When a DirectAccess (DA) client connects to the DA server over the Internet, the client establishes two tunnels:
Users often find that they are able to ping resources on the intranet after logging onto the computer but are unable to connect to any resources using other protocols such as HTTP or SMB. If you find this to be the case, it could be that you have not successfully established your intranet tunnel. One way to determine this is to look at the results of main mode negotiations. In the figure below (when the wiki supports copy/paste like Windows Live Workspaces I'll paste the image) you see that the second authentication method includes both NTLMv2 and Kerberos. NTLMv2 is used to authentication the infrastructure tunnel, and Kerberos is used to authenticate the intranet tunnel. If you see Kerberos missing, that means you are unable to authenticate using Kerberos.
Symptoms of such a failure include:
If you find that you are unable to establish the second tunnel, you know that there is most likely a problem with Kerberos authentication, and you would start troubleshooting with the knowledge.
For troubleshooting information for DA client connections, please see:
http://technet.microsoft.com/en-us/library/ee624058(WS.10).aspx
HTH,
Tom
Microsoft ISDUA UAG DirectAccess Anywhere Access Team tomsh@microsoft.com