<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>iOS Archive - Pixelfriedhof</title>
	<atom:link href="https://pixelfriedhof.com/en/tag/ios-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://pixelfriedhof.com/en/tag/ios-en/</link>
	<description>IT-Blog, Fotoblog, Travelblog, Nerdstuff</description>
	<lastBuildDate>Fri, 15 Jan 2021 08:09:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://pixelfriedhof.com/wp-content/uploads/2022/02/cropped-My-project-3-32x32.png</url>
	<title>iOS Archive - Pixelfriedhof</title>
	<link>https://pixelfriedhof.com/en/tag/ios-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Solved: iPhone and Mac do not connect to Synology L2TP/IPSec VPN: The L2TP-VPN server did not respond</title>
		<link>https://pixelfriedhof.com/en/solved-iphone-and-mac-do-not-connect-to-synology-l2tp-ipsec-vpn-the-l2tp-vpn-server-did-not-respond/</link>
					<comments>https://pixelfriedhof.com/en/solved-iphone-and-mac-do-not-connect-to-synology-l2tp-ipsec-vpn-the-l2tp-vpn-server-did-not-respond/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Thu, 14 Jan 2021 20:45:44 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[L2TP/IPSec]]></category>
		<category><![CDATA[Mac]]></category>
		<category><![CDATA[macOS]]></category>
		<category><![CDATA[Synology]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://pixelfriedhof.com/?p=3868</guid>

					<description><![CDATA[<p>Error message: „The L2TP-VPN server did not respond. Try reconnecting. If the problem continues, verify your settings and contact your Administrator.“</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/solved-iphone-and-mac-do-not-connect-to-synology-l2tp-ipsec-vpn-the-l2tp-vpn-server-did-not-respond/">Solved: iPhone and Mac do not connect to Synology L2TP/IPSec VPN: The L2TP-VPN server did not respond</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Error message: „The L2TP-VPN server did not respond. Try reconnecting. If the problem continues, verify your settings and contact your Administrator.“ </p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" src="https://pixelfriedhof.com/wp-content/uploads/2021/01/70C77BB3-3AA2-4E4F-95FF-27EFDFA4DA1B-1170x730.jpeg" alt="" class="wp-image-3864" width="585" height="365"/></figure>



<h2 class="kt-adv-heading_832815-7f wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading_832815-7f">Solution:</h2>



<p>Go to Synology and open the VPN server. Open the settings menu for L2TP/IPSec VPN.</p>



<p>Remove the checkmark from &#8220;Enable SHA2-256 compatible mode (96 bit)&#8221;.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1170" height="730" src="https://pixelfriedhof.com/wp-content/uploads/2021/01/3794385E-A165-48D0-ABE3-A115C7044681-1170x730.jpeg" alt="" class="wp-image-3866"/></figure>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/solved-iphone-and-mac-do-not-connect-to-synology-l2tp-ipsec-vpn-the-l2tp-vpn-server-did-not-respond/">Solved: iPhone and Mac do not connect to Synology L2TP/IPSec VPN: The L2TP-VPN server did not respond</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/solved-iphone-and-mac-do-not-connect-to-synology-l2tp-ipsec-vpn-the-l2tp-vpn-server-did-not-respond/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hands-on: Using Lightroom on the iPad with a mouse &#8211; is it fun?</title>
		<link>https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/</link>
					<comments>https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 07:17:00 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[Lightroom]]></category>
		<category><![CDATA[Mouse]]></category>
		<guid isPermaLink="false">https://pixelfriedhof.com/?p=2944</guid>

					<description><![CDATA[<p>Since iOS 13.4 Apple allows the use of Bluetooth mice on the iPad. Can you use Lightroom as comfortably as on a Mac/PC? In this article we will find out.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/">Hands-on: Using Lightroom on the iPad with a mouse &#8211; is it fun?</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Since iOS 13.4 Apple allows the use of Bluetooth mice on the iPad. Can you use Lightroom as comfortably as on a Mac/PC? In this article we will find out.</p>



<h2 class="wp-block-heading">iPad with Lightroom and mouse control makes a good PC replacement</h2>



<p>To answer the question how well Lightroom works on the iPad, I set the standard quite high. I expect the iPad version with mouse support to work so well that I can move my entire workflow from Mac to iPad.</p>



<p>In the first versions of Lightroom with mouse support the integration was still bumpy. In the meantime it has to be said that the handling on sliders and in the rest of the editing area feels very comfortable. The whole user experience is in no way inferior to the PC version.</p>



