I'm back on this now Christmas is out of the way 🙂
I had some default policies still enabled on my 2016 NPS Server, which I've disabled. They were:
Connection Request Policies > Use Windows authentication for all users.
Network Policies > Connections to other access servers.
Network Policies > Connections to Microsoft Routing and Remote Access server.
With those 3 disabled, I'm no longer getting the following Information level event logged in Event Viewer:
Reason code: 66
Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.
Instead, I am now getting:
Reason code: 48
Reason: The connection request did not match any configured network policy.
I have 3 conditions set for the Staff WiFi Network Policy:
Condition: NAS Port Type, Value: Wireless - IEEE 802.11 OR Wireless - Other
Condition: User Groups, Value: MYDOMAIN\Meraki Staff Group
Condition: Machine Groups, Value: MYDOMAIN\Meraki Computer Group
The laptop I'm testing on is a member of the Meraki Computer Group, and the user account I'm logged on with belongs to the Meraki Staff Group.
I get a 'Reason Code: 48' event logged twice each time I try to connect; first for the user, then 10 seconds later for the machine:
-------------------------------------------------------------------------------------------------------------
Network Policy Server denied access to a user.
Contact the Network Policy Server administrator for more information.
User:
Security ID: MYDOMAIN\ElectroDan
Account Name: MYDOMAIN\ElectroDan
Account Domain: MYDOMAIN
Fully Qualified Account Name: MYDOMAIN\ElectroDan
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
Called Station Identifier: 9A-15-54-AB-52-67:Radius_Test
Calling Station Identifier: 84-3A-4B-56-F4-5C
NAS:
NAS IPv4 Address: 10.99.108.26
NAS IPv6 Address: -
NAS Identifier: -
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: -
RADIUS Client:
Client Friendly Name: Meraki - Purchasing
Client IP Address: 10.99.108.26
Authentication Details:
Connection Request Policy Name: WiFi_Staff
Network Policy Name: -
Authentication Provider: Windows
Authentication Server: DC03.mydomain.local
Authentication Type: EAP
EAP Type: -
Account Session Identifier: 41413346334133424138354636383335
Logging Results: Accounting information was written to the local log file.
Reason Code: 48
Reason: The connection request did not match any configured network policy.
-------------------------------------------------------------------------------------------------------------
Network Policy Server denied access to a user.
Contact the Network Policy Server administrator for more information.
User:
Security ID: MYDOMAIN\ITSPARE01$
Account Name: host/ITSPARE01.mydomain.local
Account Domain: MYDOMAIN
Fully Qualified Account Name: MYDOMAIN\ITSPARE01$
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
Called Station Identifier: 9A-15-54-AB-56-2D:Radius_Test
Calling Station Identifier: 84-3A-4B-56-F4-5C
NAS:
NAS IPv4 Address: 10.99.108.25
NAS IPv6 Address: -
NAS Identifier: -
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: -
RADIUS Client:
Client Friendly Name: Meraki - Accounts
Client IP Address: 10.99.108.25
Authentication Details:
Connection Request Policy Name: WiFi_Staff
Network Policy Name: -
Authentication Provider: Windows
Authentication Server: DC03.mydomain.local
Authentication Type: EAP
EAP Type: -
Account Session Identifier: 41433342464337434233394535444334
Logging Results: Accounting information was written to the local log file.
Reason Code: 48
Reason: The connection request did not match any configured network policy.
-------------------------------------------------------------------------------------------------------------
A couple of things I've noticed.
1) The machine account (MYDOMAIN\ITSPARE01$) is being listed in the User section, and the Client Machine section is empty.
2) The 2nd entry (for MYDOMAIN\ITSPARE01$) is registering via a different AP (Meraki - Accounts). Both AP's are within range of my test laptop.
Fun.
Not.