Jan 12 2022 08:52 AM
A couple forum posts:
Re: Client VPN Error After January Windows Updates - The Meraki Community
KB5009543 - January 11, 2022 Breaks L2TP VPN Connections : sysadmin (reddit.com)
These clearly outline the issue with the latest updates breaking VPN connectivity for many Meraki VPN systems (and perhaps others). Rolling back the update resolves the issue.
A couple questions for the Windows update team:
1. Any idea when Microsoft will be able to review, confirm and correct this issue?
2. If Microsoft were to release a fix for this part way through the month, how would you typically recommend this get deployed? Windows update for Business doesn't allow us to control/deploy anything other than the Feature and Quality updates. Is the recommendation to just remain unpatched until the February Quality update catches things up and presumably includes a fix for the VPN issue?
Jan 13 2022 12:44 AM
Jan 13 2022 01:17 AM - edited Jan 13 2022 01:32 AM
Morning,
Currently the work around is to uninstall the windows update (KB5009543), once uninstalled you will then need to restart your PC. After you have done this you will then be able to connect to the VPN.
Once you have tested the VPN connection and it was successful I would suggest to run "wushowhide" and hide the update so it doesn't reinstall until a fix has been released, however you don't need to do this bit for the VPN to work.
This is just a work around until a fix has been released for this issue.
Regards
Jan 14 2022 07:11 AM
@Atticraider
Attempts to uninstall using elevated command prompt and attempts to restore to a restore point both fail on my win10 desktop that I need to access my employer's network over l2tp (ipsec) using windows client. Is there another work around. I need this to continue in my job.
Jan 14 2022 07:42 AM - edited Jan 16 2022 07:17 AM
Thank you for sharing this is a known issue and Microsoft is aware of it and is working on the fix. As a workaround you may disable the "Vendor ID" in the VPN server (note not all VPN servers have this option).
In case it didn't work, you may uninstall the update.
Take a look at:
https://support.microsoft.com/en-us/topic/january-11-2022-kb5009566-os-build-22000-434-eee797fa-5ee3...
Jan 15 2022 11:37 AM - edited Jan 15 2022 11:43 AM
The option to be renoved from IPsec server's response is Vendor ID (instead of Vector ID), according to the referred link, but there are dozens of vendor ids, with different purposes each, that are exchanged between the client an the server. For example, to negotiate dead peer detection, tunnel over NAT, Xauth authentication, many really needed to establish a tunnel. I'll try to test some configuration on server side to try to disable some.
Jan 16 2022 07:18 AM
Jan 16 2022 06:11 PM
Can someone detail how we can disable Vendor ID?@BrianG-PPN
Jan 16 2022 06:13 PM
Jan 17 2022 02:01 AM
Jan 17 2022 09:30 PM
@Theo_Stauffer good news, MS released a patch yesterday and it worked for me. you can let your windows updates go through and KB5010793 will fix the issue that was introduced by KB5009543
Jan 18 2022 01:51 AM
Jan 18 2022 07:27 AM
Jan 18 2022 07:51 AM
Jan 19 2022 08:30 AM
Jan 19 2022 08:36 AM
Jan 19 2022 10:06 AM
@BrianG-PPN I can confirm the update works, but I got really surprised it is not released as critical update, as it does not seems reasonable Microsoft stop half the companies in the world and does not releases it to automatic applying. Testing, I installed all updates (as I asked all my customers to do) and the bug was there. So I could see one must choose the "Optional Updates", click on the bug correction and apply it manually. It will keep a lot of enterprises, where a technician cannot come computer by computer, in the Cave Era for some time yet.
Jan 19 2022 10:59 AM
Jan 20 2022 06:22 AM
SolutionJan 21 2022 01:56 AM
@BrianG-PPN I've got the exact same issue. It's frustrating as using WU4B is what MS recommend for a company like ours and now we are getting the worst experience when it comes to resolving an issue they have introduced.
I've also found pausing the update rings has not stopped this update from going out to some users.