设为首页 收藏本站
查看: 1410|回复: 0

[经验分享] Install DirectAccess with Windows Server 2016-ganzy

[复制链接]

尚未签到

发表于 2018-6-17 12:11:03 | 显示全部楼层 |阅读模式
  Edge-facing deployments:
DSC0000.png

  External interface connected to the public Internet using public IPv4 addressing
  To configure the External interface, right-click the External adapter and choose
  Properties. Highlight Internet Protocol Version 4 (TCP/IPv4) and then click
  Properties. Provide an IPv4 address, subnet mask, and default gateway. DO NOT      
  specify any DNS servers!
DSC0001.png

  ClickAdvanced,Select theDNS tab and uncheck the box next toRegister this connection’s addresses in DNS
DSC0002.png

  Select the WINS tab and uncheck the box next to Enable LMHOSTS lookup.
  In addition, in the NetBIOS setting section select the option to Disable NetBIOS over TCP/IP
DSC0003.png

  Internal interface connected to a perimeter or DMZ network or the LAN using private IPv4 addressing
  To configure the Internal network interface, right-click the Internal network
  connection and choose Properties. Highlight Internet Protocol Version 4 (TCP/IPv4)      
  and then click Properties. Provide an IPv4 address and a subnet mask. DO NOT         
  specify a default gateway! Provide the IP addresses for DNS servers on the corporate
  LAN as necessary
DSC0004.png

  2. Static Routes
  As the Internal network interface does not have a default gateway, it will be necessary to configure static routes to remote internal subnets that will need to be reachable from the DirectAccess server and by DirectAccess clients. For example, if the DirectAccess server is on the 192.168.3.0/24 subnet, but there are systems on the192.168.10.0/24 subnet that must be accessible from the DirectAccess server, a static route will be defined by entering the following commands in an elevated PowerShell command window:
  New-NetRoute -InterfaceAlias <Interface_Name> –DestinationPrefix <SubnetID/Mask>  -NextHop  <Gateway_Address>
  Using the preceding example, the command to create the static route would look like this:
  New-NetRoute -InterfaceAlias Internal -DestinationPrefix 192.168.10.0/24 -NextHop 192.168.3.254
  3.Join Domain and Apply Updates
  Using the Add-Computer PowerShell cmdlet, it is possible torename the computer, join it to the domain, and place the server in a specific Organizational Unit (OU) with a single command:
  Add-Computer -NewName <new_computer_name> -OUPath <OU_Path> –DomainName  <domain_name>
  For example:
  Add-Computer –NewName SEN-DAS –OUPath "OU=DAS,DC=sen,DC=hi,DC=cn" –DomainName sen.hi.cn –Restart
DSC0005.png

  Once the DirectAccess server has been joined to the domain, proceed with installing Windows operating updates as necessary using Windows Update (Window Key + I ?Update & Security ? Check for Updates)
  4.Certificates
  DirectAccess requires two different types of certificates—computer (machine) certificate and an SSL certificate.
  computer certificates are used for IPsec authentication and encryption. They must be issued to the DirectAccess server by aninternal PKI. The certificate must include the Client Authentication Enhanced Key Usage (EKU) .
  To create a certificate template, open the Certificate Services management console on the Active Directory Certificate Services (AD CS) server .
  In the navigation tree, expand the server and then right-click Certificate Templates and choose Manage.
  Optionally, you can press Windows Key + R and enter certtmpl.msc.
DSC0006.png

  Right-click the Workstation Authentication template and choose Duplicate Template.
DSC0007.png

  Select the General tab and provide a descriptive name[DirectAccess IPSec] for the new template.
  Specify an appropriate validity and renewal period based on your organization’s security policy
DSC0008.png

  Select the Subject Name tab and choose DNS name for the Subject name format
DSC0009.png

  Select the Security tab and clickAdd. Specify the names of the DirectAccess client security group and the name of each DirectAccess server.
  Optionally, a security group can be created for DirectAccess servers, and that group can be specified here.
DSC00010.png

  For the DirectAccess client group and the DirectAccess servers (or DirectAccess server group),check the Allow box for bothEnroll and Autoenroll. Once complete, click OK
DSC00011.png

