Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Attempting to authenticate

Posted on 2008-10-15
3
Medium Priority
?
3,138 Views
Last Modified: 2013-11-12
Sometimes users get the message attempting to authenticate.

We are using a Wireless Security Switch, with accesspoints connected to it. behalve that there is a IAS server and a Certificate server.
Users do get the certificaat per policy. The problem occurs in a lot of differernt locations of our company. Even microsoft doesn't have a solution for this. I was able to reproduce the problem today  twice.
First time when I changed the roam time of my wirelless NIC card in the laptop. The second time when i walked trom the 4th floor to the 5th floor.

The roam time was changed from 45 seconds to 5 seconds and also to 5 seconds to see the difference.
0
Comment
Question by:mjmatthijssen
3 Comments
 
LVL 63

Expert Comment

by:SysExpert
ID: 22721960
1) make sure you have the latest software and firmware for the switches/ APs and anything associated with this.

Also consider using packet sniffer to get more info


I hope this helps !
0
 
LVL 1

Expert Comment

by:ITSMA
ID: 22999472
This hotfix from Microsoft might hellp.

http://support.microsoft.com/kb/885453/en-us

Our clients kept getting the message attempting to authenticate until I installed it.
0
 

Accepted Solution

by:
mjmatthijssen earned 0 total points
ID: 23381333
The solution couldn't be found in the network, but it was more a client related issue.
Currently the problem appears not to all the users, but only to a couple.
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question