Export (0) Print
Expand All

Checklist: Implementing a DirectAccess Design for End-to-End Access

Published: October 7, 2009

Updated: October 7, 2009

Applies To: Windows Server 2008 R2

ImportantImportant
This topic describes deployment of DirectAccess in Windows Server 2008 R2. For deployment of DirectAccess in Microsoft Forefront Unified Access Gateway (UAG), see the Forefront UAG DirectAccess Deployment Guide (http://go.microsoft.com/fwlink/?LinkId=179989).

This checklist includes cross-reference links to important concepts about deploying DirectAccess in the end-to-end access model. It also contains links to procedures and other checklists that will help you complete the tasks that are required to implement this design.

noteNote
Complete the tasks in this checklist in order. When a reference link takes you to a conceptual topic, a procedure, or to another checklist, return to this topic so that you can proceed with the remaining tasks in this checklist.

Checklist Checklist: Implementing a DirectAccess design for end-to-end access

 

  Task Reference
Checkbox

Review important concepts and the example for the DirectAccess end-to-end access model.

Conceptual topic End-to-End Access

Conceptual topic End-to-end Access Example

Checkbox

Configure the required infrastructure for DirectAccess.

Checklist topic Checklist: Preparing Your Infrastructure for DirectAccess

Checkbox

Prepare the DirectAccess server computer for the DirectAccess Setup Wizard.

Checklist topic Checklist: Preparing Your DirectAccess Server

Checkbox

Install the DirectAccess feature on the DirectAccess server.

Checklist topic Install the DirectAccess Feature

Checkbox

Configure the DirectAccess server for the end-to-end access method with the DirectAccess Setup Wizard.

Checklist topic Configure the DirectAccess Setup Wizard for End-to-End Access

Checkbox

Customize the connection security policies created by the DirectAccess Setup Wizard for end-to-end access.

Checklist topic Configure Connection Security Rules for End-to-end Access

Checkbox

Configure the Corporate Website Probe URL Group Policy setting.

Conceptual topic Design Your Intranet for Corporate Connectivity Detection

Checklist topic Configure Corporate Connectivity Detection Settings

Checkbox

If needed by your design plan, configure force tunneling.

Checklist topic Configure Force Tunneling for DirectAccess Clients

Checkbox

If needed by your design plan, configure a connection or routing to the Internet Protocol version 6 (IPv6) Internet.

Checklist topic Connect to the IPv6 Internet

Checkbox

If needed by your design plan, configure client authentication and certificate mapping for Internet Protocol over Secure Hypertext Transfer Protocol (IP-HTTPS) connections.

Checklist topic Configure Client Authentication and Certificate Mapping for IP-HTTPS Connections

Checkbox

If needed by your design plan, configure connection security rules to protect traffic sent between DirectAccess clients.

Checklist topic Configure Connection Security Rules for Traffic Between DirectAccess Clients

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft