programming4us
           
 
 
Windows Server

Windows Server 2003 : The Terminal Services Gateway (part 2)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
11/22/2010 11:20:30 AM

Accessing Resources through the TS Gateway Using TS CAP

TS Connection Authorization Policy (TS CAP) defines who can connect to a TS Gateway server. Unless clients meet these requirements, connection to the TS Gateway server is not allowed. CAP defines authentication methods (password or smart card, member of AD security groups) and device redirection parameters.

To create a new TS Connection Authorization Policy:

1.
Click Start | Administrative Tools | Terminal Services, and then select the TS Gateway Manager (see Figure 6).



Figure 6. TS Gateway Server Manager Police Configuration


2.
Click and expand the Server.

3.
Click and expand the Policies folder. You will find Connection Authorization Policies and Resource Authorization Policies sub-folders.

4.
Click on Connection Authorization Policies.

5.
On the Actions pane, click on Create New Policy and select the wizard option. This will start the Authorization Policies wizard. The other option is custom, which will open up a New TS CAP window.

6.
Select the Create a TS CAP and a TS RAP (recommended) option (see Figure 7). You have the option to create a CAP or a RAP. If you select the first option (Create a TS CAP and a TS RAP (recommended)), the wizard will assist you in creating both the policies together. However, until you recreate both the options, you will not be able to access the network resources.

Figure 7. Policy Creation Wizard to Create TS CAP and TS RAP


7.
Type a name in the Enter a name of TS CAP text box and click Next.

8.
Select the Password check box to select password as the authentication method. The other option is to use Smart card for user authentication (see Figure 8).



Figure 8. TS CAP Authentication Method and User Group Configuration


9.
Click on Add Group and select the group created for Terminal Services. For this exercise, we have created tsusers group. You also have the option to add Client computer group.

10.
Click Next.

11.
Select Enable device redirection for all client devices (see Figure 9) and click Next. Device redirection includes disk drives, printers, clipboard, serial ports, and plug-and play-devices.



Figure 9. TS CAP Policy for Device Redirection


12.
Review the Summary of TS CAP settings and click Next.

As we have chosen the option to create both the TSCAP and TSRAP policies, the wizard will continue with RSRAP creation. We’ll discuss the same in the next section.

Accessing Resources through the TS Gateway Using TS RAP

TS Resource Authorization Policy (TS RAP) defines the type of network resources a remote user can connect through a TS Gateway server. RAP defines the AD security group and the port number the remote connections use (for example, RDP 3389). You can configure RAP to allow custom port numbers or connection through any port number (not recommended).

To configure TS RAP:

1.
Continue with the wizard from the previous screen for creating TS CAP.

2.
Type a name in the Enter the name for the TS RAP text box.

3.
Select the An existing Active Directory security group option, click on Browse and then add the tsusers group that consists of terminal services users (see Figure 10). This option specifies the network resources users can access through TS Gateway. Other options include using a TS Gateway managed group or allowing any access to any network resources. The first option is preferred as you can integrate the security settings with the AD.

Figure 10. TS RAP Network Resource Access Configuration


4.
Select Allow connections only through TCP port 3389 (see Figure 11). This is the RDP port. You have an option to provide custom ports. You need to exercise caution while choosing ports for the terminal services. It should not be from the well-known port range or ports that are used by other applications in your network. The third option to allow connection through any port is not recommended.

Figure 11. TS RAP RDP Port Configuration


5.
Review the settings on Summary of TS RAP settings screen and click Next to create the policy.

Terminal Service Group Policy Settings

Group Policy settings help you to define finer security settings, connection and session limits, resource management, and licensing. Table 9.1 summarizes the Group Policy settings available for Terminal Services. To configure these settings click Start | Administrative Tools | Group Policy Management, locate the OU and right click and select Edit. In the Group Policy Management Editor expand Computer Configuration | Policies | Administrative Templates | Windows Components | Terminal Services.

