WiFi

Network

19 sections
369 source tickets

Last synthesized: 2026-02-13 01:19 | Model: gpt-5-mini
Table of Contents

1. Conflicting or outdated saved Wi‑Fi profiles caused authentication and connection failures

92 tickets

2. Wi‑Fi adapter driver or hardware failures prevented adapter start or network access

40 tickets

3. Managed devices missing corporate Wi‑Fi profile because they had not checked into device management

43 tickets

4. Captive‑portal or credential issues (public Wi‑Fi, hotspots, and Okta-based corporate authentication)

41 tickets

5. No wired network access due to unpatched or unconfigured floor box ports / switch ports

7 tickets

6. iPhone Personal Hotspot unavailable or greyed out preventing laptop tethering

6 tickets

7. Corporate SSID (CPG-Corp) intermittently unavailable or refusing connections across multiple clients

44 tickets

8. Intermittent campus Wi‑Fi outage causing repeated disconnects and mistaken VPN attempts

35 tickets

9. Dell Optimizer power profile causing severe network throttling on Windows 11 laptops

1 tickets

10. Access point powered off/unplugged causing clients to be connected but have no Internet

18 tickets

11. Outgoing Teams video frozen/white for others while local preview and audio work — isolated to home network or VPN path

10 tickets

12. Periodic Windows client disconnects traced to NCSI active probes

11 tickets

13. Eduroam authentication protocol change request (PEAP→TTLS) requiring plaintext password forwarding

1 tickets

14. Inquiry about Eduroam availability at public libraries and service ownership

3 tickets

15. Temporary event Wi‑Fi using portable 5G routers and local LAN for large file sharing

1 tickets

16. Provisioning APs and switches for new or relocated office space

13 tickets

17. Re-establishing IU access after replacing a private home Wi‑Fi router

1 tickets

18. Migration from Windows NPS to Portnox and certificate‑based WLAN authentication with internal CA CRL

1 tickets

19. No campus-wide wireless presentation standard; rooms still rely on HDMI and local island devices

1 tickets

1. Conflicting or outdated saved Wi‑Fi profiles caused authentication and connection failures
95% confidence
Problem Pattern

Devices failed to associate or repeatedly failed 802.1X authentication to campus/corporate SSIDs due to multiple or stale saved Wi‑Fi profiles, cached or expired credentials, username‑format mismatches, or per‑profile settings. Symptoms included “Cannot connect to this network”, iOS “Invalid password”, Windows error 868, frequent Okta credential prompts, repeated Windows login failures, silent association failures, or RADIUS/NPS logs showing “incorrect password” or username‑format mismatches. Affected clients included managed and unmanaged Windows, macOS, iOS and Android devices; some failures produced repeated authentication attempts that triggered temporary NAC bans or correlated OS instability when drivers/firmware were faulty.

Solution

Support restored connectivity by removing duplicate, stale, or conflicting Wi‑Fi profiles so devices retained only the correct campus/corporate SSID and by addressing profile settings and driver/firmware state. Technicians removed obsolete profiles via Settings → Network & Internet → Wi‑Fi → Manage known networks (Forget) or used MDM/enterprise tools when the GUI did not expose profiles; several onboarding/fresh‑device cases resolved after connecting to IU_Study first then deleting and re‑adding the corporate profile (CPG/CPG‑Corp/IU‑Internal). In some incidents the incorrect profile was removed during remote support sessions over Microsoft Teams; in others devices were temporarily put on wired Ethernet so support could forget networks and reconnect to the corporate SSID. Where forgetting profiles did not prompt reauthentication, support ran group policy and account sync actions (examples observed: gpupdate /force, Windows account synchronization) or recreated the wireless profile; reauthentication sometimes required entering the username in the campus‑specific format (firstname.lastname or UPN) because NPS handled different username formats. Multiple incidents were traced to credential desynchronization after remote password changes; those stopped after an admin reset or after the user reset their password onsite so workstation and domain credentials resynchronized. RADIUS/NPS and AD logs frequently recorded “incorrect password”; technicians verified NPS username‑format handling and WLAN authentication group membership when logs or group membership mismatches indicated failures. Repeated failed authentications had caused temporary NAC bans in at least one case; removing stale local profiles halted repeated attempts and cleared the ban. eduroam cases that resisted deletion or hid the credential prompt required re‑provisioning or recreating the profile via device management tools or testing by adding eduroam on another device. Vendor driver and firmware updates or WLAN module replacement resolved multiple Windows cases (examples: Lenovo System Update, Dell Command Update); some incidents producing BSODs and memory dumps also resolved after updating drivers or replacing faulty WLAN hardware. Fresh‑device keyboard‑layout mismatches produced incorrect password entry until corrected. In one ThinkPad a disabled per‑profile “connect automatically” toggle prevented association and enabling that setting (with available system updates applied) restored connectivity.

