VPN requirements. A client install package installs SteelHead Mobile software onto each of your endpoints. The endpoint maintains a connection with the Mobile Controller to download new policies from the Mobile Controller. For Mac OS X - rbtsport, rbtmond, rbtuseragentd, and rbtdebug. Dell SonicWall Aventail.
![Aventail Vpn Mac Os X Download Aventail Vpn Mac Os X Download](http://blog.equinux.com/wordpress/wp-content/uploads/2015/12/VPN-Tracker-conncet-to-DELL-SonicWALL.png)
Date Domain Price 2018-10-22 $38,8-05-16 $6,0-03-29 $5,8-01-24 $5,0-12-17 $4,0-12-10 $3,5-02-13 $3,1-06-23 $3,0-06-29 $2,9-11-24 $2,5-01-23 $2,1-03-19 $2,1-10-06 $1,4-02-22 $1,1-02-06 $1,0-10-14 $1,0-11-28 $1,0-06-23 $1,0-11-28 $1,0-11-03 $1,0-03-04 $9-01-23 $8-05-02 $8-03-28 $8-05-24 $805.00.
The only recent security-only patch (vs. Whole new, newer OS) for Mac OS (vs iOS) has been for Safari, So it sounds like RoguePacket is probably right. And: If an end-user upgrade caused this problem, then it speaks to the need for policy & enforcement for Apple devices, no less than every & anything else that is company property or company-supported. Absent demonstrated business-case need, Apple users do NOT have local admin rights (required for such an upgrade) on company devices. In the few cases where companies have asked to have end-user Apple computers supported, we spell out specific parameters that the users must adhere to.
Worst case, a user has had to pay out of their own pocket for a downgrade which means: Back up user data, wipe & install older OS. The TZ 205 is running firmware version 5.1.7.
The latest available is 5.1.8, and in the Release Notes I see: 'Authentication of user fails, but at the same time, the firewall logs shows the same user successfully authenticated. Occurs when SSLVPN user tries to connect to UTM devices using Net Extender and Local User/LDAP User.' I'm using local users and I think when they say Net Extender it applies to the MacOS Mobile Connect app too, ya? I'll update the firmware and report back. I see some user comments in the App Store about similar issues after upgrading Mobile Connect to vers. Hi @BugCommunity: I tried another step too, updating the SSL VPN cipher method from RC4 to AES256 by connecting to the appliance via SSH, but problem still not fixed.
My users have not yet upgraded to Sierra or High Sierra. They're running 10.11.x El Capitan.
I thought about asking one of them to upgrade their MacOS to High Sierra, but I'm hesitant as not sure if the action will break anything else and not sure if it will fix our issue. Do you have an users on High Sierra with same problem? Also, do you know of a way for users to get the older version of SW Mobile Connect? Note I have not yet setup L2TP per @dbeato suggestion above, after which I think they'd be able to use the native MacOS VPN client to connect, ya? But this step seems like overkill and addl. That should not be required.
Bob Herman wrote: Hi @BugCommunity: I tried another step too, updating the SSL VPN cipher method from RC4 to AES256 by connecting to the appliance via SSH, but problem still not fixed. My users have not yet upgraded to Sierra or High Sierra. They're running 10.11.x El Capitan. I thought about asking one of them to upgrade their MacOS to High Sierra, but I'm hesitant as not sure if the action will break anything else and not sure if it will fix our issue. Do you have an users on High Sierra with same problem?
Also, do you know of a way for users to get the older version of SW Mobile Connect? Note I have not yet setup L2TP per @dbeato suggestion above, after which I think they'd be able to use the native MacOS VPN client to connect, ya? But this step seems like overkill and addl. That should not be required.
L2TP Shouldn't be required, but it is a workable workaround. I setup L2TP/IPSEC following but the users still cannot connect. When they use the native MAC VPN client, it responds 'The L2TP-VPN server did not respond.' The SSL VPN listens on port 4433 but when using the L2TP/IPSEC VPN I think only server IP without port is correct, ya? In any event, they've tried both with and without the port specified but still no go. Also, am I correct that the SW uses the Global VPN Client licenses for the L2TP/IPSEC VPN connections, as opposed to the SSL VPN Nodes/Users licenses? In any event, the SW has both license types available but users cannot connect.
Any thoughts? Thanks, Bob H. The release notes for SonicWall Mobile Connect macOS 5.0.0 show that your firewall should be supported: 'SonicWall firewall appliances including the TZ, NSA, E - Class NSA, and SuperMassive running SonicOS 5.8.1.0 or higher' I'd encourage you to open a ticket with SonicWall support and see if they can help you sort through things. We don't have an TZ-series devices, but I can report that SonicWall Mobile Connect v.5 is working on our Macs on macOS High Sierra 10.13, but we are using SRA-series devices for our SSL-VPN setup. Hi @audiojim: No support contract on this device so SW will not help. Numerous reviews in the MAC App Store show people are having issues.
In another forum, a user suggested: 'The issue stems from when NetExtender needs to run maintenance and the computer has SIP(System Integrity Protection) enabled 1.) Shutdown your laptop 2.) Hold Command+R and power on your laptop, this will take you into OSX Recovery. 3.) Click on Utilities and Select Terminal, please note that you might get a prompt to ask for your language first but just select English 4.) Within Terminal enter in 'csrutil disable' and hit enter, you will get a message that says SIP has been disabled 5.) Reboot and those maintenance tasks should run without a hitch.' Haven't tried this yet with a user as want to do some research on potential collarteral damage after disabling SIP. Any comments on that?
Bob, I tried your 'csrutil disable' step and it didn't work for me. Currently having this problem with only one TZ500W. I'm able to connect to older TZ's, an older NSA, and all of the rest of the TZ300/400/500 that I tried. Client called with the problem and I was able to connect with MacOS 10.12.x with Sonicwall Mobile Connector 4.x.
![Aventail vpn mac os x download windows 10 Aventail vpn mac os x download windows 10](/uploads/1/2/5/5/125557268/305499680.png)
Update to MacOS 10.12.6 (? - latest Sierra) and to SMC 5.0.x and it worked.
It wasn't until I updated to MacOS High Sierra that it failed. Updated to the latest 6.2.x code on the TZ500W and another TZ500 - the October 25th with the Kracker exploit fix ( 6.2.9.2-25n) and no change. I opened a ticket with SW support for this.