SecureAccess E Series Appliance Deployment Guide
Installation of E6600 Appliance
The guide provides a system administrator with concise instructions for a base deployment. The document covers common installation requirements and is not intended to be comprehensive. Every network environment is different, and installation for an individual organization may require either additional or other configuration not discussed herein.
Notes
Celestix E Series Appliance administrators should have the following skills, knowledge, and consequent access privileges:
- Server room management
- Server administration
- Networking technology
Caution:
To reduce the risk of personal injury or equipment damage, be sure that the rack is adequately stabilized before extending a component from the rack.
Rack the E6600 Appliance
Celestix appliances are 1U and should be attached to a standard 19-inch equipment rack as follows.
- Power down the appliance.
- Disconnect all peripheral cables from the appliance.
- Disconnect each power cord from the appliance.
- In a server that uses thumbscrew rack ears, loosen the captive thumbscrews that secure the server faceplate to the front of the rack, and then slide the server out of the rack.
- In a server that uses quick-release latch rack ears:
- Open the latches on both sides of the server.
- If necessary, use a T-25 Torx screwdriver to loosen the shipping screws. The diagram below provides a reference.
Connect the Appliance to the Network
Once the appliance is racked, it must be connected to the network.
If an IP address will be assigned through DHCP, and then configure for a static address is covered in the setup wizard interfaces instructions. If DHCP is not deployed, you have to configure the IP address manually to add the IP address to the network adapter.
To connect the appliance
- Connect an Ethernet cable from the Primary Port (LAN1) network adapter on the Celestix appliance to the internal network hub or switch.
- For additional network connections, use the Secondary Port (LAN2) or 4 Network ports adapter (LAN3 – 6) on the appliance.
The diagram below provides a reference.
Note: Hardware models vary and may look somewhat different from the example, but network connections will be similar.
Network Interface LED indicators
When the appliance is powered on, each of the network adapters displays a pair of lights to help identify connection speed and usage.
1 NIC link LED Green = Network link
Off = No network link
2 NIC activity LED Solid green = Link to network
Flashing green = Network active
Off = No network activity
Front Panel
LED | Status | |
1 | NIC status LED [1] | Solid green = Link to network Flashing green (1 flash per second) = Network active Off = No network activity |
2 | Health LED [1] | Solid green = Normal Flashing green (1 flash per second) = iLO is rebooting Flashing amber = System degraded Flashing red (1 flash per second) = System critical [2] |
UID button/LED [1] | Solid blue = Activated Flashing blue: • 1 flash per second = Remote management or firmware upgrade in progress • 4 flashes per second = iLO manual reboot sequence initiated • 8 flashes per second = iLO manual reboot sequence in progress Off = Deactivated | |
Power On/Standby button and system power LED | Solid green = System on Flashing green (1 flash per second) = Performing power on sequence Solid amber = System in standby Off = No power present [3] |
- When all four LEDs described in this table flash simultaneously, a power fault has occurred.
- If the health LED indicates a degraded or critical state, review the system IML or use iLO to review the system health status.
- Facility power is not present, the power cord is not attached, no power supplies are installed, power supply failure has occurred, or the front I/O cable is disconnected.
Power the Appliance
To connect power
- Connect the included power cable from a power source, typically a UPS, to the power inlet on the rear panel.
- Power on and boot the appliance by pressing the On/Off button on the front panel as shown below.
Log in to the Web UI
Accessing the web UI is necessary to continue to deploy and manage the appliance. The IP address for the internal network adapter (Primary Port) is used to access the web UI.
Note: If the LAN IP address was assigned through DHCP, login to the appliance using a KVM or Monitor and Keyboard. Login to the windows using the default username and password. Check the IP assigned to the appliance.
To log in
- Open the web UI in a browser:
- From a client computer on the network, default access to the appliance web UI is through a web browser at https://ServerName|IP address:8098.
For example, if the server LAN IP address is 192.168.30.4, the web UI URL would be https://192.168.30.4:8098
- From an RDP/KVM session on the server, access the web UI at: https://localhost:8098
- From a client computer on the network, default access to the appliance web UI is through a web browser at https://ServerName|IP address:8098.
- Enter local administrator credentials when prompted.
The factory default local administrator credentials are:
User name: administrator
Password: [Celest1x]
The password is case-sensitive and the brackets are included. The “domain\administrator” user name format may be required.
Important: A certificate warning may display because the site uses a self-signed certificate. Accept the certificate to access the web UI.
Configuration
After the appliance has been installed on the network, settings need to be configured. General setup uses a wizard to step through configuration in the web UI. Instructions cover the steps common to most deployments, but again, an individual organization may require different or additional configuration.
For setup, the administrator needs access to the following resources:
- The external firewall (see Firewall Ports Reference)
- The E Series appliance web UI
The section General Information provides necessary details to complete configuration.
General Information
The following topics cover requirements, assumptions, and terminology used in the Celestix Edge E Series Appliance Installation Guide.
Terminology Disambiguation
The following list explains how terms to describe components are used in documentation.
- On-premises domains are sometimes referred to as AD domains, but documentation uses the term internal domain.
- Off-premises domains are sometimes qualified by the terms external or public, but documentation uses the term federated domain.
- Servers configured with the role Active Directory Domain Services may be referred to as the domain controller (DC) or designated by the acronym AD DS. The acronym AD is used as a general referent for the internal domain directory.
- Unified Remote Access refers to the collection of technologies that Microsoft offers to allow external clients to access internal network resources. Documentation uses the short name Remote Access. The E Series includes the Remote Access features Direct Access, VPN, and Web Application Proxy.
- The terms roles, services, and features are used to refer to Server 2012 R2 functionality for remote connectivity.
- Remote Desktop Services (desktop virtualization) refers to the collection of technologies that Microsoft offers to allow organizations to publish cloud resources. The E Series can be used for the Remote Desktop Gateway (RD Gateway) and Remote Desktop Web Access (RD Web Access) desktop virtualization server roles.
- Network Policy Server (NPS) is the Microsoft implementation of RADIUS authentication.
- Remote Access:
- DirectAccess – computer account security groups (security groups) can be created in AD to manage client access efficiently by using group policy objects (GPOs).
- WAP – A federation service namespace is sometimes referred to as the ADFS or authentication namespace, but documentation generally uses the shortened term federation namespace. It is used as the Service Principle Name (Service Name) for ADFS. The federation namespace is based on the FQDN that represents the SSL certificate Subject (or Common Name).
- Work Folders:
- A Sync share is a collection of user folders that use the same policy settings.
- A Sync server has the Work Folders role installed. It can contain multiple sync shares.
