Best Of
Re: Can't reset modem DX5401

Re: Zyxel Secuextender Disconnects after 1 Minute 21 Seconds

Re: AX7501-BO
Yallo say at https://support.yallo.ch/hc/en-gb/articles/4410483801105-Personalize-yallo-Home-Max-Fiber-Box- that the password is written on reverse side of your yallo Home Fiber Box.
Which device is providing your WiFi please?
- if it is the AX7501-B0 then you might be able to change it on there, but you should look to use WPA2 at least in order to have secure WiFi.
Unfortunately, the AX7501-B0 user guide is not able for free download, but you can register for it at https://service-provider.zyxel.com/emea/en/products/fiber-oltsonts/10g-active-fiber/hgus/ax7501-b-series under Downloads and Resources.
Kind regards Tony
How to check IKEv2 settings when it is not working
Sometimes the VPN settings which is created by wizard does not work at every device because the default proposal does not suit each device. It is important to modify the firewall proposal to apply in the customer environment.
The article explains how to check your devices and firewall when you have IKEv2 issue. (Certificate will be used as an example rather than PSK because it is more complicated.)
Checking Flow
1. Find the log that contains “Phase 1 proposal mismatch”. You can find which proposals can be used for this client. For example, Firewall receives proposals (1)AES256,SHA256/SHA128,DH14 (2) AES256,SHA256/SHA128,DH19
In the packet trace, you can also find those proposals in IKE_SA_INIT phase.
Then you can configure matched proposal in VPN Gateway (Phase1) setting.
2. Find the log that contains “Phase 1 Local ID mismatch”.
The “Remote ID” field on the client must be the same as the firewall’s Local ID.
3. If the process gets stuck at “[AUTH]” phase, check if you have the certificate on the client.
4. If the message “[AUTH fail]” appears in the log, check if you have correct account and password.
5. The amount of IP Address Pool cannot exceed 65535. This is the design limitation.
Re: USG Flex with Nebula and iptables masquerade

Re: L2TP over IPSEC parameters for Windows 10 native client
I think Android support both aggressive and main mode for L2TP/IPSec PSK.valerio_vanni said:So for L2TP/IPSEC I have to choose between Windows 10 and Android clients: Windows needs Main mode, while Android needs aggressive.Right?
But depends on the design of phone vendors.
Here my experiences on Samsung phones from Android 9 ~ 11.
The settings of "IPSec identifier" change the L2TP/IPSec IKE mode it used.
- Without "IPSec identifier" settings - IKE negotiate via Main mode.
- With "IPSec identifier" settings - IKE negotiate via Aggressive mode

Re: Public IP Whitelisting
