<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1X EAP failure with Windows AD Radius - Help! in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492163#M299100</link>
    <description>&lt;P&gt;Team,&lt;/P&gt;&lt;P&gt;We are experiencing a recurring problem with our NPS and Cisco Meraki MR Access Point. This issue has surfaced recently, where the AP authentication initially functions properly upon installation but stops working after 3 hours, despite no alterations to the network configuration.&lt;/P&gt;&lt;P&gt;The notable difference in the logs is the appearance of the user as Security ID: NULL SID (previously displayed as the username). The reason for this anomaly is identified as a malformed RADIUS Request message received by the Network Policy Server from the network access server.&lt;BR /&gt;&lt;BR /&gt;Reason : &lt;SPAN&gt;The RADIUS Request message that Network Policy Server received from the network access server was malformed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Our network setup consists solely of Meraki APs, connected in the following sequence: MR ----&amp;gt; Aruba Switch ----&amp;gt; Palo Alto Firewall ----&amp;gt; RADIUS via IPsec tunnel.&lt;BR /&gt;&lt;BR /&gt;Looking forward to hearing from you guys soon... &lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2024 16:43:22 GMT</pubDate>
    <dc:creator>sureelam</dc:creator>
    <dc:date>2024-04-26T16:43:22Z</dc:date>
    <item>
      <title>802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492108#M299045</link>
      <description>&lt;P&gt;Okay so I've spent several DAYS on this and seem to be getting nowhere &lt;SPAN class="lia-unicode-emoji" title=":confused_face:"&gt;&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/SPAN&gt; I'm starting to get fairly frustrated having followed numerous guides exactly.&lt;/P&gt;&lt;P&gt;I used this to setup the Meraki side:&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is the latest guide I followed:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cracknells.co.uk/servers-side/configuring-radius-authentication-for-a-wireless-network-802-1x-eap/" target="_blank" rel="nofollow noopener noreferrer"&gt;http://www.cracknells.co.uk/servers-side/configuring-radius-authentication-for-a-wireless-network-802-1x-eap/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;No matter what I try though, I can't get my phone or laptop to connect, nor get the Test function to succeed from the SSID &amp;gt; Radius Servers section.&lt;/P&gt;&lt;P&gt;When I click Test, I get:&lt;BR /&gt;Total APs: 14&lt;BR /&gt;APs failed: 14&lt;/P&gt;&lt;P&gt;I have Accounting enabled on the Windows Server (which is now a DC running Server 2016. I had been running 2012 R2 but decided to wipe it and install 2016 afresh as though maybe RADIUS worked better!). The NPS Account log shows this when I click the Test button:&lt;/P&gt;&lt;P&gt;&amp;lt;Event&amp;gt;&amp;lt;Timestamp data_type="4"&amp;gt;11/15/2018 14:15:21.607&amp;lt;/Timestamp&amp;gt;&amp;lt;Computer-Name data_type="1"&amp;gt;MY-DC03&amp;lt;/Computer-Name&amp;gt;&amp;lt;Event-Source data_type="1"&amp;gt;IAS&amp;lt;/Event-Source&amp;gt;&amp;lt;Class data_type="1"&amp;gt;311 1 10.33.102.23 11/15/2018 13:06:56 231&amp;lt;/Class&amp;gt;&amp;lt;Client-IP-Address data_type="3"&amp;gt;10.32.108.21&amp;lt;/Client-IP-Address&amp;gt;&amp;lt;Client-Vendor data_type="0"&amp;gt;0&amp;lt;/Client-Vendor&amp;gt;&amp;lt;Client-Friendly-Name data_type="1"&amp;gt;Meraki - AP1&amp;lt;/Client-Friendly-Name&amp;gt;&amp;lt;Session-Timeout data_type="0"&amp;gt;30&amp;lt;/Session-Timeout&amp;gt;&amp;lt;Proxy-Policy-Name data_type="1"&amp;gt;Meraki Staff Secure Wireless Connections&amp;lt;/Proxy-Policy-Name&amp;gt;&amp;lt;Provider-Type data_type="0"&amp;gt;1&amp;lt;/Provider-Type&amp;gt;&amp;lt;SAM-Account-Name data_type="1"&amp;gt;MYDOMAIN\JohnDoe&amp;lt;/SAM-Account-Name&amp;gt;&amp;lt;Fully-Qualifed-User-Name data_type="1"&amp;gt;&lt;SPAN&gt;MYDOMAIN&lt;/SPAN&gt;&lt;SPAN&gt;\JohnDoe&lt;/SPAN&gt;&amp;lt;/Fully-Qualifed-User-Name&amp;gt;&amp;lt;Authentication-Type data_type="0"&amp;gt;5&amp;lt;/Authentication-Type&amp;gt;&amp;lt;NP-Policy-Name data_type="1"&amp;gt;Meraki Staff Secure Wireless Connections&amp;lt;/NP-Policy-Name&amp;gt;&amp;lt;Packet-Type data_type="0"&amp;gt;11&amp;lt;/Packet-Type&amp;gt;&amp;lt;Reason-Code data_type="0"&amp;gt;0&amp;lt;/Reason-Code&amp;gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;I get pretty much the same error logged when trying to connect from my laptop. I also see this in the Meraki event log:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:57&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.11 association&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;channel: 40, rssi: 29&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:57&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.11 disassociation&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;unknown reason&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:57&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.1X deauthentication&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;radio: 