VPN

Network

16 sections
239 source tickets

Last synthesized: 2026-02-13 01:33 | Model: gpt-5-mini
Table of Contents

1. Missing or unavailable VPN client/profile in Company Portal (Intune) prevented resource access

42 tickets

2. VPN authentication failures due to expired or invalid credentials

25 tickets

3. NordLayer onboarding, licensing and organization-ID issues

57 tickets

4. Azure SQL / Data Warehouse blocked by server firewall IP restrictions

13 tickets

5. Connecting to corporate VPN from home when user is unfamiliar with pre-login network options

26 tickets

6. Installer blocked by elevation error — resolved by using Company Portal managed install

10 tickets

7. Unclear VPN connection indicator on Windows taskbar (IU VPN)

1 tickets

8. Cloud migration and onboarding confusion: VPN not required for most remote access

45 tickets

9. VPN-connected but on-site devices unreachable due to hung network switch

1 tickets

10. Outbound HTTP blocked from VM when VPN tunnel termination (Barracuda) changed behavior

2 tickets

11. Consumer VPN (PureVPN) lost internet connectivity with Chrome; user migrated to corporate VPN

6 tickets

12. NordLayer installation failures caused by corrupted SCCM/Software Center client

2 tickets

13. Unstable site-to-site VPN carrying eduroam during Barracuda→Meraki transition

2 tickets

14. Campus network outage caused RAS name-resolution failures and VPN/WiFi disconnects

4 tickets

15. Client-VPN dial-in node instability in Datacenter FR2 causing dropped sessions and authentication failures

2 tickets

16. Windows 11 client unable to establish corporate VPN session from home

1 tickets

1. Missing or unavailable VPN client/profile in Company Portal (Intune) prevented resource access
92% confidence
Problem Pattern

Devices could not reach corporate resources because the required VPN client/profile or tenant certificate was missing, not assigned, hidden in self‑service catalogs, or not applied to the device. Common symptoms were no VPN option in Windows VPN settings or taskbar, Company Portal returning no VPN app or failing to render VPN entries, rasphone showing no VPN configurations, single‑sign‑on pages (Okta, Microsoft 365/Teams) hanging or failing, or the corporate VPN network appearing under 'known networks' but not listed as an available/selectable network. Triggers included missing or incorrect Azure AD/Entra app or group assignments, permission‑gated or deprecated VPN packages, tenant‑certificate gaps, provisioning restrictions for cloud‑only or new Windows 11 devices, and distribution group mismatches (including Meraki client group assignments). Affected systems included Intune/Company Portal, Windows 10/11 endpoints and client deployments using Meraki or packaged installers.

Solution

Access failures were resolved by ensuring the required VPN client/profile and any tenant certificates were provisioned and published through the organisation’s self‑service catalogs (Intune Company Portal, IT Service Portal, SelfService) or distributed via packaging channels (PMPC/EPM/paketierung). Support actions included enabling or assigning backend VPN packages and profiles (examples: IU_ResetVPN_1.2 / “Reset VPN”, CPG‑VPN_LOGON, NordLayer, OpenVPN/Azure VPN for macOS, Cisco Secure Client MSIs) and making AWS ClientVPN available in the IT Service Portal when required. Where visibility or installation was blocked, support corrected Azure AD/Entra app and group assignments (including adding the appropriate ResetVPN assignment groups), adjusted Meraki client group deployments when used, unlocked or reassigned catalog entries, and remedied software‑catalog UI rendering issues. Tenant certificates were installed alongside VPN clients to remove “unsecure server” warnings and to allow credential delivery; Safe‑Link secrets, licensing or approval gaps and software‑catalog approval requirements were resolved when they prevented installation. When installer execution required elevated rights, Adminion (Admin Rights App) was enabled or temporary admin rights were granted. Support accounted for Company Portal propagation and device sync delays (commonly ~15 minutes but sometimes longer) and asked affected users to open Company Portal (Apps tab), use Sync and wait for propagation; new or cloud‑only Windows 11 devices sometimes required completion of onboarding steps or a restart before VPN installs or profiles appeared. Some VPN profiles required on‑site provisioning or time‑limited access workflows were delivered via Microsoft My Access Access Packages after approval. Remote troubleshooting, certificate or installer delivery and coordination were performed via Microsoft Teams. After these actions, downstream services (Redshift/legacy DWH, Metabase, DBeaver, Power BI data sources, SMB/WebDAV shares, printers and SSH bastions) became reachable and VPN connections succeeded.

