<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Firebox - VPN Mobile User — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 20 Apr 2026 10:02:29 +0000</pubDate>
        <language>en</language>
            <description>Firebox - VPN Mobile User — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/firebox-vpn/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Delete or change name of User in Mobile VPN SSL</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4571/delete-or-change-name-of-user-in-mobile-vpn-ssl</link>
        <pubDate>Wed, 08 Apr 2026 08:48:44 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>JorgeAcevedo</dc:creator>
        <guid isPermaLink="false">4571@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>How can the name of a User be change after creating the User under Mobile VPN with SSL?</p>
]]>
        </description>
    </item>
    <item>
        <title>Unexpected SAML Auth Behavior</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4417/unexpected-saml-auth-behavior</link>
        <pubDate>Fri, 26 Sep 2025 14:41:10 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>BetterInvesting</dc:creator>
        <guid isPermaLink="false">4417@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We've already opened a ticket for this, but I wanted to throw this out to the community to see if anyone else is seeing similar behavior.</p>

<p>We are using the Mobile SSL VPN Client version 12.11.4 with an M290 on firmware 12.11.3.B719894.<br />
With SAML requests going to Entra/Azure</p>

<p>When I installed Office 2021 LTSC.<br />
I said yes to the prompt asking if I wanted to allow my credentials to be used to log in to all Microsoft products. (Office, Teams, Onedrive, Edge, ect ect).</p>

<p>I've applied the 12.11.4 workaround in regards to copying the WatchGuard folder to the AppData/local folder.<br />
When I run the client and auth with SAML. The webview2 window opens and is white for a few seconds, and then says You've been successfully authenticated and nothing happens. The window doesn't close, and the connection doesn't establish.<br />
The log shows the following. <br />
2025-09-26T10:16:04.300 Requesting client configuration from XXX.XXX.XXX.XXX:443<br />
2025-09-26T10:16:07.991 Navigation complete.</p>

<p>If I right-click within the WebView2 window and click refresh, it closes the window and completes the connection successfully to the firewall.</p>

<p>I assume that the prompt with the Office install to use the credentials is allowing me to bypass actually having to go through the auth process on the webview2 screen.<br />
My co-worker specified No on that Office install screen when prompted to use the creds for all Microsoft products, because he wants to be able to log in to each Microsoft product with different creds. He has to go through the whole login process on the webview2 screen in order to authenticate the SAML VPN connection.</p>
]]>
        </description>
    </item>
    <item>
        <title>SSLVPN Login with Firebox-DB User not possible</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4572/sslvpn-login-with-firebox-db-user-not-possible</link>
        <pubDate>Wed, 08 Apr 2026 12:41:58 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>VGBH</dc:creator>
        <guid isPermaLink="false">4572@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I created a user in Firebox-DB and put the user in SSLVPN-Users group. Firebox-DB is ticked in Mobile VPN SSL Configuration -&gt; Authentication -&gt; Authentication Servers. The Firebox-DB User is also ticked in "Users and Groups".<br />
I put the Firebox-DB user in the "Allow SSL-VPN-Users" Policy (From field).<br />
The SSL-VPN client version is 2026.2.0.<br />
User name field: Firebox-DB\user</p>

<p>2026-04-08 14:21:55 Primary admd Authentication of Firewall user [user@Firebox-DB] from 10.10.10.10 was accepted msg_id="1100-0004"     Event<br />
2026-04-08 14:21:55 Primary sslvpn Mobile VPN with SSL user user logged in. Virtual IP address is 0.0.0.0. Real IP address is 10.10.10.10. msg_id="2500-0000"   Event<br />
2026-04-08 14:21:55 Primary sslvpn sslvpn_event, add entry, entry-&gt;virtual_ip=0.0.0.0, entry-&gt;real_ip=10.10.10.10, dropin_mode=0    Debug<br />
2026-04-08 14:21:56 Secondary sslvpn Mobile VPN with SSL user user logged in. Virtual IP address is 0.0.0.0. Real IP address is 10.10.10.10. msg_id="2500-0000"     Event<br />
2026-04-08 14:21:56 Secondary sslvpn sslvpn_event, add entry, entry-&gt;virtual_ip=0.0.0.0, entry-&gt;real_ip=10.10.10.10, dropin_mode=0      Debug<br />
2026-04-08 14:21:58 Primary Allow 10.10.10.10 20.20.20.20 https/tcp 55184 443 Internet-Fiber Firebox Allowed 44 64 (WatchGuard SSLVPN-00)  proc_id="firewall" rc="100" msg_id="3000-0148" tcp_info="offset 6 S 2209399070 win 61690" geo_src="DEU" geo_dst="DEU"    Traffic<br />
2026-04-08 14:21:59 Primary admd Authentication of Firewall user [user@Firebox-DB] from 10.10.10.10 was rejected, invalid credentials or user doesn't exist msg_id="1100-0005"  Event</p>

