Hello,
I'm running into an issue with Windows 7 connecting to a WPA2-Enterprise Wireless SSID using PEAP Authentication. I recently set up a NPS on a Windows Server 2014R2 box. The Radius Client is set to our Sophos Firewall which handles our Sophos AP55's.
I've manually imported the CA on several Windows 7 SP1 and Windows 10 machines.
On the Windows 10 workstations, I manually set up the wireless connection for the SSID and it prompts for the user end authentication. I enter the creds and I am able to connect to the SSID without any issues.
On the Windows 7 machines, I manually set up with wireless connection the same as the Win10 workstations but I am unable to connect to the SSID.
Below are logs from the WLAN-Autoconfig of the Win 7 Workstation:
-----------------------------------------------------------------------
Wireless security failed.
Network Adapter: Intel(R) Dual Band Wireless-AC 7260
Interface GUID: {941fcf87-19a6-40b1-9338-879ef205cf6a}
Local MAC Address: 0C:8B:FD:CD:3A:7F
Network SSID: PSACorporate
BSS Type: Infrastructure
Peer MAC Address: 00:1A:8C:8C:04:C1
Reason: Explicit Eap failure received
-----------------------------------------------------------------------
Wireless 802.1x authentication failed.
Network Adapter: Intel(R) Dual Band Wireless-AC 7260
Interface GUID: {941fcf87-19a6-40b1-9338-879ef205cf6a}
Local MAC Address: 0C:8B:FD:CD:3A:7F
Network SSID: PSACorporate
BSS Type: Infrastructure
Peer MAC Address: 00:1A:8C:8C:04:C1
Identity: test1
User: TFrazier
Domain: PSA_NT
Reason: Explicit Eap failure received
Error: 0x80074005
EAP Reason: 0x4005
EAP Root cause String:
EAP Error: 0x4005
-----------------------------------------------------------------------
From what I can tell from the NPS logs, I assume that authentication succeeded.
User:
Security ID: PSA_NT\test1
Account Name: test1
Account Domain: PSA_NT
Fully Qualified Account Name: PSA_NT\test1
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
OS-Version: -
Called Station Identifier: 00-1A-8C-8C-04-C1:PSACorporate
Calling Station Identifier: 00-1A-6B-0D-A6-A3
NAS:
NAS IPv4 Address: -
NAS IPv6 Address: -
NAS Identifier: PSACorporate
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: 1
RADIUS Client:
Client Friendly Name: UTM
Client IP Address: 192.168.xx.160
Authentication Details:
Connection Request Policy Name: PSACorp_Wireless
Network Policy Name: PSACorp_Wireless
Authentication Provider: Windows
Authentication Server: PSADC2.xxxxx.COM
Authentication Type: PEAP
EAP Type: Microsoft: Secured password (EAP-MSCHAP v2)
Account Session Identifier: -
Quarantine Information:
Result: Full Access
Extended-Result: -
Session Identifier: -
Help URL: -
System Health Validator Result(s): -
-----------------------------------------------------------------------
Network Policy Server granted access to a user.
User:
Security ID: PSA_NT\test1
Account Name: test1
Account Domain: PSA_NT
Fully Qualified Account Name: PSA_NT\test1
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
OS-Version: -
Called Station Identifier: 00-1A-8C-8C-04-C1:PSACorporate
Calling Station Identifier: 00-1A-6B-0D-A6-A3
NAS:
NAS IPv4 Address: -
NAS IPv6 Address: -
NAS Identifier: PSACorporate
NAS Port-Type: Wireless - IEEE 802.11
NAS Port: 1
RADIUS Client:
Client Friendly Name: UTM
Client IP Address: 192.168.xx.160
Authentication Details:
Connection Request Policy Name: PSACorp_Wireless
Network Policy Name: PSACorp_Wireless
Authentication Provider: Windows
Authentication Server: PSADC2.xxxxx.COM
Authentication Type: PEAP
EAP Type: Microsoft: Secured password (EAP-MSCHAP v2)
Account Session Identifier: -
Logging Results: Accounting information was written to the local log file.
Quarantine Information:
Result: Full Access
Session Identifier: -
---------------------------------------------------------------------------------------
I've come to a road block and don't know where else too look. And recommendations would be appreciated. Thanks.
- Tim