![cisco vpn client for mac 10.11.6 cisco vpn client for mac 10.11.6](https://www.saturnvpn.com/wp-content/uploads/2015/04/ciscovpn_mac78.jpg)
![cisco vpn client for mac 10.11.6 cisco vpn client for mac 10.11.6](https://showfasr430.weebly.com/uploads/1/2/5/7/125741939/808788413.jpg)
When I modify one of these settings, the set of crypto policies offered by the macOS client (and shown in the IPSec log of pfSense - see below) changes so that the EXACT policy that IKE v1 Phase 1 crypto policy that I configure in pfSense is missing from the set of the policies offered by the MacOS client. I've tried various settings for the Encryption Algorithm, Hash Algorithm, and DH Group in pfSense. It appears to me that the pfSense is offering the crypto policy that is EXACTLY the one not offered by the macOS client. I can't get IKE v1 Phase 1 negotiated properly between macOS 10.11.6 client using the built in Cisco IPSec client and pfSense 2.3.2