1, vap: 4, client_mac: 84:3A:4B:56:F4:5C  &lt;SPAN class=""&gt;more »&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:48&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.1X deauthentication&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;radio: 1, vap: 4, client_mac: 84:3A:4B:56:F4:5C  &lt;SPAN class=""&gt;more »&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:48&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.11 association&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;channel: 40, rssi: 28&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:47&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.11 disassociation&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;unspecified reason&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:47&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.1X deauthentication&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;radio: 1, vap: 4, client_mac: 84:3A:4B:56:F4:5C  &lt;SPAN class=""&gt;more »&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:47&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.1X EAP failure&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;radio: 1, vap: 4, client_mac: 84:3A:4B:56:F4:5C  &lt;SPAN class=""&gt;more »&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:47&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.1X deauthentication&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;radio: 1, vap: 4, client_mac: 84:3A:4B:56:F4:5C  &lt;SPAN class=""&gt;more »&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Nov 15 14:24:47&lt;/TD&gt;&lt;TD&gt;Purchasing&lt;/TD&gt;&lt;TD&gt;Radius_Test&lt;/TD&gt;&lt;TD&gt;ITSPARE01&lt;/TD&gt;&lt;TD&gt;&lt;SPAN&gt;802.11 association&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;channel: 40, rssi: 29&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 14:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492108#M299045</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T14:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492109#M299046</link>
      <description>&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nps15.gif" style="width: 296px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.gif"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/268703i816A34B99E0FB6BC/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.gif" alt="image.gif" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Hello Dan,&lt;/P&gt;&lt;P&gt;Did you add the AP's to the RADIUS clients? They need to be added so that RADIUS can work.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 14:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492109#M299046</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2018-11-15T14:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492110#M299047</link>
      <description>&lt;P&gt;Yes, all of my Meraki AP's were added with their IP addresses. I created a Shared Secret template first, which I applied to all APs when adding them as RADIUS Clients.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 14:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492110#M299047</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T14:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492111#M299048</link>
      <description>&lt;P&gt;Does NPS server have a certificate installed &amp;amp; configured in the NPS policy? I'm just making sure I get all the common denominators as I ask you this by the way.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 15:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492111#M299048</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2018-11-15T15:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492112#M299049</link>
      <description>Assuming then your access points have static IP addresses? I find its easier to simply add the /24 the AP's sit on. Also assuming the access points can reach the NPS server? Pings work etc.</description>
      <pubDate>Thu, 15 Nov 2018 15:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492112#M299049</guid>
      <dc:creator>Nolan Herring</dc:creator>
      <dc:date>2018-11-15T15:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492113#M299050</link>
      <description>&lt;P&gt;All AP's are set to DHCP but have a reservation set on the DHCP server. NPS server can ping all AP's no problem.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 15:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492113#M299050</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492114#M299051</link>
      <description>&lt;P&gt;Yes, I have a certificate selected in NPS &amp;gt; Network Policies &amp;gt; My Meraki Policy &amp;gt; Constraints &amp;gt; Auth Methods &amp;gt; Microsoft PEAP &amp;gt; (Edit), issued by the server I installed the CA role on. I suspect it could be failing to do with this? I think at some point I created a Group Policy to deploy that certificate to client PC's, perhaps something is amiss with that but I can't seem to get enough info from any logs.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 15:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492114#M299051</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T15:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492115#M299052</link>