2. VPN authentication failures due to expired or invalid credentials
95% confidence
Problem Pattern

Users experienced VPN authentication and reconnection failures across Okta web SSO, Ivanti VPN clients, and Windows and macOS VPN clients. Symptoms included explicit "incorrect credentials" or "connection disconnected" messages, suppressed or missing credential prompts, OS-level admin or separate name/password dialogs on macOS, MFA approvals that showed "approved" but did not complete sign‑on, VPN clients reporting "connected" while network resources were unreachable, and error codes such as 868, 789, or 691. Other precise failures included AD errors stating "The security database on the server does not contain a computer account for this workstation trust relationship," failed sign‑on on newly provisioned devices, and recurring reconnects after network drops or when VPN was launched after OS sign‑in instead of at pre‑logon.

Solution

Authentication and reconnection problems were resolved by correcting credential state, client configuration and timing, cached sign‑in state, session timing, local network/router interference, device authentication/certificate state, device provisioning (including VPN client and USB/token setup), and resource authorization. Key observed fixes included:

• Client credential configuration: Unchecking the VPN client option that attempted to "use same credentials as Windows" revealed suppressed credential prompts and restored logins.
• Okta credential recovery: Okta password resets and account recovery restored VPN access; signing out of the browser or using an incognito session was sometimes required for successful Okta sign‑in. A new Okta password containing special characters restored access in at least one case.
• macOS-specific remediation: A macOS client that showed an OS admin password prompt and separate name/password dialogs was restored after support reset the user's VPN access/credentials during a remote session, after which the macOS client successfully signed in.
• Username and pre‑logon timing: Using the full IU email address as the VPN username and launching the VPN at pre‑logon rather than after OS sign‑in resolved username/timing mismatches.
• Ivanti session timeout: Increasing Ivanti VPN session timeout from 10 hours to 10.5 hours (630 minutes) eliminated cases where delayed mobile MFA approvals arrived after session expiry and were rejected as password mismatches.
• Autologon and cached credentials: Forcing a one‑time credential prompt (for example via rasphone.exe) or clearing cached OS credentials and rebooting restored access when sign‑in state was stale; permanently disabling autologon/automatic credential reuse removed recurring reconnect failures after home network drops.
• Network isolation and router issues: Testing from alternate networks (mobile hotspot) and restarting home routers isolated and resolved ISP/router behaviors that caused clients to show as "connected" while resources were unreachable.
• Device authentication and certificates: Dormant laptops that returned error 868 followed by 789 were associated with expired or stale local device certificates or device authentication state; device reauthentication or certificate renewal restored connectivity.
• Device provisioning and VPN hardware/token setup: Newly provisioned devices sometimes lacked the VPN client configuration or companion USB/token setup; support installation/configuration of the VPN client and vendor-supplied VPN USB/token and completion of the one‑time secret pickup restored the ability to save settings and authenticate.
• AD computer‑account/trust issues: Cases producing the AD error "The security database on the server does not contain a computer account for this workstation trust relationship" were resolved by infrastructure fixes to the computer account/domain trust on the server side, after which VPN authentication succeeded.
• Resource authorization: Access failures to specific network shares were resolved by correcting AD/group membership for the affected resources; attempts from inside the target network were observed to fail because VPN access was not required on‑campus.

After applying the appropriate combination of these fixes — addressing client credential settings (including the "use same credentials as Windows" option), performing Okta password resets/account recovery, resetting VPN access/credentials for affected accounts (including during remote support sessions for macOS), using the full IU email username, launching the VPN at pre‑logon, increasing Ivanti session timeout to 630 minutes, disabling autologon/automatic credential reuse, clearing cached OS credentials or rebooting, restarting local routers when interference was implicated, renewing device certificates or reauthenticating devices, provisioning/configuring VPN client and USB/token hardware during device setup, and correcting AD computer account or group membership where needed — affected users were able to authenticate and regain VPN and resource connectivity.