- User account security groups (security groups) should be created in AD to manage folder access efficiently by using group policy objects (GPOs).
Deployment Assumptions
Information presented in the E Series setup instructions is based on the following:
- Active Directory (AD) is used as the domain controller.
- Remote connectivitysystem administrators are familiar with:
- Windows Server management
- Microsoft Active Directory®
- Microsoft Unified Remote Access
- Network Policy Server*
- Work Folders*
- Remote Desktop Web Access*
*As required for deployment.
Requirement Checklist
The following items will be required to set up the E Series. Plan ahead so that items are available when needed to complete configuration.
- Domain administrator credentials
- PowerShell remoting is enabled
Example Information
To help make the instructions clear, these examples are used to identify components.
Celestix Edge Appliance | |
FQDN | Celestix Edge01.example.com |
Host Name | Celestix Edge01 |
Domain Name | example.com |
Use the Setup Wizard
While working through the wizard, the appliance may need to reboot.
Wizard Instructions
- Administrator Password– the default local administrator password should be changed as a security precaution because it is public knowledge. However, once the appliance has been joined to the internal domain, domain administrator credentials must be used to access features.
- User name – the Administrator Password feature only changes the local administrator password, which must be the logged in account.
- Password – enter and confirm a new password. Complexity requirements are noted on the screen.
- Date and Time – use onscreen controls to enter the date, time, and time zone, then configure for daylight savings if necessary.
- Network Interfaces – if DHCP was used initially to assign an IP address, select the LAN network adapter to set a static address. A static address includes these settings:
- Internet Protocol (IP) address
- Subnet mask
- Gateway address
- Automatic or preferred DNS server
- Hostname and Domain
Note: Fields will be autopopulated with available settings if the appliance was joined to the domain previously; the reboot will be skipped if they are left unchanged.
- Hostname– specify a name for the appliance; it must be unique.
For example: Celestix E - Domain– enter the name for the internal domain the appliance will join.
For example: example.com. - Username– enter an account with domain administrator access to AD (domain\username).
For example: example\adminuser - Password– provide the account password.
- Hostname– specify a name for the appliance; it must be unique.
- Reboot
- Click Nextto apply changes and reboot the appliance.Note: Domain administrator credentials (example: example\adminuser) will be required to access the web UI after the reboot.
- Alerts Email– optional; general appliance notifications can be sent to designated recipients through a connection to a network SMTP server.
- Select Enable alert email.
- Complete the following:
- Alert Message settings
- To – indicate one or multiple recipients. For multiple addresses, use a comma to separate addresses.
- From – enter an address that recipients will recognize.
- Select check boxes for the alert levels that will generate email.
- Send error alert email– includes alert types where the level is set to Error.
- Send warning alert email– includes alert types where the level is set to Warning.
- Send informational alert email– includes types where the level is set to Information.
- SMTP server settings
- Name – indicate the network SMTP server name or IP address.
- Port – enter the number used for SMTP communication.
- Use SSL/TLS – select to require encryption.
- SMTP settings – select and provide credentials with permission to access the SMTP server.
- Send Test Message – create a test email using the settings entered above.Note: The alert email function will indicate whether a test email was sent. If the test email is not received after the alert email feature indicates that one was sent, the error is most likely due to SMTP server settings. An error will occur if the SMTP service is not running or if the appliance is not correctly configured to see the SMTP server. Confirm the SMTP server and network settings before trying to test again.
- Alert Message settings
- Click Save to add configuration.
The wizard is complete when the congratulations screen displays.
Install Features
Once general setup and configuration are complete theFeatures configuration tool installs the roles and services necessary for Celestix E Series Appliance remote connectivity. Depending on the purpose for deployment, one or more roles can be installed. Instructions cover the steps common to most deployments, but again, an individual organization may require different or additional configuration.
The following features are available:
- Network Policy Server – basic RADIUS authentication or RADIUS proxy; can also serve as a NAP policy server.
- Remote Access with VPN – configuration for DirectAccess with an option for VPN. DirectAccess provides always-on remote connectivity and management for Internet-connected Windows 7 and 8 computers. VPN provides access for non-managed devices.
- Web Application Proxy – external access by authenticated users to published applications.
- Remote Desktop Gateway – RDS desktop virtualization component; firewall friendly external access to internal network remote desktop servers.
- Remote Desktop Web Access – RDS desktop virtualization component; access to RemoteApp in Windows 7, or to Desktop Connection through a web browser. RD Web Access can also include remote access to internal computers through a browser.
- Work Folders – a server sync share that hosts work files for anywhere access from supported devices (BYOD functionality).
To install a feature
- Navigate to Celestix E | Features.
- Click the toggle button to On for a feature.
- Click Apply to confirm.
- The feature’s status indicator will rotate while the system processes the request.
- A confirmation will display when the process is complete.
- Click the restart system link if prompted.
See the topic Feature Details for more information about feature options.
Manage Features
Once installed, some of the features include links that launch RDP applications to management consoles (MMCs). These links serve two purposes:
- Some features require an additional configuration that can only be accomplished through the MMC.
- The links provide convenient access to advanced management functions.
Some features do not do not contain an RDP link, usually because no additional configuration is required.
To access management tools
- Navigate to Celestix E | Features.
- Click a feature name with a link in the list.
For example, Network Policy Server:
A RemoteApp will download: confirm if necessary. - Launch the app.
- Enter administrator credentials for the appliance when prompted.
Important: When the E Series is joined to an AD domain, a valid domain administrator account is required for logon.
Notes:- If prompted, allow the connection.
- If a self-signed certificate is used, accept the certificate when prompted.
- Once launched the app opens as a Remote Desktop Connection.
- Use the MMC to configure settings as needed.
- When done, navigate to File | Exitin the remote desktop window to close and return to the DirectAccess screen in the web UI. Closing the application logs off the RDP session to the appliance and is recommended to release management resources.
Note: If the File menu is not visible, use the quick close button (boxed x).
Feature Details
The following sections provides details about remote connectivity features.
The Need to Knows section in the feature descriptions below cover important details about configuration. They are organized as follows:
- Installs – lists roles and features that will be installed.
- Affected Appliance Features – notes any conditions that may affect other features available on the appliance.
- Required Configuration After Installation – notes any configuration that will be necessary once the feature is installed.
Network Policy Server (NPS)
NPS provides basic RADIUS authentication, authorization, and accounting, or RADIUS proxy (connection request referral).
Need to Knows
The following summary information is provided for reference.
Installs
- Role Service: Network Policy Server
- Feature: RSAT – Network Policy and Access Service Tools
Affected Appliance Features
- NPS is required for Remote Desktop Gateway (RD Gateway). If RD Gateway is deployed, the NPS role is installed automatically as part of that feature setup.
