Frequently Asked Questions
You can access file servers on your iPhone and iPad using VPN Tracker for iOS and the Files app:
- Connect to your VPN
- Open the Files app
- Tap the ··· icon in the top right corner
- Choose 'Connect to Server'
- Enter your file server hostname or IP address (e.g.
fileserver.internal.example.com
) - Sign in with your company login credentials when prompted
You should now see your file server volumes as you do on macOS.
Troubleshooting tips
If you experience trouble listing your files, there are a few things to try:
- Enter the full volume path, not just the server hostname: e.g. if you are connecting to the share called
Marketing
on your fileserver, enterfiles.internal.example.com/Marketing
- Ask the person who manages the file server to enable SMBv2 as well as SMBv3 (iOS uses some v2 features to set up the connection)
- Try a 3rd party file server app from the App Store. Some of them offer better compatibility with certain file server configurations
The following VPN protocols are currently not supported by VPN Tracker for iPhone / iPad:
- L2TP
- PPTP
Workarounds
Many VPN gateways support more than one VPN standard. Check your VPN gateway or ask your network administrator and see if a compatible protocol can be enabled instead.
Tip: Hide Unsupported Protocols
Inside VPN Tracker, go to Settings → Connection Settings to hide unsupported connections from your list.
The remaining value of your current plan will be credited toward your new plan.
Alternatively, you can choose a new VPN Tracker plan that contains iOS support.
You can access files on your network file storage on your iPhone or iPad using the Files app. Here's how it works:
- Open the Files app
- Tap the ··· option button and choose "Connect to Server" (or hit ⌘+k on your iPad keyboard
- Enter your file server's IP address or hostname
- Enter your username and password when prompted
Can't see your file shares?
If you just see an empty directory instead of shares, you may need to add the share you're trying to access to the path.
For example: If you are trying to access the file share work
on the server 192.168.50.2
, enter the server address as smb://192.168.50.2/work
- Tap the connection. The connection card appears.
- Tap on “Feedback”
- Provide a short description of the connection problem
- Tap on Send
Get VPN Tracker for iOS here.
WireGuard® is a registered trademark from Jason A. Donenfeld.
Discover VPN Tracker for iOS now.
Important note: VPN connections using PPTP or L2TP will not appear on iPhone or iPad as they are currently not supported on iOS.
Tip: Not sure which protocol your connection uses? Check the black protocol badge displayed in VPN Tracker 365 on your Mac.
Accessing connections on iOS
When you sign in to VPN Tracker for iOS with your equinux ID and password, your Personal Safe and TeamCloud connections will show up in the app.
Use the filter in the top left corner of the app to only see TeamCloud connections from your team or personal connections from Personal Safe.
Important: If you have connections which you have only saved locally on your Mac, these will not be available on your other devices. To get those connections onto your iPhone or iPad, right click the connection and choose "Add to Personal Safe" or "Share with TeamCloud".
Those connections will show up on your iPhone or iPad.
You can create and edit connections right inside my.vpntracker.com using any browser. Thanks to advanced engineering, this works with the same data security you know from VPN Tracker on the Mac.
It works like this
- Choose your device brand and model
- Enter your connection details
To save your new connection:
- You enter your equinux ID password
- Your encrypted secure master key is fetched from my.vpntracker
Now a program is run locally on your device through your browser that handles encryption:
- The local encryption program decrypts the master key on your device
- Then it uses your master key to encrypt the new connection data
- The fully encrypted connection is then uploaded to your Personal Safe or TeamCloud on my.vpntracker
- Your Mac, iPhone or iPad can then fetch the encrypted connection, ready for you to connect
So there you have it. Integrated connection editing on my.vpntracker with the full security and end-to-end encryption you know from VPN Tracker for Mac.
Connect to your VPN on the go on your iPhone or iPad using the new VPN Tracker for iOS app.
