Cisco Meraki VPN Terminated

microsoft-windows.jpg

If you’re trying to VPN to a Cisco Meraki security appliance and encounter the following error this post may be of help.

The connection was terminated by the remote computer before it could be completed.

For some unknown reason Windows will sometimes revert your network adapter settings for your L2TP VPN profile. Perform the following actions to resolve the issue.

Open Control Panel, select Network and Internet, Network and Sharing Center, and Change adapter settings. This should open a new dialog with all of your network connections. We’ll want to locate the L2TP VPN profile in question. You can do this by looking for one that says WAN Miniport (L2TP) in the description. Right click the profile and select Properties.

Under the Security tab you’ll want to verify the following settings. The Type of VPN should be set to Layer 2 Tunneling Protocol with IPsec (L2TP/IPsec). The Data encryption should be set to Require encryption (disconnect if server declines). Under the Authentication section you’ll want to verify that Allow these protocols is selected and Uncrypted password (PAP) is the only option checked. Once complete click OK and you should be good to go.




Windows Update Breaks L2TP (Cisco Meraki) VPN’s

microsoft-windows.jpg

A Windows update, KB5009543 for Windows 10 and KB5009566 for Windows 11 broke L2TP VPN connectivity causing the error below.

The L2TP connection attempt failed because the security layer encountered a processing error during initial negotiations with the remote computer.

The fix is quick and easy. Simply uninstall the update, restart, and you should be good to go.

Open Settings, Windows Update, Update history and select Uninstall Updates. Find KB5009543 for Windows 10 or KB5009566 for Windows 11 and uninstall. When complete you’ll be prompted to restart. Once the update is uninstalled your L2TP based VPN should be working again.

If you prefer PowerShell use the following command as an Administrator.


dism /Online /Remove-Package /PackageName:Package_for_RollupFix~31bf3856ad364e35~amd64~~19041.1466.1.6 /NoRestart /quiet; shutdown /r -t 60


Aruba Apache log4j Library Vulnerabilities for Silver Peak and Aruba IntroSpect

aruba.png

Aruba just released the following update regarding the Apache log4j library vulnerabilities. If you’re running a Silver Peak Orchestrator or other GMS products and/or Aruba IntroSpect this will be of interest to you.



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


Aruba Product Security Advisory
===============================
Advisory ID: ARUBA-PSA-2021-019
CVE: CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-4104, CVE-2021-44832 Publication Date: 2021-Dec-13 Last Update: 2022-Jan-11
Status: Confirmed
Severity: Critical
Revision: 3




Title
=====
Apache log4j library vulnerabilities



Overview
========
Five CVEs have been published about various vulnerabilities discovered in the Apache log4j library.


Details can be found at:
CVE-2021-44228 https://nvd.nist.gov/vuln/detail/CVE-2021-44228
CVE-2021-45046 https://nvd.nist.gov/vuln/detail/CVE-2021-45046
CVE-2021-45105 https://nvd.nist.gov/vuln/detail/CVE-2021-45105
CVE-2021-4104 https://nvd.nist.gov/vuln/detail/CVE-2021-4104
CVE-2021-44832 https://nvd.nist.gov/vuln/detail/CVE-2021-44832




Affected Products
=================
-- All Silver Peak Orchestrator and legacy GMS products. For details visit:
https://www.arubanetworks.com/website/techdocs/sdwan/docs/advisories/media/security_advisory_notice_apache_log4j2_cve_2021_44228.pdf


-- Aruba IntroSpect: Versions 2.5.0.0 to 2.5.0.6




Unaffected Products
===================
-- AirWave Management Platform
-- Aruba Analytics and Location Engine
-- Aruba Central / Central On-Premises
-- Aruba ClearPass Policy Manager
-- Aruba Instant / Aruba Instant Access Points
-- Aruba Instant On
-- Aruba Fabric Composer (AFC) and Plexxi Composable Fabric Manager (CFM)
-- Aruba NetEdit
-- Aruba User Experience Insight (UXI)
-- ArubaOS Wi-Fi Controllers and Gateways
-- ArubaOS SD-WAN Gateways
-- ArubaOS-CX Switches
-- ArubaOS-S Switches
-- HP ProCurve Switches
-- Aruba VIA Client


Other Aruba products not listed above are also not known to be affected by the vulnerability.




Details
=======
Since the discovery of these vulnerabilities, Aruba SIRT has been closely monitoring these threats and how they may affect Aruba products. Aruba SIRT consulted with the product teams, and Aruba Threat Labs performed various tests using POC (Proof of Concept) code against products.


Although some Aruba products use the log4j library, none of them use it in a way that makes them vulnerable the published vulnerabilities.
The conclusion of the investigation is that the products listed above under the Unaffected Products section are not vulnerable to these vulnerabilities.
If new information is discovered, this advisory will be updated.




Resolution
==========
Aruba IntroSpect: Version 2.5.0.7 and above




Exploitation and Public Discussion
==================================
These vulnerabilities are being widely discussed in public.
(POC) Proof of Concept code is also available for some of them.