3. NordLayer onboarding, licensing and organization-ID issues
94% confidence
Problem Pattern

Users were unable to complete NordLayer onboarding or obtain usable VPN sessions. Reported symptoms included sign‑in/authentication failures (e.g., “incorrect email or password”), SSO finishing while the client showed “unable to log in”, missing or undelivered account invitations or installation links, self‑service flows prompting for Organization/Company ID ('iu_emergingmarketunit'), no gateways listed, approval/procurement or licensing cost objections blocking provisioning, privacy or data‑collection concerns about NordLayer (including its browser extension), and clients stuck on ‘connecting with NordLynx’ or disconnecting. Affected systems included the NordLayer admin console, Okta/SSO, Software Center/Intune/Company Portal/Self Service Portal, and corporate email delivery.

Solution

Onboarding and access failures were resolved by ensuring correct license assignment, account mapping and invitation delivery from both the NordLayer admin console and the identity provider. Administrators verified and explicitly assigned NordLayer licenses and group mappings in NordLayer and Okta/AD, re-sent or created account invitations (using alternate addresses such as onmicrosoft.com when iu.org delivery failed), and—where necessary—deleted and re-created accounts or removed and re-added Okta/NordLayer group assignments so users could complete password setup. Password-reset/forgot‑password links and SSO sign‑in were used as alternatives. Self‑service flows that required the Organization/Company ID were satisfied by supplying the ID ('iu_emergingmarketunit'). Users who signed in but saw no gateways regained connectivity after the organization’s booked NordLayer gateways/servers were added to its server lists. Provisioning that was blocked by approval workflows was cleared by reassigning or re-adding the designated approver to retrigger notifications; IT intake generally required a software request including manager approval and a cost center (examples recorded: CC23000, CC13000). Procurement of additional licenses was handled by teams requiring them; documented pricing was roughly $80/year per user and Security did not provision paid licenses in at least one case. Data‑protection/privacy concerns were escalated and reviewed; the data‑protection team reported no objections to NordLayer’s use in the recorded review (including the browser extension). Endpoint install and state conflicts were resolved by provisioning via Company Portal/Intune or the IU Self Service Portal (macOS/Windows), supplying installation guides and links when invitation emails lacked them, and correcting a Windows update package ('NordLayer_Nordlayer_3.6.0_Update') that left Intune reporting installed while Company Portal reported not installed. Support observed that a test AD group (IUG-AD-Nordlayer) sometimes appeared and that visibility in Okta’s dashboard or Software Center did not guarantee a properly mapped license; explicit account invitations and license/group assignments restored access in multiple incidents. Clients stuck on 'connecting with NordLynx' recovered after quitting and restarting the NordLayer client. The NordLayer app was available from the Self Service Portal/Software Center and could be installed without administrative rights when deployed through those portals.

4. Azure SQL / Data Warehouse blocked by server firewall IP restrictions
63% confidence
Problem Pattern

Clients could not reach cloud databases, SaaS apps, or vendor platforms because the destination or upstream network rejected the client’s apparent source IP, flagged an unexpected geolocation or network origin, or otherwise did not route protocols over the VPN. Common symptoms included explicit 'client IP not allowed' firewall messages, SSO failures such as 'You can’t sign in from this workstation', browser timeouts, intermittent push/pull/authentication failures, and application degradation that cleared when the VPN was disabled. Failures were often isolated to a single client or to users whose traffic egressed from an unexpected VPN egress, ISP/CGNAT, shared router, or when VPN tunnels showed as connected but encrypted traffic did not pass due to route or address-space mismatches (for example internal use of a public 7.0.0.0/8 range).

Solution

Investigations found services were refusing traffic because the client source IP, VPN egress IP, or upstream provider was not an allowed origin, or because routing and address-space mismatches prevented encrypted traffic from traversing a connected tunnel. Resolutions recorded: allowlisting the client source range or the VPN egress IP at the service (for Azure SQL/Data Warehouse this included adding a firewall rule in the Azure portal or using sp_set_firewall_rule on the master database); moving traffic to an egress IP/country that matched the provider’s allowlist; and disabling or replacing VPNs that egressed from disallowed locations. Several incidents traced intermittent or group authentication failures to ISP/router/CGNAT concurrency limits or upstream provider firewalls that blocked protocols; those were resolved by changing egress provider or tunnel endpoint. One class of failures involved IPSec tunnels that reported 'connected' on appliances (Meraki MX) while encrypted traffic was not visible on the cloud side; those incidents were resolved when office addressing was corrected or when the cloud/VPN routing was updated so office subnets were advertised and reachable. In a few cases teams presented an allowlisted egress by running a local/provisioned tunnel or proxy for third‑party IP‑authenticated licenses, and connections succeeded once the allowlist or egress changes propagated.

