WMS02 Direct Access Always Connected: Death of the VPN

WMS02: Direct Access Always
Connected: Death of the VPN
Dan Stolts “ITProGuru”
Microsoft
ITProGuru@microsoft.com
http://Blogs.technet.com/danstolts or
http://ITProGuru.com
Twitter.com/ITProGuru
WMS02: Direct Access Always
Connected: Death of the VPN
• Direct Access Always Connected: Death of the VPN
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6
and IPsec and you have a solution that will allow direct access to
your corporate network without the need for VPNs. Come to this
session to see the ITProGuru (Dan Stolts) and learn how to
integrate DirectAccess into your environment. Can you see the
benefit of your users never having to connect to a VPN? Can you
see the benefit in your IT personal to be able to access remote
computers as long as they are connected to the Internet? Come to
this session to Learn how to control access to corporate resources
and manage Internet connected PCs through group policy.
Today’s Agenda
1. Core Infrastructure Optimization Model
2. Introduction to DirectAccess
3. Technical Introduction
4. Technical Detail
5. Summary
Network Access Infrastructure Optimization Model
Is IT a Cost Center or a Strategic Asset?
Cost
Center
No password
policies
More Efficient
Cost Center
Strong password
policy
Business
Enabler
Strategic
Asset
Strong password
policy
Strong
authentication
Perimeter
firewalls only
Host-based firewalls
Basic IPsec policies
Network
transactions are
authenticated;
may be encrypted
Antivirus not
required or installed
by default
Security suite
installed on clients
Health policies
enforced
Policy-based
network access with
auto-remediation
No remote access
policies
Remote access
available
Remote user
experience is
similar to local
Remote users are
an extension of the
network
IPv4-only network
IPv6 planning and
testing in progress
IPv6 blockers
removed,
addressing plan
complete
IPv6 is fully
deployed
Rationalized
Dynamic
Basic
Standardized
Network Access Vision
Identity:
Strong authentication required for all users
Authorization:
Computer health is validated or remediated before allowing network access
Protection:
All network transactions are authenticated and encrypted
Policies are based on identity, not on location
Evolving IT Challenges
Mobile Workforce
Mobile Data
Globalization
DirectAccess
DirectAccess:
More than Remote Access
Always
On
Manage
Out
Access
Policies
Protected
Transactions
Improved
productivity
"Light up"
remote clients
Pre-logon
health checks
and remediation
Supports
authenticated
transactions
Not user initiated
Decreases patch
miss rates
Replaces modal
"connect-time"
health checks
Supports encrypted
transactions
Simplified
connectivity
Applies GPOs to
remote computers
Full NAP integration
Authentication and
encryption mitigate
many attacks
VPNs connect the user to the network
DirectAccess extends the network to the computer and user
The Evidence
“Recently, a sales account executive and I had about an hour-long
drive back to the office from a customer site. With DirectAccess, he
was able
to log on to our network, access the documents he needed, and write
the proposal while I drove. By the time we got back to the office, he
was already hitting the send button to deliver the proposal.”
Rand Morimoto, President, Convergent Computing
www.microsoft.com/casestudies/Case_Study_Detail.aspx
?CaseStudyID=4000004062
DirectAccess:
Technical Foundation
Name Resolution:
DNS and NRPT
Data Protection:
IPsec
Connectivity:
IPv6
Connectivity:
IPv6… Can Do Without… But I Would Not!
• DirectAccess
requires IPv6
• If native IPv6 isn't
available, remote
clients use IPv6
transition technologies
IPv6 Options
DirectAccess works best if the
corporate network has native IPv6
deployed
Internet
Intranet
• The corporate network
can deploy native IPv6,
transition technologies,
or NAT-PT {protocol
translation}
NAT-PT
Native IPv6
IPv6 Transition Technologies
IPv4
Forefront UAG & DirectAccess: Better Together
MANAGED
Windows7
Windows7
UAG and DirectAccess better together:
1. Extends access to line of business servers with IPv4 support
2. Access for down level and non Windows clients
3. Enhances scalability and management
4. Simplifies deployment and administration
5. Hardened Edge Solution
Always On
DirectAccess
IPv6
IPv6
UNMANAGED
Vista
XP
Extend support
to IPv4 servers
IPv4
SSL VPN
Non
Windows
DirectAccess
Server
IPv4
+
PDA
IPv4
UAG is a hardened edge appliance available in HW and virtual options
provides
access
forextends
down
level
andtonon
Windows
clients
enhances
scale
and
management
with
integrated
LB
andinfrastructure
array
UAG UAG
improves
adoption
access
existing
UAG uses
wizards
and
tools
toand
simplify
deployments
and
ongoing
management
capabilities.
Name Resolution:
DNS and the NRPT (Name Resolution Policy Table)
DirectAccess
Connection
Internet
Connection
Remote DirectAccess clients use smart routing
for DNS queries by default
The Name Resolution Policy Table (NRPT) {client side
conditional forwarding} allows this to happen efficiently
DirectAccess sends name queries to intranet
DNS servers based on pre-configured namespace
Requirements for DirectAccess
Customer Knowledge
Should have a basic working knowledge of IPsec or TCP/IP
Should be interested in learning and deploying new technologies, such as
IPv6
DirectAccess Clients
Windows 7 Enterprise Edition or Windows 7 Ultimate Edition
Domain-joined computers
DirectAccess Server
Windows Server 2008 R2, Standard Edition or Higher
Domain-joined computers
Others
DNS Servers Supporting DirectAccess Clients - Windows Server 2008 SP2 or
later
A public key infrastructure (PKI) to issue computer certificates, smart card
certificates, and, for NAP, health certificates.
