- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Radius Connection Issue
setting up Radius Authentication for our corp network.
followed the instruction in terms of NPS but when i test the radius server it fails to connect. it doesnt give out any other error.
i checked the radius server and i have added the AP and went through event logs but i cant find any failures under security logs.
NPS logs doesnt have any record.
i am able to ping the radius server from the subnet i am on.
any other pointers or location i need to check.
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
its all sorted.
stupidest thing fixed the issue. not really sure how or why its fixed but its fixed.
IT 101 reboot the bloody NPS server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That typically happens when the RADIUS key does not match.
In NPS (at least in Server 2012R2 or better) you can assign a subnet that all clients are in (such as 10.0.0.0/8) and a common key. This makes it easy to leave Meraki devices configured to use DHCP (like access points).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i am running this on Server 2012.
but if its a bad key shouldnt i see it somewhere??
i am using radius only for corp network and the ip's will be forwarded via dhcp from our lan.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Nope. It logs nothing - nudda - if the key is wrong.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
great.
any other possibilities of why this is not working?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
@PhilipDAth is likely correct, the most common issue is a mismatched shared secret between the AP and RADIUS server, but it could sometimes be fat-fingered IP address settings and a UDP port mismatch (make sure it's using 1812 and not some other port like 1645). Any of those things would likely cause radio silence from the RADIUS server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
its definitely 1812 and i have confirmed the password with 2 different people its definetly right.
i am using my account with and without domain prefix and confirmed the password.
my admin account has access to NPS server so i am not sure what else can be wrong.
this is is annoying the living daylights out of me.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you using an actual wireless client/supplicant or the "Test" button on the Access Control page in Dashboard? You already ran packet captures and/or ran it by Support to assist with some pcaps? Let's see what is or isn't traversing the AP.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i am doing test via dashboard of meraki
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I have had issues with NPS many times where it doesn't log anything to the event viewer, like it should. Enable the option to log to a TXT file. By default it writes it out to:
c:\windows\system32\LogFiles
And the files begin with IN*. As long as the RADIUS secret is correct it will log success and failed responses there. They are a pain to read.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Philip,
i did check that location but i dont see any files with IN. all i see are multiple subfolders but nothing says as radius server related.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
In NPS right click the NPS server and select "properties". Make sure you have ticked to logged accepted and rejected connections.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
logs are ticked for authentication success n reject.
iam verifying your other reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
yup i have all that.
removed the checks under constraints and testing now.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Lets check some basics (I'm assuming you are using WPA2-Enterprise mode):
- Are you running an Enterprise CA?
- Have you requested a certificate from that CA for the NPS server?
- In Policies/Network Profiles:
- On the Overview tab tick "Ignore user account dial-in properties"
- I normally set a "Condition" that Nas-Port-Type=Wireless
- Under "Constraints/Authentication Methods" un-tick all methods. Add PEAP. Edit PEAP and make sure the certificate you requested above is selected. Under EAP-Types make sure only EAP-MSCHAPv2 is selected.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
will try this and let you know
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
And this is how the access points are setup (using the "Everything else" name).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
currently i have only added AP ip which is on different subnet compared to our corporate subnet.
so not sure if there is a point of adding the entire subnet
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What connects these two subnets? Layer 3 switch, router, firewall?
Does the NPS server run antivirus that also contains a firewall?
Is Windows Firewall enabled on the NPS server? If so, has it got an exclusion for the 1812 and 1813 ports?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i might have to check the certificate its getting.
to my understanding all my settings are correct.
going through the certifcate requirement for this. let me see how i go.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
its all sorted.
stupidest thing fixed the issue. not really sure how or why its fixed but its fixed.
IT 101 reboot the bloody NPS server.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
For what it's worth, I was having this exact same issue with a Windows Server 2019 VM running NPS. Meraki could not connect to it, the key was right, the settings were right, everything was right. I rebooted the server and it suddenly started working.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can I ask you this?
My MR42s gave been crapping out only on one of the radius SSIDs.
Did you notice something similar.
They could connect to NPS, but not to internet. sporadic in random parts of the building.
Is there a way to scedule weekly AP reboots all at once and I could just run them on Saturday at like 3am?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thank you! This helped as the AP was relocated from another location and assigned new IP. I had to remove the AP from NPS and re-add with new IP/manual generated password. WORKED!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Had an issue where a few clients were not connecting to the WIF
- Radius, NPS, Computer Based Cert Auth, ADCS
- Certs OK on client and NPS
Other clients were connecting OK but my laptop and desktop seemed to not want to connect, wasnt even getting NPS radius reject messages on NPS, only on the meraki Dash.
Resolution,
It seems to be a problem with Win 10 21H2 and TPM (i have TPM2.0), i disabled TPM and wifi connects OK
Just to throw something out there about this issue
KT