2. Wi‑Fi adapter driver or hardware failures prevented adapter start or network access
93% confidence
Problem Pattern

Vendor‑branded Windows 10/11 laptops (commonly Dell or Lenovo) experienced Wi‑Fi adapter failures or instability—frequently immediately after vendor or OS updates—causing the wireless interface to disappear from Device Manager, to appear disabled or to lose the Wi‑Fi toggle/button or to report “Updates paused by organization.” Affected clients failed to join corporate/campus SSIDs (including eduroam) or specific radio bands (2.4 GHz or 5 GHz), suffered intermittent disconnects with gateway/DNS errors (for example “Default gateway not available” or “DNS server not responding”), and in some cases produced driver/firmware errors (for example Intel AX201/netwtw08 Tx retry/Tx confirmation errors). User impacts included application call dropouts, sign‑in/authentication failures, Intune/compliance errors, incorrect system time/timezone and, in a few cases, Automatic Repair or BitLocker recovery prompts.

Solution

Technicians resolved incidents by repairing or replacing faulty Wi‑Fi drivers, adapter firmware and occasionally the system BIOS, or by reinitializing/replacing the wireless adapter. Vendor update utilities (Dell SupportAssist full system scan, Dell Command | Update, Lenovo System Update) and BIOS updates were commonly applied over a wired connection (USB‑C Ethernet adapters or mini‑docks) when the wireless interface was unreliable; technicians also connected systems to AC power before running vendor update tools in multiple cases. Where the adapter entry had vanished or appeared disabled, removing the Wi‑Fi driver in Device Manager forced Windows to reinitialize the device; multiple restarts or a full power cycle were sometimes required. Restoring domain/VPN connectivity allowed Group Policy and vendor/OS updates to run with elevated privileges and reactivated interfaces that reported “Updates paused by organization.” Frequency‑specific failures (2.4 GHz vs 5 GHz) were resolved by driver/firmware/BIOS updates or by replacing devices when antenna/hardware faults were suspected; testing on personal networks and comparison with other clients helped isolate device‑specific band/antenna issues. A recurring class of incidents involved Intel Wi‑Fi 6 AX201 with netwtw08.inf v21.10.2.2 where Tx retries and Tx confirmation errors (600) correlated with gateway/DNS failures and intermittent disconnects; replacing or updating the driver/firmware restored reliable connectivity in those cases. Application‑level impacts were observed: Microsoft Teams call dropouts occurred in multiple cases (notably during calls with camera/microphone active), and unstable connectivity blocked sign‑in flows (Okta Verify and support pages became inaccessible) on replacement/new machines. In a few incidents a problematic VPN client worsened throughput and disabling it reduced drop rates. Local OS recovery tools failed in at least one case (SupportAssist OS Recovery produced a BSOD with Diagnostics Error 0000 and Validation 109120); remediation via vendor update tools over a wired connection or device replacement restored corporate SSID access. When driver/firmware repairs failed to produce a stable adapter, technicians used driver reinstallation and, in some cases, a clean OS reinstall (Fresh Start) or full device replacement to restore reliable wireless connectivity. Some tickets contained no confirmed fix and recommended replacement when updates could not be applied. Service tags, screenshots and Device Manager logs were used to triage hardware vs driver causes.

3. Managed devices missing corporate Wi‑Fi profile because they had not checked into device management
89% confidence
Problem Pattern

Endpoints (Windows and macOS laptops and mobile devices) failed to discover, join, or use managed corporate SSIDs (CPG‑Corp, IU‑Internal, IU‑Study) or exhibited no usable network access. Symptoms included missing or greyed‑out SSIDs, immediate "connection could not be established" rejections with no credential prompt, authentication failures after credential entry, repeated credential prompts instead of SSO/MFA, brief connects that dropped shortly after join, and clients reporting "connected" with no network access. Affected systems were often new, recently reprovisioned, long‑offline, or had incomplete Intune/Jamf/Azure AD enrollment; incidents also correlated with NAC/analytics (Portnox) state or WLAN group‑membership discrepancies and with hardware adapter faults.

Solution

Support outcomes attributed this symptom set to multiple distinct causes across client and network layers; observed resolutions included the following.

• Wireless infrastructure pushes: campus WLAN configuration updates restored SSID discovery, persistent auto‑connect behavior, and reduced intermittent drops for many endpoints.

• NAC/analytics and WLAN‑group fixes: correcting NAC/Portnox device state or adjusting access/group assignments (and allowing propagation time) restored connectivity where devices or MACs were missing or inconsistent in analytics.

• Directory/Group Policy and WLAN group fixes: AD/GPO profile pushes and assigning required WLAN groups returned connectivity for devices that lacked AD‑pushed profiles or proper group membership.

• MDM/enrollment completion and temporary internet: devices that had not completed Intune/Jamf/Azure AD enrollment lacked managed Wi‑Fi profiles; providing interim internet (IU‑Guest/IU‑Study or eduroam where usable) allowed check‑in and delivery of corporate profiles, after which SSO/MFA and SSID access resumed.

• Simple restart/propagation effects: in some cases a restart after entitlement or group changes propagated resolved the issue when permissions were already present.

• One‑time auth/profile resets and credential resynchronization: forgetting and re‑adding Wi‑Fi profiles, resetting authenticator/Okta states, or performing credential resynchronizations resolved repeated prompts and authentication failures in numerous cases.

• OS and supplicant recovery: Windows devices that showed no WLAN networks or missing Company Portal often recovered after Windows updates and rebooting that restored the WLAN supplicant/stack; equivalent macOS cases sometimes required Jamf re‑enrollment or Jamf Connect reinstallation and, when client state was irrecoverable, a factory reset restored managed agents and network access.

• Background scripts and local policy interference: some endpoints ran scripts or policies that removed guest/study associations or caused repeated disconnects; reapplying correct managed profiles eliminated related VPN/session failures.

• Hardware and replacement: persistent adapter or hardware faults that outlasted software remediation were resolved by replacing affected laptops, which restored stable internal Wi‑Fi.

• Fallback networks limitations: eduroam, IU‑Guest, or IU‑Study were used as interim workarounds to reach MDM/Company Portal, but guest/study networks sometimes lacked reliable internet or did not permit enrollment until the client supplicant/agent was healthy.

After required WLAN configuration updates, NAC/Portnox or AD/WLAN group corrections and propagation, completion of Intune/Jamf/Azure AD enrollment, credential/authenticator resynchronization, or OS/supplicant recovery (and when necessary, hardware replacement), affected endpoints regained access to corporate SSIDs and associated SSO/MFA functions.

4. Captive‑portal or credential issues (public Wi‑Fi, hotspots, and Okta-based corporate authentication)
92% confidence
Problem Pattern

Users were unable to complete captive‑portal sign‑in or authenticate to campus/corporate Wi‑Fi (Okta/Microsoft, eduroam, guest/CPG SSIDs). Reported symptoms included captive‑portal pages not appearing or redirecting, clients showing “connected” but no Internet, repeated username/MFA prompts, eduroam connect/disconnect loops or authentication errors, and workstation sign‑in failures tied to network authentication. VPN symptoms included missing VPN network/UI icons and L2TP handshake failures reporting a processing error during the initial security negotiation. Affected platforms included managed and unmanaged macOS/iOS and Windows devices; failures often coincided with stale saved SSID profiles, incorrect username/realm or credential type, expired credentials, missing wireless/Okta group membership, misregistered MFA factors, or missing/untrusted Wi‑Fi certificates.

Solution

Support cleared stale saved SSID profiles and, in many cases, forgetting and rejoining the SSID restored captive‑portal sign‑in and Internet access. Corporate Wi‑Fi and eduroam access succeeded after users authenticated with the correct account identifier and credential type (commonly the institutional email address with the Okta/Microsoft password), supplied the full username@realm for eduroam, or when required Okta/wireless group membership or administrator‑issued WLAN authorization was present. Repeated sign‑in failures were resolved by renewing expired Active Directory passwords or by presenting a supported Okta MFA factor when misregistered/unsupported factors were in use. Windows credential sequencing issues were traced to Windows Hello/PIN ordering and cleared when the correct credential sequence was used. Several eduroam and corporate SSID failures were resolved after installing or explicitly trusting the SSID certificate or accepting the network certificate presented by the SSID. Mistyped passwords caused by incorrect keyboard layouts were corrected after re‑entry with the proper layout. A Windows 11 sign‑in case regained network access after the device connected to the correct campus SSID at the sign‑in screen, which restored a prior VPN fallback path. L2TP VPN failures and missing VPN UI icons were observed alongside Wi‑Fi authentication failures; these VPN symptoms resolved in cases where the device obtained a working network path (for example by rejoining the correct SSID or using Ethernet) or after Wi‑Fi authentication and credentials were corrected, allowing the L2TP handshake to complete. Network‑separated AirPrint failures were attributed to VLAN isolation and printing succeeded when the client was on the same VLAN as the printer or when the printer was added by IP from the student/Study network. Initial on‑site notebook setups sometimes failed on first attempts but later connected. Legacy CPG/CP access had been disabled for some Apple devices after the CP network shutdown; affected devices were redirected to Study or alternative campus SSIDs such as IU‑Internal. Peripheral display/dock symptoms seen during wireless troubleshooting were sometimes unrelated to Wi‑Fi and were resolved after installing or enabling vendor display software (for example DisplayLink). For third‑party or unmanaged SSIDs, support documented that the network was not managed by the institution and advised external users to use the institutional guest SSID (IU‑Guest).

