Building Your Complete Remote Access Infrastructure on Windows Server 2012



Similar documents
Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud

Networking with Windows Server vb. Day(s): 5. Version: Overview

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Designing and Implementing a Server Infrastructure MOC 20413

Designing and Implementing a Server Infrastructure

MOC 20413C: Designing and Implementing a Server Infrastructure

Course Outline: 6433 _ Planning and Implementing Windows Server 2008 Clustering

Build Your Knowledge!

Designing and Implementing a Server Infrastructure

Updating Your Windows Server 2008 Technology Skills to Windows Server 2008 R2

VNLINFOTECH JOIN US & MAKE YOUR FUTURE BRIGHT. mcsa (70-413) Microsoft certified system administrator. (designing & implementing server infrasturcure)

Training Name Installing and Configuring Windows Server 2012

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

Upgrading Your Skills to MCSA Windows Server 2012

nappliance Network Virtualization Gateways

20417-Upgrading Your Skills to MCSA Windows Server 2012

MS 20417B: Upgrading Your Skills to MCSA Windows Server 2012

AV-006: Installing, Administering and Configuring Windows Server 2012

MCSA: Windows Server 2012 Boot Camp

NOTE: Labs in this course are based on the General Availability release of Windows Server 2012 R2 and Windows 8.1.

Upgrading Your Skills to MCSA Windows Server 2012

COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Upgrading Your Skills to MCSA Windows Server 2012

About the Authors About the Technical Editor

What s in Installing and Configuring Windows Server 2012 (70-410):

Configuring Advanced Windows Server 2012 Services

MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

Implementing an Advanced Server Infrastructure (20414) H4D07S

LEARNING SOLUTIONS website milner.com/learning phone

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

Build Your Knowledge!

Designing and Implementing a Server Infrastructure

SSL VPN Technical Primer

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Designing and Implementing a Server Infrastructure

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Course Outline. Course 6421B : Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Designing and Implementing a Server Infrastructure

COURSE 20413C: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE

Upgrading Your Skills to MCSA Windows Server 2012 Course 20417A: 5 Days; Instructor-Led

Designing and Implementing a Server Infrastructure

Course Active Directory Services with Windows Server

6421B - Windows Server 2008 R2 Network Infrastructure

Configuring & Troubleshooting Windows 2008 Server 2008 Network Infrastructure

Course Outline. Course 6419 : Configuring, Managing and Maintaining Windows Server 2008-based Servers. Duration: 5 Days

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Active Directory Services with Windows Server 10969B; 5 days, Instructor-led

Designing and Implementing a Server Infrastructure 20413C; 5 days, Instructor-led

Course 20413: Designing and Implementing a Server Infrastructure

MCSA: Windows 2012 Server

Planning and Implementing Windows Server 2008

Course Outline: Course Designing and Implementing a Server Infrastructure

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

Administering Windows Server 2012

MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Desingning and Implementing a Server Infrastructure

Microsoft Configure and Troubleshoot Windows Server 2008 Network Infrastructure

Planning and Implementing Windows Server 2008

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Microsoft Forefront Unified Access Gateway and DirectAccess. Better Together

Configuring, Managing and Maintaining Windows Server 2008-based Servers

Configuring Advanced Windows Server 2012 Services MOC 20412

Course Outline. Course 20412B: Configuring Advanced Windows Server 2012 Services. Duration: 5 Days

Designing and Implementing a Server Infrastructure

Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers

How To Extend Security Policies To Public Clouds

Microsoft Active Directory Services with Windows Server

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Owner of the content within this article is Written by Marc Grote

Microsoft SharePoint Architectural Models

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Configuring Advanced Windows Server 2012 Services

70-413: Designing and Implementing a Server Infrastructure

Course 10969A Active Directory Services with Windows Server

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

The course covers Windows server 2008, Windows Server 2008 R2 and Windows Server 2008 R2 sp1.

NE-6416D Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure (6421B)

50412: Implementing Active Directory Federation Services 2.0

T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates

Configuring Advanced Windows Server 2012 Services 5 Days

Configuring Advanced Windows Server 2012 Services Course# 20412D

Introduction to Mobile Access Gateway Installation

Configuring Advanced Windows Server 2012 Services

Course 20417B: Upgrading Your Skills to MCSA Windows Server 2012

This version of this course is built on the final release version of Windows Server 2012.

