Hello,
According to the information you provided, there may be errors in the nps policy configuration. I suggest you refer to the following:
The following is the authentication method of mac bypass for your reference. In this method, the client can use the MAC address as the username and password for verification;
The drawback of this method is that you need to know the MAC address of each device. Specific steps:
- Create the accounts required for MAC Bypass in AD and put these accounts into a MAC Bypass group.
NOTE: The account password setting must comply with the requirements of the access device. For example, Cisco requires that the username and password are both mac addresses.
For example:
User: 001122334455
Pass: 001122334455
- NPS sets some registry keys. We need to configure the registry key "User Identity Attribute"; this is to allow the NPS server to support MAC Bypass;
Registry path: HKLM\SYSTEM\CurrentControlSet\Services\RemoteAccess\Policy
Registry key: User Identity Attribute
Registry value: 31 (dword:0000001f)
The user ID attribute does not exist by default. You can try to create it and then modify its key name and value.
- Create Network Policies on the NPS server:
Policy Name: Mac Bypass
Conditions: Add the local group MAC Bypass created in step 1 to User group.
Constrains: Authentication Methods Only need to select Unencrypted authentication (PAP, SPAP)
Settings: If you need to put the client accessed through MAC Bypass into a specific VLAN, you can configure the three attributes in the figure below. For example, in the figure below, the client will be assigned to VLAN 10
• Tunnel-Medium-Type:802
• Tunnel-Pvt-Group-ID: The VLAN ID you wish to use, in this case 10
• Tunnel-Type: Virtual LANs (VLAN)
•
The above are the settings for NPS server to support MAC Bypass. In fact, MAC Bypass also requires the support of the switch/AP. This function on some devices is called mac bypass or mac filtering. This is because this authentication occurs when the client cannot provide the username and password. The access device usually will not continue to request authentication from the background radius (because there is no username password). However, when this function is enabled, if the access device supports mac authorization, it will continue to use the mac address as the authentication credential.
Refer link:http://technet.microsoft.com/en-us/library/dd197535(v=ws.10).aspx
Best regards
Zunhui