<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MSM 422 AP cannot authenticate on Windows NPS server in M and MSM Series</title>
    <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5944577#M1728</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;that is pretty old firmware, so I would start with an update first. The Radius auth type does not matter indeed for the 802.1x process,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,Peter&lt;/P&gt;</description>
    <pubDate>Sat, 26 Jan 2013 11:43:28 GMT</pubDate>
    <dc:creator>Peter_Debruyne</dc:creator>
    <dc:date>2013-01-26T11:43:28Z</dc:date>
    <item>
      <title>MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5939389#M1715</link>
      <description>&lt;P&gt;At one of our locations we have a setup where clients connecting to a msm422 ap in autonomous mode must authenticate on a windows NPS server using their computer-certifcate. This authentication fails and the NPS security log shows an empty EAP type. The event log on the MSM422 shows BAD EAP TYPE. Everything is setup using Micorsoft PEAP. What is going wrong ? Shoudl this setup be able to work ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2013 14:21:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5939389#M1715</guid>
      <dc:creator>Onno</dc:creator>
      <dc:date>2013-01-22T14:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5939935#M1716</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you verified that the inner PEAP authentication type is certificate (not ms-chapv2) on both the client and the NPS server ?&lt;/P&gt;&lt;P&gt;Instead of PEAP with inner auth certificate you can also use the outer auth type "Certificate" (TLS), but again make sure the NPS policy has the same config as the windows client.&lt;/P&gt;&lt;P&gt;On the client you should also verify the advanced properties and make sure the computer auth is selected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other place to look for errors is in the NPS server standard windows event logs - NPS, there you should see some messages. Feel free to post the error message if the problem remains,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,Peter&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2013 22:32:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5939935#M1716</guid>
      <dc:creator>Peter_Debruyne</dc:creator>
      <dc:date>2013-01-22T22:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5940741#M1720</link>
      <description>&lt;P&gt;Thanks for answering.I've double checked our settings. Both sides are set up with Microsoft PEAP using computer certificate. The certificates are generated on our internal PKI infrastructure using the Microsoft CA role. I was wondering if the AP needs to set up with the CA certificate in the trusted CA store for this to work. On the NPS server we see the following errors, as you can see it is not receiving or unable to determine the EAP-Type:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Contact the Network Policy Server administrator for more information.&lt;/P&gt;&lt;P&gt;User:&lt;/P&gt;&lt;P&gt;Security ID: YYYYYY&lt;/P&gt;&lt;P&gt;Account Name: XXXXXXX&lt;/P&gt;&lt;P&gt;Account Domain: ZZZZZZZ&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: YYYYYYY&lt;/P&gt;&lt;P&gt;Client Machine:&lt;/P&gt;&lt;P&gt;Security ID: NULL SID&lt;/P&gt;&lt;P&gt;Account Name: -&lt;/P&gt;&lt;P&gt;Fully Qualified Account Name: -&lt;/P&gt;&lt;P&gt;OS-Version: -&lt;/P&gt;&lt;P&gt;Called Station Identifier: intentionally removed&lt;/P&gt;&lt;P&gt;Calling Station Identifier: intentionally removed&lt;/P&gt;&lt;P&gt;NAS:&lt;/P&gt;&lt;P&gt;NAS IPv4 Address: X.Y.Z.V&lt;/P&gt;&lt;P&gt;NAS IPv6 Address: -&lt;/P&gt;&lt;P&gt;NAS Identifier: intentionaly removed&lt;/P&gt;&lt;P&gt;NAS Port-Type: Wireless - IEEE 802.11&lt;/P&gt;&lt;P&gt;NAS Port: 584&lt;/P&gt;&lt;P&gt;RADIUS Client:&lt;/P&gt;&lt;P&gt;Client Friendly Name: intentionally removed&lt;/P&gt;&lt;P&gt;Client IP Address: X.Y.Z.V&lt;/P&gt;&lt;P&gt;Authentication Details:&lt;/P&gt;&lt;P&gt;Connection Request Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Network Policy Name: Secure Wireless Connections&lt;/P&gt;&lt;P&gt;Authentication Provider: Windows&lt;/P&gt;&lt;P&gt;Authentication Server: intentionally removed&lt;/P&gt;&lt;P&gt;Authentication Type: EAP&lt;/P&gt;&lt;P&gt;EAP Type: -&lt;/P&gt;&lt;P&gt;Account Session Identifier: 65333666313264302D3030303030326435&lt;/P&gt;&lt;P&gt;Logging Results: Accounting information was written to the local log file.&lt;/P&gt;&lt;P&gt;Reason Code: 22&lt;/P&gt;&lt;P&gt;Reason: The client could not be authenticated&amp;nbsp; because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2013 12:04:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5940741#M1720</guid>
      <dc:creator>Onno</dc:creator>
      <dc:date>2013-01-23T12:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5940775#M1721</link>
      <description>&lt;P&gt;You can verify on the MSM AP on the RADIUS profile if the type is EAP (not PAP or CHAP). I thought there was no real need for this anymore, but you might want to check it anyway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried instead of "PEAP" the outer "certificate" method (on both nps and client) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which version of code is running on the AP ?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2013 12:42:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5940775#M1721</guid>
      <dc:creator>Peter_Debruyne</dc:creator>
      <dc:date>2013-01-23T12:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5942013#M1723</link>
      <description>&lt;P&gt;Based on your suggestion, I checked the setting in our Radius Profile. It is currently set to MSCHAPV2. The help however states that when using 802.1x this setting is controlled by client and radius server and that this setting has no effect. I am going to check however what happens if I change change it to the EAP MD5 setting and post the results.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the version of the AP firmware is:&amp;nbsp; &lt;SPAN class="label"&gt;Current firmware version: &lt;STRONG&gt;5.3.1.0-01-7143.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2013 07:38:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5942013#M1723</guid>
      <dc:creator>Onno</dc:creator>
      <dc:date>2013-01-24T07:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5944577#M1728</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;that is pretty old firmware, so I would start with an update first. The Radius auth type does not matter indeed for the 802.1x process,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,Peter&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jan 2013 11:43:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5944577#M1728</guid>
      <dc:creator>Peter_Debruyne</dc:creator>
      <dc:date>2013-01-26T11:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: MSM 422 AP cannot authenticate on Windows NPS server</title>
      <link>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5952249#M1750</link>
      <description>&lt;P&gt;DId you adjust your MTU setting for the radius policy?&lt;BR /&gt;&lt;BR /&gt;This applys to Windows 2003, but we had to do this in 2008 also.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A target="_blank" href="http://support.microsoft.com/kb/883389"&gt;http://support.microsoft.com/kb/883389&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Feb 2013 20:17:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/m-and-msm-series/msm-422-ap-cannot-authenticate-on-windows-nps-server/m-p/5952249#M1750</guid>
      <dc:creator>rkobiske</dc:creator>
      <dc:date>2013-02-01T20:17:26Z</dc:date>
    </item>
  </channel>
</rss>