5. No wired network access due to unpatched or unconfigured floor box ports / switch ports
90% confidence
Problem Pattern

Devices in a specific room reported a physical Ethernet link or a ceiling AP presence but no stable IP‑level access; clients frequently lost in‑room Wi‑Fi, fell back to distant APs, or roamed repeatedly between SSIDs (for example IU Study vs IU Guest). Wired wall ports or monitor/display cables sometimes showed physical connection yet produced no network or video output. Digital‑signage boxes and other endpoints lost connectivity after nearby AP or wall‑socket moves. Users reported intermittent drops, choppy audio/video and daily short outages; in some incidents staff were unaffected while students experienced failures, reflecting different SSID/membership behaviour.

Solution

Investigations across incidents identified four recurring root causes and their remedies. 1) Cabling and VLAN mispatch: wall sockets or monitor/display cabling were sometimes unpatched at the patch panel, terminated to the wrong switch port, or assigned to an unexpected VLAN; correcting patch‑panel terminations and assigning the switch port to the expected VLAN (for example VLAN200 on switch BHF1CS18) restored wired network and display connectivity and allowed local devices and new client machines to register. 2) SSID/endpoint association and user‑segment behaviour: several cases involved client devices simultaneously associating to multiple SSIDs (notably IU Study and IU Guest) or being directed to the wrong SSID, causing in‑room roaming and loss of service; stability was restored when devices used the expected SSID and AP, and Meraki SSID/SSID‑assignment and appliance settings were reviewed to prevent overlapping associations. 3) Event/port restrictions and capacity limits: some wired ports were reserved or constrained to projector/staff VLANs (CPG‑Net) and not available to external users; capacity analysis also showed IU‑Guest imposed an effective per‑user upload limit (~30 Mbit/s) while a venue shared a single 1 Gbit/s upstream, so creating a temporary private WLAN did not increase aggregate upstream capacity — these constraints were documented for event planning. 4) Endpoint and AP placement or device configuration: certain endpoints (for example Viewneo digital‑signage boxes) lost connectivity after AP or wall‑socket moves and required local device reconfiguration (a technician used a USB console to toggle the device’s network/Wi‑Fi setting) and mispatched wall sockets were flagged; other incidents were resolved by changing physical AP orientation or mounting position, which noticeably strengthened signal and reduced disconnections. Each incident was closed after the specific cause was identified (mispatched cabling or wrong VLAN, overlapping SSID associations, restricted/reserved port or upstream capacity limit, endpoint reconfiguration, or AP placement) and the corresponding remediation or documentation was applied.

6. iPhone Personal Hotspot unavailable or greyed out preventing laptop tethering
90% confidence
Problem Pattern

Personal/mobile hotspot or tethering from an iPhone or Android was unavailable, missing, greyed out, or intermittently disconnecting when sharing internet to a laptop/PC. Symptoms included the phone’s hotspot SSID or Wi‑Fi password not appearing, the PC’s mobile‑hotspot option disabled or unclickable, paired Bluetooth tethering failing or not supported, transiently undiscoverable SSIDs, or the hotspot disconnecting and clients not automatically reconnecting (sometimes requiring re‑entry of the Wi‑Fi password). No error codes were reported.

Solution

Problems were resolved by restoring the phone’s hotspot/tethering state and repairing host‑side connectivity. On iPhone cases enabling Personal Hotspot and toggling the 'Allow Others to Join' state caused the device to expose the SSID and the Personal Hotspot Wi‑Fi password; verifying or resetting that password on the phone and entering the correct key on the laptop completed the connection. In Android cases Bluetooth tethering was restored after removing the phone from the PC’s Bluetooth device list and re‑pairing. In one instance toggling Bluetooth off and re‑enabling Wi‑Fi on the PC caused the Mobile Hotspot option to become enabled when restarts and hard power‑offs had not helped. Several incidents involved hotspot SSIDs that were transiently undiscoverable and later became visible; support confirmed private phone hotspots behaved like normal Wi‑Fi networks and required no service‑side enablement. In this environment iPhones did not support Bluetooth tethering, so hotspot use was limited to Wi‑Fi (WLAN) or USB tethering. Some iOS personal‑hotspot cases showed frequent disconnects where laptops did not auto‑reconnect and required re‑entering the hotspot Wi‑Fi password; teams investigated eSIM‑capable laptops and mobile routers as alternative approaches but no definitive resolution was recorded.

7. Corporate SSID (CPG-Corp) intermittently unavailable or refusing connections across multiple clients
93% confidence
Problem Pattern

Multiple clients at a campus site were unable to see, associate with, or authenticate to corporate SSIDs (commonly CPG‑Corp / Mitarbeiter and related profiles such as CPG‑VPN‑LOGON), affecting Windows, macOS, Android and embedded devices. Reported symptoms included association/authentication failures, repeated disconnects or re‑authentication prompts, client errors like “Unable to connect to this network”, site‑wide outages across multiple APs/controllers, severe packet loss or high ping, and legacy clients losing SSID visibility after AP security‑mode changes (for example WPA3‑only). In some incidents APs or controllers rejected specific authentication key pairs or credential exchanges that prevented particular devices from joining.

