Configuring and managing remote access
Deploying the Remote Access server role also installs some tools for
configuring and managing remote access in your environment. These tools
include:
-
The Remote Access Management Console (see Figure 1), which can be started from Server Manager
-
The Remote Access module for Windows PowerShell
In addition to allowing you to monitor the operational status of your remote access servers and clients, the Remote Access Management Console enables you to perform an additional configuration of your remote access environment (see Figure 2).
The Configuration page of the Remote Access Management Console lets
you perform additional configuration if needed (or initial
configuration if desired) in four areas:
-
Step 1: Remote Clients Lets you select between two DirectAccess scenarios:
-
Deploying full DirectAccess
for client access and remote management so that remote users can access
resources on the internal network and their computers can be managed by
policy
-
Deploying DirectAccess for remote management only so that the
computers of remote users can be managed by policy but the users cannot
access resources on the internal network
You can also select which group or groups of computers will be enabled for DirectAccess (by default, the Domain Computers group), choose whether to enable DirectAccess
for mobile computers only (enabled by default), and choose whether to
use force tunneling so that DirectAccess clients connect to both the
internal network and the Internet via the Remote Access server (disabled by default).
-
Step 2: Remote Access Server
Lets you configure the network topology of the Remote Access server
(but only if not previously configured), the public name or IPv4
address used by clients to connect to the server, which network adapter
is for the internal network, which certificate to use to authenticate
IP-HTTPS connections, how user authentication is performed, whether to
enable clients running Windows 7 to connect via DirectAccess, and how
your VPN server assigns IP addresses and performs authentication
-
Step 3: Infrastructure Servers
Lets you configure the name of your network location server for
DirectAccess clients, DNS settings for remote access, and other settings
-
Step 4: Application Servers Lets you specify whether to extend IPsec authentication and encryption to selected application servers on your internal network