Configure the IPsec Gateway Server
Updated: July 22, 2010
Applies To: Windows Server 2008 R2
In this procedure, you configure the Internet Protocol security (IPsec) gateway server to act only as the IPsec tunnel endpoint and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) router and modify Group Policy settings for the new dual-server configuration.
Before performing this procedure, you should have determined the public IPv6 address that is assigned to the intra-server subnet interface on the IPsec gateway server (PublicIpv6AddressOfIPsecGWServerSubnetInterface). For more information, see Configure the Intra-Server Subnet.
To complete these procedures, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify IPv6 and Group Policy settings. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (https://go.microsoft.com/fwlink/?LinkId=83477).
To configure the IPsec gateway server
On the IPsec gateway server, start a command prompt as an administrator.
In the Command Prompt window, type the netsh interface ipv6 show interfaces command.
This command lists the interfaces and their interface indexes.
In the Command Prompt window, type the following commands:
netsh interface ipv6 set teredo default
netsh interface ipv6 set interface TeredoInterfaceIndex forwarding=disabled
netsh interface 6to4 set state default
netsh interface ipv6 set interface 6to4InterfaceIndex forwarding=disabled
netsh interface ipv6 set interface IPHTTPSInterface forwarding=disabled advertise=disabled
netsh interface httpstunnel add interface state=default
On a domain controller, start a command prompt as an administrator.
From the Command Prompt window, type the following commands
netsh advfirewall set store gpo=”DomainName\DirectAccess Policy-{3491980e-ef3c-4ed3-b176-a4420a810f12}"
**netsh advfirewall consec set rule name=”DirectAccess Policy-ClientToCorp” new remotetunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
**netsh advfirewall consec set rule name=”DirectAccess Policy-ClientToDnsDc” new remotetunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
**netsh advfirewall consec set rule name=”DirectAccess Policy-ClientToMgmt” new remotetunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
netsh advfirewall set store gpo=”DomainName\DirectAccess Policy-{ab991ef0-6fa9-4bd9-bc42-3c397e8ad300}"
**netsh advfirewall consec set rule name=”DirectAccess Policy-DaServerToMgmt” new localtunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
**netsh advfirewall consec set rule name=”DirectAccess Policy-DaServerToCorp” new localtunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
**netsh advfirewall consec set rule name=”DirectAccess Policy-DaServerToDnsDc” new localtunnelendpoint=**PublicIpv6AddressOfIPsecGWServerSubnetInterface
If you arrived at this page by clicking a link in a checklist, use your browser’s Back button to return to the checklist.