  In the Certification Authority management console,
DSC00012.png

  right-clickCertificate Templates and choose New and Certificate Template to Issue. Highlight the DirectAccess IPsec certificate template and choose OK
DSC00013.png

DSC00014.png

DSC00015.png

  Computer certificates can be requested and installed manually on the DirectAccess server using the Certificates management console snap-in.
  To request a computer certificate, press Window Key + R on the DirectAccess server to bring up the Run command box and enter certlm.msc
  Expand Certificates (Local Computer), right-click Personal, and choose All Tasks and Request New Certificate. Click Next twice, select the DirectAccess IPsec certificate template, and clickEnroll
DSC00016.png

DSC00017.png

DSC00018.png

DSC00019.png

DSC00020.png

DSC00021.png

DSC00022.png

  Automatic Enrollment
  To the provisioning of certificates for DirectAccess servers and clients, and to ensure that certificates are automatically renewed before they expire it is recommended thatcertificate auto-enrollment be configured. This is accomplished by creating and deploying aGroup Policy Object (GPO) in Active Directory.
  To create and deploy a computer certificate auto-enrollment GPO, open the Group Policy Management console, [Run gpmc.msc] Expand the Forest, Domains, and the domain where the DirectAccess server and clients are joined. Right-click Group Policy Objects and click New. Provide a descriptive name for the new GPO and click OK.
DSC00023.png

DSC00024.png

DSC00025.png

DSC00026.png

  Right-click the newly created GPO and choose Edit. Expand Computer Configuration, Policies, Windows Settings, and Security Settings, and highlight Public Key Policies.
  Double-click Certificate Services Client - Auto-Enrollment
DSC00027.png

  and select Enabled for the Configuration Model. Select the option to Renew expired certificates,update pending certificates, and remove revoked certificates
  and Update certificates that use certificate templates and click OK
DSC00028.png

  In the Group Policy Management Console, select the GPO and clickAdd under Security Filtering. Remove Authenticated Users and specify the DirectAccess client security group and all DirectAccess servers (or the DirectAccess servers security group)
DSC00029.png

DSC00030.png

DSC00031.png

DSC00032.png

  Finally, link the GPO to the domain. Optionally, the GPO can be linked directly to the DirectAccess servers and clients OU, if necessary.
DSC00033.png

DSC00034.png

DSC00035.png

  SSL Certificate

  An SSL certificate is required for the IP-HTTPS IPv6 transition protocol. It is recommended that the SSL certificate be obtained from a public certificate authority(CA),>  The first step in requesting a public SSL certificate is to generate a Certificate Signing Request (CSR) . This can be accomplished in a variety of ways, including using the Microsoft Management Console (MMC) Certificates snap-in, the certutil.exe commandline tool, and even the Internet Information Services (IIS) management tool:

  To obtain an additional certificate for IP-HTTPS

  •   On the DirectAccess server, click Start,  click Run, type mmc, and then press ENTER. Click Yes at the User Account Control prompt.
    DSC00036.png

  •   Click File, and then click Add/Remove Snap-ins.
    DSC00037.png

  •   Click Certificates, click Add, click Computer account, click Next, select Local computer, click Finish, and then click OK.
    DSC00038.png

    DSC00039.png

    DSC00040.png

  •   In the console tree of the Certificates snap-in, open Certificates (Local Computer)\Personal\Certificates.
    DSC00041.png

  •   Right-click Certificates, point to All Tasks, and then click Request New Certificate.
    DSC00042.png

  •   Click Next twice.
    DSC00043.png

    DSC00044.png

  •   On the Request Certificates page, click the Web Server certificate template, and then click More information is required to enroll for this certificate.
    DSC00045.png

      If the Web Server certificate template does not appear, ensure that the DirectAccess server computer account has enroll permissions for the Web Server certificate template. For more information, see Configure Permissions on the Web Server Certificate Template.