- Multiprotocol VPN support
- High speed connections
- Zero-config VPN - thanks to TeamCloud & Personal Safe technology
Test VPN Tracker for iPhone and iPad.
Assuming you have created a certificate for your VPN connection and want to use it on iOS (so as not to get a certificate error message when starting the connection).
Send the certificate to your iPhone/iPad:
> Send the certificate to you by email or transfer it via Airdrop. Open it on iOS. A message appears asking whether you want to install it on the device. Confirm this message. The question is a bit misleading because it isn't installed at all, it's just loaded onto the device.
Then you have to carry out two steps:
First step: Install certificate
> Home screen > Settings > General > VPN and device management > Loaded profile > Tap profile name
> Tap “Install” profile (top right)
afterwards (this step is often forgotten!)
Second step: Trust the certificate
> Home screen > Settings > General > Info > Certificate settings > Set the switch next to the certificate to green
Get early access here.'>Discover VPN Tracker for iOS.
Visit our step-by-step guide to 2FA for more details.
To sign-in to your equinux ID with two-factor authentication, please make sure you're using the latest version of VPN Tracker for Mac or VPN Tracker for iPhone & iPad.
In general, this will work fine for the majority of VPN connections. However, there are a few points to be aware of:
- PPTP VPN connections are not supported, as iOS and Android do not support PPTP passthrough
- For IPsec VPN connections, it's possible you may have to adjust your settings for NAT-T.
This link will directly take you to your profile administration:
https://apple.co/2Th4vqI
You will find all running subscriptions under "Subscriptions." You can also disable the automatic extension of your subscriptions.
VPN Tracker 10
Support for VPN Tracker 10 ends on March 31st 2021. VPN Tracker 10 will not receive any updates/support after this date.
VPN Tracker 9
Support for VPN Tracker 9 ends on March 31st 2020.
After March 31st 2020, VPN Tracker 9 will not receive any updates/support after this date.
VPN Tracker versions 1-8
These legacy versions are no longer supported.
How to get support & updates
If you are still using a older VPN Tracker version, we strongly recommend you move to a modern VPN Tracker 365 plan, which includes ongoing updates and support.
What happens to unsupported products?
As they are no longer being updated, they may stop working due to changes on your VPN gateway, server or other technical requirements.
In comparison to SSL VPN, IPSec is able to offer you much faster connection speeds as it runs on the network layer – level 3 of the OSI model – meaning it’s much closer to the physical hardware.
Check out this post to find out more about how to improve your VPN performance.
- Protocol Explanation:
- Point-to-Point Tunneling Protocol (PPTP): PPTP is a protocol that facilitates the secure transfer of data between a user's device and a VPN server. It creates a tunnel through which data is encapsulated, providing a secure connection.
- Encryption and Security:
- Encryption: PPTP employs various encryption methods to secure the data transmitted through the tunnel, making it difficult for unauthorized parties to intercept or decipher.
- Ease of Setup:
- User-Friendly Setup: PPTP is known for its simplicity and ease of setup. It's often the preferred choice for users who prioritize a straightforward configuration process.
- Compatibility:
- Widespread Compatibility: PPTP is compatible with a wide range of devices and operating systems, including Windows, macOS, Linux, iOS, and Android, making it accessible for users across different platforms.
- Speed and Performance:
- Performance Considerations: PPTP is recognized for its relatively fast connection speeds, making it suitable for activities like streaming and online gaming.
- Considerations for Security-Conscious Users:
- Security Concerns: While PPTP offers a convenient solution for many users, it's important to note that some security experts have raised concerns about its vulnerability to certain types of attacks. Users with high-security requirements may want to explore alternative VPN protocols like OpenVPN or L2TP/IPsec.
- Choosing the Right VPN Protocol:
- Consider Your Needs: When selecting a VPN protocol, it's essential to consider your specific requirements, including the balance between ease of use and the level of security needed for your online activities.