      <description>&lt;P&gt;Check on this thread please and see if the problem might be there:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.meraki.com/t5/Wireless-LAN/authentication-fails-in-windows-7-with-802-1X-with-Meraki-RADIUS/m-p/11730#M1966" target="_blank"&gt;https://community.meraki.com/t5/Wireless-LAN/authentication-fails-in-windows-7-with-802-1X-with-Meraki-RADIUS/m-p/11730#M1966&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 15:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492115#M299052</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2018-11-15T15:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492116#M299053</link>
      <description>&lt;P&gt;Thanks, I did come across that thread previously (with all the Spanish screenshots!) but I think I need to get the Test button working from the Meraki dashboard &amp;gt; Access Control for SSID first, before I then troubleshoot client PC's, would you agree?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 17:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492116#M299053</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T17:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492117#M299054</link>
      <description>I'm torn because I've seen instances where the AP fails that test, but radius still works. So at this point I would say try it and ignore those test results and see what happens.</description>
      <pubDate>Thu, 15 Nov 2018 17:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492117#M299054</guid>
      <dc:creator>Nolan Herring</dc:creator>
      <dc:date>2018-11-15T17:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492118#M299055</link>
      <description>&lt;P&gt;Okay I'll give it a go. Our clients are all Windows 10. At the moment when I try to connect to the Radius SSID it prompts me for credentials, with a tickbox to 'use my Windows user account', which if I tick fills in the boxes with my AD credentials. It check network requirements after clicking OK, but the credentials prompt just comes back again.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 17:16:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492118#M299055</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-15T17:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492119#M299056</link>
      <description>&lt;P&gt;Does anything appear for NPS in the Windows Security Event log on the NPS server.  It will usually say why the request has been denied.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 20:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492119#M299056</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2018-11-15T20:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492120#M299057</link>
      <description>&lt;P&gt;ElectroDan-&lt;/P&gt;&lt;P&gt;Interesting to read your post, i'm in pretty much the same boat. So I can sympathize with your struggles, I'm dealing with almost the same thing. One thing I wanted to mention is to be sure that your NPS Network Policy is configured per the Meraki Documentation for 802.1X authentication (in addition to having your RADIUS Clients portion configured) since I found it needed both in order to test from the Meraki Dashboard. Check the following:&lt;/P&gt;&lt;P&gt;- The right certificate is selected under the NPS Policy &amp;gt; Constraints Tab &amp;gt; Microsoft: Protected EAP (PEAP) options &amp;gt; Edit Protected PEAP Properties&lt;/P&gt;&lt;P&gt;- The "Conditions" allow the proper AD user groups to authenticate ex: DOMAIN\Domain Users&lt;/P&gt;&lt;P&gt;So, i've gone through much of what you've already outlined and get the same interesting behavior. Macs and Apple IOS devices can successfully authenticate against AD using RADIUS, but only after they "Trust" the AD CS certificate used on our Domain. &lt;/P&gt;&lt;P&gt;Our workstation environment consists of almost exclusively Windows 10 PC's and they all seem to do the same thing when a user tries to connect to wifi in the building:&lt;/P&gt;&lt;P&gt;1) Get prompted to authenticate (check "use my windows user account" or manually type in AD creds)&lt;/P&gt;&lt;P&gt;2) Windows prompts about the certificate. The thumbprint matches a cert issued by a trusted AD intermediate CA, user accepts&lt;/P&gt;&lt;P&gt;3) Immediately get a prompt "Can't connect to this network"&lt;/P&gt;&lt;P&gt;NPS doesn't give any useful output, and I know its validating accounts since iPhones and Mac OSX computers are able to get onto the wireless network.&lt;/P&gt;&lt;P&gt;There are never any reject or denied message in NPS logging (see below)&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;Network Policy Server granted access to a user.