<p>What am I doing wrong? I also tried different passwords.</p>

<p>There is also AuthPoint configured. AuthPoint Authentication Server is set as default.</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN Install Options</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4476/mobile-vpn-install-options</link>
        <pubDate>Tue, 09 Dec 2025 10:10:40 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>ks01</dc:creator>
        <guid isPermaLink="false">4476@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all,<br />
We are migrating from OpenVPN to the WatchGuard Mobile VPN with SSL for Windows 12.11.5 mainly so we can use Entra auth going forward.</p>

<p>We can install the software through Intune using this command which works fine: <br />
WG-MVPN-SSL_12_11_5.exe /autokill /silent /verysilent</p>

<p>However it restarts the device, is there a way to suppress the restart? I have set this option in Intune but I think it might require a command line switch instead,</p>

<p>Thank you</p>
]]>
        </description>
    </item>
    <item>
        <title>IKEv2 Linux</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/923/ikev2-linux</link>
        <pubDate>Mon, 13 Apr 2020 07:52:27 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>svitadmin</dc:creator>
        <guid isPermaLink="false">923@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Has anyone successfully configured the IKEv2 Mobile VPN with a Linux (Ubuntu) client computer? We do use Linux with our Mobile SSL VPN with no problems, however, I wanted to look at using IKEv2 VPN with Linux. Windows and Mac can connect using the pre-configured file from the firewall.</p>

<p>I tried setting up something manually from the Android config file but couldn't get it to work, and just wondered if someone had already done this and/or can point me in the right direction? I couldn't find much from searching both Watchguard Docs and this forum or Google.</p>

<p>Thanks<br />
Keith</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile SSL vpn timeout</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4565/mobile-ssl-vpn-timeout</link>
        <pubDate>Fri, 27 Mar 2026 16:05:11 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>jem417</dc:creator>
        <guid isPermaLink="false">4565@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello, I'm having an issue with our M390 boxes. Mobile SSL VPN users are being disconnected around the 8 hour mark even though we have the Renegotiate Data Channel set for 720 minutes. I think it started happening when the Access portal was disabled (by us) a a couple of releases ago.<br />
 I dont have logs right now as it was just brought to my attention but its the same on all 3 of our M390 boxes.<br />
We are running version 12.11.8. Is there a second place when I need to increase the timeout settings for Mobile SSL VPN? Any help will be greatly appreciated!</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg 2000w, https://us.v-cdn.net/6029905/uploads/editor/5p/tw0kgtxrp0bw.jpg" sizes="100vw" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Error 500 when trying to download IKEv2 VPN Config</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4561/error-500-when-trying-to-download-ikev2-vpn-config</link>
        <pubDate>Thu, 26 Mar 2026 05:28:39 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Saintofinternet</dc:creator>
        <guid isPermaLink="false">4561@/watchguard-community/discussions</guid>
        <description><![CDATA[<p><img src="https://us.v-cdn.net/6029905/uploads/editor/iz/t45hfhpnsww4.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/iz/t45hfhpnsww4.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/iz/t45hfhpnsww4.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/iz/t45hfhpnsww4.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/iz/t45hfhpnsww4.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/iz/t45hfhpnsww4.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/iz/t45hfhpnsww4.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/iz/t45hfhpnsww4.png" sizes="100vw" /></p>

<p>Getting the following error when trying to download IKEv2 VPN Config for clients.</p>

<p>What is happening here?</p>
]]>
        </description>
    </item>
    <item>
        <title>SSL VPN on Windows on ARM?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/612/ssl-vpn-on-windows-on-arm</link>
        <pubDate>Wed, 13 Nov 2019 18:56:31 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>petergv@osr.com</dc:creator>
        <guid isPermaLink="false">612@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Sooooo... today I installed -- successfully it said -- the Watchguard SSL VPN connector via my gateway on my Surface Pro X (which, you may recall, uses an ARM-based processor).</p>