Required Configuration After Installation
Configuration must be customized for an environment. Use the Network Policy Server link to open an RDP session in the browser to access RADIUS server/client configuration.
Remote Access with VPN
Remote Access with VPN configures DirectAccess (DA) on the E Series appliance. DirectAccess provides an automated, always-on secure connection for end user access to internal network resources in addition to manage-out functionality for remote domain-joined computers. Remote Access includes the option to enable a VPN that can be used for nonmanaged devices.
Need to Knows
The following summary information is provided for reference.
Install
- Role Service: DirectAccess and VPN (RAS)
- Feature: RSAT – Remote Access Management Tools (GUI and Command-Line Tools, module for Windows PowerShell)
- Feature: Group Policy Management
- Feature: RAS Connection Manager Administration Kit (CMAK)
Affected Appliance Features
- Deployments with non-managed remote devices will require the VPN option to be enabled.
- Cannot be co-located with Web Application Proxy
Required Configuration After Installation
Configuration must be customized for an environment; there are two options:
- Click the Wizard button to open the Remote Access configuration tool.
- Click the Remote Access with VPN link to open the Remote Access console as an RDP application.
Web Application Proxy
Web Application Proxy publishes access to internal web applications for external users. The E Series adds a portal to make accessing applications more convenient. It also leverages authentication, authorization, and SSO functionality. It is configured for deployments where ADFS runs on a separate server.
Notes:
- Web Application Proxy cannot be colocated with the following roles:
- ADFS – Web Application Proxy requires ADFS, but cannot be installed on the same server.
- DirectAccess
- The E Series only supports forms-based authentication.
Need to Knows
The following summary information is provided for reference.
Installs
- Role Service: Web Application Proxy
- Feature: RSAT – Remote Access Management Tools (GUI and Command-Line Tools, module for Windows PowerShell)
Affected Appliance Features
- Web Application Proxy requires the Remote Access role to be installed.
- Web Application Proxy is deployed when ADFS is intended to reside on a separate server from the E Series; information for that server will be used in Web Application Proxy configuration.
Required Configuration After Installation
Configuration must be customized for an environment; there are two options:
- Click the Wizard button to open the Web Application Proxyconfiguration tool.
- Click the Web Application Proxy link to open the Remote Access console as an RDP application.
Remote Desktop Gateway
Remote Desktop Gateway (RD Gateway) provides access to internal resources for remote users. Access is through the Remote Desktop Connect (RDC) client, and avoids the need for a VPN. User connections are encrypted and authorization policies set standards for client access.
Important: RD Gateway requires NPS.
Need to Knows
Installs
- Role Services: Network Policy Server, Remote Desktop Gateway, RPC over HTTP Proxy
- Features: RSAT – Network Policy and Access Service Tools, Remote Desktop Services Tools/Remote Desktop Gateway Tools
Affected Appliance Features
- RD Gateway requires NPS, which will be installed at the same time unless NPS is already installed, in which case the installation process proceeds just for RD Gateway.
Required Configuration After Installation
Configuration must be customized for an environment. Use the Remote Desktop Gateway link to open an RDP session to the Remote Desktop Gateway Manager Console in the browser.
Note: Firewall rules may need to be adjusted to allow traffic.
Remote Desktop Web Access
RD Web Access (RD Web Access) provides streaming access to hosted applications. Windows 7 uses RemoteApp to start an RD Services session. Other devices can use a web browser to access them through Desktop Connection. RD Web Access also uses the RD Web Connection feature to let users access computers that have Remote Desktop enabled.
Need to Knows
The following summary information is provided for reference.
Installs
- Role Service: RD Web Access
Affected Appliance Features
- None
Required Configuration After Installation
Rules for the external firewall must be adjusted to allow WMI traffic. See the topic Firewall Ports Reference for additional information about firewall configuration.
Work Folders
Work Folders uses an internal file server to host work files for anywhere access from supported computers and devices. Data is synced across devices over an Internet connection. This supports a bring your own device (BYOD) program without sacrificing control over data. Once synced, files can be worked on from wherever and will be updated on the sync share when the device has Internet connectivity.
Important: Work Folders is supported for Windows 8.1/8.1 RT devices.
Work Folders provides options to:
- Use a folder that already contains user data so Work Folders can be employed without migrating servers and data, or affecting existing share options (for example, Folder Redirection, Offline Files, and home folders).
- Add policies for encryption and lock-screen passwords.
Need to Knows
The following summary information is provided for reference.
Installs
- Role Services: File Server, File Server Resource Manager, Work Folders
- Feature: RSAT – File Server Resource Manager Tools
Affected Appliance Features
- None
Required Configuration After Installation
Configuration must be customized for an environment:
- Click the Wizard button to run the Work Folders configuration tool.
- Next, use the Remote Desktop management console (System | Remote Desktop) to open an RDP session from the local computer to the E Series appliance.
- In Windows Server, open the Server Manager.
- Navigate to File and Storage Services | Work Folders.
- Click the link to create a sync share to open the Windows configuration wizard.
Configure Remote Access
The wizard provides the steps to configure DirectAccess and VPN settings for the Celestix E Series Appliance. Instructions cover the steps common to most deployments, but again, an individual organization may require different or additional configuration.
For setup, the administrator needs access to the following resources:
- The external firewall (see Firewall Ports Reference)
- The E Series appliance web UI
General Information provides necessary details to complete configuration. The topic Additional Configuration Notes provides details about conditional configuration that applies to some deployments.
General Information
The following deployment notes provide information that qualifies setup processes to understand Remote Access configuration.
Deployment Assumptions
Information presented in the E Series setup instructions is based on the following:
- The Remote Access with VPN feature has been installed through the web UI.
- Deployment is a single server.
- Network planning for appliance placement is complete.
- Necessary certificates have been acquired for:
- IPsec
- IP-HTTPS
- NLS
- Certificates have not been previously imported to the certificate store.
- Firewall rules have been configured to allow traffic if the DirectAccess server is on an IPv4 network:
- Teredo
- 6to4
- IP-HTTPS
- If the appliance only has one configured network adapter, TCP port 62000 must be opened on the appliance.
Additional firewall configuration details are discussed in the topic Firewall Ports Reference.
- If using a security group to manage access for clients, the group has been created in AD prior to running the setup up wizard.
- If customized GPOs will manage settings for clients and servers, they have been created prior to running the setup wizard.
- AD will be used for DirectAccess authentication and authorization.
- DNS needs to resolve to either the public host name of the DirectAccess entry point, or the NAT device for the DirectAccess server.
Requirement Checklist
The following items will be required to set up Remote Access. Plan ahead so that items are available when needed to complete configuration.
