Share via


Windows only Radius Issue NPS Event: 6273 Reason Code 16

Question

Tuesday, June 11, 2019 12:33 PM

We set up Radius (NPS) about a year and a half ago on Windows Server 2012 and it's been running fine... until now. We're baffled because we're not aware of any changes that have been made.

We are having an issue where Windows devices will not authenticate with our Radius server (NPS). All other types of devices work fine, the issues seems to only impact windows specifically.

The Network policy settings haven't changed, and we've verified that our certificate isn't expired. We are configured for EAP Types: PEAP and EAP-MSCHAP v2.

The error we get in Event Viewer is Event ID: 6273 Reason Code: 16 "Authentication failed due to a user credentials

mismatch. Either the user name provided does not map to an existing user account or the password was incorrect"

Since the username and password work just fine when connecting a smartphones and other devices, it makes me think that the information getting sent back by windows clients aren't in a format that the server recognizes as valid, or the server isn't parsing through the information correctly.

I have spent a lot of time reviewing every article I can find to try and resolve this issue, but no luck yet. Any help would be GREATLY appreciated!

All replies (7)

Thursday, June 13, 2019 8:48 AM âś…Answered

Hi,

There are some settings you can check:

  • The network access server is under attack
  • NPS does not have access to the user account database on the domain controller
  • NPS log files or the SQL Server database are not available

The Network policy settings haven't changed, and we've verified that our certificate isn't expired. We are configured for EAP Types: PEAP and EAP-MSCHAP v2.

What about the configurations of clients? authentication methods?

Please refer to the link below:

/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc735399(v=ws.10)  

Best regards,

Travis

Please remember to mark the replies as an answers if they help.
If you have feedback for TechNet Subscriber Support, contact [email protected]


Tuesday, June 11, 2019 2:08 PM

Hello! 

What version Windows client OS? 

Check the certificate subject name.

https://support.microsoft.com/en-us/help/814394/certificate-requirements-when-you-use-eap-tls-or-peap-with-eap-tls

Old Operating systems (Windows 7 and early) require subject name in server certificate.


Tuesday, June 11, 2019 2:23 PM

I have tested with Win 10, 8.1 and 7. All fail to connect. I have also tried windows devices that are not apart of our domain with the same result.


Wednesday, June 12, 2019 2:29 AM

Hi,

Did you check the user name and password in event properties?

On the clients, uncheck Remember credentials and enter the password manually.

Best regards,

Travis

Please remember to mark the replies as an answers if they help.
If you have feedback for TechNet Subscriber Support, contact [email protected]


Wednesday, June 12, 2019 11:40 AM

Thanks for the reply, 

I do see the correct username showing up correctly in the Event Properties. Normally, we check the box that says "Use my Windows user account" which uses the same credentials that Radius authenticates against in Active Directory. I've tried manually entering the username and password with the same result. 


Friday, June 14, 2019 3:41 PM

Hello K12-Ed-IT,

This suggestion should be considered an "option of last resort" and even then it might not be worth the effort. It is something that I have used to analyse VPN authentication problems with Windows 10 and IAS. Some aspects might work under Windows Server 2012 and NPS.

I use Event Tracing for Windows to trace the following event providers (the list is in a format suitable for use with logman.exe):

{b2cbf6dc-392a-43ae-98d2-1aa66dfcb2c3} 0xFFFFFFFF 255 # IAS NAP NPS
{bae49237-f9d2-4eea-b660-1aa0f1f5637f} 0xFFFFFFFF 255 # IAS NAP NPS hlpr
{997590ef-d144-4d41-b7fb-7028ae295b04} 0xFFFFFFFF 255 # IAS NAP NPS sam + nap + svcs
{822bec9e-660f-4f9d-96b5-ead6874cb0bd} 0xFFFFFFFF 255 # IAS NAP NPS acct
{c124ef85-9447-4a75-be21-3a97fdda3e81} 0xFFFFFFFF 255 # IAS NAP NPS polcy
{c2300092-f475-42ae-9ea9-66c268bef2c6} 0xFFFFFFFF 255 # IAS NAP NPS sdo
{ea500216-dc45-4f41-a1dc-e37ea5df188e} 0xFFFFFFFF 255 # IAS NAP NPS rad
{574450b9-c7f9-4c05-a01e-b90f8f7744e3} 0xFFFFFFFF 255 # IAS NAP NPS recst + datastore
{b9f181e1-e221-43c6-9ee4-7f561315472f} 0xFFFFFFFF 255 # RASMan
Microsoft-Windows-RRAS
Microsoft-Windows-Security-Auditing

The IAS/NAP/NPS providers are WPP providers (see https://docs.microsoft.com/en-us/windows/desktop/etw/event-metadata-overview for the difference between WPP, MOF, Manifest-based and TraceLogging providers) - that's why GUIDs rather than names are used. The GUIDs might be different under Windows Server 2012.

If the GUIDs are not recognized (logman reports something like "Element not found"), one could try just using the two manifest-based providers (Microsoft-Windows-RRAS and Microsoft-Windows-Security-Auditing); again, there is no guarantee that these will provide any useful information in your scenario.

To create a trace, save the list of providers in a file (e.g. "providers.lst") and start the trace with the command:

logman start nps-prob -ets -pf providers.lst -o nps-prob.etl

One the problem has been reproduced, the trace can be stopped with the command:

logman stop nps-prob -ets

The trace data in nps-prob.etl can be viewed in Microsoft's Message Analyzer (MMA) but, assuming that any useful data is collected, it will take some experience to understand.

Gary


Tuesday, June 18, 2019 6:56 AM

Hi,

Just checking in to see if the information provided was helpful.

Please let us know if you would like further assistance.

Best Regards,

Travis

Please remember to mark the replies as an answers if they help.
If you have feedback for TechNet Subscriber Support, contact [email protected]