External Connectivity
IP Address
Assigned
by ISP:
IPv6 Address
Used to
connect:
Private
IPv4
Native IPv4
IPv6
Public
6to4IPv6
Teredo
Native
Supports native IPv6
6to4 tunnels IPv6 inside
IPv4 (protocol 41) (used
by public IPv4
addresses)
Teredo tunnels IPv6
inside IPv4 UDP (UDP
3544) (used by private
IPv4 addresses)
DirectAccess
Client
Native IPv6
6to4
Teredo
IP-HTTPS
IP-HTTPS tunnels IPV6
inside IPv4 SSL (TCP
443) if client can’t
connect using 6to4 or
Teredo
Internal IPv6
IPv6 Options
Native IPv6
Works with any server OS that supports
IPv6
Requires IPv6 infrastructure
Delivers best choice over time
ISATAP
DirectAccess works best if the
corporate network has native IPv6
deployed
Internet
Intranet
Tunnels IPv6 inside IPv4
Doesn’t require routing
infrastructure upgrades
Requires Windows Server 2008 or R2
NAT-PT {Protocol Translation}
NAT-PT
Translates IPv6 to IPv4
Works with any server OS
Is available in Forefront UAG
Native IPv6
IPv6 Transition Technologies
IPv4
External IPsec
IP-HTTPS
Encrypted IPsec+ESP
DirectAccess
Client
IPsec Hardware Offload
Supported
IPsec
Gateway
DirectAccess
Server
Internal IPsec Options
IPsec Tunnel Detail - Split Tunneling
DirectAccess
Client
Tunnel 1: Infrastructure Tunnel
Authentication: Computer
Certificate + NTLM
Client Access:
AD/DNS/Management
Tunnel 2: Intranet Tunnel
Authentication: Computer
Certificate + User Kerb
Client Access: Other available
resources
DirectAccess
Server
Multi Factor Credentials for Intranet Access
Two Factor Authentication (TFA) is
fully supported but not required
Edge-based enforcement is a smarter way to enforce TFA
Users are assigned a well-known SID when
they log on with a smartcard (S-1-5-65-)
Users may log on to a laptop without TFA
When users access corporate resources, the
IPsec authorization policy checks for the SID…
Name Resolution Policy Table
(NRPT)
Pertains to the client side only
Uses a static table to define
which DNS servers will be
used by the client for the
listed names
Is configurable via Group
Policy Objects (GPO) at
Computer Configuration/
Windows Settings/Name
Resolution Policy
NRPT
.ad.contoso.com
2001:db8:b90a:c7d8::178
2001:db8:b90a:c7d8::183
.lab.contoso.com
2001:db8:b90a:c7a8::202
.nls.contoso.com
2001:db8:b90a:c7e4::801
Can be viewed with
netsh name show policy
Demo
CLIENT EXPERIENCE…
Direct Access Deployment
Deployment Strategy
Prepare to monitor IPv6 traffic
Choose an access model (e.g., full
intranet access vs. selected server access)
Determine deployment scale
Deployment Process
Prepare infrastructure
Configure DirectAccess server
Customize policies, as needed
DirectAccess Monitoring
• Built-in to the
DirectAccess
feature installed on
the DA server
• Provides server
monitoring
information on
DirectAccess
components
DirectAccess:
More than Remote Access
Always
On
Manage
Out
Access
Policies
Protected
Transactions
Improved
productivity
"Light up"
remote clients
Pre-logon
health checks
and remediation
Supports
authenticated
transactions
Not user initiated
Decreases patch
miss rates
Replaces modal
"connect-time"
health checks
Supports encrypted
transactions
Simplified
connectivity
Applies GPOs to
remote computers
Full NAP integration
Authentication and
encryption mitigate
many attacks
VPNs connect the user to the network
DirectAccess extends the network to the computer and user
INFRASTRUCTURE PLANNING AND DESIGN (IPD) GUIDE
What are IPD Guides?
•
Guidance & best practices for infrastructure planning
of Microsoft technologies
Direct Access Guide Benefits
•
Presents common scenarios, decisions, and practices
in an easy-to-follow, step-by-step process for
designing DirectAccess infrastructure
• Provides a straightforward explanation of the
infrastructure required to allow client connectivity from
any network to resources on the corporate network
• Assists the reader in deploying DirectAccess for
situations
“At the end of the day, IT operations
where the organization hasn’t started IPv6
is really about running your
implementation
business as efficiently as you can so
you have more dollars left for
innovation. IPD guides help us
It’s a free download!
achieve this.”
Go to www.microsoft.com/ipd
_
Peter Zerger, Consulting Practice Lead
for Management Solutions, AKOS
Technology Services
DirectAccess Architecture Deeper Dive
http://www.msteched.com/2010/NorthAmerica/WSV306
Shortcut..
http://bit.ly/DADeepDive
Dan Stolts “ITProGuru” Sessions
• 10:00 am WMS03: 10 Hot Topics Every IT
Admin Needs to Know about Windows
Server 2008 R2 SP1
• 11:15 am WMS02: Direct Access Always
Connected: Death of the VPN
• 3:15 pm WMS04: Monitoring and
Managing All Critical Infrastructure
Blog: ITProGuru.com
All Slides Available Now!
Your Feedback is Important
Please fill out a session evaluation form drop
it off at the conference registration desk.
Thank you!
WMS02: Direct Access Always Connected: Death of the VPN
•
•
•
•
Dan Stolts “ITProGuru”
Microsoft
Blog: ITProGuru.com
Twitter.com/ITProGuru