We had some issues with remote users logging on the VPN L2TP/IPsec service. These were getting ‘The L2TP connection attempt failed because a processing error occurred during the initial security negotiation with the remote computer’.
A few days ago I contact MS live support and ask them if they have any plan to add SHA2 for PH2 negotiation. and they told me that they will release an update this month.
Workaround: To mitigate the issue for some VPNs, you can disable Vendor ID within the server-side settings. Note: Not all VPN servers have the option to disable Vendor ID from being used.
Disabling Vendor ID sending on responder side is not a viable option in my opinion as NAT-T detection depends on Vendor ID’s. So disabling Vendor ID option on server side would not allow clients behind NAT to connect, which are most of Windows users anyway.
Interesting they say “Workaround: To mitigate the issue for some VPNs” - do they mean only some VPNs are broken, or all VPNs are broken and some may be fixed?
I am still able to connect successfully to Mikrotiks running 6.47.9 and 6.47.10 from Windows 10 with KB5009543 installed…
Wait… so disabling Vendor ID as which a Microsoft-recommended workaround for their broken update will essentially break the VPN for all users behind NAT? It’s like 99% users now with mobile networks using CGNAT…
Is there a way to disable vendor ID on Mikrotik’s? We are using mostly GR3 and RB1100 with 6.47.10 OS. I can see a Vendor ID option for DCHP but not for VPN’s.
Just use https://www.draytek.com/products/smart-vpn-client/
Works just fine with Mikrotik.
You can export your profiles and import them back when needed.
Haven’t used the Windows client directly in a long time.