You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

10.11.4 update broke native Cisco IPSec VPN

Every mac in my company that upgraded to 10.11.4 is now suffering the same issue with lack of VPN capability:


"The VPN server did not respond. Verify the server address and try reconnecting."


nslookup shows the headend is resolvable by the machine but it will not respond to the vpn request. Everything worked fine yesterday, the only change in the environment was the update from last night.


In searching the dev forum I see there was a bug specifically around this issue that had been "resolved". That may not be the complete case.

MacBook Pro with Retina display, OS X El Capitan (10.11.4)

Posted on Mar 22, 2016 2:47 PM

Reply
15 replies

Mar 23, 2016 1:22 AM in response to NHump99

Exactly same here - found this in /var/log/system that describes the issue (IP's redacted)



Mar 23 08:14:43 Dragunov nesessionmanager[417]: NESMLegacySession[89684807-78F0-4703-AFCC-9BC59DD46665]: Received a start command from SystemUIServer[288]

Mar 23 08:14:43 Dragunov nesessionmanager[417]: NESMLegacySession[89684807-78F0-4703-AFCC-9BC59DD46665]: status changed to connecting

Mar 23 08:14:43 Dragunov nesessionmanager[417]: IPSec connecting to server X.X.X.X

Mar 23 08:14:43 Dragunov nesessionmanager[417]: IPSec Phase1 starting.

Mar 23 08:14:43 Dragunov racoon[236]: accepted connection on vpn control socket.

Mar 23 08:14:43 --- last message repeated 1 time ---

Mar 23 08:14:43 Dragunov racoon[236]: IPSec connecting to server X.X.X.X

Mar 23 08:14:43 --- last message repeated 1 time ---

Mar 23 08:14:43 Dragunov racoon[236]: Connecting.

Mar 23 08:14:43 Dragunov racoon[236]: IPSec Phase 1 started (Initiated by me).

Mar 23 08:14:43 --- last message repeated 1 time ---

Mar 23 08:14:43 Dragunov racoon[236]: IKE Packet: transmit success. (Initiator, Main-Mode message 1).

Mar 23 08:14:43 Dragunov racoon[236]: >>>>> phase change status = Phase 1 started by us

Mar 23 08:14:43 --- last message repeated 1 time ---

Mar 23 08:14:43 Dragunov racoon[236]: none message must be encrypted, status 0x1461, side 0

Mar 23 08:14:46 --- last message repeated 1 time ---

Mar 23 08:14:46 Dragunov racoon[236]: IKE Packet: transmit success. (Phase 1 Retransmit).

Mar 23 08:14:46 Dragunov racoon[236]: none message must be encrypted, status 0x1461, side 0

Mar 23 08:14:49 --- last message repeated 1 time ---

Mar 23 08:14:49 Dragunov racoon[236]: IKE Packet: transmit success. (Phase 1 Retransmit).

Mar 23 08:14:49 Dragunov racoon[236]: none message must be encrypted, status 0x1461, side 0

Mar 23 08:14:52 --- last message repeated 1 time ---

Mar 23 08:14:52 Dragunov racoon[236]: IKE Packet: transmit success. (Phase 1 Retransmit).

Mar 23 08:14:52 Dragunov racoon[236]: none message must be encrypted, status 0x1461, side 0

Mar 23 08:14:53 --- last message repeated 1 time ---

Mar 23 08:14:53 Dragunov nesessionmanager[417]: NESMLegacySession[:89684807-78F0-4703-AFCC-9BC59DD46665]: status changed to disconnecting

Mar 23 08:14:53 Dragunov nesessionmanager[417]: IPSec disconnecting from server X.X.X.X

Mar 23 08:14:53 Dragunov racoon[236]: IPSec disconnecting from server X.X.X.X

Mar 23 08:14:53 --- last message repeated 3 times ---

Mar 23 08:14:53 Dragunov nesessionmanager[417]: NESMLegacySession[89684807-78F0-4703-AFCC-9BC59DD46665]: status changed to disconnected, last stop reason None

In addition I updated the iOS install on my iPhone 6 - and the exact same vpn with the exact config still works on my iPhone - so it's just OS X 10.11.4 affected.

Apr 21, 2016 7:06 AM in response to javaHelena

The common theme seems to be the Cisco Diffle Hillman group policies and the versions numbered 1,3,5. Apparently these should be avoided due to inadequate security (by way of Cisco forum suggestion) and you've done that you may get more Cisco oriented responses on their forums as to the issue.

https://supportforums.cisco.com/

from the strictly Mac OS X standpoint I would suggest what not to run on your system, this includes all 3rd party mac utilities for optimization or network, any mac Anti-Virus solution as these are known to cause problems, I'd also shut off any firewall to test, and include the Mac OS X built in VPN as part of that test (provided your VPN sever is set up to receive it) and if nothing else works make sure any device on your local network is not running anything to prevent tunneling. The manfacuter of the device may have a procedure to reset the devices to their defaults, make sure you note your current settings before resetting as you can screen shot on a mac using this procedure

How to take a screenshot on your Mac - Apple Support

Outside of that uninstall and reinstall the client in the current account or a new administrative account to test.

Past that this appears to be a cisco issue at this time, at least as far as Apple would see it in their EULA (see section O.)

10.11.4 update broke native Cisco IPSec VPN

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.