Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts

AnyConnect VPN issue

Hi all,

Slightly strange AnyConnect issue, well two in fact.

We have it set up for split tunnellin Included in the split tunnel is

  1. Our head office subnets ( where the ASA is located

  2. Our azure VNET ( We have a site to site VPN between HO and Azure.

Problem 1: When connected via AnyConnect I get to literally anything in the HO subnet apart from the firewall. It doesn’t ping on any interface or sub interface. I put in a management rule as I needed to temporarily be able to do configuration over the VPN and that doesn’t work. The interfaces are in the same subnets I can get to. For example on the inside interface the IP is which I can’t get to. However I can get to which is the switch connected to it.

On the asa there is a route for the network with a next hop if the switch stack which does the inter-VLAN routing. However as the interface addresses Willa Leo be in the route table as directly connected I can’t see this been the issue.

Problem 2: I am unable to route the the Azure network

I have put an outside to outside NAT exemption in for the traffic

I have put a firewall rule in to allow the connection

I have enabled same-security permit intra-interface.

Any ideas on either issue would be greatly appreciated


50% Upvoted
What are your thoughts? Log in or Sign uplog insign up
level 1
2 points · 2 months ago · edited 2 months ago

Have you added the VPN pool to a ssh/http rule on the firewall, or are you using a VPN pool inside that /16?

level 1
Original Poster1 point · 2 months ago

No I added the vpn pool for both https and ssh.

But I can’t ping it either

level 1

What code are you running on the ASA? There was a "recent" change to the way ASA's handle routing for the interfaces marked as management only.

level 1
Original Poster1 point · 2 months ago


level 1

It's going to be difficult to tell you with out looking at the config. Can you post a sanitized version?

level 1

Hi, it does sound like you know exactly all the things to check. Best is to post us a sanitised config. But FYI I just connected to one of my ASAs to double check the config. I vpn to the outside IP. I have #management-access inside configured. A route for the VPN pool via the outside interface, and an SSH statement allowing the VPN pool ip to the INSIDE interface only. So double check that first. For your azure traffic, can you look as the asdm monitor while testing, and also do a packet tracer input command. It may also help you if you do a capture:

Capture test interface inside match ip host X any
Capture test real-time
level 1
Original Poster1 point · 2 months ago

Thanks all

I’ll grab a sanitised config today and post it.

level 1
Original Poster1 point · 2 months ago

Hi all

I’ve managed to fix this now. Like most of these weird issues it was something stupid.

Basically in the NAT statements I hadn’t put route lookup on the end. Added this and it it’s fixed both issues.

Thanks for everybody’s input

Appreciated Ben

Community Details





###Enterprise Networking Routers, switches and firewalls. Network blogs, news and network management articles. Cisco, Juniper, Brocade and more all welcome.

Create Post
r/networking Rules
Rule #1: No Home Networking.
Rule #2: No Certification Brain Dumps / Cheating.
Rule #3: No BlogSpam / Traffic re-direction.
Rule #4: No Low Quality Posts.
Rule #5: No Early Career Advice.
Rule #6: Educational Questions must show effort.
Cookies help us deliver our Services. By using our Services or clicking I agree, you agree to our use of cookies. Learn More.