<p>However, no matter how many times I tried, I was unsuccessful at connecting to my VPN.  Using the same network, and the same username/password, my (AMD64-based system sitting right next to it connects perfectly.  Like it always does.</p>

<p>Is Windows On Arm supposed to be supported?  Is there something I need to do to enable this?</p>

<p>If this doesn't currently work, that seems to be me to be a pretty big problem.  The Surface Pro X and other Windows On Arm based laptops are being positioned a premier machines for "executive" type knowledge workers (that's code for folks who read a lot of email and edit lot of documents).</p>

<p>Help?</p>

<p>Peter</p>
]]>
        </description>
    </item>
    <item>
        <title>new feature - WireGuard vpn</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/936/new-feature-wireguard-vpn</link>
        <pubDate>Thu, 16 Apr 2020 10:19:00 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Thibaud</dc:creator>
        <guid isPermaLink="false">936@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>I've been reading about this new WireGuard vpn, which seems to be quite performante compared to other vpn types and will also be integrated in the linux kernel (if it isn't already).<br />
Does WatchGuard have plans to integrate this new VPN type?</p>

<p>Thanks!</p>

<p>Greetings,</p>

<p>Thibaud</p>
]]>
        </description>
    </item>
    <item>
        <title>Release notes for Mobile VPN with SSL 2026.1</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4512/release-notes-for-mobile-vpn-with-ssl-2026-1</link>
        <pubDate>Fri, 30 Jan 2026 17:11:41 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>feek</dc:creator>
        <guid isPermaLink="false">4512@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Why was the SSL VPN client updated, but nothing mentioned in the release notes about it?</p>
]]>
        </description>
    </item>
    <item>
        <title>Use SAML native browser</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4517/use-saml-native-browser</link>
        <pubDate>Mon, 02 Feb 2026 13:32:17 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>FlorianMertes</dc:creator>
        <guid isPermaLink="false">4517@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I would like to use the native browser for authentication via SAML instead of the EdgeView component so that I can save the user name for SAML authentication. The fact that saving does not currently work causes a great deal of dissatisfaction.</p>
]]>
        </description>
    </item>
    <item>
        <title>Using IKEv2 Mobile VPN on External IPv6 Interface</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4518/using-ikev2-mobile-vpn-on-external-ipv6-interface</link>
        <pubDate>Mon, 02 Feb 2026 13:49:12 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Olix</dc:creator>
        <guid isPermaLink="false">4518@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Is it possible to use IKEv2 VPN with an IPv6 address on the external interface? I use IPv4 on the internal interfaces and in my home office and would like to tunnel IPv4 traffic via the IPv6 VPN connection. This is necessary because more and more Internet service providers are using Dual-Stack Lite or Carrier-Grade NAT and are having problems connecting to an IPv4 IKEv2 VPN.</p>
]]>
        </description>
    </item>
    <item>
        <title>IKEv2 Mobile VPN connection from Intune drop when data is transferred</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4511/ikev2-mobile-vpn-connection-from-intune-drop-when-data-is-transferred</link>
        <pubDate>Thu, 29 Jan 2026 14:16:07 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>kraeg</dc:creator>
        <guid isPermaLink="false">4511@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello!</p>

<p>We have a strange problem: We deploy IKEv2 vpn connections to Windows clients via Intune. This works perfectly fine!</p>

<p>The users can connect and work via RDP etc. But as soon as they transfer larger files the vpn connection drops suddenly and they have to reconnect.</p>

<p>In the log of the firewall we find entries like this:</p>

<p>drop the received IKEv2 message from aaa.bbb.ccc.ddd:1040 - reason="no IkeV2SA is found"</p>

<p>The problem happens also internally if I'm in an optional network (guest wifi) and connect via VPN to the trusted network.</p>

<p>Interestingly: When we deploy the same connection via powershell it works perfectly!</p>

<p>Does anybody know which Intune settings can cause this "no IkeV2SA is found" problem?</p>

<p>I cant find anything in the net.</p>

<p>Thanks</p>

<p>Axel</p>
]]>
        </description>
    </item>
    <item>
        <title>Issues with Mobile VPN with SSL and Entra ID SAML</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4508/issues-with-mobile-vpn-with-ssl-and-entra-id-saml</link>
        <pubDate>Wed, 28 Jan 2026 15:51:34 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Ona</dc:creator>
        <guid isPermaLink="false">4508@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all,<br />
I recently had to disable SAML authentication completely on my company's Watchguard, because the given reply URL by my firebox does not correspond with the system's expected reply URL.</p>

