Implementing Remote Access
Implementing Remote Access
Implementing Remote Access
• VPN:
• Can use with older operating systems
• Often requires users to establish connections
• Encrypts and protects data and communications
Overview of remote applications access
Components of DirectAccess
How DirectAccess works for internal clients
How DirectAccess works for external clients
Requirements and prerequisites
Using the Getting Started Wizard
Demonstration: Configuring DirectAccess with the
Getting Started Wizard
Limitations of the Getting Started Wizard
Addressing the limitations of the Getting Started
Wizard
Components of DirectAccess
AD DS domain
Internal clients controller
Internet websites
DNS server
DirectAccess
NRPT server
IPv6/IPsec
External clients
PKI deployment
Components of DirectAccess
DirectAccess
DirectAccess
server
server
NRPT
Network
NLS
Internal network location
resources server
CRL distribution
point
How DirectAccess works for external clients
AD DS domain
DNS server controller
DNS server
DirectAccess
server
u re
ct
ru
NLS
t
as
Connection
fr
resources
NRPT
r anet
Int
External
client
computers
Requirements and prerequisites
VPN Scenarios
VPN tunneling protocols
Authentication options
Configuring a VPN infrastructure
Configuring a Network Policy Server
The process of configuring a VPN client
Advanced VPN features
• Demonstration: Configuring VPNs
VPN Scenarios
A VPN provides a point-to-point connection between components of a private
network, through a public network such as the Internet
Corporate headquarters
VPN
server
VPN
server
Medium branch
office VPN
Home office with
VPN client
VPN
server
Remote user with VPN client
VPN tunneling protocols
L2TP/IPsec UDP port 500, UDP • Uses either certificates or preshared keys for
port 1701, UDP authentication
port 4500, and IP • Certificate authentication is recommended
protocol ID 50
SSTP TCP port 443 • Uses SSL to provide data confidentiality,
data integrity, and data authentication
START
Yes No Go to next
Are there Does connection policy
No policies to Yes attempt match
process? policy conditions?
Yes
Is the remote access
permission for the user
No account set to Deny Access?
Reject
No Yes connection
attempt
Is the remote Is the remote access
Reject access permission on the
Yes No
connection permission for policy set to Deny
attempt the user account remote access
set to Allow permission?
Access? Yes Accept
connection
No Does the connection
attempt
attempt match the
user object and
profile settings?
The process of configuring a VPN client
The process of configuring a VPN client
The CMAK:
• Allows you to customize users’ remote connection
experiences by creating predefined connections on
remote servers and networks
• Creates an executable file that can be run on a client
computer to establish a network connection that you have
designed
• Reduces help desk requests related to the configuration of
RAS connections by:
• Assisting in problem resolution because the configuration is known
• Reducing the likelihood of user errors when users configure their
own connection objects
Advanced VPN features
Logon Information
Virtual machines: 20743B-LON-DC1
20743B-LON-SVR1
20743B-INET1
20743B-LON-CL1
20743B-LON-RTR
User name: Adatum\Administrator
Administrator
Password: Pa55w.rd
Estimated Time: 45 minutes
Lab Scenario
• Review Questions