- Domain controller – DirectAccess requires Windows Server 2003 or higher.
- IP address – one or two address have been reserved.
- Public address – usually an FQDN that clients will use to connect to the network.
- DirectAccess clients – must be Windows clients that are domain joined. Supported options:
- 8 Enterprise and higher
- 7 (Ultimate, Enterprise)
- SSL certificate – an IPsec root certificate is required for Windows 7 DirectAccess client connections, and is a best practice for Windows 8.
- Email account – an account will be required to receive diagnostic reports for client access trouble shooting.
Additional Configuration Notes
The notes below discuss options that may apply to some deployments. They exceed the scope of these instructions, but may be helpful to consider when planning.
- DirectAccess
- Network Location Server – the wizard will configure a default NLS on the appliance if an external server is not designated.
- Group Policy Objects – the wizard will create the two required GPOs with default settings unless customized group policies are available to assign.
- Security group – an AD security group is required to apply customized group polices to client computers. All remote computers in the domain can use DirectAccess unless an AD client group is specified to restrict access.
- RADIUS – configuration for an external RADIUS server can be included to add strong authentication methods like one-time passwords (OTPs).
- VPN
- VPN deployments using static IP addresses for clients need a defined range; otherwise, DHCP should be used.
- VPN deployments not using Windows authentication need settings for a RADIUS server.
Example Information
To help make the instructions clear, the following examples are used to identify components.
Internal Domain | Celestix E Series Appliance | Public Domain | |
FQDN | ad01.intexample.com | Celestix Edge01.intexample.com | da.example.com |
Host Name | ad01 | Celestix Edge01 | |
Domain Name | intexample.com | intexample.com |
Use the Setup Wizard
The setup wizard is a walk-through to configure components for Remote Access.
While working through the wizard, the appliance may need to reboot.
Access the screen through the web UI at Celestix E | Features | Remote Access with VPN | Wizard.
Wizard Instructions
Component Selection– select a Remote Access configuration option:
- Configure both services DirectAccess and VP – select to add access through both DirectAccess and a VPN.
- Configure DirectAccess services only – select to add access through DirectAccess connections.
- Configure VPN services only – select to add access through a VPN connection.
Note: DirectAccess should be enabled for managed clients, while VPN should be enabled to support unmanaged clients.
Configure both services DirectAccess and VPN
- DirectAccess
- Basic– define the appliance location and the URL that clients will use to access resources.
- Select the type of network environment:
- Edge– requires two network adapters; one to the public Internet and one to the internal network.
- Behind an edge device (with two network adapters)– one adapter connects to the perimeter network, and the other connects to the internal network.
- Behind an edge device (with one network adapter)– the adapter connects to the internal network.
- Public address– enter the address that external clients will use to connect to the network.
Note: While using an IP address is supported, the FQDN is a best practice.
For example: da.example.com
- Select the type of network environment:
- Advanced– define client parameters and assign the appliance network adapter that DirectAccess service will use.
- Installation type – select the DirectAccess functionality to deploy:
- Full DirectAccess installation– bidirectional tunnels for remote client access and management.
- Client management only– configure tunnel for remote client management.
- Client Group– designate an AD security group that will manage devices that connect through DirectAccess; leave blank to include all remote devices.
- Network interfaces – select interfaces for DirectAccess traffic.
- Internal– specify the internal, or LAN, network adapter in the drop menu.
- Internet– optional; if two adapters are used, specify the Internet, or WAN, network adapter in the drop menu.
- IP-HTTPS certificate – if a third-party certificate will be used to bind the Internet network adapter, navigate to and select it. If it needs to be imported first, complete the following:
- Click the Importbutton.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Importbutton.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Installation type – select the DirectAccess functionality to deploy:
- GPO and NLS
- Group Policy Object (GPO) – leave fields blank to configure the default options, otherwise designate predefined AD policy groups that will manage settings for devices and servers.
- Client GPO– specify the name for the AD policy that will manage client access.
- Server GPO– specify the name for the AD policy that will manage access to the DirectAccess server.
- Network Location Server – the NLS server will be installed on the appliance unless an external server is designated.
- NLS Certificate– if an SSL certificate will be used, navigate to and select it. If it needs to be imported first, complete the following:
- Click the Import button.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- NLS URL– if an external NLS server is deployed, enter the HTTPS URL.
- NLS Certificate– if an SSL certificate will be used, navigate to and select it. If it needs to be imported first, complete the following:
- Group Policy Object (GPO) – leave fields blank to configure the default options, otherwise designate predefined AD policy groups that will manage settings for devices and servers.
- Client Settings
- Connection Name– create a name for the network connection that end users will recognize.
- Support Email– enter the email account that will receive diagnostic reports created by the DirectAccess Diagnostics tool.
- Allow local name resolution– select to allow users to temporarily disconnect the intranet connection and use local DNS servers for Internet traffic.Notes:
- Force tunneling must be disabled to employ this feature.
- The infrastructure connection remains active, so manage out capabilities are not affected.
- Enable for mobile computers only– allow only mobile computers in the specified security groups to connect through DirectAccess.Important: Remote Access will create a WMI filter that will only allow mobile computers to join DirectAccess security groups. This setting requires that the administrator account configured for Remote Access have create/modify privileges.
- Enable Windows 7 Client Support– select for environments that require support for Windows 7 clients.
- IPsec Root Certificate– conditional; designate a certificate to validate authentication for client connections; required for Windows 7 users, and recommended for Windows 8. See the following:
- If GPOs are used to push security certificates to domain servers, use the Certificate drop menu to select the certificate issued from the domain root CA.
- If the certificate needs to be added manually, use the import feature:
- Click the Import button.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Click the Import button.
- Intermediate CA– select if the certificate was not imported from the domain root CA.Click Next.
- Basic– define the appliance location and the URL that clients will use to access resources.
- VPN
- Address Assignment
- Assign addresses automatically– use DHCP to assign client addresses.
- Assign addresses from a static address pool– enter a range of IP addresses that RRAS will assign to clients when they connect to the network.Enter the start and end IP addresses to define the range.
- Authentication
- Use Windows Authentication– use AD to authenticate users.
- Use RADIUS Authentication– configure VPN connections to use RADIUS authentication.
- Radius Server– designate the server name or IP address.
- Shared Secret– create a secret to authenticate communication between the appliance and RADIUS server.
- Confirm– confirm the shared secret.
- Timeout– the default is usually sufficient, but customize the duration the appliance will try to connect to the RADIUS server as necessary.
- Score– the default is usually sufficient, but customize the initial responsiveness score as necessary.
