From 4786a37d8e324238ca35e9bc4c7817da6c646620 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Jakob=20Aar=C3=B8e=20Dam?= Date: Tue, 19 May 2015 11:35:28 +0200 Subject: [PATCH] Update README.md --- README.md | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/README.md b/README.md index 28218f2..b4b1548 100644 --- a/README.md +++ b/README.md @@ -83,6 +83,10 @@ Here you must: * Check 'Central Server running NPS' * Enter the name or IP of the server running the RDSFactor server and add the shared secret +The Network Policy server on the RD Gateway should now proxy RADIUS requests to RDSFactor. You can check the setup of the NPS server by running the 'Network Policy Server' application on the gateway. + +We have experienced that the 'TS GATEWAY AUTHORIZATION POLICY' blocks requests due to the condition of that policy. The fix is relax the requirements of the NAS port type. We have: Virtual (VPN), Ethernet or Cable. + ## Logging Log output from the RADAR client in RD Web is output into: @@ -95,6 +99,15 @@ Log output from the RADAR server: C:\RDSFactor\server\bin\Release> log.txt ``` +The RD Gateway log: +``` +Event Viewer: Applications and Services Logs / Microsoft / Windows / TerminalServices-Gateway / Operational +``` + +The Network Policy Server log: +``` +Event Viewer: Custom Views / ServerRoles / Network Policy and Access Services +``` ## Hacking on RDS Factor The core RADIUS server is included in this project as a git submodule. Fetch it by: