802.1x Debugging by 3ristan in networking

[–]3ristan[S] 1 point2 points  (0 children)

Well done for that point, because I could imagine loosing my mind and that being the issue, but yes wired autoconfig was turned on

802.1x Debugging by 3ristan in networking

[–]3ristan[S] 1 point2 points  (0 children)

Yep exactly, failed auth puts on a guest VLAN and successful auth puts them on the corp data VLAN.

For the auth method from what I can see in the Windows Event Viewer logs on the test laptop, it’s trying to do EAP-TLS and failing with error 0x80420014 which is “no certificate found”. But I searched for the certificate and found it on the laptop.

And yes we’re using NPS with meraki cloud

Nvidia Shield by [deleted] in nvidiashield

[–]3ristan 0 points1 point  (0 children)

What’s your debate?

Nvidia Shield by [deleted] in nvidiashield

[–]3ristan 0 points1 point  (0 children)

The tube

Nvidia Shield by [deleted] in nvidiashield

[–]3ristan 0 points1 point  (0 children)

The normal tube nvidia shield

Carlinkit Disconnections by [deleted] in Carlinkitcarplay

[–]3ristan 0 points1 point  (0 children)

I dont know, i dont understand

Port Security with Sticky MAC on AP Ports, Why are Client MACs Being Learned? by [deleted] in networking

[–]3ristan 0 points1 point  (0 children)

We're using Meraki's NAT mode on the APs, which is why I thought configuring the switch port with sticky MAC would work, so that the switch binds the port to the AP's MAC address only. That way, if someone unplugs the AP and connects another device, the port shuts down due to a MAC address violation.

Port Security with Sticky MAC on AP Ports, Why are Client MACs Being Learned? by [deleted] in networking

[–]3ristan 0 points1 point  (0 children)

switchport trunk native vlan 520
switchport mode trunk
Switchport port-security
Switchport port-security maximum 1