- Port– the default is UPD 1812 for authentication. Legacy RADIUS servers may use 1646.
- Always use message authenticator– select if the attribute Request must contain the Message Authenticator attribute has been configured on the RADIUS server.
- Address Assignment
- Finish– review the settings; click Next to configure.
Configure DirectAccess services only
- DirectAccess
- Basic– define the appliance location and the URL that clients will use to access resources.
- Select the type of network environment:
- Edge– requires two network adapters; one to the public Internet and one to the internal network.
- Behind an edge device (with two network adapters)– one adapter connects to the perimeter network, and the other connects to the internal network.
- Behind an edge device (with one network adapter)– the adapter connects to the internal network.
- Public address– enter the address that external clients will use to connect to the network.Note: While using an IP address is supported, the FQDN is a best practice. For example: da.example.com
- Select the type of network environment:
- Advanced– define client parameters and assign the appliance network adapter that DirectAccess service will use.
- Installation type – select the DirectAccess functionality to deploy:
- Full DirectAccess installation– bidirectional tunnels for remote client access and management.
- Client management only– configure tunnel for remote client management.
- Client Group– designate an AD security group that will manage devices that connect through DirectAccess; leave blank to include all remote devices.
- Network Interfaces – select interfaces for DirectAccess traffic.
- Internal– specify the internal, or LAN, network adapter in the drop menu.
- Internet– optional; if two adapters are used, specify the Internet, or WAN, network adapter in the drop menu.
- IP-HTTPS certificate – if a third-party certificate will be used to bind the Internet network adapter, navigate to and select it. If it needs to be imported first, complete the following:
- Click the Import button.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Installation type – select the DirectAccess functionality to deploy:
- GPO and NLS
- Group Policy Object (GPO) – leave fields blank to configure the default options, otherwise designate predefined AD policy groups that will manage settings for devices and servers.
- Client GPO– specify the name for the AD policy that will manage client access.
- Server GPO– specify the name for the AD policy that will manage access to the DirectAccess server.
- Network Location Server – the NLS server will be installed on the appliance unless an external server is designated.
- NLS Certificate– if an SSL certificate will be used, navigate to and select it. If it needs to be imported first, complete the following:
- Click the Import button.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- NLS URL– if an external NLS server is deployed, enter the HTTPS URL.
- NLS Certificate– if an SSL certificate will be used, navigate to and select it. If it needs to be imported first, complete the following:
- Group Policy Object (GPO) – leave fields blank to configure the default options, otherwise designate predefined AD policy groups that will manage settings for devices and servers.
- Client Settings
- Connection Name– create a name for the network connection that end users will recognize.
- Support Email– enter the email account that will receive diagnostic reports created by the DirectAccess Diagnostics tool.
- Allow local name resolution– select to allow users to temporarily disconnect the intranet connection and use local DNS servers for Internet traffic.
Notes:- Force tunneling must be disabled to employ this feature.
- The infrastructure connection remains active, so manage out capabilities are not affected.
- Enable for mobile computers only– allow only mobile computers in the specified security groups to connect through DirectAccess.Important: Remote Access will create a WMI filter that will only allow mobile computers to join DirectAccess security groups. This setting requires that the administrator account configured for Remote Access have create/modify privileges.
- Enable Windows 7 Client Support– select for environments that require support for Windows 7 clients.
- IPsec Root Certificate– conditional; designate a certificate to validate authentication for client connections; required for Windows 7 users, and recommended for Windows 8. See the following:
- If GPOs are used to push security certificates to domain servers, use the Certificate drop menu to select the certificate issued from the domain root CA.
- If the certificate needs to be added manually, use the import feature:
- Click the Import button.
- Certificate Import– navigate to and select the certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Click the Import button.
- Intermediate CA– select if the certificate was not imported from the domain root CA.
- Click Next.
- Basic– define the appliance location and the URL that clients will use to access resources.
- Finish – review the settings; click Next to configure.
Configure VPN services only
- VPN
- Address Assignment
- Assign addresses automatically– use DHCP to assign client addresses.
- Assign addresses from a static address pool– enter a range of IP addresses that RRAS will assign to clients when they connect to the network.
Enter the start and end IP addresses to define the range. - Authentication
- Use Windows Authentication– use AD to authenticate users.
- Use RADIUS Authentication– configure VPN connections to use RADIUS authentication.
- Radius Server– designate the server name or IP address.
- Shared Secret– create a secret to authenticate communication between the appliance and RADIUS server.
- Confirm– confirm the shared secret.
- Timeout– the default is usually sufficient, but the duration the appliance will try to connect to the RADIUS server can be customized as necessary.
- Score– the default is usually sufficient, but the initial responsiveness score can be customized as necessary.
- Port– the default is UPD 1812 for authentication. Legacy RADIUS servers may use 1646.
- Always use the same message authenticator– select if the attribute Request must contain the Message Authenticator attribute has been configured on the RADIUS server.
- Finish– review the settings; click Next to configure.
- Address Assignment
The wizard is complete when the congratulations screen displays. Depending on the configuration to be completed, this may take some time.
The base level setup for Remote Access options is now complete. Clients can now be configured to access resources.
Configure Web Application Proxy
The wizard provides the steps to configure Web Application Proxy (WAP) settings for the Celestix E Series Appliance. Instructions cover the steps common to most deployments, but again, an individual organization may require different or additional configuration.
For setup, the administrator needs access to the following resources:
- The external firewall (see Firewall Ports Reference)
- The E Series appliance web UI
- Deployments that include the SSO Portal will require additional DNS records and firewall rules
General Information provides necessary details to complete configuration.
General Information
The following deployment notes provide information to understand Web Application Proxy configuration.
Deployment Assumptions
Information presented in the E Series setup instructions is based on the following:
- The Web Application Proxy feature has been installed through the web UI.
- Deployment is a single proxy server.
- AD will be used for authentication and authorization through ADFS.
- Internal DNS entries have been configured for Web Application Proxy to resolve hostnames for backend servers.
- Public DNS entries have been configured to resolve external URLs for each published application.
- Firewall rules have been configured to allow traffic for the following connectivity:
- To ADFS through port 443
- To AD
- To published applications as required
Requirement Checklist
The following items will be required to set up the proxy. Plan ahead so that items are available when needed.
- ADFS – must be deployed on a separate server.
- ADFS administrator account – required to access ADFS for authentication.
- Publicly signed certificate– an SSL certificate is required; it is strongly recommended to use a third-party certificate from a trusted vendor. The certificate subject is the same as the federation service namespace.
- SSO portal address – optional configuration; if the portal is deployed, an FQDN will be needed to assign to the SSO portal for end user access to hosted applications.