In summary, PPTP VPN is a widely accessible and user-friendly protocol suitable for various devices. However, users should be mindful of their specific security needs and consider alternative protocols if stronger encryption is a priority.
Did you know? VPN Tracker is the only VPN Client for Mac for PPTP VPN under macOS Sonoma and macOS Sequoia.
If your VPN connection is configured to be Host to Everywhere, all non-local network traffic is sent over the VPN tunnel once the connection has been established. All non-local traffic includes traffic to public Internet services, as those are non-local, too. Those services will only be reachable if your VPN gateway has been configured to forward Internet traffic sent over VPN to the public Internet and to forward replies back over VPN, otherwise Internet access will stop working.
A possible workaround is to configure a Host to Network connection instead, where only traffic to configured remote networks will be sent over VPN, whereas all other traffic is sent out like it is when there is no VPN tunnel established at all. In case the remote network are automatically provisioned by the VPN gateway, this has to be configured on the VPN gateway, automatic provisioning has to be disable in VPN Tracker (not possible for all VPN protocols), or the Traffic Control setting has to be used to override the network configuration as provided by the gateway (Traffic Control is currently not available on iOS).
A Host to Everywhere setup may be desirable for reasons of anonymity or to pretend to be in a different physical location (e.g. a different country), since all your requests will arrive at their final destination with the public IP address of the VPN gateway instead of your own one. Also that way you can benefit from any maleware filters or ad blockers running on the VPN gateway, yet it also means that the gateway can filter what services you have access to in the first place. If Host to Everywhere is desired but not working, this has to be fixed on at the remote site, since what happens to public Internet traffic after being sent over the VPN is beyond VPN Tracker's control.
If the connection is configured to use remote DNS servers without any restrictions, all your DNS queries will be sent over the VPN. Before any Internet service can be contacted, its DNS name must be resolved to an IP address first and if that isn't possible, as the remote DNS server is not working correctly or unable to resolve public Internet domains, the resolving process will fail and this quite often has the same effect in software as if the Internet service is unreachable.
A possible workaround is to either disable remote DNS altogether, if not required for VPN usage, or to configure it manually, in which case it can be limited to specific domains only ("Search Domains"). By entering a search domain of example.com, only DNS names ending with example.com (such as www.example.com) would be resolved by the remote DNS servers, for all other domains the standard DNS servers will be used as configured in the system network preferences.
Using a remote DNS server may be desirable to filter out malicious domains, to circumvent DNS blocking of an Internet provider, to hide DNS queries from local DNS operators (since DNS is typically unencrypted), or to allow access to internal remote domains that a public DNS server cannot resolve, as they are not public. For the last case, configuring the internal domains as search domains is sufficient. For all other cases, the issue must be fixed at the remote site, since what happens to DNS queries after being sent over the VPN is beyond VPN Tracker's control.
The license options we offer are as follows:
- VPN Tracker for Mac BASIC - 1 Connection
- VPN Tracker for Mac PERSONAL - 10 Connections
- VPN Tracker Mac & iOS EXECUTIVE - 15 Connections
- VPN Tracker Mac & iOS PRO - 50 Connections
- VPN Tracker Mac & iOS VIP - 100 Connections
- VPN Tracker Mac & iOS CONSULTANT - 400 Connections
To upgrade your existing licenses, please go to the subscriptions tab in your my.vpntracker.com account and press the "Upgrade" Button. You can then choose a a suitable license from the dropdown link under "New Plan".
We hope that this licensing model will make the licensing more clear moving forward.
Discover VPN Tracker for iOS now.
WireGuard® is a registered trademark of Jason A. Donenfeld.
Each certificate has a private key. This serves as proof that you are the owner of the certificate or are authorized to identify yourself with this certificate, since only authorized people are ever allowed to have access to the private key, while the certificate can and often is accessible to everyone. So I can easily get the certificate of any web server or OpenVPN gateway, because both send me the certificate when I try to connect to them, but without a private key I cannot identify myself with the certificate .