Table 1. Group Policy Parameters for Terminal Service Components
CategorySetting
Remote Desktop Connection ClientAllow .rdp files from valid publishers and use’s default RDP settings
 Allow .rdp files from unknown publishers
 Do not allow passwords to be saved
 Specify SHA1 thumbprints of certificates representing trusted .rdp publishers
 Prompt for credentials on the client computer
 Configure server authentication for client
Terminal Server 
ConnectionsAutomatic reconnection
 Allow users to connect remotely using Terminal Services
 Deny logoff of an administrator logged in to the console session
 Configure keep-alive connection interval
 Limit number of connections
 Set rules for remote control of Terminal Services user sessions
 Restrict Terminal Services users to a single remote session
 Allow remote start of unlisted program
Device and Resource RedirectionAllow audio redirection
 Do not allow clipboard redirection
 Do not allow COM port redirection
 Do not allow drive redirection
 Do not allow LPT port redirection
 Do not allow supported Plug-and-Play device redirection
 Do not allow smart card device redirection
 Allow time zone redirection
LicensingUse the specified Terminal Services license servers
 Hide notification about TS Licensing problems that affect the terminal server
 Set the Terminal Services licensing mode
Printer RedirectionDo not set default client printer to be default printer in a session
 Do not allow client printer redirection
 Specify terminal server fallback printer driver behavior
 Use Terminal Services Easy Print printer driver first
 Redirect only the default client printer
ProfilesSet TS User Home Directory
 Use mandatory profiles on the terminal server
 Set path for TS Roaming User Profile
Remote Session EnvironmentLimit maximum color depth
 Enforce Removal of Remote Desktop Wallpaper
 Remove “Disconnect” option from Shut Down dialog
 Remove Windows Security item from Start menu
 Set compression algorithm for RDP data
 Start a program on connection
 Always show desktop on connection
SecurityServer Authentication Certificate Template
 Set client connection encryption level
 Always prompt from password upon connection
 Require secure RPC connection
 Require use of specific security layer for remote (RDP) connections
 Do not allow local administrators to customize permissions
 Require user authentication for remote connections by using Network Level Authentication
Session Time LimitsSet time limit for disconnected sessions
 Set time limit for active but idle Terminal Services sessions
 Terminate session when time limits are reached
 Set time limit for logoff of RemoteApp sessions
Temporary FoldersDo not delete temporary folder upon exit
 Do not use temporary folders per session
TS Session BrokerJoin TS Session Broker
 Configure TS Session Broker farm name
 Use IP Address Redirection
 Configure TS Session Broker server name
 Use TS Session Broker load balancing
TS LicensingLicense server security group
 Prevent License upgrade
Other -----------------
- Windows Server 2008 : Disaster Scenario Troubleshooting
- Windows Server 2008 : Recovering from a Disaster - When Disasters Strike
- Windows Server 2008 : Ongoing Backup and Recovery Preparedness
- Windows Server 2003 : Restoring Active Directory
- Windows Server 2003 : Backing Up Active Directory
- Windows Server 2003 : Managing Schema Modifications
- Windows Server 2008 : Perform a Full Server Recovery of a Domain Controller by Using the Command Line
- Windows Server 2008 : Perform a Full Server Recovery of a Domain Controller by Using the Windows Interface
- Windows Server 2008 : Create Active Directory Objects
- Windows Server 2008 : Promote Servers as Domain Controllers
- Windows Server 2008 : Schedule Regular Full Server Backups of a Domain Controller by Using the Command Line
- Windows Server 2008 : Schedule Regular Full Server Backups of a Domain Controller by Using the Windows Interface
- Windows Server 2008 : Perform an Unscheduled Full Server Backup of a Domain Controller by Using the Command Line
- Windows Server 2008 : Perform an Unscheduled Full Server Backup of a Domain Controller by Using the Windows Interface
- Windows Server 2008 : Perform an Unscheduled Backup of Critical Volumes of a Domain Controller by Using the Command Line
- Windows Server 2008 : Perform an Unscheduled Backup of Critical Volumes of a Domain Controller by Using the Command Line
- Windows Server 2008 : Perform an Unscheduled Backup of Critical Volumes of a Domain Controller by Using the Windows Interface
- Windows Server 2008 : Install the Windows Server Backup Server Feature
- Windows Server 2008 : Work with Group Policy Modeling and Results
- Windows Server 2008 : Configure Group Policy Application Settings
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us