Hello @Jerry ,
Many thanks for that (nicely sanitized) data - it was just what I wanted; it is nice to collaborate with someone so competent. The data is also a big step forward in solving the problem.
When no L2TP VPN is active, there are normally no L2TP objects in the WFP state; they are added by RasMan when trying to connect the VPN. Here is a trace from my system that shows the objects that are added at that time:
If you view the image in its original size, you should see that it adds "IKE Exemption" filters and L2TP specific filters and provider context.
If you run a "strings" program (capable of showing UTF-16 strings) over %SystemRoot%\System32\rasmans.dll and %SystemRoot%\System32\mprddm.dll and search for L2TP, you will probably find:
L2TP Server Inbound and Outbound Filter
L2TP Server Outbound Filter
L2TP Server Inbound Filter
L2TP Server Filter1
L2TP Client Inbound and Outbound Filter
L2TP Client Specific Filter
L2TP No Encryption Quick Mode Policy
L2TP Optional Encryption Quick Mode Policy
L2TP Require Encryption Quick Mode Policy
L2TP Require Max Encryption Quick Mode Policy
L2TP Custom Encryption Quick Mode Policy
L2TP Main Mode Policy
What you probably won't find is the string "L2TP UDP ports" (I can't find that anywhere on my system), but there are 54 filters with that name in your WFP state (referring to ports 500, 4500 and 1701).
Where you probably will find the string is in the "Windows Defender Firewall with Advanced Security" MMC snap-in (in both the "Inbound Rules" and "Outbound Rules" lists).
Some person or component (almost certainly not from Microsoft) has added these rules/filters. Just disabling the rules should enable the built-in VPN to work.
If you can identify the source of the rule, you should be able to prevent the problem from reoccurring.
Gary