If an attacker wants to pretend to be a specific OpenVPN gateway, e.g. to get passwords from users, then he has to set up his own OpenVPN gateway and redirect his victim's data traffic there, both of which are quite possible. But then he has a problem: he also has to identify himself as the correct gateway. However, if the client does not check whether the gateway address is in the certificate, it can simply use a user certificate from a VPN user, because this is also signed with the same CA as the gateway certificate.
It is much easier to get a user certificate and its private key than the gateway certificate.
To get the gateway certificate, you have to hack into the gateway directly, but if I have unrestricted access to the gateway, then I no longer need the certificate because then I can intercept passwords directly at the gateway and have full access immediately to all private networks behind it.
Gateways are of course designed to be as difficult to attack as possible, in contrast to users' work computers, which can be much more easily foisted with a Trojan. And it's even easier if a VPN user wants to act as a hacker himself, because he has regular access to a valid user certificate including a matching private key and can thus get other users' passwords, which may grant him extensive access rights Passwords are often managed centrally and the same password is also used for other company services.
That's why it's not enough that a certificate is valid and signed with the appropriate CA, it also has to be ensured that the gateway certificate is really the gateway certificate and also matches the gateway you're currently talking to, anything else undermines the whole thing Security concept of certificates.
Reset 2FA for your equinux ID
If you no longer have access to your 2FA device, you can reset 2FA using your recovery codes. Visit the 2FA guide for details.
I don’t have recovery codes
If you no longer have your recovery codes, 2FA can be reset by the equinux support team. Please note that for security reasons, manual 2FA reset will take up to 72h to process, to reduce the risk to accounts.
To proceed, please contact equinux support with your equinux ID and our team will let you know which additional data is required to reset your 2FA setup.
- Download the OpenVPN configuration file from the Unifi console.
- Open the configuration file with a text editor.
- Identify this line:
Cipher AES-256-CBC
- Change the line to:
AES-256-GCM
- Save the file.
- Import the file into VPN Tracker
Some host names can resolve to both IPv4 and IPv6 addresses, but depending on your current network location and VPN gateway it's possible that only IPv4 addresses work correctly.
You can enforce resolving to IPv4 addresses only for your connection:
- Edit your connection.
- Navigate to the “Advanced Options” section.
- In “Additional Settings”, change the setting “Connect using IPv4 or IPv6” to “Use IPv4”.
- Save your connection and start your connection.
Another way to completely disable IPv6 for Wi-Fi on macOS:
1. Open the Terminal app from the Utilities folder.
2. Enter the following command:
sudo networksetup -setv6off Wi-Fi
Note: If your Wi-Fi interface has a different name (e.g., `en0`), replace "Wi-Fi" with the correct name. You can check the name of the interface using this command:
networksetup -listallnetworkservices
3. After entering the command, you'll be prompted to enter your admin password.
This will completely disable IPv6 for your Wi-Fi connection.
Our detailed step-by-step guide shows you exactly how to set up a VPN connection on your SonicWALL device using VPN Tracker 365.
To get connected, follow these 3 steps:
- Open VPN Tracker and add a new WireGuard® connection
- Upload your WireGuard® configuration file or scan your QR code
- Save your connection to your account using secure end-to-end encryption
You can now connect to your WireGuard® VPN server on Mac, iPhone or iPad.
→ More information on connecting to WireGuard® VPN in VPN Tracker
WireGuard® is a registered trademark of Jason A. Donenfeld.
We therefore recommend turning off TLS crypt on the server. TLS crypt is activated by the following entry in the server config: "tls-crypt ta.key".
If you remove this, nothing changes except that TLS crypt is no longer used and must also be switched off in VPN Tracker. This still gives you an encrypted connection, it's just no longer double encrypted, but simply encrypted once.
