If your VPN connection is configured to be Host to Everywhere, all non-local network traffic is sent over the VPN tunnel once the connection has been established. All non-local traffic includes traffic to public Internet services, as those are non-local, too. Those services will only be reachable if your VPN gateway has been configured to forward Internet traffic sent over VPN to the public Internet and to forward replies back over VPN, otherwise Internet access will stop working.
A possible workaround is to configure a Host to Network connection instead, where only traffic to configured remote networks will be sent over VPN, whereas all other traffic is sent out like it is when there is no VPN tunnel established at all. In case the remote network are automatically provisioned by the VPN gateway, this has to be configured on the VPN gateway, automatic provisioning has to be disable in VPN Tracker (not possible for all VPN protocols), or the Traffic Control setting has to be used to override the network configuration as provided by the gateway (Traffic Control is currently not available on iOS).
A Host to Everywhere setup may be desirable for reasons of anonymity or to pretend to be in a different physical location (e.g. a different country), since all your requests will arrive at their final destination with the public IP address of the VPN gateway instead of your own one. Also that way you can benefit from any maleware filters or ad blockers running on the VPN gateway, yet it also means that the gateway can filter what services you have access to in the first place. If Host to Everywhere is desired but not working, this has to be fixed on at the remote site, since what happens to public Internet traffic after being sent over the VPN is beyond VPN Tracker's control.
If the connection is configured to use remote DNS servers without any restrictions, all your DNS queries will be sent over the VPN. Before any Internet service can be contacted, its DNS name must be resolved to an IP address first and if that isn't possible, as the remote DNS server is not working correctly or unable to resolve public Internet domains, the resolving process will fail and this quite often has the same effect in software as if the Internet service is unreachable.
A possible workaround is to either disable remote DNS altogether, if not required for VPN usage, or to configure it manually, in which case it can be limited to specific domains only ("Search Domains"). By entering a search domain of example.com, only DNS names ending with example.com (such as www.example.com) would be resolved by the remote DNS servers, for all other domains the standard DNS servers will be used as configured in the system network preferences.
Using a remote DNS server may be desirable to filter out malicious domains, to circumvent DNS blocking of an Internet provider, to hide DNS queries from local DNS operators (since DNS is typically unencrypted), or to allow access to internal remote domains that a public DNS server cannot resolve, as they are not public. For the last case, configuring the internal domains as search domains is sufficient. For all other cases, the issue must be fixed at the remote site, since what happens to DNS queries after being sent over the VPN is beyond VPN Tracker's control.
The WireGuard protocol itself does not support 2-Factor Authentication (2FA) for VPN connections. However, when using WireGuard connections with VPN Tracker, you can enhance your overall security by enabling 2FA for your VPN Tracker account.
This means your VPN configuration and access are protected with an additional layer of security, while your WireGuard connections remain end-to-end encrypted for maximum protection.
Using VPN Tracker is the best way to benefit from the performance and security of WireGuard, along with modern account-level protections like 2FA.
If you're experiencing issues with your World Connect connection in VPN Tracker, here's what to do:
In VPN Tracker, go to the Help menu and select "Contact Support". In the window that opens:
These steps often help resolve temporary connection issues.
IKEv1 is still a widely used VPN protocol and remains a solid option in many network environments. While it has some technical limitations compared to newer protocols, it continues to be supported in many systems and VPN solutions. VPN Tracker offers full support for both IKEv1 and IKEv2, so you can choose the protocol that best fits your setup. Want to learn more about the newer IKEv2 protocol? Our blog post on IKEv2 VPN covers its key features.
IKEv2 consists of two main phases: authentication and tunnel negotiation. In the first phase, both sides verify each other's identity. In the second phase, the secure VPN tunnel is established and encrypted. To understand how this works in practice, check out our blog post on IKEv2 VPN.
Yes! If you're testing VPN Tracker and run into setup issues or connection problems, you can book a 1:1 consulting session with our in-house experts. We offer real-time support via phone, video call or remote desktop.
If your IKEv2 VPN stopped working after updating to macOS 26 Tahoe and uses DES or 3DES encryption, the issue is due to a change in Apple’s VPN implementation. As part of broader security improvements, macOS 26 no longer supports outdated encryption algorithms like DES and 3DES for IKEv2 VPN connections. These algorithms are considered insecure by modern standards and have been removed from the built-in VPN client.
This change affects many older VPN setups—especially those used with legacy firewalls and routers—and leads to connection errors like “No acceptable proposal found” or “IKEv2 negotiation failed.”