5. Connecting to corporate VPN from home when user is unfamiliar with pre-login network options
92% confidence
Problem Pattern

Windows laptops failed to establish pre‑login VPN/VDI tunnels, preventing access to on‑prem resources, enterprise app authentication, and automatic campus printer discovery/installation. Symptoms included pre‑login sessions stuck at “Connecting”, Error 868 (RAS server name could not be resolved), Error 809 (L2TP‑over‑IPSEC blocked), one‑time‑password failures, and post‑sign‑in application or printing authentication failures. Failures occurred on non‑corporate networks — including home routers lacking VPN passthrough, mobile‑broadband/nano‑SIM networks that blocked L2TP, missing or stale corporate SSID entries, or when Windows 11’s Windows Hello sign‑in flow or account recreation changed authentication state.

Solution

Affected devices already contained preconfigured pre‑login corporate VPN/VDI profiles; incidents were resolved by restoring the network conditions or authentication state required for those pre‑login sessions to complete. In multiple cases staff restored a missing CPG‑Corp SSID and removed stale Wi‑Fi entries so the CPG‑VPN‑Logon profile could be re‑added; once devices joined the CPG‑Corp SSID users completed pre‑login VPN/VDI connections via the Windows sign‑in network icon or the CPG‑VPN‑Logon button, which restored access to on‑prem resources and allowed centrally provisioned campus printers to be assigned and installed. Ivanti/VDI sessions that appeared stuck at “Connecting” recovered only after a full VPN session had established before launching the dependent application (one incident recovered after switching to the LIBF‑Staff SSID and waiting ~10 minutes). Several onboarding first‑logon failures produced Error 868 and one‑time‑password authentication failures when users attempted initial sign‑in without using the pre‑login VPN tunnel; those cases were resolved after confirming VPN setup for Windows 10 devices and using the pre‑login VPN tunnel before initial login. Where accounts had been recreated, staff confirmed Okta web access and had users authenticate with their Okta email and password off‑campus; after Okta credentials were confirmed, CPG‑VPN‑Logon button VPN logons succeeded even when an initial taskbar/button connection had failed. Error 809 failures were attributed to mobile‑broadband (Speedbox/nano‑SIM) blocking L2TP; affected users regained VPN access after connecting via an alternate non‑mobile or non‑SIM network. One home‑network case produced Error 868 because the consumer/ISP router had VPN passthrough/VPN support disabled; after the ISP enabled VPN support on the router the RAS name resolution error cleared and the VPN connected. On Windows 11 Early Adopter devices the Windows Hello (PIN/biometric) sign‑in flow prevented the documented pre‑login VPN/VDI login process and required escalation to the specialist team for compatibility or policy decisions.

6. Installer blocked by elevation error — resolved by using Company Portal managed install
95% confidence
Problem Pattern

Users reported VPN install or connection failures caused by privilege and compatibility constraints. On Windows installers produced UAC prompts or errors such as "the requested operation requires elevation" or required changing system DNS; on macOS installers sometimes completed but produced no usable app. Some VPN clients (including portal-installed apps) enforced membership of the local Administrators group or other local permissions, preventing non-admin use. Additionally, users received VPN configurations that were encrypted or password‑protected (ZIP) and could not be opened, and supplied VPN types (e.g., WireGuard) were incompatible with the organization's standard client (Cisco Secure Client).

Solution

VPN failures were resolved by multiple privilege, deployment, and delivery workarounds. Windows MSI installers that required elevation were published to the corporate Company Portal and installed as managed/elevated deployments (one deployment was validated for one day); where portal-managed deployment or package publishing was unavailable, one-time administrative elevation was granted so installers, DNS changes, or other system modifications could complete. In cases where a portal-installed client still blocked use because it enforced membership of the local Administrators group or similar local permissions (reported for a WireGuard install), resolution required granting the necessary local rights or performing a privileged installation so the client could run for the user. For macOS where reinstallation produced no usable Cisco Secure Client application, an installer was run on a working Mac and the resulting installation/application files were copied to the target Mac; reinstalling from those copied files produced a usable application. Where users received encrypted or password-protected configuration archives that would not open, the issue was resolved by reissuing the correct password or delivering the configuration by an alternate means. Finally, compatibility gaps (for example, an organisation-standard Cisco Secure Client not supporting WireGuard) were handled by providing an approved alternative client via the portal or addressing permission blockers on the alternative client so the user could connect.

