Introduction
Communication between the DirectAccess client and server takes place exclusively over IPv6. When DirectAccess servers and/or clients are on the IPv4 Internet, an IPv6 transition technology must be employed to allow those clients to connect to the DirectAccess server. DirectAccess deployment best practices dictate that only the IP-HTTPS IPv6 transition technology be used. IP-HTTPS uses SSL/TLS for server authentication and optionally encryption. To improve security and performance for IP-HTTPS, an Application Delivery Controller (ADC) like the Citrix NetScaler can be configured to perform SSL offloading and client preauthentication for DirectAccess IP-HTTPS connections.
Please note that the following caveats apply when enabling SSL offload for DirectAccess clients:
- Enabling SSL offload and IP-HTTPS preauthentication on an ADC for DirectAccess is formally unsupported by Microsoft.
- SSL offload should not be enabled with DirectAccess is configured to use one-time password (OTP) authentication. Offloading SSL will break OTP functionality.
IP-HTTPS Challenges
The IP-HTTPS IPv6 transition technology is a simple and effective way to allow DirectAccess clients and servers to communicate by encapsulating IPv6 traffic in HTTP and routing it over the public IPv4 Internet. However, there are two critical issues with the default implementation of IP-HTTPS in DirectAccess. One is a security issue, the other affects performance.
Security
The DirectAccess server does not authenticate clients establishing IP-HTTPS connections. This could allow an unauthorized client to obtain an IPv6 address from the DirectAccess server using the IPv6 Neighbor Discovery (ND) process. With a valid IPv6 address, the unauthorized user could perform internal network reconnaissance or launch a variety of Denial of Service (DoS) attacks on the DirectAccess infrastructure and connected clients. More details here.
Performance
Windows 7 DirectAccess clients use encrypted cipher suites when establishing IP-HTTPS connections. However, the payload being transported is already encrypted using IPsec. This double encryption increases resource utilization on the DirectAccess server, reducing performance and limiting scalability. More details here.
Note: Beginning with Windows Server 2012 and Windows 8, Microsoft introduced support for null encryption for IP-HTTPS connections. This eliminates the needless double encryption, greatly improving scalability and performance for DirectAccess clients using IP-HTTPS.
SSL Offload for DirectAccess IP-HTTPS
The Citrix NetScaler can be configured to perform SSL offload to improve performance for Windows 7 DirectAccess clients using IP-HTTPS. Since DirectAccess does not natively support SSL offload, the NetScaler must be configured in a non-traditional way. While the NetScaler will be configured to terminate incoming IP-HTTPS SSL connections, it must also use SSL for the back-end connection to the DirectAccess server. However, the NetScaler will be configured only to use null cipher suites when connecting to the DirectAccess server. Even though Windows 7 clients will still perform double encryption to the NetScaler, this configuration effectively offloads from the server the heavy burden of double encrypting every IP-HTTPS connection for all connected DirectAccess clients. This results in reduced CPU utilization on the DirectAccess server, yielding better scalability and performance.
SSL Offload and Windows 8.x/10 Clients
Offloading SSL for Windows 8.x/10 clients will not improve performance because they already use null cipher suites for IP-HTTPS when connecting to a Windows Server 2012 or later DirectAccess server. However, terminating SSL on the NetScaler is still required to perform IP-HTTPS preauthentication.
Supported NetScaler Platforms for DirectAccess SSL Offloading
The following configuration for Citrix NetScaler can be performed on any release of the VPX virtual ADC platform. However, be advised that there is a known issue with older releases on the MDX and SDX hardware platforms that will prevent this from working. For MDX and SDX deployments, upgrading to release 11.1 build 50.10 or later will be required.
Configure Citrix NetScaler for IP-HTTPS SSL Offload
To enable SSL offloading for DirectAccess IP-HTTPS on the Citrix NetScaler, open the NetScaler management console, expand Traffic Management and Load Balancing, and then perform the following procedures in order.
Add Servers
- Click Servers.
- Click Add.
- In the Name field enter a descriptive name for the first DirectAccess server.
- Select IP Address.
- In the IP Address field enter the IP address of the first DirectAccess server.
- Click Create.
- Repeat these steps for any additional servers in the load-balanced cluster.
Add Services
- Click Services.
- Click Add.
- In the Service Name field enter a descriptive name for the service.
- Select Existing Server from the Server drop-down list.
- Choose the first DirectAccess server in the cluster.
- Choose SSL from the Protocol drop-down list.
- Click Ok.
- Edit SSL Parameters.
- In the Protocol section uncheck SSLv3.
- Click Ok.
- Edit SSL Ciphers.
- Click Remove All.
- Click Add.
- Type NULL in the Search Ciphers box.
- Check the box next to the first entry for SSL3-NULL-SHA.
- Click the right arrow to add the cipher to the list.
- Click Ok.
