官术网_书友最值得收藏!

Basic scenarios

The simplest scenario allows you to deploy Unified Remote Access with minimal planning and preparation. In this scenario, almost everything is covered by the URA server itself, as opposed to other scenarios, where you might need additional servers or infrastructure. This kind of deployment is ideal for organizations that prefer to invest the minimal amount of time and resources.

As part of this deployment, you will use the following functions and roles:

  • Windows Domain
  • Group Policy
  • Location Server
  • URA Server
  • Self-signed certificate
  • Kerberos Proxy
  • Permission requirements

The basic requirement for any and all URA scenarios is that your computers, as well as the URA server itself, are all members of a domain. The domain will serve as the infrastructure for authentication and for configuring the clients to connect. Unlike traditional VPN, with URA you do not create the configuration manually on the client computers, and all the required settings are applied to the client as part of Group Policy. The Group Policy mechanism identifies mobile computers automatically, and when these computers get the Group Policy applied these settings are applied, and the client is ready to use URA the next time it connects to the public Internet. You can also choose to have this policy applied to other computers by creating a specially designated group for that purpose in Active Directory, and assigning specific clients or other groups to it.

Note

To identify mobile computers, URA uses a WMI filter. To learn more about this process, read the article available at http://technet.microsoft.com/en-us/library/dd261948.aspx.

This method of configuring client settings via Group Policy is convenient as it does away with the crude process of manually installing and configuring each client with the VPN client and/or settings. It would probably be a relief for your tech support people knowing that the clients can't simply delete or uninstall this; so once a client has been configured, it would be rare for them to need any additional setup or support.

If your domain structure is more complex than a simple domain, keep in mind that clients from other domains in the forest that hosts the URA server's domain can participate (or, in other words, you can set up just a single URA server to service the entire forest). If you want the URA server to service clients in other domains that are not in the same forest, you can set up a two-way trust between these domains or forests in order to accomplish that.

Network Location Server

Network Location Server (NLS) is a server, which will be used by URA clients to detect when they are inside your corporate network. This is a very important function, because unlike traditional VPN, the user can't simply turn their URA connection on or off. When the computer is connected to the corporate network, it should behave like any regular client, and we would want the connection to be off so that the computer can communicate with the corpnet resources directly. This is not only to avoid wasting resources by going out-and-around, but also in case something is wrong with the connection and we want to apply new settings to it via Group Policy.

The URA clients have a component referred to as Network Location Awareness (NLA), which detects their location by trying to contact the location server routinely. If they fail in getting a response or are unable to resolve the name of the NLS, they deduce that they are on the public Internet and turn on the URA connection. If they succeed, the URA connection stays off.

The communication process is a simple HTTPS connection. The location server runs a secure website to which the client connects. If the connection succeeds (the HTTP connection succeeds and gets a 200 OK response code), the client determines that it's inside the network and acts accordingly. With a basic URA scenario, the web service role is automatically configured by the URA wizard and the URA server serves as the location server, so the NLS doesn't require additional manual configuration.

One thing that is important to understand with regards to the location server is that it's more than a key component to URA. Since its very existence is what allows the clients to know they are inside the network, any malfunction in that functionality is a major negative impact on your network. If the URA server is offline, your clients won't be able to connect from home, but if the server is completely down (taking with it the location service), your mobile clients will think they are outside the corporate network even when they are inside. This would cause them to attempt to start the URA connection, which would fail, of course, and none of these clients will be able to connect to any resource on the internal network. This is a grim situation to say the least. For this reason, you might want to consider separating this role from the URA server even if your deployment is relatively small and configure at least two servers in a redundant setup.

URA certificates

Another piece of the setup is certificates. Certificates are used for two purposes with URA:

  • The Network Location Server uses a certificate to prove its identity to connecting clients
  • The URA server uses a certificate to prove its identity to clients which use IP-HTTPS to connect

These two certificates can be generated by the URA server itself (a self-signed certificate), and that's usually the easiest option. You can also elect to use your own certificates. If you use your own location server, you will need to generate the certificate for it on your own. We will discuss this later in this chapter.

An important part of the basic setup of URA in general is the authentication. The standard authentication scheme for Windows Domains is Kerberos. Kerberos authentication is not simple, but in a situation where the connecting client (a URA client in our situation) is coming from the Internet, it makes things a little more complicated than the way it works when authentication is done from inside the network. To make things as easy as possible, URA installs a service called Kerberos Proxy (and sometimes also referred to as KerbProxy or KDC Proxy). This service allows the connecting client to perform Kerberos authentication against the domain seamlessly and without the cumbersome PKI (Public Key Infrastructure). Before this service came along, every organization that wanted to use DirectAccess had no choice but to configure a complex setup of a certificate authority and certificate distribution, and it was the most common cause of problems with the DirectAccess deployments.

Technically, the URA client creates a secure connection, using TLS, to the Kerberos Proxy service running on the URA server. The service sends the request to the domain's domain controller (which is a Kerberos Key Distribution Center or KDC for short), fetches a Kerberos ticket for the client, and forwards it to the client. Once a ticket has been obtained, it can be used for subsequent connections to domain resources.

Basic scenario considerations

The things you need to consider and decide upon for this scenario include the following:

  • Do you want your server to connect to the Internet with a public IP or host it behind a NAT device?
  • Do you have your computers and users organized into groups in Active Directory, which would allow you to assign them the URA Group Policy?
  • Does your domain have a compatible DNS server or do you need to upgrade your DNS infrastructure? (You must be running DNS on Windows 2003, Windows 2008 SP2, Windows 2008 R2, Windows Server 2012, or a version of Bind that supports dynamic updates and AAAA registration.)
  • Does your intended URA server meet the hardware requirements for the Windows Server 2012 operating system and this role?
  • Do you want to set up your own location server?
  • Do you want to defer to the self-signed certificates generated by the URA server or create your own?

Having made these decisions, you are almost ready to start the installation procedure for Unified Remote Access, which we will discuss in Chapter 4, Installing and Configuring the Unified Remote Access Role. However, if you are planning to use some of the more advanced scenarios, such as offering support for Windows 7 clients or multisite, you should read on and get a better understanding of some of the additional concepts.

主站蜘蛛池模板: 通河县| 鄂尔多斯市| 海晏县| 衡山县| 西平县| 汶上县| 无极县| 大竹县| 全椒县| 房产| 武鸣县| 兰考县| 大化| 余庆县| 青冈县| 资源县| 原平市| 天气| 嘉兴市| 博湖县| 山阴县| 南平市| 治县。| 黔西县| 海口市| 新源县| 秦安县| 定兴县| 镇坪县| 牟定县| 星座| 两当县| 仙桃市| 万山特区| 新营市| 文化| 称多县| 桂平市| 潜江市| 深州市| 巴青县|