This makes the connection even faster and not more insecure. TLS-Crypt only serves to make it impossible for attackers to find an OpenVPN server on the network and, if necessary, to paralyze it via a DoS attack, because if the first packet is not correctly encrypted, the server will not respond to the packet at all.
Without a TLS crypt it would respond and only the negotiation of the key would then fail, but then an attacker would know that an OpenVPN server is running there and could bombard it with requests until it collapses, since it is responsible for every request computing time has to be spent.
If no lifetime is set in VPN Tracker, VPN Tracker takes one hour (3600 seconds). The connection can be edited in VPN Tracker and this value can be increased. To keep the key valid for 24 hours, you would have to set the value to 86400 seconds.
The same should be stored on the server side.
If your OpenVPN connection drops after a while, it may be due to the rekeying period. Test whether extending the period can solve the problem.
Proceed as follows:
- Edit your OpenVPN connection in VPN Tracker
- Navigate to "Advanced Settings > Phase 2"
- Change the Lifetime value to 28800 (which corresponds to a period of 8 hours)
If this doesn't resolve your issues, may also want to check your interoperability keep-alive, activity, and dead peer detection settings.
If you continue to have problems with your VPN connection, please send us a TSR report.
An error message appears during setup:
'Your Sonicwall' is either currently unreachable or is not a valid SonicWall appliance. Would you like to save this connection anyway?
When starting the connection, the following appears:
Connection Error
'Your Sonicwall' is not a SonicWall SSL VPN server.
In such cases, we recommend switching to VPN Tracker. VPN Tracker is available for both Mac and iOS. An added advantage is that once a connection is set up, it’s immediately available on both devices, as VPN Tracker securely syncs the settings through the Personal Safe.
Update September 2024: SonicWall has introduced another update with SonicOS 6.5.4.15-116n, which has rendered SSL VPN functionality non-operational for many SonicWall devices.
Update November 2024: This issue seems to be addressed by the SonicOS 6.5.4.15-117n update. For more information, please visit:
https://www.sonicwall.com/support/knowledge-base/mobile-connect-breaks-after-upgrade-to-sonicos-6-5-4-15/240903132324983
2. Navigate to “Traffic Control” and add the Fritzbox’s IP range, e.g., 192.168.178.0/24, under “Use VPN for the following addresses only”.
“Use VPN for the following addresses only”
192.168.178.0/24
3. If your Fritzbox uses a different IP range, enter the corresponding range instead.
When connecting via SonicWall SCP or SonicWall IKEv1 with DHCP, VPN Tracker 365 for Mac requests an IP address from the SonicWall gateway using the DHCP protocol. For this request, VPN Tracker 365 modifies the MAC address slightly, making it different from the actual MAC address of your device. This allows administrators to assign a fixed IP address when your Mac is connected via LAN or WiFi and a different IP when it’s connected through VPN.
This modification sets a specific bit in the MAC address, marking it as a self-assigned address rather than a factory-assigned one.
Example:
Original MAC address: 00:1B:63:B7:42:23
VPN Tracker MAC address: 02:1B:63:B7:42:23
Starting with macOS 15 Sequoia, Apple defaults to using a rotating MAC address for WiFi connections, labeled as a “Private Wi-Fi Address” in System Settings. To prevent connectivity issues related to this feature, VPN Tracker 365 reports the actual hardware address (with the minor modification described above) instead of the one used in “Rotating” or “Fixed” modes.
On iOS, VPN Tracker cannot retrieve a MAC address directly. Instead, it generates a random value once and stores it for future use. VPN Tracker for iOS then uses this stored value as the MAC address.
- Log in to your my.vpntracker.com account
- Select your team in the top left corner
- On the left side choose "Team Cloud"
- Scroll down to the section "Rename your team"
- Enter your new Team Name and press "Rename"
- Log in to your my.vpntracker.com account
- Select your team in the top left corner
- On the left side choose "Team Cloud"
- In the Invite section at the top, enter your new Team Member's name and company email address, then click "Send invitation".