<p>You can get a better impression of the operation in this video:</p>


<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><a href="https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/"><img decoding="async" src="https://pixelfriedhof.com/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2Fpq_0YB6MjnY%2Fhqdefault.jpg" alt="YouTube Video"></a><br />Ihre Daten werden erst beim Abspielen des Youtube-Videos an den Dienst übermittelt. Your data will only be transmitted to the service when you play the Youtube video.<br /><figcaption></figcaption></figure><p>Der Beitrag <a href="https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/">Hands-on: Using Lightroom on the iPad with a mouse &#8211; is it fun?</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/hands-on-using-lightroom-on-the-ipad-with-a-mouse-is-it-fun/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hands-on: Using a mouse within  RDP sessions from iPad</title>
		<link>https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/</link>
					<comments>https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Sat, 29 Aug 2020 07:43:00 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[Mouse]]></category>
		<category><![CDATA[RDP]]></category>
		<category><![CDATA[Remote Desktop]]></category>
		<guid isPermaLink="false">https://pixelfriedhof.com/?p=2954</guid>

					<description><![CDATA[<p>Since iOS 13.4 Apple allows the use of Bluetooth mice on the iPad. Can we use a mouse connected to iPad within Microsofts Remote Desktop App for iPad to control a remote system? In this article we will find out.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/">Hands-on: Using a mouse within  RDP sessions from iPad</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Since iOS 13.4 Apple allows the use of Bluetooth mice on the iPad. Can we use a mouse connected to iPad within Microsofts Remote Desktop App for iPad to control a remote system? In this article we will find out.</p>



<h2 class="wp-block-heading">No difference to the session from Mac or PC</h2>



<p>To answer the question of how well an RDP session can be operated with the mouse from the iPad, I set the bar quite high. I expect Microsoft&#8217;s Remote Desktop App for iPad with mouse support to work so well that I can perform remote maintenance on Windows operating systems from the iPad at any time and have exactly the same functionality as if I were initiating the sessions from the Mac or Windows PC.</p>



<p>And indeed, I was surprised. The mouse support works great and the whole user experience is as good as the PC version.</p>



<p>You can get a better impression of the operation in this video:</p>


<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><a href="https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/"><img decoding="async" src="https://pixelfriedhof.com/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2F3tCcD-E9cGU%2Fhqdefault.jpg" alt="YouTube Video"></a><br />Ihre Daten werden erst beim Abspielen des Youtube-Videos an den Dienst übermittelt. Your data will only be transmitted to the service when you play the Youtube video.<br /><figcaption></figcaption></figure><p>Der Beitrag <a href="https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/">Hands-on: Using a mouse within  RDP sessions from iPad</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/hands-on-using-a-mouse-within-rdp-sessions-from-ipad/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iOS 13 Bug: Bluetooth sync of address book in BMW shows corrupt contact data</title>
		<link>https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/</link>
					<comments>https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Fri, 20 Sep 2019 11:12:17 +0000</pubDate>
				<category><![CDATA[IT relevant topics]]></category>
		<category><![CDATA[adress book]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[BMW]]></category>
		<category><![CDATA[Bug]]></category>
		<category><![CDATA[contact sync]]></category>
		<category><![CDATA[iOS]]></category>
		<guid isPermaLink="false">http://pixelfriedhof.com/?p=316</guid>

