


What the policy does is to throw out all the 'automatic' calculation of what's Private. KB3036542, where the policy was added as a workaround. The group policy comes from an identified issue in Windows 8.x via.

So, now we've identified 'why' the Store is blocked (because the 0.0.0.0 gateway on the VPN adapter makes Firewall think its next hop is not Public, when the Store only works on an Internet (Public) network.).Netsh trace start scenario = "netconnection" capture=yes report=yes tracefile=c:\temp\trace.etl You can use Microsoft Message Analyzer to peek at the ETL files. Here are 2 commands to turn on (and turn off) logging to generate trace files. And from the Firewall rules, what happens if it's an "InternetClientServer" (via Manifest) app, and NOT on the 'public' profile? The "Block Outbound Default Rule" blocks the traffic.* The device is configured for DirectAccess, and the endpoint is part of the intranet address space. * Endpoints within the local subnet are considered private. * The intranet address space is composed of configured Active Directory sites and subnets * Endpoints within the intranet address space are considered private. * A device is on a network, and it is authenticated to a domain controller. * It is part of the local subnet of a trusted network. "What determines what network a device is connected to?" From the above-linked documentation:Ī network endpoint is considered part of the Home\Work Network if: pac file), Windows assumes it's a Domain (not 'Public') network profile. In our case connecting to VPN with the blank gateway (and in my case, also no 'PROXY' definition in the. Windows Firewall: There are 2 (hidden, even if FW is 'Off') rules that are in play: InternetClientServer Outbound Default Rule (allows traffic as long as the machine profile is 'public', not 'domain') Block Outbound Default Rule (blocks traffic if rules, including above aren't matched).This means, as long as the Store (well, technically, Windows Firewall) thinks it is passing the requests from the Store to the 'Internet', it will work.The Microsoft Store app could have also been classified different (as being able to talk to Work/Home networks, too, but the manifest doesn't state it).ĭocumentation on the Work/Home vs Internet (client or client+server) network capabilities.The file is here: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11909.1002.3.0_圆4_8wekyb3d8bbwe\AppxManifest.xml The Microsoft Store has a 'Manifest' file that says it can ONLY talk to Internet.You can the Microsoft Store from Settings app, and this will clear the (If you've successfully loaded the store on a non-VPN connection, it may 'appear' to work until you click on items in the store. I'll explain why that works in a moment.)ģ) Open the Store and receive the error. This issue, if you can, is to supply a 'PROXY' address outside of your Intranet. Your VPN adapter will get a blank (0.0.0.0) gateway.Ģ) In my case, I also had a proxy PAC file which had a 'DIRECT' statement (instead of a PROXY statement), because we capture all default web traffic and send (via GRE) to the proxy, vs explicitly providing a proxy address.
Private tunnel windows 10 issue how to#
How to break the Store and cause an 0x80131500 or other error:ġ) Configure your system with Palo Alto GlobalProtect VPN client. I'd like to document my findings for you and others who stumble upon this in the future. I've been bitten by this 'bug' in 2019 with our Palo Alto GlobalProtect VPN client.