- The invited team member will then receive an automatic email invitation with a personalised link to click on and join your team.
- Tip: Each VPN Tracker 365 user needs their own, personal equinux ID. After the user receives a team invitation from you and clicks the invite link, they can either create a new equinux ID or log in using their existing account.
- In case the user does not receive the invitation email, you can access the invitation link by clicking on "Details" next to the user name
- Once a team member has accepted your email invitation, you will be notified via email
What does this mean?
When DoH is enabled, it bypasses your DNS server and instead, domains you enter into your browser are sent via a DoH-compatible DNS server using an encrypted HTTPS connection.
This is intended as a security measure to prevent others (e.g. your ISP) from seeing the websites you are trying to access. However, if you're using a DNS server provided by your VPN gateway, it allows DNS queries to run outside the VPN tunnel. Moreover, if the VPN specifies a DNS server that resolves internal host names, these are either not resolved at all or resolved incorrectly when DoH is enabled.
How to disable DNS over HTTPS in Firefox
To ensure all your DNS queries run via your VPN's DNS, you will need to disable DoH in Firefox. To do so, open your Firefox browser, go to Firefox > Preferences > Network Settings and deselect the checkbox by "Enable DNS over HTTPS":
Click OK to save your changes.
An established IPSEC VPN tunnel intermittently fails in a NAT environment. (GEN6-2296)
Please contact Sonicwall for more information on when Sonicwall plans to fix this issue.
The longer an old certificate remains in circulation, the more likely that someone with the appropriate knowledge and skills will come across it and then exploit its security problem. Therefore, you don't want to have long terms, because if a certificate has to be renewed, it must always be renewed in accordance with the current applicable rules and this happens sooner, the shorter its term is. In the past, the runtimes were too long, but this had led to problems several times when RSA was cracked with 768 bits or when a method was found to create SHA-1 collision, which means that signatures based on SHA-1 all at once could be forged. Back then, it took far too long until insecure certificates were no longer in circulation, which resulted in various avoidable attacks.
By the way, renewing only affects the gateway certificate. User certificates do not need to be renewed if you exchange the certificate at the gateway. Users also do not need a new configuration. In fact, users don't even notice such an exchange. On web servers today, this usually happens automatically and even more often, as web certificates are often only valid for a maximum of 90 days.
Please be aware that we cannot process refunds in the following scenarios:
- Non-usage of the app or service
- Failure to cancel your account within the cancelation period
- Lack of features or functionality on your subscribed plan
- Purchases made in error
- Exceptional circumstances beyond our control
- Violations to our Terms of Use
By default Zyxel creates firewall policies to allow traffic to flow from SSL VPN to LAN zone and from LAN to SSL VPN zone. Those rules are required to allow VPN traffic flow once the connection has been established. But there is no policy that actually allows VPN management traffic at the WAN port, client requests arriving at the WAN port are discarded by the firewall.
To allow an OpenVPN connection on the WAN port, you first have to create an own policy. In the main navigation, select Security Policy > Policy Control
, click on the + Add
button and create a policy that allows traffic for the service SSLVPN
to flow from WAN
to ZyWALL
. Please see screenshot below.
If you cancel the trial license within the specified period, your account will not be charged. The pre-authorization then no longer applies.
• Check if there is a firmware update for the Fortigate device: Firmware Updates
• First, set up the new connection in the Fortigate web UI, and then review all fields again by selecting ‘Edit’. This can help, as not all fields may have been visible during the initial setup
Convert Your Products into Store Credit
If you wish to change the number of your licenses, you have the option to convert your existing license into store credit. You can then use this credit for your next purchase:
- Visit our Store Promo Code Transfer Page and follow the instructions to receive your promo code.
- Select your new products in the my.vpntracker Store.
- Enter your promo code during the checkout process.