VPN_2: Deploying Cisco ASA VPN Solutions

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

MS 20413A: Designing and Implementing a Server Infrastructure

Course # 20417B. Upgrading Your Skills to MCSA Windows Server 2012

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

Designing and Implementing a Server Infrastructure

Administering Windows Server 2012

Transcription:

Building Your Complete Remote Access nappliance White Paper August 2012

Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad set of technologies including security, advanced networking challenges and support for a variety of end user devices including home PCs, laptops, tablet computers, PDA computers and smart phones. The access technologies described in this include providing access to: Remote Managed Devices Microsoft DirectAccess provides support for corporate computers attached directly to the Internet but also joined directly to the corporate domain and administered under Active Directory and other corporate management systems including Systems Center. Remote Unmanaged Devices With the Windows Server 2012, computers not managed by the corporate IT department can be used to access corporate resources securely. These remote computers are insecure, such as home PCs also accessed by non-employees or other mobile devices including tablets and consumer devices, but Windows Server 2012 provides a method to secure these devices and provide a secure remote access solution. Remote Sites Corporations often have multiple locations and these remote sites can be connected to the corporate network using various WAN technologies. To create a network WAN between sites via the Internet, some form of VPN is typically used. This document describes three scenarios: o Site-to-Site VPN These remote sites are connected via Site-to-Site VPN devices which provide similar services as remote sites connected via leased line technologies. o Branch Sites nappliance provides extended capabilities over standard Site-to-Site which includes WAN Optimization, Network Virtualization and network service extensions to the branch locations including Read Only Active Directory services, DHCP, DNS, and others. o Clustered Desktop Networks This scenario is for smaller offices which have no Site-to-Site VPN services, but has a small number of desktop devices, each network attached to the corporate office directly using DirectAccess and BranchCache technologies from Microsoft. nappliance packages and pre-integrates a broad set of technologies into a family of appliances. The nappliance product family is the Unified Remote Access (URA) product line running on a Windows Server 2012 platform. These products remove most of the challenges and complexity of providing a broad set of advanced remote access services and provide a plug-n-play appliance experience. Unified Remote Access The Unified Remote Access Appliances are based on Windows Server 2012 Hyper-V and can run multiple virtual machines. Each virtual machine can run different remote access technologies including Microsoft DirectAccess Microsoft Unified Access Gateway Microsoft VPN (RRAS) services WAN Optimization technologies from nappliance Microsoft BranchCache for network acceleration

Each Unified Remote Access product can be configured with one or more remote access technologies, providing the flexibility to support just the technologies desired, or adding additional remote access technologies when desired. Multi-Tenancy - Support multiple customers with a single appliance Since each virtual machine running DirectAccess, UAG, Site-to-Site or other remote access technologies is independent and isolated from other customer tenants, remote access technologies can be dedicated and isolated to specific customers. One customer may only require DirectAccess for their remote access needs, while others may desire a broader range of technologies. In the example diagram, Customer B is running DirectAccess only for remote users, while Customer C is utilizing UAG for mobile devices, Site-to-Site VPN for their larger locations and Branch Appliances for the smaller remote site locations. DirectAccess - Managed Remote Desktops Microsoft DirectAccess provides a remote access solution for corporate computers that reside at remote locations such as user s homes small remote offices. These remote systems are centrally managed using the standard management technologies used by IT departments to manage local computers. Remote computers are under the control of Active Directory and managed by Systems Center or other management tools.

DirectAccess is the ideal remote access technology for extending corporate networks to remote Internet attached locations. DirectAccess end computer management includes Active Directory GPO policies, patch management via Systems Center Operations Manager or other systems, internal DNS, CIFS network shares, and all management provide centrally by the IT Department. The nappliance Unified Remote Access appliance adds additional technologies to the DirectAccess feature sets including: Hardened Appliance Features for extended security required for Internet facing traffic Security Firewall add-on using Microsoft Forefront Threat Management Gateway to protect the corporate network from Internet threats FIPS 2/3 Compliance and HSM (Hardware Security Module) features for high security installations Integrated Multi-Factory Authentication using the Gemalto Digital Security technologies. These include Security Tokens, PKI Smart Cards, and others Off-Premises provisioning to allow remote computers to join to the corporate Active Directory domain from a remote location Remote Access for Windows-to-Go computers. Windows-to-Go is a Microsoft technology which is an entire Windows 8 operating system contained on a USB stick. A remote user can connect his USB stick to a foreign and insecure computer and boot from the USB stick. Once booted: o The user is running a complete Windows desktop, completely isolated from the host PC o The Windows-to-Go system can be domain joined and immediately connected to the corporate domain and access all resources allowed by his Active Directory credentials o The Windows-to-Go system can also be protected by the Gemalto Digital Security system, where if the user were to lose the USB Windows-to-Go system, an additional factor such as a token or smartcard would be required to access corporate resources. WAN Acceleration for DirectAccess remote nodes using the Microsoft BranchCache technologies. BranchCache is included with the nappliance Unified Remote Access appliance for network acceleration. Unified Access Gateway (UAG) - Unmanaged Desktops and Mobile Devices nappliance has built in Microsoft Unified Access Gateway 2010(UAG 2010) on a virtualized instance on the Windows Server 2012 Platform. One of the great features of Windows Server 2012 Hyper-V is that it allows you to run any service, on any server, in any cloud. In taking advantage of the virtualization capability of Windows Server 2012, nappliance was able to build in the older UAG 2010 technology to provide additional remote access capabilities on the appliance. The Microsoft Unified Access Gateway (UAG) 2010 provides reverse proxy publishing of remote user access to corporate services such as Outlook, Lync, SharePoint, any Web Based service and most client/server based services in a single web portal.