Solution

Incidents were traced to failures or misconfiguration across campus WLAN, authentication services, controller‑to‑AP communication, and WAN/uplink infrastructure. Remediations that restored service included: restarting failed RADIUS/authentication server processes and clearing authentication caches or temporary login blocks; resolving controller‑to‑AP communication faults and performing controller restarts; applying vendor firmware fixes or configuration changes and power‑cycling or replacing unstable APs; restoring or provisioning network uplinks where physical path/uplink failures existed; and reverting AP security‑mode changes (for example reversing WPA3‑only profiles) to restore legacy client visibility. In at least one case APs were adjusted to permit required authentication key pairs after controllers were observed rejecting specific credential exchanges. Corporate SSID/profile migrations or replacement profiles were pushed to endpoints where profile mismatch was a factor. Client‑side remediation rarely restored connectivity while central infrastructure was unavailable, though a subset of Windows clients recovered after UI‑level Wi‑Fi steps and reboot; macOS clients frequently refused association until central services were repaired. Networked printers sometimes required additional profile or network remediation after Wi‑Fi resumed. Users commonly relied on fallback networks (iu‑guest, iu‑study, iu‑internal, eduroam), mobile hotspots, or VPNs during outages. Some site incidents had no recorded central action and resolved spontaneously after hours; confirming user group membership (for example IU‑ZZ‑OK‑ASS‑CPGCorpWireless‑All‑Access) did not always identify the cause.

8. Intermittent campus Wi‑Fi outage causing repeated disconnects and mistaken VPN attempts
92% confidence
Problem Pattern

Intermittent campus Wi‑Fi across multiple SSIDs (CPG‑Corp, IU‑Study, IU‑Guest, IU‑Internal, eduroam) produced periodic full‑internet drops, frequent reconnects and prolonged slow throughput; failures were location‑dependent (specific APs or high‑density rooms) and often occurred during peak hours. Symptoms included clients that associated to SSIDs but had no Internet, selective reachability failures to external services (notably intermittent access to Google and unstable Twilio sessions that flipped to “offline” or required a browser refresh), measurable packet loss, printing delays and VoIP/Twilio call drops. Roaming between SSIDs was observed to trigger WLAN‑controller security blocks in some cases. Outages ranged from brief periodic disconnect cycles to multi‑minute or multi‑hour interruptions and commonly correlated with unstable or saturated upstream links (including cellular 5G backhaul and third‑party ISPs).

Solution

Investigations repeatedly identified campus-side network or upstream faults rather than client VPN failures. Short transient outages typically cleared after campus network teams intervened (recoveries ~5–20 minutes); longer or recurring incidents commonly traced to unstable or capacity‑limited upstream links (notably cellular 5G backhaul and third‑party ISPs). At sites using 5G backhaul, parameter and configuration adjustments improved stability and teams provisioned additional or replacement uplinks where necessary. Capacity‑related slowness was mitigated by adding internet uplinks, tuning switch/network configurations to reduce congestion, and applying per‑device bandwidth limits to identified high‑usage clients. A misconfigured traffic‑shaping rule on the student/guest WLAN in Hannover caused a multi‑hour outage and was corrected. Location‑specific faults were resolved after Ekahau site surveys and AP radio/configuration changes at multiple APs (examples: AP03/Aegidiimarkt, AP09/Media Lab, AP13, AP14, AP07, AP05, AP02); third‑party AP deployments required on‑site inspection and coordination with external providers to isolate provider‑side faults. Troubleshooting combined campus monitoring, packet‑loss checks, traceroutes, DNS and upstream‑reachability tests, WLAN coverage maps, and DHCP/RADIUS verification; some sites showed no detectable local configuration faults and remained under monitoring while upstream conditions cleared. Investigations also identified cases where the WLAN controller treated rapid roaming between IU‑Guest and IU‑Study as atypical client behavior and repeatedly blocked those clients, and other cases where devices regained Internet only when connected from a different campus — indicating device‑specific behavior or localized upstream/path issues. Support routinely requested exact incident timestamps, room or visible AP ID and client MAC addresses for reproducibility, but users frequently could not supply MACs which limited root‑cause isolation. Recorded client‑side remediation included removing/forgetting overlapping SSID profiles, restarting devices and reconnecting to the appropriate corporate SSID; a minority of users could not switch SSIDs where credentials were missing. Secondary impacts across incidents included severe printing delays, VoIP/Twilio audio drops and monitoring indicators fluctuating to red/yellow. Several fixes were temporary; permanent resolution frequently required provisioning a new uplink or changing upstream providers.

