Take a look over some of the common trouble shooting techniques for issues you are going to run into:
https://documentation.meraki.com/MX/Client_VPN/Troubleshooting_Client_VPN#Common_Connection_Issues
Error 809 is a semi-common one.
Some of the problems you will experience with L2TP over IPSec are:
- Sometimes when it isn't working Windows wont log anything. Consequently you will now have to debug the issue without any diagnostic info - or to put it another way - you will be debugging it blind. With Cisco AnyConnect you can use the DART module to get more diagnostics than you could hope for.
- Sometimes windows clients fail to detect their trafic is being NATed (such as when a user is at home). When this happens the home user home wont be able to connect unless you put in a registry key to force it to use a NAT friendly mode. AnyConnect to an ASA uses TLS - just like accessing a secure website, so does not have this issue.
- Some ISP routers don't NAT UDP traffic nicely. Some implement stupid max session limits such as 30s. So if a client is behind one of these they may never be able to connect or will only be able to connect for as long as the max UDP NAT session limit, and then the VPN will stopping passing traffic. AnyConnect uses TLS, which uses TCP, which is session orientated. TCP communicates session start (SYN) and session finish (FIN, RST) so even the dumbest home router knows when a session is still being used.
- Some software that install networks shims (such as some antivirus software, software firewalls, etc) just plain break L2TP over IPSec. You will find cases where you can't get it to work without uninstaling other software. It is very rare for AnyConnect to have problems with other software shims.
- L2TP over IPSec doesn't work well over 100% pure IPv6 networks. Usually it doesn't work at all. I don't recall the name now, but there is already an ISP in the USA only doing IPv6 connections. Many mobile carriers globally are now using IPv6. AnyConnect has full IPv6 support.
Also AnyConnect with an ASA allows for far more advanced controls. For example, if you are using RADIUS for authentication, you can push per user/group policies. For example, a VoIP contractor might only be allowed access to the phone system, a network engineer might only be allowed access to networking kit, etc.
With the Meraki imlementation pretty much everyone has the same level of access. Their are work arounds - but on your scale they are not going to be good enough.
This is my prediction, if you try and use L2TP over IPSec with 2,000 VPN users you will need an entire support person permanently just to deal with the client VPN issues.