I had a Windows 2016 server with NPS set up for radius and used EAP for secure wireless connections. works fine with Windows 10 computers and has for years. Windows 11 clients are unable to access secure wireless using EAP. I set up a new 2022 server hoping it would resolve but still having the same issues. I have read a dozen articles about TLS 1.3 and setting reg on client to use TLS 1.2 - tried that and it didnt work. Saw some things about credential guard as well but not sure thats the issue. Looking for any advice on what to look at. Hoping not to have to spend $500 to open a ticket with MS. Tried enabling TLS 1.0 / 1.1 on server just to try but that didnt work either...
Please help!
rules are security group / domain computers and using an internal CA cert for EAP with client / server authentication, trusted CA.
--- Log for success ----
Network Policy Server granted access to a user.
User:
Security ID: LOCALDOMAIN\WS0381014$
Account Name: host/WS0381014.LOCALDOMAIN.LOCAL
Account Domain: LOCALDOMAIN
Fully Qualified Account Name: LOCALDOMAIN\WS0381014$
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
Called Station Identifier: 70-4C-A5-37-C7-8A:Secure-Wireless
Calling Station Identifier: C8-E2-65-4A-1A-FA
NAS:
NAS IPv4 Address: 0.0.0.0
NAS IPv6 Address: -
NAS Identifier: 10.123.123.21/5246-Secure-Wireless
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: 1
RADIUS Client:
Client Friendly Name: AP-WS
Client IP Address: 10.123.123.1
Authentication Details:
Connection Request Policy Name: Secure Wireless Connections
Network Policy Name: Secure Wireless Connections
Authentication Provider: Windows
Authentication Server: IIS22.LOCALDOMAIN.LOCAL
Authentication Type: PEAP
EAP Type: Microsoft: Secured password (EAP-MSCHAP v2)
Account Session Identifier: 36353945314330333030303034414346
Logging Results: Accounting information was written to the local log file.
---- Log for Failure ---
Network Policy Server denied access to a user.
Contact the Network Policy Server administrator for more information.
User:
Security ID: LOCALDOMAIN\username.username
Account Name: username.username
Account Domain: LOCALDOMAIN
Fully Qualified Account Name: LOCALDOMAIN\username.username
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
Called Station Identifier: 70-4C-A5-37-C7-8A:Secure-Wireless
Calling Station Identifier: C8-E2-65-62-AE-D5
NAS:
NAS IPv4 Address: 0.0.0.0
NAS IPv6 Address: -
NAS Identifier: 10.232.240.21/5246-Secure-Wireless
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: 1
RADIUS Client:
Client Friendly Name: AP-WS
Client IP Address: 10.123.123.1
Authentication Details:
Connection Request Policy Name: Secure Wireless Connections
Network Policy Name: -
Authentication Provider: Windows
Authentication Server: IIS22.LOCALDOMAIN.LOCAL
Authentication Type: EAP
EAP Type: -
Account Session Identifier: 36353945314330333030303034394342
Logging Results: Accounting information was written to the local log file.
Reason Code: 48
Reason: The connection request did not match any configured network policy.