Being a while since I shared out something here, but let’s catch that up. This tutorial will show you how to configure Direct Access on Windows Server 2012 R2, yes that’s right R2. Nothing much changed but it’s rather cool.
My Setup is as Follows: Direct Access Server has 2 Network Card, One goes to the internet and one for Internal LAN.
The following ports are needed for DirectAccess to work:
UDP 3544 Inbound and Outbound
TCP 443 Inbound and Outbound
This is running on my Windows Server 2012 R2 Hyper-V host! (Will get to this one later).
Here we Go!!
Go On and Add / Remove Role
As mentioned my DA Server is on Edge with 2 NICs (technically it’s behind TMG, but I have a few exceptions myself)
Here’s the Dashboard after it has finished configuration and deployment.
Click on DirectAccess and VPN. As you can see here, there are several possibilities here.
Step 1: Allowing Client Access, Which Groups and For whom as well as the DA Connection Name.
Step 2: Is where you select Network Cards and also certificate, and authentication type. (You will see it below)
Step 3: Is a bit like NAP, i.e where you say where your remediation servers are
Step 4: End to End Application
Now next step before we check if our clients can connect, we must make sure that we run a gpupdate against the client and make sure they pull the policies.
As you can see in the Picture below, which is basically a VM at my house, with an internet connection and the DA Policy. (I have a VPN connection to the server so that it pulls the update, and the vm is joined to the domain).
That’s it!! You have DA working 🙂
That’s the authentication 🙂
Watch Out for my upcoming post on DirectAccess Troubleshooting 🙂