7. Unclear VPN connection indicator on Windows taskbar (IU VPN)
90% confidence
Problem Pattern

User on Windows 10 reported uncertainty whether the IU VPN remained connected after initial login because the normal Wi‑Fi icon did not visibly change to a distinct VPN indicator; no error messages appeared and the user expected a different icon or persistent visual cue.

Solution

Support inspected the Windows 10 network area and confirmed the VPN status was shown by the top symbol (three connected circles) in the network flyout. The status text read "Connected" when the IU VPN was active. It was also confirmed that the IU VPN required manual connection each morning and did not maintain an automatic persistent session.

Source Tickets (1)
8. Cloud migration and onboarding confusion: VPN not required for most remote access
93% confidence
Problem Pattern

Users reported missing or unusable classic VPN access (no visible VPN client or unable to add/dial), VPN dial failures with RAS/L2TP errors (for example “The remote connection was not established because the name of the RAS server could not be resolved” and “L2TP VPN server is not responding”), and failures to auto‑connect to corporate SSIDs. After a recent VPN portal upgrade some users saw an unfamiliar remote‑PC login portal that failed because it required a bookmarked target and a browser plugin (or presented an alternative option restricted by licensing), causing remote‑PC sign‑in confusion. Mapped/network drives appearing unavailable after migration to SharePoint and printing issues that previously relied on VPN were also reported. Problems occurred on Windows 11 and macOS devices and were frequently triggered when connected to guest Wi‑Fi or when the device already had internal network access.

Solution

Support confirmed the environment had migrated to a cloud‑first model and that most corporate services (Teams, SharePoint, Outlook, Care, MyCampus, EPOS) were reachable without a classic VPN. Repeated Windows 11 cases showed no visible VPN UI and manual attempts to add classic VPNs often failed with RAS/L2TP name‑resolution or server‑not‑responding errors. A small subset of users required VPN for legacy on‑prem resources; on managed devices those legacy VPN profiles (for example CPG‑VPN‑LOGON) were sometimes provisioned or activated in the background so no visible VPN entry appeared. Attempts to dial classic VPN from guest networks commonly produced DNS/RAS resolution failures because internal hosts were not reachable from IU‑Guest. Conversely, VPN services did not establish a tunnel when the device already had internal network access (for example on CPG‑Corp), so no external VPN was required from the office. Wi‑Fi state issues were a frequent cause of on‑site connectivity symptoms — forgetting and rejoining corporate SSIDs (CPG‑Corp/CPG‑Group/eduroam) restored auto‑connect and resolved missing‑network or missing‑VPN‑option behavior. macOS cases with missing credential prompts, inability to remove stored networks, or L2TP errors were escalated to device‑management and identity teams (Jamf/Okta/Active Directory) for profile and Wi‑Fi configuration remediation. Okta Verify functioned only as MFA and was not a VPN client. Requests to provision corporate VPN on personal devices were declined per security policy. Reports of printing failures that previously relied on VPN were traced to legacy printer configurations; printing worked without VPN after correct drivers and network printer configuration were applied. Cases where mapped/network drives appeared unavailable were caused by migration of local/network drives to SharePoint and were forwarded to the specialist SharePoint/drive‑migration team for remediation and password resets. After a VPN portal upgrade some users encountered an unfamiliar remote‑PC login portal: support found the primary connection flow required a bookmarked target computer and a browser plugin that had been blocked, while the alternate connection option was restricted by licensing; support adjusted portal access/plugin/licensing and closed the incidents. Onboarding and training documentation was updated to remove obsolete VPN steps for Windows 11, and remote support (Teams) was used as needed to complete Office installation and resolve sign‑in/setup issues.

9. VPN-connected but on-site devices unreachable due to hung network switch
80% confidence
Problem Pattern

Users established VPN connections but could not reach on‑site resources (Dokbox shares, Varioprint, certificate printer). The printer's web UI and IP did not respond to HTTP or ping, and the printer appeared offline for multiple users at the affected site.

