<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518018#M306971</link>
    <description>&lt;P&gt;What was the Windows version prior to deploying the cumulative updates?&lt;/P&gt;&lt;P&gt;As &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/51406"&gt;@alessandrodematos&lt;/A&gt; said, Microsoft introduced additional security measures with 802.1x certificates and NPS. This was introduced last year with an option to ignore but became mandatory earlier this year.&lt;/P&gt;&lt;P&gt;Additionally, what are the NPS event logs showing?&lt;/P&gt;&lt;P&gt;The error there should give some indication of where to look.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jul 2025 23:56:18 GMT</pubDate>
    <dc:creator>Brash</dc:creator>
    <dc:date>2025-07-07T23:56:18Z</dc:date>
    <item>
      <title>Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518016#M306969</link>
      <description>&lt;P&gt;We have 6 sites that each have a DC.  The DC also operates as the Windows NPS (Network Policy Server) performing the RADIUS authentication.  We have an SSID setup called "Secured" configured as follows:&lt;BR /&gt;&lt;BR /&gt;Security - Enterprise with my RADIUS server&lt;/P&gt;&lt;P&gt;WiFi Personal Network - Disabled&lt;/P&gt;&lt;P&gt;WPA Encryption - WPA2 Only&lt;/P&gt;&lt;P&gt;802.11r - Disabled&lt;/P&gt;&lt;P&gt;802.11w - Disabled&lt;/P&gt;&lt;P&gt;Splash Page - None&lt;/P&gt;&lt;P&gt;RADIUS is on site DC using port 1812&lt;/P&gt;&lt;P&gt;External DHCP in Bridge mode&lt;/P&gt;&lt;P&gt;I followed this article (or a similar previous one) using the NPS +AD configuration:&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_blank" rel="nofollow noopener noreferrer"&gt;Configuring RADIUS Authentication with WPA2-Enterprise - Cisco Meraki Documentation&lt;/A&gt;&lt;/P&gt;&lt;P&gt;All the domain computers are setup with a GPO that has them auto-enroll and auto-renew their certificates.  They expire at random times so it is not due to a expiration on the client.  The Windows CA server does not appear to expire until mid 2027.&lt;/P&gt;&lt;P&gt;This has been working perfectly for about 2 years, but over the weekend we applied the Windows Server 2022 21H2 Cumulative Update for 2025-06.  This morning we discovered that the Secured wireless SSID could no longer authenticate any clients on that SSID.&lt;/P&gt;&lt;P&gt;We have 3 other SSIDs that did not appear to be affected.  A Guest that uses sponsored logons.  An Employee Personal that also uses sponsored logons.  The third also uses RADIUS, but only does MAC authentication and appears to work fine.&lt;/P&gt;&lt;P&gt;We also use the AnyConnect client for VPN access and also have that setup with Certificate authentication as well (user based certs).  This appears to be working fine.&lt;/P&gt;&lt;P&gt;Nothing other than applying that cumulative update was done over the weekend.  All the servers were rebooted a couple of times and rechecked for any additional patches just to be sure they are up to date until our next maintenance window.&lt;/P&gt;&lt;P&gt;Just curious if anyone else has experience something similar after applying a cumulative update.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 19:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518016#M306969</guid>
      <dc:creator>JordanN</dc:creator>
      <dc:date>2025-07-07T19:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518017#M306970</link>
      <description>&lt;P&gt;It's a little older., but, according to Microsoft KB5043417, the update introduced a security enhancement that enforces stricter compliance with RADIUS standards.&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5043417-radius-authentication-to-nps-might-fail-with-the-july-2024-security-update-and-later-updates-1a9d6cd4-5f8a-40eb-b2d6-f3a11cc0c308" target="_blank" rel="nofollow noopener noreferrer"&gt;KB5043417: RADIUS authentication to NPS might fail with the July 2024 security update and later updates - Microsoft Support&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In this case, please make sure your Meraki devices are running the latest firmware, and if possible I suggest you open a support case.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 20:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518017#M306970</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2025-07-07T20:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518018#M306971</link>
      <description>&lt;P&gt;What was the Windows version prior to deploying the cumulative updates?&lt;/P&gt;&lt;P&gt;As &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/51406"&gt;@alessandrodematos&lt;/A&gt; said, Microsoft introduced additional security measures with 802.1x certificates and NPS. This was introduced last year with an option to ignore but became mandatory earlier this year.&lt;/P&gt;&lt;P&gt;Additionally, what are the NPS event logs showing?&lt;/P&gt;&lt;P&gt;The error there should give some indication of where to look.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 23:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518018#M306971</guid>
      <dc:creator>Brash</dc:creator>
      <dc:date>2025-07-07T23:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518019#M306972</link>
