|
1 | 1 | ---
|
2 |
| -title: 'Troubleshoot Point-to-Site connections: Mac OS X clients' |
| 2 | +title: 'Troubleshoot Point-to-Site connections: macOS X clients' |
3 | 3 | titleSuffix: Azure VPN Gateway
|
4 |
| -description: Learn how to troubleshoot point-to-site connectivity issues from Mac OS X using the native VPN client and IKEv2. |
| 4 | +description: Learn how to troubleshoot point-to-site connectivity issues from macOS X using the native VPN client. |
5 | 5 | author: cherylmc
|
6 | 6 | ms.service: azure-vpn-gateway
|
7 | 7 | ms.topic: troubleshooting
|
8 |
| -ms.date: 02/10/2021 |
| 8 | +ms.date: 09/04/2024 |
9 | 9 | ms.author: cherylmc
|
10 | 10 | ---
|
11 | 11 |
|
12 |
| -# Troubleshoot Point-to-Site VPN connections from Mac OS X VPN clients |
| 12 | +# Troubleshoot Point-to-Site VPN connections from macOS X VPN clients |
13 | 13 |
|
14 |
| -This article helps you troubleshoot Point-to-Site connectivity issues from Mac OS X using the native VPN client and IKEv2. The VPN client in Mac for IKEv2 is very basic and does not allow for much customization. There are only four settings that need to be checked: |
| 14 | +This article helps you troubleshoot point-to-site connectivity issues from macOS X clients that use the native macOS X VPN client and IKEv2. VPN client configuration in macOS X is very basic for IKEv2 connections and doesn't allow for much customization. There are only four settings that need to be checked: |
15 | 15 |
|
16 | 16 | * Server Address
|
17 | 17 | * Remote ID
|
18 | 18 | * Local ID
|
19 | 19 | * Authentication Settings
|
20 | 20 | * OS Version (10.11 or higher)
|
21 | 21 |
|
| 22 | +## <a name="certificate"></a> Certificate-based authentication |
22 | 23 |
|
23 |
| -## <a name="VPNClient"></a> Troubleshoot certificate-based authentication |
24 |
| -1. Check the VPN client settings. Go to the **Network Setting** by pressing Command + Shift, and then type "VPN" to check the VPN client settings. From the list, click the VPN entry that needs to be investigated. |
| 24 | +1. Check the VPN client settings. Go to **Settings** and locate **VPN**. |
| 25 | +1. From the list, click the **i** next to the VPN entry that you want to investigate. This opens the settings configuration for the VPN connection. |
| 26 | +1. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net. |
| 27 | +1. The **Remote ID** should be the same as the Server Address (Gateway FQDN). |
| 28 | +1. The **Local ID** should be the same as the **Subject** of the client certificate. |
| 29 | +1. For **Authentication**, verify that "Certificate" is selected. |
| 30 | +1. Click the **Select** button and verify that the correct certificate is selected. |
| 31 | +1. Click **OK** to save any changes. |
25 | 32 |
|
26 |
| -  |
27 |
| -2. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net. |
28 |
| -3. The **Remote ID** should be the same as the Server Address (Gateway FQDN). |
29 |
| -4. The **Local ID** should be the same as the **Subject** of the client certificate. |
30 |
| -5. Click on **Authentication Settings** to open the Authentication Settings page. |
| 33 | +If you're still having issues, see the [IKEv2 packet capture](#packet) section. |
31 | 34 |
|
32 |
| -  |
33 |
| -6. Verify that **Certificate** is selected from the dropdown. |
34 |
| -7. Click the **Select** button and verify that the correct certificate is selected. Click **OK** to save any changes. |
| 35 | +## <a name="ikev2"></a>Username and password authentication |
35 | 36 |
|
36 |
| -## <a name="ikev2"></a>Troubleshoot username and password authentication |
| 37 | +1. Check the VPN client settings. Go to **Settings** and locate **VPN**. |
| 38 | +1. From the list, click the **i** next to the VPN entry that you want to investigate. This opens the settings configuration for the VPN connection. |
| 39 | +1. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net. |
| 40 | +1. The **Remote ID** should be the same as the Server Address (Gateway FQDN). |
| 41 | +1. The **Local ID** can be blank. |
| 42 | +1. For **Authentication**, verify that "Username" is selected. |
| 43 | +1. Verify that the correct credentials are entered. |
| 44 | +1. Click **OK** to save any changes. |
37 | 45 |
|
38 |
| -1. Check the VPN client settings. Go to the **Network Setting** by pressing Command + Shift, and then type "VPN" to check the VPN client settings. From the list, click the VPN entry that needs to be investigated. |
| 46 | +If you're still having issues, see the [IKEv2 packet capture](#packet) section. |
39 | 47 |
|
40 |
| -  |
41 |
| -2. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net. |
42 |
| -3. The **Remote ID** should be the same as the Server Address (Gateway FQDN). |
43 |
| -4. The **Local ID** can be blank. |
44 |
| -5. Click the **Authentication Setting** button and verify that "Username" is selected from the dropdown. |
| 48 | +## <a name="packet"></a>Packet capture - IKEv2 |
45 | 49 |
|
46 |
| -  |
47 |
| -6. Verify that the correct credentials are entered. |
| 50 | +Download [Wireshark](https://www.wireshark.org/#download) and perform a packet capture. |
48 | 51 |
|
49 |
| -## <a name="additional"></a>Additional steps |
50 |
| - |
51 |
| -If you try the previous steps and everything is configured properly, download [Wireshark](https://www.wireshark.org/#download) and perform a packet capture. |
52 |
| - |
53 |
| -1. Filter on *isakmp* and look at the **IKE_SA** packets. You should be able to look at the SA proposal details under the **Payload: Security Association**. |
54 |
| -2. Verify that the client and the server have a common set. |
55 |
| - |
56 |
| -  |
57 |
| - |
58 |
| -3. If there is no server response on the network traces, verify you enabled IKEv2 protocol on the Azure Gateway Configuration page on the Azure portal website. |
| 52 | +1. Filter on *isakmp* and look at the **IKE_SA** packets. You should be able to look at the SA proposal details under the **Payload: Security Association**. |
| 53 | +1. Verify that the client and the server have a common set. |
| 54 | +1. If there's no server response on the network traces, verify you enabled IKEv2 protocol on the Azure VPN gateway. You can check by going to the Azure portal, selecting the VPN gateway, and then selecting **Point-to-site configuration**. |
59 | 55 |
|
60 | 56 | ## Next steps
|
61 |
| -For additional help, see [Microsoft Support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade). |
| 57 | + |
| 58 | +For more help, see [Microsoft Support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade). |
0 commit comments