Directaccess supports windows 7 and later remote access clients by default.

Previously in Windows DirectAccess, certificates were used in multiple places. You had to have certificates to support the two DirectAccess tunnels that were created. The first tunnel, called the infrastructure tunnel, represented an IPsec transport mode connection that enabled the DirectAccess client to access DNS servers and domain controllers so that the user could log on. The infrastructure tunnel required both computer certificate and machine account NTLM authentication. After that connection was established, the client had access to a domain controller so that the second tunnel, the intranet tunnel could be established using computer certificate authentication and user account Kerberos authentication.

In addition to the computer certificates that were required on the client, a server certificate was required on the DirectAccess server so that the mutual authentication of the IPsec tunnels could be established. A Web site certificate was also required on the DirectAccess server so that the DirectAccess clients could establish IP-HTTPS connections to the DirectAccess server.

Finally, another certificate was required so that the client could establish connections to the Network Location Server while they were on the corpnet. As you can see, there were a lot of certificates going around and it was easy to mess things up by not using the right type of certificates, or by failing to renew certificates before they expired.

While you do have the option of creating similar DirectAccess deployments in Windows Server 2012 (and in some cases, you will need to), you now have the option of creating a much simpler DirectAccess deployment that does not require the same level of depth in terms of infrastructure requirements. This is made possible by a new feature in Windows Server 2012 known as the Kerberos Proxy.

Instead of creating two IPsec tunnels, the DirectAccess client can create a single IP-HTTPS connection with null encryption which tunnels the IPsec transport mode connection. When the authentication request is made, they are sent to the Kerberos Proxy service and the service then forwards the Kerberos requests behalf of the DirectAccess client.

For this to work, the DirectAccess server needs to have a server certificate installed so that the IP-HTTPS connection can be established. The DirectAccess clients must trust this certificate. You can use private certificates (those created by your own PKI), you can use commercial certificates (those you purchase from a public certificate authority), or you can allow the DirectAccess setup wizard to create a self-signed certificate. The latter option is most applicable to small businesses that do not have the in-house expertise for acquiring and maintaining even a small PKI. Note that the Kerberos Proxy service will also need a certificate.

Note

This simplified deployment does have some limitations and thus is aimed primarily at small and mid-sized businesses. For example, options such as force tunneling and Network Access Protection (NAP) and two-factor authentication methods such as one-time password (OTP) are not available when you set up DirectAccess using the simplified approach.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499804000121

Windows Server 2008 R2 and Windows 7

Dustin Hannifin, ... Joey Alpern, in Microsoft Windows Server 2008 R2, 2010

Creating a certificate revocation list (CRL) distribution point on the DirectAccess server

In this section, we will configure a location on the DirectAccess server to store the CRL for clients connecting to the server. We will make this CRL web enabled by creating an IIS Web site on the DirectAccess server. We will then configure the Certificate Authority to publish the CRL to the DirectAccess server via a shared folder. To accomplish the above tasks, perform the following:

1.

Log on to the DirectAccess server (LABDA1) and create a new folder on the root of C: named CRL (see Figure 13.31).

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.31. New folder to store CRL information.

2.

Add the Web server role by opening Server Manager.

3.

Then select the Roles node and click the Add Roles link in the middle pane.

4.

Click Next to begin the Add Roles Wizard.

5.

Select the Web Server (IIS) role as seen in Figure 13.32. Then click Next.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.32. Select Web Server Role.

6.

On the Introduction page click Next.

7.

Accept the default role services and click Next.

8.

Verify settings on the Confirmation Page. Then click Install.

9.

When the installation is complete, click Close to close the Add Roles Wizard.

To create a Web site which will be used for web CRL distribution, perform the following:

1.

Open Server Manager and expand the Roles | Web Server (IIS) nodes.

2.

Select the newly added Internet Information Services (IIS) Manager node.

3.

In the middle pane, expand the Sites node to reveal the Default Website.

4.

Select the Default Website and then click the Basic Settings link in the right pane.

5.

Change the Physical path to point to the CRL folder that you previously created (see Figure 13.33). Then click OK.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.33. Set Web Site home folder to CRL path.

6.

In the middle pane, double-click the Directory Browsing option. Then click the Enable link in the right actions pane as seen in Figure 13.34.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.34. Allowing Directory Browsing of CRL Web Site.

7.

Close Server Manager.

We now need to share the CRL folder and give the Certificate Authority permission to access it. Perform the following steps to set up the CRL shared folder:

1.

Browse to the CRL folder you previously created at the root of C:\. Right-click the CRL folder and choose Properties.

2.

Select the Sharing tab and click the Advanced Sharing button as seen in Figure 13.35.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.35. Sharing Properties.

3.

Click the Share this folder checkbox in the Advanced Sharing window. Then click the Permissions button (see Figure 13.36).

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.36. Advanced Folder Sharing.

4.

Click the Add button. Then click Object Types.

5.

From the Object Types window, select Computers as seen in Figure 13.37. Then click OK.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.37. Enable selection of the computer Object Type.

6.