&lt;/P&gt;&lt;P&gt;User:&lt;BR /&gt;Security ID: DOMAIN\user.name&lt;BR /&gt;Account Name: &lt;SPAN&gt;user.name&lt;/SPAN&gt;&lt;BR /&gt;Account Domain: DOMAIN&lt;BR /&gt;Fully Qualified Account Name: &lt;SPAN&gt;DOMAIN\user.name&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Client Machine:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Fully Qualified Account Name: -&lt;BR /&gt;Called Station Identifier: E2-CB-AC-B5-5B-0A:SSID NAME&lt;BR /&gt;Calling Station Identifier: 80-B0-3D-7F-EA-EA&lt;/P&gt;&lt;P&gt;NAS:&lt;BR /&gt;NAS IPv4 Address: 10.2.X.X&lt;BR /&gt;NAS IPv6 Address: -&lt;BR /&gt;NAS Identifier: 0bb3dca34b449637d61c5e0a6f2590af2dc7d2e9eff19b8a&lt;BR /&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;BR /&gt;NAS Port: 1&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;BR /&gt;Client Friendly Name: Meraki APs&lt;BR /&gt;Client IP Address: 10.2.X.X&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;BR /&gt;Connection Request Policy Name: Meraki&lt;BR /&gt;Network Policy Name: Meraki&lt;BR /&gt;Authentication Provider: Windows&lt;BR /&gt;Authentication Server: DOMAINDC01.domain.local&lt;BR /&gt;Authentication Type: PEAP&lt;BR /&gt;EAP Type: Microsoft: Secured password (EAP-MSCHAP v2)&lt;BR /&gt;Account Session Identifier: 46353632394546364635453539383730&lt;BR /&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I'm at a loss. I think this is a certificate issue on the windows end stations, but i am not sure how to fix this. I'd like to avoid having to push out a GPO to get this going. We have a large traveling workforce that doesn't always get GPO updates in a timely manner because they are off the domain most of the time.&lt;/P&gt;&lt;P&gt;UPDATE:&lt;/P&gt;&lt;P&gt;I was able to get this resolved / working. Make sure that &lt;STRONG&gt;Wireless &amp;gt; Access Control &amp;gt; 802.11r&lt;/STRONG&gt; is set to "Adaptive" (not Enabled). I think at one point we had turned this on. The tooltip description of what 802.11r made me think it only applied to old systems, not the Windows 10 computers we were having problems with.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;802.11r technology reduces overhead when a client roams from one AP to another, delivering a more seamless transition. "Enabled" will activate 802.11r for devices that support it, though some legacy clients may not be able to join the network. "Adaptive" enables a custom version of 802.11r just for Apple iOS devices. Very few devices will have compatibility challenges with the "Adaptive" mode.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The description is misleading in that I didn't think it applied to our Windows 10 systems since they're not really legacy devices, yet. &lt;SPAN class="lia-unicode-emoji" title=":winking_face:"&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Nov 2018 21:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492120#M299057</guid>
      <dc:creator>aekinaka_red</dc:creator>
      <dc:date>2018-11-20T21:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492121#M299058</link>
      <description>&lt;P&gt;I've had a go at that, however the link for &lt;SPAN&gt;rootsupd.exe is dead. I'll need to find an alternative.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 10:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492121#M299058</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T10:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492122#M299059</link>
      <description>&lt;P&gt;Okay so the Security Event Log shows this on the NPS server. I'm guessing it's trying to authenticate the computer rather than the user?:&lt;/P&gt;&lt;P&gt;Network Policy Server denied access to a user.&lt;/P&gt;&lt;P&gt;Contact the Network Policy Server administrator for more information.&lt;/P&gt;&lt;P&gt;User:&lt;BR /&gt;Security ID: MYDOMAIN\ITSPARE01$&lt;BR /&gt;Account Name: host/ITSPARE01.mydomain.local&lt;BR /&gt;Account Domain: MYDOMAIN&lt;BR /&gt;Fully Qualified Account Name: mydomain.local/Mydomain/UK/Computers/ITSPARE01&lt;/P&gt;&lt;P&gt;Client Machine:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Fully Qualified Account Name: -&lt;BR /&gt;Called Station Identifier: 9A-15-54-AB-52-67:Radius_Test&lt;BR /&gt;Calling Station Identifier: 84-3A-4B-56-F4-5C&lt;/P&gt;&lt;P&gt;NAS:&lt;BR /&gt;NAS IPv4 Address: 10.32.108.26&lt;BR /&gt;NAS IPv6 Address: -&lt;BR /&gt;NAS Identifier: -&lt;BR /&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;BR /&gt;NAS Port: -&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;BR /&gt;Client Friendly Name: Meraki - Purchasing&lt;BR /&gt;Client IP Address: 10.32.108.26&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;BR /&gt;Connection Request Policy Name: Meraki Staff Secure Wireless Connections&lt;BR /&gt;Network Policy Name: Connections to other access servers&lt;BR /&gt;Authentication Provider: Windows&lt;BR /&gt;Authentication Server: DC03.mydomain.local&lt;BR /&gt;Authentication Type: EAP&lt;BR /&gt;EAP Type: -&lt;BR /&gt;Account Session Identifier: 33364144324231353946353331303231&lt;BR /&gt;Logging Results: Accounting information was written to the local log file.&lt;BR /&gt;Reason Code: 65&lt;BR /&gt;Reason: The Network Access Permission setting in the dial-in properties of the user account in Active Directory is set to Deny access to the user. To change the Network Access Permission setting to either Allow access or Control access through NPS Network Policy, obtain the properties of the user account in Active Directory Users and Computers, click the Dial-in tab, and change Network Access Permission.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 11:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492122#M299059</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T11:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492123#M299060</link>
