wusa /uninstall /kb:5009543
I really appreciate it!Code: Select allwusa /uninstall /kb:5009543
But I don't think we can do that in RouterOS..Workaround: To mitigate the issue for some VPNs, you can disable Vendor ID within the server-side settings. Note: Not all VPN servers have the option to disable Vendor ID from being used.
....
I am still able to connect successfully to Mikrotiks running 6.47.9 and 6.47.10 from Windows 10 with KB5009543 installed...
Wait... so disabling Vendor ID as which a Microsoft-recommended workaround for their broken update will essentially break the VPN for all users behind NAT? It's like 99% users now with mobile networks using CGNAT...Disabling Vendor ID sending on responder side is not a viable option in my opinion as NAT-T detection depends on Vendor ID's. So disabling Vendor ID option on server side would not allow clients behind NAT to connect, which are most of Windows users anyway.
https://datatracker.ietf.org/doc/html/r ... ection-3.1
yeah this works, and you will have reenter the L2TP username/password in windows, the IPsec PSK remained.Windows 10:Code: Select allwusa /uninstall /kb:5009543
Just use https://www.draytek.com/products/smart-vpn-client/yeah this works, and you will have reenter the L2TP username/password in windows, the IPsec PSK remained.Windows 10:Code: Select allwusa /uninstall /kb:5009543
2 slow :pMS has released a out-of-band fix for this VPN issue.
Windows 10: https://support.microsoft.com/en-gb/top ... f9857574f9
Windows update catalog (Win 10): https://www.catalog.update.microsoft.co ... =KB5010793
I've verified that VPN is working again after this fix.
Probably Win 11 is covered as well (I just dont have the links).
Thank you for sharing I liked the Client "Draytek" it's very useful.@inteq
Just L2TP with IPSECThank you for sharing I liked the Client "Draytek" it's very useful.@inteq
Did you test all the protocols working with MT?