      <description>&lt;P&gt;The servers are all Windows Server 2022.  Proir to applying the Cumulative Update 2025-06, it could have been a year since they were all patched because we only shutdown for maintenance once a year.  The only other significant patch that was applied was a .Net cumulative update as well. &lt;/P&gt;&lt;P&gt;In the meraki dashboard in the connection log, I am seeing these messages:&lt;BR /&gt;&lt;BR /&gt;Client failed 802.1X authentication to the RADIUS server.&lt;BR /&gt;auth_mode='wpa2-802.1x' radius_proto='ipv4' radius_ip='192.168.xxx.yyy' reason='radius_login_failure' radio='1' vap='3' channel='44' rssi='30'&lt;/P&gt;&lt;P&gt;In Windows Event viewer I am seeing:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Event ID 39&lt;/P&gt;&lt;P&gt;Kerberos-Key-Distribution-Center&lt;/P&gt;&lt;P&gt;The Key Distribution Center (KDC) encountered a user certificate that was valid but could not be mapped to a user in a secure way (such as via explicit mapping, key trust mapping, or a SID). Such certificates should either be replaced or mapped directly to the user via explicit mapping. See &lt;A href="https://go.microsoft.com/fwlink/?linkid=2189925" target="_blank" rel="noopener nofollow noreferrer"&gt;https://go.microsoft.com/fwlink/?linkid=2189925&lt;/A&gt; to learn more.&lt;/P&gt;&lt;P&gt;User: &lt;STRONG&gt;mycomputer&lt;/STRONG&gt;$&lt;BR /&gt;Certificate Subject: @@@CN=&lt;STRONG&gt;ABC-USERPC&lt;/STRONG&gt;.corp.&lt;STRONG&gt;mydomain&lt;/STRONG&gt;.com&lt;BR /&gt;Certificate Issuer: corp-myCAServerName&lt;BR /&gt;Certificate Serial Number: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;Certificate Thumbprint: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;Certificate Issuance Policies:&lt;/P&gt;&lt;P&gt;It could just be that I need to update my configurations on my NPS servers (DCs).  My Meraki firmware is up to date as of less than one month ago.  Is there a new article on how to configure wireless clients to use NPS + AD authentication?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 02:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518019#M306972</guid>
      <dc:creator>JordanN</dc:creator>
      <dc:date>2025-07-08T02:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518020#M306973</link>
      <description>&lt;P&gt;As the NPS error indicates, this is due to the introduction of strong mapping for certificates.&lt;/P&gt;&lt;P&gt;From memory, the actual change for this is with the update on the domain controller, not the NPS.&lt;/P&gt;&lt;P&gt;You will need to look at implementing some sort of strong mapping for certificates and reissuing them.&lt;/P&gt;&lt;P&gt;For anything domain joined, newly issued certificates will automatically have the strong mapping. Existing certificates need to be re-issued to have the strong mapping.&lt;/P&gt;&lt;P&gt;For Intune SCEP certificates, you need to update your SCEP configuration and reissue certificates&lt;/P&gt;&lt;P&gt;For anything else non-domain joined, you need to look at the applicable documentation for what option is best.&lt;/P&gt;&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16" target="_blank" rel="noopener nofollow noreferrer"&gt;KB5014754: Certificate-based authentication changes on Windows domain controllers - Microsoft Support&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 03:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518020#M306973</guid>
      <dc:creator>Brash</dc:creator>
      <dc:date>2025-07-08T03:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518021#M306974</link>
      <description>&lt;P&gt;Thank Brash,&lt;/P&gt;&lt;P&gt;One thing I forgot to include in my original post was that only 1 site's DC was still working.  It got the same updates over the weekend, but this one is still working wich is unexpected given all the info you and others have provided.  &lt;/P&gt;&lt;P&gt;I pointed all the Meraki sites SSIDs to that DC to get back up and running, but after reading the article you posted, I am wondering if this is just a ticking timebomb and will fail in &lt;SPAN&gt;September 2025.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 12:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518021#M306974</guid>
      <dc:creator>JordanN</dc:creator>
      <dc:date>2025-07-08T12:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Clients no longer connecting after updating Windows Server 2022 with 2025-06 update</title>
      <link>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518022#M306975</link>
      <description>&lt;P&gt;After doing some more research on the issue I would like to see if the steps I have put together will resolve the issue.  It appears as though the problem is my clients are getting a Schema 1 version of a certificate (Windows 2003/XP compatible) instead of at least Schema 3 versions or higher with of a cert template.&lt;/P&gt;&lt;P&gt;Here is what I have setup ready to deploy  &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Copy the certificate template that I am currently using to a new template "MyComputersV4"&lt;/LI&gt;&lt;LI&gt;Change the compatibility to Server 2016 for Cert Authority&lt;/LI&gt;&lt;LI&gt;Change the compatibility to Server 2016/ Windows 10 for Cert Recipient&lt;/LI&gt;&lt;LI&gt;On Crypto tab, change Provider Category from Legacy to Key Storage Provider&lt;/LI&gt;&lt;LI&gt;Algorithm set to RSA&lt;/LI&gt;&lt;LI&gt;Min Key Size to 2048&lt;/LI&gt;&lt;LI&gt;Select Microsoft Key Storage Provider from the Providers list&lt;/LI&gt;&lt;LI&gt;Set Has to SHA256&lt;/LI&gt;&lt;LI&gt;Temporarly unchecked Auto Enroll for Domain Computers on security tab &lt;/LI&gt;&lt;LI&gt;Added the new "MyComputersV4" to the Certificate template list so it can be deployed later.  Left my old "MyComputers" template as is for now until I cut over.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;When ready to deploy I can adjust the security to Enable the Enroll and Auto Enroll settings on the new template and disable them on the old tempates.  After force a script down to the computers to run:&lt;BR /&gt;&lt;BR /&gt;gpupdate /force&lt;/P&gt;&lt;P&gt;certutil -pulse&lt;/P&gt;&lt;P&gt;I think this should get the clients up to date, but I should I also be doing something similar for the Domain Controller template?  I see that this is still Schema version 1.  Do the DCs templates need to be updated?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 15:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radius-clients-no-longer-connecting-after-updating-windows/m-p/5518022#M306975</guid>
      <dc:creator>JordanN</dc:creator>
      <dc:date>2025-07-08T15:13:07Z</dc:date>
    </item>
  </channel>
</rss>

