Solved

Wireless Network on Tablet PCs

Posted on 2010-09-14
8
637 Views
Last Modified: 2013-12-27
All,

I have been on the phone with Dell for the last 3 hours trying to get something resolved with this, so hopefully you all can lend a hand;

I currently have 13 tablet PCs all of which are on a domain and on Windows 7 Pro.  All of them have the 'automatically connect to this network' setting checked on the Wireless Network.

My problem is that the network is not visible to the tablet until a user is successfully logged on.  This being the case, no domain user is able to authenticate successfully because there's no logon server visible to the machine when on the Logon Screen.  

I can plug in a network cable, and authenticate, and once the user's settings are loaded, the wireless connection goes from disconnected to connected.  Likewise with a local user.  

Is the wireless connection not able to be viewed by the tablet until a user's profile is successfully loaded?  If so, how in the world is this a viable solution within an enterprise environment???

The WAPs are all SonicPoints if that helps any.  Domain Controller is a Windows Server 2008R2.

Any help would be much appreciated!!!
0
Comment
Question by:ben9035
  • 4
  • 2
  • 2
8 Comments
 

Author Comment

by:ben9035
ID: 33677833
Correction....WAPs are Cisco Aeronets, use WPA2, and are wireless N
0
 
LVL 7

Expert Comment

by:fefo_33065
ID: 33678010
Ok Ben, there are about four possible solutions to your problem in the following forum (i think the ones towards the bottom are best):

http://social.answers.microsoft.com/Forums/en-US/w7network/thread/daabd8b1-a400-437c-bb43-dd867083e69c

I hope this works.
0
 
LVL 7

Expert Comment

by:fefo_33065
ID: 33678012
Don't forget this also:

"Also please verify with the WLAN service is started  and set to automatic, if the WLAN service is stopped, I would suggest you to start the service and put it to automatic."
0
 
LVL 20

Expert Comment

by:Jakob Digranes
ID: 33679192
how do users authenticate?
WPA-PSK or 802.1x ?
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 

Author Comment

by:ben9035
ID: 33684702
The PCs use WPA2 to connect, but the users themselves authenticate through AD.
0
 
LVL 20

Expert Comment

by:Jakob Digranes
ID: 33686116
do you enter static keys for the wireless?
If so - go to group policies on server and ocnfigure administrative setting to "Wait for network before logon"
0
 

Author Comment

by:ben9035
ID: 33878617
I disabled autotuninglevel via netsh and everything works again.  Thanks for your input guys.
0
 

Accepted Solution

by:
ben9035 earned 0 total points
ID: 33878629
For Future reference, the command I ran in an elevated command prompt was

netsh interface tcp set global autotuninglevel=disabled
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now