endpoint serversESP (transport mode) encryption and authentication to intranet server
  • 18. Client Locationcorp.example.com zoneDNS 2DNS 1IP configuredDNS addressCorporate IntranetInternetTo resolve names on the InternetDirectAccess host queries DNS 1To resolve names on the IntranetDirectAccess host queries DNS 2
  • 19. How Does It Do that?Name Resolution Policy Table (NRPT) to the rescueNRPT allows the definitions of which DNS servers to query based on the namespace to be resolvedThe NRPT can point DNS queries for corp.example.com to the intranet DNS serverAll other DNS queries are sent to the DNS server address configured in the client IP settings
  • 20. NRPTcorp.example.com zoneDNS 2nls.corp.example.comDNS 1IP configuredDNS addressInternetCorporate IntranetNo NRPTNRPT:corp.example.com: query DNS 2All other name spaces query DNS server configured in client IP settings There is a special entry in the table to direct DNS queries for an internal HTTPS website to the DNS servers configured in the client IP settings For example: queries for nls.corp.example.com always go to IP configured DNS address and this is not resolvable on the internet
  • 22. NRPT Inside/OutsideNRPT enabled by defaultIf the client can access an internal HTTPS website (https://nls.corp.example.com)Considered to be on the intranet NRPT disabledNo access to secure website Considered to be on the Internet NRPT remains enabled
  • 23. Putting it All Together6to4Host/Router6to4RelayISATAP RouterNAT DeviceTeredoserver & relayTeredoHostCorporateintranetInternetHTTPSserverIPHTTPSHostNAT DeviceDirectAccess Server
  • 25. Before Running SetupDNS server requires isatap block to be removedComputer certificates must be issued to computersServer certificates must be issued to DA server with external DNS name in certificateNLS web server with nlsurl address in certificateCRL distribution should be configured in certificateCRL distribution location must be available on both the Internet and intranet
  • 26. Authentication to Servers IPsec ESP NULL can be used for authentication to end-point servers Provides another layer of protectionCan control which servers are available from DA hostRequires 2008 end-point serversIPSEC does not work over IPv6 for Windows 2003Two factor authentication can be enabled for end-to-end authenticationRequires 2008 domain functional level
  • 27. DirectAccess SetupConfigures on DA server6to4 relayTeredo server and relayIPHTTPS serverISATAPCreates group policy for IPSec rules forDA server IPsec TunnelDA client IPsec TunnelDA clients and servers requiring end point authentication
  • 28. DirectAccess Setup (continued) Creates group policy for client configurationEnable and supply addresses for6to4 relayTeredo server and relay IPHTTPS serverEnable and configure NRPTEnable inside/outside probeDA server and DA clients must be members of the domain
  • 29. Windows DirectAccessThe DA server represents a single point of failureFunctionality can be split across multiple servers for performanceFor HA, run DA server as VM in a Hyper-v clusterDoes not guarantee DA service availabilityLive Migration available in Windows 2008 R2Load balancing option available with UAG
  • 30. All DoneInternetCorporate IntranetTunnelling technologies for the Internet and Intranet to support IPv6 over IPv4Internet tunnelling selection based on client location – Internet, NAT, firewallEncryption/authentication of Internet traffic (end-to-edge/end-to-end)PKI required Client location detection: Internet or corporate intranet
  • 31. Required SlideSpeakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/techedSessions On-Demand & Communitywww.microsoft.com/learningMicrosoft Certification & Training Resourceshttp://microsoft.com/technetResources for IT Professionalshttp://microsoft.com/msdnResources for DevelopersResources
  • 32. Related ContentRequired SlideSpeakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session.Breakout Sessions:SVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies SIA306 Microsoft Forefront Unified Access Gateway: DirectAccess and BeyondSVR315 IPv6 for the Reluctant: What to Know Before You Turn It OffInteractive Theater Sessions:SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 33. My Sessions at TechEdRequired SlideSpeakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session.Breakout Sessions:SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA402 Recovery of Active Directory Deleted Objects and the Windows Server 2008 R2 Recycle BinSVR401 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition TechnologiesSVR402 DirectAccess Technical Drilldown, Part 2 of 2: Putting It All TogetherInteractive Theater Sessions:SVR08-IS End-to-End Remote Connectivity with DirectAccess
  • 34. Required SlideComplete an evaluation on CommNet and enter to win an Xbox 360 Elite!
  • 36. Required Slide© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.