Skip to content

Commit 5aa5d42

Browse files
committed
freshness update
1 parent 92f2177 commit 5aa5d42

File tree

6 files changed

+32
-35
lines changed

6 files changed

+32
-35
lines changed
Lines changed: 32 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,61 +1,58 @@
11
---
2-
title: 'Troubleshoot Point-to-Site connections: Mac OS X clients'
2+
title: 'Troubleshoot Point-to-Site connections: macOS X clients'
33
titleSuffix: Azure VPN Gateway
4-
description: Learn how to troubleshoot point-to-site connectivity issues from Mac OS X using the native VPN client and IKEv2.
4+
description: Learn how to troubleshoot point-to-site connectivity issues from macOS X using the native VPN client.
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: troubleshooting
8-
ms.date: 02/10/2021
8+
ms.date: 09/04/2024
99
ms.author: cherylmc
1010
---
1111

12-
# Troubleshoot Point-to-Site VPN connections from Mac OS X VPN clients
12+
# Troubleshoot Point-to-Site VPN connections from macOS X VPN clients
1313

14-
This article helps you troubleshoot Point-to-Site connectivity issues from Mac OS X using the native VPN client and IKEv2. The VPN client in Mac for IKEv2 is very basic and does not allow for much customization. There are only four settings that need to be checked:
14+
This article helps you troubleshoot point-to-site connectivity issues from macOS X clients that use the native macOS X VPN client and IKEv2. VPN client configuration in macOS X is very basic for IKEv2 connections and doesn't allow for much customization. There are only four settings that need to be checked:
1515

1616
* Server Address
1717
* Remote ID
1818
* Local ID
1919
* Authentication Settings
2020
* OS Version (10.11 or higher)
2121

22+
## <a name="certificate"></a> Certificate-based authentication
2223

23-
## <a name="VPNClient"></a> Troubleshoot certificate-based authentication
24-
1. Check the VPN client settings. Go to the **Network Setting** by pressing Command + Shift, and then type "VPN" to check the VPN client settings. From the list, click the VPN entry that needs to be investigated.
24+
1. Check the VPN client settings. Go to **Settings** and locate **VPN**.
25+
1. From the list, click the **i** next to the VPN entry that you want to investigate. This opens the settings configuration for the VPN connection.
26+
1. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net.
27+
1. The **Remote ID** should be the same as the Server Address (Gateway FQDN).
28+
1. The **Local ID** should be the same as the **Subject** of the client certificate.
29+
1. For **Authentication**, verify that "Certificate" is selected.
30+
1. Click the **Select** button and verify that the correct certificate is selected.
31+
1. Click **OK** to save any changes.
2532

26-
![IKEv2 certificate-based authentication](./media/vpn-gateway-troubleshoot-point-to-site-osx-ikev2/ikev2cert1.jpg)
27-
2. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net.
28-
3. The **Remote ID** should be the same as the Server Address (Gateway FQDN).
29-
4. The **Local ID** should be the same as the **Subject** of the client certificate.
30-
5. Click on **Authentication Settings** to open the Authentication Settings page.
33+
If you're still having issues, see the [IKEv2 packet capture](#packet) section.
3134

32-
![Screenshot shows an Authentication Settings dialog box with Certificate selected.](./media/vpn-gateway-troubleshoot-point-to-site-osx-ikev2/ikev2auth2.jpg)
33-
6. Verify that **Certificate** is selected from the dropdown.
34-
7. Click the **Select** button and verify that the correct certificate is selected. Click **OK** to save any changes.
35+
## <a name="ikev2"></a>Username and password authentication
3536

36-
## <a name="ikev2"></a>Troubleshoot username and password authentication
37+
1. Check the VPN client settings. Go to **Settings** and locate **VPN**.
38+
1. From the list, click the **i** next to the VPN entry that you want to investigate. This opens the settings configuration for the VPN connection.
39+
1. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net.
40+
1. The **Remote ID** should be the same as the Server Address (Gateway FQDN).
41+
1. The **Local ID** can be blank.
42+
1. For **Authentication**, verify that "Username" is selected.
43+
1. Verify that the correct credentials are entered.
44+
1. Click **OK** to save any changes.
3745

38-
1. Check the VPN client settings. Go to the **Network Setting** by pressing Command + Shift, and then type "VPN" to check the VPN client settings. From the list, click the VPN entry that needs to be investigated.
46+
If you're still having issues, see the [IKEv2 packet capture](#packet) section.
3947

40-
![IKEv2 username password](./media/vpn-gateway-troubleshoot-point-to-site-osx-ikev2/ikev2user3.jpg)
41-
2. Verify that the **Server Address** is the complete FQDN and includes the cloudapp.net.
42-
3. The **Remote ID** should be the same as the Server Address (Gateway FQDN).
43-
4. The **Local ID** can be blank.
44-
5. Click the **Authentication Setting** button and verify that "Username" is selected from the dropdown.
48+
## <a name="packet"></a>Packet capture - IKEv2
4549

46-
![Screenshot shows an Authentication Settings dialog box with Username selected.](./media/vpn-gateway-troubleshoot-point-to-site-osx-ikev2/ikev2auth4.png)
47-
6. Verify that the correct credentials are entered.
50+
Download [Wireshark](https://www.wireshark.org/#download) and perform a packet capture.
4851

49-
## <a name="additional"></a>Additional steps
50-
51-
If you try the previous steps and everything is configured properly, download [Wireshark](https://www.wireshark.org/#download) and perform a packet capture.
52-
53-
1. Filter on *isakmp* and look at the **IKE_SA** packets. You should be able to look at the SA proposal details under the **Payload: Security Association**.
54-
2. Verify that the client and the server have a common set.
55-
56-
![packet](./media/vpn-gateway-troubleshoot-point-to-site-osx-ikev2/packet5.jpg)
57-
58-
3. If there is no server response on the network traces, verify you enabled IKEv2 protocol on the Azure Gateway Configuration page on the Azure portal website.
52+
1. Filter on *isakmp* and look at the **IKE_SA** packets. You should be able to look at the SA proposal details under the **Payload: Security Association**.
53+
1. Verify that the client and the server have a common set.
54+
1. If there's no server response on the network traces, verify you enabled IKEv2 protocol on the Azure VPN gateway. You can check by going to the Azure portal, selecting the VPN gateway, and then selecting **Point-to-site configuration**.
5955

6056
## Next steps
61-
For additional help, see [Microsoft Support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade).
57+
58+
For more help, see [Microsoft Support](https://portal.azure.com/?#blade/Microsoft_Azure_Support/HelpAndSupportBlade).

0 commit comments

Comments
 (0)