Server 2019 Bugsd and workarounds
- After installing and promoting to domain controller the network type in the Network & Sharing Center still shows Public when it should be Domain. This blocks many domain only functions from being possible. For example, remote desktop with or without the gateway is not possible unless you go into the firewall settings to allow public access to port 3389 and/or port 443. Setting the Network Location Awareness service to Automatic (Delayed Start) does not provide enough time for other services to start so the correct network type is used. What I had to do was set up a task in Task Scheduler with “net stop nlasvc /y” to execute at system startup with a 5 minute delay. When the NLA service is stopped it will restart automatically, showing the correct network type of “Domain” upon its restart.
- Wireless WAP/WAP2 Enterprise not working. Unable to communicate with RADIUS. Turns out, the built in firewall rules for ports 1812 and 1813 just flat out are not working. To fix, manually create an incoming rule for UDP ports 1812-1813.
- NPS refuses all connections for RD Gateway for remote desktop, wireless and VPN. This is because NPS accounting is unable to write to the log files at C:\Windows\System32\Logs. Even though the default permissions are correct, writing to the logs fails with “permission denied”. To work around this configure accounting to log to a text file on the local computer and remove the checkmark from “if logging fails discard connection attempts”.
thank you for the first point, I had to do the same.