Revision History
================
Revision 1 / 2021-Dec-13 / Initial release Revision 2 / 2021-Dec-17 / CVE-2021-45046 added; update on Silver Peak Orchestrator  Listing additional Aruba products in Unaffected Products Revision 3 / 2022-Jan-11 / CVE-2021-45105, CVE-2021-4104 and CVE-2021-44832 added  IntroSpect added to Affected Products  Overview, Details and Exploitation and Public Discussion Sections updated Resolution section added




Aruba SIRT Security Procedures
==============================
To receive Security Advisory updates, subscribe to notifications at https://sirt.arubanetworks.com/mailman/listinfo/security-alerts_sirt.arubanetworks.com


Complete information on reporting security vulnerabilities in Aruba Networks products and obtaining assistance with security incidents is available at:


https://www.arubanetworks.com/support-services/security-bulletins/




For reporting *NEW* Aruba Networks security issues, email can be sent to aruba-sirt(at)hpe.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found
at:


https://www.arubanetworks.com/support-services/security-bulletins/




(c) Copyright 2022 by Aruba, a Hewlett Packard Enterprise company. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information.
-----BEGIN PGP SIGNATURE-----


iQEzBAEBCAAdFiEEMd5pP5EnbG7Y0fo5mP4JykWFhtkFAmHYdvAACgkQmP4JykWF
htkM9wf9HU7s0SoLlYb9Osbln6UdiGeUMiGvg5rIHFH394aw2vPNCM5pCH2J/DSb
g8iXSnFBy1SfQemcCfOREN1jJVABTiZPcLj+hL8RYW8incLPxJZJb98mFtIzEqHL
wzoQB6cbbzVyptDM2CusbRp2j/Kk2c9+07BnDWbsAQedBoK5AGjqAykE4cO22uvd
4M9e2CQBiNEAL+7o5au6qMFFay3cI7EOZhI57jBHi8toaWxIRrXZzmcdPTzI6/wB
Ro6ZG3RRHV27fAzA/h0t9UOdGcVnSs1j3Z5pByw6D48svfnR891Mc4ufUDvE901r
ciMjlT8vbed4D/ankQ98dCmEEWh2Kw==
=4vfn
-----END PGP SIGNATURE-----


Windows 10/11 Copy Paste Issues

sonic-studio-iii.jpg

I have been dealing with copy paste issues lately and it has been highly disruptive to my workflow. At first the issue appeared to intermittently happen when using CTRL + C, CTRL + X, and/or CTRL + V. Since I needed to get work done I just plowed through it trying multiple copy and paste attempts before it finally took. After months of doing this I finally broke down and started using the right click context menu to select copy and paste manually. Not only was it slow, it required extra unnecessary work. The only issue, I still had the copy and paste issues. My initial trouble shooting would lead me to believe that it was a hardware issue with the keyboard, driver issue with the keyboard, Windows 10/11 update issue. Once I learned that the right click solution would lead to the exact same issues all of those previous considerations were thrown out the window.

Fast forward to today I finally broke down and began to troubleshoot to determine the root cause and I think I found the issue. Depending on the make and model of your motherboard you may have hardware and/or software that utilizes Sonic Studio III, Sonic Radar III, and DTS Sound Unbound. If you proceed further down that rabbit hole you may learn that the previous listed components also utilize drivers from Nahimic and/or A-Volute. It is these drivers that are responsible for the copy and paste issues as well as possible system stability issues. Remove the software and drivers and your copy and paste issues magically disappear. Use the following steps to clean your system from these software and driver components.

Uninstall Sonic Studio III, Sonic Radar III, and DTS Sound Unbound from Start > Settings > Apps if applicable. Next you will want to download a program (DriverStore Explorer) to manually remove the drivers from your system. Run DriveStore Explorer (Rapr.exe) as an administrator and remove any drivers from A-Volute and/or DTS. Make sure you get them all since they may be labeled with different providers. When you find and check all drivers that we need to remove make sure you select the “Force Deletion” option and finally “Delete Driver(s)”.

Next we need to open Device Manager, select “Show hidden devices” under the “View” menu and remove any devices related to DTS. Once complete restart your system and all should be good. As a sanity check you may want to verify that Sonic Studio, Sonic Radar, DTS Sound Unbound, and/or Nahimic is not running under task manager. Congrats, you finally have copy and paste working again. One thing to note, if you update drivers in the future, these software, service, and driver components may be reinstalled. Unfortunately you’ll need to redo this process or permanently disable the ability for Windows to auto update these components.


ASUS Acknowledges ROG MAXIMUS Z690 HERO Issues

asus-z690-hero.png

Looks like Tom’s Hardware was able to get an update from ASUS regarding the issues with the ASUS ROG MAXIMUS Z690 HERO. Link below.

ASUS’s Statement

Post from Juan Jose Guerrero III from the ASUS PC DIY Group.



<