Network Policy Server

Bit of a crazy issue when deploying a new Ruckus wireless network – in first suspecting an issue with the controller software or perhaps some kind of access control list blocking traffic it turns out that the default Windows Firewall rule for allowing NPS traffic is broken in some fashion.

Having tried this (and it working fine) on Windows Server 2012 R2/2016 it really does appear to be isolated to Server 2019.

Discovering this came about with a few traffic captures combined with the wonderful NTRadPing tool. The fix is to manually create the rule, see the screenshots below on how to do this.

With thanks to the 50 staff from across the University for attending please see below the links to the videos and PowerPoints of the day!

Direct link to Playlist – https://www.youtube.com/watch?list=PLRxbdlgJzwyjAf820T0u4GpP0E01a9LEX&v=u-GVJ_0VuRM

Slides as PowerPoint

  1 Intro (4.3 MiB, 1,575 hits)

  2 MDT (85.2 MiB, 1,963 hits)

  3 PowerShell (27.5 MiB, 1,714 hits)

  4 PRTG Network Monitor (47.5 MiB, 1,768 hits)

  5 OpenVAS (32.9 MiB, 1,603 hits)

  6 WSUS and Chocolatey (60.3 MiB, 1,818 hits)

  7 NPS and VLANs (10.7 MiB, 2,692 hits)

Slides as PDF

  1 Intro (2.0 MiB, 1,698 hits)

  2 MDT (2.2 MiB, 2,059 hits)

  3 PowerShell (1.8 MiB, 2,172 hits)

  4 PRTG Network Monitor (3.2 MiB, 1,636 hits)

  5 OpenVAS (2.3 MiB, 1,758 hits)

  6 WSUS and Chocolatey (2.9 MiB, 1,980 hits)

  7 NPS and VLANs (1.4 MiB, 2,138 hits)

Stay tuned over the coming days for the scripts that are mentioned through the video which will be linked to from this post.