After updating MacOS to 13.2, the VPN stopped working properly.

I recently updated MAC OS from 13.0.1 to 13.2. When connecting to the office via Cisco AnyConnect (IPSec), the Internet stopped working. My second macbook is running 13.0.1 and there are no issues with VPN + Internet.



I figured out that the ptoblem is with the route flag 'UGScIg'.

When I connect to the office, for some reason, Mac 13.2 changes the default route flag:


Working scenario (Ventura 13.0.1 or Monterey 11.7.2) - Default route is with flag 'UGScg':

netstat -nr | grep 'default'

default 10.10.10.1 UGScg en0

default link#20 UCSIg utun2


Non working scenario (Ventura 13.2) - Default route flag changed to 'UGSIcg' (+I)

netstat -nr | grep 'default'

default link#20 UCScg utun2

default 10.10.10.1 UGSIcg en0


The workaround is to remove the default route and re-added this manually:

sudo route delete -net default

sudo route add default 10.10.10.1


The problem is only with users who have upgraded MAC OS to 13.2


I would appreciate any advice and information on this.


MacBook Pro 16″, macOS 13.2

Posted on Jan 25, 2023 2:23 PM

Reply
Question marked as Top-ranking reply

Posted on Jan 28, 2023 1:27 PM

I can't advise on your Meraki specifically, but it appears you must have v4 and v6 either both tunnel-all or both split for 13.2 to be happy. So... if you are doing tunnel-all for v6 and split-tunnel for v4, then you are going to run into this.


You HAVE to configure both protocols to be split tunnel to make it go away, BUT... apparently you can define the entire address space in two blocks and that still counts (makes sense from a routing perspective, even if it does sound absurd).


The end result for me, at least, is that v4 stays split like before, but v6 becomes a split tunnel. It still has a ::/0 default route outside the tunnel, BUT I have defined ::/1 and 8000::/1 as inside the tunnel. Those two combined cover the entire IPv6 address space, but as two separate blocks they are now more specific than that default route, so they win. And every single v6 packet gets tunneled. So, in practice it is identical to the prior config. It's just a dumber way of configuring it that happens to kick loose whatever dumbness is going on on the OS side.


So... You need to figure out where you define what tunnels are split in Meraki and add those two v6 blocks while setting v6 to split instead of tunnel-all.

Similar questions

11 replies
Question marked as Top-ranking reply

Jan 28, 2023 1:27 PM in response to bhey

I can't advise on your Meraki specifically, but it appears you must have v4 and v6 either both tunnel-all or both split for 13.2 to be happy. So... if you are doing tunnel-all for v6 and split-tunnel for v4, then you are going to run into this.


You HAVE to configure both protocols to be split tunnel to make it go away, BUT... apparently you can define the entire address space in two blocks and that still counts (makes sense from a routing perspective, even if it does sound absurd).


The end result for me, at least, is that v4 stays split like before, but v6 becomes a split tunnel. It still has a ::/0 default route outside the tunnel, BUT I have defined ::/1 and 8000::/1 as inside the tunnel. Those two combined cover the entire IPv6 address space, but as two separate blocks they are now more specific than that default route, so they win. And every single v6 packet gets tunneled. So, in practice it is identical to the prior config. It's just a dumber way of configuring it that happens to kick loose whatever dumbness is going on on the OS side.


So... You need to figure out where you define what tunnels are split in Meraki and add those two v6 blocks while setting v6 to split instead of tunnel-all.

Feb 6, 2023 10:24 AM in response to SkidMarc

Thank you for the input. Having the mac user connect over Remote PC for now and the owner choose to get a Windows laptop for the one user. He did not want to mess with rest of the remote users as they are working.


I turned off IPV6 on the users Mac it did not fix it as I hoped as the issue is on the vpn configuration side I guess.


I also found out that the remote user is connecting over Tmobile home internet hotspot and that typically does not work well with VPN.


Thank you

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

After updating MacOS to 13.2, the VPN stopped working properly.

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.