9. Dell Optimizer power profile causing severe network throttling on Windows 11 laptops
90% confidence
Problem Pattern

Windows 11 Dell laptops experienced severely reduced internet throughput and poor Microsoft Teams call quality compared with other devices on the same network. Multiple parallel speed tests showed the affected laptop reporting very low upload/download speeds or apparently consuming/losing large portions of available bandwidth. Dell Optimizer was present on the device and the problem affected typical network-using applications (Teams, browsers) rather than the network itself.

Solution

The issue was resolved by changing the Dell Optimizer power profile: Dell Optimizer's Power/Battery performance was set to "Ultra Performance" and any pending Windows Updates were installed. After applying the higher-performance power profile and updating Windows, network throughput and Microsoft Teams call quality returned to expected levels.

Source Tickets (1)
10. Access point powered off/unplugged causing clients to be connected but have no Internet
95% confidence
Problem Pattern

Clients associated to corporate or guest SSIDs but could not reach the Internet or internal services, often reporting "internet not available" or getting stuck on messages such as "checking network requirements". Symptoms included frequent disconnects, associations without usable traffic, absence of SSIDs or no coverage in particular rooms, sustained packet loss or severe throughput degradation, and downstream systems (for example digital signage) failing to update. Underlying triggers included access points powered off or not receiving PoE, APs physically disconnected or on the wrong switchport, APs long-term offline or administratively ignored, AP‑to‑controller communication failures, AP hardware/reboot faults, capacity/overload at the AP or wireless controller, and large volumes of failed authentications or wrong-credential retries that saturated authentication/back-end services.

Solution

Outages were resolved by addressing the specific underlying cause identified during troubleshooting. Power and connectivity issues returned service after APs were reconnected to powered switchports or faulty cabling/patching was replaced and building power faults were corrected by facilities. APs that were long-term offline or marked “Ignored” in the controller were re‑provisioned or re‑set up when the devices were present and inventory/documentation was corrected. Hardware faults and reboot loops were handled by onsite replacement or specialist escalation. AP‑to‑WLAN‑controller and controller‑communication problems were diagnosed with collected device details and forwarded to infrastructure teams for remediation. Capacity and performance problems were investigated using site surveys and monitoring tools (Ekahau) and addressed by traffic‑shaping, link adjustments, and targeted AP replacement where sustained packet loss or throughput degradation occurred. Incidents where large numbers of failed authentications or wrong‑credential retries generated high traffic and blocked client access were remediated after coordination with authentication/identity teams to clear or stabilize authentication sessions, correct credential/profile configuration, and reduce offending client retries. Temporary mitigations recorded in tickets included restarting APs and client devices, using alternate SSIDs or rooms, relocating users while repairs were carried out, and on‑site verification to distinguish client‑side faults from network outages.

11. Outgoing Teams video frozen/white for others while local preview and audio work — isolated to home network or VPN path
57% confidence
Problem Pattern

Devices on home Wi‑Fi or over VPN experienced outgoing media failures and VoIP call problems: Microsoft Teams video showed as frozen/white to remote participants while local preview and audio could remain functional, and Teams or Vonage calls reported "poor connection" or dropped entirely. Users sometimes observed severe general slowness (web pages taking minutes to load) or brief audio dropouts (~10–15 seconds) with delayed call‑log entries. Failures were usually isolated to a single device or network path (varying by distance to router, Wi‑Fi band, VPN path, or ISP) and were accompanied by packet loss, blocked/failed data transfer, or intermittent connectivity drops.

Solution

Investigations repeatedly localized these incidents to the network path (home router, local Wi‑Fi client configuration, ISP upstream, or VPN) rather than to camera hardware or application software alone. In multiple cases switching the client to an alternate path — for example a mobile hotspot or a wired Ethernet connection — immediately restored media and call continuity. Physically moving the device closer to the router or switching Wi‑Fi band stabilized media in several incidents. Where the home network was confirmed at fault, correcting router configuration (one recorded case involved a misconfigured second Fritzbox causing 2.4/5 GHz and dual‑router issues) resolved blocked or failed data transfer; other faults required escalation to the ISP or VPN vendor. Vendor driver and firmware update utilities (for example Lenovo System Update, Dell Command Update / SupportAssist) were used when client Wi‑Fi drivers or tethering appeared suspect, although administrative restrictions prevented applying updates in some cases. Attempts to clear application caches were recorded (Outlook cache cleared for unresponsiveness; Chrome cache/cookies cleared in a VoIP case) but did not reliably resolve incidents where packet loss was present; support evidence included delayed call logs consistent with packet loss. Some device‑specific incidents (notably on macOS) showed browser traffic recovering while native apps remained slow; these remained unresolved in ticket records and were attributed to a device‑specific Wi‑Fi path problem rather than household connectivity. Recorded outcomes varied: immediate network‑path changes reliably produced short‑term recovery, while persistent issues required network‑side configuration changes or vendor escalation; a subset of cases reported that Teams or Vonage calls caused complete connection drops or broad system slowdowns prior to remediation.

12. Periodic Windows client disconnects traced to NCSI active probes
91% confidence
Problem Pattern

Windows laptops intermittently lost network connectivity or experienced brief bandwidth drops that disrupted VoIP/Teams. Symptoms included transient “No internet” network status, periodic full Internet-loss events or Wi‑Fi disconnect‑and‑reconnect cycles lasting seconds to minutes, and shorter audio/glitch events recurring on roughly 10–60 minute intervals. Failures were often device‑specific (some laptops affected while other devices on the same WLAN remained stable), occurred on both wireless and wired interfaces, and were frequently observed on home networks using consumer routers (notably Fritz!Box).

Solution

Multiple distinct root causes were identified; each remediation correlated with symptom resolution on affected machines:

• NCSI active-probe suppression removed recurring ~20–30 minute full Internet‑loss events observed on both WLAN and wired interfaces. The mitigation applied was setting the NetworkConnectivityStatusIndicator NoActiveProbe policy (HKLM\Software\Policies\Microsoft\Windows\NetworkConnectivityStatusIndicator\NoActiveProbe = 1); in several cases this eliminated full disconnects though a residual short bandwidth glitch (~2 seconds every 10–20 minutes) remained.

• WcmSvc bad‑state tracking suppression stabilized rapid Wi‑Fi reconnect cycles that interrupted meetings. Disabling WcmSvc bad‑state tracking (HKLM\SOFTWARE\Microsoft\WcmSvc\EnableBadStateTracking = 0) correlated with elimination of frequent drop‑and‑reconnect behavior on affected laptops.

• Router/vendor compatibility issues (observed on multiple Fritz!Box home networks) were resolved by applying vendor‑recommended router configuration changes; using a phone hotspot reproduced stable connectivity in those cases, supporting a router‑side compatibility cause.

• Client vendor updates resolved at least one home‑only periodic disconnect case: applying available driver/firmware updates via vendor tools (example: Lenovo System Update) correlated with elimination of 40–60 minute, multi‑second Wi‑Fi losses that did not occur in the office.

• In one case where diagnostics were inconclusive, full client replacement removed recurring hourly short disconnects, indicating a client‑specific hardware/software fault.

Across tickets, technicians documented providing the NCSI suppression registry command as a mitigation and observed that monitoring after the change sometimes showed no further incidents. Root causes therefore varied between Windows network‑status probes (NCSI), WcmSvc state handling, router compatibility/DNS interactions on consumer home routers, outdated client drivers/firmware, and at least one faulty client device.

13. Eduroam authentication protocol change request (PEAP→TTLS) requiring plaintext password forwarding
80% confidence
Problem Pattern

A request was made to change Eduroam authentication from PEAP-MSCHAPv2 to TTLS-PAP because a downstream service (Auth0) required the user's plaintext password to be forwarded from the RADIUS server. PEAP-MSCHAPv2 used challenge–response authentication so the plaintext password was not available for forwarding, preventing the new workflow.

Solution

The request documented the protocol limitation and the rationale for switching to TTLS-PAP (TTLS-PAP would allow the RADIUS backend to receive plaintext credentials). The change was identified as a configuration/protocol change with significant security implications because TTLS-PAP would expose plaintext passwords to backend systems. The ticket recorded those constraints and flagged the need for infrastructure/RADIUS and security review rather than applying an immediate configuration change.

Source Tickets (1)
14. Inquiry about Eduroam availability at public libraries and service ownership
90% confidence
Problem Pattern

Users asked whether Eduroam was available at public-library locations or whether their @iu account already provided Eduroam access. Reported symptoms were uncertainty about access/provisioning and inability to connect due to unclear credentials or availability. Affected systems included Eduroam, campus wireless, IU accounts, and public-library networks.

Solution

Support staff confirmed that Eduroam was managed by the university infrastructure team. They advised that public-library locations were not yet supported by the university-provided Eduroam service at the time of the inquiries and routed the request about public-library rollout to infrastructure; infrastructure committed to communicate availability when it changed. For individual users, staff confirmed Eduroam access was automatically provisioned for accounts with an @iu address, verified/enabled the requester's account (no approval required), and had the requester test connecting to the Eduroam SSID using their @iu credentials.

Source Tickets (3)
15. Temporary event Wi‑Fi using portable 5G routers and local LAN for large file sharing
70% confidence
Problem Pattern

An offsite event venue reported no Internet access and requested multiple portable WLAN/5G routers to provide connectivity for ~40–70 participants who needed to exchange multi‑gigabyte files; mobile reception at the venue was unknown and organizers required redundancy and sufficient WAN capacity for file sharing, email and web research.