Solution

On‑site network troubleshooting found the local switch servicing the print server had hung and was making the printer and its web UI unreachable despite active VPN sessions. Restoring the switch's functionality (reboot/power‑cycle or replacement of the hung switch) returned the print server, Dokbox access and Varioprint connectivity to normal.

Source Tickets (1)
10. Outbound HTTP blocked from VM when VPN tunnel termination (Barracuda) changed behavior
85% confidence
Problem Pattern

Azure VMs with only private IPs lost outbound internet access on specific protocols/ports (notably HTTP/port 80) while HTTPS (443) often remained reachable; internal LAN HTTP continued to work. The outage frequently coincided with changes, disconnection, or routing activity on a legacy Azure VPN tunnel terminating on a Barracuda firewall. Affected systems included application VMs and automation services (UiPath/Automation Anywhere), and scheduled bots failed to start.

Solution

Investigations found the outage was caused by changes or disconnection of a legacy Azure VPN tunnel that terminated on a Barracuda firewall; a Microsoft-side change and subsequent routing activity altered which outbound traffic the tunnel/firewall allowed or inspected. The legacy VPN connection was rebuilt/re-established and routing was restored; after the tunnel was reconnected, outbound HTTP (port 80) and other previously blocked ports were restored and affected automation workloads resumed. No NIC network security groups had been changed and the Azure VPN Gateway configuration remained otherwise unchanged. A domain controller restart was observed around the outage window in one case, but recovery correlated with restoring the legacy VPN/routing rather than local NIC changes.

Source Tickets (2)
11. Consumer VPN (PureVPN) lost internet connectivity with Chrome; user migrated to corporate VPN
90% confidence
Problem Pattern

Users experienced partial or complete loss of internet access or severe degradation of specific applications when VPN clients or browser extensions were active. Symptoms included total no‑internet, application‑specific failures (for example Twilio disconnecting while Salesforce remained reachable), site‑specific 403 Forbidden responses tied to VPN routing, browser‑specific failures after Chrome changes, and degraded performance when home ISPs provided IPv6‑only connectivity that interacted poorly with the VPN. Affected components included consumer VPN clients and extensions, corporate VPN clients, web browsers, and web applications that depend on geo‑sensitive routing or authenticated sessions.

Solution

Third‑party consumer VPN clients and browser extensions had caused both complete internet loss and application‑specific failures; connectivity was restored in multiple incidents after the consumer VPN was disconnected or removed. One destination returning 403 Forbidden became accessible after the VPN was disconnected (or after the destination was whitelisted while the VPN remained active). A Twilio disconnect (while Salesforce remained reachable) was resolved after browser cache and cookies were cleared and the VPN was deactivated for testing. Where consumer VPN software produced persistent failures (including no internet after a Chrome reinstall), affected users were migrated to corporate VPN access (NordLayer/NordVPN); accounts and licenses were created and assigned and corporate browser‑extension accounts/invitations were provided for geo‑testing. In one case corporate VPN traffic exhibited very slow or failed web and database queries from a user’s home network; the ISP indicated the home link was IPv6‑only and likely interacted poorly with the VPN. That case was temporarily mitigated by issuing a 40 GB eSIM and shipping a smartphone to the user for use as a hotspot, restoring acceptable connectivity while the root cause was investigated.

12. NordLayer installation failures caused by corrupted SCCM/Software Center client
90% confidence
Problem Pattern

NordLayer deployments to Windows laptops via SCCM/Software Center or Company Portal failed or were unavailable. Symptoms included the NordLayer package not appearing in Software Center/Company Portal/Okta, installation attempts hanging or showing generic errors, lack of required admin credentials preventing installation, and cases where the package installed but the NordLayer client did not start. Incidents sometimes coincided with other system issues (missing Company Portal, unexpected removal of other applications, degraded battery).

Solution

When the SCCM/Software Center client on the laptop was corrupted, reinstalling the SCCM client restored Software Center functionality; after that the NordLayer package installed successfully and the user was provisioned with credentials/access. Other incidents showed different causes: devices that were not enrolled in Company Portal/Okta or where users lacked local admin rights did not see the NordLayer package in Software Center/Company Portal or could not begin installation. Installation attempts from Company Portal/Software Center sometimes hung, and in one reported case a remote reinstall allowed the package to install but the NordLayer client did not start. Some affected systems also exhibited unrelated symptoms (unexpected removal of TeamViewer, severely degraded battery) and those were escalated to the appropriate hardware/support teams.