Example Information
To help make the instructions clear, the following examples are used to identify components.
Internal Domain | Federated Domain | Celestix E Appliance | |
FQDN | ad01.intexample.com | adfs.fedexample.com | Celestix Edge01.intexample.com |
Host Name | ad01 | adfs | Celestix Edge01 |
Domain Name | intexample.com | fedexample.com | intexample.com |
Use the Setup Wizard
The setup wizard is a walk-through to configure components for proxy services.
Access the screen through the web UI at Celestix E | Features | Web Application Proxy | Wizard.
Wizard Instructions
- ADFS Services– complete the following:
- ADFS Service– enter the fully qualified domain name.
Example: adfs.fedexample.com - Username– enter ADFS administrator account.
For example: intexample\adminuser - Password– enter the password for the ADFS account.
- SSO Portal– if WAP will be used to publish applications for remote users, enter the address end users will need to access those applications.
Note: Entering the address creates the portal.
- ADFS Service– enter the fully qualified domain name.
- Certificate
- Click the Import button.
- Complete the following:
- Certificate – navigate to and select the certificate that will be used for authentication.
- Password – enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Click Next.
- Finish – review the settings; click Next to configure.
- The wizard is complete when the congratulations screen displays.
- SSO portal deployment: Click the PowerShell link to download a script that must be run on the ADFS server to set up a relying party trust.
The base level setup for Web Application Proxy is now complete.
Configure Work Folders
The wizard provides the steps to configure Work Folders settings for the Celestix E Series Appliance. Instructions cover the steps common to most deployments, but again, an individual organization may require different or additional configuration.
For setup, the administrator needs access to the following resources:
- The domain controller
- The external firewall (see Firewall Ports Reference)
- The E Series appliance web UI
- Windows Server Manager
General Information provides necessary details to complete configuration.
General Information
The following deployment notes provide information to understand Work Folders configuration.
Deployment Assumptions
Information presented in the E Series setup instructions is based on the following:
- The Work Folders feature has been installed through the web UI.
- Deployment is a single sync server with a single sync share.
- The user security group is created prior to setting up the sync share.
If DNS is configured for Work Folders access, it is completed before using the setup wizard.
Requirement Checklist
The following items will be required to set up the Work Folders service. Plan ahead so that items are available when needed to complete configuration.
- Domain controller – Windows Server 2012 or higher.
- Publicly signed certificate– an SSL certificate is required for Work Folders; it must be a third-party certificate from a trusted vendor. Additional requirements:
- The certificate subject needs to be the same as the Work Folders public URL (format: workfolders.)
- Certificate subject alternative names (SANs) must list the server name for each sync server in use.
Note: A certificate is required for each server hosting the Work Folders feature.
- AD security group – a user group to control access to the sync share.
- Clients – supported options:
- Windows 8.1, 8.1 R, 7 (Professional, Ultimate, Enterprise)
- iPad with iOS 8.1 or later
Additional Configuration Notes
The notes below discuss options that can extended Work Folders functionality. They exceed the scope of these instructions, but will be helpful to consider when planning deployment.
- DNS configuration is required for the following instances:
- To sync files over the Internet, a public domain name with a DNS Host (A) record is required to allow clients to resolve the Work Folders URL.
- To sync files on an intranet, a DNS alias record is required on the internal network for the Work Folders URL that resolves to the server names of all sync servers on the network.
- ADFS facilitates the following services:
- Device Registration Service for Workplace Join
- RADIUS and multifactor authentication.
- Web Application Proxy allows clients to sync files over the Internet.
Configure Security Group
The best practice is to use security groups to manage Work Folder access. Set up for security groups in AD is described briefly and requires familiarity with AD domain administration.
To Create a User Group
- Create a dedicated Work Folders user group with these settings:
- Scope: Global
- Type: Security
- Add user accounts to the group.
Use Setup Wizard
The setup wizard is a walk-through to assign a certificate to encrypt remote access to work files.
Access the screen through the web UI at Celestix E | Features | Work Folders | Wizard.
Wizard Instructions
Use the following instructions to import the SSL certificate for Work Folders.
- Certificate– import a certificate to encrypt authentication:
- Click the Import button.
- Complete the following:
- Certificate Import– navigate to and select the Work Folders certificate that will be used for authentication.
- Password– enter the certificate passphrase.
- Click the Import button.
- The imported certificate should display in the Certificate field. If not, use the drop menu to select it.
- Click Next.
- Finish – review the settings; click Next to configure.
The wizard is complete when the congratulations screen displays. Next, a sync share directory must be designated on the appliance.
Required Configuration After Setup Wizard: Sync Share
Configuration must be customized for an environment:
- When done, navigate to File | Exitin the remote desktop window to close and return to the Maintenance screen. Closing the application logs off the RDP session to the appliance and is recommended to release management resources.
Note: If the File menu is not visible, use the quick close button.
The base level setup that allows external access to work files is now complete. Supported clients can now be configured to access sync services.
Create a System Image
Creating a system image, or snapshot, will provide an option to help remediate issues that may result from future updates or changes to the saved configuration. The image is created in the recovery system process where the main operating system is not running. Thus the system can be restored to the saved configuration, even if the operating system performance or functionality has been affected.
Important: A system image is intended to complement, not replace, regular backups through the Windows® OS.
The instructions below cover the appliance front panel Last Good Version (LGV) feature, which is accessed through the Jog Dial. LGV is an offline tool and requires that the system be rebooted to access it, but is convenient during setup because it can be run from the IPMI.
Note: The web UI also contains a System Imaging feature (System|System Imaging). It requires the use of a web browser, but can run when the operating system is loaded (online), or after a restart before the appliance boots into the operating system (offline). Online, or real-time images use more disk space than offline imaging, but they don’t interrupt the services the appliance provides.
Last Good Version (LGV)
The LGV instructions below require direct access to the Celestix appliance.
To create an LGV
Notes:
- It may help to read through all of the instructions before starting the procedure.
- Shutdown the appliance.
- Connect a KVM to the appliance.
- After the POST screen, you will see Celestix Boot Loader.
- Select the Celestix Rescue Mode. This menu provides you an option to restore the factory image or restore any existing LGV.
- If you have done this correctly, you will enter the Celestix Rescue Mode, and the System Restore menu should appear on-screen to the connected VGA output.
- FOR SYSTEM RESTORE(Factory reset): Once in the System Restore menu, use the Keyboard to navigate to the caret [“<<” Symbol] to the “System Restore” option.
- FOR LGV: You will also notice an option to “Create/Restore LGV”, which stands for “Last Good Version”. This is where you will later go to create an image backup of your functioning configuration.