Note: If the remaining value of your old product exceeds the amount for the new product, you will receive an additional promo code for the remaining value.
1. Connect to the VPN with the computer experiencing the connection problem.
2. Note its assigned client IP address.
3. Ping this IP address from within your LAN.
4. Disconnect the VPN on the problematic computer. You will likely observe that the ping continues, indicating that another device is using this IP address.
Troubleshooting Steps:
1. Identify the computer that is using the duplicate IP address. Often, a computer within the LAN is already using an IP address that falls within the DHCP range of the SonicWall.
2. If step 1 does not resolve the issue, restart the SonicWall.
-
What are connection drops during rekeying?
Connection drops during rekeying occur when the VPN connection is interrupted during the key update (rekeying). This causes traffic to not be processed for a short period, which is particularly problematic for stable connections such as video conferences.
-
Why does the problem occur during rekeying?
The problem arises because, when using TCP with OpenVPN, the firewall does not accept any traffic during the rekeying process. This leads to an interruption of the traffic.
-
What impact do connection drops have on a video conference?
During a video conference, connection drops during rekeying can result in a complete interruption of the traffic. This causes the connection to break, disrupting or even ending the video conference.
-
Why is TCP susceptible to this problem?
According to OpenVPN, TCP is problematic for VPN connections because it is more sensitive to traffic congestion during network disruptions or the rekeying process. OpenVPN therefore recommends using UDP instead, as it can better handle rekeying processes.
-
What solution does VPN Tracker provide for the problem?
VPN Tracker offers a particularly user-friendly solution: when establishing a connection, VPN Tracker automatically sets the rekeying timer to 24 hours. This significantly minimizes connection drops due to rekeying processes, keeping the connection especially stable. Additionally, VPN Tracker supports switching to UDP, which allows for an even more reliable connection.
-
Why should the rekeying timer be set to 24 hours?
A longer rekeying cycle reduces the frequency of connection drops. By setting the timer to 24 hours— as VPN Tracker does by default— the likelihood of the rekeying process being triggered during a critical phase, such as a video conference, is decreased.
-
What advantages does VPN Tracker have when using UDP over TCP?
VPN Tracker makes it easy to configure UDP, which offers faster connections and less sensitivity to packet loss. UDP is more efficient and resilient to interruptions during the rekeying process, which is particularly beneficial for bandwidth-intensive applications like video conferencing or streaming.
-
What recommendations does VPN Tracker provide for companies to optimize their VPN connections?
For companies relying on stable connections, VPN Tracker offers simple and effective solutions:
- By default, the rekeying timer is set to 24 hours to minimize connection drops.
- It is recommended to use UDP instead of TCP whenever possible to further enhance performance.
Follow these steps:
To disable the host check on the FortiSSL server side, you can turn off the “Host Check” in the SSL-VPN settings.
Steps:
1. Log in to the FortiGate CLI or GUI (Command Line Interface or Graphical User Interface).
2. Enter the following command in the CLI to disable the host check:
config vpn ssl settings
set host-check disable
end
This will disable the strict host check for SSL-VPN clients.
1. Are you connected to the internet? Check your internet connection by opening a website like www.google.com in your browser (e.g. Safari).
If that works, proceed to Step 2.
If no page loads, try the following:
- Check your Wi-Fi connection: Make sure Wi-Fi is enabled on your device and connected to the correct network.
- Check cable connections: If you are using a wired connection, ensure the cable is securely connected and undamaged.
- Restart the router: Disconnect the router from the power source for about 30 seconds, then plug it back in. Wait a few minutes for the connection to re-establish.
- Contact an administrator or provider: If the problem persists, there may be an issue with your internet provider. Contact your administrator or your internet provider's customer service.
- Use a mobile hotspot: If you have access to mobile data, try setting up a hotspot to test the connection.
2. If a specific server is mentioned in the error message, try accessing the specified address via your browser (e.g., Safari).
If that works, proceed to Step 3.