Enter the name of the Certificate Authority computer and click OK.

7.

Allow the CA computer Full Control permissions. Then click OK.

8.

Click OK on the Advanced Sharing window and click Close on the Properties window.

You now need to enable the server as a CRL distribution point and publish the CRL to the distribution point. Perform the following to complete these tasks:

1.

Log on to the Certificate Authority and Open Server Manager.

2.

Expand the nodes Roles | Active Directory Certificate Services.

3.

Right click the node representing the Certificate Authority, and select Properties (see Figure 13.38).

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.38. Active Directory Certificate Services CA Server.

4.

Select the Extensions tab in the CA Properties window.

5.

Click Add to add a new CRL distribution point.

6.

Enter the URL you wish to use for the CRL located on the DirectAccess server.

7.

Select the variable and click Insert.

8.

Select the variable and click Insert.

9.

Select the variable as seen in Figure 13.39. Then click Insert.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.39. Add CRL Location.

10.

Go to the end of the long URL string created in the Location field and enter a .crl at the end of the string. Then click OK.

11.

Select the options Include CRLs. Clients use this to find Delta CRL locations and Include in the CDP extension of issued certificates.

12.

Click the Add button.

13.

In the Location text box, enter\\locationofDAServer\CRL\ (see Figure 13.40).

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.40. Location of CRL shared folder.

14.

Select the variable and click Insert.

15.

Select the variable and click Insert.

16.

Select the variable and click Insert.

17.

Again add .crl to the end of the newly created location string as seen in Figure 13.41.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.41. Newly Constructed CRL string.

18.

Select the option Publish CRLs to this Location.

19.

Select the option Publish Delta CRLs to this Location (see Figure 13.42) and click OK.

Directaccess supports windows 7 and later remote access clients by default.

Figure 13.42. CRL publishing options.

20.

When prompted to restart Active Directory Certificate Services, click Yes.

21.

Expand the Certificate Authority node within Server Manager.

22.

Right click on the Revoked Certificates node and select All Tasks | Publish.

23.

Choose the option New CRL and click OK. This will publish the full CRL to the path, making it accessible via file share and the default Web site on the DirectAccess server.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978159749578300013X

DirectAccess Deployment Scenarios

Thomas W. Shinder, ... Debra Littlejohn Shinder, in Windows Server 2012 Security from End to Edge and Beyond, 2013

Administrator's Punch List

The simplified DirectAccess wizard is targeted at small- and medium-sized businesses

You can now deploy a DirectAccess server with a single NIC with a single private IP address

The simplified DirectAccess wizard does not support complex enterprise scenarios

When using a single NIC, only the IP-HTTPS protocol is available to DirectAccess clients

When you add support for Windows 7 clients, the DirectAccess server will not use the Kerberos proxy

If using Windows 8, remember that only Windows 8 Enterprise Edition is supported as a DirectAccess client

The simplified DirectAccess wizard deploys the Network Location Server on the DirectAccess server

If using a single NIC deployment with the simplified DirectAccess server, an ISATAP server will not be configured

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499804000133

Protecting Legacy Remote Clients

Thomas W. Shinder, ... Debra Littlejohn Shinder, in Windows Server 2012 Security from End to Edge and Beyond, 2013

The RRAS Unified Server Role

In Windows Server 2008 R2, the configuration of RRAS VPNs was completely separate from DirectAccess (DA) configuration. You cannot run an RRAS server on the same Windows Server 2008 R2 edge server that serves as a DirectAccess server. This did not really make sense. DirectAccess, despite all of its benefits, has one big limitation. It only works with clients that:

Are running Windows 7 Enterprise/Ultimate or Windows 8 Enterprise, and

Are members of the Windows domain

Here is the problem: As of October 2012, Windows XP still had slightly over 36% of operating system market share, according to statistics published by NetMarketShare.4 A healthy chunk of that includes businesses that had not yet migrated from Windows XP to a later version of Windows, even though extended support for XP will end in 2014. Many companies apparently plan to hang onto their XP machines until the very end. Those XP computers cannot be configured as DirectAccess clients.

But that is a temporary problem; eventually, the XP computers will be replaced by clients running more modern operating systems. However, in addition to these legacy clients, there are also Windows 7 client systems that need to connect to the corporate network but that, for whatever reasons, are not members of the domain. Thus, a significant number of network administrators are faced with managing remote access for both DirectAccess clients and clients that need another remote access solution.

It would seem to be more logical and convenient to combine the management tools for DA and RRAS. With Windows Server 2012, Microsoft went a step further than that and combined DA and RRAS into a new unified server role, which allows administrators to configure, manage, and monitor both the DirectAccess and VPN services together. Now DA and RRAS can coexist on the same server. This was made possible by the modification of IKEv2 policies and IPsec Denial of Service Protection (DoSP) in the following ways:

Now IKEv2 policies allow IPv6 transition technology traffic.

DoSP no longer drops all IPv4 packets, and IPv6 packets are not protected by IPsec as it did in the previous implementation.

