Which tool can be used to create and customize network connection profiles for deployment to client computers?

Select version:

Modifying this control will update this page automatically

Which tool can be used to create and customize network connection profiles for deployment to client computers?

Configuration profiles let you standardize settings for Mac computers. For example, an administrator can set up profiles that configure Mac computers to interact with servers on a school or workplace network.

A configuration profile can contain settings for a user’s Mail account, Wi-Fi settings, VPN settings, and more. Configuration profiles can work on Mac computers, iOS and iPadOS devices, Apple Watch, and Apple TV.

Your network administrator might provide you with one or several profiles, or provide you with a profile that, once installed, allows your administrator to install additional profiles automatically.

If you have a Mac with Apple silicon and you receive an enrollment profile, it’s a good idea to contact your network administrator for instructions on how to install it.

If you’re a network administrator and need information about setting up managed computers and installing enrollment profiles, see Apple Platform Deployment.

For information about Apple’s privacy policy, see the Apple Privacy Policy website.

Install a configuration profile you’ve received

  1. On your Mac, to open the profile in Profiles settings (where you can review information about it), do one of the following:

    • If the profile is attached to an email, open the attachment.

    • If the profile is posted on a website, download the profile from the website and open it.

  2. Choose Apple menu

    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    > System Settings, click Privacy and Security
    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    in the sidebar, then click Profiles on the right. (You may need to scroll down.

    You may be asked to supply your password or other information during installation.

  3. In the Downloaded section, double-click the profile.

  4. Review the profile contents then click Continue, Install or Enroll to install the profile.

If an earlier version of a profile is already installed on your Mac, the settings in the updated version replace the previous ones.

View an installed configuration profile

  1. On your Mac, choose Apple menu 

    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    > System Settings, click Privacy and Security
    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    in the sidebar, then click Profiles on the right. (You may need to scroll down.)

    Open Profiles settings for me

  2. Select a profile in the Profiles list to view information about it.

Remove a configuration profile from your Mac

  1. On your Mac, choose Apple menu 

    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    > System Settings, click Privacy and Security
    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    in the sidebar, then click Profiles on the right. (You may need to scroll down.)

    Open Profiles settings for me

  2. Select a profile in the Profiles list, then click the Remove button

    Which tool can be used to create and customize network connection profiles for deployment to client computers?
    .

When you remove a profile, all of its settings and information are deleted. For example, if the profile set up your email account, removing the profile deletes the account information from your Mac.

If you can’t remove a configuration profile, ask for help from the person who provided the profile.

Please don’t include any personal information in your comment.

Maximum character limit is 250.

Thanks for your feedback.

Which tool can be used to create and customize network connection profiles for deployment to client computers?

You can use the Windows 10 VPN client to make an L2TP VPN connection to a Firebox.

Configure the L2TP Connection

To prepare a Windows 10 computer to make an L2TP VPN connection, you must configure the L2TP connection in the network settings.

The procedure in this topic is an example only. The steps you must follow might differ because of your Control Panel view and existing configuration. For more information about L2TP VPN connections in Windows, see the Microsoft documentation.

  1. From the Windows 10 Start Menu, click Settings.
  2. Click Network & Internet.
  3. On the left navigation menu, select VPN.
  4. Click Add a VPN connection.
  5. In the VPN provider text box, select Windows (built-in).
  6. In the Connection name text box, type a name for the Mobile VPN (such as "L2TP VPN")
  7. In the Server name or address text box, type the DNS name or IP address for the Firebox external interface.
  8. From the VPN Type drop-down list, select Layer 2 Tunneling Protocol with IPSec (L2TP/IPSec).
  9. Click Save.
    The VPN is added to the Network & Internet VPN settings page.
  10. On the VPN settings page, click Change adapter options.
  11. Click your VPN to select it.
  12. Click Change settings of this connection.
    The Properties for this VPN appear.
  13. Click the Security tab.
  14. From the Data encryption drop-down list, select Require encryption (disconnect if server declines).
  15. Select Allow these protocols.
  16. Select Microsoft CHAP Version 2 as the only allowed protocol.
  17. Click Advanced settings.
    The Advanced Properties dialog box appears.
  18. If Mobile VPN with L2TP on the Firebox is configured to use a pre-shared key as the IPSec credential method:
    1. Select Use pre-shared key for authentication.
    2. In the Key text box, type the pre-shared key for this tunnel. The pre-shared key must match the pre-shared key configured on the Firebox Mobile VPN with L2TP IPSec settings.
  19. If Mobile VPN with L2TP on the Firebox is configured to use a certificate as the IPSec credential method:
    1. Select Use certificate for authentication.
    2. Make sure the Verify the Name and Usage attributes of the servers certificate check box is selected.
    3. Make sure you have imported the certificate to the client device. For more information, see Import a Certificate on a Client Device
  20. Click OK.
  21. Do not change the default settings on the Networking tab.
  22. Click OK.

Start the L2TP Connection

The name of the VPN connection is the destination name you used when you configured the L2TP connection on the client computer. The user name and password refers to one of the users you added to the L2TP-Users group. For more information, see About Mobile VPN with L2TP User Authentication.

Before you begin, make sure the client computer has an active connection to the Internet.

  1. In the Windows notification area (System Tray), click the Network icon.
    A list of available networks and VPNs appears.
  2. Click the VPN connection.
    The Network & Internet VPN settings appear.
  3. Select the VPN connection. Click Connect.
    The Connect page appears.
  4. Type your user name and password.
  5. Click OK.

For information about how to specify the non-default authentication server when you connect, see Connect from an L2TP VPN Client.

To configure pre-logon VPN connections for Windows users, see How can I create and deploy custom IKEv2 and L2TP VPN profiles for Windows computers? in the WatchGuard Knowledge Base.

See Also 

Internet Access Through a Mobile VPN with L2TP Tunnel

Configure and Use L2TP on Windows 8.1

Configure and Use L2TP on Windows 8 in the WatchGuard Knowledge Base

Configure and Use L2TP on Windows 7 in the WatchGuard Knowledge Base

Which VPN feature guarantees that a transferred message was sent and received by the two parties claiming to have sent and received the message?

End-to-end encryption (E2EE) guarantees data being sent between two parties cannot be viewed by an attacker that intercepts the communication channel.

What is AoVPN?

AoVPN allows any PCC Laptop to be always connected to the PCC network and business applications. To protect PCC information, we will also install security software on your device known as BitLocker. This encrypts your device making sure no one can unlock it without the correct BitLocker PIN.

What is the first thing to check when troubleshooting VPN problems?

Problem 1: I can't connect or stay connected to the VPN If you can't connect to the VPN at all, the first thing to do is check you have an internet connection; this sounds obvious but it's often overlooked. If your connection is fine, the next step is to try using a different VPN server.

Why are phone lines and ISDN not used today for remote access services Ras?

Why are phone lines and ISDN not used today for remote access services (RAS)? They no longer supply acceptable bandwidth.