Our VPN solution uses a 2 stage authentication process. X.509 Certificate authentication, followed by Windows NT authetication via an ACS. For every user, the first connection attempt to the concentrator fails. Logs show the Certificate and Window...