Fix Windows VPN Client Never Connects in First Shot (L2TP/IPsec MFA Issue on Windows 10/11)

If your Windows VPN client never connects on the first attempt—even though you approve the Microsoft Authenticator prompt—you’re not alone. Many users have reported this issue when using L2TP/IPsec VPNs with EAP-MSCHAPv2 authentication and MFA via Microsoft Authenticator. Let’s break down what causes it and how to fix it.

Fix Windows VPN Client Never Connects in First Shot (L2TP/IPsec MFA Issue on Windows 10/11)
Fix Windows VPN Client Never Connects in First Shot (L2TP/IPsec MFA Issue on Windows 10/11)

What Causes the VPN to Hang After MFA Approval

When connecting to an L2TP/IPsec VPN, Windows often tries to log in automatically using your current Windows account credentials. Here’s what happens:

  1. You click Connect on the VPN client.
  2. The Microsoft Authenticator app prompts approval on your phone.
  3. You approve it—but the VPN connection stays stuck on “Verifying your sign-in info…”

On the second attempt, after you manually type your credentials, the connection succeeds.

This happens because Windows reuses your signed-in credentials by default, sending them to the VPN server in a format that doesn’t match what your RADIUS/NPS server expects (for example, it sends DOMAIN\user when it expects [email protected]).

Step-by-Step Fix (Windows 10 / 11)

1. Open the VPN Connection Settings

  1. Press Windows + R, type ncpa.cpl, and hit Enter.
  2. In Network Connections, right-click your VPN connectionProperties.
  3. Go to the Security tab.

2. Edit Authentication Settings

  1. Under Type of VPN, select L2TP/IPsec with pre-shared key or certificate (whichever your setup uses).
  2. In the Authentication section, select Microsoft: Secured password (EAP-MSCHAP v2) or your configured EAP method.
  3. Click Properties.
  4. Uncheck: “Automatically use my Windows logon name and password (and domain if any)”
  5. Click OK to save.

3. Reconnect and Enter Credentials Manually

  1. Disconnect any existing VPN session.
  2. Reconnect the VPN.
  3. Enter your full username (example: [email protected]) and password.
  4. Approve the Authenticator prompt when it appears.

This time the VPN should connect instantly without hanging.

Optional Checks for L2TP/IPsec Reliability

If the above doesn’t fully fix the issue, verify the following network and registry items:

SettingDescription
PortsEnsure UDP 500, UDP 4500, and UDP 1701 are open.
Registry keyHKLM\SYSTEM\CurrentControlSet\Services\PolicyAgent\AssumeUDPEncapsulationContextOnSendRule = 2 (needed for NAT-T).
Services“IKE and AuthIP IPsec Keying Modules” and “IPsec Policy Agent” must be running.

(To edit registry values: run regedit as admin → navigate to key → right-click → Modify.)

By disabling the “Automatically use Windows logon credentials” option, you prevent Windows from sending cached credentials that don’t match the identity required by your RADIUS or Azure MFA setup.

When you manually type your credentials, the system performs the correct EAP handshake, and MFA approval completes smoothly on the first try.

Pro Tip for IT Admins

If you deploy VPN profiles via Intune or Group Policy, ensure the EAP configuration in your XML or profile template also disables auto-use of Windows credentials. This prevents the “first-try fail” issue across all clients.

If your Windows L2TP/IPsec VPN always fails on the first attempt but connects on the second, the culprit is usually Windows reusing cached credentials.

Read More:

Turn off that option, re-enter your details manually, and your VPN will connect in a single shot every time.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    Your email address will not be published. Required fields are marked *