Information Technology Reference
In-Depth Information
Add servers to the list for end-to-end authentication by adding the security group con-
taining the servers to the list. You can restrict access to application servers to only the servers
in the list by selecting Allow Access Only To Servers Included In The Security Groups. It does
not restrict access to infrastructure servers used for DirectAccess, such as DNS servers and
domain controllers.
You can also specify that the end-to-end scenario is for authentication only, but that
encryption stops at the DirectAccess server. This less-secure option is available only for
application servers running Windows Server 2008 R2 or later operating systems.
When you configure the Application Server settings, click Finish and then Finish again on
the Remote Access Setup page to complete the configuration changes. The Remote Access
Review page shown in Figure 3-64 opens. This page lists the GPO settings, Remote Clients
settings, Remote Access Server settings, Infrastructure Server settings, and Application Server
settings. You can save all these settings to a file by clicking the Save To A File link.
FIGURE 3-64 The Remote Access Review page
When you click Apply, the wizard will attempt to make the changes shown in the Remote
Access Review page. If the wizard experiences a problem, it will identify it and then either roll
back or issue a warning, as shown in Figure 3-65.
 
Search WWH ::




Custom Search