- When asked to confirm your choice, press arrow keys to navigate the caret [“<<” Symbol] to “OK” or “YES” and press enter (depending on the hardware platform).
- The appliance will now restore to the Factory state from a complete system image (SYSTEM RESTORE), or a snapshot compressed and stored in a separate partition (LGV).
CRITICAL: The appliance will boot to Windows Server after the Restore is complete; however, DO NOT interact with the appliance in any way until it has completed the full configuration process. The appliance will reboot, on its own, approximately 3 times while it runs scripts to install drivers, system files and any application components. Please DO NOT DISCONNECT ANY NETWORK CABLES.
- Once the appliance restores to factory it will shut down.
The Saving System Image screen will show a progress indicator and an estimated time to completion for the image copy process.
Caution:
- DO NOT ACCESS OR TURN OFF THE APPLIANCE DURING THIS PROCESS.
- The appliance will shut down when the LGV process is complete.
Backup
Celestix recommends running the Windows backup utility (System | Backup) once the configuration is complete to provide a remediation option for issues that may result from future system updates or changes.
Update Software
The Software Update Service allows administrators to keep system software current through hotfixes, service packs, and upgrades. They are necessary for the security and proper functioning of the appliance.
Access the update service through the web UI (System | Software Updates).
To find and install updates
- Navigate to System | Software Updates | Appliance Updates.
- Complete the following:
- – click the Check for Updates button.
- Select an item.
- Install – install selected update.
- Confirm if prompted.
Once applicable updates are installed, Celestix recommends checking for Windows updates (System | Windows Updates).
Thank you for choosing the Celestix E Series Appliance for your remote connectivity solution. This completes the setup and configuration steps for base-level deployment.
Email questions to [email protected]
Firewall Ports Reference
Use the port reference information below to plan for deploying the appliance.
Celestix Technology
The ports in the section below are required for Comet or application functionality.
SecureAccess
- TCP port 443 inbound to connect
- TCP port 8098 inbound and outbound for licensing and to download configuration files
Microsoft Technology
The following reference information is provided here for convenience. It is based on Microsoft® TechNet articles for each of the technologies listed. It. Please see TechNet (https://technet.microsoft.com/) for the most current information.
Last update: 4/14/2016
DirectAccess (behind firewall unless otherwise stated)
Required
TCP port 443 inbound and outbound
Conditional
- Protocol 41 inbound and outbound for 6to4
- UDP port 3544 inbound and outbound for Teredo
- VPN (behind firewall unless otherwise stated)
- TCP port 1723 inbound and outbound for PPTP
- Protocol 47 inbound and outbound for PPTP
- TCP port 443 inbound and outbound for SSTP
- UDP port 500 inbound and outbound for L2TP/IPsec/IKEv2
- UDP port 4500 inbound and outbound for L2TP/IPsec/IKEv2
- Protocol 50 inbound and outbound for L2TP/IPsec/IKEv2
- UDP port 1701 inbound and outbound for L2TP/IPsec/IKEv2 (perimeter deployment)
WAP
- TCP port 443 inbound and outbound
- TCP port 22 inbound and outbound for SSH when SSO Portal is deployed
NPS
- UDP port 1812
- UDP port 1813
- UDP port 1645
- UDP port 1646
RD Gateway
- TCP 5504 for connection RD Connection Broker
- TCP 5985 for WMI and PowerShell Remoting for administration
Remote Desktop Web Access
- TCP 443 inbound for traffic from RD Clients
- UDP 3391 inbound for traffic from RD Clients
- TCP 88 inbound and outbound for Kerberos user authentication
- TCP 135 inbound and outbound for RPC Endpoint Mapper
- TCP|UDP 389 inbound and outbound for LDAP user authentication
- TCP|UDP 53 inbound and outbound for internal resource name resolution, DNS
- TCP|UDP 389 inbound and outbound for LDAP Certificate Revocation List (CRL)
- TCP 80 inbound and outbound for HTTP Certificate Revocation List (CRL)
- TCP 21 inbound and outbound for FTP Certificate Revocation List (CRL)
- TCP 5985 inbound and outbound for WMI and PowerShell Remoting
- TCP|UDP 3389 inbound and outbound for RDP
Work Folders
- TCP port 443 inbound and outbound for folder synching
- TCP port 80 inbound and outbound for folder synching
ADFS
For reference if WAP or the SSO Portal are deployed.
- TCP port 443 inbound
- TCP port 49443 inbound for client TLS authentication using X509 user certificates
- TCP 80 inbound and outbound for Certificate Revocation List (CRL)
Resource Worksheet
It will expedite the process to gather and verify resource information in the Resource Worksheet below before starting appliance installation and setup. An example of the worksheet is provided below with descriptions for the information it includes. A blank copy of the worksheet, which can be printed, is included in the Appendix.
Note: Incorrect network configuration could compromise or impede the appliance.
