• Home
  • IT-Courses
    • Installing and Upgrading Microsoft Window Server
    • Designing Network Infrastructure Window Server
    • Design and Configure Active Directory Window Server
    • Implementing and Administering Active Director
    • Install, Configure and Migrate Domain DNS Services
    • Designing a Secure Microsoft Windows-Based Network
  • Training Videos
  • Forum
  • Career
  • About us
  • Contacts
  • Home
  • IT-Courses
    • Installing and Upgrading Microsoft Window Server
    • Designing Network Infrastructure Window Server
    • Design and Configure Active Directory Window Server
    • Implementing and Administering Active Director
    • Install, Configure and Migrate Domain DNS Services
    • Designing a Secure Microsoft Windows-Based Network
  • Training Videos
  • Forum
  • Career
  • About us
  • Contacts
Log in / Sign in
What are you looking for?
Trending Searches: Javascript Database Photoshop
Popular categories
Uncategorized

Uncategorized

13 products
View all categories
0 0
0 Shopping Cart

No products in the cart.

Return To Shop
Shopping cart (0)
Subtotal: $0.00

View cartCheckout

Module 9: Remote User Connectivity in Windows Server

Goal: Provide secure, reliable, and efficient remote access for users to internal network resources using Windows Server technologies.


Key Remote Access Methods in Windows Server
MethodPurposeTechnology
VPNSecurely connect users to internal network over internetRRAS (Routing and Remote Access Service)
DirectAccessSeamless always-on remote access (domain-joined clients)Requires Windows Server and IPv6
Remote Desktop Services (RDS)Provide full desktop or app access remotelyRDS role in Windows Server
Web Access / RD Web AccessUse web browser to access desktops/appsPart of RDS
Always On VPN (Win10/11)Modern alternative to DirectAccessUses IKEv2/IPSec or SSTP protocols
RRAS (Routing and Remote Access Service)

RRAS allows you to:

  • Set up VPN access

  • Configure NAT routing

  • Enable LAN routing

How to Install RRAS:
  1. Open Server Manager → Add Roles and Features

  2. Select Remote Access → Choose DirectAccess and VPN (RAS)

  3. After install, open RRAS Management Console

  4. Right-click server name → Configure and Enable Routing and Remote Access

  5. Choose VPN access, NAT, or LAN routing as needed


VPN Configuration Overview
Supported VPN Protocols:
  • PPTP (least secure, outdated)

  • L2TP/IPSec

  • SSTP (uses HTTPS port 443, firewall-friendly)

  • IKEv2 (fast and stable, supports mobility)

Steps:
  • Configure user permissions in AD for dial-in access

  • Set up IP address assignment (static pool or DHCP)

  • Enable firewall ports: 1723 (PPTP), 500/4500 (L2TP/IPSec), 443 (SSTP)


DirectAccess vs VPN
FeatureDirectAccessVPN
Connection TypeAlways-onUser-initiated
ProtocolIPv6 / IP-HTTPSPPTP/L2TP/SSTP/IKEv2
RequirementsDomain-joined devices, PKIAny client device
Best forCorporate-managed devicesBYOD or general users
Remote Desktop Services (RDS)
Components:
  • RD Session Host (actual remote desktop or apps)

  • RD Web Access (browser-based access)

  • RD Gateway (secure RDP over HTTPS)

  • RD Connection Broker (load balancing sessions)

Install using Server Manager > Remote Desktop Services role.


Firewall & Network Considerations
ServiceRequired Ports
SSTP VPN443
L2TP/IPSec VPN500, 1701, 4500
RDP3389
RD Gateway443
Web Access443/80

Introducing Routing and Remote Access

  • Design Decisions for a Remote Access Solution
  • Number of Dial-Up Clients?
  • Local or Network-Wide Resources?
  • Connection Technologies?
  • Client Authentication, Security, and Encryption?
  • Client Connection Protocols
Remote Access Solution
  • VPN with Remote Access Solutions
  • VPN Connection Types
  • Account-based Authentication and Encryption
  • Compatibility with Other Operating Systems
VPN
  • Routing and Remote Access Features
  • Provides Dial-Up Access
  • Supports various transport protocols
  • Supports various WAN technologies
  • Supports standard security protocols
  • Provides Server Interoperability
Routing and Remote Access Features
  • Integration Benefits
DHCP

Designing a Functional Remote Access Solution (Windows Server)

A functional remote access solution allows users to securely connect to internal corporate resources from remote locations, ensuring seamless productivity without compromising security.


Objectives of a Remote Access Solution
  • Enable secure access to internal resources (files, apps, desktops)

  • Support both domain and non-domain clients (employees, contractors)

  • Offer flexibility (VPN, RDP, web-based access)

  • Maintain high availability and performance

  • Enforce security policies (authentication, encryption)


Core Components
ComponentPurpose
RRAS (Routing and Remote Access Service)Provides VPN connectivity and routing
RADIUS/NPSCentralized authentication and policy management
Remote Desktop Services (RDS)Full desktop or app access remotely
Firewall & NATSecure internet-to-internal routing
Group Policy (GPO)Enforce settings on domain-joined remote devices
Certificates (PKI)Secure communication and user/device trust
DNS & DHCPIP and name resolution for remote clients
Step-by-Step: Functional Remote Access Design (VPN-Based)
1. Assess Requirements
  • Number of remote users

  • Types of clients (Windows, Mac, BYOD)

  • Bandwidth and performance needs

  • Security policies (MFA, access restrictions)

2. Prepare Server
  • Install Windows Server with latest updates

  • Assign a static IP address

  • Join to Active Directory Domain (optional but preferred)

3. Install RRAS Role
  1. Open Server Manager

  2. Add Role: Remote Access

  3. Select DirectAccess and VPN (RAS)

  4. Complete installation and open RRAS Management Console

4. Configure RRAS for VPN
  1. Right-click server name → Configure and Enable Routing and Remote Access

  2. Select: Custom Configuration → VPN Access

  3. Start the RRAS service

  4. Assign IP address pool for VPN clients (or use DHCP relay)

  5. Enable required VPN protocols: SSTP, L2TP/IPSec, IKEv2


5. Secure the Connection
MeasureDetails
Firewall RulesAllow necessary ports (443 for SSTP, 500/4500 for IKEv2)
CertificatesInstall SSL cert for SSTP and/or IPsec certs
AuthenticationUse AD credentials or RADIUS (NPS) with MFA
Split TunnelingEnable if only internal traffic should route over VPN
  • Integrating Remote Access Solutions into a LAN Environment
  • Security Policies for Dial-Up Clients
  • Concurrent Sessions and Multilink
  • Aggregate Throughput for Clients
  • Client Configuration
LAN Environment
  • Integrating Remote Access Solutions into a LAN Environment
  • Selecting Dial-Up Solutions
  • Enabling Supported Protocols
  • Providing Client-to-Server Connections x
  • Providing Client-to-Server Connections Providing Demand-Dial Router-to-Router Connections
  • Integrating VPN into a Routed Environment
  • Selecting Dial-Up or VPN-based Servers
  • Providing Remote Access Client Connections
  • Selecting a Tunneling Protocol
Module 9: Remote User Connectivity in Windows Server
  • Integrating VPN Servers with the Internet
  • Integrating VPN Servers and Firewalls
  • Integrating VPN Servers and NAT Devices
Internet firewall
  • Placing Remote Access Servers Within a Private Network
  • IGMP Router Mode Interface IGMP
  • Proxy Mode Interface
Private Network
  • Discussion: Evaluating Routing and Remote Access Functional Requirements
Functional Requirements

Securing a Remote Access Solution (Windows Server)

Remote access—such as VPN, RDP, or DirectAccess—exposes your internal network to external users. Therefore, securing it is critical to prevent unauthorized access, data breaches, or service disruption.


Security Objectives
  • Ensure only authorized users/devices connect

  • Encrypt data in transit

  • Enforce security compliance for connecting devices

  • Monitor and log access activity

  • Protect against brute-force and phishing attacks


Key Security Measures
1. Use Secure VPN Protocols
ProtocolSecurity LevelNotes
SSTP (HTTPS-based)HighUses port 443; great for firewall traversal
IKEv2/IPSecHighSecure with strong encryption; best for mobile devices
L2TP/IPSecMediumStill secure but slightly outdated
❌ PPTPWeakDo not use – outdated and insecure
2. Implement Multi-Factor Authentication (MFA)
  • Combine passwords with:

    • OTP (Google Authenticator, Authy, etc.)

    • Smartcards or certificates

    • Microsoft Authenticator or other RADIUS-integrated MFA

  • Configure with Network Policy Server (NPS) + Azure MFA or Duo Security


3. Use Strong Certificates
  • SSL certificate for SSTP VPN or RD Gateway

  • Issue client certificates using an internal CA (Active Directory Certificate Services)

  • Enforce IPSec with certificates for site-to-site and client VPN


4. Restrict Access with Network Policies
  • Use NPS policies to:

    • Allow VPN only to specific AD groups

    • Enforce login hours

    • Limit access by device MAC or hostname

    • Apply quarantine checks for non-compliant systems


5. Enable Connection Logging & Auditing
  • Enable RRAS logging (Authentication and Accounting)

  • Use Windows Event Logs to:

    • Track successful/failed logins

    • Alert on brute-force attempts

  • Forward logs to SIEM or centralized syslog server


6. Configure the Firewall Properly
  • Allow only required ports (e.g., 443 for SSTP, 500/4500 for IKEv2)

  • Use Geo-IP restrictions (optional)

  • Block unused management ports (RDP, SMB, etc.) on external interfaces


7. Secure RDP (if used)
  • Use RD Gateway (HTTPS tunnel) instead of open RDP ports

  • Limit RDP access to a jump server or RDP broker

  • Enforce Network Level Authentication (NLA)

  • Use TLS encryption and disable legacy RDP clients


8. Limit Scope of Remote Users
  • Restrict users to only necessary resources via firewall or routing rules

  • Disable local admin rights on VPN clients

  • Apply least privilege principle


9. Endpoint Security on Remote Devices
  • Enforce that client systems have:

    • Updated antivirus/EDR

    • OS and software patches

    • Encrypted disks (BitLocker)

  • Use NAP (Network Access Protection) or Intune Compliance Policies (modern approach)


10. Regular Security Review
  • Review access logs weekly/monthly

  • Revoke credentials/certificates of former employees

  • Audit Group Policies and firewall rules


Example Security Stack for Remote Access
LayerTechnology
AuthenticationActive Directory + NPS + MFA
EncryptionSSL/TLS certs, IPSec
Access ControlAD Group Policies, NPS Conditions
Device ComplianceIntune, BitLocker, Defender
MonitoringEvent Logs, Syslog, SIEM
FirewallNAT rules, Port filtering
  • Selecting the Appropriate Authentication Protocols
Authentication Protocols
  • Selecting the Appropriate Encryption Methods
Encryption Methods
  • Ensuring Security with Remote Access Policies
Remote Access Policies
  • Restricting Access to Private Network Resources
Private Network Resources
  • Distributing Authentication and Accounting Using RADIUS
Distributing Authentication and Accounting Using RADIUS

Enhancing Remote Access Design for High Availability: Best Practices for 2025

Enhancing a Remote Access Design for Availability refers to optimizing remote access infrastructure (VPNs, RDP, DirectAccess, etc.) to ensure continuous, reliable, and redundant connectivity for users, even during network or system failures.

  • Adding Redundant Remote Access Servers
  • Using Connection Manager to Distribute Clients
  • Adding Remote Access Servers at Remote Locations
  • Using Multiple VPN Servers with Round Robin DNS Entries
  • Using Windows Clustering with VPN Servers
  • Centralizing the Management of Remote Access Servers Using RADIUS
  • Distributing Remote Access Policies to All Servers
  • Providing Redundant Authentication and Accounting
  • Discussion: Evaluating Routing and Remote Access Security and Availability Requirements
Availability Requirements
  • Distributing Remote Access Across Multiple Servers
  • Using Connection Manager to Distribute Clients
  • Evaluate and then redistribute remote access clients across remote access servers
  • Provide a new phone book that reflects the redistribution
  • Adding Remote Access Servers at Remote Locations
  • Distributes network load to the location where the resource resides
  • Improves remote access performance
  • Adding VPN Servers
  • Improving Remote Access Performance on a Server
  • Improving Single Server Performance
  • Dedicating a Server to Remote Access and VPN Servers
  • Upgrading Existing Remote Access and VPN Servers
  • Improving WAN and LAN Connection Performance
Module 8: Routing Configuratio...
Routing between LAN
Module 10: RADIUS Configurations – Remote Access in Windows Server
Module 10: RADIUS Configuratio...

Add comment Cancel reply

Your email address will not be published. Required fields are marked

Quick Links

    • Career

    • Live Discussion

    • Certification

    • Sitemap

    • Help & Support

ADDITIONAL LINKS

    • About Us

    • Terms & Condition

    • Privacy Policy

    • Forum

    • Contact Us

Categories

    • Phone: (+92) 333-6522806

    • Email: info@skillpointit.com

    • Address: Lahore, Pakistan

    • Email: shahzad@skillpointit.com

Subscribe Now!

get 20% Off on courses collection Now!

Facebook Twitter Whatsapp Youtube Telegram

© 2024 SkillPoint IT. All rights reserved.