VPN deployment configurations with CMAK is done through The Connection Manager Administration Kit (CMAK) which enables you to create a customized connection experience for clients using a VPN solution. Within the CMAK you can customize the connection such that the end users don’t need to enter the IP address of the VPN server.
CMAK offers complex and granular control so that you can provide a customized support telephone number, should your users need assistance when using the connection. VPN support is configured on the Add Support for VPN Connections dialog box within the Connection Manager Administration Kit Wizard. This dialog box, shown in Figure 1, enables you to specify the IP address for the VPN server or to allow the user to choose a VPN server.

VPN deployment configurations with CMAK

FIGURE 1 Adding support for a VPN connection to a profile created with CMAK

The Connection Manager Administration Kit Wizard also enables you to modify the VPN entry with several options through the New VPN Entry dialog box, as shown in Figure 2.


FIGURE 2 Configuring a new VPN entry as part of CMAK.

Within this dialog box, on the IPv4 tab, you can configure the client’s DNS and WINS configuration, specify whether to use IP header compression, and indicate whether to make the connection the client’s default gateway. You can configure DNS and the default gateway on the IPv6 tab, the DNS suffix and whether to register the address in DNS on the Advanced tab,and several security-related configuration items on the Security tab (see Figure 3).

VPN deployment configurations with CMAK

FIGURE 3 Configuring VPN-related security options in CMAK.

Articles in this course

  1. Migrating from Forefront UAG
  2. Deploying DirectAccess
  3. Configuring DirectAccess
  4. Domain rename
  5. Configuring a Kerberos realm trust
  6. Implementing a domain upgrade
  7. Implementing a domain migration
  8. Implementing a forest restructure
  9. Deploying and managing a test forest
  10. Understanding design considerations
  11. Using Windows Assessment and Deployment Kit
  12. Understanding virtual server deployment
  13. Configuring multicast deployment
  14. Configuring multisite topology and distribution points
  15. Configuring multi-server topology
  16. Configuring WDS
  17. Planning for role migration
  18. Migrating server roles
  19. Migrating servers across domains and forests
  20. Designing server consolidation strategy
  21. Planning for capacity and resource optimization
  22. Designing VMM service templates
  23. Defining operating system profiles
  24. Configuring hardware and capability profiles
  25. Managing services
  26. Configuring image and template libraries
  27. Managing logical networks
  28. Planning for file and storage service
  29. Configuring iSCSI Target Server
  30. Configuring Internet Storage Name Server
  31. Configuring Network File System
  32. Installing device-specific modules
  33. Designing highly available DHCP solution
  34. Design considerations for IP address management
  35. Configuring role-based access control
  36. Configuring IPAM auditing
  37. Migrating IP addresses
  38. Managing and monitoring multiple DHCP and DNS servers
  39. Configuring data collection
  40. VPN design considerations
  41. Security certificate deployment
  42. Firewall design considerations
  43. Client and site-to-site considerations
  44. VPN deployment configurations with CMAK
  45. Designing DirectAccess topology
  46. Using enterprise certificates
  47. Configuring site-to-site VPN
  48. Configuring packet filters
  49. Implementing packet tracing
  50. Implementing Multisite Remote Access
  51. Configuring Remote Access clustered with NLB
  52. Understanding network protection solutions
  53. Planning for capacity and server placement
  54. Planning for NPS and firewall access
  55. Remediation Network
  56. Implementing multiple RADIUS servers
  57. Configuring NAP enforcement for IPsec and 802.1X
  58. Deploying and configuring Endpoint Protection Client
  59. Setting up antimalware and firewall policies
  60. Monitoring compliance
  61. Multi-forest architecture
  62. Trusts
  63. Functional levels
  64. Domain upgrade
  65. Domain migration and forest restructure
  66. Hybrid cloud services
  67. Blocking inheritance
  68. Using enforced policies
  69. Using loopback processing
  70. Using Windows Management Instrumentation (WMI) filters
  71. Understanding site-linked GPOs
  72. Using slow link processing
  73. Understanding group strategies
  74. Understanding OU hierarchy
  75. Using Advanced Group Policy Management
  76. Understanding design considerations for Active Directory permissions
  77. Customizing tasks in Delegation of Control Wizard
  78. Deploying Remote Server Administrative Tools on client computer
  79. Delegating permissions on administrative users
  80. Configuring Kerberos delegation
  81. Understanding Active Directory topology design
  82. Monitoring and resolving Active Directory replication conflicts
  83. Global catalog and operations master roles
  84. Read-only domain controllers
  85. Partial attribute set
  86. Domain controller cloning
  87. Understanding branch office infrastructure design considerations
  88. Implementing confidential attributes
  89. Delegating administration
  90. Modifying filtered attribute set
  91. Configuring Password Replication Policy
  92. Configuring Hash Publication
  93. Implementing DHCP filtering
  94. Implementing and configuring a DHCP Management Pack
  95. Maintaining a DHCP database
  96. Designing name resolution strategy