Checklist: Implementing an RRAS Design
Updated: April 30, 2010
Applies To: Windows Server 2008, Windows Server 2008 R2
This parent checklist includes cross-reference links to important concepts about deploying RRAS. It also contains links to subordinate checklists that will help you complete the tasks required by this deployment strategy.
Note
Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic or to a subordinate checklist, return to this topic after you review the conceptual topic or complete the tasks in the subordinate checklist so that you can proceed with the remaining tasks in this checklist.
Checklist:
Implementing an RRAS Design
Task | Reference | |
---|---|---|
Identify your deployment goals. |
See Identifying Your Routing and Remote Access Deployment Goals in the RRAS Design Guide. |
|
Review the available RRAS designs. |
See Mapping Your Deployment Goals to a Routing and Remote Access Design in the RRAS Design Guide. |
|
If a certificate-based authentication method is chosen, configure a public key infrastructure (PKI). |
See Appendix A: Computer Certificates for VPN Connections in the RRAS Design Guide. |
|
Determine the appropriate RRAS server placement and packet filters to be installed on the RRAS server. |
See Appendix B: VPN Servers and Firewall Configuration in the RRAS Design Guide. |
|
Depending on your high-level design choices, review one or more of the following checklists: |
Checklist: Implementing a VPN Remote Access Server Design Checklist: Implementing a Dial-up Remote Access Server Design |