Reset Search



KB40117 - When launching the Pulse client on Mac OS X 10.9 or higher results in "Connection Error - Failed to setup Virtual adapter. (Error:1205)

« Go Back


Last Modified Date8/28/2016 7:34 PM
This article describes an issue when Pulse secure fails to launch due to the virtual adapter failing to be setup properly.
Problem or Goal
When attempting to launch a VPN tunnel on Mac OS X 10.9 and higher, the user receives the following message from the Pulse client.
Connection Error - Failed to setup Virtual adapter.(Error:1205)
This issue occurs when the system does not have sufficient buffer space. (errno=55).  

To properly identify this issue, please review the debuglog.log (KB17327 - [Pulse] How to collect the log file from Pulse Secure Client on Desktops) and confirm the following entries:
dsAccessService iveConnectionMethod p0112 tB3B7 ncSession.cpp:149 - 
'session' handling config success, bring up virtual adapter
dsAccessService dsTMService p0112 tB3B7 platformVAMgr.cpp:360 - 
'TM' createVADevice: connect failed on kernel control socket (errno = 55)
dsAccessService dsTMService p0112 tB3B7 platformVAMgr.cpp:326 - 
'TM' Failed to unconfigure driver: 256
dsAccessService iveConnectionMethod p0112 tB3B7 ncAdapter.cpp:295 - 
'ncAccessMethod' Can't connect to TM Inteface: 0xe0000001
dsAccessService iveConnectionMethod p0112 tB3B7 ncSession.cpp:151 - 
'session' tunnel setup failed 105
To resolve this issue, please follow the steps given below:
  1. From the terminal window, execute to determine the max socket buffer size:
sudo sysctl -a kern.ipc.maxsockbuf
  1. The value should be 8388608.  If not, run the following command:
sudo sysctl -w kern.ipc.maxsockbuf=8388608
  1. Reboot the machine
Disclaimer:  The following changes are increasing the max buffer on the Mac OS X IP stack.  Please take careful consideration before making these changes.  Pulse Secure is not liable in any shape or form for any data loss computer and / or computer related equipment malfunction.  Always backup your computer system and registry before attempting to modify your computer system and program files. Please use at your own risk.
Related Links
Attachment 1 
Created ByNick Christen



Was this article helpful?



Please tell us how we can make this article more useful.

Characters Remaining: 255