Thanks to these changes, you no longer have to have two separate servers for running DA and RRAS and you do not have to switch back and forth between different interfaces to configure them. You can deploy and manage your RRAS VPNs (and DA) in one of two ways: through the graphical interface with the management console, or via the command line with PowerShell. Many organizations are now deploying Server Core installations to enhance performance and reduce the attack surface for network servers. You can install the RRAS Server role on a Server Core server.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499804000145

Securing Windows Server 2008 R2

Dustin Hannifin, ... Joey Alpern, in Microsoft Windows Server 2008 R2, 2010

Selecting a DirectAccess model

Before jumping headlong into a DirectAccess deployment, the first step an administrator must take is to determine the DirectAccess model they would like to employ. The level of security required across organizations will vary in stringency, and administrators have the choice to build a design that maps to the organization's specific security needs. Microsoft defines three DirectAccess models that can be evaluated to determine the architecture that is a best fit for your environment. The three main access models that we will discuss are:

Full Intranet Access

Selected Server Access

End-to-End Access

In some environments, the thought of allowing access to internal protected company resources from the Internet seems daunting, while in others, the accessibility is readily welcomed. Regardless of the security stance of your organization, you can build a secure access model to meet your business need. All three of the access models follow some of the same security principles and contain the same infrastructure elements. Let us review the high-level similarities across the three access models first.

The first commonality is: to ensure that data transference is secure when traversing the Internet, DirectAccess utilizes a two-step IPsec Encapsulating Security Payload (ESP) tunnel to connect. The first connection made by the client regardless of the access model will always be an infrastructure tunnel. The Infrastructure tunnel enforces computer authentication.

Full Intranet Access

This deployment model is the most similar to what exists today in many companies with VPN solutions deployed. In the traditional VPN model, the user makes an initial connection to a server on the perimeter, and once authenticated, is typically able to browse the internal network without restriction. With DirectAccess configured in the Full Intranet Access model, the scenario is similar.

The first step in connection is always the infrastructure tunnel. Once the infrastructure tunnel is complete, the user will authenticate and establish an intranet tunnel. The intranet tunnel users both computer and user-based authentication and it is used to connect to the DirectAccess server on the perimeter. Once the intranet tunnel has been established to the DirectAccess server, the client can browse and access LAN-based resources as if they were directly connected.

The DirectAccess server is functioning as an IPSec gateway and all IPSec traffic from the Internet terminates at the DirectAccess server. Transmissions from the client to the internal applications are still sent with the IPv6 protocol, but without the IPSec encryption that was present from the client to the DirectAccess server. The DirectAccess server continues to encrypt and decrypt IPSec traffic between the client and the Intranet resources.

For environments with Windows 2003-based resources in the LAN, this is the best deployment model. Since Windows 2003 servers do support the use of IPv6, but not IPSec with IPv6, they will only be accessible while the DirectAccess server is functioning as an IPSec gateway. Any resources that are not able to support IPv6 will not be accessible without the deployment of a third-party translator and DNS gateway.

Full Intranet Access with Smart Card Authentication

The Full Intranet Access with Smart Card Authentication model represents the same architecture as the Full intranet Access model, just with the addition of Smart Cards for an additional layer of user authentication protection. The DirectAccess server can be configured to enforce the user of Smart Cards on the Intranet tunnel before allowing user access to resources.

Selected Server Access

If your organization requires more selective access to internal resources for external clients, then this is the deployment model for you. By utilizing the Selected Server Access model, you enforce that client to utilize the IPSec Encapsulating Security Payload (ESP). It enables peer-to-peer authentication utilizing computer credentials and allows the clients to validate the identity of the server they are connecting to. This way the clients can determine if IPSec is required to connect to specific services on the Intranet.

In environments that contain the services of a sensitive nature, this model allows you to single out specific targets for Intranet-based IPSec encryption while traffic to other services on the Intranet remains clear. All traffic to and from the Internet is still secured by the IPsec gateway services provided by the DirectAccess servers.

End-to-End Access

In the End-to-End Access model, resources on the Intranet are made accessible to Internet users directly. End-to-End Access enforces IPsec from the DirectAccess client and the Intranet resource in a point-to-point fashion. IPSec peer authenticate using computer credentials should be configured and ESP is recommended.

What are the requirements for DirectAccess?

Remote Access client requirements: DirectAccess clients must be domain members..
The DirectAccess server must be a domain member. ... .
If the DirectAccess server is located behind an edge firewall or NAT device, the device must be configured to allow traffic to and from the DirectAccess server..

Is DirectAccess implemented outside of the remote access server?

DirectAccess is implemented outside of the Remote Access server.

How does a DirectAccess client determine if it is connected to the intranet or the Internet?

DirectAccess clients attempt to connect to the DirectAccess network location server in order to determine whether they are located on the Internet, or on the corporate network: If the connection is successful, then clients are determined to be on the intranet and DirectAccess is not used, and client requests are ...

Is DirectAccess end of life?

As of today, Microsoft has not announced the End of Life of DirectAccess and based on Microsoft's standard product life cycle, DirectAccess will be available and supported for many years to come.