?
Solved

Network Policy Server

Posted on 2010-08-22
4
Medium Priority
?
405 Views
Last Modified: 2013-11-21
Hi All,

  I have setup a Network Policy Server on Windows Server 2008 R2. I have RADIUS authenication setup for our wireless network. However, they can only join when there computer is joined to the domain, they a user not connected to the domain cannot just specify DOMAIN/USERNAME & Password when joining from a different computer. Is there anyway to allow this? Is this normal?
0
Comment
Question by:DMayo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 4

Expert Comment

by:vickzz
ID: 33498783
What kind of method are you using to connect Wireless Clients?

You may want to use PEAP with MSCHAP v2 for Non-Domain machines.
 
Here are the requirements.
 http://technet.microsoft.com/en-us/library/cc772401(WS.10).aspx
0
 

Author Comment

by:DMayo
ID: 33502516
I am using MSCHAPv2.
0
 
LVL 4

Accepted Solution

by:
vickzz earned 2000 total points
ID: 33502583
Make sure you have Root Cert added to Trusted Root Store and machine configured for User Authentication.
0
 
LVL 4

Expert Comment

by:vickzz
ID: 33502735
Check this out:
http://social.technet.microsoft.com/Forums/en-US/winserverNAP/thread/3618b47c-b73f-4362-bff8-ee730adbcc3f
Make sure you uncheck option mentioned in the above link as it contains a screenshot of the same.
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question