UPDATE: I managed to fix this. For reasons unknown my M1 Mac would only send 1 “security proposal” when connecting to the VPN, the 2019 one would send 5 - one of which included SHA1 and DES protocols. This was apparently what my Windows Server 2019 was using, which worked fine on Windows (typically) but not on Mac. Hardening the IKEv2 policy got it working on the new Mac.
These are the instructions I followed: Windows Server 2012R2 VPN IKEv2 hardening RRAS service | IT's a passion - good luck!
Hi,
Hoping someone might be able to help me with this one which has me completely puzzled.
I’ve been using an IKEv2 based VPN (to a Windows server) for years. I’m using the built in VPN client, with the following things configured:
- Server address: vpn.company.co.uk
- Remote ID: vpn.company.co.uk
- Local ID:
- User Authentication: Username
- Username & Password specified
I imported the .pfx certificate to my “login” store in Keychain Access, which adds vpn.company.co.uk and the server (e.g. vpnserver-CA) as certificates. I then set the server certificate to “Always Trust”.
When trying to connect on the new MBP the VPN instantly disconnects - with no error message. If I change the server address to nonsense it sits on “Connecting” for a bit longer before silently disconnecting.
I’m at a complete loss to understand what is going wrong here, or where to look in terms of fixing it, when the configuration on my Intel MBP is identical. I’m not running any kind of firewall or proxy on either computer.
A Cisco IPSec VPN to a different server (my backup one) works fine.
Thanks in advance for any help provided ![]()