Export (0) Print
Expand All

Selected Server Access Example

Updated: October 1, 2009

Applies To: Windows 7, Windows Server 2008 R2

ImportantImportant
This topic describes design considerations for DirectAccess in Windows Server 2008 R2. For the design considerations of DirectAccess in Microsoft Forefront Unified Access Gateway (UAG), see the Forefront UAG DirectAccess Design Guide (http://go.microsoft.com/fwlink/?LinkId=179988).

Selected server access allows you to confine the access of DirectAccess clients to a specific set of intranet application servers and deny access to all other locations on the intranet. Intranet access requires end-to-end Internet Protocol security (IPsec) protection from the DirectAccess client to the specified servers. This provides an additional layer of IPsec peer authentication and data integrity for end-to-end traffic so that DirectAccess clients can verify that they are communicating with specific servers.

The following figure shows an example of selected server access.

dac693e4-2911-4c21-8991-741d66135e2a

The DirectAccess client and selected servers by default perform IPsec peer authentication using computer credentials and protect the traffic with Encapsulating Security Payload (ESP)-NULL for data integrity.

You can also use selected server access to require end-to-end IPsec protection from the DirectAccess client to specified servers and allow access to all other locations on the intranet. Traffic to other intranet application servers is not protected with IPsec peer authentication and data integrity. The intranet tunnel between the DirectAccess client and server provides encryption for both types of intranet traffic across the Internet.

noteNote
To demonstrate selected server access, configure the DirectAccess test lab (http://go.microsoft.com/fwlink/?Linkid=150613) with the Selected Server Access extension (http://go.microsoft.com/fwlink/?LinkId=192278).

Authentication with null encapsulation is a new feature of Windows Firewall with Advanced Security for Windows 7 and Windows Server 2008 R2. Some intranets contain hardware that cannot parse or forward IPsec-protected traffic. With authentication with null encapsulation enabled, IPsec peers perform normal IPsec peer authentication and include IPsec data integrity on the first packet exchanged. Subsequent packets are sent as clear text with no IPsec protection. This feature allows you to use IPsec for peer authentication in environments that do not support IPsec-protected traffic flows. You can enable authentication with null encapsulation for DirectAccess when using selected server access.

noteNote
Authentication with null encapsulation is not the same as using ESP-NULL for per-packet data integrity.

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft