This topic describes how to configure an Internet connectivity method using the Forefront UAG DirectAccess Configuration Wizard. DirectAccess clients can be configured to use one of the following Internet connectivity methods:

Note:
  • If force tunneling was manually configured when using a previous version of Forefront UAG DirectAccess, ensure that you remove the "." suffix entry from the Identifying DNS Server page of the Forefront UAG DirectAccess Configuration Wizard, and that you remove any other GPO applied on the clients that has the Any suffix in the NRPT. Failure to do this may result in a corrupt NRPT and can result in DNS queries not working.

  • Using force tunneling will impact on network performance.

When force tunneling is configured, DirectAccess clients that detect that they are on the Internet, modify their IPv4 default route so that IPv4 traffic is not sent. With the exception of local subnet traffic, all traffic sent by the DirectAccess client is IPv6 traffic that goes through tunnels to the Forefront UAG DirectAccess server.

Important:
When force tunneling is enabled, settings might be applied to client’s computers that are located in internal networks and configured for DirectAccess. To avoid network and Internet problems caused by this issue do the following:
  1. Ensure that the FQDN of the Forefront UAG DirectAccess server cannot be resolved by internal DNS servers.

  2. If the client computer configured with DirectAccess accesses the internet via a proxy server, configure the proxy to disallow connections to the FQDN of the Forefront UAG DirectAccess server. 

To configure an Internet connectivity method

  1. Under Step 2, under Optional Settings, click Force Tunneling. The Connectivity Method page appears.

    • To select split tunneling, click Use split tunneling, and then click Finish.

    • To select Force tunneling, click Use force tunneling, and then click Next. The Force Tunneling page appears.

  2. Configure force tunneling as follows:

    • To use a corporate Web Proxy server, click Route requests directly to a corporate Web Proxy server, type the Web Proxy Server name and Port, click Validate Connectivity and if the validation is successful, click Finish.

      Note:
      The Forefront UAG DirectAccess Configuration Wizard validates that:
      1. The Web Proxy server name does not contain an IP address.

      2. The Web Proxy server name is resolvable.

      3. The specified port is valid (Between 1 and 65535).

      Note:
      When two-factor authentication and force tunneling is configured, users will be required to enter their two-factor authentication credentials even if all they are doing is accessing the Internet. To prevent the request for two-factor credentials, add the Web Proxy server as a management server, and the user therefore will not need to access the intranet tunnel.This solution is not available if you configure force tunneling using NAT64 and DNS64.
    • To use the Forefront UAG DirectAccess integrated NAT64 and DNS64, click Resolve and route requests using UAG DirectAccess DNS64 and NAT64, click Validate Connectivity to validate validates that the Forefront UAG DirectAccess server has Internet connectivity, and then click Finish.