<p>Has anybody else experienced this phenomena? Any tips or tricks I might not be aware of? Authentication through Entra works fine, right up until the Firebox receives the reply. According to the AIs, it's related to SAML for Firebox authentication and Mobile VPN authentication being split on some models but not all, but as I can't find definite sources on that it's difficult to tell whether that's AI hallucination or not.</p>

<p>I've been cursing the Mobile VPN client versions 12.11.3 and 12.11.4 for a while now, thought the issues finally got fixed with 12.11.5 but in combination with FireOS 12.11.6 it's proven an unreliable mess. (Tried creating a ticket, but that form also jammed when I clicked send.)</p>
]]>
        </description>
    </item>
    <item>
        <title>Changing SSLVPN Encryption Setting</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4502/changing-sslvpn-encryption-setting</link>
        <pubDate>Thu, 22 Jan 2026 07:57:26 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>VGBH</dc:creator>
        <guid isPermaLink="false">4502@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I´m considering to change the SSLVPN Encryption from SHA-256 / AES-256 to AES-GCM-256 because ist is more safety and should be faster.</p>

<p>I use a M290 Cluster and 2FA is activated. Will there a benefit to change this setting and is it really faster?</p>

<p>What will happen when I change this setting? Are all users who are using the SSLVPN client still able to connect? Whats will happen to the users which are using the ovpn-file on android or linux? Do they have to change something?</p>
]]>
        </description>
    </item>
    <item>
        <title>icmp from lan to ikev2 muvpn client</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4499/icmp-from-lan-to-ikev2-muvpn-client</link>
        <pubDate>Tue, 20 Jan 2026 14:28:38 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Norman</dc:creator>
        <guid isPermaLink="false">4499@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>hello,<br />
i have a any-any filter with logging on icmp<br />
icmp from lan to sslvpn client is ok and shows up like<br />
Allow 192.168.22.22 192.168.113.7 echo-request/icmp   Trusted tun0 Allowed 60 127 (Ping-00)  proc_id="firewall" rc="100" msg_id="3000-0148" type="8" dst_user="xxx@xxx"     Traffic</p>

<p>icmp from lan to ikev2 muvpn client shows up like<br />
Allow 192.168.22.22 192.168.114.3 echo-request/icmp   Trusted External Allowed 60 127 (Ping-00)  proc_id="firewall" rc="100" msg_id="3000-0148" src_ip_nat="x.x.x.x" type="8" dst_user="xxx@xxx"    Traffic</p>

<p>so the firewall is going to nat from die external ip instead of routing</p>

<p>any ideas ?</p>
]]>
        </description>
    </item>
    <item>
        <title>user certificate authentication for muvpn ?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4497/user-certificate-authentication-for-muvpn</link>
        <pubDate>Mon, 12 Jan 2026 11:19:18 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Norman</dc:creator>
        <guid isPermaLink="false">4497@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>what muvpn protocols support user certificate authentication ( preferred without Authpoint )</p>
]]>
        </description>
    </item>
    <item>
        <title>Access to external Website with outgoing static IP from company</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4488/access-to-external-website-with-outgoing-static-ip-from-company</link>
        <pubDate>Mon, 29 Dec 2025 10:29:28 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>VGBH</dc:creator>
        <guid isPermaLink="false">4488@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Our company employees need to visit an external website. The website can be accessed from anywhere, but login is only possible with the company's outgoing static IP address.<br />
The option “Route all client traffic through the tunnel” is disabled for SSL VPN users. Is it possible to route only the traffic for this website via VPN so that the website is visited via the company's static IP?</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN with SSL ver 12.11.5 not asking for MFA anymore</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4482/mobile-vpn-with-ssl-ver-12-11-5-not-asking-for-mfa-anymore</link>
        <pubDate>Wed, 17 Dec 2025 15:10:46 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>ANADIAN</dc:creator>
        <guid isPermaLink="false">4482@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We updated the Mobile VPN with SSL client from v12.11.2 to v12.11.5. After the update, users can establish a VPN connection using only a username and password. With v12.11.2, MFA was also required. No changes were made on the Firebox.</p>
]]>
        </description>
    </item>
    <item>
        <title>SSLVPN 12.11.4 Internet connection issues</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4427/sslvpn-12-11-4-internet-connection-issues</link>
        <pubDate>Wed, 08 Oct 2025 21:19:07 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>kcarpenter</dc:creator>
        <guid isPermaLink="false">4427@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I updated about 20 clients to the new version and I am getting complaints that once they connect their Internet no longer works. Our VPN is setup to only route certain networks so their Internet goes out their network. The fix is to disconnect then reconnect. Not too big a deal but was wondering if others were seeing that same behavior?</p>
]]>
        </description>
    </item>
    <item>
        <title>Mail when SSL failed login</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4462/mail-when-ssl-failed-login</link>
        <pubDate>Mon, 24 Nov 2025 18:36:52 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>patrik73</dc:creator>
        <guid isPermaLink="false">4462@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I have a Firebox M290 and Dimension server.<br />
SSL VPN is configured for my users.<br />
The Dimension is configured to send email.</p>

