I have been tasked with troubleshooting an issue where Meraki WPA2-Enterprise RADIUS authentication against a Windows Server 2019 NPS server doesn't work. The NPS server OS is hardened to CIS benchmarks, only TLS 1.2 is allowed and insecure cipher suites are disabled. It was configured as outlined in the documentation: Configuring RADIUS Authentication with WPA2-Enterprise - Cisco Meraki Testing Radius authentication returns the following error: Authentication Type: PEAP EAP Type: - Account Session Identifier: - Logging Results: Accounting information was written to the local log file. Reason Code: 269 Reason: The client and server cannot communicate, because they do not possess a common algorithm. I assume this is because perhaps Meraki requires using an insecure cipher suite. Meraki support has refused to help saying that this is outside the scope of support, they haven't been able to tell me what level of TLS and what cipher suites are required to be supported by the RADIUS server. Has anyone else run in to this? Thank You.
... View more