IT tutorials
 
Technology
 

Windows Server 2012 : Access virtually anywhere, from any device (part 3) - Unified remote access - Configuring and managing remote access

3/15/2014 2:37:03 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Configuring and managing remote access

Deploying the Remote Access server role also installs some tools for configuring and managing remote access in your environment. These tools include:

  • The Remote Access Management Console (see Figure 1), which can be started from Server Manager

  • The Remote Access module for Windows PowerShell

The Remote Access Management Console is integrated into Server Manager.

Figure 1. The Remote Access Management Console is integrated into Server Manager.

In addition to allowing you to monitor the operational status of your remote access servers and clients, the Remote Access Management Console enables you to perform an additional configuration of your remote access environment (see Figure 2).

Using the Remote Access Management Console to perform additional configuration of a remote access environment.

Figure 2. Using the Remote Access Management Console to perform additional configuration of a remote access environment.

The Configuration page of the Remote Access Management Console lets you perform additional configuration if needed (or initial configuration if desired) in four areas:

  • Step 1: Remote Clients Lets you select between two DirectAccess scenarios:

    • Deploying full DirectAccess for client access and remote management so that remote users can access resources on the internal network and their computers can be managed by policy

    • Deploying DirectAccess for remote management only so that the computers of remote users can be managed by policy but the users cannot access resources on the internal network

    You can also select which group or groups of computers will be enabled for DirectAccess (by default, the Domain Computers group), choose whether to enable DirectAccess for mobile computers only (enabled by default), and choose whether to use force tunneling so that DirectAccess clients connect to both the internal network and the Internet via the Remote Access server (disabled by default).

  • Step 2: Remote Access Server Lets you configure the network topology of the Remote Access server (but only if not previously configured), the public name or IPv4 address used by clients to connect to the server, which network adapter is for the internal network, which certificate to use to authenticate IP-HTTPS connections, how user authentication is performed, whether to enable clients running Windows 7 to connect via DirectAccess, and how your VPN server assigns IP addresses and performs authentication

  • Step 3: Infrastructure Servers Lets you configure the name of your network location server for DirectAccess clients, DNS settings for remote access, and other settings

  • Step 4: Application Servers Lets you specify whether to extend IPsec authentication and encryption to selected application servers on your internal network

 
Others
 
- Windows Server 2012 : Access virtually anywhere, from any device (part 2) - Unified remote access - Deploying remote access
- Windows Server 2012 : Access virtually anywhere, from any device (part 1) - Unified remote access - Simplified DirectAccess
- SQL Server 2012 : Locking and Concurrency (part 6) - THE DANGERS OF CONCURRENCY - Double Reads
- SQL Server 2012 : Locking and Concurrency (part 5) - THE DANGERS OF CONCURRENCY - Phantom Reads
- SQL Server 2012 : Locking and Concurrency (part 4) - THE DANGERS OF CONCURRENCY - Dirty Reads
- SQL Server 2012 : Locking and Concurrency (part 3) - THE DANGERS OF CONCURRENCY - Dirty Reads
- SQL Server 2012 : Locking and Concurrency (part 2) - THE DANGERS OF CONCURRENCY - Lost Updates
- SQL Server 2012 : Locking and Concurrency (part 1) - TRANSACTIONS, DATABASE TRANSACTIONS
- Microsoft Exchange Server 2013 : Site mailboxes (part 2) - The life cycle of site mailboxes, Site mailbox provisioning policy
- Microsoft Exchange Server 2013 : Site mailboxes (part 1) - How site mailboxes work - Synchronization between Exchange and SharePoint
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us