Tuesday, January 16, 2018
UAG Direct Access IP HTTPS fail with SAN Certificate
UAG Direct Access IP HTTPS fail with SAN Certificate
Lately I passed by this issue with a client trying to implement the UAG Direct Access using UCC SAN (Subject Alternative Name) Certificate. The Problem was that the Direct Access IPHTTPS URL name �da.company.com� was not the common name of the Certificate (The common name was www.company.com). Microsoft recommends either Wildcard certificate or normal HTTPS certificate for the DA name. If you dont have other option but the SAN certificate then Its recommended to have the Common name matching the Direct Access IPHTTPS URL otherwise a manual work around should be done on both the UAG server and the UAG client.
UAG Server
The Direct Access URL should be adjusted manually on the UAG server using the Netsh command as follows:
Netsh Interface HTTPStunnel Set Interface https://da.company.com:443/IPHTTPS
Then run
Netsh Interface HTTPStunnel show interface
UAG Client
The UAG clients/OU (according to your setup) GPO need to be modifed manually to add the Direct Access URL.
Computer Configuration/Policies/Administrative Templates/Network/TCPIP Settings/IPv6 Transition Technologies/IP-HTTPS State
Make sure to update the GPO on the client (GPupdate /force) and activate the UAG configuration.