VPN Tracker 365 continues to support DES, 3DES, and other legacy algorithms, allowing you to connect to your existing VPN without changing the gateway configuration. Learn more and get your VPN working again by following this step-by-step guide.
IKEv2 typically uses UDP port 500 for the initial connection and UDP port 4500 when NAT Traversal (NAT-T) is required — for example, behind firewalls or routers using NAT. If you're configuring an IKEv2 connection on your Mac, iPhone, or iPad, VPN Tracker makes setup easy. Learn how to connect to IKEv2 VPN with step-by-step guidance.
To get started with WireGuard VPN on your Mac, download VPN Tracker — a professional WireGuard client for macOS. With VPN Tracker, you don’t need to worry about using the Terminal or installing command-line tools. Just import your WireGuard configuration file and connect instantly. The app is compatible with macOS Sonoma and all recent versions of macOS.
➡ Get the download here: WireGuard Mac VPN client download
The best Mac VPN client is one that runs natively on macOS, is regularly updated, and supports all major protocols. VPN Tracker 365 is designed for professionals and supports IPsec, IKEv2, WireGuard®, OpenVPN, and more.
Dead Peer Detection (DPD) is a VPN feature that detects when the other side of a VPN tunnel is no longer responsive. Without DPD, your VPN connection could silently fail without you noticing. DPD keeps things running smoothly by checking the peer's status and cleaning up dead tunnels so they can reconnect automatically. For a full explanation, check out our blog post: What is Dead Peer Detection (DPD)?
Looking for a reliable WireGuard client for Mac? VPN Tracker is the best WireGuard VPN client for macOS, offering a fast, secure, and user-friendly experience. With native support for WireGuard tunnels, an intuitive interface, and full compatibility with macOS Tahoe, VPN Tracker is the ideal choice for professionals and everyday users alike.
➡ Get started here: WireGuard Mac VPN Client
VPN Tracker makes it easy to get started with WireGuard on your Mac. The built-in configuration wizard guides you through importing a config file or setting up your connection manually — fully optimized for macOS including the latest macOS Tahoe release.
Start your WireGuard setup here:
Your direct line to the equinux TARMAC team
Our TARMAC team is ready and waiting: tarmac@equinux.com or by Telephone +49 (0)89 / 520 465-222
You're interested in equinux products and have additional questions regarding your purchase or product activation? The equinux Sales Team is here to help: Call or chat with us,
Amaranten
Amazon AWS
Asante
Astaro
ASUS
AVM FRITZ!Box
Check Point
Cisco
Cisco Meraki
Cisco Small Busi ...
Clavister
Collax
Custom
Cyberguard
D-Link
DD-WRT
Dell SonicWALL
DrayTek
Eicon
F-Secure
Fortinet
Free Mobile S.A. ...
Funkwerk
Ingate
Juniper Networks
Kame (Free BSD, ...
LANCOM
Linksys Belkin
Linksys Cisco
Linux
Lucent
Mako Networks
Meraki
Microsoft
Migration Guides
NETASQ
Netgate
NETGEAR
Netopia
Nokia
Nortel
Novell
OpenBSD
OpenConnect
OpenVPN
Palo Alto Networ ...
PGP
Pyramid
QNAP
Secure Computing
Securepoint
Sipgate
SnapGear
SoftEther
SonicWall
Sophos
Stonesoft
strongSwan
Symantec
Synology
Telekom
TP-Link
Ubiquiti
WatchGuard
WireGuard
Zyxel
Apple Macintosh with PowerPC G5, 1.6 GHz or faster, 512 MB RAM Min. 2 GB disc storage Built-in USB 2.0 port Mac OS X 10.4 or higher Internet-Connection (required for activation)
macOS 10.13 High Sierra - macOS 26 Tahoe
Ready for macOS 14 SonomamacOS 13 VenturamacOS 12 MontereymacOS 11 Big SurmacOS 10.15 CatalinamacOS 10.14 MojavemacOS 10.13 High Sierra
Supported devices
Free Trial
macOS 13 VenturamacOS 12 MontereymacOS 11 Big SurmacOS 10.15 CatalinamacOS 10.14 MojavemacOS 10.13 High SierramacOS 10.12 SierraOS X 10.11 El Capitan
macOS 12 MontereymacOS 11 Big SurmacOS 10.15 CatalinamacOS 10.14 MojavemacOS 10.13 High SierramacOS 10.12 SierraOS X 10.11 El Capitan
macOS 10.13 High SierramacOS 10.12 Sierra
macOS 10.12 Sierra OS X 10.11 El Capitan OS X 10.10.5 Yosemite OS X 10.9.5 Mavericks