This chapter is going to reflect some of the unique and perhaps strange scenarios that I have encountered in the field when working with DirectAccess. Some of these cross my desk fairly regularly, and some are definitely from left field. Either way, they are all potential cases that you may someday encounter, and during our discussion of these specific topics you will also gain some more in-depth knowledge about the way that DirectAccess works, how name resolution is handled, and the flow of packets in the tunnels. Knowledge is power! Let's get some.
What we are going to talk about: