Forum Discussion
Nettric
Oct 30, 2025Copper Contributor
Deploying Multiple NPS Servers
I have been working on ditching our password-based WiFi with WPA2-Enterprise. On DC1 I deployed internal CA, NPS, and group policies that auto-request certs and deploy wireless network settings. Cis...
Oct 31, 2025
Even though your CA is AD-integrated and auto-enrollment works, DC2 must explicitly trust the issuing CA and have access to the full certificate chain. Here's what to check:
DC2 must have the CA certificate in its Trusted Root Certification Authorities store
- Open certlm.msc on DC2.
- Navigate to Trusted Root Certification Authorities > Certificates.
- Ensure your internal CA certificate is present.
- If missing, export it from DC1 and import it manually.
DC2 must have the Intermediate CA (if applicable)
- If your CA uses an intermediate certificate, make sure DC2 has it in Intermediate Certification Authorities.
DC2 must have a valid server certificate for EAP-TLS
- NPS uses a server certificate to identify itself during the TLS handshake.
- Confirm that DC2 has a certificate with:
- Server Authentication EKU
- Subject Name or SAN matching the server's name
- Issued by your internal CA
- You can use auto-enrollment or manually request it via MMC > Certificates (Computer) > Personal > Request New Certificate.
Check NPS Policy Conditions
Even if you exported the NPS config, double-check:
- Connection Request Policies and Network Policies on DC2.
- Ensure the NAS IP Address or NAS Identifier conditions match what the Cisco AP sends.
- If DC1 had a policy scoped to its own IP or hostname, DC2 might be rejecting requests.
Test with NPS Logging
Enable logging on DC2:
- Open NPS console > Accounting > Log File Properties
- Enable Log authentication requests
- Check logs under %SystemRoot%\System32\LogFiles
This will show whether DC2 is receiving requests and why it's rejecting them.