We have 6 sites that each have a DC. The DC also operates as the Windows NPS (Network Policy Server) performing the RADIUS authentication. We have an SSID setup called "Secured" configured as follows:
Security - Enterprise with my RADIUS server
WiFi Personal Network - Disabled
WPA Encryption - WPA2 Only
802.11r - Disabled
802.11w - Disabled
Splash Page - None
RADIUS is on site DC using port 1812
External DHCP in Bridge mode
I followed this article (or a similar previous one) using the NPS +AD configuration:
Configuring RADIUS Authentication with WPA2-Enterprise - Cisco Meraki Documentation
All the domain computers are setup with a GPO that has them auto-enroll and auto-renew their certificates. They expire at random times so it is not due to a expiration on the client. The Windows CA server does not appear to expire until mid 2027.
This has been working perfectly for about 2 years, but over the weekend we applied the Windows Server 2022 21H2 Cumulative Update for 2025-06. This morning we discovered that the Secured wireless SSID could no longer authenticate any clients on that SSID.
We have 3 other SSIDs that did not appear to be affected. A Guest that uses sponsored logons. An Employee Personal that also uses sponsored logons. The third also uses RADIUS, but only does MAC authentication and appears to work fine.
We also use the AnyConnect client for VPN access and also have that setup with Certificate authentication as well (user based certs). This appears to be working fine.
Nothing other than applying that cumulative update was done over the weekend. All the servers were rebooted a couple of times and rechecked for any additional patches just to be sure they are up to date until our next maintenance window.
Just curious if anyone else has experience something similar after applying a cumulative update.