      <description>&lt;P&gt;I was really hopeful with your suggestion on &lt;SPAN&gt;802.11r, however I don't seem to have an 802.11r section in my dashboard! Searching for it just takes me to the Access Control page but the nearest thing to that on the page is 802.11w.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 11:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492123#M299060</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T11:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492124#M299061</link>
      <description>&lt;P&gt;Okay, so working through the Event Viewer Security log, seems my user account is blocked from dial-in in my AD user properties. I don't recall this being mention in ANY of the guides I've read?!&lt;/P&gt;&lt;P&gt;I've opened my AD user properties, navigated to the Dial-in tab, changed Network Access Permission to 'Control access through NPS Network Policy', then rebooted my laptop but no joy. I then changed it to 'Allow access' but still no joy. I made these changes on my local domain controller, but I'll try again in an hour or so in case it's referring to another DC for some reason.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 12:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492124#M299061</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T12:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492125#M299062</link>
      <description>&lt;P&gt;Have gotten a bit further.&lt;/P&gt;&lt;P&gt;With my user profile in AD set to 'Allow access' under the Dial-in tab, and the computer account having always been set to &lt;SPAN&gt;'Control access through NPS Network Policy', I now see in Event Viewer on the NPS server:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Network Policy Server denied access to a user.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Reason Code: 66&lt;BR /&gt;Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 14:29:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492125#M299062</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T14:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492126#M299063</link>
      <description>&lt;P&gt;I've now found out that if I remove the Machine Group from NPS &amp;gt; Policies &amp;gt; Network Policies &amp;gt; MyPolicy &amp;gt; Conditions, I don't get anything logged in the Security Event Log.&lt;/P&gt;&lt;P&gt;Once I add that back in, I see log entries again.&lt;/P&gt;&lt;P&gt;Still failing though with:&lt;/P&gt;&lt;P&gt;Reason Code: 66&lt;BR /&gt;Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 14:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492126#M299063</guid>
      <dc:creator>ElectroDan</dc:creator>
      <dc:date>2018-11-22T14:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1X EAP failure with Windows AD Radius - Help!</title>
      <link>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492127#M299064</link>
      <description>&lt;P&gt;Strange that there is no 802.11r options in your Dashboard. I'm not sure how Meraki includes / excludes features (AP type? Licensing?). Like I said, this was the fix for us.&lt;/P&gt;&lt;P&gt;I'm looking at your NPS logs and its definitely trying to authenticate a computer account (as opposed to a user security group), is this by design? You will need to have a matching NPS policy which allows the AD computer group(s) under NPS &amp;gt; Policies &amp;gt; Network Policies &amp;gt; (policy name) &amp;gt; Properties &amp;gt; "Conditions" Tab.&lt;/P&gt;&lt;P&gt;I didn't realize that you can have Dial-in properties on computer accounts too. I suspect that this is also set to "Control access through NPS Network Policy".&lt;/P&gt;&lt;P&gt;It may be necessary to create a GPO as outlined here: &lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise#(Optional)_Deploy_a_PEAP_Wireless_Profile_using_Group_Policy" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise#(Optional)_Deploy_a_PEAP_Wireless_Profile_using_Group_Policy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In order for these machine accounts to manually trust your Active Directory root and intermediate CAs and boot up with the correct wireless profile with SSID configured, etc.&lt;/P&gt;&lt;P&gt;Are you applying a GPO like this to the OU that contains the computer accounts that are trying to connect?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 17:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-1x-eap-failure-with-windows-ad-radius-help/m-p/5492127#M299064</guid>
      <dc:creator>aekinaka_red</dc:creator>
      <dc:date>2018-11-22T17:41:15Z</dc:date>
    </item>
  </channel>
</rss>