					<description><![CDATA[<p>Directly after updating my iPhone 8 Plus to iOS 13 on September 20th, 2019, my contacts synced to the car, were corrupted. BMW Navigation system Professional doesn't show correct contact data any longer.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/">iOS 13 Bug: Bluetooth sync of address book in BMW shows corrupt contact data</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Directly after updating my iPhone 8 Plus to iOS 13 on September 20th, 2019, my contacts synced to the car, were corrupted. BMW Navigation system Professional doesn&#8217;t show correct contact data any longer.</p>
<p><a href="https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/"><img decoding="async" src="https://pixelfriedhof.com/wp-content/plugins/wp-youtube-lyte/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2F_5yow7nn9kI%2Fhqdefault.jpg" alt="YouTube Video"></a><br />Ihre Daten werden erst beim Abspielen des Youtube-Videos an den Dienst übermittelt. Your data will only be transmitted to the service when you play the Youtube video.</p>
<h3 style="color: #000000;">Solution:</h3>
<p>Completely disconnect the Bluetooth connection to the car and cancel the previous pairing via the settings. Then pair the mobile phone completely new with the vehicle. In the course of the pairing a query dialog appears if you want to allow the vehicle access to the guestbook and synchronize the contacts to the vehicle. Answer this dialog with &#8220;Yes&#8221;. Afterwards the contacts should be displayed correctly again in the vehicle.</p>
<h3>Incident at Apple:</h3>
<p>The incident has been reported to Apple via feedbackassitant.apple.com on September 20th, 14:08 CEST with&nbsp;<strong>Incident number&nbsp;FB7301578</strong>:</p>
<p><img decoding="async" class=" size-full wp-image-991" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" src="http://pixelfriedhof.com/wp-content/uploads/2019/09/feedbackiOS13BluetoothBug.png" alt="iOS13 Bluetooth Bug Developer Feedback Apple contacts corrupt" width="4206" height="2110" srcset="https://pixelfriedhof.com/wp-content/uploads/2019/09/feedbackiOS13BluetoothBug.png 2560w, https://pixelfriedhof.com/wp-content/uploads/2019/09/feedbackiOS13BluetoothBug-300x150.png 300w, https://pixelfriedhof.com/wp-content/uploads/2019/09/feedbackiOS13BluetoothBug-768x385.png 768w, https://pixelfriedhof.com/wp-content/uploads/2019/09/feedbackiOS13BluetoothBug-1024x514.png 1024w" sizes="(max-width: 4206px) 100vw, 4206px" /></p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/">iOS 13 Bug: Bluetooth sync of address book in BMW shows corrupt contact data</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/ios-13-bug-bluetooth-sync-of-address-book-in-bmw-shows-corrupt-contact-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>iPhone: Force VPN connection when connected to foreign WiFi</title>
		<link>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/</link>
					<comments>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Sat, 25 Aug 2018 12:45:43 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Configurator]]></category>
		<category><![CDATA[FritzBox]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[IPSec]]></category>
		<category><![CDATA[Profile]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">http://pixelfriedhof.com/?p=167</guid>