Table: Worksheet Form Example
Property | Network Information (example) | Explanation |
Computer name | Used in – Configuration : Use the Setup Wizard : Wizard Instructions The appliance must be assigned a computer name. The computer name must be 15 alphanumeric characters or less. | |
Administrator password | [Celest1x] (default; to be changed during setup) | Used in – Configuration : Use the Setup Wizard : Wizard Instructions The administrator account is a member of the local administrator group. The factory default password is case sensitive with brackets included. Important: The default should be changed as it is public knowledge. |
Workgroup or domain name | Used in – Configuration : Use the Setup Wizard : Wizard Instructions : Hostname and Domain Required for appliance setup. Record the name of the Workgroup or Domain that will be joined during setup. | |
LAN information (LAN1) Private or internal network interface | IP address Subnet mask Default gateway Primary/secondary DNS server(s) Static routes: Network address Gateway address | Used in – Configuration : Use the Setup Wizard : Wizard Instructions : Network Interfaces Required for appliance setup. The LAN (private network interface) adapter of the appliance is the interface assigned to internal network traffic. |
WAN information(LAN2) Public or external network interface | IP address Subnet mask Default gateway Primary/secondary DNS server(s) Static routes: Network address Gateway address | May be needed in – Configuration : Use the Setup Wizard : Wizard Instructions : Network Interfaces The WAN (public network interface) adapter of the appliance is the interface assigned to external network traffic. This configures how the WAN, or public interface, connects to the Internet. |
DMZ (LAN 2 +) information Additional network interfaces | Include the IP address/subnet mask for each adapter to be used. | May be needed in – Configuration : Use the Setup Wizard : Wizard Instructions : Network Interfaces The DMZ adapters are optional configuration. This information is only necessary to assign static IP addresses to these adapters. |
Active Directory Domain Services (AD DS)Active Directory server | IP address Hostname User account/password | Used in – Configure Remote Access : Use the Setup Wizard : Wizard Instructions |
ADFS | AD DS FQDN Administrator account | Used in – Configuration : Install Features : Web Application Proxy ADFS is required for Web Application Proxy. |
Network Policy Server | Network Access Server (RADIUS Client) IP Address Shared secret Network policy criteria Authentication protocol options | May be needed in post-configuration for NPS or Remote Desktop Gateway. Setting up RADIUS authentication requires designating the NPS clients that will forward access requests, the criteria that will serve as the policy to grant access, and the protocols that will be used for authentication. |
DirectAcces/VPN | DA server Static IP address(es) Public address for client connections GPOs (if using customized policies) NLS certificate (if using external server) Infrastructure server(s) DA client Public address Subnet mask Default gateway DNS VPN server Client IP address pool (if not using DHCP) RADIUS server information (if not using Windows authentication) | Used in – Configuration : Configure Remote Access : Use the Setup Wizard : Wizard Instructions. The Remote Access/VPN wizard will require server information. The client information will be required to set up remote devices. Note: Infrastructure server information refers to resources not discoverable by Active Directory. |
PKI (if applicable) | IP address | May be needed in post-configuration for DirectAccess. PKI is recommended but no longer required for DirectAccess deployment, with a few exceptions, like OTP authentication. Note: Root certificate required. |
Web Application Proxy | ADFS FQDN SSL certificate | Used in – Configuration : Configure Web Application Proxy : Use the Setup Wizard : Wizard Instructions Note: Root certificate required. |
SSO Portal | Firewall rules for HTTPS and SSH communication Application requirements: URL Certificate Hostname Port File format | The SSO portal is a WAP feature. Rules need to be created in the edge firewall to allow application communication. While each application type is different, the list of application requirements covers common information for publishing a variety of applications. |
Syslog | SIEM: FQDN/IP Port Certificate | The Logging feature, sometimes referred to as syslog, is a security information and event management solution (SIEM) feature. Server information is needed if a SIEM server is deployed on the network. An SSL certificate is required for encrypted remote logging. |
Remote Desktop Gateway | RD Gateway (join domain) IP address Hostname External FQDN AD DS IP address Subnet mask Default gateway DNS RD Session Host (domain joined) IP address Hostname RD Connection Broker (domain joined) IP address Hostname RD Web Access (domain joined) IP Address Hostname Firewall rules | Used in – Configuration : Install Features : Feature Details : Remote Desktop Gateway : Required Configuration After Installation |
Remote Desktop Web Access | RD Web Access Server (domain joined) IP address Hostname AD DS IP address Subnet mask Default gateway DNS RD Session Host (domain joined) IP address Hostname RD Connection Broker (domain joined) IP address Hostname Remote Desktop Virtualization Host server (optional) IP address Hostname Firewall rules | Used in – Configuration : Install Features : Feature Details : Remote Desktop Web Access : Required Configuration After Installation |
Work Folders | Sync share name SSL certificate AD security group for user accounts Sync share DNS entry (recommended) | Used in – Configuration : Configure Work Folders : Use the Setup Wizard : Wizard Instructions |
RADIUS server | IP address Hostname | May be needed to set up Remote Access with VPN or NPS. |
RADIUS clients | IP address Hostname | May be needed to set up Remote Access with VPN or NPS. |
DNS | ADFS FQDN Host/cluster IP | DNS must be updated to resolve the SSO portal FQDN to the WAP IP address. |
Public domain registrar | Credentials | In SSO portal deployments, the portal FQDN should be added as a record to the public DNS host service for the federated domain. |
SMTP server | IP address SMTP gateway name | May be needed in – Configuration : Use the Setup Wizard : Wizard Instructions : Alerts Email Optional configuration; SMTP is required for Alert Email. |
Workplace Join | AD DS FQDN AD DS service account ADFS IP address ADFS FQDN DRS DNS entry | This information would be used to extend functionality needed to set up BYOD access. |
Application server | IP address Hostname | May be needed in post-configuration for: Web Application Proxy Remote Desktop Gateway RD Web Access |
Bold items are required |
Property | Detail | Your Information |
Computer name | ||
Administrator password | [Celest1x] (default; to be changed during setup) | |
Workgroup or domain name | ||
LAN information (LAN1) Private or internal network interface | IP address Subnet mask Default gateway Primary/secondary DNS server(s) Static routes: Network address Gateway address | |
WAN information(LAN2) Public or external network interface | IP address Subnet mask Default gateway Primary/secondary DNS server(s) Static routes: Network address Gateway address | |
DMZ (LAN 2 +) information Additional network interfaces | Include the IP address/subnet mask for each adapter to be used. | |
Active Directory Domain Services (AD DS) | IP address Hostname User account/password | |
ADFS | AD DS FQDN Administrator account | |
Network Policy Server | Network Access Server (RADIUS Client) IP Address Shared secret Network policy criteria Authentication protocol options | |
DirectAcces/VPN | DA server Static IP address(es) Public address for client connections GPOs (if using customized policies) NLS certificate (if using external server) Infrastructure server(s) DA client Public address Subnet mask Default gateway DNS VPN server Client IP address pool (if not using DHCP) RADIUS server information (if not using Windows authentication) | |
PKI (if applicable) | IP address | |
Web Application Proxy | ADFS FQDN SSL certificate | |
SSO Portal | Firewall rules for HTTPS and SSH communication Application requirements: URL Certificate Hostname Port File format | |
Syslog | SIEM: FQDN/IP Port Certificate | |
Remote Desktop Gateway | RD Gateway (join domain) IP address Hostname External FQDN AD DS IP address Subnet mask Default gateway DNS RD Session Host (domain joined) IP address Hostname RD Connection Broker (domain joined) IP address Hostname RD Web Access (domain joined) IP Address Hostname Firewall rules | |
Remote Desktop Web Access | RD Web Access Server (domain joined) IP address Hostname AD DS IP address Subnet mask Default gateway DNS RD Session Host (domain joined) IP address Hostname RD Connection Broker (domain joined) IP address Hostname Remote Desktop Virtualization Host server (optional) IP address Hostname Firewall rules | |
Work Folders | Sync share name SSL certificate AD security group for user accounts Sync share DNS entry (recommended) | |
RADIUS server | IP address Hostname | |
RADIUS clients | IP address Hostname | |
DNS | ADFS FQDN Host/cluster IP | |
Public domain registrar | Credentials | |
SMTP server | IP address SMTP gateway name | |
Workplace Join | AD DS FQDN AD DS service account ADFS IP address ADFS FQDN DRS DNS entry | |
Application server | IP address Hostname | |
Bold items are required |