Most organizations use an Internet firewall between the Internet and the computers on their perimeter network. The firewall is typically configured with packet filters that allow specific types of traffic to and from the perimeter network computers. When you add a Forefront UAG DirectAccess server to your perimeter network, you must configure additional packet filters, to allow the traffic to and from the Forefront UAG DirectAccess server for all the traffic that a DirectAccess client uses to obtain IPv6 connectivity to the Forefront UAG DirectAccess server.
The following describes the type of traffic you can configure on your Internet firewall depending on whether the Forefront UAG DirectAccess server is on an IPv4 or IPv6 Internet.
When the Forefront UAG DirectAccess server is on the IPv4 Internet
Configure packet filters on your Internet firewall to allow the following types of IPv4 traffic for the Forefront UAG DirectAccess server:
- Protocol 41 inbound and outbound—For
DirectAccess clients that use the 6to4 IPv6 transition technology
to encapsulate IPv6 packets with an IPv4 header. In the IPv4
header, the Protocol field is set to 41 to indicate an IPv6 packet
payload. This should be configured for both Internet-facing
consecutive public IPv4 addresses.
- UDP destination port 3544 inbound and UDP
source port 3544 outbound—For DirectAccess clients that use the
Teredo IPv6 transition technology to encapsulate IPv6 packets with
an IPv4 and UDP header. The Forefront UAG DirectAccess server is
listening on UDP port 3544 for traffic from Teredo-based
DirectAccess clients. This should be configured for both
Internet-facing consecutive public IPv4 addresses.
- TCP destination port 443 inbound and TCP
source port 443 outbound—For DirectAccess clients that use
IP-HTTPS to encapsulate IPv6 packets within an IPv4-based HTTPS
session. The Forefront UAG DirectAccess server is listening on TCP
port 443 for traffic from IP-HTTPS-based DirectAccess clients.
When the Forefront UAG DirectAccess server is on the IPv6 Internet
Configure packet filters on your Internet firewall to allow the following types of IPv6 traffic for the Forefront UAG DirectAccess server:
- Protocol 50—Forefront UAG DirectAccess
on the IPv6 Internet uses IPsec Encapsulating Security Payload
(ESP) to protect the packets to and from the Forefront UAG
DirectAccess server without the encapsulation headers required for
IPv6 transition technologies. In the IPv6 header, the Protocol
field is set to 50 to indicate an ESP-protected payload.
- UDP destination port 500 inbound and UDP
source port 500 outbound—Forefront UAG DirectAccess on the IPv6
Internet uses the Internet Key Exchange (IKE) and Authenticated
Internet Protocol (AuthIP) protocols to negotiate IPsec security
settings. The Forefront UAG DirectAccess server is listening on UDP
port 500 for incoming IKE and AuthIP traffic.
- All ICMPv6 traffic inbound and
outbound.