					<description><![CDATA[<p>By using profile files for device configuration, iPhone can be set up to automatically establish a secure VPN connection when connecting public unsafe wireless networks. This article contains an explanation and an easily customizable template.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/">iPhone: Force VPN connection when connected to foreign WiFi</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By using profile files for device configuration, iPhone can be set up to automatically establish a secure VPN connection when connecting public unsafe wireless networks. This article contains an explanation and an easily customizable template.</p>
<p>&nbsp;</p>
<p>Scenario: You connect your <a href="https://amzn.to/2oaKZxY" target="_blank" rel="noopener noreferrer">iPhone</a> to the public hotspot of your choice, say in some café at the airport. Your iPhone connects and immediately starts sending account information, such as your email access data over the unknown WiFi, to retrieve the latest emails for you. Your actually secret access data will now be readable for everyone in this public WiFi and anyone who is technically able to read your passwords can now also log into your e-mail inbox. Of course, this is not a desirable state of affairs.</p>
<p>&nbsp;</p>
<p>The remedy here is the use of a so-called VPN tunnel. The secure VPN tunnel is set up from your device&nbsp;to your home (or another secure endpoint) and all custom data traffic such as mail accounts, chats, eg. only reaches the Internet from the endpoint of the tunnel. The VPN tunnel thus enables secure surfing as if you were at home.</p>
<p>If you have ever tried to protect your iPhone data traffic through a VPN, you will have noticed that after some time of the active VPN connection the iPhone simply terminates the tunnel, for example if no data has flowed for a long time. Also, it is quite annoying to have to switch off the VPN tunnel manually at home again. But there is a more serious problem: To switch on the VPN manually, you must first be connected to the WiFi. Before you could connect the VPN manually, the <a href="https://amzn.to/2oaKZxY" target="_blank" rel="noopener noreferrer">iPhone</a> would have sent data via a possibly insecure WiFi network in seconds in the background.</p>
<p>&nbsp;</p>
<p>To prevent this from happening in the future, we instruct our iPhone to establish a VPN connection in every unknown WiFi before it sends data. We realize this via so-called profiles. Profiles are basically files with (XML-)structured content that tell the iPhone how to behave under certain conditions. Usually these configuration files are used in the company environment, so that you do not have to configure thousands of mobile phones manually and manually by employees. Instead, you distribute a single profile and distribute it to the employee devices with a single click. The profile configuration sometimes allows deeper interventions in the settings of our iPhone than the settings menu allows. And that&#8217;s what we&#8217;re taking advantage of.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Enrich the template with your VPN data</h2>
<p>The following code is a template for exactly the use case described above. In this profile a VPN of the type IPsec is used, as provided by the <a href="https://amzn.to/2P5TXYH" target="_blank" rel="noopener noreferrer">FritzBox</a>.</p>
<p>Just search for &#8220;CHANGETHIS&#8221; and replace the data in these sections with your own VPN access data.</p>
<p>You need the following data:</p>
<ul>
<li>Your hostname</li>
<li>username</li>
<li>password</li>
<li>shared secret</li>
<li>List of WiFi networks you trust and which do not require a VPN connection (your trusted network at work or at home)</li>
</ul>
<p>&nbsp;</p>
<p>Simply enter all data except for the shared secret as plain text in the XML file.<br />
Paste your Shared Secret into this generator (https://www.base64decode.org) and encode the Shared Secret to&nbsp;BASE64, then enter the converted Shared Secret in the appropriate place in the file.</p>
<p>&nbsp;</p>
<h2>Do I also have to adjust the payload data in the template?</h2>
<p>You may ask yourself if you also have to adjust the payload data contained in the template like the PayloadUUUID. I will also deal briefly with this question and explain the background a little in this section.<br />
Actually, Apple provides an application that can be used to create profiles for iOS devices. The tool is called <a href="https://itunes.apple.com/de/app/apple-configurator-2/id1037126344?mt=12" target="_blank" rel="noopener noreferrer">Apple Configurator 2</a> and enables the creation of profile files via a graphical interface. When a profile is generated with this tool, the payload data is generated automatically. It is more or less a random number, or rather a checksum, generated from various variables of the created profile.</p>
<p>This random number is very probably unique, i.e. it will hardly happen that two profiles with exactly the same PayloadUUID are installed on one device. And this should be the case, because this unique UUID allows us to adapt the profile file later and send it modified to the end device again without the profile being created twice. If a profile with the same UUID is already installed on the mobile device, it is only updated. If you send a profile with a different UUID to the iPhone, it would be installed in addition to the already existing one, i.e. you might have installed duplicate profiles.</p>
<p><strong>TLDR:</strong> No, you don&#8217;t have to adjust the payload sections of the profile.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Save the mobileconfig file and send it to the iPhone</h2>
<p>You can save the complete file as vpn.mobileconfig. The file extension&#8221;.mobileconfig&#8221; is particularly important.<br />