      To configure permissions for the Web Server certificate template

    •   On the CA computer, click Start,click Run, type certtmpl.msc, and then press ENTER.
      DSC00046.png

    •   In the contents pane, right-click the Web Server template, and then click Properties.
      DSC00047.png

    •   Click the Security tab, and then click Add.
      DSC00048.png

    •   In Enter the object names to select, type the name of the security group that contains the computers that are allowed to request customized certificates, and then click OK.
        This security group should contain, at least temporarily when requesting custom certificates, the computer accounts of the DirectAccess server and network location server. As a security best practice, do not use the Authenticated Users group.
      DSC00049.png

    •   In Permissions, click Enroll under Allow, and then click OK.
      DSC00050.png


  •   On the Subject tab of the Certificate Properties dialog box, in Subject name, for Type, select Common name.
    DSC00051.png

  •   In Value, type the fully qualified domain name (FQDN) of the Internet name of the DirectAccess server (for example,da.sen.hi.cn), and then click Add.
    DSC00052.png

    DSC00053.png

  •   Click OK, click Enroll, and then click Finish.
    DSC00054.png

    DSC00055.png

    DSC00056.png

  •   In the details pane of the Certificates snap-in, verify that a new certificate with the FQDN was enrolled with Intended Purposes of Server Authentication.
    DSC00057.png

  •   Right-click the certificate, and then click Properties.
    DSC00058.png

  •   In Friendly Name, type IP-HTTPS Certificate, and then click OK.
    DSC00059.png

  5. Installing the DirectAccess-*** Role
  Installing the DirectAccess-*** role using PowerShell:
  Install-WindowsFeature DirectAccess-*** -IncludeManagementTools
DSC00060.png

  6. Configure DirectAccess with the Getting Started Wizard
  To launch the Getting Started Wizard, open the Remote Access Management Console on the DirectAccess server.
  The Remote Access Management Console can be found by clicking on the Start menu and navigating to All Apps ? Windows Administrative Tools ? Remote Access Management Conso le. Expand Configuration, highlight DirectAccess and ***, and then click Run the Getting Started Wizard:     
DSC00061.png

DSC00062.png

DSC00063.png

DSC00064.png

DSC00065.png

DSC00066.png

DSC00067.png

DSC00068.png

DSC00069.png

DSC00070.png

  Step 1: Remote Clients
DSC00071.png

DSC00072.png

DSC00073.png

DSC00074.png

DSC00075.png

DSC00076.png

  NCA settings apply only to Windows 8.x and Windows 10 clients. These settings are not used by Windows 7 clients.
  The Resources that validate connectivity to the internal network field is initially blank. Intuitively, information should be supplied here. However, it is not necessary (or recommended) to do so at this time. Resource validation is performed by Windows 8.x and Windows 10 clients by checking connectivity to this URL after the DirectAccess connection is made. During initial configuration, the DirectAccess deployment wizard will automatically populate this field with the URLhttp://DirectAccess-WebProbeHost.sen.hi.cn, which is hosted on the DirectAccess server (a corresponding host record in DNS resolving to the internal IPv4 address of the DirectAccess server is also configured). This setting can later be changed after the initial configuration has been completed.
DSC00077.png

DSC00078.png

  auto add dns to the DNS Server:
DSC00079.png

  Step 2: Remote Access Server
DSC00080.png

DSC00081.png

DSC00082.png

DSC00083.png

  Step 3: Infrastructure Servers
DSC00084.png

DSC00085.png

DSC00086.png

DSC00087.png

DSC00088.png

DSC00089.png

DSC00090.png

  Step 4: Application Servers (Optional)
  Step 4 of the Remote Access Setup Wizard is optional. By default, DirectAccess client communication is authenticated and encrypted only between the DirectAccess client and the server.
  Communication between the DirectAccess server and hosts on the Internal network is not authenticated or encrypted.
  If full end-to-end authentication—and, optionally, encryption—from the DirectAccess server to specific application servers is required, click Edit under Application Servers on Step 4.
DSC00091.png

  Select the option toExtend authentication to selected application servers, click Add, and specify an Active Directory security group that includes servers requiring end-to-end authentication
DSC00092.png

  7.Client Configure and test
  Add to AD:
  Add-Computer –NewName DA-Win10  –OUPath "OU=DAClients,OU=DAS,DC=sen,DC=hi,DC=cn" –DomainName sen.hi.cn –Restart
DSC00093.png

DSC00094.png

DSC00095.png

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.iyunv.com/thread-524926-1-1.html 上篇帖子: SQL Server AG - 2. [Windows 2012配置故障转移(ForSQLServer 2014 AlwaysOn)] 下篇帖子: Windows2012 R2显示桌面/汉化
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表