If it doesn’t work, there may be an issue with the server mentioned in the error message. In this case, please try the action in VPN Tracker that triggered the error message again at a later time.
3. Check if your current VPN connection or a firewall is blocking access to the internet or a specific site, and disable this block if necessary.
- You can see and configure if your currently active VPN connection excludes certain internet addresses in the connection configuration: In VPN Tracker, select the connection, choose "Edit," and then "Advanced Settings." In the "Traffic Control" area, there may be internet addresses listed that the VPN restricts access to.
- To check if your firewall excludes certain internet addresses, temporarily disable your firewall and try again the action in VPN Tracker that triggered the error message.
- Check your firewall settings for blocked applications or websites. Some firewalls allow specific IP addresses, domains, or applications to be selectively blocked or allowed.
- If you find that a rule is blocking access, you can adjust this rule or add an exception to allow access to specific websites or services.
- If you are still unable to gain access to certain areas, contact your firewall manufacturer's support or your IT support.
In VPN Tracker's log, you can also see the error message:
LCP: PPP peer accepted proposal but also modified it which isn't allowed.
Please update your Sonicwall to at least SonicOS 6.5.4.15-117n to fix this problem. For more information, please visit: https://www.sonicwall.com/support/knowledge-base/mobile-connect-breaks-after-upgrade-to-sonicos-6-5-4-15/240903132324983
Our experience also shows that IPsec connections are significantly more performant, so we likewise recommend using IPsec.
- Send keep-alive ping every
This option controls whether and how often VPN Tracker sends keep-alive pings. A keep-alive ping is not a normal ping, and is not considered tunnel traffic by the VPN gateway, so it does not keep the connection alive at the gateway. The sole purpose of these pings is to keep the connection alive through firewalls and NAT routers between VPN Tracker and the gateway when no other tunnel traffic is being sent.
- Disconnect if inactive for
This option controls if and after how long VPN Tracker will disconnect due to inactivity. Only tunnel traffic is considered activity, keep-alive pings sent from either side and protocol management traffic are not considered tunnel traffic.
- Consider the peer dead if no sign of liveliness for
This option controls if and after what time VPN Tracker will disconnect due to no sign of life. Any traffic from the gateway is considered a sign of life, regardless of whether it is tunnel traffic, keep alive ping, or protocol management traffic.
This option has no effect if the gateway is not configured to send pings (
--ping
option orping
in the server configuration file), because without pings enabled, there may be no tunnel or management traffic for quite some time, but this is not proof that the gateway is no longer alive, since it won't send anything if there is nothing to send. With ping enabled, the gateway would at least send keep-alive pings in such a situation, and if those don't arrive either, the gateway has most likely dropped the connection or gone offline.
Yes, you can print to your home printer while connected to VPN Tracker away from home. To ensure a seamless remote printing experience, follow these steps:
1. Assign a Static IP Address to Your Printer
- Access your router’s web interface by entering its IP address in a web browser (e.g., 192.168.1.1 or 192.168.0.1).
- Navigate to the LAN or DHCP settings.
- Assign a static IP address to your printer (e.g., 192.168.50.100) so it remains consistent.
2. Configure Your Mac for Remote Printing
- Connect to your > Printers & Scanners on your Mac.
- Click "+" to add a new printer.
- Select the IP tab and enter the static IP address assigned to your printer.
- Choose the correct printer driver to ensure compatibility.
3. Avoid Bonjour for Remote Printing
Apple’s Bonjour service helps detect devices on local networks but does not work reliably over VPN due to its reliance on multicast DNS (mDNS). Instead, always connect to your printer using its static IP address.
4. Check Firewall & Network Settings
- Ensure that your firewall allows print traffic over VPN.
- Verify that the printer and VPN settings do not block remote connections.
By setting up a static IP address, avoiding Bonjour, and ensuring proper firewall rules, you can print documents remotely via VPN Tracker without issues.