After editing and saving, send this file to your iPhone via AirDrop or e-mail and install the created profile. Done.</p>
<p>&nbsp;</p>
<h2>mobileconfig file to customize:</h2>
<p>&nbsp;</p>
<pre xml:lang="xml">[code]&lt;?xml version="1.0" encoding="UTF-8"?&gt;
&lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&gt;
&lt;plist version="1.0"&gt;
&lt;dict&gt;
&lt;key&gt;PayloadContent&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;IPSec&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;AuthenticationMethod&lt;/key&gt;
&lt;string&gt;SharedSecret&lt;/string&gt;
&lt;key&gt;LocalIdentifier&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;LocalIdentifierType&lt;/key&gt;
&lt;string&gt;KeyID&lt;/string&gt;
&lt;key&gt;RemoteAddress&lt;/key&gt;
&lt;string&gt;CHANGETHISmy.hostname.de&lt;/string&gt;
&lt;key&gt;SharedSecret&lt;/key&gt;
&lt;data&gt;
CHANGETHISBUTBEFORECONVERTTOBASE64
&lt;/data&gt;
&lt;key&gt;XAuthEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;XAuthName&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;XAuthPassword&lt;/key&gt;
&lt;string&gt;CHANGETHISpassword&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;IPv4&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;Manual connection to home network&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed.D58846D4-51B5-437E-9147-199C811ABA1C&lt;/string&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;D58846D4-51B5-437E-9147-199C811ABA1C&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;UserDefinedName&lt;/key&gt;
&lt;string&gt;Manual connection to home network&lt;/string&gt;
&lt;key&gt;VPNType&lt;/key&gt;
&lt;string&gt;IPSec&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;IPSec&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;AuthenticationMethod&lt;/key&gt;
&lt;string&gt;SharedSecret&lt;/string&gt;
&lt;key&gt;LocalIdentifier&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;LocalIdentifierType&lt;/key&gt;
&lt;string&gt;KeyID&lt;/string&gt;
&lt;key&gt;RemoteAddress&lt;/key&gt;
&lt;string&gt;CHANGETHISmy.hostname.de&lt;/string&gt;
&lt;key&gt;SharedSecret&lt;/key&gt;
&lt;data&gt;
CHANGETHISBUTBEFORECONVERTTOBASE64
&lt;/data&gt;
&lt;key&gt;XAuthEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;XAuthName&lt;/key&gt;
&lt;string&gt;CHANGETHISusername&lt;/string&gt;
&lt;key&gt;XAuthPassword&lt;/key&gt;
&lt;string&gt;CHANGETHISpassword&lt;/string&gt;
&lt;/dict&gt;
&lt;key&gt;IPv4&lt;/key&gt;
&lt;dict&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;key&gt;OnDemandEnabled&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;OnDemandRules&lt;/key&gt;
&lt;array&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Disconnect&lt;/string&gt;
&lt;key&gt;InterfaceTypeMatch&lt;/key&gt;
&lt;string&gt;WiFi&lt;/string&gt;
&lt;key&gt;SSIDMatch&lt;/key&gt;
&lt;array&gt;
&lt;string&gt;CHANGETHISTrustedHomenetworkname(SSID)&lt;/string&gt;
&lt;string&gt;CHANGETHISTrustedWorknetworkname(SSID)&lt;/string&gt;
&lt;/array&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Connect&lt;/string&gt;
&lt;key&gt;InterfaceTypeMatch&lt;/key&gt;
&lt;string&gt;WiFi&lt;/string&gt;
&lt;/dict&gt;
&lt;dict&gt;
&lt;key&gt;Action&lt;/key&gt;
&lt;string&gt;Disconnect&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;OverridePrimary&lt;/key&gt;
&lt;true/&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;Autoconnect via VPN in foreign WiFi&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed.85284094-A9F5-47D7-A1CD-6F831B2FFAC0&lt;/string&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;com.apple.vpn.managed&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;85284094-A9F5-47D7-A1CD-6F831B2FFAC0&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;key&gt;UserDefinedName&lt;/key&gt;
&lt;string&gt;Autoconnect via VPN in foreign WiFi&lt;/string&gt;
&lt;key&gt;VPNType&lt;/key&gt;
&lt;string&gt;IPSec&lt;/string&gt;
&lt;/dict&gt;
&lt;/array&gt;
&lt;key&gt;PayloadDescription&lt;/key&gt;
&lt;string&gt;Allows to connect to your home-network to tunnel all traffic through unsecure, public WiFi-networks.&lt;/string&gt;
&lt;key&gt;PayloadDisplayName&lt;/key&gt;
&lt;string&gt;CHANGETHIS VPN Configurations for organization (for example company name)&lt;/string&gt;
&lt;key&gt;PayloadIdentifier&lt;/key&gt;
&lt;string&gt;DB.BAB78424-28FB-4654-915D-93D0CB87CC7B&lt;/string&gt;
&lt;key&gt;PayloadOrganization&lt;/key&gt;
&lt;string&gt;CAHNGETHIS Optional: Givenname Birthname for name of organzization (for example company name)&lt;/string&gt;
&lt;key&gt;PayloadRemovalDisallowed&lt;/key&gt;
&lt;false/&gt;
&lt;key&gt;PayloadType&lt;/key&gt;
&lt;string&gt;Configuration&lt;/string&gt;
&lt;key&gt;PayloadUUID&lt;/key&gt;
&lt;string&gt;8CADFABC-C196-4784-948E-FB5345714B22&lt;/string&gt;
&lt;key&gt;PayloadVersion&lt;/key&gt;
&lt;integer&gt;1&lt;/integer&gt;
&lt;/dict&gt;
&lt;/plist&gt;[/code]</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-size: 8pt;">All the links in this text are Amazon Affiliate Links, and by clicking on an affiliate link I will earn a percentage of your subsequent Amazon purchases. However, this circumstance does not influence the background of my product recommendation. This product recommendation is independent, honest and sincere.&nbsp;</span></p>
<p><span style="font-size: 8pt;">Bei allen genannten Links handelt es sich um Amazon-Affiliate-Links. Durch einen Klick auf einen Affiliate-Link werde ich prozentual an Euren darauf folgenden Amazon-Einkäufen beteiligt. Dieser Umstand beeinflusst aber nicht die Hintergründe meiner Produktempfehlung. Diese Produktempfehlung erfolgt unabhängig, ehrlich und aufrichtig.</span></p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/">iPhone: Force VPN connection when connected to foreign WiFi</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/iphone-force-vpn-connection-when-connected-to-foreign-wifi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
