Wireless network connection stuck on validating identity

Rated 3.81/5 based on 889 customer reviews

I don't know how you generated your public and private key-pair for your RADIUS server but generally speaking it will either be self-signed or signed by a certificate authority.

In turn the signing certificate authority's public key will be distributed to clients, either through GPOs, Active Directory Certificate Services or it was included by Microsoft in the Trusted Root Certification Authority repository.

In production I learned pretty quickly that Windows didn't like it at all.

To avoid all this trouble, in the next iteration (i.e.

Then my Windows 10 laptop could not connect (both have connected before).

Only clients that have not disconnect from the network were still able to access it.

It's not a recommended configuration to have a external root CA sign your RADIUS server's certificate.

This is from the Free RADIUS documentation but I expect it is equal valid for the Microsoft implementation: In general, you should use self-signed certificates for 802.1x (EAP) authentication.

Since I had a hard deadline to get it up and running, it was only tested with Android and i OS, neither of which had any real problem.

: No Ethernet adapter Local Area Connection: Media State .

: Atheros AR8132 PCI-E Fast Ethernet Controller Physical Address.

next year) I plan to offer to install the server certificate directly from the captive portal, so that users (mostly Windows users) won't have an issue logging into the secure network.

Farbar Service Scanner Version: Ran by Owner (administrator) on at Running from "D:\Abid\New Folder" Microsoft Windows XP Home Edition Service Pack 2 (X86) Boot Mode: Normal **************************************************************** Internet Services: ============ Connection Status: ============== Localhost is accessible. System Restore: ============ System Restore Policy: ======================== Security Center: ============ Windows Update: ============ Windows Autoupdate Disabled Policy: ============================ Other Services: ============== File Check: ======== C:\WINDOWS\system32\= File is digitally signed Extra List: ======= Gpc(3) IPSec(5) Net BT(6) PSched(7) Tcpip(4) 0x0700000005000000010000000200000003000000040000000600000007000000 Ip Sec Tag value is correct.

Leave a Reply