VPN L2TP Passthrough works on IOS but Windows doesn't

Dear all,

I have the following configuration:

INTERNET --- ROUTER --- OPENWRT AP REPEATER---

When I connect to my router, I can connect to my office VPN with Windows 10 computer and my iPhone.
When I connecet to the OPENWRT AP Repeater I can connect to my Office VPN with my iPhone but not with my Windows Computer.

Here you hace my configuration:

/etc/config/firewall

config defaults
        option syn_flood '1'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'REJECT'

config zone
        option name 'lan'
        list network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'

config zone
        option name 'wan'
        list network 'wan'
        list network 'wan6'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-RADIUS-COA-Proto'
        option src 'wan'
        option proto 'udp'
        option dest_port '3799'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-WTP-Proto'
        option src 'wan'
        option proto 'udp'
        option dest_port '7773'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-WTP-TCP-Proto'
        option src 'wan'
        option proto 'tcp'
        option dest_port '58080'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-WTP-Old-TCP-Proto'
        option src 'wan'
        option proto 'tcp'
        option dest_port '80'
        option target 'REJECT'
        option family 'ipv4'

config rule 'wan_ssh_allow'
        option name 'Allow-WAN-SSH-Proto'
        option src 'wan'
        option proto 'tcp'
        option dest_port '22'
        option target 'ACCEPT'
        option family 'ipv4'

config rule 'lan_ssh_allow'
        option name 'Allow-LAN-SSH-Proto'
        option src 'lan'
        option proto 'tcp'
        option dest_port '22'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option src_ip 'fe80::/10'
        option src_port '547'
        option dest_ip 'fe80::/10'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config include
        option path '/etc/firewall.user'
        option reload '1'

config include
        option path '/etc/firewall.ipv6'
        option reload '1'
        option family 'ipv6'

config zone 'cluster_zone'
        option network 'cluster'
        option name 'cluster'
        option input 'accept'
        option output 'accept'
        option forward 'reject'

config rule 'private_cloud'
        option name 'Allow-private-cloud'
        option src 'wan'
        option proto 'tcp'
        option dest_port '8080'
        option target 'ACCEPT'
        option family 'ipv4'

config include 'miniupnpd'
        option type 'script'
        option path '/usr/share/miniupnpd/firewall.include'
        option family 'any'
        option reload '1'

/etc/config/network

config interface 'loopback'
        option ifname 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd1a:161f:534f::/48'

config interface 'lan'
        option type 'bridge'
        option force_link '1'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ifname 'eth0.2 eth0.1'
        option ipaddr '192.168.1.5'
        option macaddr '20:0d:b0:75:4c:60'

config eth0.1 'def_lan'

config ap 'workmode'

config interface 'wan'
        option macaddr '20:0d:b0:75:4c:61'
        option proto 'dhcp'
        option type 'bridge'

config eth0.2 'def_wan'

config switch
        option name 'switch0'
        option reset '1'
        option enable_vlan '1'

config switch_vlan
        option device 'switch0'
        option vlan '1'
        option ports '5 6t'

config switch_vlan
        option device 'switch0'
        option vlan '2'
        option ports '4 6t'

config 20:0d:b0:75:4c:60 'def_lan_macaddr'

config 20:0d:b0:75:4c:61 'def_wan_macaddr'

config 20:0d:b0:75:4c:64 'def_wlan0_macaddr'

config 20:0d:bc:75:4c:6b 'def_sta_macaddr'

Any help will be appreciated.

Thanks