Solved

Network Policy and access services failing

Posted on 2016-09-29
2
62 Views
Last Modified: 2016-10-16
Hi,

We have 3 SSIDs for Wireless, SSIDs for phones are working, but for laptops wireless has stopped working, no changes has been made, it was working fine till yesterday. Radius server is full of error logs, which I tried to troubleshoot, but haven't been successful.
Symptoms are when we try to connect to Wireless on laptops it keeps on waiting for Authentication and then it fails to connect.
I have tried to manually add the connection, didn't work, deleted the old wireless connection, generated the certificate from the certification authority server (Which is also Radius Server) re-applied it, didn't work.
I have attached a screenshot of Event Viewer Errors, kindly see and let me know what can I try?

Regards.
Wireless.jpg
Wireless1.jpg
0
Comment
Question by:Leo
2 Comments
 
LVL 22

Assisted Solution

by:eeRoot
eeRoot earned 250 total points
ID: 41822385
Can you temporarily disable the certificate authentication to see if laptops can then connect?  Can you check the certificate on the laptops and verify that it has not expired or been removed?
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 250 total points
ID: 41822711
Reset the shared secret at the WLC and NPS. That usually sorts message-authenticator errors.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now