


On pfSense: Sep 8 07:25:36 charon 11 received packet: from to (777 bytes)

What is the shared secret for vpn on mac mac#
After upgrading a system from 2.2.6 to 2.3.2, I can no longer connect to IPSec VPN The message I get on my Mac is "The Shared Secret is incorrect.Īug 23 20:18:29 charon 16 received FRAGMENTATION vendor IDĪug 23 20:18:29 charon 16 received NAT-T (RFC 3947) vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-08 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-07 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-06 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-05 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-04 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-03 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-02 vendor IDĪug 23 20:18:29 charon 16 received draft-ietf-ipsec-nat-t-ike-02\n vendor IDĪug 23 20:18:29 charon 16 received XAuth vendor IDĪug 23 20:18:29 charon 16 received Cisco Unity vendor IDĪug 23 20:18:29 charon 16 received DPD vendor IDĪug 23 20:18:29 charon 16 is initiating a Aggressive Mode IKE_SAĪug 23 20:18:29 charon 16 received proposals: IKE:AES_CBC_256/HMAC_SHA2_256_128/PRF_HMAC_SHA2_256/MODP_2048, IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048, IKE:AES_CBC_256/HMAC_MD5_96/PRF_HMAC_MD5/MODP_2048, IKE:AES_CBC_256/HMAC_SHA2_512_256/PRF_HMAC_SHA2_512/MODP_2048Īug 23 20:18:29 charon 16 configured proposals: IKE:AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1024Īug 23 20:18:29 charon 16 no proposal foundĪug 23 20:18:29 charon 16 generating INFORMATIONAL_V1 request 4133479696 Īug 23 20:18:29 charon 16 sending packet: from to (56 bytes)Īug 23 20:18:29 charon 14 received packet: from to (777 bytes)Īug 23 20:18:29 charon 14 parsed AGGRESSIVE request 0 Īug 23 20:18:29 charon 14 received FRAGMENTATION vendor IDĪug 23 20:18:29 charon 14 received NAT-T (RFC 3947) vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-08 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-07 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-06 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-05 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-04 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-03 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-02 vendor IDĪug 23 20:18:29 charon 14 received draft-ietf-ipsec-nat-t-ike-02\n vendor IDĪug 23 20:18:29 charon 14 received XAuth vendor IDĪug 23 20:18:29 charon 14 received Cisco Unity vendor IDĪug 23 20:18:29 charon 14 received DPD vendor IDĪug 23 20:18:29 charon 14 is initiating a Aggressive Mode IKE_SAĪug 23 20:18:29 charon 14 looking for XAuthInitPSK peer configs matching 23 20:18:29 charon 14 selected peer config "con1"Īug 23 20:18:29 charon 14 generating AGGRESSIVE response 0 Īug 23 20:18:29 charon 14 sending packet: from to (412 bytes)Īug 23 20:18:29 charon 14 received packet: from to (76 bytes)Īug 23 20:18:29 charon 14 queueing INFORMATIONAL_V1 request as tasks still activeĪug 23 20:18:33 charon 14 sending retransmit 1 of response message ID 0, seq 1Īug 23 20:18:33 charon 14 sending packet: from to (412 bytes)Īug 23 20:18:41 charon 06 sending retransmit 2 of response message ID 0, seq 1Īug 23 20:18:41 charon 06 sending packet: from to (412 bytes)Īug 23 20:18:54 charon 08 sending retransmit 3 of response message ID 0, seq 1Īug 23 20:18:54 charon 08 sending packet: from to (412 bytes)Īug 23 20:18:59 charon 06 deleting half open IKE_SA after timeoutĪlso, i did make the change as above and match the DH Group as suggested.