- Click Done.
- Repeat these steps for any additional servers in the load-balanced cluster.
A warning message may be displayed indicating that no usable ciphers are configured on the SSL vserver/service. This message can be safely ignored.
Add Virtual Server
- Click Virtual Servers.
- Click Add.
- In the Name field enter a descriptive name for the virtual server.
- Choose SSL from the Protocol drop-down list.
- In the IP Address field enter the IP address for the virtual server.
- Click Ok.
Note: When enabling load balancing in DirectAccess, the IP address assigned to the first DirectAccess server is reallocated for use as the load balancing Virtual IP Address (VIP). Ideally this IP address will be assigned to the load balancing virtual server on the NetScaler. However, this is not a hard requirement. It is possible to configure the VIP on the NetScaler to reside on any subnet that the load balancer has an interface to. More details here.
- In the Services and Groups section click No Load Balancing Virtual Server Service Binding.
- Click on the Select Service field.
- Check all DirectAccess server services and click Select.
- Click Bind.
- Click Continue.
- In the Certificate section click No Server Certificate.
- Click on the Select Server Certificate field.
- Choose the certificate to be used for DirectAccess IP-HTTPS.
- Click Select.
- Click Bind.
- Click Continue.
- Edit SSL Ciphers.
- Click Remove All.
- Click Add.
- Type ECDHE in to the Search Ciphers box.
- Check the box next to TLS1-ECDHE-RSA-AES128-SHA.
- Click the right arrow to add the cipher to the list.
- Type NULL in to the Search Ciphers box.
- Check the box next to SSL3-NULL-SHA.
- Click the right arrow to add the cipher to the list.
- Click Ok.
- Click Done.
Note: If Windows 8.x/10 clients are supported exclusively, SSL3-NULL-SHA is the only cipher suite required to be configured on the virtual server. If Windows 7 client support is required, the TLS1-ECDHE-RSA-AES128-SHA cipher suite should also be configured on the virtual server.
- Edit SSL Parameters.
- Uncheck SSLv3.
- Click Ok.
Note: If Windows 8.x/10 clients are supported exclusively, TLSv1 can also be unchecked on the virtual server. If Windows 7 client support is required, TLSv1 must be enabled.
- In the Advanced Settings section click Persistence.
- Choose SSLSESSION.
- Enter 10 minutes for the Time-out (mins) value.
- Click Ok.
- Click Done.
Optional IP-HTTPS Preauthentication
To enable IP-HTTPS preauthentication to prevent unauthorized network access, perform the following procedures on the Citrix NetScaler appliance.
- Expand Traffic Management, Load Balancing, and then click Virtual Servers.
- Select the DirectAccess virtual server and click Edit.
- In the Certificate section click No CA Certificate.
- Click the Select CA Certificate field.
- Choose the certificate for the CA that issues certificates to DirectAccess clients and servers.
Note: The CA certificate used for DirectAccess can be found by opening the Remote Access Management console, clicking Edit on Step 2, and then clicking Authentication. Alternatively, the CA certificate can be found by running the following PowerShell command.
(Get-RemoteAccess).IPsecRootCertificate | Format-Table Thumbprint
- Click Select.
- Choose CRL Optional from the CRL and OCSP Check drop-down list.
- Click Bind.
- Edit SSL Parameters.
- Check the box next to Client Authentication.
- Choose Mandatory from the Client Certificate drop-down list.
- Click Ok.
- Click Done.
Summary
Leveraging the advanced capabilities of the Citrix NetScaler ADC can improve performance when supporting Windows 7 clients and enhance security for all DirectAccess clients using IP-HTTPS. In terms of supportability, all of the changes described in this article are completely transparent and do not alter the native DirectAccess client or server configuration. If a Microsoft support engineer declines support due to this configuration, switching from SSL offload to SSL bridge is all that’s required to restore full supportability.
Additional Resources
NetScaler release 11.1 build 50.10 (requires login) – https://www.citrix.com/downloads/netscaler-adc/firmware/release-111-build-5010
Release notes for build 50.10 of NetScaler 11.1 release – https://www.citrix.com/content/dam/citrix/en_us/documents/downloads/netscaler-adc/NS_11_1_50_10.html
VIDEO: Enable Load Balancing for DirectAccess – https://www.youtube.com/watch?v=3tdqgY9Y-uo
DirectAccess IP-HTTPS preauthentication using F5 BIG-IP – https://directaccess.richardhicks.com/2016/05/23/directaccess-ip-https-preauthentication-using-f5-big-ip/
DirectAccess SSL offload for IP-HTTPS using F5 BIG-IP – https://directaccess.richardhicks.com/2013/07/10/ssl-offload-for-ip-https-directaccess-traffic-from-windows-7-clients-using-f5-big-ip/
Implementing DirectAccess with Windows Server 2016 book – http://directaccessbook.com/