Quantcast
Channel: DirectAccess Test Lab Extension: Remote Management
Viewing all articles
Browse latest Browse all 6

DirectAccess Test Lab Extension: Remote Management

$
0
0
Revision 5 posted to TechNet Articles by Joe Davies on 1/6/2013 12:22:44 PM
This DirectAccess Test Lab Extension for DirectAccess in Windows Server 2008 R2 describes how to configureremote management for the DirectAccess clients of the corp.contoso.com domain. You configure and test remote management of CLIENT1 from APP1 with a remote desktop connection.
 
Note  These instructions are designed for a working DirectAccess test lab that is configured from the instructions found in theTest Lab Guide: Demonstrate DirectAccess document.
If you are running the DirectAccess Test Lab in a virtual environment, you can create snapshots of the virtual machines (VMs) for all of the test lab computers before performing the following procedures.
 

Configuring and Demonstrating Remote Management

To demonstrate the lack of remote management capability of CLIENT1 from APP1 using a remote desktop connection:
  1. Connect CLIENT1 to the Internet subnet, and then restart it. Do not log on.
  2. On APP1, clickStart, click All Programs, click Accessories, and then clickCommand Prompt.
  3. In the Command Prompt windows, run theping client1 command. You should see four successful replies.
  4. ClickStart, click All Programs, click Accessories, and then clickRemote Desktop Connection.
  5. In theRemote Desktop Connection window, type client1 in Computer, and then clickConnect. You should see the error message Remote Desktop can’t connect to the remote computer.
  6. ClickOK.
 
APP1 cannot initiate a remote desktop connection to CLIENT1 when there is no user logged on because there are no IPsec tunnels that allow incoming traffic from APP1. When no one has logged on to CLIENT1, the only IPsec tunnel in place is the infrastructure tunnel, which only allows traffic from 2002:836b:2:1:0:5efe:10.0.0.2, the ISATAP address of DC1. After a user has logged on to CLIENT1, the intranet tunnel is used to carry the remote desktop connection traffic between CLIENT1 and APP1.
 
To allow APP1 to remotely manage CLIENT1 even when there is no user logged on, you must add 2002:836b:2:1:0:5efe:10.0.0.3, the ISATAP address of APP1, to the list of management servers in Step 3 of the DirectAccess Setup Wizard.
 
To configure APP1 as a management server:
  1. On EDGE1, clickStart, point to Administrative Tools, and then click DirectAccess Management.
  2. In the console tree, clickSetup.
  3. In the details pane, clickEdit in Step 3.
  4. On theLocation page, click next. On the DNS and Domain Controller page, clicknext.
  5. On theManagement page, right-click the empty entry in the table, and then click New.
  6. In theIPv4 Address window, click IPv4 address, type 10.0.0.3, and then clickOK. Notice that the wizard has added a table entry for 2002:836b:2:1:0:5efe:10.0.0.3, the ISATAP address of APP1.
  7. ClickFinish.
  8. In the details pane, clickFinish, and then click Apply.
  9. When prompted, clickOK.
  10. ClickStart, click All Programs, click Accessories, and then clickCommand Prompt.
  11. From the Command Prompt window, run thegpupdate /target:computer command.
 
To update CLIENT1 and demonstrate remote management with a remote desktop connection:
  1. On CLIENT1, log on with the CORP\user1 user account and password.
  2. ClickStart, click All Programs, click Accessories, and then clickCommand Prompt.
  3. From the Command Prompt window, run thegpupdate /target:computer command.
  4. Log off of CLIENT1.
  5. On APP1, clickStart, click All Programs, click Accessories, and then clickRemote Desktop Connection.
  6. In theRemote Desktop Connection window, type client1 in Computer, and then clickConnect.
  7. When prompted for credentials, type the password for the CORP\user1 account, and then clickOK. You should see the desktop of CLIENT1.
  8. Close the remote desktop window for CLIENT1.
 
By configuring APP1’s ISATAP address as a management server, the DirectAccess Setup Wizard configures a connection security rule for a management tunnel on EDGE1 and CLIENT1. This management tunnel, which is separate from the infrastructure and intranet tunnels, allows APP1 to initiate communication with DirectAccess clients even when there is no user logged on.
.
If you are running the DirectAccess Test Lab in a virtual environment, you can discard the changes made by these procedures by restoring the previously made snapshots of the VMs for all of the computers in the test lab. Alternately, if you would like return to a working DirectAccess configuration with remote management configured, you can create a new set of snapshots before restoring the previously made snapshots.
.
To manually restore the configuration of the DirectAccess Test Lab, perform the following procedure.
.

Restoring the DirectAccess Test Lab

To restore the DirectAccess Test Lab to its original configuration:
  1. On EDGE1, in the console tree of the DirectAccess Management snap-in, clickSetup.
  2. In the details pane, clickEdit in Step 3.
  3. On theLocation page, click Next. On the DNS and Domain Controller page, clickNext.
  4. On theManagement page, right-click the table entry for 2002:836b:2:1:0:5efe:10.0.0.3, and then clickDelete.
  5. ClickFinish.
  6. In the details pane, clickFinish, and then click Apply.
  7. When prompted, clickOK.
  8. From the Command Prompt window, run thegpupdate /target:computer command.
  9. Close the Command Prompt window.
  10. Log on to CLIENT1 with the CORP\user1 account and password.
  11. ClickStart, click All Programs, click Accessories, and then clickCommand Prompt.
  12. From the Command Prompt window, run thegpupdate /target:computer command.
  13. Close the Command Prompt window.

For additional DirectAccess Test Lab extensions and other resources for the DirectAccess Test Lab, clickhere. 

 

Tags: Direct Access, test lab extension

Viewing all articles
Browse latest Browse all 6

Latest Images

Trending Articles





Latest Images