This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Authentication with Radius blocked by server 2019 firewall

Hello, 

So I performed an in place upgrade on one of our domain controllers from 2012 to 2019, so that I don't have to worry about demoting and promoting blah blah blah. Before I upgraded the second DC I wanted to make sure our users can still authenticate when they VPN in using ipsec. So I removed the 2012 server from the authentication list in the XG firewall and noticed they won't authenticate. I RDPd in to both DCs to compare the Network Policy and it's pretty much identical. So I contacted support and they had me disable the server firewall and it worked. We then compared the rules and noticed they were the same on both 2012 and 2019, both allowing port 1812 to pass, but it works on 2012 and not on 2019. Has anyone else had the same issue? Not really understanding if both servers have the same firewall rule to allow that port, that it should work on both servers. 



This thread was automatically locked due to age.
Parents
  • Have you checked that the 2019 server recognises it is in the 'domain' network (not 'private' or 'public')?

    Alternatively, have you applied your rule to all those network profiles?

  • Yep, it's in a domain network. And yes the default is to apply to all network profiles. 

  • Have you checked the logs on whatever you are using for RADIUS (probably NPS)? Is your RADIUS server receiving the requests at all or is the problem with the Windows authentication? At least by narrowing down where the problem is it will help focus your troubleshooting. You only mention the RADIUS firewall rule in your original post but that may not be the cause of your failure. For example, your 2019 server may be trying to do the Windows authentication against the 2012 server, and something on your 2019 firewall may be interfering with that process. You can always Wireshark it but that isn't for the feint hearted if you don't have much experience using it.

    We have done a few in-place upgrades of both 2012 R2 and 2016 with NPS and haven't had any issues but they were single DC environments.

  • I know it was only going to the server 2019 for auth because I clicked on Test connection while on the DC within Sophos under Authentication>Servers. 

Reply Children
No Data