<p>How can I configure so my dimension sends an mail when there is a failed login attempt via SSL VPN?<br />
And also when there is a successful login.</p>

<p>I cannot for my life find where and how to do that. <img src="https://community.watchguard.com/resources/emoji/confused.png" title=":/" alt=":/" height="20" /></p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile SSL VPN - Recent Issues</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4441/mobile-ssl-vpn-recent-issues</link>
        <pubDate>Thu, 30 Oct 2025 09:20:25 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>ChrisSnape</dc:creator>
        <guid isPermaLink="false">4441@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi all,</p>

<p>Model: FireboxV Medium<br />
Version: 12.11.4.B722644</p>

<p>Having some recent issues with my virtual firebox and Mobile SSL users connecting. This has worked fine for a couple of years, but the last couple of months have seen various users getting "timed out" and "Failed to get domain name" error messages.</p>

<p>We use AD to authenticate, as we have for years. With the DCs for the domain residing behind the virtual firewall, on a trusted network.</p>

<p>I have three physical fireboxes connected to the virtual firebox via BOVPN (in different locations), and the same users can authenticate fine to those - using the same DCs behind the virtual firebox (Switching the server address to the physical devices). So it is only the virtual firewall direct that is causing the issues.</p>

<p>I have spoken to the datacentre engineers, where the virtual firewall resides, and we have run various network checks and nothing has cropped up. General internet access from the virtual firewall and the BOVPN tunnels are all working fine.</p>

<p>Some users have had no issues at all and continue to logon to the Virtual firebox without issue. But others (including myself) just can't connect using it. So we have to use one of the other physical devices.</p>

<p>Open to ideas and things to check before I raise a proper ticket with WatchGuard.</p>

<p>Regards,<br />
Chris Snape</p>
]]>
        </description>
    </item>
    <item>
        <title>How to change the external config to work with the new router?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4454/how-to-change-the-external-config-to-work-with-the-new-router</link>
        <pubDate>Thu, 13 Nov 2025 08:46:38 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>eddiebaker</dc:creator>
        <guid isPermaLink="false">4454@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,<br />
I've been asked to assist a local business in transferring their broadband service to a new ISP.</p>

<p>They currently have a Firebox T30 with a mobile VPN configured. In the interface settings, the existing external IP is set to the public IP xxx.xxx.xxx.110, and the gateway is xxx.xxx.xxx.109.</p>

<p>The new ISP has provided a new router and specified the IP assigned via PPPoE, but no additional details were given.</p>

<p>The default IP for the new router is 192.168.1.1.</p>

<p>Could anyone provide guidance on the simplest way for someone with limited experience to update the external configuration to work with the new router?</p>
]]>
        </description>
    </item>
    <item>
        <title>how to renew the saml certificate on firebox (onprem) for SSL VPN?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4459/how-to-renew-the-saml-certificate-on-firebox-onprem-for-ssl-vpn</link>
        <pubDate>Tue, 18 Nov 2025 19:51:13 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>masterofdebian</dc:creator>
        <guid isPermaLink="false">4459@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hallo,</p>

<p>i want to renew the Saml Certificate on our firebox. But i can't found any Option to replace the X509 Certificate for saml.  Please help.</p>

<p>Thanks a lot.</p>
]]>
        </description>
    </item>
    <item>
        <title>Is it possible to set up an IKEv2 VPN with certificate authentication on an iPhone?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4455/is-it-possible-to-set-up-an-ikev2-vpn-with-certificate-authentication-on-an-iphone</link>
        <pubDate>Thu, 13 Nov 2025 08:58:04 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>SWB_Watch</dc:creator>
        <guid isPermaLink="false">4455@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>we would like to set up an IKEv2 VPN connection for our Apple iPhones. User authentication should be done via a certificate. Is that possible? If so, what needs to be configured?</p>