Source Tickets (2)
13. Unstable site-to-site VPN carrying eduroam during Barracuda→Meraki transition
40% confidence
Problem Pattern

An IPsec site-to-site VPN between an on-prem Barracuda appliance and an Azure VPN Gateway carrying eduroam/student traffic was repeatedly and spontaneously disconnecting multiple times per week, requiring manual reconnection. A Meraki-based replacement tunnel was provisioned but initially did not pass eduroam traffic while the legacy Barracuda tunnel remained online as a fallback. Affected systems included Azure VPN Gateway, Barracuda VPN, Meraki, RADIUS authentication, wireless controllers, and related DNS/group-sync and provisioning systems.

Solution

A Meraki-based site-to-site VPN was provisioned to replace the unstable Barracuda→Azure tunnel; during the cutover the legacy Barracuda tunnel was intentionally left active as a fallback so user connectivity was preserved while the Meraki link was investigated. The Meraki deployment was documented and troubleshooting showed the Meraki tunnel initially did not carry eduroam traffic while the Barracuda tunnel remained online. The migration surfaced additional eduroam operational issues that were recorded as outcomes of the effort: RADIUS lacked secondary/backup servers and did not have Zabbix monitoring configured; several eduroam-related DNS and Azure group-sync inconsistencies were identified; eduroam CAT location naming and postal-code constraints in the eduroam UK portal were noted; and overlapping Wi‑Fi profiles (CPG‑Corp and eduroam) that caused devices to prefer the wrong SSID were observed. Those findings and the Meraki cutover details were captured for follow-up remediation alongside the VPN work.

Source Tickets (2)
14. Campus network outage caused RAS name-resolution failures and VPN/WiFi disconnects
93% confidence
Problem Pattern

Campus-wide CPG_Corp network outages caused RAS name-resolution failures producing the VPN logon error "The remote connection was not established because the name of the RAS server could not be resolved" and periodic IU-Study Wi‑Fi client disconnects (~30 seconds). Separately, intermittent site-level internet degradations at remote offices produced unstable VPN and IU‑Study access, poor or garbled VoIP/Twilio calls, degraded Teams call and video quality, slow downloads, and difficulty playing videos. Affected components included VPN clients, RAS name resolution/DNS, Wi‑Fi SSIDs (IU‑Study/employee), APs, and local WAN uplinks (fiber/telecom provisioning or 5G).

Solution

The campus-wide incident was escalated to the campus network team; restoration of the CPG_Corp network service resolved RAS name-resolution errors, eliminated VPN logon failures for CPG_VPG-LOGON/CPG-Corp, and stopped the periodic IU‑Study Wi‑Fi disconnects. For intermittent site-level degradations (example: Kiel), support performed network triage — collecting exact locations, SSID, timing, and affected applications — and identified symptoms consistent with upstream WAN issues (local fiber/LWL provisioning or an unstable 5G uplink) that impacted VPN, IU‑Study, VoIP/Twilio and Teams. Those site incidents required carrier/provider and onsite-networking escalation for remediation; no campus-wide configuration change was identified as the root cause in the ticket record.

15. Client-VPN dial-in node instability in Datacenter FR2 causing dropped sessions and authentication failures
85% confidence
Problem Pattern

Client VPN sessions originating through the Datacenter FR2 dial-in node were dropping intermittently. Users reported authentication failures and degraded client VPN performance; no specific error codes were provided. The issue affected client-VPN dial-in services hosted in the FR2 datacenter and reduced remote-access reliability for affected users.

Solution

The Client‑VPN dial‑in node in Datacenter FR2 was reconfigured and then restarted. Following the change and restart, client VPN connections, authentication, and session performance returned to normal. The administrator (Reinhard) validated the recovery and closed the incident.

Source Tickets (2)
16. Windows 11 client unable to establish corporate VPN session from home
70% confidence
Problem Pattern

Windows 11 user at a remote/home location reported inability to establish a corporate VPN session. Multiple VPN error messages were shown and connection attempts repeatedly failed. The user contacted support via Microsoft Teams for remote assistance.

Solution

A support engineer connected to the user's machine via Microsoft Teams and executed a local reconnection script on the Windows 11 laptop. Running that script re-established the VPN client/session and restored remote access.

Source Tickets (1)
Back to Summaries
An unhandled error has occurred. Reload X