Add DirectAccess to an Existing Remote Access (VPN) Deployment

Microsoft highly recommends that you use Always On VPN instead of DirectAccess for new deployments. For more information, see Always on VPN.

Scenario description

In this scenario, a single computer running Windows Server 2016, Windows Server 2012 R2 or Windows Server 2012 is configured as a DirectAccess server with recommended settings after you have already installed and configured VPN. If you want to configure DirectAccess with enterprise features, such as a load-balanced cluster, multisite deployment, or two-factor client authentication, complete the scenario described in this topic to set up a single server, and then set up the enterprise scenario as described in Deploy Remote Access in an enterprise.

In this scenario

To set up a single Remote Access server, a number of planning and deployment steps are required.

Planning steps

Planning is divided into two phases:

  1. Plan the Remote Access infrastructure In this phase, you describe the planning that is required to set up the network infrastructure before you begin the Remote Access deployment. It includes planning for the network and server topology, certificates, Domain Name System (DNS), Active Directory and Group Policy Object (GPO) configuration, and the DirectAccess network location server.
  2. Plan the Remote Access deployment In this phase, you describe the planning steps that are required to prepare for the Remote Access deployment. It includes planning for Remote Access client computers, server and client authentication requirements, and infrastructure servers.

Deployment steps

Deployment is divided into three phases:

  1. Configure the Remote Access infrastructure In this phase, you configure the network and routing, firewall settings (if required), certificates, DNS servers, Active Directory and GPO settings, and the DirectAccess network location server.
  2. Configure Remote Access server settings In this phase, you configure the Remote Access client computers, the Remote Access server, and the infrastructure servers.
  3. Verify the deployment In this phase, you verify that the deployment is working as required.

Practical applications

Deploying a single Remote Access server provides the following:

Roles and features required for this scenario

The following table lists the roles and features that are required for this scenario:

Role/feature How it supports this scenario
Remote Access role The role is installed and uninstalled by using the Server Manager console or Windows PowerShell. This role encompasses DirectAccess, which was previously a feature in Windows Server 2008 R2, and Routing and Remote Access Services, which was previously a role service under the Network Policy and Access Services (NPAS) server role. The Remote Access role consists of two components:

1. DirectAccess and Routing and Remote Access Services (RRAS) VPN: Managed in the Remote Access Management console.
2. RRAS Routing: Managed in the Routing and Remote Access console.

The Remote Access Server role is dependent on the following server features:

- By default on a Remote Access server when the Remote Access role is installed. Supports the Remote Management console user interface and the Windows PowerShell cmdlets.
- Optionally installed on a server not running the Remote Access server role. In this case, it is used for remote management of a Remote Access computer running DirectAccess and VPN.

The Remote Access Management Tools feature consists of the following:

- Remote Access GUI
- Remote Access module for Windows PowerShell

Hardware requirements

Hardware requirements for this scenario include the following:

Server requirements

Client requirements

Note Only the following operating systems can be used as DirectAccess clients: Windows Server 2012, Windows Server 2008 R2, Windows 8 Enterprise, Windows 7 Enterprise, and Windows 7 Ultimate.

Infrastructure and management server requirements

Software requirements

Software requirements for this scenario include the following:

Server requirements

Remote access client requirements

Note We recommend that you create a security group for each domain that contains computers that will be configured as DirectAccess clients.