<p>We are currently using a Firebox M390 with version 12.11.4.</p>

<p>Thank you very much.</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN SSL high CPU</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4411/mobile-vpn-ssl-high-cpu</link>
        <pubDate>Fri, 19 Sep 2025 11:08:00 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>Juuso</dc:creator>
        <guid isPermaLink="false">4411@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Is just me or has anybody else seeing hight CPU load with the new 12.11.4 version of the client? it is drawing around 15% all the time.</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN DNS &quot;Use Network Settings&quot;</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4448/mobile-vpn-dns-use-network-settings</link>
        <pubDate>Fri, 07 Nov 2025 22:18:04 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>John_Miller</dc:creator>
        <guid isPermaLink="false">4448@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>When setting up Mobile VPN and using the Use Network Settings option, VPN users cannot resolve Internal Hosts.</p>

<p>The context help in Watchguard Cloud says this:</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/wo/c5cw45g6gexm.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/wo/c5cw45g6gexm.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/wo/c5cw45g6gexm.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/wo/c5cw45g6gexm.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/wo/c5cw45g6gexm.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/wo/c5cw45g6gexm.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/wo/c5cw45g6gexm.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/wo/c5cw45g6gexm.png" sizes="100vw" /></p>

<p>So in the DNS section Public and Internal are set like this. (100.100 is used internally at client)</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/hk/ti4qb4amsufl.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/hk/ti4qb4amsufl.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/hk/ti4qb4amsufl.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/hk/ti4qb4amsufl.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/hk/ti4qb4amsufl.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/hk/ti4qb4amsufl.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/hk/ti4qb4amsufl.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/hk/ti4qb4amsufl.png" sizes="100vw" /></p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/25/85mwuauv63qv.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/25/85mwuauv63qv.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/25/85mwuauv63qv.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/25/85mwuauv63qv.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/25/85mwuauv63qv.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/25/85mwuauv63qv.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/25/85mwuauv63qv.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/25/85mwuauv63qv.png" sizes="100vw" /></p>

<p>To me the above above makes sense. Any domain.com queries to by a VPN client should be answered by the servers on the Internal DNS screen. But they aren't.</p>

<p>The Knowledge Base gives conflicting information to Help if I am interpreting it correctly.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/uw/fdvjt65bm6j6.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/uw/fdvjt65bm6j6.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/uw/fdvjt65bm6j6.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/uw/fdvjt65bm6j6.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/uw/fdvjt65bm6j6.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/uw/fdvjt65bm6j6.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/uw/fdvjt65bm6j6.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/uw/fdvjt65bm6j6.png" sizes="100vw" /></p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/9y/yd52vhsca7p3.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/9y/yd52vhsca7p3.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/9y/yd52vhsca7p3.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/9y/yd52vhsca7p3.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/9y/yd52vhsca7p3.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/9y/yd52vhsca7p3.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/9y/yd52vhsca7p3.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/9y/yd52vhsca7p3.png" sizes="100vw" /></p>

<p>So entering an internal DNS server on the Public section is needed to resolve the Internal hosts?  I works, but is this really the way it is supposed to work or is there another way to configure this that when reviewing the config does not look wrong?</p>

<p>Hopefully I have just overlooked something.</p>
]]>
        </description>
    </item>
    <item>
        <title>Solid/Reliable Router for VPN - No Random Disconnects</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4428/solid-reliable-router-for-vpn-no-random-disconnects</link>
        <pubDate>Sat, 11 Oct 2025 03:03:41 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>JethroD</dc:creator>
        <guid isPermaLink="false">4428@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, I know it may be a bit of a long-shot, but hoping to get any recommendations for a home router that is known to allow or pass very reliable, solid VPN connections to a Firebox device at our office.</p>

<p>I am connecting to a Firebox M290 at our office from my home, which has Spectrum 1Gbps (40Mbps up) cable internet and just the default Spectrum router. I'm on a Macbook Pro M1 and OSX 13.7.x, and use the default Mac VPN client for connecting. Our office has a Mac Mini Server that I connect to, using AFP (but have tried SMB as well).</p>

<p>I have no idea if a robust, name-brand home router would make any difference in helping keep my VPN connection connected, but need to get a new one anyway, so figured I'd ask. Don't need crazy mesh WiFi or anything, just solid performance. I connect to router via 1Gb ethernet.</p>