Solution

The incident was resolved by provisioning five portable 5G routers (Cradlepoint and consumer 5G units) with prepaid high‑volume SIMs, performing an on‑site RF/signal survey to identify best router placement, and configuring uplink failover and SIM‑based load distribution across devices. A local LAN file‑share (LAN‑only NAS / SMB) was deployed so large files were exchanged without consuming WAN bandwidth, and QoS limits were applied on the routers to prevent any single user from saturating mobile uplinks. The temporary SSIDs and NAT were preconfigured and monitored during the event to adjust placement and redistribution of clients as needed.

Source Tickets (1)
16. Provisioning APs and switches for new or relocated office space
91% confidence
Problem Pattern

Wireless coverage or connectivity was absent or degraded in specific rooms or corridors, often reported by room or desk ID. Symptoms included no SSID visible in a room, very weak or uneven signal strength across a tract, or loss of wired desk/printer connectivity; affected systems were on‑premises Wi‑Fi, access points and switches. Problems typically produced no explicit error messages and were sometimes complicated by missing building documentation or lack of prior Wi‑Fi planning.

Solution

On-site assessments identified missing, disconnected, improperly mounted or unpowered access points, routers and switches, and technicians verified physical placement, mounting, power and patch-panel connectivity. Incidents were resolved by re-cabling, reconnecting and remounting devices, replacing or re-seating power supplies, and verifying wall outlet and patch-panel port power when devices would not power on. When inventory devices were present but not provisioned for the building, technicians either configured the APs for the site or arranged for pre-configured replacement units; unsuitable spare models were ordered and shipped or preferred spares were retrieved from inventory and transported to the site to coincide with other visits. Deployments ranged from prioritized single-room setups to multi‑AP rollouts (examples included single-room installs and 11‑AP deployments across reception, administration and office spaces). For coverage gaps or areas that never had Wi‑Fi, teams documented the absence of building plans, coordinated schedule access across rooms (including multi‑day visits when required) and captured RF planning requirements; Ekahau site surveys were used when site measurements and AP repositioning were required. Physical work also included securing mounting panels and performing requested desk hardware setup (monitors, docking stations, HDMI). Tickets were completed after installation, configuration or handover and confirmation that expected wired or wireless connectivity and signal coverage had been restored.

17. Re-establishing IU access after replacing a private home Wi‑Fi router
90% confidence
Problem Pattern

User replaced their private home Wi‑Fi router and could not (or was unsure how to) reconnect their Windows PC to the new wireless network; no error codes were reported and corporate IU services were inaccessible from the Home Office until the client was back on the new home network.

Solution

The issue was resolved by connecting the Windows PC to the new home SSID and authenticating with the router's new Wi‑Fi password via the Windows network UI. After the PC joined the new network, IU remote services functioned normally and the ticket was closed following user confirmation.

Source Tickets (1)
18. Migration from Windows NPS to Portnox and certificate‑based WLAN authentication with internal CA CRL
90% confidence
Problem Pattern

Team intended to replace an on‑prem Windows NPS RADIUS server for the CPG‑Corp WLAN and migrate client authentication to certificate‑based EAP for Windows 10/11 and macOS. The team had questions about how to handle certificate revocation for the internal CA (cpg.int). Systems involved included Windows NPS, CPG‑Corp WLAN, internal CA (cpg.int), and a planned Portnox deployment; eduroam used a separate RADIUS instance.

Solution

The organization procured Portnox to replace the Windows NPS RADIUS service and established a migration plan to move the CPG‑Corp SSID to certificate‑based authentication for Windows 10/11 and macOS clients. Certificate revocation was handled by leveraging the internal CA (cpg.int) CRL as the revocation source during the design and testing phases. Stakeholders were identified and coordination meetings were held to manage the phased migration; eduroam remained on its existing separate RADIUS infrastructure.

Source Tickets (1)
19. No campus-wide wireless presentation standard; rooms still rely on HDMI and local island devices
80% confidence
Problem Pattern

Rooms and lecture halls lacked a campus‑wide wireless presentation solution, so presenters were required to use HDMI cabling. Some buildings had isolated 'island' solutions (Click and Share in Hamburg, EZcast in Berlin), and prior attempts to deploy a unified wireless presentation system failed due to lack of cost approval and no established procurement/standard.

Solution

The situation persisted as a policy and funding decision rather than a technical fault: existing island deployments (Click and Share in Hamburg and EZcast devices in Berlin) were retained to provide limited wireless presentation capability, and the broader campus‑wide rollout had not been approved because cost/approval was withheld. The request was escalated to the academic council/cost‑approval process for consideration; until approval, rooms continued to rely on HDMI or the local island devices.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X