I have NPS (win server 2008 ) in DOMAIN1 configured(working) .1x policy for assigning VLAN for user, I have working 2way trust to DOMAIN2. Users loged to their PC with DOMAIN2 accounts can't be authenticate. They match proper NPS policy (matching
user Group from DOMAIN2)
Access Permission : allow but NPS still reject them with code 65 details below:
User:
Security ID: DOMAIN2\TEST1
Account Name: DOMAIN2\TEST1
Account Domain: DOMAIN2
Fully Qualified Account Name: .......
Client Machine:
Security ID: NULL SID
Account Name: -
Fully Qualified Account Name: -
OS-Version: -
Called Station Identifier: ********
Calling Station Identifier: ******
NAS:
NAS IPv4 Address: x.x.x.x
NAS IPv6 Address: -
NAS Identifier: -
NAS Port-Type: Ethernet
NAS Port: 50634
RADIUS Client:
Client Friendly Name: *****
Client IP Address: x.x.x.x
Authentication Details:
Connection Request Policy Name: NAP 802.1X (Wired)
Network Policy Name: correct group
Authentication Provider: Windows
Authentication Server: ******
Authentication Type: PEAP
EAP Type: Microsoft: Secured password (EAP-MSCHAP v2)
Account Session Identifier: -
Logging Results: Accounting information was written to the local log file.
Reason Code: 65
Reason: The Network Access Permission setting in the dial-in properties of the user account in Active Directory is set to Deny access to the user. To change the Network Access Permission setting to either Allow access or Control access through NPS Network Policy,
obtain the properties of the user account in Active Directory Users and Computers, click the Dial-in tab, and change Network Access Permission.
Pls any idea?