<p><strong>RANDOM DISCONNECTS</strong><br />
I worked with WatchGuard support agents for probably 8+ months back-and-forth trying to find a solution for my VPN connection that would randomly disconnect, but they were not able to come up with anything, so we gave up and I just deal with random disconnects. We have both IKEv2 and L2TP protocols enabled, which I connect to via the built-in Mac VPN client. When using IKEv2, which I prefer due to being split-tunnel, I get sudden, completely random disconnects throughout a workday (maybe 2-3 on a bad day). When using L2TP, the connection is more solid until I try to upload files to our server. What we were told about this was that the connection was getting saturated so the keep-alive or DPD messages would fail causing the disconnects. I only recently bumped my upload speed from 20Mbps to 40Mbps, but still not any more reliable. Hoping the eventual move to synchronous speeds may help, but that may be months/years away.</p>

<p>THANKS FOR ANY ADVICE!</p>
]]>
        </description>
    </item>
    <item>
        <title>Mobile VPN with SSL: 403 Forbidden error</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4132/mobile-vpn-with-ssl-403-forbidden-error</link>
        <pubDate>Tue, 07 Jan 2025 13:32:09 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>wouterVE</dc:creator>
        <guid isPermaLink="false">4132@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,<br />
I've recently configured SSLVPN with SAML authentication using this guide:<br /><a href="https://www.watchguard.com/help/docs/help-center/en-US/Content/Integration-Guides/General/azure-saml_ssl-vpn.html" rel="nofollow">https://www.watchguard.com/help/docs/help-center/en-US/Content/Integration-Guides/General/azure-saml_ssl-vpn.html</a></p>

<p>From time to time, our users get the following 403 error (especially the first time they are authenthenticating, thereafter it happens sporadically)<br /><img src="https://us.v-cdn.net/6029905/uploads/editor/v8/dl6ziagrvagg.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/v8/dl6ziagrvagg.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/v8/dl6ziagrvagg.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/v8/dl6ziagrvagg.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/v8/dl6ziagrvagg.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/v8/dl6ziagrvagg.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/v8/dl6ziagrvagg.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/v8/dl6ziagrvagg.png" sizes="100vw" /></p>

<p>In the Firewall, I found the following relevant logs:</p>

<pre spellcheck="false" tabindex="0">,C03904C857A4C,db,"FWStatus, dnip_earlydrop_process, DNIP number of office.com has decreased below WATERMARK[250], pri=3, proc_id=fqdnd, msg_id=",15256985,2025-01-07 11:23:21
,C03904C857A4C,db,"FWStatus, FQDND:idomain_ip_refresh_complete::1716: Assertion failed!, pri=3, proc_id=fqdnd, msg_id=",15267913,2025-01-07 11:26:58
,C03904C857A4C,db,"FWStatus, Peer certificate preverify failed (err 10 : certificate has expired) for [/C:US/ST:California/L:Menlo Park/O:Internet.org/CN:*.internet.org] (cert 0x2eb2fc90, store 0x2dc1a8c0), pri=3, proc_id=pxy, msg_id=",15272497,2025-01-07 11:28:33
,C03904C857A4C,db,"FWStatus, Peer certificate preverify failed (err 18 : self-signed certificate) for [/C:US/ST:California/L:Menlo Park/O:Internet.org/CN:*.internet.org] (cert 0x2eb2fc90, store 0x2dc1a8c0), pri=3, proc_id=pxy, msg_id=",15272496,2025-01-07 11:28:33
,C03904C857A4C,db,"FWStatus, FQDND:idomain_ip_refresh_complete::1716: Assertion failed!, pri=3, proc_id=fqdnd, msg_id=",15273869,2025-01-07 11:28:58
,C03904C857A4C,db,"FWStatus, nginx: 2025/01/07 12:29:31 [error] 7211$0: *112997 directory index of ""/usr/share/web/none/"" is forbidden, client: XX.XXX.XXX.XXX, server:  , pri=3, proc_id=wrapper, msg_id=",15275559,2025-01-07 11:29:31
,C03904C857A4C,db,"FWStatus, FQDND:idomain_ip_refresh_complete::1716: Assertion failed!, pri=3, proc_id=fqdnd, msg_id=",15278171,2025-01-07 11:30:20
,C03904C857A4C,db,"FWStatus, ACS: no client associated for the request, pri=3, proc_id=samld, msg_id=",15282057,2025-01-07 11:31:43
,C03904C857A4C,db,"FWStatus, nginx: 2025/01/07 12:31:44 [error] 7211$0: *113003 open() ""/usr/share/web/none/favicon.ico"" failed (2: No such file or directory), client: XX.XXX.XXX.XXX, server:  , pri=3, proc_id=wrapper, msg_id=",15282070,2025-01-07 11:31:44
,C03904C857A4C,db,"FWStatus, nginx: 2025/01/07 12:32:02 [error] 7211$0: *113006 directory index of ""/usr/share/web/none/"" is forbidden, client: XX.XXX.XXX.XXX, server:  , pri=3, proc_id=wrapper, msg_id=",15282654,2025-01-07 11:32:02
,C03904C857A4C,db,"FWStatus, FQDND:idomain_ip_refresh_complete::1716: Assertion failed!, pri=3, proc_id=fqdnd, msg_id=",15284911,2025-01-07 11:32:54
,C03904C857A4C,db,"FWStatus, nginx: 2025/01/07 12:33:12 [error] 7211$0: *113013 open() ""/usr/share/web/none/favicon.ico"" failed (2: No such file or directory), client: XX.XXX.XXX.XXX, server:  , pri=3, proc_id=wrapper, msg_id=",15285738,2025-01-07 11:33:12
,C03904C857A4C,db,"FWStatus, ACS: user john.doe@company.com from sslvpn_client logged in, pri=6, proc_id=samld, msg_id=",15285737,2025-01-07 11:33:12
</pre>

<p>I'm most interested in the error entries regarding the certificate:</p>

<pre spellcheck="false" tabindex="0">,C03904C857A4C,db,"FWStatus, Peer certificate preverify failed (err 10 : certificate has expired) for [/C:US/ST:California/L:Menlo Park/O:Internet.org/CN:*.internet.org] (cert 0x2eb2fc90, store 0x2dc1a8c0), pri=3, proc_id=pxy, msg_id=",15272497,2025-01-07 11:28:33
,C03904C857A4C,db,"FWStatus, Peer certificate preverify failed (err 18 : self-signed certificate) for [/C:US/ST:California/L:Menlo Park/O:Internet.org/CN:*.internet.org] (cert 0x2eb2fc90, store 0x2dc1a8c0), pri=3, proc_id=pxy, msg_id=",15272496,2025-01-07 11:28:33
</pre>

<p>I've tried to update the Trusted CA certificates for proxies in the Firebox System Manager, but as far as I can tell there is no certificate which responds to this description.</p>

<p>The other error which happens a lot (also on other times) is this one:<br /><code spellcheck="false" tabindex="0">,C03904C857A4C,db,"FWStatus, FQDND:idomain_ip_refresh_complete::1716: Assertion failed!, pri=3, proc_id=fqdnd, msg_id=",15267913,2025-01-07 11:26:58</code></p>

<p>I also got a similar Fault report - I've sent it to watchguard but not sure what els I could  do with this.<br /><img src="https://us.v-cdn.net/6029905/uploads/editor/t5/gu5chzaemruq.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/t5/gu5chzaemruq.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/t5/gu5chzaemruq.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/t5/gu5chzaemruq.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/t5/gu5chzaemruq.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/t5/gu5chzaemruq.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/t5/gu5chzaemruq.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/t5/gu5chzaemruq.png" sizes="100vw" /></p>

<p>So to summarize: how could I resolve this 403 error which happens from time totime?</p>

<p>FYI I'm using Mobile VPN with SSL client 12.11</p>
]]>
        </description>
    </item>
    <item>
        <title>SSL VPN 12.11.4  SAML issue</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4425/ssl-vpn-12-11-4-saml-issue</link>
        <pubDate>Tue, 07 Oct 2025 02:51:41 +0000</pubDate>
        <category>Firebox - VPN Mobile User</category>
        <dc:creator>AliZ</dc:creator>
        <guid isPermaLink="false">4425@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We are experiencing an issue with SAML authentication on our WatchGuard Firewall M290. When users attempt to connect via VPN using SAML, the embedded web view displays the message:<br />
"<strong>You have been successfully authenticated.</strong>"</p>

<p>However, the VPN connection does not proceed automatically. Users are required to manually right-click and select "Refresh" in order for the VPN to hook the ssl client  authentication process and complete the connection.</p>
]]>
        </description>
    </item>
   </channel>
</rss>