UAG 2010 provides endpoint protection and interrogation, where an end user computer must pass the corporate access policies before access is allowed. This provides an easy to use remote access solution through a web browser, all enabled on top of the Windows Server 2012 platform. The combination of Windows Server 2012 DirectAccess and UAG 2010 portal publishing provides a comprehensive remote access solution. Site-to-Site VPN - WAN networks over the Internet The nappliance URA appliance includes a complete Site-to-Site VPN solution set. This technology requires a hardware device on both ends of the Internet, and the nappliance URA appliance works in conjunction with the nappliance Branch Appliance to provide a secure WAN solution. The Site-to-Site VPN links corporate sites and are commonly deployed as WAN backbone links. When combined with routing protocols, VPN circuits can be deployed in mesh networks.

WAN circuits based on shared networks such as the Internet can have unpredictable performance and reliability. Network technologies such as WAN optimization and QOS are an important part of the solution for a Site-to-Site VPN product. The URA Appliance includes the following features: Hardware offloading of IPsec protocols 10 Gig Network Interface ports WAN Optimization technologies for IP protocols BranchCache WAN Optimization technology from Microsoft Hardware performance tuned for high-throughput network circuits BNA: Branch Appliances - Branch Office in a Box In addition to advanced VPN network technologies, the nappliance Branch Network Appliance (BNA) includes a set of services which provides a complete branch office solution. The branch office appliance is centrally managed and provides a full set of IT services for remote offices without storing permanent data. Since no permanent data is retained, the requirement for backups and critical system management is removed. Branch appliances that suffer failures or physical abuse can simply be replaced similar a typical network appliance. The software features of the nappliance Branch Appliance include: Hyper-V Virtual Machine Hosts each branch appliance is based on Hyper-V and has the capability of running additional virtual machines. Customers can run their own software instances to meet custom business requirements. Read Only Active Directory Active Directory queries such as logins and GPO processing is processed locally at each branch location, speeding up the performance for branch users. Local DNS and DHCP DNS and DHCP processing is also processed locally at the branch location. Remote Office File Sharing Microsoft DFS file sharing and share replication greatly enhances the branch location network and overall performance. Distributed Print Shares Print shares can be extended for printing from corporate office servers down to branch locations. Desktop Management Desktop management systems are included in the software stack of the branch appliance. Desktop management is the largest IT overhead and source for helpdesk phone calls. Forefront TMG Firewall The Microsoft enterprise firewall is included so the branch appliance can securely face the Internet and maintain corporate security. Site-to-Site VPN Enterprise and feature rich Site-to-Site VPN is included as described above. WAN Optimization Enterprise and feature rich WAN Optimization technologies are included as described above. Gemalto Multi-Factor Authentication Enhanced access security is gained by using Multi-Factor authentication using tokens or smart cards. Gemalto the leading provider of token and smart card technology, and is the branch appliance is seamlessly integrated with the nappliance Gemalto appliance solutions.

The Branch Network Appliance is tightly integrated with the product solution sets from nappliance, Microsoft and Gemalto and provides a complete IT solution for small to mid-sized branch office locations. Summary The Unified Remote Access solution from nappliance that is built on the Windows Server 2012 platform, includes seamless integration of a stack of technologies including firewall security, multi-factor authentication with networking technologies including SSL VPN, Site-to-Site VPNs to provide a remote access technology which encompasses individual users on individual mobile devices in a BYOD environment, to managed corporate laptops, to full office installations at satellite branch locations all running securely on Microsoft remote access technology. nappliance Networks, Inc. 540 Dado Street, San Jose, CA 95131, USA Phone: 1-408-895-5000 (Local) 1-877-895-nAPP (6277) (US-Toll Free) 011-408-895-5000 (International) Fax: 1-408-943-8222/8101 Email: info@nappliance.com Website: http//www.nappliance.com